Abstract:
An apparatus and method for analyzing malware in a data analysis system are provided. The apparatus includes a data analysis unit and a controller. The data analysis unit sorts data into primary harmful data and primary harmless data using screening data information of malicious code information and virus information. The controller screens or deletes the primary harmful data, and sends a request for precision analysis of the primary harmless data to a server. The data analysis unit sorts secondary harmful data from the primary harmless data using the precision analysis result received from the server.
Abstract:
An electronic device and method for performing user authentication using at least one of an access point and a peripheral device are provided. The method includes determining whether an electronic device connects to at least one of a stored access point and a stored device within a predetermined time period; and requesting a predetermined user authentication when it is determined that the electronic device has not connected to the at least one of the stored access point and device within the predetermined time period.
Abstract:
A method of managing keys and an electronic device adapted to the method are provided. The method includes creating a first key, based on information included in a memory space of a processor, creating a second key, based on at least one item of user information, and creating a third key that was created through at least one encryption process, based on the created first key and the created second key.
Abstract:
A method of managing application installation is provided. The method includes receiving an application by an electronic device, determining an application signature key included in the application, if the application signature key matches a development signature key among the development signature key and a commercial signature key, verifying the application signature key in relation to whether the electronic device corresponds to information on a test electronic device defined in the application signature key, and installing the application based on a verification result of the application signature key.
Abstract:
An electronic device comprising: a memory; and at least one processor configured to: install an application by using an installation file associated with the application; grant at least one permission to the application based on a permission setting token that is included in the installation file; and store, in a database, an indication that the application is granted the permission.
Abstract:
An electronic device is provided. The electronic device includes a processor, a memory configured to connect to the processor, and an embedded secure element (eSE) configured to connect to the processor over a physical channel to receive secure data sent by the processor over the physical channel, and store the secure data.
Abstract:
A system and method for changing authority for a secure booting operation and an electronic device thereof are provided. The system includes a memory including a plurality of key bit areas in each of which a root key can be received, and a processor core configured to input a new root key to one of the plurality of key bit areas of the memory in response to an external input.