DATA SECURITY METHOD AND ELECTRONIC DEVICE IMPLEMENTING THE SAME
First Claim
1. A method of operating an electronic device, the method comprising:
- receiving a request for an application key from a data generation application;
generating the application key using an application Identification (ID) corresponding to the data generation application and a security key stored in a secure area of the electronic device, in response to the request; and
encrypting data using the generated application key.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and an apparatus that may safely secure data in an electronic device including a computing resource, that is, software (for example, an operating system) and hardware (for example, a memory and a Central Processing Unit (CPU)) for operating the electronic device are provided. The method includes receiving a request for an application key from a data generation application or a proxy application that executes encryption of data in place of the data generation application, generating an application key using an application Identification (ID) corresponding to the data generation application and a security key stored in a secure area of the electronic device, in response to the request, and encrypting data using the generated application key.
14 Citations
20 Claims
-
1. A method of operating an electronic device, the method comprising:
-
receiving a request for an application key from a data generation application; generating the application key using an application Identification (ID) corresponding to the data generation application and a security key stored in a secure area of the electronic device, in response to the request; and encrypting data using the generated application key. - View Dependent Claims (2, 3, 4, 5, 6, 20)
-
-
7. A method of operating an electronic device, the method comprising:
-
receiving a request for an encryption key or a decryption key from an application; generating the encryption key or the decryption key using a security key stored in a secure area of the electronic device, in response to the request; and transmitting the generated encryption key or decryption key to the application. - View Dependent Claims (8, 9)
-
-
10. An electronic device comprising:
-
a user input unit; a memory comprising a normal area and a secure area; and a processor configured to access the normal area to execute a program of the normal area, to access the secure area to execute a program of the secure area, and to connect the user input unit and the memory, wherein the secure area comprises a key generation module configured to receive a request for an application key from an application, to generate the application key using an application Identification (ID) and a security key, in response to the request, and to transfer the generated application key to the application, and wherein the security key is accessible in the secure area and inaccessible in the normal area. - View Dependent Claims (11, 12, 13, 14)
-
-
15. An electronic device, comprising:
-
a user input unit; a memory comprising a normal area and a secure area; and a processor configured to access the normal area to execute a program of the normal area, to access the secure area to execute a program of the secure area, and to connect the user input unit and the memory, wherein the secure area comprises a key generation module configured to receive a request for an encryption key or a decryption key from an application, to generate the encryption key or the decryption key using a security key in response to the request, and to transfer the generated encryption key or decryption key to the application, and wherein the security key is accessible in the secure area and inaccessible in the normal area. - View Dependent Claims (16, 17, 18, 19)
-
Specification