Electronic device and method for processing secure information

作者: In Ku Kang , Yu Seung Kim

DOI:

关键词:

摘要: An electronic device and a method for operating the are provided. The includes obtaining first information in zone of device, extracting second included storing that has higher level security than zone.

参考文章(27)
Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb, Michael Holtzman, Content Control System Using Certificate Revocation Lists ,(2006)
Ron Barzilai, Fabrice Jogand-Coulomb, Michael Holtzman, Content Control System Using Versatile Control Structure ,(2006)
Robert Hansen, Trusted zone protection ,(2013)
Ron Barzilai, Rotem Sela, Fabrice Jogand-Coulomb, Michael Holtzman, Content control method using certificate chains ,(2006)
Ron Barzilai, Avraham Shmuel, Rotem Sela, Michael Holtzman, Jason T. Lin, Content Control Method Using Certificate Revocation Lists ,(2006)
Ron Barzilai, Fabrice Jogand-Coulomb, Michael Holtzman, Content control method using versatile control structure ,(2006)
Dimitrios Lymberopoulos, Karin Strauss, Chuan Qin, Oriana Riva, Progressive authentication: deciding when to authenticate on mobile phones usenix security symposium. pp. 15- 15 ,(2012)
Ron Barzilai, Fabrice Jogand-Coulomb, Michael Holtzman, Method for controlling information supplied from memory device ,(2006)
Ron Barzilai, Fabrice Jogand-Coulomb, Michael Holtzman, Control method using identity objects ,(2006)
Sven Schrecker, Vincent Edward Von Bokern, Ned McArthur Smith, Purushottam Goel, Hardware-based device authentication ,(2012)