发明名称 Application access control method and electronic apparatus implementing the same
摘要 A method and apparatus of access control in an electronic apparatus implementing the method are provided. The method of operating an electronic apparatus includes detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus, in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor, determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor, and allowing access to the resource by the processor when the record exists in the memory.
申请公布号 US9407642(B2) 申请公布日期 2016.08.02
申请号 US201414205842 申请日期 2014.03.12
申请人 Samsung Electronics Co., Ltd. 发明人 Korkishko Tymur;Lee Kyunghee;Pometun Sergiy;Belousov Sergey;Shutovskyi Vasyl;Vasylskyy Vitaliy;Androsov Andrey;Dovgan Kateryna
分类号 G06F21/00;H04L29/06 主分类号 G06F21/00
代理机构 Jefferson IP Law, LLP 代理人 Jefferson IP Law, LLP
主权项 1. A method of access control in an electronic apparatus, the method comprising: detecting an access request to a resource from an application included in a first area of a memory by a processor of the electronic apparatus; in response to the access request, executing an access control module included in a second area of the memory to calculate a hash value of the application by the processor; determining whether a record exists in the memory, the record corresponding to the hash value and identification information of the application, by executing the access control module by the processor; and allowing access to the resource by the processor when the record exists in the memory, the record corresponding to the hash value and the identification information of the application, wherein the resource includes a system resource and an application resource, wherein the determining of whether the record exists in the memory comprises: decrypting the record encrypted and stored in the first area by using a key included in the second area; and determining whether the decrypted record corresponds to the hash value and the identification information, wherein the second area is an area requiring authentication of access by the processor.
地址 Suwon-si KR