Unlock instant, AI-driven research and patent intelligence for your innovation.

Computer system with memory structure of protecting security information and application method

A computer system and storage area technology, applied in the field of computer systems, which can solve the problems of obtaining or changing confidential information

Inactive Publication Date: 2003-12-17
SAMSUNG ELECTRONICS CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, during the operation of the operating system program, confidential information may be obtained or changed when jumping to the confidential program and / or load / save commands

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Computer system with memory structure of protecting security information and application method
  • Computer system with memory structure of protecting security information and application method
  • Computer system with memory structure of protecting security information and application method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Hereinafter, the present invention will be described in more detail with reference to the schematic drawings of embodiments of the present invention. However, the invention should not be construed as limited to the specific embodiments set forth herein. Rather, the embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art. The same reference numerals refer to the same elements throughout.

[0019] Accordingly, the present invention is susceptible to various modifications and alternative forms, wherein specific embodiments shown in the accompanying drawings will be described in detail herein. It should be understood, however, that there is no intention to limit the invention to the particular forms disclosed, but on the contrary, the invention covers all modifications, Equivalent and Alternative Examples.

[0020] The present invention is described below with reference t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A computer system includes first, second and third memory areas. The first memory area stores therein at least one general application program including at least one subroutine call to the second memory area. The second memory area only stores therein at least one subroutine call to the third memory area. The third memory area stores therein at least one security application program that is only callable by a subroutine call from the second memory area. A processing system is configured to execute a general application program in the first memory area, including a subroutine call to the second memory area, and to unlock the third memory area only upon executing a subroutine call from the first memory area to the second memory area. The processing system may be further configured to prevent unlocking the third memory area while executing a general application program in the first memory area.

Description

[0001] related application [0002] This application claims the benefit of Korean Patent Application No. 2002-0029877 filed May 29, 2002, the entire disclosure of which is incorporated herein by reference. technical field [0003] The present invention relates to a computer system, a storage structure for the computer system and an operating method thereof, and in particular to a computer system including confidential information, a storage structure and an operating method thereof. Background technique [0004] Security applications are widely used in computer systems. These secure applications can be used to authenticate authorized users and / or encrypt and decrypt sensitive information. [0005] Privacy is especially important for smart cards. As is well known to those skilled in the art, a smart card is a computer system on an electronic card, usually of the same size and material as a credit card. Smart cards contain integrated circuit (IC) chips. The IC chip typical...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F12/14G06F21/12G06F21/14G06F21/79G06K19/073G07F7/10
CPCG06F12/1433G07F7/084G07F7/1008G06Q20/357G06Q20/341G06F21/34G06K19/073
Inventor 金圣贤
Owner SAMSUNG ELECTRONICS CO LTD