Method for realizing information security of intelligent terminal and intelligent terminal

A smart terminal and information security technology, applied in the field of communication, can solve the problems of easy cracking of information security software, information leakage, etc., and achieve good concealment and effectiveness, and the effect of protecting information security

Inactive Publication Date: 2011-11-16
KONKA GROUP
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although in an existing intelligent terminal including an application processor (AP, Application Processor) and a modem MODEM, information security software based on an intelligent operating system is installed on the AP, but the information security software installed on the AP is very easy to be Therefore, there is currently no very effective method to prevent information leakage after the terminal is lost and to retrieve the lost terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing information security of intelligent terminal and intelligent terminal
  • Method for realizing information security of intelligent terminal and intelligent terminal
  • Method for realizing information security of intelligent terminal and intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Embodiments of the present invention provide a method for realizing information security of an intelligent terminal and an intelligent terminal, which are applied to an intelligent terminal adopting an AP+MODEM framework, and the security configuration information is saved on the MODEM, which can effectively protect the information security of the intelligent terminal, and Concealment and effectiveness.

[0031] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0032] see figure 1 , is a flow chart of a method for realizing information security of an intelligent terminal in an embodiment of the present invention. The method is applied to an intelligent terminal including an application processor AP and a modem MODEM, that is, an intelligent terminal with an AP+MODEM framework, and includes the following steps :

[0033] Step 101: When the MODEM receives security control information or detects that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for realizing the information security of an intelligent terminal. The method is applicable to the intelligent terminal which comprises an application processor (AP) and a modem. The method comprises the following steps that: when receiving security control information or detecting that the intelligent terminal is in an abnormal state, the modem generates a processing instruction according to the security configuration information of the modem; the modem sends the processing instruction to a radio interface layer (RIL) of the AP; and the RIL executes corresponding operation according to the processing instruction. The invention has the advantages that: the information security of a mobile terminal can be effectively protected; and the method has good concealment and good effectiveness.

Description

technical field [0001] The invention relates to the field of communication, in particular to a method for realizing information security of an intelligent terminal and the intelligent terminal. Background technique [0002] With the development of mobile terminals, there are more and more smart terminals, and their functions are becoming more and more powerful. The smart terminals contain more and more personal information of users, and the information security problem is quite serious. Although in an existing intelligent terminal including an application processor (AP, Application Processor) and a modem MODEM, information security software based on an intelligent operating system is installed on the AP, but the information security software installed on the AP is very easy to be Therefore, there is currently no very effective method to prevent information leakage after the terminal is lost and to retrieve the lost terminal. Contents of the invention [0003] The technica...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00G06F21/71
Inventor 谢继长
Owner KONKA GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products