Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

A secure smartphone and control method based on a split-core virtual machine

A technology of smart phones and virtual machines, applied in computer security devices, branch equipment, telephone communications, etc., can solve the problems of sensitive data theft, easy to steal users, etc., and achieve the effect of eliminating security risks.

Inactive Publication Date: 2011-12-21
PENGKUN COMM KUNSHAN CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still some defects in the existing operating system. Because it does not contain a virtual machine, the user process can always access the real data of the system, so malicious programs can easily steal the user's sensitive data or use the user's name to carry out illegal activities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A secure smartphone and control method based on a split-core virtual machine
  • A secure smartphone and control method based on a split-core virtual machine

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Aiming at the security smart phone and control method based on split core virtualization of the present invention, a preferred embodiment will be described in detail in conjunction with the drawings, refer to figure 1 ,in:

[0036]The Android (android) operating system of Google adopted by the operating system of the safe smart phone of the present invention. The operating system is a privilege-separated operating system. In this operating system, each application runs under a unique system identity. Each part of the system also uses its own independent identification method. This isolates applications from applications and applications from the system. More security functions of the system are provided through the authority mechanism. Permissions can restrict specific operations of a specific process, and can also restrict access to specific data segments per URI permission. Therefore, the operating system has the property of completely isolating processes. It ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security smart phone based on a split core virtual machine and its control method, which includes an operating system with a core state and a user state, and a permanent storage device for storing system data, programs and configuration information; the permanent storage device is divided into Four different partitions: core area, system area, virtual area and trust area; by loading the operating system core and various service programs in the core area and system area when starting the system, and establishing user processes and process information tables, it is possible to determine whether the process is trusted If it is trusted, it is directed to the trusted zone, otherwise it is directed to the virtual zone. The present invention redirects system calls that may affect the system to different data areas according to the nature of the program in the core state, so that a lightweight virtual machine can be realized, and high security can be realized with few resources.

Description

technical field [0001] The invention relates to a smart phone, in particular to a smart phone that can be safely manipulated and a control method for safe manipulation. Background technique [0002] With the rapid development of electronics and communication technology, smart phones have entered people's lives in large numbers, and have quickly become an indispensable portable device for people. Because smart phones have powerful computing, storage and communication hardware and related functions, a large number of various software can be installed to meet the various needs of users. However, just because smart phones can install a large amount of software, malicious programs such as viruses and Trojan horses can take advantage of the situation and infect the smart phone system. Because mobile phones have payment functions and store a large amount of personal information, the consequences of a malicious program infection on a mobile phone will be much more serious than that...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F21/20H04M1/725G06F21/50G06F21/53H04M1/72448
Inventor 罗迒哉王阳
Owner PENGKUN COMM KUNSHAN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products