Intelligent information equipment and operation system thereof

A technology for operating systems and information equipment, applied in the protection of internal/peripheral computer components, instruments, digital data authentication, etc., to achieve the effect of improving security flexibility

Active Publication Date: 2015-07-01
CHINA STANDARD SOFTWARE
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] At present, mountable devices are generally mounted automatically through HAL on the Linux system, and there is no effective management tool for actual control of device access rights.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent information equipment and operation system thereof
  • Intelligent information equipment and operation system thereof
  • Intelligent information equipment and operation system thereof

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0043] This implementation provides an operating system suitable for intelligent information devices. The operating system can be an improvement on operating systems such as the Windows operating system or the Linux operating system. In other words, the operating system can be a Windows operating system , can also be an operating system such as Linux.

[0044] In addition to processing such as file management and user interface of the existing operating system (for example), the operating system of this embodiment also performs the following access operations for the mountable device to be accessed.

[0045] Step S110, monitor the mountable devices to be connected, such as USB flash drives, CDs, cameras, and printers (to be connected), and enter step S120 when the mountable devices to be connected are detected.

[0046] Step S120, based on the preset configuration information, it is judged whether the current user has the right to access the mountable device to be accessed.

...

no. 2 example

[0057] Figure 2a and Figure 2b Together, it shows a schematic flow chart of implementing the processing (hereinafter referred to as ud authentication processing) performed by the operating system when accessing a mountable device according to the second embodiment of the present invention by modifying the mount command. This embodiment will be described in detail below in conjunction with the figures.

[0058] Udev sends the information to HAL after listening to the uevent event of the device. HAL will start a hald and hald-runner service program to monitor the DBus connection information. Finally, the corresponding addon program will be called according to the specific device.

[0059] In this embodiment, the ud authentication mechanism according to this embodiment is realized by modifying the mount command through FIG. 2 . The main process is to first judge whether to perform ud authentication, and if so, initialize the user permission list and perform user authenticat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses intelligent information equipment and an operation system thereof. The following access operation steps for to-be-accessed mountable equipment are executed before the operation system accesses to the to-be-accessed mountable equipment and include: a judging step, an access step and a finishing step. The judging step includes: judging whether a current user has authority to access the to-be-accessed mountable equipment or not on the basis of preset configuration information; if not, executing the finishing step, if yes, executing the access step. The access step includes: accessing the to-be-accessed mountable equipment so that the user can access the mountable equipment easily. The finishing step includes: finishing the access operations on the mountable equipment so that the current user cannot access the mountable equipment. The preset configuration information comprises information that various users are allowed and / or prohibited to access some one or all mountable equipment. Safety and flexibility of the intelligent information equipment or the operation system are improved.

Description

technical field [0001] The invention relates to an intelligent information device and its operating system, in particular to an intelligent information device capable of accessing and mounting devices and its operating system. Background technique [0002] At present, smart information devices such as computers and mobile phones have more and more functions, and most smart information devices have the function of connecting to mountable devices. The following takes an intelligent information device installed with a Linux operating system as an example to illustrate the relevant processing performed by the current intelligent information device when it wants to access a mountable device. [0003] Sysfs is a relatively new virtual memory file system designed in the linux kernel. Its function is similar to proc, but in addition to the same function as proc, it has the same function of viewing and setting kernel parameters, and it also has a unified device model for Linux as man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F13/10G06F21/70
Inventor 范雄男
Owner CHINA STANDARD SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products