Method for achieving safe operation of power special mobile terminal on basis of isolation technique

A mobile terminal and safe work technology, applied in the information field, can solve problems such as sensitive information leakage, data eavesdropping, data destruction, etc., and achieve the effect of solving potential safety hazards

Active Publication Date: 2013-03-13
CHINA ELECTRIC POWER RES INST +3
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to ensure the safe application of mobile terminals in the power intranet, it is necessary to solve the security problems of mob

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for achieving safe operation of power special mobile terminal on basis of isolation technique
  • Method for achieving safe operation of power special mobile terminal on basis of isolation technique
  • Method for achieving safe operation of power special mobile terminal on basis of isolation technique

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0032] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0033] The implementation method of the safe work of the electric power dedicated mobile terminal based on the isolation technology proposed in this embodiment, its process is as follows figure 1 shown, including the following steps:

[0034] (1) Initialize the safe working environment, carry out local authentication, and check whether the mobile terminal meets the requirements for establishing a safe working environment, including whether it has a power-specific safe TF card and SIM card;

[0035] The process of initializing the safe working environment is as follows: figure 2 shown, including the following steps:

[0036] 1) Scan the hardware to determine whether there is a secure TF card and SIM card, if yes, go to step 2), otherwise exit the initialization process of the safe working environment and clean up the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for achieving safe operation of a power special mobile terminal on the basis of the isolation technique. Reading and writing of sensitive information are completed in a safe working environment by using a transparent encryption mode. When a user operates the safe working environment, local authentication and remote authentication are needed. After a system is shifted to the safe working environment, using of hardware interfaces of Bluetooth, infrared and the like is limited according to a protection strategy, a safe channel is built for accessing a power intranet through a specified network interface, access of a public network is limited. When the system quits from the safe working environment, operation trace and data are cleaned. The mobile terminal system cannot access power intranet sensitive information stored in encrypted mode under a common working environment. The method solves the problems of data interception, data damage, sensitive information leakage and the like caused by the fact that the mobile terminal accesses the power intranet and improves whole safety of power mobile application.

Description

technical field [0001] The invention relates to the field of information technology, in particular to a method for realizing safe work of a power-specific mobile terminal based on isolation technology. Background technique [0002] With the development of information technology, the demand and application of mobile technology and mobile terminals in the power system are becoming more and more extensive. After the mobile terminal is connected to the power intranet, it needs to exchange information with various information systems in the power intranet. Most of this information It is sensitive information, once it is destroyed or leaked, it will cause serious damage to social order and public interests, or cause damage to national security. [0003] The application of mobile technology and mobile terminals has inherent deficiencies in security, mainly manifested in: [0004] Terminal supervision is more difficult: mobile terminals are portable and mobile. Compared with fixed...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04W12/02H04W12/06H04W12/08
Inventor 陈牧李明卢士达邵志鹏楚杰徐敏侯战胜戴造建
Owner CHINA ELECTRIC POWER RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products