Unlock instant, AI-driven research and patent intelligence for your innovation.

Terminal

A terminal and processor technology, applied in the field of data security, can solve the problem of insecure private data such as user information, and achieve the effect of improving security

Active Publication Date: 2013-11-20
DONGGUAN YULONG COMM TECH +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, since all data processed by the only processor is in the same memory space ( figure 1 RAM and ROM shown in ), so the above application program is also very likely to obtain private data from this storage space through simple cracking technology
Therefore, for the applications in the terminal, especially when some third-party applications in the terminal come from some hackers or personal information sellers with ulterior motives, it will lead to extremely insecure data such as user information in the terminal. state
[0003] Therefore, how to solve the data security problem brought by a single processor to the terminal has become a technical problem that needs to be solved urgently.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal
  • Terminal
  • Terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0073] Among the multiple CPUs used to process private data / non-private data, a certain CPU is used as a "relay" with the restricted external device 102, and other CPUs realize the connection with the restricted external device through the "relay". 102; at the same time, a certain CPU is used as a "relay" with the unrestricted external device 104, and other CPUs realize the interaction with the unrestricted external device 104 through the "relay".

[0074] Specifically, such as image 3 As shown, it is assumed that a connection is established between CPU1 and the restricted external device 102, and other multiple CPUs for processing private data are connected with CPU1 in a "serial" manner; at the same time, it is assumed that CPU2 and the non-restricted external device 104 A connection is established between them, while other multiple CPUs used to process non-private data are connected in "parallel connection".

[0075] Interaction with restricted external devices 102:

[0...

Embodiment approach 2

[0085] Among the multiple CPUs used for processing private data, each CPU is "parallel connected" to the restricted external device 102, and directly interacts with the restricted external device 102 without requiring other CPUs as "relays".

[0086] Specifically, such as Figure 4 As shown, CPU1, CPU1A, and CPU1B for processing private data are respectively connected to a restricted external device 102; at the same time, among CPU2, CPU2A, and CPU2B for processing non-private data, only CPU2 is directly connected to an unrestricted external device 104 .

[0087] At the same time, the "serial" and / or "parallel" methods mentioned in the above text can be used among multiple CPUs with the same processing function. As a specific example, Figure 4 It shows that: CPU1, CPU1A, CPU1B for processing private data adopts "serial connection" mode, while CPU2, CPU2A, CPU2B for processing non-private data adopts "parallel connection" mode.

[0088] (1) Interaction with restricted exter...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal which comprises first processors, second processors, constraint external devices and non-constraint external devices. The first processors are used for processing private data in the terminal; the second processors are used for processing non-private data in the terminal; the constraint external devices are connected to the first processors; the non-constraint external devices are connected to the second processors; configured closed forwarding interfaces of the first processors or configured closed forwarding interfaces of the second processors can be respectively connected with peripheral interfaces, so that the second processors or the first processors can be connected with the constraint external devices or the non-constraint external devices and interact with the constraint external devices or the non-constraint external devices. According to the technical scheme, the terminal has the advantages that the private data and the non-private data in the terminal can be physically separately processed, so that the private data can be assuredly prevented from being acquired by unsafe application programs, and the safety of the terminal can be effectively improved.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular, to a terminal. Background technique [0002] Such as figure 1 As shown, many peripheral devices (ie, external device 102 ) are installed in the terminal, such as a display screen, a touch screen, a camera, keys, a communication module, a sensor module, and the like. In related technologies, only a single processor ( figure 1 CPU shown in ), then the processor can send data to and receive data from any peripheral under the control of any application. When using, especially third-party applications from uncertain sources, these applications can easily control the only processor in the terminal to call private data, and even upload it to other terminals or servers arbitrarily. At the same time, since all data processed by the only processor is in the same memory space ( figure 1 RAM and ROM shown in ), so the above-mentioned application program is also very likely to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/74
Inventor 丁兆刚冯耀辉
Owner DONGGUAN YULONG COMM TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More