Supercharge Your Innovation With Domain-Expert AI Agents!

Terminal and display control method of user interface

A display control method and user interface technology, applied in the field of data security, can solve the problems of private data theft, user information insecurity, etc., and achieve the effect of improving security, avoiding damage or tampering, and ensuring security

Inactive Publication Date: 2013-12-11
DONGGUAN YULONG COMM TECH +1
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In related technologies, most terminals are only equipped with a single processor, and all data is processed by this processor, so the private data in it is easy to be stolen by some third-party applications in the terminal, especially when these applications When the program comes from some hackers or personal information sellers with ulterior motives, it will cause the user information and other private data in the terminal to be in an extremely unsafe state

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal and display control method of user interface
  • Terminal and display control method of user interface
  • Terminal and display control method of user interface

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0053] Such as figure 2 As shown, the interaction process between CPU2 and external device 102 is realized through data forwarding by CPU1.

[0054]Specifically, in the downlink process, the external device 102 transmits all the data to be sent to CPU1, and if CPU1 detects private data, it directly processes the private data, and transmits non-private data to CPU2; , CPU1 forwards the received data from CPU2 to external device 102 .

[0055] Since CPU1 is dedicated to processing private data, it is a more secure processor than CPU2, so all data is sent to CPU1, even if non-private data is sent by other applications (compared to what should have been sent to The acquisition and utilization of the application program) will not lead to the leakage of private information; as long as the private data can be guaranteed not to be processed by CPU2, the acquisition and utilization of private data by illegal applications based on CPU2 can be physically isolated, thereby The data sec...

Embodiment approach 2

[0057] Such as image 3 As shown, CPU1 realizes the connection and interaction with the external device 102 through the peripheral interface, and realizes the connection with CPU2 through the forwarding interface, and realizes CPU2 and CPU2 by configuring and closing the connection between the forwarding interface and the described peripheral interface. The connection and interaction of the external device 102.

[0058] In the downlink process: the external device 102 transmits all the data to be sent to the CPU1, and if the CPU1 detects the private data, it directly processes the private data and transmits the non-private data to the CPU2.

[0059] In the uplink process: there is a one-to-one correspondence between the peripheral interface on the CPU1, the forwarding interface and the external device 102, and the CPU2 is provided with a transceiver interface that is connected to the forwarding interface on the CPU1 in one-to-one correspondence, then the When the CPU2 needs t...

Embodiment approach 3

[0062] Such as Figure 4 As shown, CPU1 realizes the connection and interaction with the external device 102 through the peripheral interface, and realizes the connection with the CPU2 through the forwarding interface, and establishes a DMA transmission channel by configuring between the forwarding interface and the peripheral interface , realizing the connection and interaction between the CPU2 and the external device 102 .

[0063] Embodiment 3 is similar to Embodiment 2, except that after receiving the connection instruction from CPU2, CPU1 does not adopt "close the path between CPU2 and the specified external device 102", but determines the corresponding interface of the specified transceiver interface. Forwarding the interface and the peripheral interface, and configuring and establishing a DMA transmission channel between the forwarding interface and the peripheral interface.

[0064] The technical solution of the present application can be applied to various applicatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a terminal, which comprises a first processing unit, a second processing unit, a first storage unit and a second storage unit, wherein the first processing unit is used for processing private data in the terminal; the second processing unit is used for processing non-private data in the terminal; the first storage unit is used for storing the private data after being processed by the first processing unit, and moreover, a desktop starter is also stored in the first storage unit; the second storage unit is used for storing the non-private data after being processed by the second processing unit; the call of the desktop starter is realized by the second processing unit through the first processing unit. The invention also provides a display control method of a user interface. By the technical scheme provided by the invention, the private data and the non-private data in the terminal can be physically isolated, and moreover, when a process of simultaneously processing multiple businesses is realized, the equipment management of the terminal is convenient, and the safety of the terminal is promoted.

Description

technical field [0001] The present invention relates to the technical field of data security, in particular to a terminal and a display control method of a user interface. Background technique [0002] In related technologies, most terminals are only equipped with a single processor, and all data is processed by this processor, so the private data in it is easy to be stolen by some third-party applications in the terminal, especially when these applications When the program comes from some hackers or personal information sellers with ulterior motives, it will cause the user information and other private data in the terminal to be in an extremely unsafe state. There are also multiple processors configured in some terminals, but these processors all focus on how to assist in work to obtain better processing effects or faster processing speeds. [0003] Therefore, when multiple processors included in the terminal run different processing tasks, how to meet the requirements of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10G06F21/60G06F21/74
Inventor 刘东海陈澜波
Owner DONGGUAN YULONG COMM TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More