High-grade privacy smart phone and method for protecting private information thereof

A smart phone, privacy technology, applied in telephone communication, wireless communication, security devices, etc., can solve the problems of easy theft of private information and easy intrusion of the system, so as to prevent intrusion and residue, and prevent private information from being stolen Access, high confidentiality effect

Inactive Publication Date: 2013-12-18
叶鼎
View PDF5 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is to provide a high-level privacy protection system that prevents the system where the private information is located from being invaded and the private information is stolen, aiming at the defects that the operating system of the smart phone is easily invaded and the private information is easily stolen. The protection method of smart phone and its private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-grade privacy smart phone and method for protecting private information thereof
  • High-grade privacy smart phone and method for protecting private information thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] A high-level privacy smart phone includes: a baseband processor, a first application processor, a second application processor, a display controller, and a display component,

[0038] A radio frequency processor, data memory RAM 0, program memory FLASH 0 and an interface circuit are connected to the baseband processor;

[0039] The first application processor is connected to the baseband processor, a first data memory RAM 1 and a first program memory FLASH 1 are connected to the first application processor, and a first operating system is set in the first application processor;

[0040] The second application processor is connected to the baseband processor, a second data memory RAM 2 and a second program memory FLASH 2 are connected to the second application processor, and a second operating system is set in the second application processor,

[0041] The display controller is connected to a baseband processor, a first application processor, and a second application processor, r...

Embodiment 2

[0044] A high-level privacy smart phone includes: a baseband processor, a first application processor, and a second application processor,

[0045] A radio frequency processor, data memory RAM 0, program memory FLASH 0 and an interface circuit are connected to the baseband processor;

[0046] The first application processor is connected to the baseband processor, the first data memory RAM 1 and the first program memory FLASH 1 are connected to the first application processor, the first operating system is set in the first application processor, and A first color display controller is connected to the first application processor, and a first color display component is connected to the display controller. The color display component is responsible for multimedia application display tasks of the first operating system and with better visual performance requirements. ;

[0047] The second application processor is connected to the baseband processor, a second data memory RAM 2 and a seco...

Embodiment 3

[0050] A method for protecting private information of a smart phone, the smart phone comprising:

[0051] Baseband processor, first application processor, second application processor and display controller, display component,

[0052] A radio frequency processor, data memory RAM 0, program memory FLASH 0 and an interface circuit are connected to the baseband processor;

[0053] The first application processor is connected to the baseband processor, a first data memory RAM 1 and a first program memory FLASH 1 are connected to the first application processor, and a first operating system is set in the first application processor;

[0054] The second application processor is connected to the baseband processor, a second data memory RAM 2 and a second program memory FLASH 2 are connected to the second application processor, and a second operating system is set in the second application processor,

[0055] The display controller is connected to a baseband processor, a first application proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed are a high-grade privacy smart phone and a method for protecting private information of the high-grade privacy smart phone. The smart phone is composed of a radio frequency processor, a base-band processor, a first application processor, a second application processor, a display controller, a display module and the like. Wireless communication operation is carried out on the base-band processor. A first operating system in the first application processor is mainly used for processing multimedia application and the like with low privacy requirements. A second operating system in the second application processor is mainly used for processing personal issues with high privacy requirements. The first operating system and the second operating system are isolated from each other and form subsystems. Meanwhile, through hardware setting, third-party software can not be installed on the second operating system after the second operating system leaves a factory, or even, firmware upgrade can not be carried out, and therefore the second operating system becomes a closed system. According to the protection method, the first application processor and the second application processor which are independent of each other are used for processing the private personal issues and the multimedia application respectively.

Description

technical field [0001] The invention relates to the technical field of mobile communication and information security of mobile terminals, and more specifically, relates to a high-level privacy smart phone and a method for protecting its private information. Background technique [0002] With the continuous advancement of digital mobile technology, smart phones are becoming more and more popular and have more and more profound impacts on all aspects of people's lives and work. In addition to the functions of calling and sending and receiving text messages of mobile phones, smart phones also have the management of personal address book, memo, notepad and e-mail, as well as many functions such as network access based on wireless data communication, film and television entertainment multimedia applications, GPS, etc. , becoming a powerful, comprehensive, and easy-to-use handheld terminal device. [0003] An important feature of smart phones is to have an open operating system. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M1/725H04W12/00H04W12/37
Inventor 叶鼎
Owner 叶鼎
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products