Unlock instant, AI-driven research and patent intelligence for your innovation.

A mobile terminal operating system security operation method

A mobile terminal and safe operation technology, applied in computer security devices, instruments, digital data authentication, etc., can solve security problems and other problems

Active Publication Date: 2016-12-07
杭州优能通信系统有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The highest authority (root) can be burned, or the manufacturer can open it directly, thus causing security problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile terminal operating system security operation method
  • A mobile terminal operating system security operation method
  • A mobile terminal operating system security operation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] The embodiment of the present invention provides a mobile terminal operating system safe operation method, which includes the following steps:

[0044] Lock specific websites for authorized browsing, and prohibit browsing of unauthorized websites;

[0045] Authorize the mobile terminal to establish a USB connection with the authenticated PC, and prohibit the USB connection with the unauthenticated browser;

[0046] Real-time authentication of downloaded and installed software, installation of authorized software, and prohibition of unauthorized websites;

[0047] Perform secure boot programming, which includes the following steps:

[0048] Turn on the mobile terminal to enter the burning mode, and connect the mobile terminal to the PC;

[0049] Detect the USB driver of the mobile terminal, and send an authentication request to the mobile terminal if the connection is successful;

[0050] The mobile terminal decodes the authentication information of the PC, and judges...

Embodiment 2

[0066] This embodiment provides a method for safe booting and programming of a mobile terminal, comprising the following steps:

[0067] Turn on the mobile terminal to enter the burning mode, and connect the mobile terminal to the PC;

[0068] Detect the USB driver of the mobile terminal, and send an authentication request to the mobile terminal if the connection is successful;

[0069] The mobile terminal decodes the authentication information of the PC, and judges whether the authentication information is correct;

[0070] If it is not correct, the PC is illegally programmed, end; if it is correct, send the data receiving permission to the PC;

[0071] The PC receives the data receiving permission and sends burning information to the mobile terminal;

[0072] The mobile terminal receives the burning data and writes it into its storage space until the burning is completed;

[0073] After the burning of the mobile terminal is completed, the completion information is sent to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a secure operation method of a mobile terminal operating system. The method includes the steps of locking a specific website for authorized browsing and forbidding browsing of unauthorized websites; authorizing a mobile terminal to build a USB connection with a certificated PC, and forbidding the USB connection with uncertificated browsers; certificating downloaded and installed software in real time, installing the authorized software, and forbidding the unauthorized websites; executing secure boot burning. According to the method, during the software installation process, the operating system is protected from invasion of illegal software through inspection of an authentication module of the operating system; illegal programs or viruses invading via illegal websites are avoided by locking the browser websites; the operating system is protected from being rooted, by means of security boot, and accordingly the fact that replacement of the existing system by a third-party Rom (system) threatens system security is avoided.

Description

technical field [0001] The invention relates to an operating system of a mobile terminal, in particular to a method for safely running the operating system of a mobile terminal. Background technique [0002] At present, many systems of smart terminals (mobile phones, walkie-talkies, and trunking terminals) use Google's Android system. The source code of the Android system is open, which increases the possibility of terminal intrusion, data theft, or destruction. The current solution is nothing more than installing anti-virus software, but there are still certain risks. [0003] Android applications can be downloaded / installed through various application stores / websites, and unsafe or malicious applications can be easily installed by users. [0004] The highest authority (root) can be burned, or the manufacturer can open it directly, thus causing security problems. [0005] Internet applications (browsers, etc.) can access various websites with security issues, causing Troj...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/44G06F21/51
CPCG06F21/51G06F21/575
Inventor 刘龙姜九旺
Owner 杭州优能通信系统有限公司