A mobile terminal operating system security operation method
A mobile terminal and safe operation technology, applied in computer security devices, instruments, digital data authentication, etc., can solve security problems and other problems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] The embodiment of the present invention provides a mobile terminal operating system safe operation method, which includes the following steps:
[0044] Lock specific websites for authorized browsing, and prohibit browsing of unauthorized websites;
[0045] Authorize the mobile terminal to establish a USB connection with the authenticated PC, and prohibit the USB connection with the unauthenticated browser;
[0046] Real-time authentication of downloaded and installed software, installation of authorized software, and prohibition of unauthorized websites;
[0047] Perform secure boot programming, which includes the following steps:
[0048] Turn on the mobile terminal to enter the burning mode, and connect the mobile terminal to the PC;
[0049] Detect the USB driver of the mobile terminal, and send an authentication request to the mobile terminal if the connection is successful;
[0050] The mobile terminal decodes the authentication information of the PC, and judges...
Embodiment 2
[0066] This embodiment provides a method for safe booting and programming of a mobile terminal, comprising the following steps:
[0067] Turn on the mobile terminal to enter the burning mode, and connect the mobile terminal to the PC;
[0068] Detect the USB driver of the mobile terminal, and send an authentication request to the mobile terminal if the connection is successful;
[0069] The mobile terminal decodes the authentication information of the PC, and judges whether the authentication information is correct;
[0070] If it is not correct, the PC is illegally programmed, end; if it is correct, send the data receiving permission to the PC;
[0071] The PC receives the data receiving permission and sends burning information to the mobile terminal;
[0072] The mobile terminal receives the burning data and writes it into its storage space until the burning is completed;
[0073] After the burning of the mobile terminal is completed, the completion information is sent to t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 