Method and device for safely calling key function

A key function and safe call technology, applied in the computer field, can solve problems such as high system risk, and achieve the effect of solving high system risk and realizing security

Inactive Publication Date: 2014-08-06
BEIJING HUAWEI DIGITAL TECH
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The embodiment of the present invention provides a method and device for safely calling key functions to overcome the problem of relatively high system risk in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safely calling key function
  • Method and device for safely calling key function
  • Method and device for safely calling key function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] figure 1 It is a flow chart of Embodiment 1 of the key function safe calling method of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0036] Step 101 , when calling a key function, perform an unlock verification on the process calling the key function, and if the verification is passed, gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and device for safely calling a key function. The method for safely calling the key function comprises the steps of performing unlocking check on the process of calling the key function when the key function is called, and if the check passes, generating a generating widget required by running; when the key function calls the function inside the key function, and the generating widget is detected, skipping the unlocking check; when calling of the key function is finished, locking the process, and destroying the generating widget. According to the method and device, the safety of the system is improved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method and device for securely invoking key functions. Background technique [0002] The operating system (Operating System, referred to as OS) is a computer program that manages and controls computer hardware and software resources. It is the most basic system software that runs directly on the "bare metal". Any other software must be supported by the operating system to run. . The operating system is the interface between the user and the computer, as well as the computer hardware and other software. The functions of the operating system include managing the hardware, software and data resources of the computer system, controlling the operation of the program, improving the man-machine interface, providing support for other application software, etc., so that all resources of the computer system can play their roles to the maximum and provide ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44G06F21/54
Inventor 周冲李佳玲
Owner BEIJING HUAWEI DIGITAL TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products