Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Implement method and system of trusted path of mobile communication intelligent terminal

A smart terminal and mobile communication technology, applied in the field of mobile communication, can solve problems such as few physical buttons and inability to fully protect user account and password leaks, and achieve the effect of monitoring system status and protecting user information

Active Publication Date: 2014-08-06
XINGTANG TELECOMM TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The technical problem to be solved by the present invention is that the existing credible path implementation methods of mobile communication intelligent terminals cannot fully protect information such as user account numbers and passwords from being leaked. At the same time, the current mainstream mobile communication intelligent terminals all use The touch screen is used for input, and there are few physical buttons. If the SAK method is used to realize the trusted path in the mobile communication intelligent terminal, the user experience is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implement method and system of trusted path of mobile communication intelligent terminal
  • Implement method and system of trusted path of mobile communication intelligent terminal
  • Implement method and system of trusted path of mobile communication intelligent terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] This embodiment discloses a method for realizing a trusted path of a mobile communication intelligent terminal, such as figure 1 As shown, the method includes:

[0039] S1. According to a predetermined allocation strategy, divide the resources of the mobile communication intelligent terminal and allocate the divided resources to the preset trusted program and the intelligent operating system, so as to realize the resource isolation of the mobile communication intelligent terminal; trusted The resources of the program and the intelligent operating system are separated, and the two cannot access each other;

[0040] S2. Obtain the status information of the peripheral device through the preset trusted program and access the peripheral device trustedly, so as to realize the trusted path of the mobile communication intelligent terminal.

[0041] Preferably, the method further includes:

[0042] S3. Authenticate the user password and the smart operating system of the mobile...

Embodiment 2

[0052] This embodiment discloses a method for realizing a trusted path of an intelligent mobile communication terminal, the method including:

[0053] S1. According to a predetermined allocation strategy, divide the display touch screen of the smart terminal into different areas to obtain different areas of the display touch screen and assign the divided different areas of the display touch screen to the preset trusted program and the smart operating system for use, Such as figure 2 shown. The trusted program and the Android smart operating system can only access the specific screen resources assigned by the resource management framework, and receive information input by the user on the corresponding touch screen area. Both the trusted program and the Android smart operating system cannot directly access each other's screen resources, nor can they obtain the user's input information in the other's area.

[0054] S2. Obtain the status information of the peripheral device thr...

Embodiment 3

[0064] This embodiment discloses a system for realizing a trusted path of a mobile communication intelligent terminal, such as Figure 4 As shown, the system includes:

[0065] The resource division and allocation module is used to divide the resources of the mobile communication intelligent terminal according to a predetermined allocation strategy and allocate the divided resources to the preset trusted program and the intelligent operating system for use;

[0066] The authentication and judgment module is used to authenticate the user password and the intelligent operating system of the mobile communication intelligent terminal through a preset trusted program, and judge whether to start the intelligent operating system of the mobile communication intelligent terminal according to the authentication situation;

[0067] The trusted path implementation module is used to obtain the status information of the peripheral device through a preset trusted program and to access the pe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an implement method and system of a trusted path of a mobile communication intelligent terminal. The method includes the steps that S1, according to a predetermined allocation strategy, resources of the mobile communication intelligent terminal are divided, the divided resources are allocated to a preset trusted program and an intelligent operating system for use, and accordingly resource isolation of the mobile communication intelligent terminal can be achieved; S2, peripheral state information is acquired through the preset trusted program, trust access is performed on the peripheral, and thus the trusted path of the mobile communication intelligent terminal can be obtained.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a method and system for realizing a trusted path of a mobile communication intelligent terminal. Background technique [0002] With the development of mobile communication technology, mobile communication intelligent terminals have been greatly popularized. Mobile communication intelligent terminals adopt intelligent operating systems. The use of intelligent operating systems has brought great convenience to mobile communication users. Users can connect to the network at any time to view information, and can install various feature-rich applications. However, the security risks brought along with it have increasingly become the focus of people's attention. When users of mobile communication smart terminals surf the Internet or install malicious applications, they are easily infected with viruses and Trojan horse programs, and user information such as account passwords are eas...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/74
Inventor 王永利高文博夏捷邱毅刘国庆
Owner XINGTANG TELECOMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products