Unlock instant, AI-driven research and patent intelligence for your innovation.

An information processing method and electronic device

An information processing method and technology of electronic equipment, applied in the field of information security, can solve problems such as unsafe execution of instructions by electronic equipment, and achieve the effect of improving security

Active Publication Date: 2020-01-31
LENOVO (BEIJING) LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present application provides an information processing method and electronic equipment, which are used to solve the technical problem in the prior art that the electronic equipment is easy to execute unsafe execution instructions when the electronic equipment is attacked by a Trojan horse or a virus. The transmission of the execution instructions is monitored through a security module. Achieving the technical effect of improving the safety of electronic equipment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information processing method and electronic device
  • An information processing method and electronic device
  • An information processing method and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The present application provides an information processing method through Embodiment 1, which is applied to an electronic device, and the electronic device includes a security module. Specifically, the electronic device may be a smart phone, a tablet computer, a notebook computer, a smart watch, and the like. The security module is a module inside the electronic device that can run independently, and the module has an independent operating system and can interact with other parts of the electronic device.

[0026] Please refer to figure 1 , the information processing method includes:

[0027] Step 101: Use the security module to obtain the execution instruction transmitted to the application layer via the memory of the electronic device through the first interface, the execution instruction includes identification information for identifying the execution instruction.

[0028] Specifically, the application layer in step 101 can provide communication services for appli...

Embodiment 2

[0060] Corresponding to the information processing method provided in Embodiment 1, Embodiment 2 of the present application provides an electronic device, where the electronic device has a security module. Specifically, the electronic device may be a smart phone, a tablet computer, a notebook computer, a smart watch, and the like. The security module is a module inside the electronic device that can run independently, and the module has an independent operating system and can interact with other parts of the electronic device.

[0061] Please refer to image 3 , the electronic equipment includes:

[0062] The first obtaining unit 10 is configured to use the security module to obtain the execution instruction transmitted to the application layer via the memory of the electronic device through the first interface, and the execution instruction includes identification information for identifying the execution instruction;

[0063] The second acquiring unit 20 is configured to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information processing method and electronic equipment and solves the technical problem that when the electronic equipment is attacked by Trojan or viruses, an unsafe execution instruction is easily executed. The method is applied to the electronic equipment, the electronic equipment comprises a safety module, and the method comprises the steps that an execution instruction which is transmitted to an application layer by an internal storage of the electronic equipment is obtained by the safety module through a first interface, wherein the execution instruction comprises identification information which is used for identifying the execution instruction; the safety module obtains a standard instruction which corresponds to the identification information from the internal storage; the safety module judges whether the execution instruction is consistent with the standard instruction; when the execution instruction is not consistent with the standard instruction, the electronic equipment is stopped from executing the execution instruction.

Description

technical field [0001] The invention relates to the field of information security, in particular to an information processing method and electronic equipment. Background technique [0002] With the continuous development of technology, there are more and more types of electronic devices, and their functions are becoming more and more powerful, so that people can use electronic devices to carry out various activities such as shopping, payment, financial management, social networking, and browsing the web, providing people's production and life with convenience. [0003] However, the inventors of the present application have found that the above-mentioned prior art has at least the following technical problems: [0004] In the prior art, when an electronic device is implanted with a Trojan horse or a virus attack, it is easy to cause the execution instructions generated by the central processing unit to be tampered with or led to a wrong path, causing the electronic device to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 董强
Owner LENOVO (BEIJING) LTD