An information processing method and electronic device
An information processing method and technology of electronic equipment, applied in the field of information security, can solve problems such as unsafe execution of instructions by electronic equipment, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0025] The present application provides an information processing method through Embodiment 1, which is applied to an electronic device, and the electronic device includes a security module. Specifically, the electronic device may be a smart phone, a tablet computer, a notebook computer, a smart watch, and the like. The security module is a module inside the electronic device that can run independently, and the module has an independent operating system and can interact with other parts of the electronic device.
[0026] Please refer to figure 1 , the information processing method includes:
[0027] Step 101: Use the security module to obtain the execution instruction transmitted to the application layer via the memory of the electronic device through the first interface, the execution instruction includes identification information for identifying the execution instruction.
[0028] Specifically, the application layer in step 101 can provide communication services for appli...
Embodiment 2
[0060] Corresponding to the information processing method provided in Embodiment 1, Embodiment 2 of the present application provides an electronic device, where the electronic device has a security module. Specifically, the electronic device may be a smart phone, a tablet computer, a notebook computer, a smart watch, and the like. The security module is a module inside the electronic device that can run independently, and the module has an independent operating system and can interact with other parts of the electronic device.
[0061] Please refer to image 3 , the electronic equipment includes:
[0062] The first obtaining unit 10 is configured to use the security module to obtain the execution instruction transmitted to the application layer via the memory of the electronic device through the first interface, and the execution instruction includes identification information for identifying the execution instruction;
[0063] The second acquiring unit 20 is configured to c...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


