Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety intelligent terminal equipment and information processing method

A smart terminal device and terminal device technology, applied in the field of data processing, can solve problems such as difficult user information interception, user information security cannot be guaranteed, and achieve the effect of improving information security

Inactive Publication Date: 2014-11-12
WATCHDATA SYST
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the operating system of the mobile phone itself is an open environment, such as the Android system, it is generally difficult to resist the interception of user information by malicious software.
Therefore, the user's payment account number and password will be intercepted by malicious software, so that the user's information security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety intelligent terminal equipment and information processing method
  • Safety intelligent terminal equipment and information processing method
  • Safety intelligent terminal equipment and information processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0037] refer to figure 1 , figure 1 A schematic structural diagram of a secure intelligent terminal device provided in this embodiment, wherein the terminal device is installed with a first operating system for processing sensitive logic, and the terminal device includes a secure storage module 101 and a secure processing Module 102.

[0038] In this embodiment, the secure smart terminal device may be a smart phone, a tablet computer, or the like. The sensitive logic in the application is the processing logic related to the security of user information, such as the input of passwords and passwords, and the confirmation of information such as transfer accounts and amounts.

[0039] The secure intelligent terminal device provided by this embodiment is equipped with a first operating system, and the first operating system is a secure operating system, i.e. Secure OS, which is different from the operating system usually installed on terminal devices, such as open source systems ...

Embodiment 2

[0053] refer to figure 2 , figure 2 This is the flow chart of the information processing method provided in this embodiment. The method can be applied to the secure smart terminal device provided in Embodiment 1. The terminal device is installed with a first operating system, and the first operating system is used to process sensitive logic, the terminal device includes a secure storage module and a secure processing module. The secure smart terminal device may be a smart phone, a tablet computer, and the like. The method can include:

[0054] S201: The secure storage module stores sensitive logic of the first operating system and application programs.

[0055] Sensitive logic in the application includes processing logic related to user information security. After the terminal device installs the application program, the sensitive logic in the application program is stored in the security storage module of the terminal device. In addition, after the first operating syst...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses safety intelligent terminal equipment and an information processing method. The terminal equipment comprises a first operating system, wherein the first operating system is used for processing a sensitive logic. The terminal equipment comprises a safety storage module and a safety processing module, wherein the safety storage module is used for storing sensitive logics of the first operating system and an application program; and the safety processing module is used for switching a current operating system to the first operating system when any sensitive logic in the safety storage module is called, and processing the sensitive logic in the first operating system. According the safety intelligent terminal equipment, the first operating system has a function of protecting the safety of user information to prevent the user information from being invaded by malicious software and the like. Thus, by using the terminal equipment provided by the invention, the safety of the user information can be improved.

Description

technical field [0001] The invention relates to the technical field of data processing, and in particular to a safe intelligent terminal device and an information processing method. Background technique [0002] With the improvement of computer technology and the growth of user demands, more and more kinds of application programs emerge as the times require. In an environment where malware such as Trojan horses are flooding smart terminal devices, how to effectively prevent malware from interfering with the normal operation of applications has attracted more and more attention. Especially for applications related to information security, it is imperative to prevent the interference of malicious software. [0003] Taking the 12306 mobile phone client application as an example, since the payment link of this application involves the user's information security, the invasion of malicious software should be avoided. In fact, the payment link of the application is completed by ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/74
CPCG06F21/74G06F21/78G06F21/6245H04L63/1441G06Q20/382H04L63/1408H04L63/1433
Inventor 叶新张天奇
Owner WATCHDATA SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products