Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for ensuring system safety and terminal

A system security, terminal technology, applied in the protection of internal/peripheral computer components, instruments, digital data authentication, etc., can solve problems such as inability to ensure system security, user data leakage, etc. Effect

Active Publication Date: 2015-01-21
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The system responsible for basic functions does not interact with the system responsible for external interaction in the same terminal. Such a dual-system terminal cannot ensure the security of the system that is only responsible for basic functions. When there is a program that illegally obtains data in the system that is only responsible for basic functions or files, may result in user data leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for ensuring system safety and terminal
  • Method and device for ensuring system safety and terminal
  • Method and device for ensuring system safety and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to understand the above-mentioned purpose, features and advantages of the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0035] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0036] figure 1 A schematic flowchart of a method for ensuring system security according to an embodiment of the present invention is shown.

[0037] Such as figure 1 As shown, the method for ensu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for ensuring system safety and a terminal. The device for ensuring system safety is used in the terminal which comprises a first system and a second system. The method for ensuring system safety comprises the steps that the first system is used for detecting whether there is a risk at the running environment of the second system or not, and when the first system detects that there is a risk at the running environment of the second system, the first system prompts a user about the risk and / or directly processes the risk. According to the technical scheme, safe and stable running of the second system in the terminal can be ensured, privacy data in the second system can be prevented from being given away or modified, and the safety of the double-system terminal is ensured.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a method for ensuring system security, a device for ensuring system security and a terminal. Background technique [0002] With the development of terminal technology, terminals with dual systems are becoming more and more common. In current dual-system terminals, one system is usually responsible for external interaction, and the other system is responsible for basic functions, such as calling, text messages, and saving contacts. The system responsible for basic functions does not interact with the system responsible for external interaction in the same terminal. Such a dual-system terminal cannot ensure the security of the system that is only responsible for basic functions. When there is a program that illegally obtains data in the system that is only responsible for basic functions or files, it may result in leakage of user data. [0003] Therefore, how to ensure ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/52G06F21/44
CPCG06F21/74G06F2221/2141
Inventor 阳得常
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD