Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security processing method and device based on dual-system switching

A data security and processing method technology, applied in the direction of electrical digital data processing, computer security devices, transmission systems, etc., can solve the problems of inconvenient switching between dual systems, unable to automatically identify user privacy data, etc., and achieve the effect of reducing costs

Active Publication Date: 2015-03-25
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of the present invention is to provide a data security processing method based on dual-system switching, which aims to solve the technical problems of inconvenient dual-system switching and inability to automatically identify user privacy data in existing communication smart terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security processing method and device based on dual-system switching
  • Data security processing method and device based on dual-system switching
  • Data security processing method and device based on dual-system switching

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0034] The invention proposes a data security processing method based on dual system switching.

[0035] refer to figure 1 , figure 1 It is a schematic flow diagram of an embodiment of the data security processing method based on dual-system switching in the present invention; figure 1 As shown, the data security processing method based on dual system switching in this embodiment includes the following steps:

[0036] Step S10, under the first operating system, monitor the operation event to be executed by the terminal;

[0037] The terminal is an intelligent mobile communication terminal, such as a smart phone, and the terminal is provided with a dual system, and the dual system includes a first operating system not configured with a preset security policy and a second operating system configured with a preset sec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security processing method based on dual-system switching. The method comprises the steps of monitoring an operation event to be executed on a terminal under a first operation system, judging whether preset security attribute information exists in the operation event, and switching the first operation system to a second operation system and executing the operation event under the second operation system when the security attribute information exists in the operation event. The invention further discloses a data security processing device based on dual-system switching. By the adoption of the data security processing method and device based on dual-system switching, automatic dual-system switching is achieved, the privacy data of a user can be identified quickly and protected by automatically switching to the second operation system, and leakage of the privacy data of the user is prevented.

Description

technical field [0001] The invention relates to the field of mobile communication terminals, in particular to a data security processing method and device based on dual-system switching. Background technique [0002] With the rapid development of mobile communication terminals, the disclosure of privacy has become an urgent problem to be solved, especially the data leakage in communication tools such as mobile phones has become commonplace, which has brought great troubles to users. At present, smart terminals such as mobile phones have launched a common operating system for handling daily operations and a secure operating system for handling security operations, but the switch between the two systems requires the user to initiate the switch operation actively, and adopts The way of the hardware switch increases the cost of the dual system. Moreover, this passive switching method relies on the user's subjective judgment and operation, and the operability is relatively compl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/168G06F21/53G06F21/552G06F21/74G06F21/6245G06F21/602
Inventor 王高峰孙亮
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products