Unlock instant, AI-driven research and patent intelligence for your innovation.

System processing method, system processing device and terminal

A processing method and technology of a processing device, which are applied in the fields of electrical digital data processing, computer security devices, digital data authentication, etc., can solve problems such as data leakage, illegal leakage of security system data, etc. are not considered.

Active Publication Date: 2017-04-05
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above-mentioned dual-system switching method of the terminal only realizes the switching of the dual systems, and does not take into account the risk of data leakage in systems with higher security levels when different users use the same terminal, that is to say When different users use the same terminal, they see the same interface. Even if the current system of the terminal is a common system with a lower security level, different users can use the system switching method to switch to the security system, so as to know that the terminal There is a security system in the system, which increases the risk of the security system being illegally deciphered, and the data in the security system may be illegally leaked, thereby reducing the security performance of the terminal, thereby reducing the user experience.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System processing method, system processing device and terminal
  • System processing method, system processing device and terminal
  • System processing method, system processing device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to have a clearer understanding of the above objects, features and advantages of the present invention, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. It should be noted that, in the case of no conflict, the embodiments of the present application and the features in the embodiments can be combined with each other.

[0043] In the following description, many specific details are set forth in order to fully understand the present invention. However, the present invention can also be implemented in other ways different from those described here. Therefore, the protection scope of the present invention is not limited by the specific details disclosed below. EXAMPLE LIMITATIONS.

[0044] figure 1 A schematic flowchart of a system processing method according to an embodiment of the present invention is shown.

[0045] Such as figure 1As shown, the system processing method acco...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention proposes a system processing method, a system processing device, and a terminal, wherein the system processing method includes: judging whether the communication between the terminal and the target wearable device is normal; when the judging result is yes, allowing the use of The system switching method is switched from the current system to the target system to use the target system normally. Otherwise, it is forbidden to use the system switching method to enter the target system or after using the system switching method to enter the target system, the specified application program in the control target system cannot run normally. Through the technical solution of the present invention, the illegal user can be accurately judged, so that the illegal user cannot use the system switching method to enter the target system with a higher security level, or even after the illegal user enters the target system using the system switching method, the target system cannot be used normally , so as to ensure the security of the target system with a higher security level and its internal data.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular, to a system processing method, a system processing device and a terminal. Background technique [0002] At present, terminals in the related art are equipped with dual systems, that is, a common system with a lower security level and a security system with a higher security level, and the switching method of the dual systems is generally by performing specific operations on the terminal (such as inputting password commands, etc.) ) to realize switching between dual systems. [0003] However, the above-mentioned dual-system switching method of the terminal only realizes the switching of the dual systems, and does not take into account the risk of data leakage in systems with higher security levels when different users use the same terminal, that is to say When different users use the same terminal, they see the same interface. Even if the current system of the terminal is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/74G06F21/31
CPCG06F21/74G06F1/163G06F21/34G06F21/35G06F21/40G06F21/6218G06F21/629G06F2221/2111G06F21/554G06F2221/034
Inventor 刘亚鑫
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD