Information security electronic equipment and application architecture

A technology of information security and electronic equipment, applied in the direction of internal/peripheral computer component protection, platform integrity maintenance, etc., can solve the problems of probabilistic random blocking, bottom, and no legitimacy

Inactive Publication Date: 2016-01-13
深圳金澜汉源科技有限公司 +1
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to get rid of the plight of declining product hardware profits, on the one hand, electronic equipment manufacturers have begun to seek application services that dominate their products, or choose to cooperate with specific application distribution service providers in an attempt to profit from derivative value-added services; on the other hand, Electronic equipment manufacturers have been found to have secretly adopted technical means to implement probabilistic and random blocking of applications distributed by non-cooperative service providers when users download, install or run them, resulting in inexplicable failure of the applications
The problem is that although this kind of private and subtle interference is obviously out of helplessness, it is obviously not justified and unfair to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security electronic equipment and application architecture
  • Information security electronic equipment and application architecture
  • Information security electronic equipment and application architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] One of the embodiments of the present invention is information security computer equipment. To improve an existing desktop computer, modify the design of the motherboard in terms of hardware, and develop supporting applications in terms of software, so as to expand and realize.

[0050] see figure 1 and its description. Basically adopt the original hardware design as the conventional subsystem, i.e. conventional mode (1), including processor (11) and memory (12); non-trusted operating system (13) adopts WindowsXP, still uses disk storage; conventional application (14 ) Existing software such as the Office series can still be used as usual, but the user must be reminded of security risks. To ensure security, new applications need to be developed in conjunction with the new architecture, and its conventional modules run in conventional mode (see the following embodiments). Equally, basically adopt original hardware design as safety subsystem, i.e. safety mode (2), compr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses information security electronic equipment and application architecture, and relates to the technical field of electron, communication, software and information security. Typical equipment, including a computer, a communication terminal and intelligent wearing equipment, comprises a conventional mode and a secure mode, wherein the conventional mode and the secure mode operate in parallel, are independently provided with an independent processor which operates in an independent address space, and share input / output components; an electronic switching mechanism controlled under the secure mode is arranged in the equipment; circuit selection is synchronously implemented on a key signal wire group to control to switch a target input / output component to be in exclusive communication with one of the conventional mode and the secure mode; and the conventional mode and the secure mode are subjected to linkage cooperation, confidentiality synergy and transparent switching. The application architecture comprises a conventional module and a secure module, wherein the conventional module and the secure module are independently installed and operated on the two models to be subjected to the linkage cooperation, a confidentiality synergy frame is constructed, and the electronic switching mechanism is controlled to transparently switch the target input / output component. The embodiment provides secure computer and mobile equipment as well as file, electronic bank and WeChat architecture. Therefore, the sharing and the switching of the equipment architecture can be controlled, the bottleneck of the information security of computers and mobile phones is expected to break through, and equipment suppliers can favorably intervene in derivative value-added services to make profits

Description

technical field [0001] The invention relates to the technical fields of electronics, communication, software and information security. Background technique [0002] With the intelligent and networked development of electronic devices (such as computers, tablet computers, mobile phones, wearable devices, etc.), and the popularization of various applications, information security issues have become increasingly prominent. Due to the open network application of electronic devices, system vulnerabilities, virus codes and spy programs appear and disappear like ghosts, causing frequent incidents of theft and fraud, causing user losses and even endangering national security. On the other hand, due to vicious price competition in the product market, electronic equipment manufacturers generally have low hardware profits, while application service providers continue to make a lot of profits by virtue of derivative value-added services, resulting in unfair industry distribution that ma...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74G06F21/57
CPCG06F21/57G06F21/74
Inventor 杨筑平周跃平其他发明人请求不公开姓名
Owner 深圳金澜汉源科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products