Data processing method and terminal

A data processing and terminal technology, applied in the field of data security, can solve problems such as system crashes, security risks, technology leakage, etc., and achieve the effect of preventing misoperation and improving security.

Active Publication Date: 2016-06-29
GCI SCI & TECH
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Under the Linux operating system, the developer of the terminal usually has the right to enter the console (based on the bash shell), and also has the management account for the console. During the management process of the management account, some Potential safety hazards, for example: if the user uses some commands incorrectly after entering the console, it may cause the system to work abnormally, or even fatally crash the system, or, if the account is used by a competing manufacturer, enter the console to check the product plan, Plagiarizing the source code in the console will cause technical leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and terminal
  • Data processing method and terminal
  • Data processing method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0142] As a possible implementation manner, the preset login path includes:

[0143] In the source code of the operating system of the terminal, replace the line code ttyS0::respawn:- / bin / sh in the script file / etc / inittab with ttyS0::respawn: / sbin / virtualconsole-LttyS0115200vt100;

[0144] and / or,

[0145] In the / etc / passwd configuration file, replace the line containing the root character with root:x:0:0:root: / root: / sbin / virtualconsole.

[0146] Optionally, the processor 3000 starts the virtual console according to a preset login path, including:

[0147] Follow the preset login path to enter the login interface of the virtual console;

[0148] Obtain the input account number and password on the login interface, and enter the virtual console when the account number and the password are valid.

[0149] Optionally, after the processor 3000 determines whether the operation instruction is a preset instruction, it is further specifically used to:

[0150] If not, an error ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a data processing method. The method comprises the steps of starting a virtual control console according to a preset login path; receiving an input operation instruction from the virtual control console; judging whether the operation instruction is a preset instruction or not; and if yes, performing corresponding operation according to the operation instruction. An embodiment of the invention furthermore provides a terminal. Through the embodiments of the invention, the virtual control console can be started, so that a control console is prevented from being directly operated; the virtual control console can perform the corresponding operation only according to the preset instruction, so that the misoperation can be prevented; and therefore, the security of the control console of the terminal can be effectively improved.

Description

technical field [0001] The invention relates to the technical field of data security, in particular to a data processing method and a terminal. Background technique [0002] With the rapid development of information technology, terminals (such as mobile phones, tablet computers, etc.) have more and more powerful functions. Therefore, for terminal manufacturers, the kernel system in the terminal operating system is particularly important, and usually , the kernel system is mainly an operating system based on the embedded structure of Linux. Under the Linux operating system, the developer of the terminal usually has the right to enter the console (based on the bash shell), and also has the management account for the console. During the management process of the management account, some Potential safety hazards, for example: if the user uses some commands incorrectly after entering the console, it may cause the system to work abnormally, or even fatally crash the system, or, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/0487
CPCG06F3/0487
Inventor 郑仲文
Owner GCI SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products