Communication method for mobile terminal, and mobile terminal

A mobile terminal and wireless communication technology, applied in the field of communication, can solve problems such as complex operating system architecture and many security holes, and achieve the effect of improving security and preventing eavesdropping on communication content

Active Publication Date: 2016-12-07
HUAWEI TECH CO LTD
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But today's mobile terminals, with more and more functions, the architecture of its operating system is becoming more and more complex, and there ar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication method for mobile terminal, and mobile terminal
  • Communication method for mobile terminal, and mobile terminal
  • Communication method for mobile terminal, and mobile terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0074] The method for secure communication of a mobile terminal and the mobile terminal provided by the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. In the embodiment of the present invention, the mobile terminal includes, but is not limited to, a mobile phone, a personal computer, a notebook computer, and other terminals that can be used for communication.

[0075] Please refer to figure 1 , i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a security communication method for a mobile terminal, and the mobile terminal, wherein the security communication method can comprise the following steps of: setting a shared memory between a security virtual kernel and a normal virtual kernel and peripheral equipment called by the wireless communication connection to forbid program access of the normal virtual kernel when wireless communication connection between a mobile terminal and another mobile terminal is established and the wireless communication connection satisfies a pre-set security processing triggering condition; performing pre-set strategy processing of a communication content corresponding to wireless communication connection through the security virtual kernel; and outputting the communication content after being subjected pre-set strategy processing by utilizing the security virtual kernel. By means of the embodiment of the invention, an operating system and a program operated in the normal virtual kernel can be prevented from obtaining the communication content before being processed; the operating system can also be prevented from eavesdropping the communication content through the shared memory or related peripherals; and thus, the communication security of the mobile terminal is improved.

Description

technical field [0001] The present invention relates to the communication field, in particular to a mobile terminal security communication method and the mobile terminal. Background technique [0002] With the development of mobile communication technologies, mobile terminals are widely popularized, and mobile terminals have become indispensable items in daily life of users. When users work, shop or entertain through mobile terminals, they will transmit private information, which may be eavesdropped by lawbreakers, resulting in serious consequences such as leakage of user privacy and property damage. Mobile communication security has gradually become a topic of increasing concern to the government, society, and users, and network security and information security issues have even risen to the height of national strategy. [0003] In the prior art, usually before the mobile terminal initiates or answers a call, the process with the recording module is searched and closed to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/02H04M1/70G06F21/62H04N21/4408
CPCH04L63/0428H04W12/033H04W12/086G06F21/53G06F2221/2149H04M1/68H04W12/02H04W12/08H04W48/02
Inventor 利文浩夏虞斌陈海波
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products