Method and device for safe operations of personal information
An information security and operation method technology, applied in the field of personal information security operation methods and devices, can solve problems such as limited storage space, high programming language requirements, troublesome debugging, etc., and achieve safe operation, flexible and convenient debugging, and complete functions Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0045] see figure 1 , the first embodiment of the present invention provides a personal information security operation method, the method includes:
[0046] Step S101, initialize the kernel controller in the Linux kernel, and load multiple virtual operating systems;
[0047] After the mobile terminal is started, it first loads the Linux kernel (Kernel), then initializes a kernel controller (namespace monitor) in the Linux kernel, and then loads multiple virtual operating systems one by one on the Linux kernel. The multiple virtual operating systems mentioned above can be installed in an independent memory, such as the memory of the mobile terminal.
[0048] The system architecture of the mobile terminal in this embodiment is as follows figure 2 As shown, it mainly includes from bottom to top: hardware platform, Linux kernel, and virtual operating systems 1, 2, ..., N, wherein virtual operating systems 1, 2, ..., N are managed by the kernel controller in the Linux kernel An...
no. 2 example
[0059] see image 3 , the second embodiment of the present invention provides a personal information security operation method, the method includes:
[0060] Step S201, establishing multiple virtual operating systems independent of each other on the Linux kernel, defining the virtual operating system of the preset type in the multiple virtual operating systems as the first virtual operating system, and defining other virtual operating systems as The second virtual operating system, the first virtual operating system is the default current operating system, and any application program is run in the first virtual operating system;
[0061] Based on the namespace (Namespace) technology of the Linux kernel, multiple virtual operating systems with different namespaces are established on the Linux kernel, and each virtual operating system can be installed in an independent memory, such as the memory of a mobile terminal. The above multiple virtual operating systems are independent ...
no. 3 example
[0086] see Figure 6 , the third embodiment of the present invention provides a personal information security operation device, which can be applied to a mobile terminal. As the execution subject of the personal information security operation method provided in the above embodiment, it can be a mobile terminal or one of the mobile terminals module. Such as Figure 6 As shown, the device mainly includes: an initialization module 301, a system switching module 302, an information acquisition module 303 and an information return module 304, and the functions realized by each module are as follows:
[0087] The initialization module 301 is used to initialize the kernel controller in the Linux kernel and load multiple virtual operating systems.
[0088] The system switching module 302 is used to switch the current operating system to the second virtual operating system through the kernel controller and suspend the operation when it is detected in the first virtual operating syste...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com