Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for safe operations of personal information

An information security and operation method technology, applied in the field of personal information security operation methods and devices, can solve problems such as limited storage space, high programming language requirements, troublesome debugging, etc., and achieve safe operation, flexible and convenient debugging, and complete functions Effect

Inactive Publication Date: 2017-03-22
BEIJING ERENEBEN INFORMATION TECH
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the ARM TrustZone technology uses the s bit on the central processing unit (Central Processing Unit, CPU) to manage the security zone and the non-security zone, and the security zone is configured in the ROM (Read-Only Memory, read-only memory) of the CPU. Due to the limited storage space of the ROM of the CPU, limited by the ROM space, the operating system in the security zone is usually a very simplified system with limited functions, and because the security zone is established based on the CPU, it has high requirements for programming languages. The programming in the area uses C language, which is very restrictive, very inconvenient, troublesome to debug, and not suitable for large-scale applications.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for safe operations of personal information
  • Method and device for safe operations of personal information
  • Method and device for safe operations of personal information

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] see figure 1 , the first embodiment of the present invention provides a personal information security operation method, the method includes:

[0046] Step S101, initialize the kernel controller in the Linux kernel, and load multiple virtual operating systems;

[0047] After the mobile terminal is started, it first loads the Linux kernel (Kernel), then initializes a kernel controller (namespace monitor) in the Linux kernel, and then loads multiple virtual operating systems one by one on the Linux kernel. The multiple virtual operating systems mentioned above can be installed in an independent memory, such as the memory of the mobile terminal.

[0048] The system architecture of the mobile terminal in this embodiment is as follows figure 2 As shown, it mainly includes from bottom to top: hardware platform, Linux kernel, and virtual operating systems 1, 2, ..., N, wherein virtual operating systems 1, 2, ..., N are managed by the kernel controller in the Linux kernel An...

no. 2 example

[0059] see image 3 , the second embodiment of the present invention provides a personal information security operation method, the method includes:

[0060] Step S201, establishing multiple virtual operating systems independent of each other on the Linux kernel, defining the virtual operating system of the preset type in the multiple virtual operating systems as the first virtual operating system, and defining other virtual operating systems as The second virtual operating system, the first virtual operating system is the default current operating system, and any application program is run in the first virtual operating system;

[0061] Based on the namespace (Namespace) technology of the Linux kernel, multiple virtual operating systems with different namespaces are established on the Linux kernel, and each virtual operating system can be installed in an independent memory, such as the memory of a mobile terminal. The above multiple virtual operating systems are independent ...

no. 3 example

[0086] see Figure 6 , the third embodiment of the present invention provides a personal information security operation device, which can be applied to a mobile terminal. As the execution subject of the personal information security operation method provided in the above embodiment, it can be a mobile terminal or one of the mobile terminals module. Such as Figure 6 As shown, the device mainly includes: an initialization module 301, a system switching module 302, an information acquisition module 303 and an information return module 304, and the functions realized by each module are as follows:

[0087] The initialization module 301 is used to initialize the kernel controller in the Linux kernel and load multiple virtual operating systems.

[0088] The system switching module 302 is used to switch the current operating system to the second virtual operating system through the kernel controller and suspend the operation when it is detected in the first virtual operating syste...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for safe operations of personal information. The method comprises the steps that a kernel controller is initialized in a Linux kernel, and multiple virtual operation systems are loaded one after another; when a user's triggering of a personal information input operation in an application program is detected in a first virtual operation system, the kernel controller can switch the current operation system to a second virtual operation system and hang up the first virtual operation system; a preset program in the second virtual operation system is called to acquire the personal information input by the user; and the kernel controller switches the current operation system back to the first virtual operation system, and the personal information is transmitted back to the application program. According to the invention, a lightweight class virtualization technology is used; the safe operations of the personal information input can be achieved conveniently; vicious programs in the first virtual operation system can be effectively prevented from sealing the personal information input by the user; and safety of the personal information input operations can be enhanced.

Description

technical field [0001] The invention relates to the technical field of mobile communication, in particular to a personal information security operation method and device. Background technique [0002] With the development of mobile communication technology, mobile terminals such as mobile phones are more and more widely used in people's life. However, with the proliferation of malicious software and Trojan horse viruses, the problems of user information security and privacy protection are becoming increasingly prominent. Users' personal information on mobile terminals is often stolen maliciously, such as private pictures being screenshotted, input passwords being stolen by keyloggers, etc. With the rise of services such as mobile payment, it is necessary to prevent passwords, user bank account numbers and other personal information from being maliciously stolen The problem of theft is even more imminent. [0003] In the prior art, in order to solve the above problems, the A...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06F21/53
CPCG06F21/31G06F21/53
Inventor 陈家楠朱少杰周佳杜国楹
Owner BEIJING ERENEBEN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products