Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Operation method and device for network device software

A technology of network equipment and operating methods, applied in the direction of electrical components, internal/peripheral computer component protection, transmission systems, etc., can solve problems such as low security and difficulty in protecting user privacy, so as to improve security and prevent malicious theft Effect

Inactive Publication Date: 2017-03-29
SHENZHEN TRANZDA TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiments of the present invention provide a method and device for operating network equipment software to solve the problems in the prior art that the security of network equipment software operation is not high, and it is difficult to protect important information such as user privacy.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation method and device for network device software
  • Operation method and device for network device software
  • Operation method and device for network device software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] figure 1 It shows the implementation flow of the network device software operation method provided by Embodiment 1 of the present invention, which is used to realize the operation of the software applicable to the operating system running in the security architecture of the network device, and is described in detail as follows:

[0024] First, explain the network device security architecture:

[0025] In this embodiment, the network device security architecture includes a first hardware architecture for running a first operating system and identifying and running software applicable to the first operating system, for running a second operating system and identifying and running software applicable to The second hardware architecture of the software of the second operating system.

[0026] Wherein, the first hardware architecture and the second hardware architecture respectively include at least one application processor and a storage device connected to the application...

Embodiment 2

[0050] figure 2 The flow of running the software applicable to the first operating system in the embodiment of the present invention is shown, and the details are as follows:

[0051] In step S201, a request message requesting to run software applicable to the first operating system is received.

[0052] Wherein, the request information may be request information sent by a user. For example, the user sends request information to the first operating system to run software suitable for the first operating system through a relevant input device according to the user's needs. The first operating system receives request information requesting to run software suitable for the first operating system. In this embodiment, one or more pieces of software may be selected from the identified software applicable to the first operating system, and then request information is generated according to the selected software. In addition, one or more softwares may be selected from the software...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is applicable to the technical field of a network device and provides an operation method and device for network device software. The method comprises the steps of determining a first identification parameter of software applicable to a first operating system and a second identification parameter of the software applicable to a second operating system; identifying the software applicable to the first operating system according to the first identification parameter and operating the software applicable to the first operating system; and identifying the software applicable to the second operating system according to the second identification parameter and operating the software applicable to the second operating system. According to the method, the software operation security can be improved, and important information such as user privacy can be prevented from being leaked.

Description

technical field [0001] The invention belongs to the technical field of network equipment, and in particular relates to a method and device for running network equipment software. Background technique [0002] In a network device using hardware sandbox technology to build a security architecture, the first hardware architecture and the second hardware architecture constitute two hardware physically isolated operating system operating environments, and the first hardware architecture constitutes a credible high-security computing space ( or hardware sandbox), the second hardware architecture constitutes an open and flexible computing space (or hardware sandbox), which can greatly improve the security of network devices. [0003] However, there is no operation method for the above-mentioned network equipment software in the prior art, and applying the operation method of the network equipment software in the prior art to the above-mentioned network equipment will lead to low se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/74
CPCG06F21/74H04L63/02H04L63/0428
Inventor 李明王晓炜温泉胡旭辉周辉彭春祥
Owner SHENZHEN TRANZDA TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products