Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data processing method and terminal

A data processing and terminal technology, applied in the field of data processing, can solve problems such as user information and property security threats, and achieve the effect of protecting information and property security

Active Publication Date: 2017-06-09
MEIZU TECH CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the traditional security operations such as fingerprint security payment in the terminal are implemented in the trustzone built into the processor (Advanced RISCMachines, ARM). When the system is running, it launches an attack and looks for its security holes. Once the fingerprint password and other information are stolen, the user's information and property security will be threatened.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and terminal
  • Data processing method and terminal
  • Data processing method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Embodiments of the present invention provide a data processing method and a terminal for protecting user information and property security.

[0036] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the examples in the present invention.

[0037] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstance...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a data processing method and a terminal. The data processing method and the terminal are used for protecting information and property safety of a user. The data processing method in the embodiment includes the steps that a terminal detects a preset function command in a credible execution environment TEE, wherein the TEE runs on a coprocessor of the terminal; when the preset function command is detected, and a function module corresponding to the function command is controlled to be started; the coprocessor is controlled to process data collected by the function module to complete the corresponding function. In the embodiment, as the TEE runs on the coprocessor, an operation system (OS) runs on a main processor, the TEE running environment and the OS running environment are subjected to hardware insulation, hackers are difficult to make an attack to the TEE and difficult to seek the security vulnerability in the OS, and the information and the property safety of the user are protected.

Description

technical field [0001] The present invention relates to the field of mobile communication, in particular to a data processing method and terminal. Background technique [0002] As the functions of terminals become stronger and richer, more and more fields are used for terminals. For example, the most widely used terminal payment business and the clients of various shopping websites, these applications need to be linked with personal information and credit card information. Binding, therefore, more and more attention has been paid to terminal security issues. At present, security identification such as fingerprint verification is widely used in terminal unlocking, secure payment, private mode, dual system, etc. [0003] At present, the traditional security operations such as fingerprint security payment in the terminal are implemented in the trustzone built into the processor (Advanced RISCMachines, ARM). When the system is running, attacks are launched and security holes a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/71
CPCG06F21/32G06F21/71G06F2221/2105
Inventor 陈伟
Owner MEIZU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products