Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information terminal with two keyboards

A technology of information terminals and keyboards, which is applied in the protection of internal/peripheral computer components, digital data protection, platform integrity maintenance, etc., and can solve problems that cannot be verified, cannot be falsified, and security holes cannot be repaired.

Active Publication Date: 2021-04-16
网安鑫测(福州)科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) As the functions of operating systems and application systems become more and more powerful, the total number of these naturally existing security vulnerabilities is not decreasing but increasing
3) Studies have shown that among the security vulnerabilities that have been discovered, about one-third of the security vulnerabilities cannot be repaired
There is also one of the most terrible rumors in the rivers and lakes that cannot be both confirmed and unfalsifiable, the "security backdoor" on the operating system and application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information terminal with two keyboards
  • Information terminal with two keyboards
  • Information terminal with two keyboards

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 2 It is a schematic diagram of the current smart phone structure.

[0027] It should be noted that the current smart phone structure is far more than figure 2 The schematic diagram of is much more complicated. For example, the number of CPUs in smartphones is more than just one in the schematic diagram. But no matter how complicated the structure of the smart phone is, its CPU runs on the operating system, and the application system runs on the operating system. Each independent application system running on the operating system has its own independent core sensitive data. These core sensitive data, in figure 2 There are at least three leak directions on smartphones of

[0028] Direction 1: Security vulnerabilities in operating systems and application systems.

[0029] Direction 2: Smartphone CPU processes memory residual data of core sensitive data.

[0030] Direction 3: Unruly web applications, theoretically speaking, can also steal the installation of...

Embodiment 2

[0044] Figure 4 It is a schematic diagram of the current mobile network-based IoT terminal structure.

[0045] It should be noted that in reality, some of the various IoT terminals based on mobile networks are far more Figure 4 The structure in is much more complex. But as long as it is an IoT terminal based on the mobile network developed based on the operating system, it can basically be used Figure 4 structural expression. Figure 4 structure of the IoT terminal, compared to figure 2 The security defense situation of smart phones with different structures is even more pessimistic. There are two reasons:

[0046] Reason 1: The limited product budget makes it impossible for IoT terminals to invest too much resources in the design of technical protection solutions, and the protection effect is naturally limited. And this limited protective effect will become weaker and weaker as time goes by.

[0047] Reason 2: Most of the IoT terminals are unaccompanied during the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a brand-new information terminal architecture. The architecture is suitable for all information terminals which have a networking function and take CPUs running under an operating system as main components for processing data / information. The information terminal is provided with an SIM card with two data buses, two keyboards and two CPUs. And the two CPUs are respectively connected with two data buses of the SIM card and respectively manage the two keyboards. And when the SIM card processes the data of the SIM card input by the main / auxiliary CPU, confirmation data input from the auxiliary / main keyboard needs to be confirmed. The processed data can be completely output from the main / auxiliary data bus, and part of the data can be respectively output from the main / auxiliary data bus. The architecture has the advantages that any virus invading the main / auxiliary CPU cannot obtain all the data of the input / output dual-data bus SIM card, so that stealing / remote control attacks to an information terminal by utilizing natural security holes in an operating system and an application system are effectively avoided.

Description

technical field [0001] The invention relates to an information terminal with two keyboards. Background technique [0002] Computers, mobile phones, TV sets, set-top boxes, refrigerators, water heaters, circuit switches, and other devices and terminals with different functions and use scenarios basically have no technical intersection in the non-Internet era. However, with the advent of the Internet age, the rapid development and progress of computer technology and network technology have made them have more and more of the same technical characteristics. For example, in order to achieve more efficient and convenient management and realize their main business functions, these devices will also have networking functions, can realize remote control, and are endowed with the ability to automatically or semi-automatically process information / data. To achieve the above functions, at least one CPU that can realize the Internet access function and run in the operating system enviro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/60G06F21/83G06F21/77
CPCG06F21/57G06F21/77G06F21/83G06F21/60
Inventor 黄策
Owner 网安鑫测(福州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products