Information terminal with two keypads
A technology of information terminals and keyboards, which is applied in the protection of internal/peripheral computer components, digital data protection, platform integrity maintenance, etc., and can solve the problems that security vulnerabilities cannot be repaired, cannot be verified, and cannot be falsified.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] figure 2 Structure of the current smartphone.
[0027] It is necessary to specify that the current smartphone structure is far more figure 2 The schematic is more complicated, for example, the number of CPUs in the smartphone is not only one of the schematic. But no matter how complex structure smartphone, its CPU is running on the operating system, and the application system is running on the operating system. Independent application systems running over the operating system have their own independent core sensitive data. These core sensitive data, figure 2 At least three leaks on your smartphone:
[0028] Direction 1: Operating system, security vulnerability on the application system.
[0029] Direction 2: Smartphone CPU handles memory residual data for core sensitive data.
[0030] Direction 3: The network application of the restless rules, in theory, can also steal the same figure 2 The core sensitive data of other network applications in smartphones.
[0031] right no...
Embodiment 2
[0044] Figure 4 A schematic diagram of the current Internet-based network-based network terminal structure.
[0045] It is necessary to specifically explain that a variety of mobile network-based network-based network terminals are far more than Figure 4 The structure is more complicated. However, as long as it is a mobile network-based network-based Internet access terminal, it is basically available. Figure 4 Structural expression. Figure 4 Structure of the Internet of Things terminal, compared to figure 2 The structure of smartphones have their security defensive trends more unlikely. There are two reasons:
[0046] Cause 1: Limited product budget, allows the Internet of Things terminals in the design of the technical protection plan, cannot be put into too many resources, and the protective effect is naturally limited. And this limited protective effect over time, the protection effect will become weaker and weak.
[0047] Cause 2: In the vast majority of life cycle of the In...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com