Information terminal with two keypads

A technology of information terminals and keyboards, which is applied in the protection of internal/peripheral computer components, digital data protection, platform integrity maintenance, etc., and can solve the problems that security vulnerabilities cannot be repaired, cannot be verified, and cannot be falsified.

Active Publication Date: 2021-07-06
网安鑫测(福州)科技有限公司
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

2) As the functions of operating systems and application systems become more and more powerful, the total number of these naturally existing security vulnerabilities is not decreasing but increasing
3) Studies have shown that among the security vulnerabilities that have been discovered, about one-third of the security vulnerabilities cannot be repaired
There is also one of the most terrible rumors in the rivers and lakes that cannot be both confirmed and unfalsifiable, the "security backdoor" on the operating system and application system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information terminal with two keypads
  • Information terminal with two keypads
  • Information terminal with two keypads

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 2 Structure of the current smartphone.

[0027] It is necessary to specify that the current smartphone structure is far more figure 2 The schematic is more complicated, for example, the number of CPUs in the smartphone is not only one of the schematic. But no matter how complex structure smartphone, its CPU is running on the operating system, and the application system is running on the operating system. Independent application systems running over the operating system have their own independent core sensitive data. These core sensitive data, figure 2 At least three leaks on your smartphone:

[0028] Direction 1: Operating system, security vulnerability on the application system.

[0029] Direction 2: Smartphone CPU handles memory residual data for core sensitive data.

[0030] Direction 3: The network application of the restless rules, in theory, can also steal the same figure 2 The core sensitive data of other network applications in smartphones.

[0031] right no...

Embodiment 2

[0044] Figure 4 A schematic diagram of the current Internet-based network-based network terminal structure.

[0045] It is necessary to specifically explain that a variety of mobile network-based network-based network terminals are far more than Figure 4 The structure is more complicated. However, as long as it is a mobile network-based network-based Internet access terminal, it is basically available. Figure 4 Structural expression. Figure 4 Structure of the Internet of Things terminal, compared to figure 2 The structure of smartphones have their security defensive trends more unlikely. There are two reasons:

[0046] Cause 1: Limited product budget, allows the Internet of Things terminals in the design of the technical protection plan, cannot be put into too many resources, and the protective effect is naturally limited. And this limited protective effect over time, the protection effect will become weaker and weak.

[0047] Cause 2: In the vast majority of life cycle of the In...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a brand-new information terminal architecture. This architecture is suitable for all information terminals with networking functions and with the CPU running under the operating system as the main component for processing data / information. The information terminal is equipped with a SIM card with two data buses, two keyboards and two CPUs. The two CPUs are respectively connected with the two data buses of the SIM card, and manage the two keyboards respectively. When the SIM card processes the data input by the main / sub CPU to the SIM card, the confirmation data input from the sub / main keyboard is required for confirmation. The processed data can be output from the main / sub data bus in its entirety, or part of the data can be separately output from the main / sub data bus. The advantage of this architecture is that any virus that only invades the main / secondary CPU cannot obtain all the data of the SIM card with input / output dual-data bus, thus effectively avoiding the use of the natural security loopholes in the operating system and application system. The terminal initiates stealing / remote control attacks.

Description

Technical field [0001] The present invention relates to an information terminal having two keyboards. Background technique [0002] Computers, mobile phones, televisions, set-top boxes, refrigerators, water heaters, circuit switches, etc. Evalvation, terminals, terminals, terminals, in the non-Internet era, basically no technical intersection. But with the advent of the Internet, computer technology, network technology has developed and advanced, making them have more and more identical technical features. For example, for more efficient, convenient management, achieve their primary business features, which also have networking capabilities, and remote control can be implemented, which are given automatic or semi-automatic processing information / data. To achieve the above features, depending on a CPU that can implement the Internet function and run in the operating system environment. The rapid development of the Internet of Things technology, in turn, has made more various dev...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/60G06F21/83G06F21/77
CPCG06F21/57G06F21/77G06F21/83G06F21/60
Inventor 黄策
Owner 网安鑫测(福州)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products