Terminal

A terminal and port technology, applied in the field of data security, can solve the problem of insecurity of private data such as user information, and achieve the effect of improving security

Inactive Publication Date: 2013-11-20
DONGGUAN YULONG COMM TECH +1
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technology described allows for separate processing between different types of data within an electronic device (such as phone) without compromising its privacy or protecting it from unauthorized accesses like hackers.

Problems solved by technology

The technical problem addressed in this patented text relates to preventing unauthorized access on electronic equipment that contains sensitive data stored within its own computer system. This may occur due to attacks against certain software programs running inside the machine itself without permission.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal
  • Terminal
  • Terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0062] Among multiple CPUs for processing private data / non-private data, a certain CPU acts as a “relay” with the external device 102 , while other CPUs realize interaction with the external device 102 through the “relay”.

[0063] Specifically, such as image 3 As shown, it is assumed that a connection is established between CPU1 and the external device 102, and other multiple CPUs for processing private data are connected with CPU1 in a "serial" manner; at the same time, it is assumed that a connection is established between CPU2 and the external device 102, Other multiple CPUs for processing non-private data are connected with CPU2 in a "parallel" manner.

[0064] For the "serial" mode: when CPU1 needs to interact with external device 102, CPU1 directly performs data interaction with external device 102; when CPU1A needs to interact with external device 102, CPU1 performs data forwarding; when CPU1B needs to communicate with external When the device 102 interacts, CPU1A and

Embodiment approach 2

[0070] Among multiple CPUs for processing private data / non-private data, each CPU is "parallel connected" to the external device 102, and directly interacts with the external device 102 without requiring other CPUs as "relays".

[0071] Specifically, such as Figure 4 As shown, CPU1, CPU1A, and CPU1B for processing private data are respectively connected to the external device 102, while CPU2, CPU2A, and CPU2B for processing non-private data are also respectively connected to the external device 102.

[0072] At the same time, the "serial" and / or "parallel" methods mentioned in the above text can be used among multiple CPUs with the same processing function. As a specific example, Figure 4 It shows that: CPU1, CPU1A, CPU1B for processing private data adopts "serial connection" mode, while CPU2, CPU2A, CPU2B for processing non-private data adopts "parallel connection" mode.

[0073] When each CPU is connected to the external device 102, a CPU for one processing function may

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a terminal which comprises first processors, second processors and external devices. The first processors are used for processing private data in the terminal; the second processors are used for processing non-private data in the terminal; the external devices are respectively connected to the first processors and the second processors and interact with the first processors and the second processors; when the external devices interact with the first processors, the second processors set ports, which are connected to the external devices, of the second processors into high resistance states; when the external devices interact with the second processors, the first processors set ports, which are connected to the external devices, of the first processors into high resistance states. According to the technical scheme, the terminal has the advantages that the private data and the non-private data in the terminal can be physically separately processed, so that the private data can be assuredly prevented from being acquired by unsafe application programs, and the safety of the terminal can be effectively improved.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner DONGGUAN YULONG COMM TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products