CN101335628A - Portable wireless network terminal operating method based on USB KEY - Google Patents
Portable wireless network terminal operating method based on USB KEY Download PDFInfo
- Publication number
- CN101335628A CN101335628A CNA2008100658129A CN200810065812A CN101335628A CN 101335628 A CN101335628 A CN 101335628A CN A2008100658129 A CNA2008100658129 A CN A2008100658129A CN 200810065812 A CN200810065812 A CN 200810065812A CN 101335628 A CN101335628 A CN 101335628A
- Authority
- CN
- China
- Prior art keywords
- network terminal
- usbkey
- wireless
- user
- carry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an operation method of a portable wireless network terminal based on a USBKEY. The method of the invention (U5 standard) divides the USBKEY into four subareas of a bootstrap program area, an encrypted read-only area, an intelligent access area and a free access area. The invention also comprises a wireless communication subsystem that is connected with the internet by the wireless networks of Wi-Fi, Wimax AP or TD-SCDMA; the wireless communication system is used for carrying out data interaction between a PC and an application server; after a USBKEY memory is inserted into the PC, the PC operation system runs a bootstrap program in the USBKEY. The bootstrap program can complete the following steps according to the demand of a user 1. a wireless network is accessed automatically; 2. a network system checks and encrypts a user cipher in the read-only area and identifies the legal identity of the cipher; 3. a user can call an application program in a network server based on a browser according to need; 4. network storage is realized; 5. the content in a storing area can be updated automatically and intelligently according to user settings; 6. the streaming broadcast of audio and video in an intelligent network terminal is completed by a Flash Lite component; 7. the anti-virus software in the intelligent network terminal can provide all-round protection, thereby effectively withstanding virus infection and malicious software coming from a network or a computer; 8. PC screen desktop background can be automatically changed; 9. the USBKEY can realize the encryption of folders.
Description
[technical field]
The present invention relates to a kind of portable wireless network terminal operating method based on the USBKEY memory
[background technology]
Most of operating system that we see all is directly to drive hardware, and this just gives illusion of people, and all operating system all is to drive hardware.When win31 released, though memory management is arranged, management of process (the win system does not have the thread notion that kind) had graphical interfaces, still is suspected to be it is not operating system by the hostage.Reason is that the file system of win31 is that dos supports that boot is dos, and in other words, win31 can not run directly on the hardware.This is a kind of misunderstanding, the modern big multi-segment of operating system, and in order to transplant the structuring with system, in general operating system all can be divided into the hardware relevant layers, the hardware independent layer.The hardware relevant layers generally is exactly that io handles and do driver management.And memory management, management of process, graphical interfaces or the like generally all is that the hardware independent layer is handled.
Concerning cpu, the memory address that one section common memory address and hardware port shine upon does not out have any difference.This is because from computational logic, and any function realizes with hardware and realizes not having any difference with software.Just because of this, we could install a linux above the VMWare on the machine of a win operating system, otherwise perhaps.Operating system is exactly the running environment of application program, just the layer between hardware and software.Early stage operating system is such as dos, and such as those special-purpose large-scale computer operating systems before the unix or the like, all this is tightr with the combination of hardware for they, is difficult to separately, and the function beyond the hardware that provides also seldom.Yet unix itself designs in order to solve transplanting between the number of different types large-scale computer, has just followed hardware separation from conceptive.Windows is also very similar, and winnt4.0 can be used for the x86 chip, and the machine that also can be used for the alpha chip is exactly because this reason.
You can find that all you want that the thing of doing can do in the browser the inside along with the development of technology.XAML/XUL, these two kinds of technology all are to explain the application of the Application Program Interface that XML describes with browser technology.
[summary of the invention]
The present invention the invention provides a kind of portable wireless network terminal operating method based on the USBKEY memory in order to overcome above-mentioned the deficiencies in the prior art.Based on GNU/LINUX, adopt exclusive technology kernel based on USBKEY portable wireless network terminal system.Will there be three kinds of versions in this system: embedded, mobile edition, and commercial version.This operating system is based on the remote operating system conceptual design, its kernel and directing assembly will solidify in chip or USB KEY in, and all application programs will be from secure download on the server that related service is provided.The environment of its operation is follow-on mainboard, a kind of special clustered node formula computer based on the calculation services server.And USB device will make the user start computer from USB KEY.And for the third, i.e. To enterprises level user, will be in computer built-in minimized operating system, have only file manager, electrical form, text editor, and, browser and MSN etc. fully based on the email client of web.
The technical solution adopted for the present invention to solve the technical problems is: the carry-on wireless intelligent network terminal operating method based on the USBKEY memory is provided, and this method is provided with the USBKEY memory boot district, encrypts read-only region, intellectual access district, four subregions of free access.It also comprises a wireless telecommunications subsystem, and this Wimax AP or TD-SCDMA wireless network form metropolitan area network and link to each other with the Internet, and wireless telecommunication system is used for handling PC and application server carries out data interaction.It is characterized in that: after the USBKEY memory inserts PC, the boot in the PC operating system USBKEY memory, access of radio network automatically; The read-only region user cipher is encrypted in the network system audit, confirms can call based on the application program in the webserver of browser according to user's needs after user's legal identity; PC desktop screen background capable of automatic changing; The USBKEY memory can be realized the encryption to file; But upgrade the content of access section according to user's setting automated intelligent.
The scheme that the present invention solves further technical problem is: after the USBKEY memory inserts PC, and the boot in the PC operating system USBKEY memory, access of radio network automatically.
The scheme that the present invention solves further technical problem is: it also comprises a wireless telecommunications subsystem, this Wimax AP or TD-SCDMA wireless network form metropolitan area network and link to each other with the Internet, and wireless telecommunication system can be used to handle PC and application server carries out data interaction.
The scheme that the present invention solves further technical problem is: the intelligent network terminal is encrypted the read-only region user cipher by the network system audit, confirms user's legal identity.
The scheme that the present invention solves further technical problem is: the intelligent network terminal can be called based on the application program in the webserver of browser according to user's needs.
The scheme that the present invention solves further technical problem is: the intelligent network terminal can be carried out data interaction with application server system, realizes the network storage.
The scheme that the present invention solves further technical problem is: the video of intelligent network terminal, the broadcast of audio frequency are finished streaming by a Flash Lite assembly and are play.
The scheme that the present invention solves further technical problem is: the anti-virus software of intelligent network terminal can provide omnibearing protection, and effectively antagonism comes the virus infections and the Malware of automatic network or computer.
The scheme that the present invention solves further technical problem is: change PC desktop screen background automatically.
The scheme that the present invention solves further technical problem is: the USBKEY memory can be realized the encryption to file.
[description of drawings]
Fig. 1 is the system architecture schematic diagram that the invention provides a kind of carry-on wireless intelligent network terminal system based on the USBKEY memory.
[embodiment]
Below in conjunction with drawings and Examples the carry-on wireless intelligent network terminal system based on the USBKEY memory of the present invention is described further.
Distributed operating system is the change of legacy operating system thought especially, and distributed operating system is mounted in whole compartment system the inside, wherein any local operation system that oneself also can be installed.In fact use very generally for a long time at the field B/S of enterprise, you can find that all you want that the thing of doing can do in the browser the inside along with the development of technology.If you be concerned about Microsoft new technology you can find that Microsoft had not had IE after once saying, because whole OS is exactly an IE.XAML/XUL, these two kinds of technology all are to explain the application of the Application Program Interface that XML describes with browser technology.Below accompanying drawing is done and is briefly introduced:
1,1 indicate the server zone that calculation services is provided for the U5 computer among Fig. 1, server is distributed in the IDC in any zone by the Internet.All services manage and dispatch by central task management plan of the present invention (CTDPM-Central Tasks Deploy and Planning Management).
2,2 indicate all application server cluster and adopt fire compartment wall and the Internet to isolate the safety of all application servers of assurance among Fig. 1.
3,3 what indicate is to have bigger bandwidth and the safer the Internet based on WiMax and metropolitan area network among Fig. 1.
4,4 wireless communication modules that are depicted as the U5 computer among Fig. 1.
5,5 be depicted as the U5 computer among Fig. 1, computer system is based on the remote operating system conceptual design, its kernel and directing assembly will solidify in chip or USB KEY in, and all application programs will be from secure download on the server that related service is provided.The environment of its operation is follow-on mainboard, a kind of special clustered node formula computer based on the calculation services server.And USB device will make the user start this computer from USB KEY.
6,6 be the carry-on wireless intelligent network terminal based on the USBKEY memory of the present invention among Fig. 1.
Claims (10)
1, a kind of carry-on wireless intelligent network terminal operating method based on the USBKEY memory, this method is provided with the USBKEY memory boot district, encrypts read-only region, intellectual access district, four subregions of free access.It also comprises a wireless telecommunications subsystem, and this WimaxAP or TD-SCDMA wireless network form metropolitan area network and link to each other with the Internet, and wireless telecommunication system is used for handling PC and application server carries out data interaction.It is characterized in that: after the USBKEY memory inserts PC, the boot in the PC operating system USBKEY memory, access of radio network automatically; The read-only region user cipher is encrypted in the network system audit, confirms can call based on the application program in the webserver of browser according to user's needs after user's legal identity; PC desktop screen background capable of automatic changing; The USBKEY memory can be realized the encryption to file; But upgrade the content of access section according to user's setting automated intelligent.
2, carry-on intelligent wireless network terminal according to claim 1 is characterized in that: after the USBKEY memory inserts PC, and the boot in the PC operating system USBKEY memory, access of radio network automatically.
3, carry-on intelligent wireless network terminal according to claim 1 is characterized in that:
It also comprises a wireless telecommunications subsystem, and this Wimax AP or TD-SCDMA wireless network form metropolitan area network and link to each other with the Internet, and wireless telecommunication system can be used to handle PC and application server carries out data interaction.
4, carry-on wireless intelligent network terminal according to claim 1 is characterized in that:
The intelligent network terminal is encrypted the read-only region user cipher by the network system audit, confirms user's legal identity.
5, carry-on wireless intelligent network terminal according to claim 1 is characterized in that:
The intelligent network terminal can be called based on the application program in the webserver of browser according to user's needs.
6, carry-on wireless intelligent network terminal according to claim 1, it is characterized in that: the intelligent network terminal can be carried out data interaction with application server system, realizes the network storage.
7, carry-on wireless intelligent network terminal according to claim 1 is characterized in that: the video of intelligent network terminal, the broadcast of audio frequency are finished streaming by a Flash Lite assembly and are play.
8, carry-on wireless intelligent network terminal according to claim 1, it is characterized in that: the anti-virus software of intelligent network terminal can provide omnibearing protection, and effectively antagonism comes the virus infections and the Malware of automatic network or computer.
9, carry-on wireless intelligent network terminal according to claim 1 is characterized in that: change PC desktop screen background automatically.
10, carry-on wireless intelligent network terminal according to claim 1, it is characterized in that: the USBKEY memory can be realized the encryption to file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100658129A CN101335628A (en) | 2008-03-12 | 2008-03-12 | Portable wireless network terminal operating method based on USB KEY |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2008100658129A CN101335628A (en) | 2008-03-12 | 2008-03-12 | Portable wireless network terminal operating method based on USB KEY |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101335628A true CN101335628A (en) | 2008-12-31 |
Family
ID=40197965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2008100658129A Pending CN101335628A (en) | 2008-03-12 | 2008-03-12 | Portable wireless network terminal operating method based on USB KEY |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101335628A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101968838A (en) * | 2010-09-29 | 2011-02-09 | 北京握奇数据系统有限公司 | Browser and method for configuring safe browser |
CN102291391A (en) * | 2011-07-21 | 2011-12-21 | 西安百盛信息技术有限公司 | Safe transmission method for data in cloud service platform |
CN102572835A (en) * | 2010-12-28 | 2012-07-11 | 国民技术股份有限公司 | Method and device for automatic access of wireless local area network |
CN101645908B (en) * | 2009-08-31 | 2013-10-09 | 华为终端有限公司 | Method and terminal for managing data transmission service |
CN103916404A (en) * | 2014-04-23 | 2014-07-09 | 北京淦蓝润和信息技术有限公司 | Data management method and system |
WO2014183516A1 (en) * | 2013-11-18 | 2014-11-20 | 中兴通讯股份有限公司 | Application program loading method and device, terminal and storage medium |
CN104601455A (en) * | 2015-03-04 | 2015-05-06 | 北京深思数盾科技有限公司 | Information interaction method and system for instant messaging software |
-
2008
- 2008-03-12 CN CNA2008100658129A patent/CN101335628A/en active Pending
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101645908B (en) * | 2009-08-31 | 2013-10-09 | 华为终端有限公司 | Method and terminal for managing data transmission service |
CN101968838A (en) * | 2010-09-29 | 2011-02-09 | 北京握奇数据系统有限公司 | Browser and method for configuring safe browser |
CN102572835A (en) * | 2010-12-28 | 2012-07-11 | 国民技术股份有限公司 | Method and device for automatic access of wireless local area network |
CN102572835B (en) * | 2010-12-28 | 2015-09-16 | 国民技术股份有限公司 | A kind of automatic cut-in method of WLAN (wireless local area network) and device |
CN102291391A (en) * | 2011-07-21 | 2011-12-21 | 西安百盛信息技术有限公司 | Safe transmission method for data in cloud service platform |
WO2014183516A1 (en) * | 2013-11-18 | 2014-11-20 | 中兴通讯股份有限公司 | Application program loading method and device, terminal and storage medium |
CN103916404A (en) * | 2014-04-23 | 2014-07-09 | 北京淦蓝润和信息技术有限公司 | Data management method and system |
CN104601455A (en) * | 2015-03-04 | 2015-05-06 | 北京深思数盾科技有限公司 | Information interaction method and system for instant messaging software |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11822954B2 (en) | Methods and systems for automating deployment of applications in a multi-tenant database environment | |
US9116735B2 (en) | Offline provisioning of virtual machines | |
CN101335628A (en) | Portable wireless network terminal operating method based on USB KEY | |
CN104375869B (en) | Self-starting application control method and device | |
US20070245334A1 (en) | Methods, media and systems for maintaining execution of a software process | |
KR20080082623A (en) | Metadata driven deployment of applications | |
CN103677935A (en) | Installation and control method, system and device for application programs | |
US10489145B2 (en) | Secure update of firmware and software | |
JP2003099410A (en) | Multiple device management method and system | |
US20190230124A1 (en) | Blended honeypot | |
CN102929716A (en) | Method for starting multiple processes | |
US20110258620A1 (en) | Method and Apparatus for Making a BPM Application Available to Multiple Tenants | |
CN106708573B (en) | System and method for Hadoop cluster automatic installation | |
US20070208873A1 (en) | Mechanism for enabling a network address to be shared by multiple labeled containers | |
CN107908957B (en) | Safe operation management method and system of intelligent terminal | |
KR100706176B1 (en) | Method and system of processing kernel patch for prevention of kernel vulnerability | |
WO2022147478A1 (en) | Application aware software asset inventory | |
US10466991B1 (en) | Computing instance software package installation | |
US11431795B2 (en) | Method, apparatus and storage medium for resource configuration | |
CN113821220A (en) | Installation method and device of linux operating system | |
US20100122173A1 (en) | Trusted relationships in multiple organization support in a networked system | |
US20200364076A1 (en) | Agentless Personal Network Firewall in Virtualized Datacenters | |
US10521114B2 (en) | Adding or removing a storage provider in unified storage manager | |
Umar et al. | A Comparative Study of Modern Operating Systems in terms of Memory and Security: A Case Study of Windows, iOS, and Android | |
WO2011040922A1 (en) | File management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20081231 |