CN106488454A - A kind of method of connection external equipment, device and mobile terminal - Google Patents

A kind of method of connection external equipment, device and mobile terminal Download PDF

Info

Publication number
CN106488454A
CN106488454A CN201510536598.0A CN201510536598A CN106488454A CN 106488454 A CN106488454 A CN 106488454A CN 201510536598 A CN201510536598 A CN 201510536598A CN 106488454 A CN106488454 A CN 106488454A
Authority
CN
China
Prior art keywords
external equipment
space
unique identifier
user
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510536598.0A
Other languages
Chinese (zh)
Other versions
CN106488454B (en
Inventor
刘亚鑫
叶瑞权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510536598.0A priority Critical patent/CN106488454B/en
Priority to PCT/CN2015/093535 priority patent/WO2017035943A1/en
Publication of CN106488454A publication Critical patent/CN106488454A/en
Application granted granted Critical
Publication of CN106488454B publication Critical patent/CN106488454B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of method of connection external equipment, device and mobile terminal, wherein, the method includes:When the connection request of external equipment is received, distribute an independent user's space by multiple domain space technology;In the case of the connection request of external equipment is received, external equipment is connected to independent user's space, so that the security of external equipment is detected in independent user's space.The present invention is when the connection request of external equipment is received, distribute an independent user's space by multiple domain space technology, when external equipment is accessed, it is linked in above-mentioned independent user's space, to detect the security of external equipment, now, even there is safety problem in external equipment, connected due to which is independent user's space, and the normal user's space of nonterminal, therefore, the data in terminal will not be destroyed or steal, the security of system is improved, solves problem of the prior art.

Description

A kind of method of connection external equipment, device and mobile terminal
Technical field
The present invention relates to field of mobile communication, more particularly to a kind of method of connection external equipment, device and Mobile terminal.
Background technology
For current intelligent terminal, can all connect external equipment, such as bluetooth earphone, intelligent hand The equipment such as table.However, the mode of the external equipment of intelligent terminal connection at present is all directly in current user state Lower connection, and external equipment is directly enabled, the security again to external equipment is verified afterwards.
As prior art is that external equipment is first coupled to intelligent terminal and then detect security again, outward The equipment of connecing is directly connected to the normal user's space of intelligent terminal and conducts interviews, if external equipment has safety Problem, then the data when the equipment that detects is problematic in intelligent terminal may be destroyed or steal, user Experience is relatively low.
Content of the invention
The invention provides a kind of method of connection external equipment, device and mobile terminal, existing at least to solve It is that external equipment is first coupled to intelligent terminal and then again security is detected to have technology, if external equipment There is safety problem, then the data when the equipment that detects is problematic in intelligent terminal may be destroyed or steal Take, the relatively low problem of Consumer's Experience.
On the one hand, the present invention provides a kind of method of connection external equipment, including:Receiving external equipment Connection request when, by multiple domain space technology distribute an independent user's space;Described external in acceptance In the case of the connection request of equipment, the external equipment is connected to the independent user's space, with The security of the detection external equipment in the independent user's space.
Further, after the connection request for receiving external equipment, also include:Judge the external equipment Whether there is unique identifier, wherein, the unique identifier is the terminal in the external equipment first Generate during the secondary access terminal;In the case of there is no the unique identifier, during according to current detection Between generate the corresponding unique identifier of external equipment, with by the unique identifier will described outward Connect equipment and access the independent user's space;In the case of with the unique identifier, according to described Unique identifier determines whether to access the independent user's space.
Further, determine whether that accessing the independent user's space includes according to the unique identifier:Root Judge this time connection with the last time difference for accessing the terminal whether default according to the unique identifier In time range;In the case that the time difference is in the preset time range, by the external equipment It is connected to the normal user's space of terminal;In the case that the time difference is not in the preset time range, The external equipment is connected to the independent user's space.
Further, after detecting the security of the external equipment in the independent user's space, also wrap Include:In the case that the security of the external equipment meets preset standard, the external equipment is connected to The normal user's space of terminal, to realize normal access;Do not meet in the security of the external equipment default In the case of standard, the connection with the peripheral apparatus is disconnected.
Further, disconnect with after the connection of the peripheral apparatus, also include:Record the peripheral apparatus Unique identifier, with when the external equipment asks to access the terminal again, according to the unique identification The access operation of the code shielding external equipment.
On the other hand, present invention also offers a kind of connection external equipment device, including:Distribute module, For when the connection request of external equipment is received, distributing an independent user by multiple domain space technology Space;Link block, in the case of the connection request of the external equipment is received, will be described external Equipment is connected to the independent user's space, to detect described external set in the independent user's space Standby security.
Further, described device also includes:Judge module, for judging whether the external equipment has only One identification code, wherein, the unique identifier is that access is described for the first time in the external equipment for the terminal Generate during terminal;Generation module, in the case of not having the unique identifier, according to current inspection The corresponding unique identifier of the external equipment of survey time generation one, to pass through the unique identifier by institute State external equipment and access the independent user's space;AM access module, for the unique identifier In the case of, determine whether to access the independent user's space according to the unique identifier.
Further, the AM access module includes:Judging unit, for judging this according to the unique identifier Whether secondary connection is with the last time difference for accessing the terminal in preset time range;Access unit, uses In the case of in the time difference in the preset time range, the external equipment is connected to terminal Normal user's space;In the case that the time difference is not in the preset time range, will be described outer The equipment of connecing is connected to the independent user's space.
Further, the AM access module, is additionally operable to meet preset standard in the security of the external equipment In the case of, the external equipment is connected to the normal user's space of terminal, to realize normal access;Institute State external equipment security do not meet preset standard in the case of, disconnect and the connection of the peripheral apparatus.
Further, described device also includes:Logging modle, for disconnecting the connection with the peripheral apparatus Afterwards, the unique identifier of the peripheral apparatus is recorded, to ask access described again in the external equipment During terminal, the access operation of the external equipment is shielded according to the unique identifier.
Another aspect, present invention also offers a kind of mobile terminal, including:Company any one of above-mentioned Connect the device of external equipment.
The present invention distributes an independence when the connection request of external equipment is received by multiple domain space technology User's space, access external equipment when, be linked in above-mentioned independent user's space, with detection The security of external equipment, now, even external equipment has safety problem, connected due to which is only Vertical user's space, and the normal user's space of nonterminal, therefore, the data in terminal will not be destroyed or Person steals, and improves the security of system, and it is that external equipment is first coupled to intelligent terminal to solve prior art Then again security is detected, if external equipment has safety problem, asks in the equipment of detecting Data during topic in intelligent terminal may be destroyed or steal, the relatively low problem of Consumer's Experience.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are for ability Domain those of ordinary skill will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred embodiment, and simultaneously It is not considered as limitation of the present invention.And in whole accompanying drawing, it is denoted by the same reference numerals identical Part.In the accompanying drawings:
Fig. 1 is the flow chart of the method for connecting external equipment in the embodiment of the present invention;
Fig. 2 is the first structural representation for the device for connecting external equipment in the embodiment of the present invention;
Fig. 3 is second structural representation of the device for connecting external equipment in the embodiment of the present invention;
Fig. 4 is the structural representation of the device AM access module for connecting external equipment in the embodiment of the present invention;
Fig. 5 is the third structural representation for the device for connecting external equipment in the embodiment of the present invention;
Fig. 6 is each functional module attachment structure schematic diagram of smart mobile phone in the preferred embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although show in accompanying drawing The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and should be by Embodiments set forth here is limited.Conversely, provide these embodiments to be able to be best understood from this Open, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
It is that external equipment is first coupled to intelligent terminal and then examine security again to solve prior art Survey, the data if external equipment has safety problem, when the equipment that detects is problematic in intelligent terminal May be destroyed or steal, the relatively low problem of Consumer's Experience, the invention provides a kind of connection external equipment Method, device and mobile terminal, below in conjunction with accompanying drawing and embodiment, the present invention is carried out further in detail Describe in detail bright.It should be appreciated that specific embodiment described herein is not limited only in order to explain the present invention The present invention.
The embodiment of the present invention provides a kind of method of connection external equipment, the flow process of the method as shown in figure 1, Including step S102 to S104:
S102, when the connection request of external equipment is received, distributes an independence by multiple domain space technology User's space;
S104, in the case of the connection request of external equipment is received, external equipment is connected to independent use Family space, to detect the security of external equipment in independent user's space.
The embodiment of the present invention distributes one when the connection request of external equipment is received by multiple domain space technology Individual independent user's space, when external equipment is accessed, is linked in above-mentioned independent user's space, To detect the security of external equipment, now, even external equipment has safety problem, due to its connection Be independent user's space, and the normal user's space of nonterminal, therefore, data in terminal will not be by Destroy or steal, the security of system is improved, it is that external equipment is first coupled to intelligence to solve prior art Then energy terminal detects to security again, if external equipment has safety problem, sets detecting Data when having problem in intelligent terminal may be destroyed or steal, the relatively low problem of Consumer's Experience.
After the connection request for receiving external equipment, can also be determined whether by unique identifier can So that external equipment is quickly accessed, that is, judge whether external equipment has unique identifier.Wherein, Wei Yishi Other code is generated in external equipment first time access terminal for terminal.
In the case that external equipment does not have unique identifier, one is generated according to current sensing time and external set Standby corresponding unique identifier, after generating the unique identifier, when the next external equipment still wants to access the end During end, it is possible to be confirmed whether to quickly access by the identification code.Certainly, in the process, first In the case of generating unique identifier, it is to need external equipment to be accessed independent user's space to carry out safety Property checking.
In the case that external equipment has unique identifier, determine whether to access independently according to unique identifier User's space, specifically include:According to unique identifier judge this time connection and last access terminal when Between differ from whether in preset time range;If the time difference in preset time range, illustrates to disconnect with terminal The time of connection is shorter, there is no potential safety hazard, again external equipment can be connected directly to terminal normal User's space;If the time difference not in preset time range, illustrates the time disconnected with terminal relatively Long, it is understood that there may be potential safety hazard, accordingly, it would be desirable to external equipment is connected to independent user's space be pacified Full property detection.
After detecting the security of external equipment in independent user's space, if the security of external equipment Meet preset standard, then external equipment is connected to the normal user's space of terminal, to realize normal access; If the security of external equipment does not meet preset standard, illustrate there is potential safety hazard, disconnect and setting with peripheral hardware Standby connection.
After the connection with peripheral apparatus is disconnected, in order to avoid being carried out when the external equipment sends request again The processes such as safety detection, can first record the unique identifier of peripheral apparatus, again please in external equipment When access terminal is sought, the access operation of external equipment is shielded according to unique identifier.
The embodiment of the present invention also provides a kind of device of connection external equipment, structural representation such as Fig. 2 of the device Shown, including:Distribute module 10, for when the connection request of external equipment is received, empty by multiple domain Between technology distribute an independent user's space;Link block 20, is coupled with distribute module 10, for In the case of receiving the connection request of external equipment, external equipment is connected to independent user's space, with The security of detection external equipment in independent user's space.
Fig. 3 shows another structural representation of said apparatus, and said apparatus can also include:Judge mould Block 30, is coupled with distribute module 10, for judging whether external equipment has unique identifier, wherein, Unique identifier is generated in external equipment first time access terminal for terminal;Generation module 40, with judgement Module 30 is coupled, for, in the case of without unique identifier, generating one according to current sensing time The corresponding unique identifier of external equipment, empty external equipment is accessed independent user by unique identifier Between;AM access module 50, is coupled with judge module 30, in the case of with unique identifier, root Determine whether to access independent user's space according to unique identifier.
In the above-described embodiments, when judge module 30 is coupled with distribute module 10, it is to will determine that module 30 There is interactive relation with distribute module 10, be not relationship between superior and subordinate as depicted, that is, work as distribution When module 10 receives the connection request of external equipment, turn to judge module 30 and carry out unique identity code, Determine whether distribute module 10 distributes one further according to the implementing result such as generation module 40 and AM access module 50 Independent user's space.
The structural representation of above-mentioned AM access module 50 can be as shown in figure 4, which includes:Judging unit 501, uses According to the time difference of unique identifier judgement this time connection and last access terminal whether in Preset Time In the range of;Access unit 502, is coupled with judging unit 501, in the time difference in preset time range In the case of interior, external equipment is connected to the normal user's space of terminal;In the time difference not in Preset Time In the range of in the case of, external equipment is connected to independent user's space.
When realizing, AM access module 50 is additionally operable to meet the situation of preset standard in the security of external equipment Under, external equipment is connected to the normal user's space of terminal, to realize normal access;In external equipment In the case that security does not meet preset standard, the connection with peripheral apparatus is disconnected.Based on AM access module 50 The function, Fig. 5 again shows a kind of structural representation of said apparatus, on the basis of Fig. 3, the dress Putting to include:Logging modle 60, is coupled with AM access module 50, for disconnecting and peripheral apparatus After connection, the unique identifier of peripheral apparatus is recorded, with when external equipment asks access terminal again, The access operation of external equipment is shielded according to unique identifier.
The embodiment of the present invention also provides a kind of mobile terminal, and which includes the device of above-mentioned connection external equipment. Those skilled in the art according to above-mentioned record, know how by integrally disposed for said apparatus in the terminal, Here is omitted.It should be noted that said apparatus or mobile terminal are operationally, its internal each mould Block is all to need interaction when its function is realized, and is not complete independently.
Preferred embodiment
A kind of smart mobile phone is embodiments provided, which is internally provided with connection external equipment (also referred to as Peripheral hardware) device, its can need high security in some users connect external equipment scene under (as hand The safe space of machine), a kind of external equipment method of attachment based on multi-domain technique is provided, is accessed for detecting External equipment, improve mobile phone connect external equipment security.
The each functional module attachment structure of embodiment of the present invention smart mobile phone illustrate as shown in fig. 6, including:Peripheral hardware Judge module, user's space management module, peripheral hardware connection processing module and peripheral hardware detection module, in Fig. 6 also Refer to be derived the process of each module work.Below, in conjunction with each module in Fig. 6, illustrate that smart mobile phone works Process.
When mobile phone will connect external equipment, after driving detects external equipment, peripheral hardware judge module is preferential Judge whether the external equipment for connecting is that First Contact Connections mobile phone/(distance is last for Connection Time last time time-out Connection Time whether exceed preset value, if it exceeds need to detect again).If it is, produce accordingly sentencing Disconnected result, and to user's space management module and peripheral hardware connection processing module transmission.
User's space management module generates a new user's space temporarily according to the judged result for receiving, The space is to minimize, and is only used for detecting the security of connection external equipment.Processed by peripheral hardware connection afterwards Mobile phone peripheral hardware is connected to this interim new space for generating by module.And the characteristic due to multiple domain space technology, The peripheral hardware of now mobile phone connection is only capable of accessing/operating the data of this temporary space, so as on the mobile phone that ensures Secure user data.
In temporary space, peripheral hardware detection module is detected to the external equipment that mobile phone connects, and combination is worked as The front time generates unique identifier of the mobile phone to the external equipment, and the identification code is used for connecting again later The external equipment and Connection Time last time is recognized when connecing.When realizing, if generated before, herein no longer Generate.
Testing result be shown as the external equipment dangerous when, then given by peripheral hardware judge module feedback result Peripheral hardware connects processing module, makes the connection of its closing hand phone and the external equipment, while identification code is fed back to Peripheral hardware judge module.
Testing result be shown as the external equipment safe when, then by peripheral hardware judge module feedback result to outer If connection processing module, its connection by mobile phone with the external equipment is made to go to normal users, normal to access User's space, while identification code is fed back to peripheral hardware judge module.
It should be noted that in the present embodiment, although the title of each functional module is different, but each function mould The general function of block is identical with each functional module summation of the device for connecting external equipment in above-described embodiment.
Embodiment of the present invention method of operating is simple and efficient, participates in without the need for user;Safety can effectively have been prevented The external equipment of hidden danger conducts interviews to data in mobile phone and operates, and improves the security performance of system.
Obviously, those skilled in the art can carry out various changes and modification without deviating from this to the present invention Bright spirit and scope.So, if the present invention these modification and modification belong to the claims in the present invention and Within the scope of its equivalent technologies, then the present invention is also intended to comprising these changes and modification.

Claims (11)

1. a kind of connection external equipment method, it is characterised in that include:
When the connection request of external equipment is received, distribute an independent user by multiple domain space technology Space;
In the case of the connection request of the external equipment is received, the external equipment is connected to described only Vertical user's space, to detect the security of the external equipment in the independent user's space.
2. the method for claim 1, it is characterised in that please in the connection for receiving external equipment After asking, also include:
Judge whether the external equipment has unique identifier, wherein, the unique identifier exists for terminal The external equipment is accessed for the first time and to be generated during the terminal;
In the case of not having the unique identifier, one is generated according to current sensing time and described external set Standby corresponding unique identifier, described independent to be accessed the external equipment by the unique identifier User's space;
In the case of with the unique identifier, according to the unique identifier determines whether access Independent user's space.
3. method as claimed in claim 2, it is characterised in that being determined according to the unique identifier is No access the independent user's space and include:
Judge whether are this time connection and the last time difference for accessing the terminal according to the unique identifier In preset time range;
In the case that the time difference is in the preset time range, the external equipment is connected to end Hold normal user's space;
In the case that the time difference is not in the preset time range, the external equipment is connected to The independent user's space.
4. method as claimed any one in claims 1 to 3, it is characterised in that described independent In user's space after the security of the detection external equipment, also include:
In the case that the security of the external equipment meets preset standard, the external equipment is connected to The normal user's space of terminal, to realize normal access;
In the case that the security of the external equipment does not meet preset standard, disconnect and the peripheral apparatus Connection.
5. method as claimed in claim 4, it is characterised in that disconnect the connection with the peripheral apparatus Afterwards, also include:
The unique identifier of the peripheral apparatus is recorded, to ask again to access the end in the external equipment During end, the access operation of the external equipment is shielded according to the unique identifier.
6. a kind of connection external equipment device, it is characterised in that include:
Distribute module, for when the connection request of external equipment is received, being distributed by multiple domain space technology One independent user's space;
Link block, in the case of the connection request of the external equipment is received, external sets described For the independent user's space is connected to, to detect the external equipment in the independent user's space Security.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Judge module, for judging whether the external equipment has unique identifier, wherein, described unique Identification code is that terminal is generated when the external equipment accesses the terminal for the first time;
Generation module, for, in the case of not having the unique identifier, generating according to current sensing time The corresponding unique identifier of one external equipment, with by the unique identifier by the external equipment Access the independent user's space;
AM access module, in the case of with the unique identifier, true according to the unique identifier The independent user's space whether is accessed determine.
8. device as claimed in claim 7, it is characterised in that the AM access module includes:
According to the unique identifier, judging unit, for judging that this time connection accesses the terminal with last Time difference whether in preset time range;
Access unit, in the case of in the time difference in the preset time range, will be described outer The equipment of connecing is connected to the normal user's space of terminal;In the time difference not in the preset time range In the case of, the external equipment is connected to the independent user's space.
9. the device as any one of claim 6 to 8, it is characterised in that
The AM access module, is additionally operable in the case that the security of the external equipment meets preset standard, The external equipment is connected to the normal user's space of terminal, to realize normal access;External set described In the case that standby security does not meet preset standard, the connection with the peripheral apparatus is disconnected.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Logging modle, for, after the connection with the peripheral apparatus is disconnected, recording the peripheral apparatus Unique identifier, with when the external equipment asks to access the terminal again, according to the unique identification The access operation of the code shielding external equipment.
11. a kind of mobile terminals, it is characterised in that include:Any one of claim 6 to 10 Connection external equipment device.
CN201510536598.0A 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal Expired - Fee Related CN106488454B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510536598.0A CN106488454B (en) 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal
PCT/CN2015/093535 WO2017035943A1 (en) 2015-08-28 2015-10-31 Method and apparatus for connecting external device, and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510536598.0A CN106488454B (en) 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal

Publications (2)

Publication Number Publication Date
CN106488454A true CN106488454A (en) 2017-03-08
CN106488454B CN106488454B (en) 2020-03-17

Family

ID=58186680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510536598.0A Expired - Fee Related CN106488454B (en) 2015-08-28 2015-08-28 Method and device for connecting external equipment and mobile terminal

Country Status (2)

Country Link
CN (1) CN106488454B (en)
WO (1) WO2017035943A1 (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN102098475A (en) * 2009-12-11 2011-06-15 鸿富锦精密工业(深圳)有限公司 Electronic equipment, and method for acquiring connecting relationship between interfaces and external equipment
CN102172095A (en) * 2011-04-26 2011-08-31 华为终端有限公司 Method for connecting bluetooth devices and bluetooth device
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
US8458800B1 (en) * 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
CN103198263A (en) * 2012-10-26 2013-07-10 马国强 Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100570592C (en) * 2008-10-29 2009-12-16 清华大学 A kind of soft computer and implementation method
US20110161452A1 (en) * 2009-12-24 2011-06-30 Rajesh Poornachandran Collaborative malware detection and prevention on mobile devices
WO2015094189A1 (en) * 2013-12-17 2015-06-25 Intel Corporation Detection of unauthorized memory modification and access using transactional memory

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197667A (en) * 2007-12-26 2008-06-11 北京飞天诚信科技有限公司 Dynamic password authentication method
CN102098475A (en) * 2009-12-11 2011-06-15 鸿富锦精密工业(深圳)有限公司 Electronic equipment, and method for acquiring connecting relationship between interfaces and external equipment
US8458800B1 (en) * 2010-10-01 2013-06-04 Viasat, Inc. Secure smartphone
CN102172095A (en) * 2011-04-26 2011-08-31 华为终端有限公司 Method for connecting bluetooth devices and bluetooth device
CN102663283A (en) * 2012-03-20 2012-09-12 浪潮电子信息产业股份有限公司 Method for dynamically isolating computer system
CN103198263A (en) * 2012-10-26 2013-07-10 马国强 Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key

Also Published As

Publication number Publication date
WO2017035943A1 (en) 2017-03-09
CN106488454B (en) 2020-03-17

Similar Documents

Publication Publication Date Title
US10171997B2 (en) Method and apparatus for interconnection between terminal device and gateway device
JP6391700B2 (en) Method for processing impedance abnormality of power adapter, terminal and charging circuit
US20190340348A1 (en) Security verification method and device
CN100495377C (en) Method for inspecting type of connected peripheral apparatus and terminal interface
CN104601799A (en) Data transmission method and mobile terminal
CN104978300B (en) Mobile terminal and its detection method being connect with external equipment and device
CN104318170B (en) A kind of method and device based on multi-mobile-terminal protection data safety
CN107404740B (en) Method for switching network, device and the terminal device of safety
CN106488394A (en) A kind of method and device of equipment connection
CN105827405A (en) Remotely-controlled safety lock device and remote control method thereof
CN104980420A (en) Business processing method, device, terminal and server
CN104462934B (en) A kind of information processing method and electronic equipment
CN101119383A (en) Method and apparatus of establishing iSCSI conversation for objective terminal and initiating terminal
CN106169955B (en) The safety certifying method and system of distribution network terminal wireless maintenance
CN102724140B (en) Instant messaging good friend's addition means and device
CN107612571A (en) Terminal and its control circuit of multipurpose Kato, prevent SIM card from burning the method for card
CN106488454A (en) A kind of method of connection external equipment, device and mobile terminal
CN105022951A (en) Information processing method and electronic equipment
CN107145456B (en) Method, device and system for identifying self-connection of equipment
CN106411917B (en) A kind of method and relevant device of file transmission detection
CN113365257B (en) Master-slave earphone switching method and device, earphone and readable storage medium
CN103812870A (en) Information processing method and electronic equipment
CN104618326B (en) A kind of information processing method and electronic equipment
CN105450843A (en) Method and device of arranging operation mode of mobile terminal
CN105187377B (en) Data processing method and device, and data access method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200317

Termination date: 20210828