Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking

A dual-operating system, operating system technology, applied in the direction of telephone communication, electrical components, branch equipment, etc., can solve problems such as user loss and complex application design.

Inactive Publication Date: 2011-03-30
黄金富
View PDF5 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, smart phones with Internet access capabilities usually have the ability to execute additional applications and provide various functions for user convenience. The operating system and application programs of mobile phones are designed to be very complicated. Ease of use, while making some sacrifices in security to meet the requirements of convenience and ease of use
Because the operating systems and application programs of these mobile phones are designed very complexly, there will be some loopholes more or less, so that hackers can take advantage of these loopholes and use these loopholes to send some viruses or malicious The Trojan horse program invades the operating system of the user's mobile phone
If users use mobile phones infected with viruses or malicious Trojans to access online banking services, hackers may intercept the online banking account information entered by users on their mobile phones, and hackers can use these information to steal users' online banking services. Money in the bank account, causing losses to the user

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking
  • High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking
  • High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The method of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0013] refer to figure 1 and figure 2 , figure 1 It is a schematic explanatory diagram of the main operating system (1) and the secondary operating system (2) of the dual operating system mobile phone of the present invention, figure 2 It is a visual schematic illustration of the dual-operating system mobile phone of the present invention, figure 1 and figure 2 The mobile phone shown in contains at least two mutually independent operating systems, including a main operating system (1) and a secondary operating system (2), and is provided with a switching key (3), wherein the main operating system (1) is mainly used for general mobile phones; the secondary operating system (2) is mainly used for processing some important data with high security level; the switch key (3) is mainly used for selecting the current operating system of the mobil...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a high-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking, which comprises two mutually independent operating systems, namely a main operating system (1) and an auxiliary operating system (2), and a switching key (3), wherein the main operating system (1) is equivalent to a general operating system of a mobile phone and provides various convenient and easy functions; the auxiliary operating system (2) is a limited operating system which can only execute the internal programs of the auxiliary operating system (2) but can not execute other external programs, can avoid invasion of virus or Trojan programs, and can be used for applications with high safety requirements, such as Internet banking service, processing of confidential documents, sending and receiving of e-mails and the like; and the switching key (3) is used for selecting the running operating system, and when the mobile phone responds to the action of the switching key (3), the switching key (3) can immediately suspend the operation of the current operating system, and then switches to the other operating system, and a user can select the main operating system (1) or the auxiliary operating system (2) at any time by the switching key (3).

Description

【Technical field】 [0001] The invention relates to a mobile phone, in particular to a dual operating system mobile phone with high security against hackers for online banking. 【Background technique】 [0002] With the rapid development of modern communication technology, mobile phones have become a common communication tool for life and work. The functions and computing power of mobile phones are getting stronger and stronger, especially smart phones. In addition to voice calls, they can also surf the Internet and execute some built-in or additional applications such as word processing software and game software. Some people even use mobile phones to Go online to use online banking services. At present, smart phones with Internet access capabilities usually have the ability to execute additional applications and provide various functions for user convenience. The operating system and application programs of mobile phones are designed to be very complicated. Ease of use, and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M1/725H04M1/72406
Inventor 黄金富
Owner 黄金富
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products