Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for realizing private space

A private and space technology, applied in the computer field, can solve problems such as low security, easy to be hooked, and inability to use applications, so as to achieve the effect of process isolation and security assurance

Inactive Publication Date: 2019-09-20
CHONGQING IQIYI INTELLIGENT TECHNOLOGY CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above-mentioned solutions of the prior art have the following defects: 1) only verify when each entry of the application is opened, the security is extremely low, and it is easy to be hooked; 2) the private data of the application cannot be isolated, so that the data security is low; 3 ) You can enter the application only when you know the password, otherwise you cannot use the application; 4) After the password is cracked, the data of the application is completely exposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for realizing private space
  • Method and device for realizing private space
  • Method and device for realizing private space

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Before discussing the exemplary embodiments in more detail, it should be mentioned that some exemplary embodiments are described as processes or methods depicted as flowcharts. Although the flowcharts describe operations as sequential processing, many of the operations may be performed in parallel, concurrently, or simultaneously. In addition, the order of operations can be rearranged. The process may be terminated when its operations are complete, but may also have additional steps not included in the figure. The processing may correspond to a method, function, procedure, subroutine, subroutine, or the like.

[0025] The "computer device" referred to in this context refers to an intelligent electronic device that can perform predetermined processing procedures such as numerical calculations and / or logic calculations by running predetermined programs or instructions, which may include a processor and a memory, which are executed by the processor. The pre-stored progra...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for realizing a private space, and the method comprises the following steps: entering the private space according to a preset starting operation when detecting that a user executes the preset starting operation; unloading / sdcard equipment, and after unloading is successful, newly establishing or determining a storage equipment node corresponding to the private space; and mounting the storage device node to / sdcard. According to the scheme provided by the invention, the data (namely private data) generated in the private space can be completely isolated from the data (namely common data) generated in the common mode, so that the security of the private data is ensured.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a technology for realizing a private space. Background technique [0002] In the prior art, a computer device monitors the scene of starting an application, and usually before or after the application is opened, an interface for entering a password pops up, and the application can only be entered after the password is entered. [0003] The above-mentioned solutions of the prior art have the following defects: 1) only verify when each entry of the application is opened, the security is extremely low, and it is easy to be hooked; 2) the private data of the application cannot be isolated, so that the data security is low; 3 ) The application can only be entered when the password is known, otherwise the application cannot be used; 4) After the password is cracked, the data of the application is completely exposed. Contents of the invention [0004] The object of the present inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/74
CPCG06F21/74
Inventor 赵万祥
Owner CHONGQING IQIYI INTELLIGENT TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products