CN104184738B - The information sharing method of terminal, the information sharing apparatus of terminal and terminal - Google Patents

The information sharing method of terminal, the information sharing apparatus of terminal and terminal Download PDF

Info

Publication number
CN104184738B
CN104184738B CN201410440684.7A CN201410440684A CN104184738B CN 104184738 B CN104184738 B CN 104184738B CN 201410440684 A CN201410440684 A CN 201410440684A CN 104184738 B CN104184738 B CN 104184738B
Authority
CN
China
Prior art keywords
information
operation system
shared
terminal
assigned operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410440684.7A
Other languages
Chinese (zh)
Other versions
CN104184738A (en
Inventor
王振华
岳蓬星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410440684.7A priority Critical patent/CN104184738B/en
Publication of CN104184738A publication Critical patent/CN104184738A/en
Application granted granted Critical
Publication of CN104184738B publication Critical patent/CN104184738B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention proposes a kind of information sharing method of terminal, a kind of information sharing apparatus of terminal and a kind of terminal, wherein, the information sharing method of terminal includes:When detecting that any operation system receives information sharing request, assigned operation system is selected to handle described information sharing request at least one other operating system beyond any operation system in the multiple operating system;Shared information is asked to the result and described information sharing request of described information sharing request according to the assigned operation system, is that any operation system sets shared information in the assigned operation system;Pass through the shared shared information set of the assigned operation system.By technical scheme, control ability of the user to personal information is improved, the information security of terminal is effectively protected, improves the personal secrets of user, enhance Consumer's Experience.

Description

The information sharing method of terminal, the information sharing apparatus of terminal and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of information sharing method of terminal, a kind of terminal Information sharing apparatus and a kind of terminal.
Background technology
At present, in existing dual system termi-nal, the system of this terminal received shares asking for information to other-end Ask, and the sharing request from other-end received, be all sharing request is voluntarily handled by the system with decide whether into Row information is shared, and during the system handles the sharing request, the information of terminal has is cut by Malware or virus The risk obtained, information is got easily by other people, be unfavorable for secret protection.
Therefore, the information security of terminal how is protected when in face of sharing request, turns into current urgent problem to be solved.
The content of the invention
The present invention is based on above-mentioned technical problem, it is proposed that a kind of new technical scheme, can receive shared ask The information security of terminal is protected when asking.
In view of this, an aspect of of the present present invention proposes a kind of information sharing method of terminal, and the terminal includes multiple Operating system, including:When detecting that any operation system receives information sharing request, from the multiple operating system Assigned operation system is selected to be total to handle described information at least one other operating system beyond any operation system Enjoy request;The result and described information sharing request of described information sharing request are asked according to the assigned operation system Shared information is sought, is that any operation system sets shared information in the assigned operation system;Specified by described The shared shared information set of operating system.
In the technical scheme, when any operation system receives information sharing request, the letter can not be directly handled Sharing request is ceased, but by whether the power to make decision for allowing real information to be shared is given is selected from other operating systems of terminal The assigned operation system selected out, decided whether to allow real information to be shared by the assigned operation system, and by the assigned operation System sets the information that can be shared to be shared with other-end.That is, only when the assigned operation system makes permission very During the decision that real information is shared, the real information of terminal could be shared by other-end, and when the assigned operation system is made During the decision for not allowing real information to be shared, then the real information of terminal will not be provided out, and virtual information can be set Shared information is set to share with other-end.Wherein, information sharing request can be that this terminal user believes to other-end is shared The request of breath or the sharing request from other-end;Shared information includes but is not limited to the positional information, short of terminal The other information that information, associated person information, message registration information, the instant messages from application program and/or terminal preserve.Separately Outside, assigned operation system is forbidden itself to decide whether to allow information sharing.Pass through above-mentioned technical proposal, make reception sharing request Operating system assigned operation system can only be used to carry out information sharing, and can not directly judge whether that information can be shared, Shared information can not voluntarily be sent to other-end, so as to avoid making because the operating system for receiving sharing request is dangerous Into privacy leakage, the information security of terminal can be effectively protected, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that any operation system from the multiple operating system with Assigned operation system is selected in outer at least one other operating system, is specifically included:According to described information sharing request, it is determined that There is the operating system to be selected of the authority of processing described information sharing request at least one other operating system;And root According to the select command received, the assigned operation system is selected from the operating system to be selected, or according to the behaviour to be selected Make the level of security of system, operating system of the selection with level of security described in highest is as the assigned operation system.
In the technical scheme, the power to make decision of information sharing can only be by having behaviour to other operating systems for receiving sharing request The part operation system for making authority is grasped, and assigned operation system is selected directly in these operating systems by user, or at this Level of security highest system is selected in a little operating systems as assigned operation system.Pass through above-mentioned technical proposal, can basis The information sharing request received, suitable assigned operation system is selected from multiple operating systems, is shared with enhancement information Security.
In the above-mentioned technical solutions, it is preferable that any operation system from the multiple operating system with Assigned operation system is selected in outer at least one other operating system, including:According to the select command received, from it is described to The assigned operation system is selected in few other operating systems;Or the safety according at least one other operating system Rank, operating system of the selection with level of security described in highest is as the assigned operation system.
In the technical scheme, assigned operation system can be selected directly at least one other operating system by user System, can also select level of security highest system as assigned operation system at least one other operating system.Pass through Above-mentioned technical proposal, it can be selected according to the demand of user or according in other operating systems of level of security beyond current system Most suitable and/or safest assigned operation system is selected out, the security shared with enhancement information.
In the above-mentioned technical solutions, it is preferable that the processing described information sharing request, specifically include:Judge whether to permit Perhaps the real information of described any operation system is shared, and the result of described information sharing request is included permitting Perhaps the real information of described any operation system is shared or does not allow the real information of any operation system It is shared.
In the above-mentioned technical solutions, it is preferable that it is described according to the assigned operation system to described information sharing request Result and described information sharing request ask shared information, are any operation in the assigned operation system System sets shared information, specifically includes:When allowing the real information of any operation system to be shared, by described in Real information is sent to the assigned operation system, and the real information that the assigned operation system is received is arranged to The shared information;When not allowing the real information of any operation system to be shared, in the assigned operation system It is that any operation system establishes virtual information in system, and the virtual information is arranged to the shared information.
In the technical scheme, when assigned operation system allows the real information of terminal to be shared, any operation system Can to assigned operation system provide real information, and by assigned operation system outwards share information, when assigned operation system not Can be that any operation system establishes virtual information, and pass through assigned operation system when allowing the real information of terminal to be shared Outwards share the virtual information.Such as when the current operation system of terminal receives the position sharing request from other-end When, if assigned operation system judges the actual position information for allowing other-end to obtain this terminal, current operation system can To be positioned by GPS, the actual position information of terminal is sent to other-end.And when assigned operation system judges not permit Perhaps when other-end obtains the actual position information of this terminal, it can detect whether current operation system has default virtual bit Confidence ceases, if current operation system has default including level information, by assigned operation system by the virtual bit confidence Breath is outwards shared, if current operation system does not have default including level information, can prompt to use by terminal operating system Family, which establishes including level information or including level information is directly established by terminal operating system, outwards shares.Pass through above-mentioned technical side Case, the privacy requirements of user can be met, protect the information security of terminal and the personal secrets of user to greatest extent.
Another aspect of the present invention proposes a kind of information sharing apparatus of terminal, and the terminal includes multiple operations and is System, including:Processing unit, for when detect any operation system receive information sharing request when, from the multiple operation Assigned operation system is selected at least one other operating system beyond any operation system in system to handle State information sharing request;Setting unit, for the result according to the assigned operation system to described information sharing request Shared information is asked with described information sharing request, is that any operation system is set in the assigned operation system Shared information;Shared cell, pass through the shared shared information set of the assigned operation system.
In the technical scheme, when any operation system receives information sharing request, the letter can not be directly handled Sharing request is ceased, but by whether the power to make decision for allowing real information to be shared is given is selected from other operating systems of terminal The assigned operation system selected out, decided whether to allow real information to be shared by the assigned operation system, and by the assigned operation System sets the information that can be shared to be shared with other-end.That is, only when the assigned operation system makes permission very During the decision that real information is shared, the real information of terminal could be shared by other-end, and when the assigned operation system is made During the decision for not allowing real information to be shared, then the real information of terminal will not be provided out, and virtual information can be set Shared information is set to share with other-end.Wherein, information sharing request can be that this terminal user believes to other-end is shared The request of breath or the sharing request from other-end;Shared information includes but is not limited to the positional information, short of terminal The other information that information, associated person information, message registration information, the instant messages from application program and/or terminal preserve.Separately Outside, assigned operation system is forbidden itself to decide whether to allow information sharing.Pass through above-mentioned technical proposal, make reception sharing request Operating system assigned operation system can only be used to carry out information sharing, and can not directly judge whether that information can be shared, Shared information can not voluntarily be sent to other-end, so as to avoid making because the operating system for receiving sharing request is dangerous Into privacy leakage, the information security of terminal can be effectively protected, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that the processing unit includes:Determining unit, for being total to according to described information Request is enjoyed, the authority for determining to have processing described information sharing request at least one other operating system treats selection operation System;First choice unit, for according to the select command received, the specified behaviour to be selected from the operating system to be selected Make system, or the level of security according to the operating system to be selected, operating system of the selection with level of security described in highest is made For the assigned operation system.
In the technical scheme, the power to make decision of information sharing can only be by having operating rights to the operating system for receiving sharing request The part operation system of limit is grasped, and assigned operation system is selected directly in these operating systems by user, or in these behaviour Make to select level of security highest system in system as assigned operation system.Pass through above-mentioned technical proposal, can be according to reception The information sharing request arrived, selects suitable assigned operation system, the peace shared with enhancement information from multiple operating systems Quan Xing.
In the above-mentioned technical solutions, it is preferable that the processing unit also includes:Second selecting unit, for according to reception The select command arrived, the assigned operation system is selected from least one other operating system;Or according to it is described at least The level of security of one other operating system, operating system of the selection with level of security described in highest is as the assigned operation System.
In the technical scheme, assigned operation system can be selected directly at least one other operating system by user System, can also select level of security highest system as assigned operation system at least one other operating system.Pass through Above-mentioned technical proposal, can be selected according to the demand of user or according to level of security from other operating systems it is most suitable and/ Or safest assigned operation system, the security shared with enhancement information.
In the above-mentioned technical solutions, it is preferable that the processing unit also includes:Judging unit, for determining whether The real information of any operation system is shared, and the setting unit is specifically used for:When judged result is permission institute When stating the real information of any operation system and being shared, the real information is sent to the assigned operation system, and The real information that the assigned operation system receives is arranged to the shared information;When judged result not allow institute It is that any operation system is built in the assigned operation system when stating the real information of any operation system and being shared Vertical virtual information, and the virtual information is arranged to the shared information.
In the technical scheme, when assigned operation system allows the real information of terminal to be shared, any operation system Can to assigned operation system provide real information, and by assigned operation system outwards share information, when assigned operation system not Can be that any operation system establishes virtual information, and pass through assigned operation system when allowing the real information of terminal to be shared Outwards share the virtual information.Such as when the current operation system of terminal receives the position sharing request from other-end When, if assigned operation system judges the actual position information for allowing other-end to obtain this terminal, current operation system can To be positioned by GPS, the actual position information of terminal is sent to other-end.And when assigned operation system judges not permit Perhaps when other-end obtains the actual position information of this terminal, it can detect whether current operation system has default virtual bit Confidence ceases, if current operation system has default including level information, by assigned operation system by the virtual bit confidence Breath is outwards shared, if current operation system does not have default including level information, can prompt to use by terminal operating system Family, which establishes including level information or including level information is directly established by terminal operating system, outwards shares.Pass through above-mentioned technical side Case, the privacy requirements of user can be met, protect the information security of terminal and the personal secrets of user to greatest extent.
Another aspect of the invention proposes a kind of terminal, includes described in multiple operating systems and above-mentioned technical proposal Terminal information sharing apparatus.Therefore, the terminal has the complete of the information sharing apparatus of the terminal of above-mentioned technical proposal offer Portion's beneficial effect, will not be repeated here.
By above technical scheme, can avoid because the operating system for receiving sharing request is dangerous and caused by privacy let out Dew, makes user both to share real information, and virtual information can be set to be used for sharing, improve control of the user to personal information Ability processed, the information security of terminal is effectively protected, the personal secrets of user is improved, enhances Consumer's Experience.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of the information sharing method of terminal according to an embodiment of the invention;
Fig. 2 shows the exemplary flow according to an embodiment of the invention for judging whether to set including level information Figure;
Fig. 3 shows the schematic flow diagram of the information sharing method of terminal according to another embodiment of the invention;
Fig. 4 shows the schematic block diagram of the information sharing apparatus of terminal according to an embodiment of the invention;
Fig. 5 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 6 shows the schematic block diagram of terminal according to an embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be different from other modes described here using other to implement, therefore, shared scope of the invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the information sharing method of terminal according to an embodiment of the invention.
As shown in figure 1, the information sharing method of the terminal of embodiments of the invention is used for the end with multiple operating systems End, including:
Step 102, when detecting that any operation system receives information sharing request, from appointing in multiple operating systems Assigned operation system is selected to carry out processing information sharing request at least one other operating system beyond one operating system.
Step 104, the result and described information of described information sharing request are total to according to the assigned operation system Enjoy and ask shared information, be that any operation system sets shared information in the assigned operation system.
Step 106, the shared shared information set of the assigned operation system is passed through.
In the technical scheme, when any operation system receives information sharing request, the letter can not be directly handled Sharing request is ceased, but by whether the power to make decision for allowing real information to be shared is given is selected from other operating systems of terminal The assigned operation system selected out, decided whether to allow real information to be shared by the assigned operation system, and by the assigned operation System sets the information that can be shared to be shared with other-end.That is, only when the assigned operation system makes permission very During the decision that real information is shared, the real information of terminal could be shared by other-end, and when the assigned operation system is made During the decision for not allowing real information to be shared, then the real information of terminal will not be provided out, and virtual information can be set Shared information is set to share with other-end.Wherein, information sharing request can be that this terminal user believes to other-end is shared The request of breath or the sharing request from other-end;Shared information includes but is not limited to the positional information, short of terminal The other information that information, associated person information, message registration information, the instant messages from application program and/or terminal preserve.Separately Outside, assigned operation system is forbidden itself to decide whether to allow information sharing.Pass through above-mentioned technical proposal, make reception sharing request Operating system assigned operation system can only be used to carry out information sharing, and can not directly judge whether that information can be shared, Shared information can not voluntarily be sent to other-end, so as to avoid making because the operating system for receiving sharing request is dangerous Into privacy leakage, the information security of terminal can be effectively protected, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that in a step 102, from any operation system in multiple operating systems with Assigned operation system is selected in outer at least one other operating system, is specifically included:Asked according to information sharing, it is determined that at least The operating system to be selected of authority with processing information sharing request in one other operating system;And according to the choosing received Order is selected, selects assigned operation system, or the level of security according to operating system to be selected, selection to have from operating system to be selected The operating system of highest level of security is as assigned operation system.
In the technical scheme, the power to make decision of information sharing can only be by having operating rights to the operating system for receiving sharing request The part operation system of limit is grasped, and assigned operation system is selected directly in these operating systems by user, or in these behaviour Make to select level of security highest system in system as assigned operation system.Pass through above-mentioned technical proposal, can be according to reception The information sharing request arrived, selects suitable assigned operation system, the peace shared with enhancement information from multiple operating systems Quan Xing.
In the above-mentioned technical solutions, it is preferable that in a step 102, from any operation system in multiple operating systems with Assigned operation system is selected in outer at least one other operating system, including:According to the select command received, from multiple behaviour Make to select assigned operation system in system;Or the level of security according to multiple operating systems, selection have highest level of security Operating system is as assigned operation system.
In the technical scheme, assigned operation system can be selected directly at least one other operating system by user System, can also select level of security highest system as assigned operation system at least one other operating system.Pass through Above-mentioned technical proposal, can be selected according to the demand of user or according to level of security from other operating systems it is most suitable and/ Or safest assigned operation system, the security shared with enhancement information.
In the above-mentioned technical solutions, it is preferable that in a step 102, processing information sharing request, specifically include:Judgement is The no real information for allowing any operation system is shared, and the result of information sharing request is included allowing any behaviour The real information for making system is shared or not allowed the real information of any operation system to be shared.
In the above-mentioned technical solutions, it is preferable that step 104 specifically includes:When the real information for allowing any operation system When being shared, the real information is sent to the assigned operation system, and the institute that the assigned operation system is received State real information and be arranged to the shared information;When not allowing the real information of any operation system to be shared, in the finger Determine to establish virtual information in operating system for any operation system, and virtual information is arranged to shared information.
In the technical scheme, when assigned operation system allows the real information of terminal to be shared, any operation system Can to assigned operation system provide real information, and by assigned operation system outwards share information, when assigned operation system not Can be that any operation system establishes virtual information, and pass through assigned operation system when allowing the real information of terminal to be shared Outwards share the virtual information.Such as when the current operation system of terminal receives the position sharing request from other-end When, if assigned operation system judges the actual position information for allowing other-end to obtain this terminal, current operation system can To be positioned by GPS, the actual position information of terminal is sent to other-end.And when assigned operation system judges not permit Perhaps when other-end obtains the actual position information of this terminal, it can detect whether current operation system has default virtual bit Confidence ceases, if current operation system has default including level information, by assigned operation system by the virtual bit confidence Breath is outwards shared, if current operation system does not have default including level information, can prompt to use by terminal operating system Family, which establishes including level information or including level information is directly established by terminal operating system, outwards shares.Pass through above-mentioned technical side Case, the privacy requirements of user can be met, protect the information security of terminal and the personal secrets of user to greatest extent.
Fig. 2 shows the exemplary flow according to an embodiment of the invention for judging whether to set including level information Figure.
As shown in Fig. 2 according to one embodiment of present invention, in the dual system termi-nal with system A and system B, sentence It is disconnected whether to set including level information to comprise the following steps:
Step 202, system B processing informations sharing request.I.e. when system A receive information sharing request when, by system B Lai Handle the information sharing request, so as to avoid because receive sharing request operating system it is dangerous and caused by privacy leakage, Protect the information security of terminal.
Step 204, system B judges whether to need to set including level information, when judged result is to be, into step 206, when judged result is no, return to step 202, wait pending information sharing request next time.Specifically, system is worked as The result that B is asked information sharing is that permission system A actual position information is shared, it is not necessary to sets virtual bit confidence During breath, return to step 202, pending information sharing request next time is waited;When the result that system B is asked information sharing , it is necessary to set including level information during not allow system A actual position information to be shared.
Step 206, it is that system A sets including level information by system B.System B can be by the including level information of foundation Other-end is sent to, is obtained so as to avoid system A actual position information by other-end, the secrecy of user can be met Demand, the information security of terminal and the personal secrets of user are protected to greatest extent.
Fig. 3 shows the schematic flow diagram of the information sharing method of terminal according to another embodiment of the invention.
As shown in figure 3, the information sharing method of terminal according to another embodiment of the invention comprises the following steps:
Step 302, the positional information of remote terminal requests owner terminal transmitter master terminal, or owner's terminal initiative Send the including level information of itself.
Step 304, judge whether the including level information of owner's terminal initializes, that is, it is pre- to judge whether owner's terminal has If including level information, when judged result for it is no when, the prompting of " including level information is please first set " can be sent, and enter Step 306, when judged result is to be, into step 308.
Step 306, including level information is set, and enters step 308.
Step 308, including level information is sent to the remote terminal for sending request by owner's terminal.
Pass through above-mentioned technical proposal, user is both shared real information, virtual information can be set to be used for sharing, carried High control ability of the user to personal information, effectively protects the information security of terminal, improves the personal secrets of user, increase Strong Consumer's Experience.
Fig. 4 shows the schematic block diagram of information sharing apparatus according to an embodiment of the invention.
As shown in figure 4, information sharing apparatus 400 according to an embodiment of the invention, including:Processing unit 402, for working as Detect any operation system receive information sharing request when, beyond any operation system in multiple operating systems to Selection assigned operation system carrys out processing information sharing request in few other operating systems;Setting unit 404, for according to institute State assigned operation system and shared information asked to the result and described information sharing request of described information sharing request, It is that any operation system sets shared information in the assigned operation system;Shared cell 406, pass through the specified behaviour Make the shared shared information set of system.
In the technical scheme, when any operation system receives information sharing request, the letter can not be directly handled Sharing request is ceased, but by whether the power to make decision for allowing real information to be shared is given is selected from other operating systems of terminal The assigned operation system selected out, decided whether to allow real information to be shared by the assigned operation system, and by the assigned operation System sets the information that can be shared to be shared with other-end.That is, only when the assigned operation system makes permission very During the decision that real information is shared, the real information of terminal could be shared by other-end, and when the assigned operation system is made During the decision for not allowing real information to be shared, then the real information of terminal will not be provided out, and virtual information can be set Shared information is set to share with other-end.Wherein, information sharing request can be that this terminal user believes to other-end is shared The request of breath or the sharing request from other-end;Shared information includes but is not limited to the positional information, short of terminal The other information that information, associated person information, message registration information, the instant messages from application program and/or terminal preserve.Separately Outside, assigned operation system is forbidden itself to decide whether to allow information sharing.Pass through above-mentioned technical proposal, make reception sharing request Operating system assigned operation system can only be used to carry out information sharing, and can not directly judge whether that information can be shared, Shared information can not voluntarily be sent to other-end, so as to avoid making because the operating system for receiving sharing request is dangerous Into privacy leakage, the information security of terminal can be effectively protected, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that processing unit 402 includes:Determining unit 4022, for according to information sharing Request, determine the operating system to be selected of the authority with processing information sharing request at least one other operating system;First Selecting unit 4024, the select command received for basis, the selection assigned operation system from operating system to be selected, or according to The level of security of operating system to be selected, operating system of the selection with highest level of security is as assigned operation system.
In the technical scheme, the power to make decision of information sharing can only be by having operating rights to the operating system for receiving sharing request The part operation system of limit is grasped, and assigned operation system is selected directly in these operating systems by user, or in these behaviour Make to select level of security highest system in system as assigned operation system.Pass through above-mentioned technical proposal, can be according to reception The information sharing request arrived, selects suitable assigned operation system, the peace shared with enhancement information from multiple operating systems Quan Xing.
In the above-mentioned technical solutions, it is preferable that processing unit 402 also includes:Second selecting unit 4026, connect for basis The select command received, assigned operation system is selected from least one other operating system;Or according at least one other behaviour Make the level of security of system, operating system of the selection with highest level of security is as assigned operation system.
In the technical scheme, assigned operation system can be selected directly at least one other operating system by user System, level of security highest system can also be selected as assigned operation system at least one other operating system.By upper State technical scheme, can be selected according to the demand of user or according to level of security from other operating systems it is most suitable and/or Safest assigned operation system, the security shared with enhancement information.
In the above-mentioned technical solutions, it is preferable that processing unit 402 also includes:Judging unit 4028, for judging whether to permit Perhaps the real information of any operation system is shared, and setting unit 404 is specifically used for:When judged result is appointed for permission is described When the real information of one operating system is shared, the real information is sent to the assigned operation system, and by institute State the real information that assigned operation system receives and be arranged to the shared information;When judged result is not allow described appoint It is that any operation system establishes void in the assigned operation system when real information of one operating system is shared Intend information, and the virtual information is arranged to the shared information.
In the technical scheme, when assigned operation system allows the real information of terminal to be shared, any operation system Can to assigned operation system provide real information, and by assigned operation system outwards share information, when assigned operation system not Can be that any operation system establishes virtual information, and pass through assigned operation system when allowing the real information of terminal to be shared Outwards share the virtual information.Such as when the current operation system of terminal receives the position sharing request from other-end When, if assigned operation system judges the actual position information for allowing other-end to obtain this terminal, current operation system can To be positioned by GPS, the actual position information of terminal is sent to other-end.And when assigned operation system judges not permit Perhaps when other-end obtains the actual position information of this terminal, it can detect whether current operation system has default virtual bit Confidence ceases, if current operation system has default including level information, by assigned operation system by the virtual bit confidence Breath is outwards shared, if current operation system does not have default including level information, can prompt to use by terminal operating system Family, which establishes including level information or including level information is directly established by terminal operating system, outwards shares.Pass through above-mentioned technical side Case, the privacy requirements of user can be met, protect the information security of terminal and the personal secrets of user to greatest extent.
Fig. 5 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in figure 5, terminal 500 according to an embodiment of the invention, including:Multiple operating systems 502 and information sharing Device 504 (equivalent to the information sharing apparatus 400 of the terminal in the embodiment shown in Fig. 4).
Wherein, information sharing apparatus 504 is used to select assigned operation system to carry out processing terminal in multiple operating systems 502 The information sharing request that 500 other operating systems receive.Specifically, asked when any operation system receives information sharing When asking, information sharing request can not be directly handled, but whether will allow under the control of information sharing apparatus 504 The power to make decision that real information is shared gives other beyond the operating system that sharing request is received from multiple operating systems 502 The assigned operation system selected in operating system, decided whether to allow real information to be shared by the assigned operation system, and Real information or the virtual information of foundation are outwards shared by assigned operation system.
Pass through above-mentioned technical proposal, can avoid because receive sharing request operating system it is dangerous and caused by privacy let out Dew, makes user both to share real information, and virtual information can be set to be used for sharing, improve control of the user to personal information Ability processed, the information security of terminal is effectively protected, the personal secrets of user is improved, enhances Consumer's Experience.
Fig. 6 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in fig. 6, terminal 600 is that system A and system B are formed by two systems.Wherein, system A is in general system, System B is the system with positional information defencive function, and the positional information in system A can freely be set by the user of terminal 600 It is fixed.
When user wants the content for controlling personnel location information to show, including level information can be carried out by system B Set.Specifically, it can decide whether that permission system A actual position information is shared by system B, and allow in system B When system A actual position information is shared, the actual position information that system A is obtained by system B is shared.And in system B Can be that system A sets including level information by system B when not allowing system A actual position information to be shared, now, when Personnel location information is actively sent to other-end by user, or user personnel location information by other-end acquisition request When, the including level information that user is set is shown in other-end.So, user is made both to share real information, Virtual information can be set to be used for sharing, improve control ability of the user to personal information, effectively protect the information of terminal Safety, improves the personal secrets of user, enhances Consumer's Experience.
In the present invention, term " first ", " second " are only used for the purpose described, and it is not intended that instruction or hint phase To importance.For the ordinary skill in the art, above-mentioned term can be understood as the case may be in the present invention Concrete meaning.
Technical scheme is described in detail above in association with accompanying drawing, by technical scheme, can avoid Because receive sharing request operating system it is dangerous and caused by privacy leakage, user had both been shared real information, Ke Yishe Put virtual information to be used for sharing, improve control ability of the user to personal information, effectively protect the information security of terminal, carry The personal secrets of user have been risen, have enhanced Consumer's Experience.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the present invention it is shared within the scope of.

Claims (8)

1. a kind of information sharing method of terminal, the terminal includes multiple operating systems, it is characterised in that including:
When detecting that any operation system receives information sharing request, from any behaviour in the multiple operating system Make to select assigned operation system at least one other operating system beyond system to handle described information sharing request;
The result and described information sharing request of described information sharing request are asked according to the assigned operation system Shared information, it is that any operation system sets shared information in the assigned operation system;Specifically include:
When allowing the real information of any operation system to be shared, the real information is sent to described and specified Operating system, and the real information that the assigned operation system is received is arranged to the shared information;
It is described in the assigned operation system when not allowing the real information of any operation system to be shared Any operation system establishes virtual information, and the virtual information is arranged into the shared information;
Pass through the shared shared information set of the assigned operation system.
2. the information sharing method of terminal according to claim 1, it is characterised in that described from the multiple operating system In any operation system beyond at least one other operating system in select assigned operation system, specifically include:
According to described information sharing request, determine have processing described information is shared please at least one other operating system The operating system to be selected for the authority asked;And
According to the select command received, the assigned operation system is selected from the operating system to be selected, or according to described The level of security of operating system to be selected, operating system of the selection with level of security described in highest is as the assigned operation system System.
3. the information sharing method of terminal according to claim 1, it is characterised in that described from the multiple operating system In any operation system beyond at least one other operating system in select assigned operation system, including:
According to the select command received, the assigned operation system is selected from least one other operating system;Or
According to the level of security of at least one other operating system, operating system of the selection with level of security described in highest As the assigned operation system.
4. the information sharing method of terminal according to any one of claim 1 to 3, it is characterised in that the processing institute Information sharing request is stated, is specifically included:
Determine whether that the real information of any operation system is shared, wherein,
The result of described information sharing request is included allowing the real information quilt of any operation system Share or do not allow the real information of any operation system to be shared.
5. a kind of information sharing apparatus of terminal, the terminal includes multiple operating systems, it is characterised in that including:
Processing unit, for when detect any operation system receive information sharing request when, from the multiple operating system In any operation system beyond at least one other operating system in select assigned operation system to handle the letter Cease sharing request;
Setting unit, for being total to according to the assigned operation system to the result and described information of described information sharing request Enjoy and ask shared information, be that any operation system sets shared information in the assigned operation system;Institute Stating processing unit also includes:
Judging unit, for determining whether that the real information of any operation system is shared, and
The setting unit is specifically used for:
When judged result is allows the real information of any operation system to be shared, the real information is sent To the assigned operation system, and the real information that the assigned operation system is received is arranged to the shared letter Breath;
When judged result is not allow the real information of any operation system to be shared, in the assigned operation system It is that any operation system establishes virtual information in system, and the virtual information is arranged to the shared information;
Shared cell, for passing through the shared shared information set of the assigned operation system.
6. the information sharing apparatus of terminal according to claim 5, it is characterised in that the processing unit includes:
Determining unit, for according to described information sharing request, determining that there is processing at least one other operating system The operating system to be selected of the authority of described information sharing request;
First choice unit, for according to the select command received, the specified behaviour to be selected from the operating system to be selected Make system, or the level of security according to the operating system to be selected, operating system of the selection with level of security described in highest is made For the assigned operation system.
7. the information sharing apparatus of terminal according to claim 5, it is characterised in that the processing unit also includes:
Second selecting unit, for according to the select command received, institute to be selected from least one other operating system State assigned operation system;Or the level of security according at least one other operating system, selection have safety described in highest The operating system of rank is as the assigned operation system.
A kind of 8. terminal, it is characterised in that including:
Multiple operating systems;And
The information sharing apparatus of terminal as any one of claim 5 to 7.
CN201410440684.7A 2014-09-01 2014-09-01 The information sharing method of terminal, the information sharing apparatus of terminal and terminal Active CN104184738B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410440684.7A CN104184738B (en) 2014-09-01 2014-09-01 The information sharing method of terminal, the information sharing apparatus of terminal and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410440684.7A CN104184738B (en) 2014-09-01 2014-09-01 The information sharing method of terminal, the information sharing apparatus of terminal and terminal

Publications (2)

Publication Number Publication Date
CN104184738A CN104184738A (en) 2014-12-03
CN104184738B true CN104184738B (en) 2018-02-13

Family

ID=51965480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410440684.7A Active CN104184738B (en) 2014-09-01 2014-09-01 The information sharing method of terminal, the information sharing apparatus of terminal and terminal

Country Status (1)

Country Link
CN (1) CN104184738B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104536818B (en) * 2014-12-24 2019-02-01 宇龙计算机通信科技(深圳)有限公司 A kind of method and apparatus that system is shared
CN104503849A (en) * 2015-01-14 2015-04-08 宇龙计算机通信科技(深圳)有限公司 System data setting method, system data setting device and terminal
CN104536823B (en) * 2015-01-16 2018-08-24 宇龙计算机通信科技(深圳)有限公司 Shortcut operation method, prompt operation device and terminal
CN105630855B (en) * 2015-04-24 2019-06-11 宇龙计算机通信科技(深圳)有限公司 File sharing method, shared file system and terminal
CN105635391A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Control method and control system for dial-up communication services, and terminal
CN105631344B (en) * 2015-04-30 2018-11-06 南京酷派软件技术有限公司 The access control method and system of secure data, terminal
CN106295380A (en) * 2015-05-14 2017-01-04 宇龙计算机通信科技(深圳)有限公司 The guard method of positional information in a kind of multiple operating system terminal, device and terminal
CN106340063B (en) * 2015-10-21 2019-04-12 北京智谷睿拓技术服务有限公司 Sharing method and sharing means
CN105631270A (en) * 2015-12-30 2016-06-01 浙江德景电子科技有限公司 Double-system resource management method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101247338A (en) * 2008-03-18 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Authorization method and system for mutual accesses to shared data between mobile terminals
CN101409719A (en) * 2007-10-08 2009-04-15 联想(北京)有限公司 Method and client terminal for implementing network safety payment
CN102999379A (en) * 2012-12-14 2013-03-27 东莞宇龙通信科技有限公司 Terminal and data sharing method
CN103312676A (en) * 2012-03-15 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Terminal, server and terminal safety management method
CN103870760A (en) * 2014-03-28 2014-06-18 宇龙计算机通信科技(深圳)有限公司 Multi-terminal safety management method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101409719A (en) * 2007-10-08 2009-04-15 联想(北京)有限公司 Method and client terminal for implementing network safety payment
CN101247338A (en) * 2008-03-18 2008-08-20 宇龙计算机通信科技(深圳)有限公司 Authorization method and system for mutual accesses to shared data between mobile terminals
CN103312676A (en) * 2012-03-15 2013-09-18 宇龙计算机通信科技(深圳)有限公司 Terminal, server and terminal safety management method
CN102999379A (en) * 2012-12-14 2013-03-27 东莞宇龙通信科技有限公司 Terminal and data sharing method
CN103870760A (en) * 2014-03-28 2014-06-18 宇龙计算机通信科技(深圳)有限公司 Multi-terminal safety management method and device

Also Published As

Publication number Publication date
CN104184738A (en) 2014-12-03

Similar Documents

Publication Publication Date Title
CN104184738B (en) The information sharing method of terminal, the information sharing apparatus of terminal and terminal
CN104156657B (en) The data inputting method of terminal, the message input device of terminal and terminal
JP6842919B2 (en) Network connection method, hotspot terminal and management terminal
CN104794402B (en) system switching method, system switching device and terminal
CN105563484B (en) Cloud robot system, robot and robot cloud platform
CN104506561B (en) Terminal profile access control method and device
US9050723B1 (en) Human and robotic distributed operating system (HaRD-OS)
EP2611227A1 (en) Method, device and system for sending communication information
CA2717708A1 (en) Multiple-layer chat filter system and method
JP2003188885A5 (en)
JP2005252812A5 (en)
JP2006285993A (en) Access verification and management for access permission to shared referenced resource in network environment
KR20140128462A (en) Login method and device, terminal and network server
TWI385980B (en) Methods and a device for secure distance calculation in communication networks
CN103283268A (en) Wireless terminal and method for managing connection of network using same
CN106211164A (en) Terminal network changing method, terminal network switching device and terminal
CN110414699A (en) A kind of hotel occupancy method and system, computer readable storage medium
CN104320479B (en) The control method of controlled plant and the control system of controlled plant
CN104735727A (en) Wireless local area network flow distribution method and device based on signal detection
CN107659936A (en) A kind of cut-in method and device of control WiFi access devices
CN108322910A (en) The management method of safe space, apparatus and system in equipment
JP2006222831A (en) Conference system using radio communication
JP6197014B2 (en) Approval control method, approval control system and approval control program for remote operation
CN101951386A (en) Safe method for data convergence and information feedback of internet of things
CN112509197A (en) Visitor management method and related device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant