CN106326018A - Data access method and terminal - Google Patents

Data access method and terminal Download PDF

Info

Publication number
CN106326018A
CN106326018A CN201610694008.1A CN201610694008A CN106326018A CN 106326018 A CN106326018 A CN 106326018A CN 201610694008 A CN201610694008 A CN 201610694008A CN 106326018 A CN106326018 A CN 106326018A
Authority
CN
China
Prior art keywords
data
operating system
terminal
security context
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610694008.1A
Other languages
Chinese (zh)
Other versions
CN106326018B (en
Inventor
曲大伟
王三新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to PCT/CN2016/098443 priority Critical patent/WO2017185582A1/en
Publication of CN106326018A publication Critical patent/CN106326018A/en
Application granted granted Critical
Publication of CN106326018B publication Critical patent/CN106326018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention discloses a data access method and a terminal. The method comprises the steps of receiving an access command for accessing target data in a second operating system, wherein first data is stored in a storage space corresponding to the second operating system, and the access of the target data depends on the first data; sending the first data to a first operating system, and conveniently processing second data in the first operating system according to the first data, thus obtaining the target data, wherein the second data is the data stored in a storage space corresponding to the first operating system; outputting the target data. By implementing the data access method and the terminal provided by the embodiment of the invention, the requirement of data transfer and storage carried out between the double operating systems on transmission bandwidth can be reduced.

Description

A kind of data access method and terminal
Technical field
The present invention relates to areas of information technology, particularly relate to a kind of data access method and terminal.
Background technology
Along with the development of terminal (such as the terminal such as smart mobile phone, panel computer), terminal has become people's daily life must not The article that can lack.At present, the terminal having multiple operating system gets more and more, and such as, a lot of terminals have normal operations system simultaneously System and SOS.In actual applications, the situation carrying out data conversion storage between two operating systems often occurs, such as, The data stored in memory space corresponding for one operating system are often transmitted to corresponding the depositing of another operating system by terminal Storage space stores.However, it has been found in practice that, when storage big in the memory space that terminal is corresponding by operating system When data transmission to the memory space that another operating system is corresponding stores, the requirement to transmission bandwidth is higher.
Summary of the invention
Embodiments provide a kind of data access method and terminal, it is possible to reduce and carry out data between dual operating systems The unloading requirement to transmission bandwidth.
Embodiment of the present invention first aspect discloses a kind of data access method, including:
The access instruction for accessing target data is received, wherein, in described second operation system in the second operating system In the memory space that system is corresponding, storage has the first data, the access of described target data to depend on described first data;
Described first data are sent to described first operating system, in order to according to institute in described first operating system Stating the first data to process the second data, obtain described target data, described second data are described first operating system The data of storage in corresponding memory space;
Export described target data.
Embodiment of the present invention second aspect discloses a kind of terminal, including:
Receive unit, for receiving the access instruction for accessing target data in the second operating system, wherein, in institute Stating storage in the memory space that the second operating system is corresponding has the first data, the access of described target data to depend on described first Data;
Transmitting element, for being sent to described first operating system by described first data, in order to grasps described first Making to process the second data according to described first data in system, obtain described target data, described second data are institute State the data of storage in the memory space that the first operating system is corresponding;
Output unit, is used for exporting described target data.
In the embodiment of the present invention, terminal receive in the second operating system for access target data access instruction it After, the first data can be sent to the first operating system by terminal, in order to according to the first data pair in the first operating system Second data process, and obtain target data, and so, terminal just can export target data.Wherein, in the second operation system In the memory space that system is corresponding, storage has the first data, and the access of target data depends on the first data, and the second data are first The data of storage in the memory space that operating system is corresponding.Visible, by the embodiment of the present invention, terminal is respectively in the first operation system The memory space that system is corresponding stores the second data, and stores the first data at the memory space that the second operating system is corresponding, After second operating system receives the access instruction for accessing target data, it is only necessary to the first data are sent to the first behaviour Make system, it is possible to access target data, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for From the point of view of those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings Accompanying drawing.
Fig. 1 is the schematic flow sheet of a kind of data access method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of data access method disclosed in the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of terminal disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing and " second " etc. are for district Different objects rather than be used for describing particular order.Additionally, term " includes " and " having " and their any deformation, meaning Figure is to cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system, product or equipment It is not limited to step or the unit listed, but the most also includes step or the unit do not listed, or alternatively also Including other step intrinsic for these processes, method, product or equipment or unit.
In the embodiment of the present invention, user terminal can include but not limited to smart mobile phone, notebook computer, personal computer (Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), mobile interchange All kinds of use such as net equipment (Mobile Internet Device, MID), Intelligent worn device (such as intelligent watch, Intelligent bracelet) Family terminal.Wherein, the operating system of this user terminal may include but be not limited to Android operation system, IOS, Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone8 operating system etc., this Inventive embodiments does not limits.
The embodiment of the invention discloses a kind of data access method and terminal, the safety of data can be improved.Hereinafter divide It is not described in detail.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of data access method disclosed in the embodiment of the present invention.Such as Fig. 1 institute Showing, the method may comprise steps of.
101, terminal receives the access instruction for accessing target data in the second operating system.
In the embodiment of the present invention, terminal includes at least one first operating system and at least one second operating system.Can Choosing, the first operating system can be normal operating system, and the second operating system can be SOS, normal operations system The safety of system is low compared with the safety of SOS, can arbitrarily install third-party application under normal operating system, than Such as application A PP, user can be in the function of normal operating system experience to abundant third-party application, safety operation system All application under Tong are the application of customized development, not in installing any third-party application under SOS.Its In, for SOS, can be to meet U.S. trusted computer system evaluation criterion (Trusted Computer System Evaluation Criteria, TCSEC) B level and the operating system of above level of security in standard.Level of security is joined Examine such as following table:
The first operating system in step 101 can be any one first operating system of terminal, in step 101 Two operating systems can be any one second operating system of terminal.Wherein, the first operating system and the second operating system pair The memory space answered differs.
Wherein, target data can include the one therein such as image data, lteral data, video data or speech data or Multiple combination, the embodiment of the present invention does not limits.
Wherein, in the memory space that the second operating system is corresponding, storage has the first data, and the first operating system is corresponding In memory space, storage has the second data, and the access of target data depends on the first data.
Optionally, can extraction unit divided data, and will be except first in target data as the first data from target data Remaining data outside data determines as the second data.
Optionally, can be using the related information of target data as the first data, and using target data as the second data, Wherein, this related information includes but not limited to the dedicated program etc. of key, coded format, file access.
Wherein, the access of target data depends on the first data can be not have the first data cannot enter target data Row accesses.If the first data are related information, then when accessing target data, need to use related information that target data is carried out Resolve, target data could be accessed;If the first data are a part for target data, then terminal can under the second operating system From the memory space that the first operating system is corresponding, read the second data, and terminal can not be from the second behaviour under the first operating system Making to read in the memory space that system is corresponding first data, the second data cannot be accessed in the case of lacking the first data, Terminal needs to combine the first data and the second data, after obtaining target data, could access target data.
As an example it is assumed that target data is the most encrypted, the first data are related information, and this related information can be encryption The key used, if user desires access to the target data encrypted, then must use the key number of targets to having encrypted According to being decrypted, target data after deciphering, could be accessed.
Again as an example it is assumed that target data is voice data, this voice data is split into the first data and the second number According to, the first data are initial 100 data of voice data, and remaining is the second data, and the first data are stored in the second operation In the memory space that system is corresponding, the second data are stored in the memory space that the first operating system is corresponding.Second data are lacking In the case of few first data, terminal cannot access the second data under the first operating system, namely terminal is in the first operation system Cannot access voice data under Tong, the access of voice data depends on the first data.
102, the first data are sent to the first operating system by terminal, in order to according to the first number in the first operating system Process according to the second data, obtain target data.
In the embodiment of the present invention, in the memory space that the first operating system is corresponding, storage has the second data, due to number of targets According to access depend on the first data, terminal needs the first data are sent to the first operating system, in order to first operation Second data are processed according to the first data by system, obtains target data.
Optionally, the second data are processed in the first operating system by terminal according to the first data, obtain number of targets According to mode be specifically as follows:
11) relative position information stored during terminal obtains the memory space that the second operating system is corresponding, this relative position Information is the first data and second data relative position information in this target data;
12) terminal is under the second operating system, reads Part I number from the memory space that the second operating system is corresponding According to, and from the memory space that the first operating system is corresponding, read Part II data;
13) terminal is under the second operating system, according to the relative position information recorded by Part I data and second Divided data is combined, and obtains target data.
In this optional embodiment, target data, in advance in the first operating system, is split into the first number by terminal According to the second data after, terminal has obtained the first data and the second data in advance in this target data in the first operating system In relative position information, and this relative position information sent to the memory space that the second operating system is corresponding store.
In this embodiment, when the first operating system is normal operating system, and the second operating system is safety operation system During system, terminal can read the first data in the memory space that the second operating system is corresponding, and can be from the first operating system pair The memory space answered reads the second data, and according to the relative position stored in the memory space corresponding in the second operating system First data and the second data are combined, obtain target data by information.
Such as, user carries out calling record under the first operating system, and obtains a recording file, due to this recording literary composition The recording substance of last 5 minutes of part relates to privacy of user, then terminal can extract the recording of last 5 minutes from recording file Content as the first data, and by recording file in addition to these first data remaining all data be defined as the second data, Terminal by relative position information in recording file of the first data and the first data and the second data, (believe by this relative position Breath can be after these first data are in the second data in target data) send to storage corresponding to the second operating system empty Between store, the second data are stored directly in the memory space that the first operating system is corresponding.If user wants to check recording File, then user can input the acquisition instruction for obtaining recording file under terminal is in the second operating system, and terminal is the Read the first data under two operating systems, and from the memory space that the first operating system is corresponding, read the second data, and according to First data are added after the second data, to obtain complete record by the first data and the relative position information of the second data Sound file.
Optionally, the first data and second data relative position information in target data also can be not stored in the first behaviour Make in the memory space that system is corresponding;This relative position information directly can be write the ad-hoc location of the first data by terminal, then First data transmission is stored to the memory space that the second operating system is corresponding.When terminal is corresponding from the second operating system After reading the first data in memory space, terminal extracts the relative position information in the first data, and according to this relative position First data are combined by information with the second data.
Visible, by implementing this embodiment, when user desires access to target data, terminal can be in the second operation system Reducible target data under system.
Optionally, the second data are processed in the first operating system by terminal according to the first data, obtain number of targets According to mode be specifically as follows:
21) the first data stored during terminal obtains the memory space that the second operating system is corresponding;
22) terminal uses the first data to resolve the second data, obtains target data.
In this optional embodiment, the first data are the related information of target data, and the access of target data relies on In the first data.When terminal needs to access target data, terminal must use related information to resolve the second data, ability Obtain target data.
Such as: if target data is the file encrypted, this related information can be the encrypted message having encrypted file, if User wants to check the file encrypted, then encrypted message must be used to be decrypted the file encrypted, after deciphering Just can see file.
Visible, by implementing this embodiment, the safety of terminal data can be improved.
103, terminal output target data.
In the embodiment of the present invention, terminal exports target data in the first operating system.Concrete, terminal can be first Operating system shows this target data (as display video), or, terminal can through the first operating system by target data (as Audio frequency is play) it is transferred to other external equipments (such as loudspeaker).
In the method flow described by Fig. 1, terminal is respectively in the memory space storage second that the first operating system is corresponding Data, and store the first data at the memory space that the second operating system is corresponding, receive in the second operating system and be used for visiting After asking the access instruction of target data, it is only necessary to the first data are sent to the first operating system, it is possible to access number of targets According to, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of another kind of data access method disclosed in the embodiment of the present invention.Such as Fig. 2 Shown in, the method may comprise steps of.
201, terminal receives the access instruction for accessing target data in the second operating system.
202, terminal sends operation security context instruction through the second operating system to the first operating system.
Wherein, the instruction of this operation security context is used for indicating operation security context.
In the embodiment of the present invention, the system application of the operating system (such as android system) of terminal is by equipment manufacturers Self-developing or be built in system after carrying out safety detection, therefore the data security risk of general terminal mostlys come from The third-party application that user downloads voluntarily.
In the embodiment of the present invention, the access of target data depends on the first data, when needs access target data, due to First data and target data typically leave the specific region in internal memory (RAM) or in internal storage space (ROM) in, protect Protect the safety of these data, it is necessary first to the safety guarantee in running environment, the most should there is not the dangerous process being currently running (process that the application of some malicious third parties is opened), these dangerous processes can attempt to read the specific region storage of RAM or ROM Secure data, cause the leakage of these secure datas, therefore, terminal receives in the second operating system and is used for accessing number of targets According to access instruction after, terminal need through the second operating system to first operating system send run security context instruction, its In, the instruction of this operation security context is used for indicating operation security context.
203, terminal is at the first operating system security context.
In the embodiment of the present invention, terminal is after the first operating system receives operation security context instruction, and terminal is permissible At the first operating system security context.
Concrete, terminal comprises the following steps at the first operating system security context:
11) operation security context instruction is received in the first operating system;
12) close all nonsystematic processes under the first operating system, run security context instruction with response.
In this optional embodiment, terminal the first operating system receive operation security context instruction time, terminal Can close all nonsystematic processes under the first operating system, including removing, the task data of nonsystematic application in internal memory is (main If ACTIVITY), remove the service etc. in nonsystematic application in internal memory.
Optionally, after the first operating system receives and runs security context instruction, and close under the first operating system All nonsystematic processes before, the method is further comprising the steps of:
21) whether output enters the confirmation of security context for prompting;
22) the confirmation instruction for confirmation input is received.
In this optional embodiment, first operating system receive run security context instruction after, need to Whether family output enters the confirmation of security context for prompting, if receiving the confirmation that user inputs for confirmation Instruction, terminal turns off all nonsystematic processes under the first operating system, so can improve Consumer's Experience.
204, the first data are sent to the first operating system by terminal, in order to according to the first number in the first operating system Process according to the second data, obtain target data.
205, terminal output target data.
Concrete, the mode of terminal output target data specifically includes following steps:
31) application data is sent through the second operating system to the first operating system;
32) at the first operating system application data, in order to export target data in the first operating system.
In this optional embodiment, in order to avoid data are compromised after data access terminates, tie at data access Shu Hou, also to remove the first data and the target data data in RAM and ROM that the first operating system is corresponding, and this needs Second operating system sends application program to the first operating system and realizes.
In most of the cases, the access of file is needed by specific application program by user, such as DOC document, XLS Document, JPG document, MP3 document, RMVB document etc., in requisition for using OFFICE application, picture to check, application, audio frequency are play Application, video playback should be used for being converted to the data in file state that can be mutual with user, such as show in screen, By loudspeaker broadcasting etc..
Second operating system have sent operation security context instruction to the first operating system and confirming the first operation system Unite already at after under security context, send the installation kit of the application program that can open target data to the first operating system (or comprise the target program data of executable program, run including executable program itself and application program and relied on Library file, resource file and other data file etc.).Application program is vertical application, can only be by the second operation system System provides, and the first operating system cannot obtain this application program by other channel.
Wherein, application program mainly performs following functions:
1, determine the security context of the first operating system, when the first operating system is not in security context, do not perform to beat Open the task of target data, and self is destroyed after sending prompting;
2, as after confirming that the first operating system is in security context, perform open target data and export task;
3, after terminating to access target data (user is manual, or task terminates voluntarily), delete under the first operating system The first data and target data and by self destroy.
In the method flow described by Fig. 2, receive in the second operating system and refer to for the access accessing target data After order, terminal needs at the first operating system security context, and afterwards, the first data are sent to the first operation by terminal again System, so, terminal just can access target data, not only reduces and carries out data conversion storage between dual operating systems to transmission bandwidth Requirement, also improve the safety of data access.
Referring to Fig. 3, Fig. 3 is the structural representation of a kind of terminal disclosed in the embodiment of the present invention, and wherein, this terminal is installed First operating system and the second operating system, this terminal is for performing the part in the data access method described by Fig. 1 or Fig. 2 Or Overall Steps, specifically refer to the description of Fig. 1 or Fig. 2, do not repeat them here.As it is shown on figure 3, this terminal 300 may include that
Receive unit 301, for receiving the access instruction for accessing target data in the second operating system, wherein, In the memory space that described second operating system is corresponding, to have the first data, the access of described target data to depend on described in storage First data;
Transmitting element 302, for being sent to described first operating system by described first data, in order to described first Processing the second data according to described first data in operating system, obtain described target data, described second data are The data of storage in the memory space that described first operating system is corresponding;
Output unit 303, is used for exporting described target data.
Referring to Fig. 4, Fig. 4 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention, wherein, wherein, and should Terminal, for performing the part or all of step in the data access method described by Fig. 1 or Fig. 2, specifically refer to Fig. 1 or Fig. 2 Description, do not repeat them here.Terminal shown in Fig. 4 is to optimize further to obtain on the basis of the terminal shown in Fig. 3, with Terminal shown in Fig. 3 is compared, the terminal shown in Fig. 4 in addition to all unit including the terminal shown in Fig. 3,
Described transmitting element 302 is additionally operable to receive for accessing mesh in the second operating system at described reception unit 301 After the access instruction of mark data, send operation security context through described second operating system to described first operating system and refer to Order, the instruction of described operation security context is used for indicating operation security context;
Terminal 300 shown in Fig. 4 also includes:
Running unit 304, at described first operating system security context.
Optionally, described running unit 304 includes:
First receives subelement 3041, for receiving the instruction of described operation security context in described first operating system;
Close subelement 3042, for closing all nonsystematic processes under described first operating system, described with response Operation security context instructs.
Optionally, described running unit 304 also includes:
Output subelement 3043, receives described for receiving subelement 3041 described first in described first operating system After running security context instruction, and all nonsystematics under described first operating system closed by described closedown subelement 3042 Process, before responding the instruction of described operation security context, whether output enters the confirmation of security context for prompting;
Second receives subelement 3044, for receiving the confirmation instruction inputted for described confirmation.
Optionally, described output unit 303 export described target data mode particularly as follows:
Application data is sent to described first operating system through described second operating system;
At application data described in described first operating system, in order to export institute in described first operating system State target data.
In the terminal 300 described by Fig. 3 or Fig. 4, terminal is respectively in the memory space storage that the first operating system is corresponding Second data, and store the first data at the memory space that the second operating system is corresponding, receive in the second operating system and use After accessing the access instruction of target data, it is only necessary to the first data are sent to the first operating system, it is possible to access mesh Mark data, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
Referring to Fig. 5, Fig. 5 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention, wherein, wherein, and should Terminal, for performing the part or all of step in the data access method described by Fig. 1 or Fig. 2, specifically refer to Fig. 1 or Fig. 2 Description, do not repeat them here.
As it is shown in figure 5, this terminal may include that at least one processor 501, such as CPU, at least two memorizer 502, At least one input equipment 503, at least one output device 504.Wherein, memorizer 502 can be high-speed RAM memorizer, also Can be non-labile memorizer (non-volatile memory), for example, at least one disk memory.Memorizer 502 Optionally can also is that at least one is located remotely from the storage device of aforementioned processor 501.This input equipment 503 can be to touch Screen, keyboard or mouse etc..
Wherein, processor 501 can be in conjunction with the terminal described by Fig. 3 or Fig. 4, the memorizer that the second operating system is corresponding Store batch processing code in 502, and above-mentioned processor 501 calls storage in memorizer corresponding to the second operating system 502 Program code, is used for performing following operation:
By input equipment 503 reception for accessing the access instruction of target data in the second operating system, wherein, exist In the memory space that described second operating system is corresponding, storage has the first data, the access of described target data to depend on described the One data;
By output device 504, described first data are sent to described first operating system, in order to described first Processing the second data according to described first data in operating system, obtain described target data, described second data are The data of storage in the memory space that described first operating system is corresponding;
Described target data is exported by output device 504.
Optionally, above-mentioned processor 501 is received by input equipment 503 in the second operating system and is used for accessing number of targets According to access instruction after, and described by output device 504, described first data are sent to described first operating system Before, also call in memorizer corresponding to the second operating system 502 program code of storage, be used for performing following operation:
Send operation security context through described second operating system to described first operating system by output device 504 to refer to Order, the instruction of described operation security context is used for indicating operation security context;
At described first operating system security context.
Optionally, above-mentioned processor 501 includes at described first operating system security context:
Receive described operation security context by input equipment 503 in described first operating system to instruct;
Close all nonsystematic processes under described first operating system, to respond the instruction of described operation security context.
Optionally, above-mentioned processor 501 receives operation security context by input equipment 503 in described first operating system After instruction, and before all nonsystematic processes under described first operating system of described closedown, described method also includes:
Whether entered the confirmation of security context for prompting by output device 504 output;
Receive, by input equipment 503, the confirmation inputted for described confirmation to instruct.
Optionally, above-mentioned processor 501 exports described target data by output device 504 and includes:
Application data is sent through described second operating system to described first operating system by output device 504;
At application data described in described first operating system, in order to export institute in described first operating system State target data.
In the embodiment described by Fig. 5, terminal is respectively in the memory space storage second that the first operating system is corresponding Data, and store the first data at the memory space that the second operating system is corresponding, receive in the second operating system and be used for visiting After asking the access instruction of target data, it is only necessary to the first data are sent to the first operating system, it is possible to access number of targets According to, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because According to the present invention, some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should know Knowing, embodiment described in this description belongs to preferred embodiment, involved action and the module not necessarily present invention Necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment Point, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way Realize.Such as, device embodiment described above is only schematically, and the division of the most described unit is only one Logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or can To be integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed each other Coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, Can be being electrical or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit Time, can be stored in a computer-readable access to memory.Based on such understanding, technical scheme substantially or What person said the part contributing prior art or this technical scheme completely or partially can be with the form body of software product Revealing to come, this computer software product is stored in a memorizer, including some instructions with so that a computer equipment (can be for personal computer, server or the network equipment etc.) perform all or part of of method described in each embodiment of the present invention Step.And aforesaid memorizer includes: USB flash disk, read only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), portable hard drive, magnetic disc or CD.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completing instructing relevant hardware by program, this program can be stored in a computer-readable memory, memorizer May include that flash disk, read only memory (English: Read-Only Memory, be called for short: ROM), random access device (English: RAM), disk or CD etc. Random Access Memory, is called for short:.
Above the embodiment of the present invention is described in detail, specific case used herein to the principle of the present invention and Embodiment is set forth, and the explanation of above example is only intended to help to understand method and the core concept thereof of the present invention; Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, the most all can Change part, and the most above-mentioned, this specification content should not be construed as limitation of the present invention.

Claims (10)

1. a data access method, it is characterised in that apply and installing the first operating system and the terminal of the second operating system In, described method includes:
The access instruction for accessing target data is received, wherein, in described second operating system pair in the second operating system In the memory space answered, storage has the first data, the access of described target data to depend on described first data;
Described first data are sent to described first operating system, in order to according to described in described first operating system Second data are processed by one data, obtain described target data, and described second data are that described first operating system is corresponding Memory space in storage data;
Export described target data.
Method the most according to claim 1, it is characterised in that described reception in the second operating system is used for accessing target After the access instruction of data, and described described first data are sent to described first operating system before, described method Also include:
Operation security context instruction, described operation security context is sent to described first operating system through described second operating system Instruction is used for indicating operation security context;
At described first operating system security context.
Method the most according to claim 2, it is characterised in that described at described first operating system security context bag Include:
The instruction of described operation security context is received in described first operating system;
Close all nonsystematic processes under described first operating system, to respond the instruction of described operation security context.
Method the most according to claim 3, it is characterised in that described reception by described first operating system runs safety After environmental directives, and before all nonsystematic processes under described first operating system of described closedown, described method is also wrapped Include:
Whether output enters the confirmation of security context for prompting;
Receive the confirmation instruction inputted for described confirmation.
5. according to the method described in any one of Claims 1 to 4, it is characterised in that the described target data of described output includes:
Application data is sent to described first operating system through described second operating system;
At application data described in described first operating system, in order to export described mesh in described first operating system Mark data.
6. a terminal, it is characterised in that described terminal installs the first operating system and the second operating system, described terminal bag Include:
Receive unit, for receiving for accessing the access instruction of target data in the second operating system, wherein, described the In the memory space that two operating systems are corresponding, storage has the first data, the access of described target data to depend on described first number According to;
Transmitting element, for being sent to described first operating system by described first data, in order in described first operation system Processing the second data according to described first data in system, obtain described target data, described second data are described The data of storage in the memory space that one operating system is corresponding;
Output unit, is used for exporting described target data.
Terminal the most according to claim 6, it is characterised in that described transmitting element is additionally operable at described reception unit After two operating systems receive the access instruction for accessing target data, through described second operating system to described first behaviour Making system and send operation security context instruction, the instruction of described operation security context is used for indicating operation security context;
Described terminal also includes:
Running unit, at described first operating system security context.
Terminal the most according to claim 7, it is characterised in that described running unit includes:
First receives subelement, for receiving the instruction of described operation security context in described first operating system;
Close subelement, for closing all nonsystematic processes under described first operating system, to respond described operation safety Environmental directives.
Terminal the most according to claim 8, it is characterised in that described running unit also includes:
Output subelement, for receiving the instruction of described operation security context at described reception subelement in described first operating system Afterwards, and all nonsystematic processes under described closedown subelement described first operating system of closedown, to respond described operation Before security context instruction, whether output enters the confirmation of security context for prompting;
Second receives subelement, for receiving the confirmation instruction inputted for described confirmation.
10. according to the terminal described in any one of claim 6~9, it is characterised in that described output unit exports described number of targets According to mode include:
Application data is sent to described first operating system through described second operating system;
At application data described in described first operating system, in order to export described mesh in described first operating system Mark data.
CN201610694008.1A 2016-04-28 2016-08-19 Data access method and terminal Active CN106326018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/098443 WO2017185582A1 (en) 2016-04-28 2016-09-08 Data processing method, accessing method, and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610273635 2016-04-28
CN2016102736358 2016-04-28

Publications (2)

Publication Number Publication Date
CN106326018A true CN106326018A (en) 2017-01-11
CN106326018B CN106326018B (en) 2020-01-10

Family

ID=57743914

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610694008.1A Active CN106326018B (en) 2016-04-28 2016-08-19 Data access method and terminal
CN201610696406.7A Withdrawn CN106372527A (en) 2016-04-28 2016-08-19 Data processing method and terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610696406.7A Withdrawn CN106372527A (en) 2016-04-28 2016-08-19 Data processing method and terminal

Country Status (2)

Country Link
CN (2) CN106326018B (en)
WO (1) WO2017185582A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109491725A (en) * 2018-11-12 2019-03-19 火烈鸟网络(广州)股份有限公司 Application program can interact more extractions of root and system, storage medium, electronic equipment
WO2021196842A1 (en) * 2020-03-30 2021-10-07 Oppo广东移动通信有限公司 Data transmission method and apparatus, and wearable device and storage medium

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109857385B (en) * 2018-12-24 2022-01-28 四川长虹电器股份有限公司 Application program file packaging method, installation method and starting method
JP7200922B2 (en) * 2019-12-25 2023-01-10 トヨタ自動車株式会社 vehicle
CN114138343A (en) * 2020-09-04 2022-03-04 青岛海信移动通信技术股份有限公司 Terminal and terminal starting method
CN115344226B (en) * 2022-10-20 2023-03-24 亿咖通(北京)科技有限公司 Screen projection method, device, equipment and medium under virtualization management

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981887A (en) * 2011-09-06 2013-03-20 联想(北京)有限公司 Data processing method and electronic device
US20130254861A1 (en) * 2011-06-03 2013-09-26 Dell Products, Lp System and Method for Providing Access to an Information Handling System
US20130310034A1 (en) * 2010-10-18 2013-11-21 At&T Intellectual Property Ii, L.P. Systems, Methods, and Computer Program Products for Managing Access to Femtocell Coverage
CN103942503A (en) * 2014-04-28 2014-07-23 上海新储集成电路有限公司 Safe state switching system and switching method
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Safety system and safety storage method of intelligent terminal

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1258724C (en) * 2002-08-23 2006-06-07 英业达股份有限公司 Update backup system for homogeneous double-system data conversion and its method
US20070266444A1 (en) * 2004-12-03 2007-11-15 Moshe Segal Method and System for Securing Data Stored in a Storage Device
JP4631974B2 (en) * 2009-01-08 2011-02-16 ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
CN104468611B (en) * 2014-12-24 2017-09-08 宇龙计算机通信科技(深圳)有限公司 The data safety processing method and device switched based on dual system
CN105279455A (en) * 2015-09-23 2016-01-27 深圳市全智达科技有限公司 Security architecture of mobile device and running method of application

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130310034A1 (en) * 2010-10-18 2013-11-21 At&T Intellectual Property Ii, L.P. Systems, Methods, and Computer Program Products for Managing Access to Femtocell Coverage
US20130254861A1 (en) * 2011-06-03 2013-09-26 Dell Products, Lp System and Method for Providing Access to an Information Handling System
CN102981887A (en) * 2011-09-06 2013-03-20 联想(北京)有限公司 Data processing method and electronic device
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Safety system and safety storage method of intelligent terminal
CN103942503A (en) * 2014-04-28 2014-07-23 上海新储集成电路有限公司 Safe state switching system and switching method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109491725A (en) * 2018-11-12 2019-03-19 火烈鸟网络(广州)股份有限公司 Application program can interact more extractions of root and system, storage medium, electronic equipment
CN109491725B (en) * 2018-11-12 2022-12-27 火烈鸟网络(广州)股份有限公司 Interactive multi-opening method and system of application program, storage medium and electronic equipment
WO2021196842A1 (en) * 2020-03-30 2021-10-07 Oppo广东移动通信有限公司 Data transmission method and apparatus, and wearable device and storage medium

Also Published As

Publication number Publication date
CN106326018B (en) 2020-01-10
CN106372527A (en) 2017-02-01
WO2017185582A1 (en) 2017-11-02

Similar Documents

Publication Publication Date Title
CN106326018A (en) Data access method and terminal
EP2745541B1 (en) Method and apparatus for accessing virtual smart cards
US10020832B2 (en) Method of controlling SIM card and SD card and electronic device for implementing the same
KR102210995B1 (en) Apparatus and method for notifying information of security in electric device and computer-readable recording medium for the same
CN112287372B (en) Method and apparatus for protecting clipboard privacy
CN107797841B (en) Window control method and device, terminal equipment and storage medium
EP3155552B1 (en) Mechanisms for controlling tag personalization
CN103246483A (en) Method, system and intelligent terminal for scanning files
CN104281950A (en) Method and device for improving electronic payment safety
CN104700003B (en) A kind of file shell adding and hulling method, apparatus and system
CN106599115B (en) Data protection method, device and terminal
KR20150066876A (en) Method for controlling an user interface and an electronic device
US20180121181A1 (en) Binary merging device, method, and computer program
US20230006950A1 (en) Information sharing method, device and non-transitory computer readable storage medium thereof
CN106126377A (en) The method and device of system start-up
US9462408B2 (en) Information processing method and electronic device
CN116939616B (en) Equipment control method and device applied to telecommunication fraud prevention and electronic equipment
KR102368208B1 (en) File leakage prevention based on security file system and commonly used file access interface
US20160219053A1 (en) Intelligent terminal and interactive control system and interactive control method using same
CN110895456A (en) Data processing method, terminal, and computer-readable storage medium
CN111338899B (en) Monitoring method, terminal and storage medium
CN106303046A (en) Video broadcasting method and device
CN105740735A (en) Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof
CN204087190U (en) The disposal system of the enciphering/deciphering of data file
US20230350848A1 (en) File Application Method and Apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210224

Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703

Patentee after: Shenzhen Microphone Holdings Co.,Ltd.

Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong.

Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd.