CN103400086B - A kind of terminal - Google Patents

A kind of terminal Download PDF

Info

Publication number
CN103400086B
CN103400086B CN201310326660.4A CN201310326660A CN103400086B CN 103400086 B CN103400086 B CN 103400086B CN 201310326660 A CN201310326660 A CN 201310326660A CN 103400086 B CN103400086 B CN 103400086B
Authority
CN
China
Prior art keywords
processor
data
external equipment
private data
cpu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310326660.4A
Other languages
Chinese (zh)
Other versions
CN103400086A (en
Inventor
丁兆刚
冯耀辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201310326660.4A priority Critical patent/CN103400086B/en
Priority to PCT/CN2013/084354 priority patent/WO2015014014A1/en
Priority to PCT/CN2013/084356 priority patent/WO2015014015A1/en
Publication of CN103400086A publication Critical patent/CN103400086A/en
Application granted granted Critical
Publication of CN103400086B publication Critical patent/CN103400086B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention provides a kind of terminal, including: first processor, for processing the private data in described terminal;Second processor, for processing the non-private data in described terminal;Restricted external equipment, is connected to described first processor;Unrestricted class external equipment, is connected to described second processor;Wherein, described first processor or the second processor set up DMA transfer passage by configuration between forwarding interface and Peripheral Interface respectively, it is achieved described second processor or first processor and described restricted external equipment or the connection of unrestricted class external equipment and alternately.By technical scheme, the private data in terminal and non-private data can be made to be physically isolated process, it is ensured that private data cannot be obtained by unsafe application program, is effectively improved the safety of terminal.

Description

A kind of terminal
Technical field
The present invention relates to technical field of data security, in particular to a kind of terminal.
Background technology
As it is shown in figure 1, terminal is provided with a lot of peripheral hardware (i.e. external equipment 102), such as display screen, touch Screen, photographing unit, button, communication module, sensor assembly etc..In the related, be provided only with in terminal single Processor (CPU shown in Fig. 1), then this processor can be under the control of any application, outside arbitrarily If transmission data, it is also possible to receive the data from any peripheral hardware, then at some, there is too high authority when tag memory During application program, indefinite third party application of especially originating, then these application programs can control end easily In end, only processor, calls private data, is the most arbitrarily uploaded to other-end or server.Meanwhile, by In all data handled by this only processor all in identical memory space (RAM shown in Fig. 1 and ROM) in, thus above-mentioned application program is the most most probably by simple breaking techniques, can obtain in this memory space Take private data.Therefore, for the application program in terminal, particularly when some the third-party application journey in terminal Sequence, the when of being from some unique hackers or personal information dealer, will cause the user profile in terminal It is under the most unsafe state Deng private data.
So, how to solve the problem of data safety that single processor brings to terminal, become skill the most urgently to be resolved hurrily Art problem.
Summary of the invention
The present invention is based at least one of the problems referred to above, it is proposed that a kind of new technical scheme, in can making terminal Private data and non-private data be physically isolated process, it is ensured that private data cannot be by unsafe application journey Sequence obtains, and is effectively improved the safety of terminal.
In view of this, the present invention proposes a kind of terminal, including: first processor, for processing in described terminal Private data;Second processor, for processing the non-private data in described terminal;Restricted external equipment, connects To described first processor;Unrestricted class external equipment, is connected to described second processor;Wherein, at described first Reason device is realized and the connection of described restricted external equipment and mutual by the first Peripheral Interface, and by the first forwarding interface in fact Now with the connection of described second processor, and by joining between described first forwarding interface and described first Peripheral Interface Set up vertical DMA transfer passage, it is achieved the connection of described second processor and described restricted external equipment and alternately; And
Described second processor is realized and the connection of described unrestricted class external equipment and alternately by the second Peripheral Interface, and Realized and the connection of described first processor by the second forwarding interface, and by described second forwarding interface and described the Between two Peripheral Interfaces, DMA transfer passage is set up in configuration, it is achieved outside described first processor and described unrestricted class The connection of equipment is with mutual.
In this technical scheme, first pass through setting and be respectively used to process private data and multiple process of non-private data Device so that be effectively isolated physically between private data and non-private data, thus the most only avoid When using single processor, only any application just can be made easily from this single process by cracking in authority etc. Device obtains private data.Meanwhile, mutual by between first processor and the second processor, use docking port Configuration realizes setting up corresponding DMA transfer passage in first processor or the second processor, thus by first Reason device controls the second processor and the interaction of restricted external equipment, is controlled the first process by the second processor Device and the interaction of unrestricted class external equipment, it is ensured that private data and non-private data are in processes such as transmission, process Isolated, make the second processor cannot touch private data, it is to avoid the problem that private data is acquired and leaks.
In technique scheme, it is preferable that also include: the first storage device, corresponding to described first processor, The storage of private data is carried out for described first processor;Second storage device, corresponding to described second processor, The storage of non-private data is carried out for described second processor.
In this technical scheme, the processor for private data and non-private data uses separated depositing physically Storage device so that private data and non-private data, processing and store when, all realize isolation physically, from And obtain more preferable data safe effect.
In technique scheme, it is preferable that described restricted external equipment is used for: the data of transmission will be there is a need to All pass through in described first Peripheral Interface transmission extremely described first processor;Described first processor is used for: directly to private Ciphertext data processes, and by non-private data by described first forwarding interface transmission extremely described second processor;With And
Described unrestricted class external equipment is used for: the data that be there is a need to transmission are all passed through described second Peripheral Interface and passes Transport in described second processor;Described second processor is used for: directly process non-private data, and by private Ciphertext data is by described second forwarding interface transmission extremely described first processor.
In this technical scheme, owing to restricted external equipment and unrestricted class external equipment all cannot obtain the class of primary data Type, thus directly send data to first processor or the second processor being connected, and by first processor and second Processor carries out type identification to the data received respectively, so that it is guaranteed that private data is all carried out by first processor Reason, non-private data is all processed by the second processor, it is ensured that private data and non-private data physically every From, contribute to promoting the safety of terminal.
In technique scheme, it is preferable that described restricted external equipment is used for: the data of transmission will be there is a need to All pass through in described first Peripheral Interface transmission extremely described first processor;And described unrestricted class external equipment is used for: The data that be there is a need to transmission are all passed through in described second Peripheral Interface transmission extremely described second processor.
Wherein, described first processor is used for: directly process private data, and non-private data is passed through institute State the first forwarding interface transmission to described second processor;Described second processor is used for: receives and processes from described The non-private data of first processor, and be all forwarded to receiving the data from described unrestricted class external equipment Described first processor, to be processed private data therein by described first processor, and receives this at first The non-private data that reason device returns.
In this technical scheme, either from restricted external equipment or the data of unrestricted class external equipment, all By first processor, it can be carried out type identification and data distribution.Owing to first processor is specifically designed to process secret Data, are for the second processor, safer processor, thus all send all data to first Processor, even if non-private data therein is by other application programs (application journey should being sent to relative to script Sequence) obtain and utilize, also it is not result in the leakage of private information;As long as and ensure that private data will not be by second Processor processes, it becomes possible to is physically segregated unauthorized applications and obtains private data based on the second processor Take and utilize, ensuring that the data safety of terminal.
In technique scheme, it is preferable that the first Peripheral Interface on described first processor, the first forwarding interface And one_to_one corresponding between described restricted external equipment;And the second Peripheral Interface on described second processor, second One_to_one corresponding between forwarding interface and described unrestricted class external equipment.
In this technical scheme, by Peripheral Interface, forwarding interface, restricted external equipment/unrestricted class external equipment Between one_to_one corresponding so that outside setting up in first processor corresponding to each restricted external equipment/unrestricted class The special DMA transfer passage of portion's equipment, it is simple to the individual transmission of data, it is to avoid data cross and confusion occur.
In technique scheme, it is preferable that be provided with on described second processor and on described first processor The first transceiver interface that one forwarding interface connects one to one, the most described second processor is used for: is needing and is specifying In the case of restricted external equipment interacts, by the appointment corresponding to the described restricted external equipment specified One transceiver interface sends to described first processor and goes code;Described first processor is used for: according to connecing of receiving Logical instruction, determines the first forwarding interface and the first Peripheral Interface that described appointment the first transceiver interface is corresponding, and this Between one forwarding interface and the first Peripheral Interface, DMA transfer passage is set up in configuration;And
Connected one to one with the second forwarding interface on described second processor it is provided with on described first processor Two transceiver interface, the most described first processor is used for: interact at the unrestricted class external equipment needed with specify In the case of, by appointment the second transceiver interface corresponding to the described unrestricted class external equipment specified at described second Reason device sends and goes code;Described second processor is used for: according to going code of receiving, and determines described appointment The second forwarding interface that two transceiver interface are corresponding and the second Peripheral Interface, and connect at this second forwarding interface and the second peripheral hardware Between Kou, DMA transfer passage is set up in configuration.
In this technical scheme, interact by going code between first processor and the second processor, go forward side by side one Walk the control by first processor path close or disconnecting, it is achieved to the second processor and restricted external equipment Between the control of DMA transfer path, and control path close by the second processor or disconnecting, reality The now control to the DMA transfer path between first processor and unrestricted class external equipment, it is to avoid first processor Peripheral hardware is called with the second processor simultaneously, and prevents private data and the contact of the second processor further, Contribute to promoting the safety of terminal.
In technique scheme, it is preferable that described second processor is additionally operable to: complete and the described restriction specified Class external equipment mutual in the case of, by described appointment the first transceiver interface to described first processor send interrupt Instruction;Described first processor is additionally operable to: according to the interrupt instruction received, and disconnects described DMA transfer passage; And
Described first processor is additionally operable to: in the friendship of the path completed between the described unrestricted class external equipment specified In the case of Hu, send interrupt instruction by described appointment the second transceiver interface to described second processor;Described second Processor is additionally operable to: according to the interrupt instruction received, and disconnects described DMA transfer passage.
In this technical scheme, owing to first processor or the second processor are after receiving and going code, may be temporarily Stop self restricted or unrestricted class external equipment is called, and first allow requesting party to perform feature operation.Cause This, so that first processor or the second processor restore to the original state as early as possible, complete remaining process task, requesting party Should actively send interrupt instruction, it is ensured that first processor and the timely recovery of the second processor.
In technique scheme, it is preferable that also include: kind judging device, it is arranged on described restricted outside and sets On path between standby and described first processor, for the data from described restricted external equipment are carried out type Judge, and according to judged result, described data are added corresponding mark;Wherein, described first processor is used for: Receive from the data of described kind judging device time, if the mark of these data represents that it is private data, the most directly Connect process, if the mark of these data represents that it is non-private data, be then forwarded to described second processor;
And/or described kind judging device be arranged between described unrestricted class external equipment and described second processor logical Lu Shang, for carrying out type judgement to the data from described unrestricted class external equipment, and according to judged result to institute State data and add corresponding mark;Described second processor is used for: receiving the number from described kind judging device According to time, if the mark of these data represents that it is non-private data, the most directly process, if the mark of these data represents that it is Private data, then be forwarded to described first processor.
In this technical scheme, kind judging device the data from external equipment are carried out type identification, and without First processor performs the type identification operation, thus contributes to reducing requirement to first processor so that reduce by the One processor and the production cost of whole terminal, or be used for other increasingly complex processed calculating resource accordingly Journey, to improve treatment effeciency.
In technique scheme, it is preferable that also include: at least one first communication module, it is respectively connecting to described First processor and described second processor, for carrying out the mutual of private data with described first processor, and with institute State the second processor and carry out the mutual of non-private data.
In this technical scheme, when data uplink, then first processor and the second processor are utilized respectively the first communication Module carries out data transmission;When data downstream, directly downlink data can be carried out type knowledge by first communication module Not, thus data distribution is carried out according to recognition result so that private data and non-private data are respectively allocated to first Processor and the second processor, it is achieved data isolation physically, contribute to promoting the safety of terminal.
In technique scheme, it is preferable that also include: at least one second communication module, process with described first Device is connected and carries out data interaction;Wherein, described first processor is to from least one second communication module described Private data process, and the non-private data from least one second communication module described is transmitted to the most described Second processor processes.
In this technical scheme, owing to first processor is " safe processor " relative to the second processor, thus By second communication module is only connected with first processor so that private data is without going past the second processor, it is impossible to Got by the second processor by unauthorized applications, contribute to promoting the safety of terminal.Meanwhile, by by One processor carries out the type identification of data, contributes to reducing the configuration needs to second communication module, and correspondingly controls The manufacturing cost of terminal processed.
By above technical scheme, the private data in terminal and non-private data can be made to be physically isolated place Reason, it is ensured that private data cannot be obtained by unsafe application program, is effectively improved the safety of terminal.
Accompanying drawing explanation
Fig. 1 shows the structural representation of the terminal in correlation technique;
Fig. 2 shows the concrete structure schematic diagram of terminal according to an embodiment of the invention;
Fig. 3 shows the terminal structure schematic diagram comprising two or more processor according to an embodiment of the invention;
Fig. 4 shows the terminal structure comprising two or more processor signal according to another embodiment of the invention Figure;
Fig. 5 is the terminal structure schematic diagram under a kind of detailed description of the invention of the embodiment shown in Fig. 4;
Fig. 6 shows the terminal structure comprising two or more processor signal according to still another embodiment of the invention Figure;
Fig. 7 shows the concrete structure schematic diagram of terminal according to another embodiment of the invention;
Fig. 8 shows the attachment structure signal of single communication module according to an embodiment of the invention and processor Figure;
Fig. 9 shows the attachment structure signal of multiple communication module according to an embodiment of the invention and processor Figure;
Figure 10 is Fig. 8 or each communication module of embodiment illustrated in fig. 9 is connected knot with a kind of of more than 2 processors Structure schematic diagram;
Figure 11 is Fig. 8 or each communication module of embodiment illustrated in fig. 9 is connected with the another kind of of more than 2 processors Structural representation;
Figure 12 is the attachment structure schematic diagram under a kind of detailed description of the invention of embodiment illustrated in fig. 11;
Figure 13 shows that the attachment structure of single communication module according to another embodiment of the invention and processor is shown It is intended to;
Figure 14 shows that the attachment structure of multiple communication modules according to another embodiment of the invention and processor is shown It is intended to;
Figure 15 is Figure 13 or each communication module of embodiment illustrated in fig. 14 is connected with a kind of of more than 2 processors Structural representation;
Figure 16 is Figure 13 or each communication module of embodiment illustrated in fig. 14 connects with the another kind of of more than 2 processors Connect structural representation;
Figure 17 is the attachment structure schematic diagram under a kind of detailed description of the invention of embodiment illustrated in fig. 16.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, real with concrete below in conjunction with the accompanying drawings The present invention is further described in detail by mode of executing.It should be noted that in the case of not conflicting, the application Embodiment and embodiment in feature can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention, but, the present invention also may be used Implementing to use other to be different from other modes described here, therefore, protection scope of the present invention is not by following The restriction of disclosed specific embodiment.
Fig. 2 shows the concrete structure schematic diagram of terminal according to an embodiment of the invention.
As in figure 2 it is shown, the present invention proposes a kind of terminal, including: CPU1, for processing the private in described terminal Ciphertext data;CPU2, for processing the non-private data in described terminal;Restricted external equipment 102, is connected to institute State CPU1;Unrestricted class external equipment 104, is connected to described CPU2;Wherein, described CPU1 is by the first peripheral hardware Interface realizes and the connection of described restricted external equipment 102 and mutual, and by the first forwarding interface realization with described The connection of CPU2, and set up DMA by configuration between described first forwarding interface and described first Peripheral Interface Transmission channel, it is achieved the connection of described CPU2 and described restricted external equipment 102 and alternately;And
Described CPU2 is realized and the connection of described unrestricted class external equipment 104 and alternately by the second Peripheral Interface, and The connection with described CPU1 is realized by the second forwarding interface, and by outside described second forwarding interface and described second If DMA transfer passage is set up in configuration between interface, it is achieved described CPU1 and described unrestricted class external equipment 104 Connection and mutual.
In this technical scheme, first pass through setting and be respectively used to process private data and multiple process of non-private data Device so that be effectively isolated physically between private data and non-private data, thus the most only avoid When using single processor, only any application just can be made easily from this single process by cracking in authority etc. Device obtains private data.Meanwhile, mutual by between CPU1 and CPU2, use the configuration of docking port real Now CPU1 or CPU2 sets up corresponding DMA transfer passage, thus controlled CPU2 and limit by CPU1 The interaction of class external equipment 102 processed, controlled the CPU1 friendship with unrestricted class external equipment 104 by CPU2 Process mutually, it is ensured that private data and non-private data are isolated in processes such as transmission, process, make CPU2 to connect Contact private data, it is to avoid the problem that private data is acquired and leaks.
Specifically, for private data and non-private data, can be preset by manufacturer, it is also possible to by user according to certainly Oneself practical situation determines.Such as in the case of one, can using the data that are associated with some application program all as Private data or non-private data, such as will be with " address list ", " message registration ", " short message ", " postal Part " etc. the relevant data of application program, no matter reading or write, all can be regarded as private data, or will be with certain game The data that application is relevant, all as non-private data;Such as, in the case of another kind, the data of certain type can be made For private data or non-private data, such as using the interaction data with Web bank all as private data, and by software Renewal bag data as non-private data etc., it is also possible to comprise other differentiation mode, the most do not carry out a string Lift.
The multiple hardwares equipment that external equipment in terminal pre-sets in including terminal, except the display shown in Fig. 2 Screen (such as LCD, Liquid Crystal Display, liquid crystal display), touch screen (TW:Touch Window), outside photographing unit (CAMERA), button (KEY) etc., it is also possible to include such as: for wireless The communication module of mobile communication, sensor (SENSOR), WIFI(Wireless Fidelity, WLAN) Module, bluetooth (BT, Bluetooth) module, GPS(Global Position System, global positioning system) Module, NFC(Near field Communication, near-field communication) module, audio codec (AUDIO CODEC) etc..In this application, external equipment has been divided into outside restricted external equipment 102 and unrestricted class Equipment 104.Wherein, restricted external equipment 102 refers to determine that the outside that will necessarily produce private data sets Standby, such as touch screen, bluetooth module, GPS module etc., by being directly connected with CPU1, so that it is guaranteed that secret Data will not contact with CPU2;Unrestricted class external equipment 104 refers to temporarily not be found to produce private data External equipment, such as display screen, photographing unit etc., it may produce private data, simply temporarily not find, but lead to Cross the type identification to its data such as CPU2 or CPU1, it can be ensured that private data is finally carried out by CPU1 Reason, thus ensure the data safety of terminal.
In technique scheme, it is preferable that CPU1 and CPU2 can be with common storage space, i.e. RAM, ROM Deng, but in order to prevent malicious application from obtaining private data from shared memory space, the most in fig. 2, CPU1 employs RAM1 and ROM1, CPU2 and then employs RAM2 and ROM2, can physically by CPU1 with CPU2 use memory space separate mutually from.Use separated physically due to CPU1 and CPU2 Storage device so that private data and non-private data are processing and when storage, all realize physically every From, thus obtain more preferable data safe effect.
In technique scheme, it is preferable that described restricted external equipment 102 will be there is a need to the data of transmission all By in described first Peripheral Interface transmission to described CPU1;Private data is directly processed by described CPU1, And by non-private data by described forwarding interface transmission to described CPU2.Meanwhile, described unrestricted class external equipment The data that be there is a need to transmission are all passed through in described Peripheral Interface transmission extremely described CPU2 by 104;Described CPU2 is straight Connect and non-private data is processed, and by private data by described forwarding interface transmission to described CPU1.
In this technical scheme, owing to restricted external equipment 102 and unrestricted class external equipment 104 all cannot be learnt The type of data, thus directly send data to CPU1 or CPU2 being connected, and divided by CPU1 and CPU2 The other data to receiving carry out type identification, so that it is guaranteed that private data is all by CPU1 process, non-secret number According to all by CPU2 process, it is ensured that private data and the isolation physically of non-private data, contribute to promoting eventually The safety of end.
In technique scheme, it is preferable that described restricted external equipment 102 is used for: transmission will be there is a need to Data are all passed through in described Peripheral Interface transmission extremely described CPU1;And described unrestricted class external equipment 104 is used for: The data that be there is a need to transmission are all passed through described second Peripheral Interface transmit to CPU2;Described CPU1 is used for: Directly private data is processed, and by non-private data by described forwarding interface transmission to described CPU2;Institute State CPU2 for: receive and process the non-private data from described CPU1, and will receive from described non- The data of restricted external equipment 104 are all forwarded to described CPU1, with by described CPU1 to private data therein Process, and receive the non-private data that this CPU1 returns.
In this technical scheme, either from restricted external equipment 102 or unrestricted class external equipment 104 Data, can be carried out type identification and data distribution by CPU1 to it.Owing to CPU1 is specifically designed to process secret Data, are for CPU2, safer processor, thus all data are all sent to CPU1, Even if non-private data therein is obtained by other application programs (application program relative to being originally sent to) And utilization, also it is not result in the leakage of private information;As long as and ensure that private data will not be by CPU2 Reason, it becomes possible to be physically segregated unauthorized applications based on CPU2 to the acquisition of private data and utilization, thus really Protect the data safety of terminal.
In technique scheme, it is preferable that the first Peripheral Interface, the first forwarding interface and the institute on described CPU1 State one_to_one corresponding between restricted external equipment 102;And the second Peripheral Interface on described CPU2, second forward One_to_one corresponding between interface and described unrestricted class external equipment 104.
In this technical scheme, outside Peripheral Interface, forwarding interface, the unrestricted class of restricted external equipment 102/ One_to_one corresponding between equipment 104 so that set up corresponding to each restricted external equipment 102/ non-in CPU1 The special DMA transfer passage of restricted external equipment 104, it is simple to the individual transmission of data, it is to avoid occur data to hand over Fork and confusion.
In technique scheme, it is preferable that be provided with on described CPU2 and connect with the first forwarding on described CPU1 The first transceiver interface that mouth connects one to one, the most described CPU2 is used for: set with the restricted outside specified at needs In the case of standby 102 interact, by receiving corresponding to the appointment first of the described restricted external equipment 102 specified Send out interface to go code to described CPU1 transmission;Described CPU1 is used for: according to going code of receiving, determine The first forwarding interface that described appointment the first transceiver interface is corresponding and the first Peripheral Interface, and at this first forwarding interface and Between first Peripheral Interface, DMA transfer passage is set up in configuration;And
It is provided with the second transmitting-receiving connected one to one with the second forwarding interface on described CPU2 on described CPU1 to connect Mouthful, the most described CPU1 is used for: in the case of the unrestricted class external equipment 104 needed with specify interacts, By sending to described CPU2 corresponding to appointment second transceiver interface of the described unrestricted class external equipment 104 specified Go code;Described CPU2 is used for: according to going code of receiving, and determines described appointment the second transceiver interface pair The second forwarding interface answered and the second Peripheral Interface, and configure between this second forwarding interface and second Peripheral Interface and build Vertical DMA transfer passage.
In this technical scheme, interact by going code between CPU1 and CPU2, and pass through further The control that path is closed or disconnects by CPU1, it is achieved to the DMA between CPU2 and restricted external equipment 102 The control of transmission channel, and control path being closed by CPU2 or disconnecting, it is achieved to CPU1 and non-limit The control of the DMA transfer path between class external equipment 104 processed, it is to avoid peripheral hardware is entered by CPU1 and CPU2 simultaneously Row calls, and prevents contacting of private data and CPU2 further, contributes to the safety of lifting terminal.
In technique scheme, it is preferable that described CPU2 is additionally operable to: complete with described specify restricted outside Portion's equipment 102 mutual in the case of, by described appointment the first transceiver interface to described CPU1 send in severed finger Order;Described CPU1 is additionally operable to: according to the interrupt instruction received, and disconnects described DMA transfer passage;And
Described CPU1 is additionally operable to: in the friendship of the path completed between the described unrestricted class external equipment 104 specified In the case of Hu, send interrupt instruction by described appointment the second transceiver interface to described CPU2;Described CPU2 is also For: according to the interrupt instruction received, disconnect described DMA transfer passage.
In this technical scheme, owing to CPU1 or CPU2 is after receiving and going code, may be suspended self For calling of restricted or unrestricted class external equipment 104, and requesting party is first allowed to perform feature operation.Therefore, So that CPU1 or CPU2 restores to the original state as early as possible, completing remaining process task, requesting party should actively send Interrupt instruction, it is ensured that the timely recovery of CPU1 and CPU2.
Below it is all to be to describe and analyze terminal to comprise the situation of an a CPU1 and CPU2 carry out, but In order to obtain higher disposal ability, or reach more excellent safe effect, terminal can comprise greater number CPU1 and/or greater number of CPU2, below in conjunction with Fig. 3-5, so that terminal to include CPU1, CPU1A The processor processed for private data with CPU1B etc. and CPU2, CPU2A and CPU2B etc. are for non-private As a example by the processor that ciphertext data processes, the terminal structure in the case of greater number of processor and process strategy are carried out Explanation.Certainly, it should be appreciated by those skilled in the art: multiple for private data for terminal only comprises The processor processed or the situation only comprising multiple processor processed for non-private data, and processor quantity More often, its catenation principle is actually identical, will not be described in great detail in the application.
Although it should be noted that terminal existing a lot of restricted external equipment 102 and unrestricted class external equipment 104, but each restricted external equipment 102, company between unrestricted class external equipment 104 and CPU1, CPU2 Access node structure and data transfer mode, the most similar, thus in order to clearly to describe it concrete Attachment structure and data transmission policies, below will be with some restricted external equipment 102 and non-limit in each embodiment It is described in detail as a example by class external equipment 104 processed.And those skilled in the art it is clearly understood that: below based on Attachment structure described by " restricted external equipment 102 " and " unrestricted class external equipment 104 " and data transmission Strategy, actually display can be outside any restricted external equipment 102 terminal and any unrestricted class Equipment 104.
It addition, the various circuit switching control modes mentioned in above technical scheme, all can apply to each skill following In art scheme, it is achieved to the interactive controlling between CPU and external equipment.
Embodiment one
For processing in multiple CPU of private data/non-private data, using certain CPU as with restricted outside " relaying " of equipment 102, other CPU are then by should " relaying " realize and restricted external equipment 102 Mutual;Meanwhile, using certain CPU as " relaying " with unrestricted class external equipment 104, and other CPU Then by should " relaying " realize with unrestricted class external equipment 104 mutual.
Specifically, as shown in Figure 3, it is assumed that between CPU1 and restricted external equipment 102 set up connect, and its He, for processing multiple CPU of private data, is connected by " series connection " mode with CPU1;Simultaneously, it is assumed that Set up between CPU2 and unrestricted class external equipment 104 and connect, and other are for processing the multiple of non-private data CPU is connected by " in parallel " mode.
Mutual with restricted external equipment 102:
For " series connection " mode: when CPU1 needs mutual with restricted external equipment 102, then CPU1 is direct Data interaction is carried out with restricted external equipment 102;When CPU1A needs to hand over restricted external equipment 102 Time mutually, then carried out data forwarding by CPU1;When CPU1B needs to interact with restricted external equipment 102 Time, then carried out data forwarding by CPU1A, CPU1.
For " in parallel " mode: when CPU2 needs mutual with restricted external equipment 102, then CPU2 is permissible By sending request to CPU1, CPU1 configured by port, it is established that CPU2 and restricted external equipment DMA transfer passage between 102, thus realize data interaction;When CPU2A needs and restricted external equipment 102 when interacting, then carried out data forwarding successively by CPU2 and CPU1;Outside CPU2B needs and is restricted When portion's equipment 102 interacts, also carried out data forwarding successively by CPU2 and CPU1.
Mutual with unrestricted class external equipment 104:
For " series connection " mode: when CPU1 needs mutual with unrestricted class external equipment 104, then CPU1 can By sending request to CPU2, CPU2 to be configured by port, it is established that CPU1 sets outside unrestricted class DMA transfer passage between standby 104, thus realize data interaction;When CPU1A needs and outside unrestricted class When equipment 104 interacts, the most first sending to CPU1, then CPU1 sends request to CPU2, sets up DMA Transmission channel carries out data interaction;When CPU1B needs to interact with unrestricted class external equipment 104, then first Being forwarded to CPU1 via CPU1A, then CPU1 sends request to CPU2, sets up DMA transfer passage and carries out Data interaction.
For " in parallel " mode: when CPU2 needs mutual with unrestricted class external equipment 104, then CPU2 can Data interaction is carried out with unrestricted class external equipment 104 with direct;When CPU2A needs and unrestricted class external equipment 104 when interacting, then carried out data forwarding by CPU2;When CPU2B needs and unrestricted class external equipment 104 When interacting, also carried out data forwarding by CPU2.
Certainly, the connected mode of " in parallel ", even part can also be used to adopt for the CPU of private data process The connected mode of " in parallel " is used by " series connection ", part;And the CPU being used for the process of non-private data can also The connected mode of " series connection ", even part is used to use " series connection ", part to use the connected mode of " in parallel ", This is apparent from.But owing to only CPU1 is directly connected with restricted external equipment 102, only has CPU2 straight Connect and be connected with unrestricted class external equipment 104, if thus other any CPU hope and restricted external equipment 102 Or unrestricted class external equipment 104 is mutual, being finally required for being carried out forwarding by CPU1 or CPU2 can realize.
Mutual except with external equipment (including restricted external equipment 102 and unrestricted class external equipment 104), When interacting between multiple CPU, it is also possible to need the data of other CPU to forward.Such as when CPU1 with When CPU2 or CPU1A interacts, then direct interaction;When CPU1 Yu CPU1B interacts, then CPU1A is needed to forward;When CPU2 Yu CPU1, CPU2A or CPU2B interact, the most directly hand over Mutually;When CPU2A Yu CPU2B interacts, then CPU2 is needed to forward.
Additionally, on the basis of " in parallel ", also likely to be present between CPU2A with CPU2B to be connected and (figure do not show Go out), it is possible to realize directly data interaction between the two.Further, when CPU more, all of Between CPU, the most all may directly perform data interaction, and without the forwarding of other CPU.
Embodiment two
In the multiple CPU for processing private data, each CPU all " in parallel " is to restricted external equipment 102, and directly interact, without other CPU as " relaying " with restricted external equipment 102.
Specifically, as shown in Figure 4, CPU1, CPU1A, CPU1B of being used for processing private data are respectively connecting to Restricted external equipment 102;Meanwhile, in CPU2, CPU2A, the CPU2B processing non-private data, only CPU2 is connected directly to unrestricted class external equipment 104.
Meanwhile, between multiple CPU with same treatment function, " the string mentioned in above-mentioned word can be used Connection " and/or " in parallel " mode.As a kind of specific embodiment, Fig. 4 shows: be used for processing private data CPU1, CPU1A, CPU1B have employed " series connection " mode, and for process non-private data CPU2, CPU2A, CPU2B have employed " in parallel " mode.
(1) mutual with restricted external equipment 102
When a part of CPU is connected to restricted external equipment 102, the CPU such as processed for private data, Then these CPU can directly interact with restricted external equipment 102, including transmission and the reception of data;And Other CPU being directly connected to restricted external equipment 102, are the most now process for non-private data CPU, when these CPU need to interact with restricted external equipment 102, need to relate to these CPU with It is connected directly to the interaction between the CPU of restricted external equipment 102.
1) processing procedure of data uplink
Assuming that each CPU all can directly carry out data interaction (company concrete not shown in figure with other any CPU Connect relation), then CPU2A or CPU2B directly can be connected directly to restricted external equipment 102 to certain CPU sends request so that it is by port configuration set up CPU2A or CPU2B and restricted external equipment 102 it Between DMA transfer passage, such as by CPU1A or CPU1B receive request and perform port configuration, with set up on DMA transfer passage between CPU2A or CPU2B and the restricted external equipment 102 stated.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, ratio as shown in Figure 4, CPU2A or CPU2B is merely able to carry out direct interaction with CPU2, then CPU2A or CPU2B can send data to CPU2, is sent request by CPU2 to CPU1, and CPU1 sets up CPU2 and external equipment 102 by port configuration Between DMA transfer passage, then data are sent directly to restricted external equipment 102 by CPU2.
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to the other types specified CPU interact, than as it is shown in figure 5, energy adjacent as same type of CPU, CPU2 and CPU2A Enough direct interactions, and can also be with CPU1 direct interaction as different types of CPU, CPU2;Similarly, then CPU2A can directly with adjacent CPU2, CPU2B direct interaction, additionally it is possible to CPU1A direct interaction, then CPU2A can by adjacent C PU indirect communication such as CPU2 to CPU1, and be further transmitted to limit by CPU1 Class external equipment 102, it is also possible to by being directly transferred to CPU1A, and be further transmitted to restricted by CPU1A External equipment 102.Now, CPU2, CPU2A, CPU2B can by corresponding CPU1, CPU1A, CPU1B sends request so that it is set up corresponding DMA transfer passage by port configuration, it is achieved CPU2, CPU2A, CPU2B are mutual with restricted external equipment 102.
2) processing procedure of data downstream
A) there is not the DMA transfer passage having built up, then need data to be transmitted by restricted external equipment 102 To the CPU being joined directly together, such as transmit to CPU1A, be then further transmitted to target CPU.Such as work as restriction After class external equipment 102 sends data to CPU1A: in the case of the first, CPU1A finds that these data are non- Private data, but unclear by which CPU process;In the case of the second, CPU1A finds that these data are non- Private data, and know should be by which CPU process.
In above-mentioned two situations, it is still necessary to be analyzed according to the concrete connection of CPU:
Assuming that each CPU all can directly carry out data interaction (company concrete not shown in figure with other any CPU Connect relation), then for the first situation, it is non-for processing that CPU1A can directly send data to any one The CPU of private data, such as CPU2A, then decided specific aims CPU by CPU2A;For the second Situation, CPU1A can directly send data to target CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, as shown in Figure 4, CPU1A can only for ratio Enough and CPU1 and CPU1B carries out direct interaction, then CPU1A can send data to CPU1, by CPU1 Send to CPU2, and be forwarded to target CPU by CPU2.
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to the other types specified CPU interact, than as it is shown in figure 5, energy adjacent as same type of CPU, CPU1 and CPU1A Enough direct interactions, and can also be with CPU2 direct interaction as different types of CPU, CPU1;Similarly, then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, then When CPU1A receives the non-private data that restricted external equipment 102 sends, can be adjacent by CPU1 etc. CPU indirect communication is to being used for processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
B) there is the DMA transfer passage having built up.
Assuming that as shown in Figure 3 and Figure 4, set up in CPU1 and have between CPU2 and restricted external equipment 102 DMA transfer passage.When restricted external equipment 102 needs transmission to CPU2, this DMA can be directly utilized Transmission channel is transmitted;When restricted external equipment 102 needs transmission to CPU2A or CPU2B, Ke Yitong Cross DMA transfer passage to send to CPU2, and forwarded by CPU2, it is also possible to send to being directly connected to In the case of CPU(is for Fig. 3, it is CPU1;Or in the case of for Fig. 4, including CPU1, CPU1A Or CPU1B), then it is forwarded to concrete target CPU by this CPU.
Assuming that as it is shown in figure 5, each CPU being the most directly connected with restricted external equipment 102, all pass through in correspondence The CPU being joined directly together with restricted external equipment 102 in set up DMA transfer passage, thus restricted outside Equipment 102 by the selection to DMA transfer passage, can directly send data to target CPU of correspondence (CPU2, CPU2A or CPU2B).
(2) mutual with unrestricted class external equipment 104
As shown in Figure 6, when a part of CPU is connected to unrestricted class external equipment 104, such as non-secret The CPU that data process, then these CPU can directly interact with unrestricted class external equipment 104, including number According to transmission and reception;And other CPU not being directly connected to unrestricted class external equipment 104, it is the most now The CPU processed for private data, when these CPU need to interact with unrestricted class external equipment 104, Need to relate to the interaction between these CPU and the CPU being connected directly to unrestricted class external equipment 104.
Owing to detailed process is connected to restricted outside with all CPU processed for private data shown in Fig. 4 Equipment 102 is similar, then here is omitted.
As it is shown in fig. 7, in each technical scheme of the application, it is also possible to including: kind judging device 105, if Put on the path between described restricted external equipment 102 and described CPU1, for from described restricted outside The data of portion's equipment 102 carry out type judgement, and according to judged result, described data are added corresponding mark;Its In, described CPU1 is used for: when receiving the data from described kind judging device 105, if the mark of these data Know and represent that it is private data, the most directly process, if the mark of these data represents that it is non-private data, be then forwarded to Described CPU2;
And/or described kind judging device 105 is arranged between described unrestricted class external equipment 104 and described CPU2 Path on, for the data from described unrestricted class external equipment 104 are carried out type judgement, and according to judgement Described data are added corresponding mark by result;Described CPU2 is used for: receiving from described kind judging device 105 data time, if the mark of these data represents that it is non-private data, the most directly process, if the mark of these data Represent that it is private data, be then forwarded to described CPU1.
In this technical scheme, kind judging device 105 data from external equipment are carried out type identification, and Perform the type identification operation without CPU1, thus contribute to reducing the requirement to CPU1 so that reduce CPU1 With the production cost of whole terminal, or it is used for other increasingly complex processing procedures by calculating resource accordingly, to improve Treatment effeciency.
In each technical scheme shown in Fig. 2 to Fig. 6, actually can meaning external equipment in office with corresponding Kind judging device 105 is added, for the data from external equipment are carried out type identification, to realize between CPU Corresponding data distribution.And other data transfer modes in addition and strategy, all with each technical scheme phase above-mentioned With, then here is omitted.
Described above is all the data interaction between CPU and external equipment, and for terminal, also includes And the data interaction between other-end or server, then relate to the up-downgoing data between CPU and communication module and hand over Mutually.
As shown in Figure 8, it is assumed that CPU1 is used for processing private data, CPU2 is used for processing non-private data, and leads to Letter module 106 is for the transmitting-receiving of up-downgoing data.So, for upstream data, owing to communication module 106 connects respectively Be connected to CPU1 and CPU2, thus from the data of CPU1 be exactly private data, data from CPU2 be exactly Non-private data;For downlink data, communication module 106 directly the data received are carried out type identification, if For private data, then it is directly transferred to CPU1, if non-private data, is then directly transferred to CPU2.
By communication module 106, data are carried out type identification so that private data and non-private data are respectively allocated To CPU1 and CPU2, it is achieved data isolation physically, contribute to promoting the safety of terminal.
Meanwhile, in order to promote safety further, it is also possible to add a function for communication module 106, i.e. work as communication When module 106 is mutual with CPU1, cut off the connection with CPU2, when communication module 106 is mutual with CPU2, Cut off the connection with CPU1;Or, between communication module 106 and CPU1, CPU2, add circuit switch module (not shown in figure, being similar to the kind judging device 105 shown in Fig. 7), by circuit switch module self or CPU1, CPU2 are controlled, it is achieved when communication module 106 is mutual with CPU1, cut off the company with CPU2 Connect, when communication module 106 is mutual with CPU2, cut off the connection with CPU1.By the company's on and off to circuit Open so that physically separate private data and non-private data, contribute to promoting further the safety of terminal.
Can also there is multiple communication module 106 in terminal, ratio is as it is shown in figure 9, include communication module 106A and lead to Letter module 106B, is both respectively connecting to CPU1 and CPU2, then for communication module 106A or communication module For 106B, it is actually identical with the communication module 106 shown in Figure 10, can use for reference and use shown in Fig. 8 The process strategy of communication module 106 correspondence, thus here is omitted.
Similar situation shown in Fig. 3-6, when terminal exists multiple CPU for processing private data and/or multiple When the CPU processing non-private data, communication module 106(described in Fig. 8-9 is used for illustrating, logical Letter module 106A and communication module 106B are same), above-mentioned multiple CPU can take following strategy.
Wherein, the most still include CPU1, CPU1A and CPU1B for the CPU processing private data, be used for Process as a example by the CPU of non-private data includes CPU2, CPU2A and CPU2B and illustrate.
Embodiment one
Communication module 106 is only connected to one for processing the CPU of private data and one for processing non-secret number According to CPU, be such as connected to CPU1 and CPU2.
So, during for data uplink, private data/non-private data is directly transmitted to the mould that communicates by CPU1/CPU2 Block 106, and CPU1A, CPU1B need to transmit to CPU1 private data, and it is forwarded to, by CPU1, the mould that communicates Block 106;Similarly, CPU2A, CPU2B need to transmit to CPU2 non-private data, and are forwarded by CPU2 To communication module 106.
During for data downstream, all of private data is all sent to CPU1 by communication module 106, by all of non- Private data all sends to CPU2, and wherein, in the case of the first, communication module 106 can be by the solution to data The modes such as analysis, it is thus understood that for processing target CPU of these data, then communication module 106 can be added on the data Corresponding mark, thus after CPU1 or CPU2 receives these data, can determine according to the mark added Corresponding target CPU, to realize forwarding;In the case of the second, communication module 106 cannot learn the data received Target CPU, then communication module 106 directly transmits it to CPU1 or CPU2, by CPU1 or CPU2 from Row determines corresponding target CPU.
Based on the different connected modes between multiple CPU, when carrying out data transmission between CPU, difference can be there is Situation.As shown in Figure 10, CPU1, CPU1A and CPU1B use the mode of " series connection " to ratio, CPU2, CPU2A and CPU2B use the mode of " in parallel ", then need to send upstream data as CPU1B Or when receiving downlink data, need to transmit via the two-stage of CPU1A and CPU1, can realize;And for For CPU2A and CPU2B, the Primary Transmit of CPU2 is the most only needed to realize.
Certainly, it is similar to description during Fig. 3-6, for any type of multiple CPU, as being used for processing private data Or the CPU of non-private data, all can use " series connection " or the connected mode of " in parallel " according to actual needs, The mode that even can simultaneously use " series connection " and " in parallel " is attached.
Embodiment two
As shown in figure 11, communication module 106 can also be respectively connecting to all of CPU, then for upstream data, Each CPU can be directly transferred to communication module 106, and without performing forwarding by other CPU, is conducive to Reduce data transmission delay.And for downlink data, if communication module 106 will be understood that concrete target CPU, Then can be directly transferred to this target CPU;If communication module 106 can not recognize concrete target CPU, then Take following manner:
In the case of the first, communication module 106 carries out type identification to downlink data, and according to recognition result, by number According to transmission to certain acquiescence or the arbitrary CPU for processing same type data, such as by private data default transport To CPU1, non-private data default transport is to CPU2, or arbitrarily transmits private data to CPU1, CPU1A Or CPU1B, non-private data is arbitrarily transmitted to CPU2, CPU2A or CPU2B, then by receiving under this The CPU of row data further determines that and is forwarded to concrete target CPU.
In the case of the second, communication module 106 does not carry out type identification to downlink data, then directly passed by downlink data Transport to certain acquiescence or arbitrary CPU, and directly carried out type identification by this CPU or be forwarded to other CPU and carry out Type identification, then according to recognition result, sends to target CPU.Specifically, such as default transport is to CPU1, Then carried out type identification by CPU1 (or to specify that all downlink datas are carried out type identification by CPU1A, then need Transmit to CPU1A and carry out type identification), and according to recognition result by downlink data transmission to concrete target CPU。
Above-mentioned in the case of each, actually further comprises the data interaction between dissimilar CPU, the most also Comprise following multiple situation:
Assuming that each CPU all can directly carry out data interaction (company concrete not shown in figure with other any CPU Connect relation).Assuming that CPU1A have received non-private data, if then CPU1A does not knows the mesh that these data are corresponding Mark CPU, then can directly send data to any one for the CPU processing non-private data, such as CPU2A, is then decided specific aims CPU by CPU2A;If CPU1A knows the target that these data are corresponding CPU, then can directly send data to target CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, as shown in figure 11, CPU1A is only for ratio Can carry out direct interaction with CPU1 and CPU1B, then CPU1A can send data to CPU1, by CPU1 sends to CPU2, and is forwarded to target CPU by CPU2.
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to the other types specified CPU interact, ratio as shown in figure 12, adjacent as same type of CPU, CPU1 and CPU1A, Can direct interaction, and can also be with CPU2 direct interaction as different types of CPU, CPU1;Similarly, Then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, Then when CPU1A receives the non-private data that communication module 106 sends, can be by adjacent C PU such as CPU1 Indirect communication is to being used for processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
In the technical scheme described by Fig. 8-12, communication module 106 is respectively connecting to for processing private data CPU and for processing the CPU of non-private data;And in following Figure 13-17, each communication module 106(or Communication module 106A shown in Figure 16 and communication module 106B) all it is only attached to a type of CPU, such as It is only connected to the CPU for processing private data, or is only connected to the CPU for processing non-private data.
Specifically, as shown in figure 13, communication module 106 is only connected to CPU1, then for upstream data, and CPU1 Can directly interact with communication module 106, CPU2 then need CPU1 as relaying, indirectly with the mould that communicates Block 106 interacts.For downlink data, in the case of the first, downlink data can be carried out by communication module 106 Type identification, and according to recognition result, downlink data is added mark, then all send to CPU1, by CPU1 According to the mark on downlink data, determine and process voluntarily, or send to CPU2 process;The second situation Under, communication module 106 does not carries out type identification to downlink data, then after it being carried out type identification by CPU1, right Private data directly processes, and non-private data is forwarded to CPU2 process.
Certainly, communication module 106 can also be connected to CPU2, CPU2 directly hand over communication module 106 Mutually, and CPU1 must be using CPU2 as " relaying ", and indirect realization is mutual with communication module 106.But due to CPU2 is used for processing non-private data, is unsafe CPU for CPU1, because private data can be CPU2 circulates, unauthorized applications may be caused therefrom to steal.Therefore, in order to obtain safer answering With environment, it is more likely to directly be connected communication module 106 with CPU1.In each technical scheme following, will be with Communication module 106 illustrates as a example by being connected with CPU1, but based on foregoing description, this obviously can not be managed Solution becomes a kind of and limits or limit.
As shown in figure 14, when terminal exists multiple communication module, such as include communication module 106A and the mould that communicates Block 106B, then be respectively connecting to CPU1.So, for communication module 106A or communication module 106B, It is identical with the communication module 106 shown in Figure 12, corresponding connected mode can be used or process strategy, herein Repeat no more.
Similar situation shown in Fig. 8-12, when terminal exists multiple CPU for processing private data and/or many Individual when the CPU processing non-private data, communication module 106(described in Figure 13-14 is used for lifting Example, communication module 106A and communication module 106B are same), above-mentioned multiple CPU can take following plan Slightly.
Wherein, the most still include CPU1, CPU1A and CPU1B for the CPU processing private data, be used for Process as a example by the CPU of non-private data includes CPU2, CPU2A and CPU2B and illustrate.
Embodiment one
Communication module 106 is only connected to one for processing the CPU of private data or one for processing non-secret number According to CPU, be such as connected to CPU1.
So, during for data uplink, CPU1 directly interacts with communication module 106, and other are all of CPU is required to directly or indirectly by needing the data sent to transmit to CPU1, CPU1 be forwarded to communication module 106, it is achieved the up transmission of data.
During for data downstream, in the case of the first, communication module 106 can by modes such as the parsings to data, Recognize target CPU for processing these data, then communication module 106 can add corresponding mark on the data Know, thus after CPU1 receives these data, corresponding target CPU can be determined according to the mark added, To realize forwarding;In the case of the second, communication module 106 cannot learn target CPU of the data received, then lead to Letter module 106 directly transmits it to CPU1, CPU1 determine corresponding target CPU, certainly, communication voluntarily The type of data can be identified by module 106, after determining that it is private data or non-private data, just sends To CPU1, or communication module 106 does not perform type identification operation, but is transmitted directly to CPU1, by CPU1 The data received are carried out type identification.
Based on the different connected modes between multiple CPU, when carrying out data transmission between CPU, difference can be there is Situation.As shown in figure 15, CPU1, CPU1A and CPU1B use the mode of " series connection " to ratio, CPU2, CPU2A and CPU2B use the mode of " in parallel ", then need to send upstream data as CPU1B Or when receiving downlink data, need to transmit via the two-stage of CPU1A and CPU1, can realize;And for For CPU2A and CPU2B, the Primary Transmit of CPU2 is the most only needed to realize.
Certainly, it is similar to description during Figure 10-12, for any type of multiple CPU, as being used for processing secret number According to or the CPU of non-private data, all can use " series connection " or the connection side of " in parallel " according to actual needs Formula, it might even be possible to simultaneously use the mode of " series connection " and " in parallel " to be attached.
Embodiment two
As shown in figure 16, communication module 106 can also be respectively connecting to all CPU of same type, such as simultaneously It is connected to CPU1, CPU1A and CPU1B that all CPU(for processing private data refer specifically in figure).
So, for upstream data, each CPU for processing private data can be directly transferred to the mould that communicates Block 106, and without performing forwarding by other CPU, advantageously reduce data transmission delay, and be used for processing non-private The CPU of ciphertext data, then remain a need for forwarding the data to certain for the CPU processing private data, such as CPU1, The up transmission of data can be realized.
And for downlink data, if communication module 106 will be understood that concrete target CPU, it is assumed that these data are private Ciphertext data, then can be directly transferred to this target CPU, it is assumed that these data are non-private data, then to this non-secret number After adding mark, being directly transferred to certain this CPU of the CPU(being connected can be acquiescence or arbitrary, such as Acquiescence all sends to CPU1, or randomly chooses a connected CPU), it is assumed that for CPU1, then by CPU1 It is forwarded to corresponding target CPU according to the mark in data;If communication module 106 can not recognize concrete target CPU, then take following manner:
In the case of the first, communication module 106 carries out type identification to downlink data, and according to recognition result, by number According to transmission to certain acquiescence or the arbitrary CPU for processing same type data, such as by private data default transport To CPU1, after non-private data is added corresponding type identification, default transport is to CPU1, or is appointed by private data Meaning transmission, to CPU1, CPU1A or CPU1B, is arbitrarily transmitted after non-private data is added corresponding type identification To CPU1, CPU1A or CPU1B, then further determined that by the CPU receiving this downlink data and be forwarded to Concrete target CPU.
In the case of the second, communication module 106 does not carry out type identification to downlink data, then directly passed by downlink data Transport to certain acquiescence or arbitrary CPU, and directly carried out type identification by this CPU or be forwarded to other CPU and carry out Type identification, then according to recognition result, sends to target CPU.Specifically, such as default transport is to CPU1, Then carried out type identification by CPU1 (or to specify that all downlink datas are carried out type identification by CPU1A, then need Transmit to CPU1A and carry out type identification), and according to recognition result by downlink data transmission to concrete target CPU。
Above-mentioned in the case of each, actually further comprises the data interaction between dissimilar CPU, the most also Comprise following multiple situation:
Assuming that each CPU all can directly carry out data interaction (company concrete not shown in figure with other any CPU Connect relation).Assuming that CPU1A have received non-private data, if then CPU1A does not knows the mesh that these data are corresponding Mark CPU, then can directly send data to any one for the CPU processing non-private data, such as CPU2A, is then decided specific aims CPU by CPU2A;If CPU1A knows the target that these data are corresponding CPU, then can directly send data to target CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, as shown in figure 16, CPU1A is only for ratio Can carry out direct interaction with CPU1 and CPU1B, then CPU1A can send data to CPU1, by CPU1 sends to CPU2, and is forwarded to target CPU by CPU2.
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to the other types specified CPU interact, ratio as shown in figure 17, adjacent as same type of CPU, CPU1 and CPU1A, Can direct interaction, and can also be with CPU2 direct interaction as different types of CPU, CPU1;Similarly, Then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, Then when CPU1A receives the non-private data that communication module 106 sends, can be by adjacent C PU such as CPU1 Indirect communication is to being used for processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
Technical scheme being described in detail above in association with accompanying drawing, it is contemplated that in correlation technique, terminal only comprises list Individual CPU, the operation such as the most all data all are carried out processing by this CPU, storage, easily by any application therefrom Obtain private data easily, cause the leakage of privacy of user.Therefore, present applicant proposes a kind of terminal, end can be made Private data and non-private data in end are physically isolated process, it is ensured that private data cannot be answered by unsafe Obtain by program, be effectively improved the safety of terminal.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, made Any modification, equivalent substitution and improvement etc., should be included within the scope of the present invention.

Claims (10)

1. a terminal, it is characterised in that including:
First processor, for processing the private data in described terminal;
Second processor, for processing the non-private data in described terminal;
Restricted external equipment, is connected to described first processor;
Unrestricted class external equipment, is connected to described second processor;
Wherein, described first processor is realized and described restricted external equipment by the first Peripheral Interface Connection is with mutual, and is realized the connection with described second processor by the first forwarding interface, and passes through Between described first forwarding interface and described first Peripheral Interface, DMA transfer passage is set up in configuration, real The connection of existing described second processor and described restricted external equipment and alternately;And
Described second processor is realized the connection with described unrestricted class external equipment by the second Peripheral Interface Alternately, and realized the connection with described first processor by the second forwarding interface, and by described Between second forwarding interface and described second Peripheral Interface, DMA transfer passage is set up in configuration, it is achieved institute State the connection and alternately of first processor and described unrestricted class external equipment.
Terminal the most according to claim 1, it is characterised in that also include:
First storage device, corresponding to described first processor, carries out private for described first processor The storage of ciphertext data;
Second storage device, corresponding to described second processor, carries out non-for described second processor The storage of private data.
Terminal the most according to claim 1, it is characterised in that described restricted external equipment For: the data that be there is a need to transmission are all passed through at described first Peripheral Interface transmission extremely described first In reason device;Described first processor is used for: directly process private data, and by non-secret number According to by described first forwarding interface transmission extremely described second processor;And
Described unrestricted class external equipment is used for: the data that be there is a need to transmission are all passed through described second In Peripheral Interface transmission extremely described second processor;Described second processor is used for: directly to non-secret Data process, and are processed to described first by described second forwarding interface transmission by private data Device.
Terminal the most according to claim 1, it is characterised in that described restricted external equipment For: the data that be there is a need to transmission are all passed through at described first Peripheral Interface transmission extremely described first In reason device;And described unrestricted class external equipment is used for: the data that be there is a need to transmission are all passed through institute State in the second Peripheral Interface transmission extremely described second processor;
Wherein, described first processor is used for: directly process private data, and by non-secret Data are by described first forwarding interface transmission extremely described second processor;
Described second processor is used for: receive and process the non-secret number from described first processor According to, and be all forwarded to receiving the data from described unrestricted class external equipment at described first Reason device, to be processed private data therein by described first processor, and receives this at first The non-private data that reason device returns.
Terminal the most according to claim 1, it is characterised in that on described first processor One_to_one corresponding between first Peripheral Interface, the first forwarding interface and described restricted external equipment;And
Outside the second Peripheral Interface, the second forwarding interface and described unrestricted class on described second processor One_to_one corresponding between portion's equipment.
Terminal the most according to claim 5, it is characterised in that
It is provided with on described second processor and the first forwarding interface one a pair on described first processor The first transceiver interface that should connect, the most described second processor is used for: restricted with specify at needs In the case of external equipment interacts, by the finger corresponding to the described restricted external equipment specified Fixed first transceiver interface sends to described first processor and goes code;Described first processor is used for: According to going code of receiving, determine the first forwarding interface that described appointment the first transceiver interface is corresponding With the first Peripheral Interface, and between this first forwarding interface and first Peripheral Interface configuration set up DMA transfer passage;And
It is provided with on described first processor and the second forwarding interface one a pair on described second processor The second transceiver interface that should connect, the most described first processor is used for: unrestricted with specify at needs In the case of class external equipment interacts, by corresponding to the described unrestricted class external equipment specified Appointment the second transceiver interface to described second processor send go code;Described second processor is used In: according to going code of receiving, determine the second forwarding that described appointment the second transceiver interface is corresponding Interface and the second Peripheral Interface, and configuration is set up between this second forwarding interface and second Peripheral Interface DMA transfer passage.
Terminal the most according to claim 6, it is characterised in that
Described second processor is additionally operable to: mutual complete with the described restricted external equipment specified In the case of, send interrupt instruction by described appointment the first transceiver interface to described first processor; Described first processor is additionally operable to: according to the interrupt instruction received, and disconnects described DMA transfer and leads to Road;And
Described first processor is additionally operable to: complete and the friendship of the described unrestricted class external equipment specified In the case of Hu, by described appointment the second transceiver interface severed finger in described second processor sends Order;Described second processor is additionally operable to: according to the interrupt instruction received, and disconnects described DMA and passes Defeated passage.
Terminal the most according to claim 1, it is characterised in that also include:
Kind judging device, is arranged between described restricted external equipment and described first processor On path, for the data from described restricted external equipment are carried out type judgement, and according to sentencing Described data are added corresponding mark by disconnected result;Described first processor is used for: in coming of receiving When the data of described kind judging device, if the mark of these data represents that it is private data, the most directly Connect process, if the mark of these data represents that it is non-private data, be then forwarded to described second and process Device;
And/or described kind judging device is arranged at described unrestricted class external equipment and described second On path between reason device, sentence for the data from described unrestricted class external equipment are carried out type Disconnected, and according to judged result, described data are added corresponding mark;Described second processor is used for: When receiving the data from described kind judging device, if the mark of these data represents that it is non-private Ciphertext data, the most directly processes, if the mark of these data represents that it is private data, is then forwarded to described First processor.
Terminal the most according to any one of claim 1 to 8, it is characterised in that also wrap Include:
At least one first communication module, is respectively connecting to described first processor and described second and processes Device, for carrying out the mutual of private data with described first processor, and enters with described second processor Row non-private data mutual.
Terminal the most according to any one of claim 1 to 8, it is characterised in that also wrap Include:
At least one second communication module, is connected with described first processor and carries out data interaction;
Wherein, described first processor is to the private data from least one second communication module described Process, and the non-private data from least one second communication module described is transmitted to described Second processor processes.
CN201310326660.4A 2013-07-30 2013-07-30 A kind of terminal Active CN103400086B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201310326660.4A CN103400086B (en) 2013-07-30 2013-07-30 A kind of terminal
PCT/CN2013/084354 WO2015014014A1 (en) 2013-07-30 2013-09-26 Terminal, data interaction method and data interaction system
PCT/CN2013/084356 WO2015014015A1 (en) 2013-07-30 2013-09-26 Terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310326660.4A CN103400086B (en) 2013-07-30 2013-07-30 A kind of terminal

Publications (2)

Publication Number Publication Date
CN103400086A CN103400086A (en) 2013-11-20
CN103400086B true CN103400086B (en) 2016-12-07

Family

ID=49563707

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310326660.4A Active CN103400086B (en) 2013-07-30 2013-07-30 A kind of terminal

Country Status (1)

Country Link
CN (1) CN103400086B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015096135A1 (en) * 2013-12-27 2015-07-02 Intel Corporation Electronic device having two processors to process data
CN104992127B (en) * 2015-07-09 2018-07-17 李志学 A kind of Computer Data Security managing device
US11301397B2 (en) 2018-04-24 2022-04-12 Technion Research & Development Foundation Limited Multiple processor computing device with configurable electrical connectivity to peripherals

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101084505A (en) * 2004-11-12 2007-12-05 索尼计算机娱乐公司 Methods and apparatus for secure data processing and transmission
CN102043927A (en) * 2010-12-29 2011-05-04 北京深思洛克软件技术股份有限公司 Computer system for data divulgence protection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100077472A1 (en) * 2008-09-23 2010-03-25 Atmel Corporation Secure Communication Interface for Secure Multi-Processor System

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101084505A (en) * 2004-11-12 2007-12-05 索尼计算机娱乐公司 Methods and apparatus for secure data processing and transmission
CN102043927A (en) * 2010-12-29 2011-05-04 北京深思洛克软件技术股份有限公司 Computer system for data divulgence protection

Also Published As

Publication number Publication date
CN103400086A (en) 2013-11-20

Similar Documents

Publication Publication Date Title
US10097529B2 (en) Semiconductor device for controlling access right to server of internet of things device and method of operating the same
US8219135B2 (en) Method for building spontaneous virtual communities based on common interests using wireless equipment
US20160337322A1 (en) Semiconductor device for managing user data according to security level and method of operating the same
CN104216761B (en) It is a kind of that the method for sharing equipment is used in the device that can run two kinds of operating system
TW201330523A (en) System and method for facilitating wireless communication
CN103400086B (en) A kind of terminal
CN106332070A (en) Secure communication method, device and system
CN103390142B (en) A kind of terminal
CN104618894B (en) Data processing equipment and data processing method
CN103390137B (en) A kind of terminal
CN103400084B (en) A kind of terminal
Tsuda et al. Proposal for a seamless connection method for remotely located Bluetooth devices
CN103400080B (en) A kind of terminal
CN103390136B (en) A kind of terminal
CN103400088B (en) A kind of terminal
CN107613453A (en) Control method and communication system
CN103400085A (en) Terminal
KR101482492B1 (en) Method and system for transmitting nmea 2000 network information
CN103390138B (en) A kind of terminal
JP6950048B2 (en) Communications system
CN103440437B (en) Terminal and display control method of user interface
CN109429228A (en) A kind of radio switch-in method and device
KR101288942B1 (en) Method for transmitting and receiving of file using near communication and wireless internet, communication terminal therefor
JP2013149058A (en) Safety confirmation system, terminal and safety confirmation server
CN103401865A (en) Terminal and data transmission method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant