CN104298531A - Application method of operating system, application device of operating system, and terminal - Google Patents

Application method of operating system, application device of operating system, and terminal Download PDF

Info

Publication number
CN104298531A
CN104298531A CN201410606769.8A CN201410606769A CN104298531A CN 104298531 A CN104298531 A CN 104298531A CN 201410606769 A CN201410606769 A CN 201410606769A CN 104298531 A CN104298531 A CN 104298531A
Authority
CN
China
Prior art keywords
operating system
terminal
external memory
clone
cloned
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410606769.8A
Other languages
Chinese (zh)
Inventor
徐军平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Coolpad Software Technology Co Ltd
Original Assignee
Nanjing Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Coolpad Software Technology Co Ltd filed Critical Nanjing Coolpad Software Technology Co Ltd
Priority to CN201410606769.8A priority Critical patent/CN104298531A/en
Publication of CN104298531A publication Critical patent/CN104298531A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides an application method of an operating system, an operating system of the operating system, and a terminal. The application method comprises the step of starting any one operating system according to a received starting command of the operating system in external memory of the terminal. Through the adoption of the technical scheme, the operating system of the terminal can be separated from the external memory of the terminal and is cloned into the external memory, so that when a user changes terminals, the external memory is connected to a changed terminal, then the operating system can be continually used, and the convenience is improved for the user. In addition, especially when the operating system belongs to a secure operating system, and the user clones the secure operating system and data thereof into the external memory, the security of the secure operating system and the data thereof can be greatly improved.

Description

The application process of operating system, the application apparatus of operating system and terminal
Technical field
The present invention relates to field of terminal technology, in particular to application apparatus and a kind of terminal of a kind of application process of operating system, a kind of operating system.
Background technology
In the prior art, no matter be single-system terminals or multisystem terminal, the operating system in terminal is all be kept in the internal memory of terminal.But, various operating system especially often has the important or secret information required for user in security system and data thereof, when user uses other-end, cannot obtain the information in the operating system of former terminal easily, this brings inconvenience to the use of user.
Therefore needing a kind of new technical scheme, can operating system is stored in external memory, operating system and terminal are separated, operating system in external memory can be started to make user when using other-end.
Summary of the invention
The present invention is just based on the problems referred to above, propose a kind of new technical scheme, can operating system being stored in external memory, operating system and terminal are separated, operating system in external memory can be started to make user when using other-end.
In view of this, the present invention proposes a kind of application process of operating system, comprising: according to the startup command to the arbitrary operating system in the external memory of described terminal received, start described arbitrary operating system.
In this technical scheme, store the external memory of operating system when being connected with terminal, terminal also can run the operating system in external memory, wherein, operating system in external memory can using start-up command as startup command, automatically start when starting up of terminal, also can start according to the startup command of user after starting up of terminal.Pass through technique scheme, the operating system in terminal can be made to be separated with the internal memory of terminal, and to be cloned in external memory, thus when user changes terminal, external memory is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.In addition, especially when described operating system is secure operating system, secure operating system is cloned in external memory by user, can also promote the security of secure operating system.
In technique scheme, preferably, before the described arbitrary operating system of startup, also comprise: according to the clone's order received, the described arbitrary operating system in the internal memory of described terminal is cloned in described external memory; Or according to the described clone's order received, by the data clone in the described arbitrary operating system in described internal memory and described arbitrary operating system in described external memory.
In this technical scheme, operating system in terminal can be cloned in the external memory of terminal connection, described external memory includes but not limited to USB flash disk and storage card, wherein, operating system can be cloned in external memory by terminal automatically before being powered off, also can the clone's order according to user in terminal operating process operating system be cloned in external memory.Meanwhile, by the data clone in operating system in external memory, to obtain these data easily when external memory being connected to other-end, the convenience of user operation can be improved.Similarly, terminal can before being powered off automatic by the data clone of operating system in external memory, also can in terminal operating process according to the clone of user order by the data clone of operating system in external memory.
In technique scheme, preferably, by before in described arbitrary operating system or described data clone to described external memory, also comprise: according to the described clone's order received, determine whether described arbitrary operating system is secure operating system; When determining that described arbitrary operating system is described secure operating system, allow described terminal by described secure operating system or described data clone in described external memory.
In this technical scheme, clone's order mentioned here can be the shutdown command of terminal, clone's order that also can send for user in terminal operating process.Because secure operating system and data thereof are concerning even more important and concealed user; when user closes a terminal or changes terminal; more need the safety protecting secure operating system and data thereof; therefore; at terminal closedown or when changing terminal; it can be avoided to lose in secure operating system and data clone to external memory thereof, and, still can process secure operating system and data thereof when external memory being connected to other-end.In addition; because secure operating system and data thereof are often what encrypt; the security of secure operating system and data thereof still will can be ensured in the secure operating system of encryption and data clone to external storage card thereof; and normal operating system and data thereof often do not possess encryption measures; therefore; only when judging that operating system is secure operating system, just this operating system and data thereof being cloned and replication processes, thus protecting the data security of terminal.
In technique scheme, preferably, the startup command to the arbitrary operating system in the external memory of described terminal that described basis receives, start described arbitrary operating system, specifically comprise: according to described startup command, described arbitrary operating system is judged whether to be cloned in the described internal memory of described terminal, wherein, when judged result is for being, described arbitrary operating system is cloned in described internal memory, and start described arbitrary operating system, when judged result is no, described arbitrary operating system is started in described external memory.
In this technical scheme, for the operating system that external memory provides, can in the internal memory being cloned into present terminal after, in internal memory, start it, also directly can start it in external memory.Similarly, for the data of the operating system copied in external memory, can be copied to after in the internal memory of terminal and be read, also can directly be read in external memory.In the prior art, although can by the operating system installation in external memory in the internal memory of terminal, but it all has to pass through an installation process, the installation process of operating system is very complicated, and in the technical program, can when receiving startup command, external memory is equivalent to internal memory, thus operating system wherein is just equivalent to install in the terminal, therefore, can directly start the operating system in external memory or the data of read operation system, the faster and more convenient operation of user can be made, save clone operations system or copy the time that data consume, greatly improve Consumer's Experience.
In technique scheme, preferably, also comprise: according to the authorization information received, determine whether described terminal has clone and/or start the authority of described arbitrary operating system; When determining that described terminal has clone and/or starts the authority of described arbitrary operating system, allow described terminal described arbitrary operating system to be cloned in described internal memory, and/or allow described terminal to start described arbitrary operating system.
In this technical scheme, when terminal clones the operating system in internal memory, or when terminal is cloned or start the operating system in external memory, input numerical ciphers, input gesture password can be adopted, carry out the modes such as fingerprint authentication authentication is carried out to user, if and only if when user have passed authentication, just allow terminal clone or start this operating system, otherwise, forbid terminal clone or start this operating system.By this technical scheme, only allow the user of operating right to carry out operating system clone and/or start-up operation, greatly protect the safety of the operating system in terminal and external memory.In addition, copy or data in read operation system time, technique scheme is suitable for too.
Another aspect of the present invention proposes a kind of application apparatus of operating system, comprising: processing unit, according to the startup command to the arbitrary operating system in the external memory of described terminal received, starts described arbitrary operating system.
In this technical scheme, store the external memory of operating system when being connected with terminal, terminal also can run the operating system in external memory, wherein, operating system in external memory can using start-up command as startup command, automatically start when starting up of terminal, also can start according to the startup command of user after starting up of terminal.Pass through technique scheme, the operating system in terminal can be made to be separated with the internal memory of terminal, and to be cloned in external memory, thus when user changes terminal, external memory is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.In addition, especially when described operating system is secure operating system, secure operating system is cloned in external memory by user, can also promote the security of secure operating system.
In technique scheme, preferably, also comprise: cloned unit, according to the clone's order received, the described arbitrary operating system in the internal memory of described terminal is cloned in described external memory; Or according to the described clone's order received, by the data clone in the described arbitrary operating system in described internal memory and described arbitrary operating system in described external memory.
In this technical scheme, operating system in terminal can be cloned in the external memory of terminal connection, described external memory includes but not limited to USB flash disk and storage card, wherein, operating system can be cloned in external memory by terminal automatically before being powered off, also can the clone's order according to user in terminal operating process operating system be cloned in external memory.Meanwhile, by the data clone in operating system in external memory, to obtain these data easily when external memory being connected to other-end, the convenience of user operation can be improved.Similarly, terminal can before being powered off automatic by the data clone of operating system in external memory, also can in terminal operating process according to the clone of user order by the data clone of operating system in external memory.
In technique scheme, preferably, described cloned unit comprises: determining unit, according to the described clone's order received, determines whether described arbitrary operating system is secure operating system; And described cloned unit is used for: when determining that described arbitrary operating system is described secure operating system, allow described terminal by described secure operating system or described data clone in described external memory.
In this technical scheme, clone's order mentioned here can be the shutdown command of terminal, clone's order that also can send for user in terminal operating process.Because secure operating system and data thereof are concerning even more important and concealed user; when user closes a terminal or changes terminal; more need the safety protecting secure operating system and data thereof; therefore; at terminal closedown or when changing terminal; it can be avoided to lose in secure operating system and data clone to external memory thereof, and, still can process secure operating system and data thereof when external memory being connected to other-end.In addition; because secure operating system and data thereof are often what encrypt; the security of secure operating system and data thereof still will can be ensured in the secure operating system of encryption and data clone to external storage card thereof; and normal operating system and data thereof often do not possess encryption measures; therefore; only when judging that operating system is secure operating system, just this operating system and data thereof being cloned and replication processes, thus protecting the data security of terminal.
In technique scheme, preferably, described processing unit specifically for: according to described startup command, described arbitrary operating system is judged whether to be cloned in the described internal memory of described terminal, when judged result is for being, described arbitrary operating system is cloned in described internal memory, and starts described arbitrary operating system, when judged result is no, in described external memory, start described arbitrary operating system.
In this technical scheme, for the operating system that external memory provides, can in the internal memory being cloned into present terminal after, in internal memory, start it, also directly can start it in external memory.Similarly, for the data of the operating system copied in external memory, can be copied to after in the internal memory of terminal and be read, also can directly be read in external memory.In the prior art, although can by the operating system installation in external memory in the internal memory of terminal, but it all has to pass through an installation process, the installation process of operating system is very complicated, and in the technical program, can when receiving startup command, external memory is equivalent to internal memory, thus operating system wherein is just equivalent to install in the terminal, therefore, can directly start the operating system in external memory or the data of read operation system, the faster and more convenient operation of user can be made, save clone operations system or copy the time that data consume, greatly improve Consumer's Experience.
In technique scheme, preferably, also comprise: authentication unit, according to the authorization information received, determine whether described terminal has clone and/or start the authority of described arbitrary operating system, when determining that described terminal has clone and/or starts the authority of described arbitrary operating system, allow described terminal described arbitrary operating system to be cloned in described internal memory, and/or allow described terminal to start described arbitrary operating system.
In this technical scheme, when terminal clones the operating system in internal memory, or when terminal is cloned or start the operating system in external memory, input numerical ciphers, input gesture password can be adopted, carry out the modes such as fingerprint authentication authentication is carried out to user, if and only if when user have passed authentication, just allow terminal clone or start this operating system, otherwise, forbid terminal clone or start this operating system.By this technical scheme, only allow the user of operating right to carry out operating system clone and/or start-up operation, greatly protect the safety of the operating system in terminal and external memory.In addition, copy or data in read operation system time, technique scheme is suitable for too.
Another aspect of the invention proposes a kind of terminal, includes the application apparatus of the operating system described in technique scheme.Therefore, this terminal has whole beneficial effects of the application apparatus of the operating system that technique scheme provides, and does not repeat them here.
By above technical scheme, the operating system in terminal can be made to be separated with the internal memory of terminal, and to be cloned in external memory, thus when user changes terminal, external memory is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.In addition, especially when described operating system is secure operating system, secure operating system and data clone thereof in external memory, can also be promoted the security of secure operating system and data thereof by user.
Accompanying drawing explanation
Fig. 1 shows the process flow diagram of the application process of operating system according to an embodiment of the invention;
Fig. 2 shows the process flow diagram of the application process of operating system according to another embodiment of the invention;
Fig. 3 shows the process flow diagram of the application process of operating system according to still a further embodiment;
Fig. 4 shows the block diagram of the application apparatus of operating system according to an embodiment of the invention;
Fig. 5 shows the block diagram of terminal according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the process flow diagram of the application process of operating system according to an embodiment of the invention.
As shown in Figure 1, the application process of operating system according to an embodiment of the invention, comprises the following steps:
Step 102, according to the startup command to the arbitrary operating system in the external memory of terminal received, starts arbitrary operating system.
In this technical scheme, store the external memory of operating system when being connected with terminal, terminal also can run the operating system in external memory, wherein, operating system in external memory can using start-up command as startup command, automatically start when starting up of terminal, also can start according to the startup command of user after starting up of terminal.Pass through technique scheme, the operating system in terminal can be made to be separated with the internal memory of terminal, and to be cloned in external memory, thus when user changes terminal, external memory is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.In addition, especially when operating system is secure operating system, secure operating system is cloned in external memory by user, can also promote the security of secure operating system.
In technique scheme, preferably, before the arbitrary operating system of startup, also comprise: according to the clone's order received, the arbitrary operating system in the internal memory of terminal is cloned in external memory; Or according to the clone's order received, by the arbitrary operating system in internal memory and the data clone in arbitrary operating system in external memory.
In this technical scheme, operating system in terminal can be cloned in the external memory of terminal connection, external memory includes but not limited to USB flash disk and storage card, wherein, operating system can be cloned in external memory by terminal automatically before being powered off, also can the clone's order according to user in terminal operating process operating system be cloned in external memory.Meanwhile, by the data clone in operating system in external memory, to obtain these data easily when external memory being connected to other-end, the convenience of user operation can be improved.Similarly, terminal can before being powered off automatic by the data clone of operating system in external memory, also can in terminal operating process according to the clone of user order by the data clone of operating system in external memory.
In technique scheme, preferably, step 102 also comprises: according to the clone's order received, determine whether arbitrary operating system is secure operating system; When determining that arbitrary operating system is secure operating system, allow terminal by secure operating system or data clone in external memory.
In this technical scheme, clone's order mentioned here can be the shutdown command of terminal, clone's order that also can send for user in terminal operating process.Because secure operating system and data thereof are concerning even more important and concealed user; when user closes a terminal or changes terminal; more need the safety protecting secure operating system and data thereof; therefore; at terminal closedown or when changing terminal; it can be avoided to lose in secure operating system and data clone to external memory thereof, and, still can process secure operating system and data thereof when external memory being connected to other-end.In addition; because secure operating system and data thereof are often what encrypt; the security of secure operating system and data thereof still will can be ensured in the secure operating system of encryption and data clone to external storage card thereof; and normal operating system and data thereof often do not possess encryption measures; therefore; only when judging that operating system is secure operating system, just this operating system and data thereof being cloned and replication processes, thus protecting the data security of terminal.
In technique scheme, preferably, step 104 specifically comprises: according to startup command, judge whether arbitrary operating system to be cloned in the internal memory of terminal, wherein, when judged result is for being, arbitrary operating system is cloned in internal memory, and start arbitrary operating system, when judged result is no, in external memory, start arbitrary operating system.
In this technical scheme, for the operating system that external memory provides, can in the internal memory being cloned into present terminal after, in internal memory, start it, also directly can start it in external memory.Similarly, for the data of the operating system copied in external memory, can be copied to after in the internal memory of terminal and be read, also can directly be read in external memory.In the prior art, although can by the operating system installation in external memory in the internal memory of terminal, but it all has to pass through an installation process, the installation process of operating system is very complicated, and in the technical program, can when receiving startup command, external memory is equivalent to internal memory, thus operating system wherein is just equivalent to install in the terminal, therefore, can directly start the operating system in external memory or the data of read operation system, the faster and more convenient operation of user can be made, save clone operations system or copy the time that data consume, greatly improve Consumer's Experience.
In technique scheme, preferably, also comprise: according to the authorization information received, determine whether terminal has clone and/or start the authority of arbitrary operating system; When determining that terminal has clone and/or starts the authority of arbitrary operating system, allow terminal arbitrary operating system to be cloned in internal memory, and/or allow terminal to start arbitrary operating system.
In this technical scheme, when terminal clones the operating system in internal memory, or when terminal is cloned or start the operating system in external memory, input numerical ciphers, input gesture password can be adopted, carry out the modes such as fingerprint authentication authentication is carried out to user, if and only if when user have passed authentication, just allow terminal clone or start this operating system, otherwise, forbid terminal clone or start this operating system.By this technical scheme, only allow the user of operating right to carry out operating system clone and/or start-up operation, greatly protect the safety of the operating system in terminal and external memory.In addition, copy or data in read operation system time, technique scheme is suitable for too.
Fig. 2 shows the process flow diagram of the application process of operating system according to another embodiment of the invention.
As shown in Figure 2, the application process of operating system according to another embodiment of the invention, comprises the following steps:
Step 202, terminal receives shutdown command.In the technical program, shutdown command can be considered as ordering the clone of the operating system in terminal, or the copy command of data to this operating system.
Step 204, judging whether current operation system is secure operating system, when judged result is for being, enters step 206, when judged result is no, entering step 208.Because secure operating system and data thereof are concerning even more important and concealed user, when user closes a terminal or changes terminal, more need the safety protecting secure operating system and data thereof.And; because secure operating system and data thereof are often what encrypt; the security of secure operating system and data thereof still will can be ensured in the secure operating system of encryption and data clone to external storage card thereof; and normal operating system and data thereof often do not possess encryption measures; therefore; only when judging that operating system is secure operating system, just this operating system and data thereof being cloned and replication processes, thus protecting the data security of terminal.
Step 206, is cloned in storage card by this secure operating system one key, maybe by the data Replica of this secure operating system in storage card.In the technical program, clone's key can be set on the operation interface of terminal, to facilitate user to be directly cloned in storage card by secure operating system one key, improve the convenience of user operation.
Step 208, shutdown.
Fig. 3 shows the process flow diagram of the application process of operating system according to still a further embodiment.
As shown in Figure 3, the application process of operating system according to still a further embodiment, comprising:
Step 302, terminal inserts storage card.
Step 304, start.
Step 306, judges whether to clone the security system in storage card, when judged result is for being, entering step 308, when judged result is no, entering step 312.
Step 308, judges that whether user is by authentication, when judged result is for being, entering step 310, when judged result is no, entering step 320.In the technical program, can adopt input numerical ciphers, input gesture password, carry out the modes such as fingerprint authentication and carry out authentication to user, and if only if when user have passed authentication, and just permission terminal clones this operating system, otherwise, forbid that terminal clones this operating system.
Step 310, is cloned into the internal memory of terminal by security system.In the technical program, the security system in storage card can be cloned in the internal memory of terminal, thus when user changes terminal, storage card be connected to the terminal after replacing and still can continue to use this operating system, add the convenience of user.
Step 312, judges whether to start security system, when judged result is for being, entering step 314, when judged result is no, entering step 316.
Step 314, judges that whether user is by authentication, when judged result is for being, entering step 318, when judged result is no, entering step 320.In the technical program, can adopt input numerical ciphers, input gesture password, carry out the modes such as fingerprint authentication and carry out authentication to user, and if only if when user have passed authentication, and just permission terminal starts this operating system, otherwise, forbid that terminal starts this operating system.
Step 316, starts the conventional system in internal memory.
Step 318, starts the security system that is cloned in internal memory or directly in storage card, starts security system.The faster and more convenient operation of user can be made like this, save the time that clone's security system consumes, greatly improve Consumer's Experience.
Step 320, shutdown.
In the technical program, the security system in terminal can be made to be separated with the internal memory of terminal, and to be cloned in storage card, thus when user changes terminal, storage card is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.Security system and data clone thereof in storage card, can also be promoted the security of security system and data thereof by user.
Fig. 4 shows the block diagram of the application apparatus of operating system according to an embodiment of the invention.
As shown in Figure 4, the application apparatus 400 of operating system according to an embodiment of the invention, comprising: processing unit 402, according to the startup command to the arbitrary operating system in the external memory of terminal received, starts arbitrary operating system.
In this technical scheme, store the external memory of operating system when being connected with terminal, terminal also can run the operating system in external memory, wherein, operating system in external memory can using start-up command as startup command, automatically start when starting up of terminal, also can start according to the startup command of user after starting up of terminal.Pass through technique scheme, the operating system in terminal can be made to be separated with the internal memory of terminal, and to be cloned in external memory, thus when user changes terminal, external memory is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.In addition, especially when operating system is secure operating system, secure operating system is cloned in external memory by user, can also promote the security of secure operating system.
In technique scheme, preferably, also comprise: cloned unit 404, according to the clone's order received, the arbitrary operating system in the internal memory of terminal is cloned in external memory; Or according to the clone's order received, by the arbitrary operating system in internal memory and the data clone in arbitrary operating system in external memory.
In this technical scheme, operating system in terminal can be cloned in the external memory of terminal connection, external memory includes but not limited to USB flash disk and storage card, wherein, operating system can be cloned in external memory by terminal automatically before being powered off, also can the clone's order according to user in terminal operating process operating system be cloned in external memory.Meanwhile, by the data clone in operating system in external memory, to obtain these data easily when external memory being connected to other-end, the convenience of user operation can be improved.Similarly, terminal can before being powered off automatic by the data clone of operating system in external memory, also can in terminal operating process according to the clone of user order by the data clone of operating system in external memory.
In technique scheme, preferably, cloned unit 404 comprises: determining unit 4042, according to the clone's order received, determines whether arbitrary operating system is secure operating system; And cloned unit 404 for: when determining that arbitrary operating system is secure operating system, allow terminal by secure operating system or data clone in external memory.
In this technical scheme, clone's order mentioned here can be the shutdown command of terminal, clone's order that also can send for user in terminal operating process.Because secure operating system and data thereof are concerning even more important and concealed user; when user closes a terminal or changes terminal; more need the safety protecting secure operating system and data thereof; therefore; at terminal closedown or when changing terminal; it can be avoided to lose in secure operating system and data clone to external memory thereof, and, still can process secure operating system and data thereof when external memory being connected to other-end.In addition; because secure operating system and data thereof are often what encrypt; the security of secure operating system and data thereof still will can be ensured in the secure operating system of encryption and data clone to external storage card thereof; and normal operating system and data thereof often do not possess encryption measures; therefore; only when judging that operating system is secure operating system, just this operating system and data thereof being cloned and replication processes, thus protecting the data security of terminal.
In technique scheme, preferably, processing unit 402 specifically for: according to startup command, arbitrary operating system is judged whether to be cloned in the internal memory of terminal, when judged result is for being, arbitrary operating system is cloned in internal memory, and starts arbitrary operating system, when judged result is no, in external memory, start arbitrary operating system.
In this technical scheme, for the operating system that external memory provides, can in the internal memory being cloned into present terminal after, in internal memory, start it, also directly can start it in external memory.Similarly, for the data of the operating system copied in external memory, can be copied to after in the internal memory of terminal and be read, also can directly be read in external memory.In the prior art, although can by the operating system installation in external memory in the internal memory of terminal, but it all has to pass through an installation process, the installation process of operating system is very complicated, and in the technical program, can when receiving startup command, external memory is equivalent to internal memory, thus operating system wherein is just equivalent to install in the terminal, therefore, can directly start the operating system in external memory or the data of read operation system, the faster and more convenient operation of user can be made, save clone operations system or copy the time that data consume, greatly improve Consumer's Experience.
In technique scheme, preferably, also comprise: authentication unit 406, according to the authorization information received, determine whether terminal has clone and/or start the authority of arbitrary operating system, when determining that terminal has clone and/or starts the authority of arbitrary operating system, allow terminal arbitrary operating system to be cloned in internal memory, and/or allow terminal to start arbitrary operating system.
In this technical scheme, when terminal clones the operating system in internal memory, or when terminal is cloned or start the operating system in external memory, input numerical ciphers, input gesture password can be adopted, carry out the modes such as fingerprint authentication authentication is carried out to user, if and only if when user have passed authentication, just allow terminal clone or start this operating system, otherwise, forbid terminal clone or start this operating system.By this technical scheme, only allow the user of operating right to carry out operating system clone and/or start-up operation, greatly protect the safety of the operating system in terminal and external memory.In addition, copy or data in read operation system time, technique scheme is suitable for too.
Fig. 5 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Figure 5, there is in terminal 500 according to an embodiment of the invention the application apparatus 502 (being equivalent to the application apparatus 400 of the operating system in the embodiment shown in Fig. 4) of operating system, the application apparatus 502 of operating system can according to the clone's order received, arbitrary operating system in the internal memory of terminal is cloned in external memory, and according to the startup command to the arbitrary operating system in external memory received, arbitrary operating system can be started.
In this technical scheme, operating system in terminal 500 can be cloned in the external memory that terminal 500 connects, external memory includes but not limited to USB flash disk and storage card, wherein, operating system can be cloned in external memory by terminal 500 automatically before being powered off, also can the clone's order according to user in terminal 500 operational process operating system be cloned in external memory.Simultaneously, store the external memory of operating system when being connected with terminal 500, terminal 500 also can run the operating system in external memory, wherein, operating system in external memory can using start-up command as startup command, automatically start when terminal 500 is started shooting, also can start according to the startup command of user after terminal 500 is started shooting.Pass through technique scheme, the operating system in terminal 500 can be made to be separated with the internal memory of terminal 500, and be cloned in external memory, thus when user changes terminal 500, external memory is connected to the terminal after replacing 500 can continue to use this operating system, adds the convenience of user.In addition, especially when operating system is secure operating system, secure operating system is cloned in external memory by user, can also promote the security of secure operating system.
The application apparatus 502 of operating system can also according to the clone's order received, can by the data clone in operating system in external memory, to obtain these data easily when external memory being connected to other-end 500, improve the convenience of user operation.Similarly, terminal 500 can before being powered off automatic by the data clone of operating system in external memory, also can in terminal 500 operational process according to the clone of user order by the data clone of operating system in external memory.
The application apparatus 502 of operating system by the clone's order received, can determine whether arbitrary operating system is secure operating system; When determining that arbitrary operating system is secure operating system, allow terminal 500 by secure operating system or data clone in external memory.
In this technical scheme, clone's order mentioned here can be the shutdown command of terminal 500, clone's order that also can send for user in terminal 500 operational process.Because secure operating system and data thereof are concerning even more important and concealed user; user close a terminal 500 or change terminal 500 time; more need the safety protecting secure operating system and data thereof; therefore; when terminal 500 is shut down or is changed terminal 500; it can be avoided to lose in secure operating system and data clone to external memory thereof, and, still can process secure operating system and data thereof when external memory being connected to other-end 500.In addition; because secure operating system and data thereof are often what encrypt; the security of secure operating system and data thereof still will can be ensured in the secure operating system of encryption and data clone to external storage card thereof; and normal operating system and data thereof often do not possess encryption measures; therefore; only when judging that operating system is secure operating system, just this operating system and data thereof being cloned and replication processes, thus protecting the data security of terminal 500.
The application apparatus 502 of operating system also for: according to startup command, arbitrary operating system is judged whether to be cloned in the internal memory of terminal 500, wherein, when judged result is for being, arbitrary operating system is cloned in internal memory, and start arbitrary operating system, when judged result is no, in external memory, start arbitrary operating system.
In this technical scheme, for the operating system that external memory provides, can in the internal memory being cloned into present terminal 500 after, in internal memory, start it, also directly can start it in external memory.Similarly, for the data of the operating system copied in external memory, can be copied to after in the internal memory of terminal 500 and be read, also can directly be read in external memory.Directly start the operating system in external memory or the data of read operation system, the faster and more convenient operation of user can be made, save clone operations system or copy the time that data consume, greatly improve Consumer's Experience.
The application apparatus 502 of operating system according to the authorization information received, can also determine whether terminal 500 has clone and/or start the authority of arbitrary operating system; When the application apparatus 502 of operating system determines that terminal 500 has clone and/or starts the authority of arbitrary operating system, allow terminal 500 arbitrary operating system to be cloned in internal memory, and/or allow terminal 500 to start arbitrary operating system.
In this technical scheme, when cloning the operating system in internal memory in terminal 500, or when terminal 500 is cloned or start the operating system in external memory, input numerical ciphers, input gesture password can be adopted, carry out the modes such as fingerprint authentication authentication is carried out to user, if and only if when user have passed authentication, terminal 500 is just allowed to clone or start this operating system, otherwise, forbid that terminal 500 is cloned or starts this operating system.By this technical scheme, only allow the user of operating right to carry out operating system clone and/or start-up operation, greatly protect the safety of the operating system in terminal 500 and external memory.In addition, copy or data in read operation system time, technique scheme is suitable for too.
More than be described with reference to the accompanying drawings technical scheme of the present invention, by technical scheme of the present invention, the operating system in terminal can be made to be separated with the internal memory of terminal, and be cloned in external memory, thus when user changes terminal, external memory is connected to the terminal after replacing can continue to use this operating system, adds the convenience of user.In addition, especially when described operating system is secure operating system, secure operating system and data clone thereof in external memory, can also be promoted the security of secure operating system and data thereof by user.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. an application process for operating system, for terminal, is characterized in that, comprising:
According to the startup command to the arbitrary operating system in the external memory of described terminal received, start described arbitrary operating system.
2. the application process of operating system according to claim 1, is characterized in that, before the described arbitrary operating system of startup, also comprises:
According to the clone's order received, the described arbitrary operating system in the internal memory of described terminal is cloned in described external memory; Or
According to the described clone's order received, by the data clone in the described arbitrary operating system in described internal memory and described arbitrary operating system in described external memory.
3. the application process of operating system according to claim 2, is characterized in that, by before in described arbitrary operating system or described data clone to described external memory, also comprises:
According to the described clone's order received, determine whether described arbitrary operating system is secure operating system;
When determining that described arbitrary operating system is described secure operating system, allow described terminal by described secure operating system or described data clone in described external memory.
4. the application process of operating system according to any one of claim 1 to 3, is characterized in that, the startup command to the arbitrary operating system in the external memory of described terminal that described basis receives, and starts described arbitrary operating system, specifically comprises:
According to described startup command, judge whether described arbitrary operating system to be cloned in the described internal memory of described terminal, wherein,
When judged result is for being, described arbitrary operating system is cloned in described internal memory, and starts described arbitrary operating system;
When judged result is no, in described external memory, start described arbitrary operating system.
5. the application process of operating system according to claim 4, is characterized in that, also comprises:
According to the authorization information received, determine whether described terminal has clone and/or start the authority of described arbitrary operating system;
When determining that described terminal has clone and/or starts the authority of described arbitrary operating system, allow described terminal described arbitrary operating system to be cloned in described internal memory, and/or allow described terminal to start described arbitrary operating system.
6. an application apparatus for operating system, for terminal, is characterized in that, comprising:
Processing unit, according to the startup command to the arbitrary operating system in the external memory of described terminal received, starts described arbitrary operating system.
7. the application apparatus of operating system according to claim 6, is characterized in that, also comprises:
Cloned unit, according to the clone's order received, described arbitrary operating system in the internal memory of described terminal is cloned in described external memory, or according to the described clone's order received, by the data clone in the described arbitrary operating system in described internal memory and described arbitrary operating system in described external memory.
8. the application apparatus of operating system according to claim 7, is characterized in that, described cloned unit comprises:
Determining unit, according to the described clone's order received, determines whether described arbitrary operating system is secure operating system; And
Described cloned unit specifically for:
When determining that described arbitrary operating system is described secure operating system, allow described terminal by described secure operating system or described data clone in described external memory.
9. the application apparatus of the operating system according to any one of claim 6 to 8, is characterized in that, described processing unit specifically for:
According to described startup command, described arbitrary operating system is judged whether to be cloned in the described internal memory of described terminal, when judged result is for being, described arbitrary operating system is cloned in described internal memory, and start described arbitrary operating system, when judged result is no, in described external memory, start described arbitrary operating system.
10. the application apparatus of operating system according to claim 9, is characterized in that, also comprises:
Authentication unit, according to the authorization information received, determine whether described terminal has clone and/or start the authority of described arbitrary operating system, when determining that described terminal has clone and/or starts the authority of described arbitrary operating system, allow described terminal described arbitrary operating system to be cloned in described internal memory, and/or allow described terminal to start described arbitrary operating system.
11. 1 kinds of terminals, is characterized in that, comprise the application apparatus of the operating system according to any one of claim 6 to 10.
CN201410606769.8A 2014-10-31 2014-10-31 Application method of operating system, application device of operating system, and terminal Pending CN104298531A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410606769.8A CN104298531A (en) 2014-10-31 2014-10-31 Application method of operating system, application device of operating system, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410606769.8A CN104298531A (en) 2014-10-31 2014-10-31 Application method of operating system, application device of operating system, and terminal

Publications (1)

Publication Number Publication Date
CN104298531A true CN104298531A (en) 2015-01-21

Family

ID=52318271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410606769.8A Pending CN104298531A (en) 2014-10-31 2014-10-31 Application method of operating system, application device of operating system, and terminal

Country Status (1)

Country Link
CN (1) CN104298531A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1447227A (en) * 2002-03-08 2003-10-08 三星电子株式会社 Guide system utilizing non-flash memory and its method
CN1536484A (en) * 2003-04-02 2004-10-13 2000 Movable operation system and method for loading said system
CN1595356A (en) * 2003-08-14 2005-03-16 国际商业机器公司 System and method for manufacturing and updating insertable portable operating system module
CN101650607A (en) * 2009-06-30 2010-02-17 上海序参量科技发展有限公司 Mouse with data storing function
CN102567056A (en) * 2011-12-23 2012-07-11 华为终端有限公司 Method for starting terminal and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1447227A (en) * 2002-03-08 2003-10-08 三星电子株式会社 Guide system utilizing non-flash memory and its method
CN1536484A (en) * 2003-04-02 2004-10-13 2000 Movable operation system and method for loading said system
CN1595356A (en) * 2003-08-14 2005-03-16 国际商业机器公司 System and method for manufacturing and updating insertable portable operating system module
CN101650607A (en) * 2009-06-30 2010-02-17 上海序参量科技发展有限公司 Mouse with data storing function
CN102567056A (en) * 2011-12-23 2012-07-11 华为终端有限公司 Method for starting terminal and terminal

Similar Documents

Publication Publication Date Title
US8407759B1 (en) Device, method, and system for secure mobile data storage
US8539572B2 (en) System and method for secure usage of peripheral devices using shared secrets
CN102781001A (en) Method for encrypting built-in file of mobile terminal and mobile terminal
CN105205374A (en) Application program encrypting method and user terminal
US9378344B2 (en) Method and apparatus for protecting information based on data card
EP2485512B1 (en) Encryption device and method for controlling download and access operations performed to a mobile terminal
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
CN104954534B (en) Control method, device and the corresponding communication terminal of communication terminal
WO2018045767A1 (en) Terminal control method and apparatus, and user terminal
US11405193B2 (en) Encrypted photographing method and system based on fingerprint recognition
CN113168480A (en) Trusted execution based on environmental factors
US20150071442A1 (en) Data-encrypting method and decrypting method for a mobile phone
CN102567682A (en) User access method based on BIOS (Basic Input Output System) setting
KR102192330B1 (en) Management system and method for data security for storage device using security device
CN103226680A (en) Shutdown protection method and device
CN108287988B (en) Security management system and method for mobile terminal file
CN102521169A (en) Confidential USB (universal serial bus) memory disk with display screen and security control method of confidential USB memory disk
CN104134024A (en) Mobile terminal privacy protection method and system
CN105516500A (en) Method and system for selecting device mode
CN104732150A (en) Starting method and device for mobile terminal
CN104363352A (en) System determining method, system determining device and terminal
CN104298531A (en) Application method of operating system, application device of operating system, and terminal
WO2015154469A1 (en) Database operation method and device
CN106231594B (en) Mobile terminal information protection method and system
KR101745390B1 (en) Data leakage prevention apparatus and method thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150121