CN104618556B - Information saving method and terminal - Google Patents

Information saving method and terminal Download PDF

Info

Publication number
CN104618556B
CN104618556B CN201410856577.2A CN201410856577A CN104618556B CN 104618556 B CN104618556 B CN 104618556B CN 201410856577 A CN201410856577 A CN 201410856577A CN 104618556 B CN104618556 B CN 104618556B
Authority
CN
China
Prior art keywords
information
storage area
temporary storage
current operation
described information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410856577.2A
Other languages
Chinese (zh)
Other versions
CN104618556A (en
Inventor
郑礼良
林荣辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410856577.2A priority Critical patent/CN104618556B/en
Publication of CN104618556A publication Critical patent/CN104618556A/en
Application granted granted Critical
Publication of CN104618556B publication Critical patent/CN104618556B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention proposes a kind of information saving method and a kind of terminal, and information saving method therein includes:According to the attribute of the information received, the operating system for handling described information is determined in multiple operating systems;Determine whether current operation system is the operating system;When it is determined that current operation system is not the operating system, by in described information storage to temporary storage area, when it is determined that current operation system is the operating system, according to the attribute of described information, storage location is selected to preserve information, wherein, storage location includes the storage region of temporary storage area or current operation system.Pass through technical scheme, when user is inconvenient to handle the information received or is unable to information that timely processing receives, information can be preserved to the temporary storage area to outside current operation system, to avoid information compromised in current operation system, the personal secrets of user are greatly improved, so as to improve Consumer's Experience.

Description

Information saving method and terminal
Technical field
The present invention relates to multisystem field of terminal technology, in particular to a kind of information saving method and a kind of terminal.
Background technology
In the operating system of current terminal, if user is unable to the information such as timely processing incoming call, short message, terminal can incite somebody to action The information such as missed call, unread short messages directly preserve, and are shown in drop-down taskbar, and to prompt user, user can be with The information is checked by pulling down taskbar.However, when the information that user is not intended to receive directly displays in drop-down taskbar, Existing this information preserving type is just very easy to the privacy information of leakage user.
Therefore a kind of new technical scheme is needed, this can be avoided when user is unable to the information that timely processing receives Information is compromised, ensures the security of the information.
The content of the invention
The present invention is based on above mentioned problem, it is proposed that a kind of new technical scheme, can be unable to timely processing in user During the information received, avoid the information compromised, ensure the security of the information
In view of this, the present invention proposes a kind of information saving method, for the terminal with multiple operating systems, bag Include:According to the attribute of the information received, the operating system for handling described information is determined in the multiple operating system; Determine whether current operation system is the operating system;When it is determined that the current operation system is not the operating system, Described information is stored into temporary storage area, when it is determined that the current operation system is the operating system, according to institute The attribute of information is stated, selects storage location to preserve described information, wherein, the storage location includes the temporary storage area Or the storage region of the current operation system.
In the technical scheme, first, it is determined that the operating system for handling the information received, such as, when information is come From secure relationship people in security system when, determine that the information is destined for security system, should be handled by security system.Such as Fruit current operation system is not intended to handle the operating system of the information, can apply in the memory of terminal one piece it is virtual Temporary storage area, and store that information in this temporary storage area, due to information is not stored directly in into current behaviour Make in system, so as to avoid information from being compromised in current system, and then improve the security of information.And in current operation When system is the operating system for handling the information, it can choose whether that needs store information into according to the attribute of information In temporary storage area outside current operation system.Such as when current operation system is security system, when information joins from certain It when being people, can determine whether the contact person is secure relationship people, as the artificial secure relationship people of the contact, can be sent to Information stores in the security system, and if the contact person is not secure relationship people, then can store that information in and deposit temporarily Storage area domain, certainly, can also in order to ensure the security of the information to ensure the sealing of security system and Independent Safety Store it in security system.So, be inconvenient to handle the information received in user or be unable to what timely processing received During information, by the way that information is preserved to temporary storage area information can be avoided compromised in current operation system, greatly promoted The personal secrets of user, so as to improving Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that the attribute according to described information, it is described to preserve to select storage location Information, specifically include:According to the attribute of described information, judge whether described information is security information, wherein, when judged result is When being, by described information storage to the temporary storage area;When judged result is no, by described information storage described in In the storage region of current operation system.
In the technical scheme, it can determine that the information is security information according to the attribute of information in itself, when the letter When breath is not the information that should be handled by current operation system, and when the information is the secure relationship that is set in current operation system During the information that people sends, all the information can be regarded as security information.By the technical program, be inconvenient to handle in user or can not During timely processing security information, by the way that secure information storage in temporary storage area, can be avoided into security information current Operating system is compromised, greatly improves the personal secrets of user, so as to improve Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that by described information storage to the temporary storage area, specifically include: Judge whether the terminal has the temporary storage area established;When judged result is to be, described information is stored Into the temporary storage area established, when judged result for it is no when, a newly-built temporary storage area, and by institute Information storage is stated to arrive in the newly-built temporary storage area.
Can be that the information received establishes one if there is no temporary storage area in terminal in the technical scheme Storage region.And if information of the terminal to receive before establishes temporary storage area, and the information is not looked into also See, be still stored in the temporary storage area, then when terminal receives the information for being unable to timely processing again, can incite somebody to action The information newly received also is stored in the temporary storage area established, without a newly-built temporary storage area again, The memory space of terminal is saved, avoid the operational efficiency of terminal reduces because the temporary storage area opened up is excessive.
In the above-mentioned technical solutions, it is preferable that also include:When receiving to the described information in the temporary storage area Viewing command when, judge whether the level of security of the current operation system is higher than and be used to handle the operation of described information The level of security of system;When judged result for when being, described information is directly viewable in the current operation system, when judgement is tied When fruit is no, the current operation system is authenticated, and after authenticating successfully, institute is checked in the current operation system State information.
In the technical scheme, it is allowed to can open temporary storage area in current operation system, information therein is entered Row is checked.Wherein, can be direct if the level of security of current operation system is higher than the operating system for being used for handling the information The information is checked, and if the level of security of current operation system is equal to or less than be used for the operating system for handling the information, then Then need to authenticate when checking the information in request again temporary storage area, only after authenticating successfully, can just check the information, So as to ensure that the Independent Safety of the information in temporary storage area.The mode of opening temporary storage area can have a variety of. For example if current operation system is security system, in current interface a temporary storage area can be set to release the button, led to This is crossed to release the button into temporary storage area.For another example, can be by opening ways if current operation system is conventional system It is arranged to just open temporary storage area for user when long-press screen exceedes the scheduled time, this opening ways are more concealed, can Preferably to protect the information security of user.When user views the information in temporary storage area, by clicking on the information Message processing flow is directly entered, or system switching is carried out by clicking on the information, then or is ejected by clicking on the information Authentication interface, carry out system switching again after by authentication.
In addition, if the information in temporary storage area is the information of current operation system, or when carry out system switching Afterwards, the information in temporary storage area is the information of current operation system, now, can be directly in position displays such as drop-down taskbars Information in temporary storage area, so that user simply checks the information in positions such as drop-down taskbars.
In the above-mentioned technical solutions, it is preferable that also include:Check all letters in the temporary storage area After breath, the temporary storage area is deleted.
In the technical scheme, after all information in temporary storage area have been checked, scratchpad area (SPA) can be deleted Domain, to discharge memory space, lift the operational efficiency of terminal.Simultaneously as these information have been checked and finished, deletion is deposited temporarily While storage area domain, these information can be also deleted, and so as to avoid the leakage of information, greatly improve the information security of terminal Property.
In the above-mentioned technical solutions, it is preferable that the attribute of described information includes at least one of or its combination:The letter The contact name of breath, the contact type of described information, described information contact number, receive described information time, The type of described information.
In the technical scheme, the attribute of information includes but is not limited at least one of or its combination:Send information The title of contact person, type, number, and the time of receive information, the type of information.Can be true by these attributes of information Determine which operating system is information be intended for, so as to further determine that whether current operation system is used for the operation of receive information System, to further determine whether to need that the information for being inconvenient to immediately treat is stored in temporary storage area.
Another aspect of the present invention also proposed a kind of terminal, have multiple operating systems, including:Determining unit, according to The attribute of the information received, determine for handling the operating system of described information, and determine in the multiple operating system Whether current operation system is the operating system;Memory cell, when it is determined that the current operation system is not the operation system During system, described information storage is arrived in the temporary storage area of the memory cell, when it is determined that the current operation system is institute When stating operating system, according to the attribute of described information, storage location is determined in the memory cell to preserve described information, its In, the storage location includes the storage region of the temporary storage area or the current operation system.
In the technical scheme, first, it is determined that the operating system for handling the information received, such as, when information is come From secure relationship people in security system when, determine that the information is destined for security system, should be handled by security system.Such as Fruit current operation system is not intended to handle the operating system of the information, can apply in the memory of terminal one piece it is virtual Temporary storage area, and store that information in this temporary storage area, due to information is not stored directly in into current behaviour Make in system, so as to avoid information from being compromised in current system, and then improve the security of information.And in current operation When system is the operating system for handling the information, it can choose whether that needs store information into according to the attribute of information In temporary storage area outside current operation system.Such as when current operation system is security system, when information joins from certain It when being people, can determine whether the contact person is secure relationship people, as the artificial secure relationship people of the contact, can be sent to Information stores in the security system, and if the contact person is not secure relationship people, then can store that information in and deposit temporarily Storage area domain, certainly, can also in order to ensure the security of the information to ensure the sealing of security system and Independent Safety Store it in security system.So, be inconvenient to handle the information received in user or be unable to what timely processing received During information, by the way that information is preserved to temporary storage area information can be avoided compromised in current operation system, greatly promoted The personal secrets of user, so as to improving Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that the memory cell includes:First judging unit, when it is determined that described current When operating system is the operating system, according to the attribute of described information, judge whether described information is security information, wherein, When judged result for when being, described information storage is arrived in the temporary storage area, when judged result is no, by the letter Breath storage is arrived in the storage region of the current operation system.
In the technical scheme, it can determine that the information is security information according to the attribute of information in itself, when the letter When breath is not the information that should be handled by current operation system, and when the information is the secure relationship that is set in current operation system During the information that people sends, all the information can be regarded as security information.By the technical program, be inconvenient to handle in user or can not During timely processing security information, by the way that secure information storage in temporary storage area, can be avoided into security information current Operating system is compromised, greatly improves the personal secrets of user, so as to improve Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that the memory cell also includes:Second judging unit, it is determined that by described in When information storage is into the temporary storage area, judge whether the terminal has the temporary storage area established; And when judged result is to be, by described information storage to the temporary storage area established of the memory cell It is interior, when judged result is no, a newly-built temporary storage area in the memory cell, and described information is stored Into the newly-built temporary storage area.
Can be that the information received establishes one if there is no temporary storage area in terminal in the technical scheme Storage region.And if information of the terminal to receive before establishes temporary storage area, and the information is not looked into also See, be still stored in the temporary storage area, then when terminal receives the information for being unable to timely processing again, can incite somebody to action The information newly received also is stored in the temporary storage area established, without a newly-built temporary storage area again, The memory space of terminal is saved, avoid the operational efficiency of terminal reduces because the temporary storage area opened up is excessive.
In the above-mentioned technical solutions, it is preferable that also include:3rd judging unit, when receiving to the scratchpad area (SPA) During the viewing command of the described information in domain, judge whether the level of security of the current operation system is described higher than for handling The level of security of the operating system of information, wherein, when judged result is to be, directly looked into the current operation system Described information is seen, when judged result is no, the current operation system is authenticated, and after authenticating successfully, described Described information is checked in current operation system.
In the technical scheme, it is allowed to can open temporary storage area in current operation system, information therein is entered Row is checked.Wherein, can be direct if the level of security of current operation system is higher than the operating system for being used for handling the information The information is checked, and if the level of security of current operation system is equal to or less than be used for the operating system for handling the information, then Then need to authenticate when checking the information in request again temporary storage area, only after authenticating successfully, can just check the information, So as to ensure that the Independent Safety of the information in temporary storage area.The mode of opening temporary storage area can have a variety of. For example if current operation system is security system, in current interface a temporary storage area can be set to release the button, led to This is crossed to release the button into temporary storage area.For another example, can be by opening ways if current operation system is conventional system It is arranged to just open temporary storage area for user when long-press screen exceedes the scheduled time, this opening ways are more concealed, can Preferably to protect the information security of user.When user views the information in temporary storage area, by clicking on the information Message processing flow is directly entered, or system switching is carried out by clicking on the information, then or is ejected by clicking on the information Authentication interface, carry out system switching again after by authentication.
In addition, if the information in temporary storage area is the information of current operation system, or when carry out system switching Afterwards, the information in temporary storage area is the information of current operation system, now, can be directly in position displays such as drop-down taskbars Information in temporary storage area, so that user simply checks the information in positions such as drop-down taskbars.
In the above-mentioned technical solutions, it is preferable that also include:Unit is deleted, is checked in the temporary storage area After all described informations, the temporary storage area is deleted.
In the technical scheme, after all information in temporary storage area have been checked, scratchpad area (SPA) can be deleted Domain, to discharge memory space, lift the operational efficiency of terminal.Simultaneously as these information have been checked and finished, deletion is deposited temporarily While storage area domain, these information can be also deleted, and so as to avoid the leakage of information, greatly improve the information security of terminal Property.
In the above-mentioned technical solutions, it is preferable that the attribute of described information includes at least one of or its combination:The letter The contact name of breath, the contact type of described information, described information contact number, receive described information time, The type of described information.
In the technical scheme, the attribute of information includes but is not limited at least one of or its combination:Send information The title of contact person, type, number, and the time of receive information, the type of information.Can be true by these attributes of information Determine which operating system is information be intended for, so as to further determine that whether current operation system is used for the operation of receive information System, to further determine whether to need that the information for being inconvenient to immediately treat is stored in temporary storage area.
By above technical scheme, the letter that timely processing receives is inconvenient to handle the information received or is unable in user During breath, information can be preserved to the temporary storage area to outside current operation system, to avoid information in current operation system quilt Leakage, the personal secrets of user are greatly improved, so as to improve Consumer's Experience.
Brief description of the drawings
Fig. 1 shows the flow chart of information saving method according to an embodiment of the invention;
Fig. 2 shows the block diagram of terminal according to an embodiment of the invention;
Fig. 3 shows terminal reception according to another embodiment of the invention and the flow chart of display information;
Fig. 4 shows the flow chart that unprocessed information is checked in the terminal of yet another embodiment of the present invention;
Fig. 5 shows the flow chart for receiving, showing and checking information in the terminal of another embodiment of the present invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be different from other modes described here using other to implement, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the flow chart of information saving method according to an embodiment of the invention.
As shown in figure 1, information saving method according to an embodiment of the invention, comprises the following steps:
Step 102, according to the attribute of the information received, the operation for processing information is determined in multiple operating systems System.
Step 104, determine whether current operation system is operating system.
Step 106, when it is determined that current operation system is not operating system, store information into temporary storage area, When it is determined that current operation system is operating system, according to the attribute of information, storage location is selected to preserve information, wherein, deposit Storage space puts the storage region including temporary storage area or current operation system.
In the technical scheme, first, it is determined that the operating system for handling the information received, such as, when information is come From secure relationship people in security system when, determine that the information is destined for security system, should be handled by security system.Such as Fruit current operation system is not intended to handle the operating system of the information, can apply in the memory of terminal one piece it is virtual Temporary storage area, and store that information in this temporary storage area, due to information is not stored directly in into current behaviour Make in system, so as to avoid information from being compromised in current system, and then improve the security of information.And in current operation When system is the operating system for handling the information, it can choose whether that needs store information into according to the attribute of information In temporary storage area outside current operation system.Such as when current operation system is security system, when information joins from certain It when being people, can determine whether the contact person is secure relationship people, as the artificial secure relationship people of the contact, can be sent to Information stores in the security system, and if the contact person is not secure relationship people, then can store that information in and deposit temporarily Storage area domain, certainly, can also in order to ensure the security of the information to ensure the sealing of security system and Independent Safety Store it in security system.So, be inconvenient to handle the information received in user or be unable to what timely processing received During information, by the way that information is preserved to temporary storage area information can be avoided compromised in current operation system, greatly promoted The personal secrets of user, so as to improving Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that step 106 includes:According to the attribute of information, judge whether information is safety Information, wherein, when judged result is to be, store information into temporary storage area;When judged result is no, by information Store in the storage region of current operation system.
In the technical scheme, it can determine that the information is security information according to the attribute of information in itself, when the letter When breath is not the information that should be handled by current operation system, and when the information is the secure relationship that is set in current operation system During the information that people sends, all the information can be regarded as security information.By the technical program, be inconvenient to handle in user or can not During timely processing security information, by the way that secure information storage in temporary storage area, can be avoided into security information current Operating system is compromised, greatly improves the personal secrets of user, so as to improve Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that step 106 also includes:Judge whether terminal has that has established to deposit temporarily Storage area domain;When judged result when being, to store information into the temporary storage area established, when judged result is no, A newly-built temporary storage area, and store information into newly-built temporary storage area.
Can be that the information received establishes one if there is no temporary storage area in terminal in the technical scheme Storage region.And if information of the terminal to receive before establishes temporary storage area, and the information is not looked into also See, be still stored in the temporary storage area, then when terminal receives the information for being unable to timely processing again, can incite somebody to action The information newly received also is stored in the temporary storage area established, without a newly-built temporary storage area again, The memory space of terminal is saved, avoid the operational efficiency of terminal reduces because the temporary storage area opened up is excessive.
In the above-mentioned technical solutions, it is preferable that after step 106, in addition to:When receiving to the scratchpad area (SPA) During the viewing command of the described information in domain, judge whether the level of security of the current operation system is described higher than for handling The level of security of the operating system of information;When judged result is to be, institute is directly viewable in the current operation system Information is stated, when judged result is no, the current operation system is authenticated, and after authenticating successfully, described current Described information is checked in operating system.
In the technical scheme, it is allowed to can open temporary storage area in current operation system, information therein is entered Row is checked.Wherein, can be direct if the level of security of current operation system is higher than the operating system for being used for handling the information The information is checked, and if the level of security of current operation system is equal to or less than be used for the operating system for handling the information, then Then need to authenticate when checking the information in request again temporary storage area, only after authenticating successfully, can just check the information, So as to ensure that the Independent Safety of the information in temporary storage area.The mode of opening temporary storage area can have a variety of. For example if current operation system is security system, in current interface a temporary storage area can be set to release the button, led to This is crossed to release the button into temporary storage area.For another example, can be by opening ways if current operation system is conventional system It is arranged to just open temporary storage area for user when long-press screen exceedes the scheduled time, this opening ways are more concealed, can Preferably to protect the information security of user.When user views the information in temporary storage area, by clicking on the information Message processing flow is directly entered, or system switching is carried out by clicking on the information, then or is ejected by clicking on the information Authentication interface, carry out system switching again after by authentication.
In addition, if the information in temporary storage area is the information of current operation system, or when carry out system switching Afterwards, the information in temporary storage area is the information of current operation system, now, can be directly in position displays such as drop-down taskbars Information in temporary storage area, so that user simply checks the information in positions such as drop-down taskbars.
In the above-mentioned technical solutions, it is preferable that also include:After all information in temporary storage area have been checked, Delete temporary storage area.
In the technical scheme, after all information in temporary storage area have been checked, scratchpad area (SPA) can be deleted Domain, to discharge memory space, lift the operational efficiency of terminal.Simultaneously as these information have been checked and finished, deletion is deposited temporarily While storage area domain, these information can be also deleted, and so as to avoid the leakage of information, greatly improve the information security of terminal Property.
In the above-mentioned technical solutions, it is preferable that the attribute of information includes at least one of or its combination:The contact of information People's title, the contact type of information, the contact number of information, the time of receive information, the type of information.
In the technical scheme, the attribute of information includes but is not limited at least one of or its combination:Send information The title of contact person, type, number, and the time of receive information, the type of information.Can be true by these attributes of information Determine which operating system is information be intended for, so as to further determine that whether current operation system is used for the operation of receive information System, to further determine whether to need that the information for being inconvenient to immediately treat is stored in temporary storage area.
Fig. 2 shows the block diagram of terminal according to an embodiment of the invention.
As shown in Fig. 2 the terminal 200 of one embodiment of the present of invention has multiple operating systems, including:Determining unit 202, according to the attribute of the information received, the operating system for processing information is determined in multiple operating systems, and determine Whether current operation system is operating system;Memory cell 204, when it is determined that current operation system is not operating system, it will believe Breath storage is arrived in the temporary storage area of memory cell, when it is determined that current operation system is operating system, according to the category of information Property, storage location is determined in the memory unit to preserve information, wherein, storage location includes temporary storage area or current operation The storage region of system.
In the technical scheme, first, it is determined that the operating system for handling the information received, such as, when information is come From secure relationship people in security system when, determine that the information is destined for security system, should be handled by security system.Such as Fruit current operation system is not intended to handle the operating system of the information, can apply in the memory of terminal one piece it is virtual Temporary storage area, and store that information in this temporary storage area, due to information is not stored directly in into current behaviour Make in system, so as to avoid information from being compromised in current system, and then improve the security of information.And in current operation When system is the operating system for handling the information, it can choose whether that needs store information into according to the attribute of information In temporary storage area outside current operation system.Such as when current operation system is security system, when information joins from certain It when being people, can determine whether the contact person is secure relationship people, as the artificial secure relationship people of the contact, can be sent to Information stores in the security system, and if the contact person is not secure relationship people, then can store that information in and deposit temporarily Storage area domain, certainly, can also in order to ensure the security of the information to ensure the sealing of security system and Independent Safety Store it in security system.So, be inconvenient to handle the information received in user or be unable to what timely processing received During information, by the way that information is preserved to temporary storage area information can be avoided compromised in current operation system, greatly promoted The personal secrets of user, so as to improving Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that memory cell 204 includes:First judging unit 2042, when it is determined that current behaviour When as system being operating system, according to the attribute of information, judge whether information is security information, wherein, when judged result is yes When, store information into temporary storage area, when judged result is no, store information into the storage of current operation system In region.
In the technical scheme, it can determine that the information is security information according to the attribute of information in itself, when the letter When breath is not the information that should be handled by current operation system, and when the information is the secure relationship that is set in current operation system During the information that people sends, all the information can be regarded as security information.By the technical program, be inconvenient to handle in user or can not During timely processing security information, by the way that secure information storage in temporary storage area, can be avoided into security information current Operating system is compromised, greatly improves the personal secrets of user, so as to improve Consumer's Experience.
In the above-mentioned technical solutions, it is preferable that memory cell 204 also includes:Second judging unit 2044, it is determined that will letter When breath storage is into temporary storage area, judge whether terminal has the temporary storage area established;And work as judged result During to be, store information into the temporary storage area established of memory cell, it is single in storage when judged result is no A newly-built temporary storage area in member, and store information into newly-built temporary storage area.
Can be that the information received establishes one if there is no temporary storage area in terminal in the technical scheme Storage region.And if information of the terminal to receive before establishes temporary storage area, and the information is not looked into also See, be still stored in the temporary storage area, then when terminal receives the information for being unable to timely processing again, can incite somebody to action The information newly received also is stored in the temporary storage area established, without a newly-built temporary storage area again, The memory space of terminal is saved, avoid the operational efficiency of terminal reduces because the temporary storage area opened up is excessive.
In the above-mentioned technical solutions, it is preferable that also include:3rd judging unit, when receiving to the scratchpad area (SPA) During the viewing command of the described information in domain, judge whether the level of security of the current operation system is described higher than for handling The level of security of the operating system of information, wherein, when judged result is to be, directly looked into the current operation system Described information is seen, when judged result is no, the current operation system is authenticated, and after authenticating successfully, described Described information is checked in current operation system.
In the technical scheme, it is allowed to can open temporary storage area in current operation system, information therein is entered Row is checked.Wherein, can be direct if the level of security of current operation system is higher than the operating system for being used for handling the information The information is checked, and if the level of security of current operation system is equal to or less than be used for the operating system for handling the information, then Then need to authenticate when checking the information in request again temporary storage area, only after authenticating successfully, can just check the information, So as to ensure that the Independent Safety of the information in temporary storage area.The mode of opening temporary storage area can have a variety of. For example if current operation system is security system, in current interface a temporary storage area can be set to release the button, led to This is crossed to release the button into temporary storage area.For another example, can be by opening ways if current operation system is conventional system It is arranged to just open temporary storage area for user when long-press screen exceedes the scheduled time, this opening ways are more concealed, can Preferably to protect the information security of user.When user views the information in temporary storage area, by clicking on the information Message processing flow is directly entered, or system switching is carried out by clicking on the information, then or is ejected by clicking on the information Authentication interface, carry out system switching again after by authentication.
In addition, if the information in temporary storage area is the information of current operation system, or when carry out system switching Afterwards, the information in temporary storage area is the information of current operation system, now, can be directly in position displays such as drop-down taskbars Information in temporary storage area, so that user simply checks the information in positions such as drop-down taskbars.
In the above-mentioned technical solutions, it is preferable that also include:Unit 208 is deleted, checks the institute in temporary storage area After having information, temporary storage area is deleted.
In the technical scheme, after all information in temporary storage area have been checked, scratchpad area (SPA) can be deleted Domain, to discharge memory space, lift the operational efficiency of terminal.Simultaneously as these information have been checked and finished, deletion is deposited temporarily While storage area domain, these information can be also deleted, and so as to avoid the leakage of information, greatly improve the information security of terminal Property.
In the above-mentioned technical solutions, it is preferable that the attribute of information includes at least one of or its combination:The contact of information People's title, the contact type of information, the contact number of information, the time of receive information, the type of information.
In the technical scheme, the attribute of information includes but is not limited at least one of or its combination:Send information The title of contact person, type, number, and the time of receive information, the type of information.Can be true by these attributes of information Determine which operating system is information be intended for, so as to further determine that whether current operation system is used for the operation of receive information System, to further determine whether to need that the information for being inconvenient to immediately treat is stored in temporary storage area.
Fig. 3 shows terminal reception according to another embodiment of the invention and the flow chart of display information.
As shown in figure 3, the terminal of an alternative embodiment of the invention has two operation systems of conventional system and security system System, the terminal receives and the flow of display information is as follows:
Step 302, terminal receives information.
Step 304, judge whether the information comes from conventional system, when judged result for when being, into step 306, when sentencing When disconnected result is no, into step 312.
Step 306, judge whether current operation system is conventional system, when judged result for when being, into step 308, When judged result is no, into step 310.
Step 308, the information is shown in drop-down taskbar.The information of conventional system is directly displayed in conventional system.
Step 310, the information is shown in temporary storage area.Because current system is security system, its letter received Breath is not that the system owns, and therefore, can store the information into the temporary storage area beyond security system and be shown.
Step 312, judge whether current operation system is security system, when judged result for when being, into step 314, When judged result is no, into step 316.
Step 314, the information is shown in drop-down taskbar.When receiving the information to security system in the security system, Directly the information can be prompted in drop-down taskbar, can appointed to be unable to the user of the timely processing information from drop-down Business column, which is clicked on, checks the information.Now, in security system or storage can be stored in by pulling down the information of taskbar In the temporary storage area beyond security system.
Step 316, the information is shown in temporary storage area.When the information of security system is received in conventional system, Because conventional system is without the authority for handling the information, when user is unable to the timely processing information, in order to ensure the information Security, avoid information leakage, can store that information in the temporary storage area beyond conventional system, and be shown to User.
By the technical scheme, the information that timely processing receives is inconvenient to handle the information received or is unable in user When, information can be preserved to the temporary storage area to outside current operation system and shown, to avoid information from being grasped currently Make that system is compromised, the personal secrets of user are greatly improved, so as to improve Consumer's Experience.
Fig. 4 shows the flow chart that unprocessed information is checked in the terminal of yet another embodiment of the present invention.
As shown in figure 4, the terminal in yet another embodiment of the present invention has two operations of conventional system and security system System, the terminal check that the flow of unprocessed information is as follows:
Step 402, terminal receives the order for checking unprocessed information.
Step 404, judge whether the information comes from conventional system, when judged result for when being, into step 406, when sentencing When disconnected result is no, into step 412.
Step 406, judge whether current operation system is conventional system, when judged result for when being, into step 408, When judged result is no, into step 410.
Step 408, it is directly viewable unprocessed information, i.e., is directly viewable in conventional system and issues the information of conventional system.
Step 410, it is directly viewable unprocessed information in temporary storage area.Because current system is security system, it connects The information received is not that the system owns, and therefore, can be stored the information into the temporary storage area beyond security system Checked.
Step 412, judge whether current operation system is security system, when judged result for when being, into step 414, When judged result is no, into step 416.
Step 414, it is directly viewable unprocessed information in temporary storage area.Current system is security system, can be under Draw taskbar to show the information of temporary storage area, be directly viewable with facilitating.
Step 416, determine whether to check the information, when judged result is to be, into step 418, when judgement is tied When fruit is no, into step 420.
Step 418, it is directly viewable unprocessed information.
Step 420, unprocessed information is stored in temporary storage area, for being checked after entrance security system.
By the technical scheme, the information that timely processing receives is inconvenient to handle the information received or is unable in user When, information can be preserved to the temporary storage area to outside current operation system, so that user checks, and avoid information current Operating system is compromised, greatly improves the personal secrets of user, so as to improve Consumer's Experience.
Fig. 5 shows the flow chart for receiving, showing and checking information in the terminal of another embodiment of the present invention.
As shown in figure 5, the terminal in another embodiment of the present invention has two operations of conventional system and security system System, the terminal receive, show and check that the flow of information is as follows:
Step 502, terminal receives information.
Step 504, judge whether the information comes from conventional system, when judged result for when being, into step 506, when sentencing When disconnected result is no, into step 518.
Step 506, judge whether current operation system is conventional system, when judged result for when being, into step 508, When judged result is no, into step 514.
Step 508, judge whether to receive the viewing command to the information, when judged result is to be, into step 510, when judged result is no, into step 512.
Step 510, it is directly viewable the information.It is directly viewable in conventional system and issues the information of conventional system.
Step 512, drop-down taskbar show the information, and return to step 506, continue to detect current operating system be Which operating system, to change the processing mode to viewing command in time in switching operating system.Do not check the information When, the notice of the information can be included pulling down taskbar, so that user is directly viewable the information by pulling down taskbar.
Step 514, judge whether to receive the viewing command to the information, when judged result is to be, into step 510, when judged result is no, into step 516.
Step 516, the information, and return to step 506 are shown in temporary storage area, continues to detect current operating system For which operating system, to change the processing mode to viewing command in time in switching operating system.Due to current system For security system, its information received is not that the system owns, and therefore, can be stored the information into beyond security system Checked in temporary storage area.
Step 518, judge whether current operation system is security system, when judged result for when being, into step 520, When judged result is no, into step 524.
Step 520, judge whether to receive the viewing command to the information, when judged result is to be, into step 510, when judged result is no, into step 522.
Step 522, the information, and return to step 518 are shown in temporary storage area, continues to detect current operating system For which operating system, to change the processing mode to viewing command in time in switching operating system.Although current system Security system, but user can not the timely processing information, therefore, can store the information into beyond security system In temporary storage area, to lift the security of the information, also, the letter that user can check in temporary storage area at any time Breath.
Step 524, judge whether to receive the viewing command to the information, when judged result is to be, into step 510, when judged result is no, into step 526.
Step 526, the information, and return to step 518 are shown in temporary storage area, continues to detect current operating system For which operating system, to change the processing mode to viewing command in time in switching operating system.Due to current system For conventional system, ability of the conventional system without the information for directly storing security system, therefore, can store the information into Checked in temporary storage area beyond conventional system for user.
By the technical scheme, the information that timely processing receives is inconvenient to handle the information received or is unable in user When, information can be preserved to temporary storage area and display to outside current operation system, so that user checks, and avoid information It is compromised in current operation system, the personal secrets of user are greatly improved, so as to improve Consumer's Experience.
Technical scheme is described in detail above in association with accompanying drawing, by technical scheme, in user not When conveniently handling the information received or being unable to information that timely processing receives, information can be preserved to current operation system Outer temporary storage area, to avoid information compromised in current operation system, the personal secrets of user are greatly improved, so as to Improve Consumer's Experience.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included in the scope of the protection.

Claims (8)

  1. A kind of 1. information saving method, for the terminal with multiple operating systems, it is characterised in that including:
    According to the attribute of the information received, the operation system for handling described information is determined in the multiple operating system System;
    Determine whether current operation system is the operating system;
    When it is determined that the current operation system is not the operating system, described information is stored into temporary storage area, When it is determined that the current operation system is the operating system, according to the attribute of described information, storage location is selected to preserve Described information, wherein, the storage location includes the storage region of the temporary storage area or the current operation system;
    The attribute according to described information, storage location is selected to be specifically included to preserve described information:
    According to the attribute of described information, judge whether described information is security information, wherein,
    When judged result is to be, by described information storage to the temporary storage area;
    When judged result is no, by described information storage to the storage region of the current operation system.
  2. 2. information saving method according to claim 1, it is characterised in that the interim storage is arrived into described information storage In region, specifically include:
    Judge whether the terminal has the temporary storage area established;
    When judged result for when being, described information is stored into the temporary storage area established,
    When judged result for it is no when, a newly-built temporary storage area, and by described information storage to facing described in newly-built When storage region in.
  3. 3. information saving method according to claim 2, it is characterised in that also include:
    When receiving the viewing command to the described information in the temporary storage area, the current operation system is judged Whether level of security is higher than the level of security for the operating system for being used to handle described information;
    When judged result for when being, described information is directly viewable in the current operation system,
    When judged result is no, the current operation system is authenticated, and after authenticating successfully, in the current operation Described information is checked in system.
  4. 4. information saving method according to any one of claim 1 to 3, it is characterised in that also include:
    After all described informations in the temporary storage area have been checked, the temporary storage area is deleted.
  5. 5. a kind of terminal, there are multiple operating systems, it is characterised in that including:
    Determining unit, according to the attribute of the information received, determine to be used to handle described information in the multiple operating system Operating system, and determine whether current operation system is the operating system;
    Memory cell, when it is determined that the current operation system is not the operating system, described information storage is deposited described in In the temporary storage area of storage unit, when it is determined that the current operation system is the operating system, according to described information Attribute, storage location is determined in the memory cell to preserve described information, wherein, the storage location includes described interim The storage region of storage region or the current operation system;
    The memory cell includes:
    First judging unit, when it is determined that the current operation system is the operating system, according to the attribute of described information, sentence Whether disconnected described information is security information, wherein,
    When judged result for when being, described information storage is arrived in the temporary storage area, when judged result is no, by institute Information storage is stated to arrive in the storage region of the current operation system.
  6. 6. terminal according to claim 5, it is characterised in that the memory cell also includes:
    Second judging unit, when it is determined that described information is stored into the temporary storage area, whether judge the terminal With the temporary storage area established;And
    When judged result is to be, by described information storage to the temporary storage area established of the memory cell It is interior, when judged result is no, a newly-built temporary storage area in the memory cell, and described information is stored Into the newly-built temporary storage area.
  7. 7. terminal according to claim 6, it is characterised in that also include:
    3rd judging unit, when receiving the viewing command to the described information in the temporary storage area, described in judgement Whether the level of security of current operation system is higher than the level of security for the operating system for being used to handle described information, wherein, When judged result for when being, described information is directly viewable in the current operation system, when judged result is no, to described Current operation system is authenticated, and after authenticating successfully, described information is checked in the current operation system.
  8. 8. the terminal according to any one of claim 5 to 7, it is characterised in that also include:
    Unit is deleted, after all described informations in the temporary storage area have been checked, deletes the scratchpad area (SPA) Domain.
CN201410856577.2A 2014-12-31 2014-12-31 Information saving method and terminal Active CN104618556B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410856577.2A CN104618556B (en) 2014-12-31 2014-12-31 Information saving method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410856577.2A CN104618556B (en) 2014-12-31 2014-12-31 Information saving method and terminal

Publications (2)

Publication Number Publication Date
CN104618556A CN104618556A (en) 2015-05-13
CN104618556B true CN104618556B (en) 2018-02-13

Family

ID=53152829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410856577.2A Active CN104618556B (en) 2014-12-31 2014-12-31 Information saving method and terminal

Country Status (1)

Country Link
CN (1) CN104618556B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412217B (en) * 2015-07-31 2019-10-11 宇龙计算机通信科技(深圳)有限公司 A kind of connecting information management method, device and terminal
CN106485159B (en) 2015-08-28 2020-05-29 腾讯科技(深圳)有限公司 Network security storage method and device
CN106375349B (en) * 2016-11-29 2019-11-08 北京元心科技有限公司 Multi-system notification message processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1561129A (en) * 2004-03-09 2005-01-05 惠州Tcl移动通信有限公司 Mobile phone message security method
CN102209137A (en) * 2011-05-26 2011-10-05 朱莉君 Private account system of mobile terminal private account system and realization method
CN102255992A (en) * 2010-05-17 2011-11-23 上海复旦天臣新技术有限公司 Method for managing short messages by utilizing mobile phone software
CN102957804A (en) * 2012-11-16 2013-03-06 深圳桑菲消费通信有限公司 Multi-account application cell phone and use method thereof
CN104202734A (en) * 2014-09-23 2014-12-10 酷派软件技术(深圳)有限公司 Notification processing method, notification processing device and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1561129A (en) * 2004-03-09 2005-01-05 惠州Tcl移动通信有限公司 Mobile phone message security method
CN102255992A (en) * 2010-05-17 2011-11-23 上海复旦天臣新技术有限公司 Method for managing short messages by utilizing mobile phone software
CN102209137A (en) * 2011-05-26 2011-10-05 朱莉君 Private account system of mobile terminal private account system and realization method
CN102957804A (en) * 2012-11-16 2013-03-06 深圳桑菲消费通信有限公司 Multi-account application cell phone and use method thereof
CN104202734A (en) * 2014-09-23 2014-12-10 酷派软件技术(深圳)有限公司 Notification processing method, notification processing device and terminal

Also Published As

Publication number Publication date
CN104618556A (en) 2015-05-13

Similar Documents

Publication Publication Date Title
CN104008313B (en) The guard method of privacy information and device
CN104796529B (en) The based reminding method and system of untreated event based on dual system
CN104243716B (en) Information acquiring method and device
CN104270525B (en) Information processing method and information processor
CN104978109B (en) A kind of Application Program Interface display methods and terminal
WO2016045192A1 (en) Notification processing method, notification processing device, and terminal
CN105119799A (en) Instant communication message processing method and client
CN104618556B (en) Information saving method and terminal
CN104539791B (en) The method and device of instant messaging is carried out in communication terminal
CN103970422A (en) Screen transparency automatic changing method of mobile terminal and mobile terminal
CN101252748A (en) System and method for realizing privacy SMS on mobile terminal
CN103186331A (en) Display method and system for intelligent terminal interface
CN107133498A (en) A kind of privacy application management method and device and mobile terminal
CN103856919B (en) Method for sending information and device and message receiving method and device
US10097685B2 (en) Telecommunications privacy method
CN103888607A (en) Method and system for viewing privacy short message services of mobile terminal
CN105893870A (en) Information processing method and device
CN104243708A (en) Mobile terminal and anti-theft method and device of mobile terminal
CN104580691B (en) A kind of short message delet method and terminal
CN106031202B (en) Method for sending information and device and message receiving method and device
CN105721664B (en) A kind of SMS processing method and device
CN104854599B (en) The processing method of mobile terminal, wearable device and communication information
CN104954432B (en) A kind of approaches to IM and terminal device
EP3125588A1 (en) Information transmitting method and device and information receiving method and device
CN104574043A (en) Schedule reminding method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant