CN104618894B - Data processing equipment and data processing method - Google Patents

Data processing equipment and data processing method Download PDF

Info

Publication number
CN104618894B
CN104618894B CN201510033718.5A CN201510033718A CN104618894B CN 104618894 B CN104618894 B CN 104618894B CN 201510033718 A CN201510033718 A CN 201510033718A CN 104618894 B CN104618894 B CN 104618894B
Authority
CN
China
Prior art keywords
data
operating system
processing
external equipment
unit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510033718.5A
Other languages
Chinese (zh)
Other versions
CN104618894A (en
Inventor
刘东海
张碧君
何从华
袁刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510033718.5A priority Critical patent/CN104618894B/en
Publication of CN104618894A publication Critical patent/CN104618894A/en
Priority to PCT/CN2015/082877 priority patent/WO2016115833A1/en
Application granted granted Critical
Publication of CN104618894B publication Critical patent/CN104618894B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a kind of data processing equipment, data processing method, device includes:First communication unit, receives the first business datum from the first identification card, transfers data to monitoring control unit;Second communication unit, receive the second business datum from the second identification card, by the second business data transmission to monitoring control unit, first business datum and the second business datum are divided into the first operating system data and the second operating system data by monitoring control unit, and are respectively sent to first processing units and second processing unit;First processing units handle the first operating system data, and data interaction is carried out based on the external equipment of the first operating system data and terminal;Second processing cell processing the second operating system data, data interaction is carried out based on the external equipment of the second operating system data and terminal.By the technical solution, it can fundamentally ensure the safety of private data while the processing speed of data is improved.

Description

Data processing equipment and data processing method
Technical field
The present invention relates to field of communication technology, in particular to a kind of data processing equipment and a kind of data processing side Method.
Background technology
Traditional double standby framework is as shown in Figure 1, have two Modem, Modem1 and Modem2 can be with CPU interactive voices The data such as business and data service.Two Modem share a CPU (cell phone processor), and mobile phone EMS memory is handled by CPU (RAM) and the data in mobile phone memory (EMMC), so that with external equipment interaction data, control peripheral hardware (external equipment) is reached Purpose.
The defects of existing scheme, is:
1st, traditional double standby framework operation dual system, using Trustzone technologies, is physically separated at CPU layers, is Encryption data provides the performing environment of safety.Actual conditions show:Traditional two Modem of double standby framework share a CPU, All data include Voice traffic data, data service data and other data all by CPU processing, with flying for intelligent machine Speed develops, and the data volume in intelligent machine is very huge, and a CPU can cause data processing speed substantially partially slow, influence user's body Test;
Although the 2, being physically isolated at CPU layers, all data are all easily mixed by a CPU processing, data Disorderly, the security of the significant data such as phone contacts, short message, security password, bank account and privacy cannot get effective guarantee, It can not accomplish individual secure truly;
3rd, traditional intelligence machine only has a RAM and EMMC to handle huge data, is seriously affected when data volume sharply increases The stability of RAM and EMMC, all data safety mixed in together that can also influence personal private data;Rule of thumb, RAM and Data corruption easily causes mobile phone to crash in EMCC, influences the safety of personal data.
Therefore, it is necessary to a kind of new technical solution, can fundamentally ensure while the processing speed of data is improved The safety of private data.
The content of the invention
The present invention is based on the above problem, it is proposed that a kind of new technical solution, can improve the processing speed of data Fundamentally ensure the safety of private data while spending, improve the usage experience of user.
In view of this, the present invention proposes a kind of data processing equipment, and for terminal, the terminal has the first operation system System and the second operating system, wherein the security level of first operating system is higher than the safe level of second operating system Not, described device includes:First communication unit, is connected with monitoring control unit, receives first from the first identification card Business datum, and by first business data transmission to the monitoring control unit;Second communication unit, is controlled with the monitoring Unit processed connection, receives the second business datum from the second identification card, and by second business data transmission to institute State monitoring control unit;The monitoring control unit, is connected between first communication unit and first processing units, at the same time It is connected between second communication unit and second processing unit, receives and lead to from first communication unit and described second Believe the first business datum and the second business datum of unit, and first business datum and second business datum are divided For the corresponding first operating system data of first operating system and the second operating system data, and by the described first operation it is Data sending of uniting is to the first processing units, by the second operating system data sending to the second processing unit;Institute State first processing units, for handling the first operating system data, and based on the first operating system data with it is described The external equipment of terminal carries out data interaction;The second processing unit, for handling the second operating system data, and base Data interaction is carried out in the external equipment of the second operating system data and the terminal.
In the technical scheme, in order to improve Information Security, terminal is configured for multiple processors, and specifies different Data in processor processing different operating system.Such as first operating system be secure operating system, the second operating system is Normal operating system, in this way, terminal configures two processors, a processor is used for handling the safe number in secure operating system According to such as secure relationship people, security information, safety call record, safe schedule, safety account data, another processor are used To handle the data in normal operating system, as photo, ordinary contacts, normal short message, common message registration, common schedule, Common account etc., is respectively processed so as to make numerous data be divided into multiclass, can not only accelerate response speed, also It can fundamentally ensure the security of data, improve system stability.
Wherein, external equipment refers to other related devices of terminal in addition to processor, communication unit, such as screen, biography Sensor, bluetooth, WIFI, camera etc..
In the above-mentioned technical solutions, it is preferable that further include:First storage unit, is connected to the first processing units, uses The first operating system data after to first processing units processing store;Second storage unit, is connected to described Second processing unit, for being stored to the second operating system data after the second processing cell processing.
In the technical scheme, the data storage after different processing units are handled is into different storage areas, so It can preferably ensure the data safety of individual subscriber private information.
In the above-mentioned technical solutions, it is preferable that further include:The first processing units are additionally operable to:In the operation of processing first During system data, if data service data involved in the first operating system data, the data service data is sent To the second processing unit, so that the second processing unit handles the data service.
In the technical scheme, the first processing units of the first operating system do not handle data service data, such as online, coloured silk The data such as letter, short message receiving-transmitting, in this way, the first operating system avoids the need for networking, so as to avoid because networking causes poisoning intrusion The problems such as occur, the safety for the data being further ensured that in the first operating system.
In the above-mentioned technical solutions, it is preferable that the first processing units include the first control subelement, for described When first processing units need to be interacted according to the external equipment of the first operating system data and the terminal, to described the Two processing units send interrupt signal, interrupt the data interaction carried out between the second processing unit and the external equipment, And complete when interacting, to send to the second processing unit anti-with external equipment progress in the first processing units Feedback signal, notifies the second processing unit to continue the data interaction between the external equipment.
In the technical scheme, multiple processors are configured for just because of terminal, therefore processor and external equipment Interaction becomes relative complex, in order to coordinate the interaction and order of multiple processors and external equipment, in the technical scheme Provide when needing the business datum that emergent management has just occurred for handling the first processing units of the first operating system data, The second processing unit that control is used to handle the second operating system data interrupts the business datum handled, and is in and waits shape State, is completed with external equipment when interacting in first processing units, and notice second processing unit continues unfinished data interaction, Treatment mechanism in this way, can ensure user is relatively important, urgent business datum by priority treatment, and will not shadow Ring the processing of other business datums.
In the above-mentioned technical solutions, it is preferable that the second processing unit includes the second control subelement, described second When processing unit need to be interacted according to the second operating system data and the external equipment, to the first processing units Interrupt signal is sent, interrupts the data interaction carried out between the first processing units and the external equipment, and described When second processing unit completes the data interaction carried out with the external equipment, feedback letter is sent to the first processing units Number, notify the first processing units to continue the data interaction between the external equipment.
Similarly, second processing unit is also needed to send to first processing units and interrupted when that need to be interacted with external equipment Signal, ensures that most urgent, nearest business datum can be by priority treatment.
According to another aspect of the present invention, it is also proposed that a kind of data processing method, for terminal, the terminal has the One operating system and the second operating system, wherein the security level of first operating system is higher than second operating system Security level, the terminal further include first processing units, second processing unit, the first communication unit, the second communication unit, One storage unit, the second storage unit and monitoring control unit, the described method includes:Received by the first communication unit from the First business datum of one identification card, and by first business data transmission to the monitoring control unit;Pass through Two communication units, receive the second business datum from the second identification card, and by second business data transmission to institute State monitoring control unit;Received by the monitoring control unit and come from first communication unit and second communication unit The first business datum and the second business datum, and first business datum and second business datum be divided into described The corresponding first operating system data of first operating system and the second operating system data, and by the first operating system data Send to the first processing units, by the second operating system data sending to the second processing unit;Pass through first First operating system data described in processing unit processes, and the outside based on the first operating system data and the terminal is set It is standby to carry out data interaction;By the second operating system data described in the second processing cell processing, and based on the described second behaviour Make system data and the external equipment of the terminal carries out data interaction.
In the technical scheme, in order to improve Information Security, terminal is configured for multiple processors, and specifies different Data in processor processing different operating system.Such as first operating system be secure operating system, the second operating system is Normal operating system, in this way, terminal configures two processors, a processor is used for handling the safe number in secure operating system According to such as secure relationship people, security information, safety call record, safe schedule, safety account data, another processor are used To handle the data in normal operating system, as photo, ordinary contacts, normal short message, common message registration, common schedule, Common account etc., is respectively processed so as to make numerous data be divided into multiclass, can not only accelerate response speed, also It can fundamentally ensure the security of data, improve system stability.
Wherein, external equipment refers to other related devices of terminal in addition to processor, communication unit, such as screen, biography Sensor, bluetooth, WIFI, camera etc..
In the above-mentioned technical solutions, it is preferable that further include:The first processing units are handled by the first storage unit The first operating system data afterwards are stored;By the second storage unit to the second behaviour after the second processing cell processing Stored as system data.
In the technical scheme, the data storage after different processing units are handled is into different storage areas, so It can preferably ensure the data safety of individual subscriber private information.
In the above-mentioned technical solutions, it is preferable that further include:The first operating system is being handled by the first processing units During data, if data service data involved in the first operating system data, the data service data is sent to institute Second processing unit is stated, so that the second processing unit handles the data service.
In the technical scheme, the first processing units of the first operating system do not handle data service data, such as online, coloured silk The data such as letter, short message receiving-transmitting, in this way, the first operating system avoids the need for networking, so as to avoid because networking causes poisoning intrusion The problems such as occur, the safety for the data being further ensured that in the first operating system.
In the above-mentioned technical solutions, it is preferable that further include:Need to be according to the described first operation in the first processing units When the external equipment of system data and the terminal interacts, interrupt signal is sent to the second processing unit, described in interruption The data interaction carried out between second processing unit and the external equipment, and the first processing units complete with it is described During the interaction that external equipment carries out, feedback signal is sent to the second processing unit, notifies the second processing unit to continue Carry out the data interaction between the external equipment.
In the technical scheme, multiple processors are configured for just because of terminal, therefore processor and external equipment Interaction becomes relative complex, in order to coordinate the interaction and order of multiple processors and external equipment, in the technical scheme Provide when needing the business datum that emergent management has just occurred for handling the first processing units of the first operating system data, The second processing unit that control is used to handle the second operating system data interrupts the business datum handled, and is in and waits shape State, is completed with external equipment when interacting in first processing units, and notice second processing unit continues unfinished data interaction, Treatment mechanism in this way, can ensure user is relatively important, urgent business datum by priority treatment, and will not shadow Ring the processing of other business datums.
In the above-mentioned technical solutions, it is preferable that further include:Need to be according to the described second operation in the second processing unit When system data are interacted with the external equipment, interrupt signal is sent to the first processing units, is interrupted at described first The data interaction carried out between reason unit and the external equipment, and complete to set with the outside in the second processing unit It is standby carry out data interaction when, send feedback signal to the first processing units, notify the first processing units continue into The capable data interaction between the external equipment.
Similarly, second processing unit is also needed to send to first processing units and interrupted when that need to be interacted with external equipment Signal, ensures that most urgent, nearest business datum can be by priority treatment.
According to another aspect of the invention, it is also proposed that a kind of terminal, including:Multiple operating systems;And above-mentioned technology Data processing equipment any one of scheme.
By above technical scheme, in the mobile phone of the new double standby of dual system each Modem be equipped with one it is special CPU, RAM and EMMC, and physics is completely separable, and wherein CPU1 defines the private data in only processing safety operation, and CPU2 is fixed Justice only handles the public information data in normal operations, and secure operating system and normal operations are filtered out by monitoring control unit Data, are transferred to different CPU processing by the data of system, ensure the safety of private data, greatly improve the place of different pieces of information Speed is managed, improves the experience of user.
Brief description of the drawings
Fig. 1 shows the block diagram of the double-standby terminal in correlation technique;
Fig. 2 shows the block diagram of data processing equipment according to an embodiment of the invention;
Fig. 3 shows the flow chart of data processing method according to an embodiment of the invention;
Fig. 4 shows the flow chart of SED security systems processing method according to an embodiment of the invention;
Fig. 5 shows the flow chart of PPD conventional systems processing method according to an embodiment of the invention;
Fig. 6 has gone out difference CPU and external equipment according to an embodiment of the invention and has mutually handed over flow chart;
The particular flow sheet that Fig. 7 difference CPU and external equipment according to an embodiment of the invention are mutually handed over.
Embodiment
It is to better understand the objects, features and advantages of the present invention, below in conjunction with the accompanying drawings and specific real Mode is applied the present invention is further described in detail.It should be noted that in the case where there is no conflict, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be implemented using other different from other modes described here, therefore, protection scope of the present invention and from described below Specific embodiment limitation.
Fig. 2 shows the block diagram of data processing equipment according to an embodiment of the invention.
As shown in Fig. 2, data processing equipment 200 according to an embodiment of the invention, for terminal, the terminal has the One operating system and the second operating system, wherein the security level of first operating system is higher than second operating system Security level, described device 200 include:First communication unit 202, is connected, reception comes from the first body with monitoring control unit 206 First business datum of part identification card, and by first business data transmission to the monitoring control unit;Second communication unit Member 204, is connected with the monitoring control unit 206, receives the second business datum from the second identification card, and by described in Second business data transmission is to the monitoring control unit;The monitoring control unit 206, is connected to first communication unit Between 202 and first processing units 208, while it is connected between second communication unit 204 and second processing unit 210, The first business datum and the second business datum from first communication unit 202 and second communication unit 204 are received, And first business datum and second business datum are divided into corresponding first operation of first operating system and are Unite data and the second operating system data, and by the first operating system data sending to the first processing units, by institute The second operating system data sending is stated to the second processing unit 210;The first processing units 208, it is described for handling First operating system data, and the external equipment based on the first operating system data and the terminal carries out data interaction; The second processing unit 210, for handling the second operating system data, and based on the second operating system data with The external equipment of the terminal carries out data interaction.
In the technical scheme, in order to improve Information Security, terminal is configured for multiple processors, and specifies different Data in processor processing different operating system.Such as first operating system be secure operating system, the second operating system is Normal operating system, in this way, terminal configures two processors, a processor is used for handling the safe number in secure operating system According to such as secure relationship people, security information, safety call record, safe schedule, safety account data, another processor are used To handle the data in normal operating system, as photo, ordinary contacts, normal short message, common message registration, common schedule, Common account etc., is respectively processed so as to make numerous data be divided into multiclass, can not only accelerate response speed, also It can fundamentally ensure the security of data, improve system stability.
Wherein, external equipment refers to other related devices of terminal in addition to processor, communication unit, such as screen, biography Sensor, bluetooth, WIFI, camera etc..
In the above-mentioned technical solutions, it is preferable that further include:First storage unit 212, it is single to be connected to first processing Member, for being stored to the first operating system data after first processing units processing;Second storage unit 214, even The second processing unit is connected to, for being stored to the second operating system data after the second processing cell processing.
In the technical scheme, the data storage after different processing units are handled is into different storage areas, so It can preferably ensure the data safety of individual subscriber private information.
In the above-mentioned technical solutions, it is preferable that further include:The first processing units 208 are additionally operable to:In the behaviour of processing first When making system data, if data service data involved in the first operating system data, the data service data is sent out Send to the second processing unit, so that the second processing unit handles the data service.
In the technical scheme, the first processing units of the first operating system do not handle data service data, such as online, coloured silk The data such as letter, short message receiving-transmitting, in this way, the first operating system avoids the need for networking, so as to avoid because networking causes poisoning intrusion The problems such as occur, the safety for the data being further ensured that in the first operating system.
In the above-mentioned technical solutions, it is preferable that the first processing units 208 include the first control subelement (in figure not Show), for need to be according to the external equipment of the first operating system data and the terminal in the first processing units 208 When interacting, interrupt signal is sent to the second processing unit, the second processing unit 210 is interrupted and is set with the outside The data interaction carried out between standby 216, and complete to interact with what the external equipment 216 carried out in the first processing units When, send feedback signal to the second processing unit 210, notify the second processing unit 210 continue with it is described outer Data interaction between portion's equipment.
In the technical scheme, multiple processors are configured for just because of terminal, therefore processor and external equipment Interaction becomes relative complex, in order to coordinate the interaction and order of multiple processors and external equipment, in the technical scheme Provide when needing the business datum that emergent management has just occurred for handling the first processing units of the first operating system data, The second processing unit that control is used to handle the second operating system data interrupts the business datum handled, and is in and waits shape State, is completed with external equipment when interacting in first processing units, and notice second processing unit continues unfinished data interaction, Treatment mechanism in this way, can ensure user is relatively important, urgent business datum by priority treatment, and will not shadow Ring the processing of other business datums.
In the above-mentioned technical solutions, it is preferable that the second processing unit 210 includes the second control subelement (in figure not Show), it need to be interacted in the second processing unit 210 according to the second operating system data with the external equipment When, interrupt signal is sent to the first processing units 208, interrupts the first processing units 208 and the external equipment 216 Between the data interaction that carries out, and complete to hand over the data that the external equipment 216 carries out in the second processing unit 210 When mutual, to the first processing units 208 send feedback signal, notify the first processing units 208 continue with it is described Data interaction between external equipment 216.
Similarly, second processing unit is also needed to send to first processing units and interrupted when that need to be interacted with external equipment Signal, ensures that most urgent, nearest business datum can be by priority treatment.
Fig. 3 shows the flow chart of data processing method according to an embodiment of the invention.
As shown in figure 3, data processing method according to an embodiment of the invention, for terminal, the terminal has first Operating system and the second operating system, wherein the security level of first operating system is higher than the peace of second operating system Full rank, the terminal further include first processing units, second processing unit, the first communication unit, the second communication unit, first Storage unit, the second storage unit and monitoring control unit, the described method includes:Step 302, received by the first communication unit The first business datum from the first identification card, and by first business data transmission to the monitoring control unit; Step 304, by the second communication unit, the second business datum from the second identification card is received, and by second industry Data transfer of being engaged in is to the monitoring control unit;Step 306, received by the monitoring control unit from the described first communication The first business datum and the second business datum of unit and second communication unit, and by first business datum and described Second business datum is divided into the corresponding first operating system data of first operating system and the second operating system data, and By the first operating system data sending to the first processing units, by the second operating system data sending to described Second processing unit;Step 308, the first operating system data are handled by first processing units, and based on described first Operating system data and the external equipment of the terminal carry out data interaction;Step 310, the second processing cell processing is passed through The second operating system data, and the external equipment based on the second operating system data and the terminal carries out data friendship Mutually.
In the technical scheme, in order to improve Information Security, terminal is configured for multiple processors, and specifies different Data in processor processing different operating system.Such as first operating system be secure operating system, the second operating system is Normal operating system, in this way, terminal configures two processors, a processor is used for handling the safe number in secure operating system According to such as secure relationship people, security information, safety call record, safe schedule, safety account data, another processor are used To handle the data in normal operating system, as photo, ordinary contacts, normal short message, common message registration, common schedule, Common account etc., is respectively processed so as to make numerous data be divided into multiclass, can not only accelerate response speed, also It can fundamentally ensure the security of data, improve system stability.
Wherein, external equipment refers to other related devices of terminal in addition to processor, communication unit, such as screen, biography Sensor, bluetooth, WIFI, camera etc..
In the above-mentioned technical solutions, it is preferable that further include:The first processing units are handled by the first storage unit The first operating system data afterwards are stored;By the second storage unit to the second behaviour after the second processing cell processing Stored as system data.
In the technical scheme, the data storage after different processing units are handled is into different storage areas, so It can preferably ensure the data safety of individual subscriber private information.
In the above-mentioned technical solutions, it is preferable that further include:The first operating system is being handled by the first processing units During data, if data service data involved in the first operating system data, the data service data is sent to institute Second processing unit is stated, so that the second processing unit handles the data service.
In the technical scheme, the first processing units of the first operating system do not handle data service data, such as online, coloured silk The data such as letter, short message receiving-transmitting, in this way, the first operating system avoids the need for networking, so as to avoid because networking causes poisoning intrusion The problems such as occur, the safety for the data being further ensured that in the first operating system.
In the above-mentioned technical solutions, it is preferable that further include:Need to be according to the described first operation in the first processing units When the external equipment of system data and the terminal interacts, interrupt signal is sent to the second processing unit, described in interruption The data interaction carried out between second processing unit and the external equipment, and the first processing units complete with it is described During the interaction that external equipment carries out, feedback signal is sent to the second processing unit, notifies the second processing unit to continue Carry out the data interaction between the external equipment.
In the technical scheme, multiple processors are configured for just because of terminal, therefore processor and external equipment Interaction becomes relative complex, in order to coordinate the interaction and order of multiple processors and external equipment, in the technical scheme Provide when needing the business datum that emergent management has just occurred for handling the first processing units of the first operating system data, The second processing unit that control is used to handle the second operating system data interrupts the business datum handled, and is in and waits shape State, is completed with external equipment when interacting in first processing units, and notice second processing unit continues unfinished data interaction, Treatment mechanism in this way, can ensure user is relatively important, urgent business datum by priority treatment, and will not shadow Ring the processing of other business datums.
In the above-mentioned technical solutions, it is preferable that further include:Need to be according to the described second operation in the second processing unit When system data are interacted with the external equipment, interrupt signal is sent to the first processing units, is interrupted at described first The data interaction carried out between reason unit and the external equipment, and complete to set with the outside in the second processing unit It is standby carry out data interaction when, send feedback signal to the first processing units, notify the first processing units continue into The capable data interaction between the external equipment.
Similarly, second processing unit is also needed to send to first processing units and interrupted when that need to be interacted with external equipment Signal, ensures that most urgent, nearest business datum can be by priority treatment.
Below using the first communication unit as Modem1, the second communication unit is Modem2, first processing units CPU1, the Two processing units are CPU2, and the first storage unit is memory RAM 1 and EMMC1, and the second storage unit is 2 He of memory RAM EMMC2, the first operating system are security system, exemplified by the second operating system is conventional system, the technology that the present invention will be described in detail Scheme.
Fig. 4 shows the flow chart of the data processing method of security system according to an embodiment of the invention.
As shown in figure 4, the data processing method of security system according to an embodiment of the invention, including:
Step 402, the secure data that the Modem1 and Modem2 that CPU1 processing is filtered out by monitoring control unit are uploaded, by Security system is individually handled.
Step 404, the related data in security system is stored in RAM1 and EMMC1.
Specifically, definition CPU1 only handles the private data in security system, such as secure relationship people, security information, safety Message registration, safe schedule, safety account, these data are stored within dedicated memory RAM1 and EMMC1, so as to ensure storage Deposit and handle the data safety of individual private possession information.
Fig. 5 shows the flow chart of the data processing method of conventional system according to an embodiment of the invention.
As shown in figure 5, the data processing method of conventional system according to an embodiment of the invention, including:
Step 502, the public information number that the Modem1 and Modem2 that CPU2 processing is filtered out by monitoring control unit are uploaded According to individually being handled by conventional system.
Step 504, the related data in conventional system is stored in RAM2 and EMMC2.
Specifically, define CPU2 and only handle public information data in conventional system, such as photo, ordinary contacts, common Short message, common message registration, common schedule, common account etc., these are stored within dedicated memory RAM2 and EMMC2.
Fig. 6 has gone out the flow chart of data processing method according to an embodiment of the invention.
As shown in fig. 6, the flow of data processing method according to an embodiment of the invention, including:
Step 602, the data in control unit screening Modem1 are monitored.
Step 604, judge whether current data is secure data, if the determination result is YES, enters step 608, judges to tie Fruit is no, enters step 606.
Step 606, judge it is not secure data, data are transferred to the CPU2 processing of conventional system.
Step 608, judgement is secure data, and data are transferred to the CPU1 processing of security system.
Step 610, data in control unit screening Modem2 are monitored.
Step 612, judge whether current data is secure data, if the determination result is YES, enters step 616, if judging As a result it is no, enters step 614.
Step 614, judge it is not secure data, data are transferred to the CPU2 processing of conventional system.
Step 616, judgement is secure data, and data are transferred to the CPU1 processing of security system.
Specifically, it is contemplated that Modem1 and Modem2 can produce speech business and data service data, Modem1, One monitoring control unit is set between Modem2 and CPU1, CPU2, Modem1 and Modem2 are filtered out by monitoring control unit Different pieces of information, secure data gives the CPU1 processing in security system, and is stored in RAM1 and EMMC1, public data hand over To the CPU2 processing in conventional system, and store in RAM2 and EMMC2, these data by different CPU and external equipment into Row interaction.
The particular flow sheet that Fig. 7 difference CPU and external equipment according to an embodiment of the invention are mutually handed over.
As shown in fig. 7, the idiographic flow that difference CPU and external equipment are mutually handed over, including:
Step 702, judge whether CPU1 receives the interrupt signal that CPU2 is sent, if the determination result is YES, enter step 704, if judging result is no, enter step 706.
Step 704, the connection with peripheral hardware is disconnected.
Step 706, judge whether current business needs to use peripheral hardware, if the determination result is YES, enter step 708.
Step 708, CPU2 sends interrupt signal, return to step 702 to CPU1.
Step 710, judge whether CPU2 receives the interrupt signal that CPU1 is sent, if the determination result is YES, enter step 712, if judging result is no, enter step 714.
Step 712, the connection with peripheral hardware is disconnected.
Step 714, judge whether current business needs to use peripheral hardware, if the determination result is YES, enter step 716.
Step 716, CPU2 sends interrupt signal, return to step 710 to CPU1.
Specifically, it is contemplated that user there are some interaction scenarios, needs to use different CPU using mobile phone under different scenes Control, can increase between two CPU and interrupt control signal, by interrupting control signal, be realized by interrupt signal different CPU is controlled, and in online, the secure relationship people's such as preceding user in mobile phone safety system SED sends a telegram here suddenly, and CPU2 is to CPU1 hairs one A interrupt signal, will give CPU1 processing, so as to ensure the safety of user's private data to the disposal right of data.
Technical scheme is described in detail above in association with attached drawing, by technical scheme, in dual system New double standby mobile phone in each Modem be equipped with dedicated CPU, RAM and an EMMC, and physics is completely separable, its Middle CPU1 defines the private data in only processing security system, and CPU2 defines the public information data in only processing conventional system, Security system and the data of conventional system are filtered out by monitoring control domain, data are transferred to different CPU processing, ensures secret The safety of data, greatly improves the processing time of different pieces of information, improves the experience of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this area For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of data processing equipment, for terminal, it is characterised in that the terminal has the first operating system and the second operation System, wherein the security level of first operating system is higher than the security level of second operating system, at the data Reason device includes:
First communication unit, is connected with monitoring control unit, receives the first business datum from the first identification card, and will First business data transmission is to the monitoring control unit;
Second communication unit, is connected with the monitoring control unit, receives the second business datum from the second identification card, And by second business data transmission to the monitoring control unit;
The monitoring control unit, is connected between first communication unit and first processing units while is connected to described Between second communication unit and second processing unit, from first communication unit and second communication unit is received One business datum and the second business datum, and first business datum and second business datum are divided into described first The corresponding first operating system data of operating system and the second operating system data, and by the first operating system data sending To the first processing units, by the second operating system data sending to the second processing unit;
The first processing units, for handling the first operating system data, and are based on the first operating system data Data interaction is carried out with the external equipment of the terminal;
The second processing unit, for handling the second operating system data, and is based on the second operating system data Data interaction is carried out with the external equipment of the terminal;
The first processing units are additionally operable to:
When handling the first operating system data, if data service data involved in the first operating system data, by institute Data service data is stated to send to the second processing unit so that the second processing unit to the data service at Reason.
2. data processing equipment according to claim 1, it is characterised in that further include:
First storage unit, is connected to the first processing units, for the first behaviour after first processing units processing Stored as system data;
Second storage unit, is connected to the second processing unit, for the second behaviour after the second processing cell processing Stored as system data.
3. data processing equipment according to claim 1, it is characterised in that the first processing units include the first control Subelement, for the first processing units need to according to the external equipment of the first operating system data and the terminal into During row interaction, interrupt signal is sent to the second processing unit, interrupt the second processing unit and the external equipment it Between the data interaction that carries out, and completed in the first processing units with the external equipment progress when interacting, to described Second processing unit sends feedback signal, notifies the second processing unit to continue the data between the external equipment Interaction.
4. data processing equipment according to any one of claim 1 to 3, it is characterised in that the second processing unit , need to be according to the second operating system data and the external equipment in the second processing unit including the second control subelement When interacting, interrupt signal is sent to the first processing units, interrupts the first processing units and the external equipment Between the data interaction that carries out, and when the second processing unit completes the data interaction carried out with the external equipment, Feedback signal is sent to the first processing units, notifies the first processing units to continue between the external equipment Data interaction.
5. a kind of data processing method, for terminal, it is characterised in that the terminal has the first operating system and the second operation System, wherein the security level of first operating system is higher than the security level of second operating system, the terminal is also Including first processing units, second processing unit, the first communication unit, the second communication unit, the first storage unit, the second storage Unit and monitoring control unit, the data processing method include:
The first business datum from the first identification card is received by the first communication unit, and by first business datum It is transmitted to the monitoring control unit;
By the second communication unit, the second business datum from the second identification card is received, and by the second business number According to being transmitted to the monitoring control unit;
The first business from first communication unit and second communication unit is received by the monitoring control unit Data and the second business datum, and first business datum and second business datum are divided into first operation and are Corresponding first operating system data of uniting and the second operating system data, and by the first operating system data sending to described First processing units, by the second operating system data sending to the second processing unit;
Handle the first operating system data by first processing units, and based on the first operating system data with it is described The external equipment of terminal carries out data interaction;
By the second operating system data described in the second processing cell processing, and based on the second operating system data with The external equipment of the terminal carries out data interaction;
When handling the first operating system data by the first processing units, if involved in the first operating system data Data service data, then send the data service data to the second processing unit, so that the second processing unit The data service is handled.
6. data processing method according to claim 5, it is characterised in that further include:
The first operating system data after first processing units processing are stored by the first storage unit;
The second operating system data after the second processing cell processing are stored by the second storage unit.
7. data processing method according to claim 5, it is characterised in that further include:
It need to be interacted in the first processing units according to the external equipment of the first operating system data and the terminal When, interrupt signal is sent to the second processing unit, interrupts and is carried out between the second processing unit and the external equipment Data interaction, and the first processing units complete with the external equipment progress when interacting, at described second Manage unit and send feedback signal, notify the second processing unit to continue the data interaction between the external equipment.
8. data processing method according to any one of claims 5 to 7, it is characterised in that further include:
When the second processing unit need to be interacted according to the second operating system data and the external equipment, to institute State first processing units and send interrupt signal, interrupt the data carried out between the first processing units and the external equipment and hand over Mutually, it is single to the described first processing and when the second processing unit completes the data interaction carried out with the external equipment Member sends feedback signal, notifies the first processing units to continue the data interaction between the external equipment.
CN201510033718.5A 2015-01-22 2015-01-22 Data processing equipment and data processing method Active CN104618894B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510033718.5A CN104618894B (en) 2015-01-22 2015-01-22 Data processing equipment and data processing method
PCT/CN2015/082877 WO2016115833A1 (en) 2015-01-22 2015-06-30 Data processing apparatus and data processing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510033718.5A CN104618894B (en) 2015-01-22 2015-01-22 Data processing equipment and data processing method

Publications (2)

Publication Number Publication Date
CN104618894A CN104618894A (en) 2015-05-13
CN104618894B true CN104618894B (en) 2018-05-15

Family

ID=53153128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510033718.5A Active CN104618894B (en) 2015-01-22 2015-01-22 Data processing equipment and data processing method

Country Status (2)

Country Link
CN (1) CN104618894B (en)
WO (1) WO2016115833A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618894B (en) * 2015-01-22 2018-05-15 宇龙计算机通信科技(深圳)有限公司 Data processing equipment and data processing method
CN104811530A (en) * 2015-03-02 2015-07-29 西安酷派软件科技有限公司 Multisystem communication terminal
CN109802774A (en) * 2019-02-18 2019-05-24 深圳市岚明电子科技有限公司 Data uploading method and communication equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354495A (en) * 2013-07-30 2013-10-16 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103369525A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103402013A (en) * 2013-07-30 2013-11-20 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103402018A (en) * 2013-07-30 2013-11-20 东莞宇龙通信科技有限公司 Terminal and data processing method
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101501167B1 (en) * 2008-10-20 2015-03-10 삼성전자주식회사 Apparatus and method for application of multi operating systems in multi modem mobile communication terminal
CN103391191A (en) * 2013-07-30 2013-11-13 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103458125B (en) * 2013-09-06 2015-10-28 叶鼎 The guard method of a kind of high-grade privacy smart phone and private information thereof
CN104618894B (en) * 2015-01-22 2018-05-15 宇龙计算机通信科技(深圳)有限公司 Data processing equipment and data processing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103354495A (en) * 2013-07-30 2013-10-16 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103369525A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103402013A (en) * 2013-07-30 2013-11-20 东莞宇龙通信科技有限公司 Terminal and data processing method
CN103402018A (en) * 2013-07-30 2013-11-20 东莞宇龙通信科技有限公司 Terminal and data processing method
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof

Also Published As

Publication number Publication date
CN104618894A (en) 2015-05-13
WO2016115833A1 (en) 2016-07-28

Similar Documents

Publication Publication Date Title
CN104216761B (en) It is a kind of that the method for sharing equipment is used in the device that can run two kinds of operating system
CN107959944A (en) The detection and mitigation of signaling exception in wireless network
CN107666666A (en) The deriving method and device of key
CN104270516B (en) Decryption method and mobile terminal
CN113408006B (en) Monitoring data access method and device, indoor monitoring system and storage medium
CN104618894B (en) Data processing equipment and data processing method
CN104838682A (en) Communication between a mobile device and telecommunications network
CN107113362A (en) Safe practice for reconnecting to conference session using computing device
CN108476212A (en) Dynamic wlan connections
CN108710795A (en) Information cuing method, device, mobile terminal and storage medium
EP3713147B1 (en) Railway signal security encryption method and system
CN108400953A (en) Control terminal is surfed the Internet and the method for terminal online, router device and terminal
CN108882278A (en) Data link monitoring method, unit and computer readable storage medium
CN104394073B (en) A kind of routing of data and its control method and equipment
CN107078920A (en) Cross-layer link failure is alerted
CN109104385A (en) A kind of method and apparatus preventing MACSEC exit passageway failure
CN103379484A (en) Mobile terminal control method, device and mobile terminal
CN107517458A (en) Determination method and device, the terminal of tracking
CN103400086B (en) A kind of terminal
CN103402017B (en) Terminal and data processing method
CN103390142B (en) A kind of terminal
CN105704108B (en) For the method for safety certification, ability open platform and system
CN104679759B (en) A kind of method of information sharing, the first electronic equipment and the second electronic equipment
CN113438306A (en) Security monitoring system, security monitoring method and security monitoring equipment
CN103516739B (en) The elimination method and device of STA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant