CN104866782A - Data processing method and apparatus - Google Patents

Data processing method and apparatus Download PDF

Info

Publication number
CN104866782A
CN104866782A CN201510288853.4A CN201510288853A CN104866782A CN 104866782 A CN104866782 A CN 104866782A CN 201510288853 A CN201510288853 A CN 201510288853A CN 104866782 A CN104866782 A CN 104866782A
Authority
CN
China
Prior art keywords
operating system
application
information list
destination application
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510288853.4A
Other languages
Chinese (zh)
Inventor
刘东海
汪智勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201510288853.4A priority Critical patent/CN104866782A/en
Priority to PCT/CN2015/082936 priority patent/WO2016192161A1/en
Publication of CN104866782A publication Critical patent/CN104866782A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Stored Programmes (AREA)

Abstract

The invention discloses a data processing method, comprising: receiving, by a terminal operating running in a first operating system, data service data; determining whether an operating system processing the data service data is a second operating system, wherein a security level of the second operating system is higher than that of the first operating system; and if the operating system processing the data service data is the second operating system, allocating the data service data to the second operating system for processing. Correspondingly, the invention further discloses a data processing apparatus. According to the invention, received data service data may be filtered, and important data service data is allocated to a system with a higher security level for processing, so as to prevent loss and illegal leakage of the important data service data, thereby improving security performance of the terminal.

Description

A kind of data processing method and device
Technical field
The present invention relates to field of terminal technology, particularly relate to a kind of data processing method and device.
Background technology
At present, along with the development of technology, a terminal can run two independently systems simultaneously, and can communicate mutually between these two systems, but each system is different in function and security etc.; For current dual system termi-nal on the market, terminal is provided with the lower canonical domain of safe class (PersonalPrivate Domain) system (be called for short PPD system) and higher security domain (SecureEnterprise Domain) system (abbreviation SED system) of safe class, security domain system is the system containing security mechanism, and its security is higher than canonical domain system; Secondly, security domain system can only process and storaged voice business datum, and canonical domain system can process and storaged voice business datum and data service data;
Due to, data service data is all by the lower system storage of safe class and process, therefore, be easy to cause important data service data (account applied as Bank Account Number and password, WIFI account and password, various social activity and password etc.) lose or suffer illegal leakage, the security of its terminal is still not high.
Summary of the invention
The present invention is just based on the problems referred to above, propose a kind of new technical scheme, the data service data received can be filtered, and important data service data is distributed to the higher system process of safe class, thus prevent loss and the illegal leakage of important data service data, and then promote the security performance of terminal.
In view of this, first aspect present invention provides a kind of data processing method, and for terminal, described terminal comprises the first operating system and the second operating system, the safe class of described second operating system is higher than the safe class of described first operating system, and described method comprises:
The terminal operating in the first operating system receives data service data;
Whether the operating system judging processing said data business datum is the second operating system;
If the operating system of processing said data business datum is described second operating system, then described data service data is distributed to described second operating system process.
Optionally, whether the described operating system judging processing said data business datum is that the second operating system comprises:
Determine the destination application of processing said data business datum;
Detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process;
If comprise the application identities of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system.
Optionally, described in operate in the first operating system terminal receive before data service data, described method also comprises:
Operate in the installation kit of the described terminal receiving target application program of described first operating system;
Judge whether the operating system of installing described destination application is the second operating system;
If the operating system of installing described destination application is described second operating system, then described destination application is installed on described second operating system.
Optionally, describedly judge whether the operating system of installing described destination application is that the second operating system comprises:
Detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process;
If comprise the application identities of described destination application in described application information list, then judge the operating system of described destination application to be installed as described second operating system.
Optionally, if do not comprise the application identities of described destination application in described application information list, described method also comprises:
Whether prompting user is installed on described second operating system by described destination application;
If receive the confirmation instruction for described prompting input, then perform the described step described destination application being installed on described second operating system, and the application identities of described destination application is added in described application information list.
Accordingly, second aspect present invention additionally provides a kind of data processing equipment, and for terminal, described terminal comprises the first operating system and the second operating system, the safe class of described second operating system is higher than the safe class of described first operating system, and described device comprises:
Receiver module, for receiving data service data;
Detection module, for judging whether the operating system of processing said data business datum is the second operating system;
Distribution module, if be described second operating system for the operating system of processing said data business datum, then distributes to described second operating system process by described data service data.
Optionally, described detection module comprises:
Application program detecting unit, for determining the destination application of processing said data business datum;
Detecting unit, for detecting the application identities whether comprising described destination application in default application information list, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system.
Optionally, described receiver module is also for the installation kit of receiving target application program;
Described detection module also for: judge whether the operating system of installing described destination application is the second operating system;
Described device also comprises:
Installation module, if the application identities for comprising described destination application in described application information list, is then installed on described second operating system by described destination application.
Optionally, described detection module specifically for:
Detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then judge the operating system of described destination application to be installed as described second operating system.
Optionally, described device also comprises:
Reminding module, if the application identities for not comprising described destination application in described application information list, then points out user whether described destination application to be installed on described second operating system;
Described installation module also for: if receive for described prompting input confirmation instruction, then described destination application is installed on described second operating system;
Update module, if for receiving the confirmation instruction for described prompting input, then add to the application identities of described destination application in described application information list.
Third aspect present invention additionally provides a kind of terminal, described terminal is provided with the first operating system and the second operating system, and described terminal comprises the part or all of device described in above-mentioned second aspect.
Implement the present invention, there is following beneficial effect:
The terminal operating in described first operating system receives data service data, whether the operating system judging processing said data business datum is again the second operating system, be equivalent to the data service data that Filter Examination arrives, if the determination result is YES, illustrate that described data service data is important data, then described data service data is distributed to described second operating system process, achieve and important data service data is distributed to the higher system process of safe class, thus prevent loss and the illegal leakage of important data service data, and then improve the security performance of terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 is the process flow diagram of a kind of data processing method that the embodiment of the present invention provides;
Fig. 2 is the structural representation of a kind of terminal that the embodiment of the present invention provides;
Fig. 3 is the process flow diagram of the another kind of data processing method that the embodiment of the present invention provides;
Fig. 4 is the process flow diagram of another data processing method that the embodiment of the present invention provides;
Fig. 5 is the structural representation of a kind of data processing equipment that the embodiment of the present invention provides;
Fig. 6 is the structural representation of a kind of detection module that the embodiment of the present invention provides;
Fig. 7 is the structural representation of the another kind of terminal that the embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 1, Fig. 1 is the process flow diagram of a kind of data processing method that the embodiment of the present invention provides; Described method is applied to terminal, and described terminal is provided with the first operating system and the second operating system, and the safe class of described second operating system is higher than the safe class of described first operating system, and described method comprises as shown in Figure 1:
Step S110, the terminal operating in the first operating system receives data service data.
Described first operating system can at the running background of described terminal, also can run in the front end of described terminal, that is, no matter the first operating system operates in backstage or front end, when terminal receives data service data, all call the first operating system and filtration treatment is carried out to this data service data; Concrete, when terminal receives data service data by external hardware device, then give described first operating system by described data service data, by described first operating system, Filter Examination is carried out to described data service data.
For double card double standby mobile phone, the corresponding draw-in groove SIM1 of Modem1, the corresponding draw-in groove SIM2 of Modem2, as shown in Figure 2, suppose, the normal speech business datum of Modem1 and Modem2 is (as ordinary contacts dialing, note or call etc.) by the first operating system process, the important Voice traffic data of Modem1 and Modem2 is (as important relation people dialing, note or call etc.) by the second operating system process, after data service data is first filtered by the first operating system, the second operating system process is distributed to by filtering the significant data business datum obtained by the first operating system, due to, the safe class of the second operating system is higher than the first operating system, therefore, loss and the illegal leakage of important data service data can be reduced, and then improve the security performance of terminal.
Wherein, described first operating system can comprise canonical domain system, and described second operating system can comprise security domain system.
Step S120, judges whether the operating system of processing said data business datum is the second operating system; If the determination result is YES, then step S130 is performed; Otherwise, the described data service data received by described first operating system process.
In the optional embodiment of one, terminal can determine the destination application of processing said data business datum, and detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system.
Wherein, the concrete steps of the destination application of terminal determination processing said data business datum can be: terminal can be recorded as the application programming interfaces of each application assigned, after terminal receives data service data, terminal can obtain the application programming interfaces that described data service data carries, and determines the destination application of described data service data according to the application programming interfaces got.
Wherein, can prestore in application information list by the application identities of the application program of the second operating system process; Optionally, application identities can comprise Apply Names and/or keyword message, the title that Apply Names can be as corresponding in each application program of micro-letter, QQ, Netease's mailbox etc.; Keyword message can as the key word of the mark one class application programs such as bank's control;
It should be noted that, described application information list is just stored in described terminal before can dispatching from the factory, and also can be arranged voluntarily by user.
Described application identities is for Apply Names, terminal is after the destination application determining processing said data business datum, the Apply Names whether comprising described destination application in described application information list can be detected, if comprise the Apply Names of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system;
Described application identities is for keyword message, terminal is after the destination application determining described data service data, the Apply Names of described destination application can be obtained, keyword message in the Apply Names of described destination application and application information list is carried out fuzzy matching by terminal again, if the match is successful, then the operating system of data service data described in determination processing is described second operating system; It should be noted that, how to carry out module coupling by keyword message is that those skilled in the art are intelligible, does not repeat them here.
In the optional embodiment of another kind, terminal can determine the destination application of processing said data business datum, and according to the application program preset and the corresponding relation of operating system, determine the operating system performing described destination application, if the described operating system determined is described second operating system, the operating system of terminal then data service data described in determination processing is described second operating system.
Wherein, the concrete steps of the destination application of terminal determination processing said data business datum with reference to foregoing description, can not repeat them here.
Wherein, terminal can store the system information list of the corresponding relation of application program and operating system in advance; Optionally, system information list can identify corresponding application program by application identities, and described application identities comprises Apply Names and/or keyword message, the title that Apply Names can be as corresponding in each application program of micro-letter, QQ, Netease's mailbox etc.; Keyword message can as the key word of the mark one class application programs such as bank's control;
It should be noted that, described system information list is just stored in described terminal before can dispatching from the factory, and also can be arranged voluntarily by user.
Described application identities is for Apply Names, terminal is after the destination application determining processing said data business datum, operating system corresponding to described destination application can be inquired about according to the Apply Names of described destination application, if the operating system inquired is the second operating system, then the operating system of data service data described in determination processing is described second operating system;
Described application identities is for keyword message, terminal is after the destination application determining described data service data, the Apply Names of described destination application can be obtained, keyword message in the Apply Names of described destination application and system information list is carried out fuzzy matching by terminal again, and the detection key that the match is successful is information, and whether corresponding operating system is the second operating system, if result of determination is yes, then the operating system of data service data described in determination processing is described second operating system; It should be noted that, how to carry out module coupling by keyword message is that those skilled in the art are intelligible, does not repeat them here.
Step S130, distributes to described second operating system process by described data service data.
Second operating system can by showing or the mode processing said data business datum such as storage, and suppose, described data service data is the data of micro-letter, and terminal can show the micro-letter data received, and/or micro-letter data is stored in this locality.
In the embodiment shown in fig. 1, the terminal operating in the first operating system receives data service data, whether the operating system judging processing said data business datum is again the second operating system, be equivalent to the data service data that Filter Examination arrives, if the determination result is YES, illustrate that described data service data is important data, then described data service data is distributed to described second operating system process, achieve and important data service data is distributed to the higher system process of safe class, thus prevent loss and the illegal leakage of important data service data, and then improve the security performance of terminal.
Refer to Fig. 3, Fig. 3 is the process flow diagram of the another kind of data processing method that the embodiment of the present invention provides; Described method is applied to terminal, and described terminal is provided with the first operating system and the second operating system, and the safe class of described second operating system is higher than the safe class of described first operating system, and described method can comprise as shown in Figure 3:
Step S310, operates in the installation kit of the terminal receiving target application program of the first operating system.
According to the mark of installation kit, terminal can judge that whether the data that receive are the installation kit of application program, if the determination result is YES, terminal then using application program corresponding for installation kit as destination application.
Step S320, judges whether the operating system of installing described destination application is the second operating system, if the operating system of installing described destination application is described second operating system, then performs step S330; Otherwise, described destination application is installed on the first operating system.
Wherein, described first operating system can comprise canonical domain system, and described second operating system can comprise security domain system.
In the optional embodiment of one, when the terminal operating in the first operating system receives the installation kit of destination application, the application identities whether comprising described destination application in default application information list can be detected, if comprise the application identities of described destination application in described application information list, then judge the operating system of described destination application to be installed as described second operating system.
Wherein, prestored in application information list by the application identities of the application program of the second operating system process; Optionally, described application identities can comprise Apply Names and/or keyword message, the title that Apply Names can be as corresponding in each application program of micro-letter, QQ, Netease's mailbox etc.; Keyword message can as the key word of the mark one class application programs such as bank's control;
It should be noted that, described application information list is just stored in described terminal before can dispatching from the factory, and also can be arranged voluntarily by user.
Described application identities is for Apply Names, terminal can obtain the Apply Names of installation kit, and detect the list item that whether there is the Apply Names comprising described destination application in described application information list, if the determination result is YES, then the application identities comprising described destination application in described application information list is judged.
Described application identities is for keyword message, terminal can obtain the Apply Names of installation kit, and the keyword message in described Apply Names and application information list is carried out fuzzy matching, if the match is successful, then judge the application identities comprising described destination application in described application information list.It should be noted that, how to carry out module coupling by keyword message is that those skilled in the art are intelligible, does not repeat them here.
Further, if do not comprise the application identities of described destination application in described application information list, terminal can point out user whether described destination application to be installed on described second operating system, if receive the confirmation instruction for described prompting input, then perform step S330, and the application identities of described destination application is added in described application information list, when receiving the data service data of described destination application to make SS later, described data service data can be distributed to the second operating system process.
In the optional embodiment of another kind, when the terminal operating in the first operating system receives the installation kit of destination application, terminal can according to the application program preset and the corresponding relation of operating system, determine the operating system performing described destination application, if the described operating system determined is described second operating system, then perform step S330; If the described operating system determined is the first operating system, then described destination application is installed on the first operating system.
Wherein, terminal has prestored the system information list of the corresponding relation of application program and operating system; Optionally, system information list can identify corresponding application program by application identities, and described application identities comprises Apply Names and/or keyword message, the title that Apply Names can be as corresponding in each application program of micro-letter, QQ, Netease's mailbox etc.; Keyword message can as the key word of the mark one class application programs such as bank's control; It should be noted that, described system information list is just stored in described terminal before can dispatching from the factory, and also can be arranged voluntarily by user.
Described application identities is for Apply Names, terminal is after the installation kit receiving destination application, operating system corresponding to described destination application can be inquired about according to the Apply Names of described installation kit, if the operating system inquired is the second operating system, then perform step S330; If the operating system inquired is the first operating system, then the installation kit of described destination application is installed on the first operating system.
Described application identities is for keyword message, terminal is after the installation kit receiving destination application, the Apply Names of described installation kit can be obtained, keyword message in the Apply Names of described destination application and system information list is carried out fuzzy matching by terminal again, and whether the operating system detecting the keyword message that the match is successful corresponding is the second operating system, if result of determination is yes, then perform step S330; If its operating system is the first operating system, then the installation kit of described destination application is installed on the first operating system.
If there is not the list item of the application identities comprising described installation kit in described system information list, optionally, described installation kit directly can be installed on the first operating system by terminal; Further, terminal can point out user whether described destination application to be installed on described second operating system, if receive the confirmation instruction for described prompting input, then perform step S330, and the application identities of described destination application is added in described application information list, when receiving the data service data of described destination application to make SS later, described data service data can be distributed to the second operating system process.
Step S330, is installed on described second operating system by described destination application.
It should be noted that, how terminal is that those skilled in the art are intelligible according to installation kit set up applications, does not repeat them here.
It is to be noted, (as shown in Figure 4) can be there is in two flow processs that above-mentioned Fig. 1 and Fig. 3 is corresponding in same embodiment simultaneously, the situation that also can only adopt one of them process to combine with prior art in one embodiment, the embodiment of the present invention does not limit this.
In the embodiment shown in fig. 3, when the terminal operating in the first operating system receives the installation kit of destination application, can first detect the application identities whether comprising described destination application in application information list, if the determination result is YES, illustrate that the data service data of described destination application is important data, then described destination application is installed on the second operating system, to make by the data of destination application described in the second operating system process, achieve and important data service data is distributed to the higher system process of safe class, thus prevent loss and the illegal leakage of important data service data, and then improve the security performance of terminal.
Refer to Fig. 4, Fig. 4 is the process flow diagram of another data processing method that the embodiment of the present invention provides; Described method is applied to terminal, described terminal is provided with the first operating system and the second operating system, the safe class of described second operating system is higher than the safe class of described first operating system, described second operating system is for security domain system, described first operating system is for canonical domain system, and described method can comprise as shown in Figure 4:
Step S410, operates in the installation kit of the terminal receiving target application program of canonical domain system.
Step S420, detects the application identities whether comprising described destination application in application information list, and described application information list is used for the application identities of the application program of storage security domain system process.
Step S430, if the application identities comprising described destination application in described application information list, is then installed on described security domain system by described destination application.
Step S440, if the application identities not comprising described destination application in described application information list, is then installed on described canonical domain system by described destination application.
Step S450, the terminal operating in described canonical domain system receives data service data.
Step S460, judges whether the operating system of processing said data business datum is security domain system.
Step S470, if the operating system of processing said data business datum is described security domain system, then distributes to the process of described security domain system by described data service data.
Step S480, if the operating system of processing said data business datum is not described security domain system, described canonical domain system then processing said data business datum.
Refer to Fig. 5, Fig. 5 is the structural representation of a kind of data processing equipment that the embodiment of the present invention provides; Described data processing equipment is used for terminal, the first operating system and the second operating system in described terminal, and the safe class of described second operating system is higher than the safe class of described first operating system; Described data processing equipment 5 at least can comprise as shown in Figure 5: receiver module 51, detection module 52 and distribution module 53, wherein:
Receiver module 51, for receiving data service data;
Detection module 52, for judging whether the operating system of processing said data business datum is the second operating system;
Fig. 6 is the structural representation of a kind of detection module that the embodiment of the present invention provides, and as shown in Figure 6, described detection module 52 can also comprise application program detecting unit 521 and detecting unit 522, wherein:
Application program detecting unit 521, for determining the destination application of processing said data business datum;
Detecting unit 522, for detecting the application identities whether comprising described destination application in default application information list, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system.
Distribution module 53, if be described second operating system for the operating system of processing said data business datum, then distributes to described second operating system process by described data service data.
Further, described receiver module 51 can also be used for: the installation kit of receiving target application program;
Described detection module 52 can also be used for: judge whether the operating system of installing described destination application is the second operating system;
Concrete, described detection module 52 can detect the application identities whether comprising described destination application in default application information list, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then judge the operating system of described destination application to be installed as described second operating system.
Described data processing equipment 5 can also comprise as shown in Figure 5:
Installation module 54, if the application identities for comprising described destination application in described application information list, is then installed on described second operating system by described destination application.
Further, described data processing equipment 5 can also comprise reminding module 55 and update module 56, wherein:
Reminding module 55, if the application identities for not comprising described destination application in described application information list, then points out user whether described destination application to be installed on described second operating system;
Described installation module 54 also for: if receive for described prompting input confirmation instruction, then described destination application is installed on described second operating system;
Update module 56, if for receiving the confirmation instruction for described prompting input, then add to the application identities of described destination application in described application information list.
Wherein, described first operating system is canonical domain system, and described second operating system is security domain system.
Will be understood that, the function of each functional module of the data processing equipment 5 of the present embodiment can according to the method specific implementation in said method embodiment, can the associated description of concrete corresponding reference diagram 1 ~ Fig. 3 embodiment of the method, repeats no more herein.
Refer to Fig. 7, Fig. 7 is the structural representation of a kind of terminal that the embodiment of the present invention provides; As shown in Figure 7, the terminal 7 in the embodiment of the present invention comprises data processing equipment 5 as described above.
In embodiments of the present invention, when the terminal 7 being provided with multisystem receives data service data, when the terminal 7 operating in current system receives the switching command for goal systems, whether the operating system judging processing said data business datum is the second operating system, if the operating system of processing said data business datum is described second operating system, then described data service data is distributed to described second operating system process, achieve and important data service data is distributed to the higher system process of safe class, thus prevent loss and the illegal leakage of important data service data, and then improve the security performance of terminal.
It should be noted that, in the above-described embodiments, the description of each embodiment is all emphasized particularly on different fields in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.Secondly, those skilled in the art also should know, the embodiment described in instructions all belongs to preferred embodiment, and involved action and module might not be that the embodiment of the present invention is necessary.
Step in embodiment of the present invention method can be carried out order according to actual needs and be adjusted, merges and delete.
Module in embodiment of the present invention device or unit can carry out merging, divide and deleting according to actual needs.
Module described in the embodiment of the present invention or unit, universal integrated circuit can be passed through, such as CPU (Central Processing Unit, central processing unit), or realized by ASIC (Application SpecificIntegrated Circuit, special IC).
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (11)

1. a data processing method, for terminal, is characterized in that, described terminal is provided with the first operating system and the second operating system, and the safe class of described second operating system is higher than the safe class of described first operating system, and described method comprises:
The terminal operating in the first operating system receives data service data;
Whether the operating system judging processing said data business datum is the second operating system;
If the operating system of processing said data business datum is described second operating system, then described data service data is distributed to described second operating system process.
2. the method for claim 1, is characterized in that, whether the described operating system judging processing said data business datum is that the second operating system comprises:
Determine the destination application of processing said data business datum;
Detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process;
If comprise the application identities of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system.
3. the method for claim 1, is characterized in that, described in operate in the first operating system terminal receive before data service data, described method also comprises:
Operate in the installation kit of the described terminal receiving target application program of described first operating system;
Judge whether the operating system of installing described destination application is the second operating system;
If the operating system of installing described destination application is described second operating system, then described destination application is installed on described second operating system.
4. method as claimed in claim 3, is characterized in that, describedly judges whether the operating system of installing described destination application is that the second operating system comprises:
Detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process;
If comprise the application identities of described destination application in described application information list, then judge the operating system of described destination application to be installed as described second operating system.
5. method as claimed in claim 4, it is characterized in that, if do not comprise the application identities of described destination application in described application information list, described method also comprises:
Whether prompting user is installed on described second operating system by described destination application;
If receive the confirmation instruction for described prompting input, then perform the described step described destination application being installed on described second operating system, and the application identities of described destination application is added in described application information list.
6. a data processing equipment, for terminal, is characterized in that, described terminal is provided with the first operating system and the second operating system, and the safe class of described second operating system is higher than the safe class of described first operating system, and described device comprises:
Receiver module, for receiving data service data;
Detection module, for judging whether the operating system of processing said data business datum is the second operating system;
Distribution module, if be described second operating system for the operating system of processing said data business datum, then distributes to described second operating system process by described data service data.
7. device as claimed in claim 6, it is characterized in that, described detection module comprises:
Application program detecting unit, for determining the destination application of processing said data business datum;
Detecting unit, for detecting the application identities whether comprising described destination application in default application information list, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then the operating system of data service data described in determination processing is described second operating system.
8. device as claimed in claim 6, is characterized in that,
Described receiver module is also for the installation kit of receiving target application program;
Described detection module also for: judge whether the operating system of installing described destination application is the second operating system;
Described device also comprises:
Installation module, if the application identities for comprising described destination application in described application information list, is then installed on described second operating system by described destination application.
9. device as claimed in claim 8, is characterized in that, described detection module specifically for:
Detect the application identities whether comprising described destination application in the application information list preset, described application information list is for storing the application identities of the application program of described second operating system process, if comprise the application identities of described destination application in described application information list, then judge the operating system of described destination application to be installed as described second operating system.
10. device as claimed in claim 9, it is characterized in that, described device also comprises:
Reminding module, if the application identities for not comprising described destination application in described application information list, then points out user whether described destination application to be installed on described second operating system;
Described installation module also for: if receive for described prompting input confirmation instruction, then described destination application is installed on described second operating system;
Update module, if for receiving the confirmation instruction for described prompting input, then add to the application identities of described destination application in described application information list.
11. 1 kinds of terminals, is characterized in that, described terminal is provided with the first operating system and the second operating system, described terminal comprises the device according to any one of claim 6-10.
CN201510288853.4A 2015-05-29 2015-05-29 Data processing method and apparatus Pending CN104866782A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510288853.4A CN104866782A (en) 2015-05-29 2015-05-29 Data processing method and apparatus
PCT/CN2015/082936 WO2016192161A1 (en) 2015-05-29 2015-06-30 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510288853.4A CN104866782A (en) 2015-05-29 2015-05-29 Data processing method and apparatus

Publications (1)

Publication Number Publication Date
CN104866782A true CN104866782A (en) 2015-08-26

Family

ID=53912604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510288853.4A Pending CN104866782A (en) 2015-05-29 2015-05-29 Data processing method and apparatus

Country Status (2)

Country Link
CN (1) CN104866782A (en)
WO (1) WO2016192161A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049533A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Terminal system upgrading method and system
CN105975302A (en) * 2016-05-03 2016-09-28 深圳市金立通信设备有限公司 Application installation method and terminal
CN106548097A (en) * 2015-09-23 2017-03-29 深圳市全智达科技有限公司 The operation method and device of network device software
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110675872B (en) * 2019-09-27 2023-09-01 海信视像科技股份有限公司 Voice interaction method based on multi-system display equipment and multi-system display equipment
CN114258010A (en) * 2020-09-25 2022-03-29 中国移动通信有限公司研究院 Information processing method, device, equipment and readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103282911A (en) * 2011-11-04 2013-09-04 Sk普兰尼特有限公司 Method for interworking trust between a trusted region and an untrusted region, method, server, and terminal for controlling the downloading of trusted applications, and control system applying same
US20130305392A1 (en) * 2012-05-08 2013-11-14 Hagai Bar-El System, device, and method of secure entry and handling of passwords
CN103413089A (en) * 2013-08-28 2013-11-27 天翼电信终端有限公司 Mobile terminal and method thereof for achieving dual system
CN103714459A (en) * 2013-12-26 2014-04-09 电子科技大学 Secure payment system and method of intelligent terminal
CN103858131A (en) * 2011-10-07 2014-06-11 信特尼有限公司 Microprocessor system with secured runtime environment
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN104462989A (en) * 2014-12-25 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Method and system for installing application program between multiple systems and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2492835A1 (en) * 2011-02-22 2012-08-29 HTC Corporation Data security management systems and methods
JP2014137627A (en) * 2013-01-15 2014-07-28 Sony Corp Input apparatus, output apparatus, and storage medium
CN104168557B (en) * 2014-08-28 2018-06-15 酷派软件技术(深圳)有限公司 The upgrade method of operating system and the update device of operating system
CN104268454A (en) * 2014-09-28 2015-01-07 酷派软件技术(深圳)有限公司 Management method and device of application program of terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103858131A (en) * 2011-10-07 2014-06-11 信特尼有限公司 Microprocessor system with secured runtime environment
CN103282911A (en) * 2011-11-04 2013-09-04 Sk普兰尼特有限公司 Method for interworking trust between a trusted region and an untrusted region, method, server, and terminal for controlling the downloading of trusted applications, and control system applying same
US20130305392A1 (en) * 2012-05-08 2013-11-14 Hagai Bar-El System, device, and method of secure entry and handling of passwords
CN103413089A (en) * 2013-08-28 2013-11-27 天翼电信终端有限公司 Mobile terminal and method thereof for achieving dual system
CN103714459A (en) * 2013-12-26 2014-04-09 电子科技大学 Secure payment system and method of intelligent terminal
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN104462989A (en) * 2014-12-25 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Method and system for installing application program between multiple systems and terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049533A (en) * 2015-08-31 2015-11-11 宇龙计算机通信科技(深圳)有限公司 Terminal system upgrading method and system
CN105049533B (en) * 2015-08-31 2019-02-01 宇龙计算机通信科技(深圳)有限公司 A kind of method and system of terminal system upgrading
CN106548097A (en) * 2015-09-23 2017-03-29 深圳市全智达科技有限公司 The operation method and device of network device software
CN105975302A (en) * 2016-05-03 2016-09-28 深圳市金立通信设备有限公司 Application installation method and terminal
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium
CN110222492B (en) * 2019-05-05 2021-04-20 深圳汇茂科技股份有限公司 System switching method and device, computer equipment and computer readable storage medium

Also Published As

Publication number Publication date
WO2016192161A1 (en) 2016-12-08

Similar Documents

Publication Publication Date Title
CN104866782A (en) Data processing method and apparatus
US8718602B2 (en) Method and system for remote control of smart card
US8744403B2 (en) Method and system for remote control of a smart card
CN102917425A (en) Operator network switching method and device
CN103518401A (en) Network switching method and device
CN102917426A (en) Operator network switching method and device for IOT (Internal of Things) terminal
CN103037062A (en) Method and terminal and server used for intercepting crank calls
CN110475229B (en) Method and device for accessing service data, computer equipment and storage medium
US8718603B2 (en) Method and system for remote control of a smart card
CN106201783A (en) A kind of data reconstruction method and device
CN103813439A (en) Method for terminal register and terminal
CN105930749A (en) Anti-theft processing method and device for mobile terminal
CN104601262A (en) Information processing method and mobile equipment
CN104809046A (en) Application program networking control method and application program networking control device
CN106022108A (en) Synchronous management method and terminal device
CN101742592A (en) Switching method for communication conversation modes and the system and mobile terminal thereof.
CN102932741A (en) Mobile phone antitheft tracking method and antitheft tracking mobile phone
EP3468261B1 (en) Control method and apparatus for smart card, terminal device, and smart card
CN111522650A (en) Service request processing method and device of distributed system and electronic equipment
CN106020426B (en) A kind of method for releasing and device waking up lock
CN105472599A (en) Method for accessing SIM cards and double-card mobile terminal
CN103873698A (en) Terminal association device and terminal association method
CN101984641B (en) Mobile terminal and backlight control method thereof
CN106792521A (en) Obtain method, device and the electronic equipment of terminal location
CN104301235A (en) Network flow control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150826

RJ01 Rejection of invention patent application after publication