CN106326018A - Data access method and terminal - Google Patents
Data access method and terminal Download PDFInfo
- Publication number
- CN106326018A CN106326018A CN201610694008.1A CN201610694008A CN106326018A CN 106326018 A CN106326018 A CN 106326018A CN 201610694008 A CN201610694008 A CN 201610694008A CN 106326018 A CN106326018 A CN 106326018A
- Authority
- CN
- China
- Prior art keywords
- data
- operating system
- terminal
- security context
- instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/543—User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention discloses a data access method and a terminal. The method comprises the steps of receiving an access command for accessing target data in a second operating system, wherein first data is stored in a storage space corresponding to the second operating system, and the access of the target data depends on the first data; sending the first data to a first operating system, and conveniently processing second data in the first operating system according to the first data, thus obtaining the target data, wherein the second data is the data stored in a storage space corresponding to the first operating system; outputting the target data. By implementing the data access method and the terminal provided by the embodiment of the invention, the requirement of data transfer and storage carried out between the double operating systems on transmission bandwidth can be reduced.
Description
Technical field
The present invention relates to areas of information technology, particularly relate to a kind of data access method and terminal.
Background technology
Along with the development of terminal (such as the terminal such as smart mobile phone, panel computer), terminal has become people's daily life must not
The article that can lack.At present, the terminal having multiple operating system gets more and more, and such as, a lot of terminals have normal operations system simultaneously
System and SOS.In actual applications, the situation carrying out data conversion storage between two operating systems often occurs, such as,
The data stored in memory space corresponding for one operating system are often transmitted to corresponding the depositing of another operating system by terminal
Storage space stores.However, it has been found in practice that, when storage big in the memory space that terminal is corresponding by operating system
When data transmission to the memory space that another operating system is corresponding stores, the requirement to transmission bandwidth is higher.
Summary of the invention
Embodiments provide a kind of data access method and terminal, it is possible to reduce and carry out data between dual operating systems
The unloading requirement to transmission bandwidth.
Embodiment of the present invention first aspect discloses a kind of data access method, including:
The access instruction for accessing target data is received, wherein, in described second operation system in the second operating system
In the memory space that system is corresponding, storage has the first data, the access of described target data to depend on described first data;
Described first data are sent to described first operating system, in order to according to institute in described first operating system
Stating the first data to process the second data, obtain described target data, described second data are described first operating system
The data of storage in corresponding memory space;
Export described target data.
Embodiment of the present invention second aspect discloses a kind of terminal, including:
Receive unit, for receiving the access instruction for accessing target data in the second operating system, wherein, in institute
Stating storage in the memory space that the second operating system is corresponding has the first data, the access of described target data to depend on described first
Data;
Transmitting element, for being sent to described first operating system by described first data, in order to grasps described first
Making to process the second data according to described first data in system, obtain described target data, described second data are institute
State the data of storage in the memory space that the first operating system is corresponding;
Output unit, is used for exporting described target data.
In the embodiment of the present invention, terminal receive in the second operating system for access target data access instruction it
After, the first data can be sent to the first operating system by terminal, in order to according to the first data pair in the first operating system
Second data process, and obtain target data, and so, terminal just can export target data.Wherein, in the second operation system
In the memory space that system is corresponding, storage has the first data, and the access of target data depends on the first data, and the second data are first
The data of storage in the memory space that operating system is corresponding.Visible, by the embodiment of the present invention, terminal is respectively in the first operation system
The memory space that system is corresponding stores the second data, and stores the first data at the memory space that the second operating system is corresponding,
After second operating system receives the access instruction for accessing target data, it is only necessary to the first data are sent to the first behaviour
Make system, it is possible to access target data, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make
Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for
From the point of view of those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other according to these accompanying drawings
Accompanying drawing.
Fig. 1 is the schematic flow sheet of a kind of data access method disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of another kind of data access method disclosed in the embodiment of the present invention;
Fig. 3 is the structural representation of a kind of terminal disclosed in the embodiment of the present invention;
Fig. 4 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is a part of embodiment of the present invention rather than whole embodiments wholely.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of protection of the invention.
Term " first " in description and claims of this specification and above-mentioned accompanying drawing and " second " etc. are for district
Different objects rather than be used for describing particular order.Additionally, term " includes " and " having " and their any deformation, meaning
Figure is to cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system, product or equipment
It is not limited to step or the unit listed, but the most also includes step or the unit do not listed, or alternatively also
Including other step intrinsic for these processes, method, product or equipment or unit.
In the embodiment of the present invention, user terminal can include but not limited to smart mobile phone, notebook computer, personal computer
(Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), mobile interchange
All kinds of use such as net equipment (Mobile Internet Device, MID), Intelligent worn device (such as intelligent watch, Intelligent bracelet)
Family terminal.Wherein, the operating system of this user terminal may include but be not limited to Android operation system, IOS,
Symbian (Saipan) operating system, Black Berry (blackberry) operating system, Windows Phone8 operating system etc., this
Inventive embodiments does not limits.
The embodiment of the invention discloses a kind of data access method and terminal, the safety of data can be improved.Hereinafter divide
It is not described in detail.
Referring to Fig. 1, Fig. 1 is the schematic flow sheet of a kind of data access method disclosed in the embodiment of the present invention.Such as Fig. 1 institute
Showing, the method may comprise steps of.
101, terminal receives the access instruction for accessing target data in the second operating system.
In the embodiment of the present invention, terminal includes at least one first operating system and at least one second operating system.Can
Choosing, the first operating system can be normal operating system, and the second operating system can be SOS, normal operations system
The safety of system is low compared with the safety of SOS, can arbitrarily install third-party application under normal operating system, than
Such as application A PP, user can be in the function of normal operating system experience to abundant third-party application, safety operation system
All application under Tong are the application of customized development, not in installing any third-party application under SOS.Its
In, for SOS, can be to meet U.S. trusted computer system evaluation criterion (Trusted Computer
System Evaluation Criteria, TCSEC) B level and the operating system of above level of security in standard.Level of security is joined
Examine such as following table:
The first operating system in step 101 can be any one first operating system of terminal, in step 101
Two operating systems can be any one second operating system of terminal.Wherein, the first operating system and the second operating system pair
The memory space answered differs.
Wherein, target data can include the one therein such as image data, lteral data, video data or speech data or
Multiple combination, the embodiment of the present invention does not limits.
Wherein, in the memory space that the second operating system is corresponding, storage has the first data, and the first operating system is corresponding
In memory space, storage has the second data, and the access of target data depends on the first data.
Optionally, can extraction unit divided data, and will be except first in target data as the first data from target data
Remaining data outside data determines as the second data.
Optionally, can be using the related information of target data as the first data, and using target data as the second data,
Wherein, this related information includes but not limited to the dedicated program etc. of key, coded format, file access.
Wherein, the access of target data depends on the first data can be not have the first data cannot enter target data
Row accesses.If the first data are related information, then when accessing target data, need to use related information that target data is carried out
Resolve, target data could be accessed;If the first data are a part for target data, then terminal can under the second operating system
From the memory space that the first operating system is corresponding, read the second data, and terminal can not be from the second behaviour under the first operating system
Making to read in the memory space that system is corresponding first data, the second data cannot be accessed in the case of lacking the first data,
Terminal needs to combine the first data and the second data, after obtaining target data, could access target data.
As an example it is assumed that target data is the most encrypted, the first data are related information, and this related information can be encryption
The key used, if user desires access to the target data encrypted, then must use the key number of targets to having encrypted
According to being decrypted, target data after deciphering, could be accessed.
Again as an example it is assumed that target data is voice data, this voice data is split into the first data and the second number
According to, the first data are initial 100 data of voice data, and remaining is the second data, and the first data are stored in the second operation
In the memory space that system is corresponding, the second data are stored in the memory space that the first operating system is corresponding.Second data are lacking
In the case of few first data, terminal cannot access the second data under the first operating system, namely terminal is in the first operation system
Cannot access voice data under Tong, the access of voice data depends on the first data.
102, the first data are sent to the first operating system by terminal, in order to according to the first number in the first operating system
Process according to the second data, obtain target data.
In the embodiment of the present invention, in the memory space that the first operating system is corresponding, storage has the second data, due to number of targets
According to access depend on the first data, terminal needs the first data are sent to the first operating system, in order to first operation
Second data are processed according to the first data by system, obtains target data.
Optionally, the second data are processed in the first operating system by terminal according to the first data, obtain number of targets
According to mode be specifically as follows:
11) relative position information stored during terminal obtains the memory space that the second operating system is corresponding, this relative position
Information is the first data and second data relative position information in this target data;
12) terminal is under the second operating system, reads Part I number from the memory space that the second operating system is corresponding
According to, and from the memory space that the first operating system is corresponding, read Part II data;
13) terminal is under the second operating system, according to the relative position information recorded by Part I data and second
Divided data is combined, and obtains target data.
In this optional embodiment, target data, in advance in the first operating system, is split into the first number by terminal
According to the second data after, terminal has obtained the first data and the second data in advance in this target data in the first operating system
In relative position information, and this relative position information sent to the memory space that the second operating system is corresponding store.
In this embodiment, when the first operating system is normal operating system, and the second operating system is safety operation system
During system, terminal can read the first data in the memory space that the second operating system is corresponding, and can be from the first operating system pair
The memory space answered reads the second data, and according to the relative position stored in the memory space corresponding in the second operating system
First data and the second data are combined, obtain target data by information.
Such as, user carries out calling record under the first operating system, and obtains a recording file, due to this recording literary composition
The recording substance of last 5 minutes of part relates to privacy of user, then terminal can extract the recording of last 5 minutes from recording file
Content as the first data, and by recording file in addition to these first data remaining all data be defined as the second data,
Terminal by relative position information in recording file of the first data and the first data and the second data, (believe by this relative position
Breath can be after these first data are in the second data in target data) send to storage corresponding to the second operating system empty
Between store, the second data are stored directly in the memory space that the first operating system is corresponding.If user wants to check recording
File, then user can input the acquisition instruction for obtaining recording file under terminal is in the second operating system, and terminal is the
Read the first data under two operating systems, and from the memory space that the first operating system is corresponding, read the second data, and according to
First data are added after the second data, to obtain complete record by the first data and the relative position information of the second data
Sound file.
Optionally, the first data and second data relative position information in target data also can be not stored in the first behaviour
Make in the memory space that system is corresponding;This relative position information directly can be write the ad-hoc location of the first data by terminal, then
First data transmission is stored to the memory space that the second operating system is corresponding.When terminal is corresponding from the second operating system
After reading the first data in memory space, terminal extracts the relative position information in the first data, and according to this relative position
First data are combined by information with the second data.
Visible, by implementing this embodiment, when user desires access to target data, terminal can be in the second operation system
Reducible target data under system.
Optionally, the second data are processed in the first operating system by terminal according to the first data, obtain number of targets
According to mode be specifically as follows:
21) the first data stored during terminal obtains the memory space that the second operating system is corresponding;
22) terminal uses the first data to resolve the second data, obtains target data.
In this optional embodiment, the first data are the related information of target data, and the access of target data relies on
In the first data.When terminal needs to access target data, terminal must use related information to resolve the second data, ability
Obtain target data.
Such as: if target data is the file encrypted, this related information can be the encrypted message having encrypted file, if
User wants to check the file encrypted, then encrypted message must be used to be decrypted the file encrypted, after deciphering
Just can see file.
Visible, by implementing this embodiment, the safety of terminal data can be improved.
103, terminal output target data.
In the embodiment of the present invention, terminal exports target data in the first operating system.Concrete, terminal can be first
Operating system shows this target data (as display video), or, terminal can through the first operating system by target data (as
Audio frequency is play) it is transferred to other external equipments (such as loudspeaker).
In the method flow described by Fig. 1, terminal is respectively in the memory space storage second that the first operating system is corresponding
Data, and store the first data at the memory space that the second operating system is corresponding, receive in the second operating system and be used for visiting
After asking the access instruction of target data, it is only necessary to the first data are sent to the first operating system, it is possible to access number of targets
According to, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of another kind of data access method disclosed in the embodiment of the present invention.Such as Fig. 2
Shown in, the method may comprise steps of.
201, terminal receives the access instruction for accessing target data in the second operating system.
202, terminal sends operation security context instruction through the second operating system to the first operating system.
Wherein, the instruction of this operation security context is used for indicating operation security context.
In the embodiment of the present invention, the system application of the operating system (such as android system) of terminal is by equipment manufacturers
Self-developing or be built in system after carrying out safety detection, therefore the data security risk of general terminal mostlys come from
The third-party application that user downloads voluntarily.
In the embodiment of the present invention, the access of target data depends on the first data, when needs access target data, due to
First data and target data typically leave the specific region in internal memory (RAM) or in internal storage space (ROM) in, protect
Protect the safety of these data, it is necessary first to the safety guarantee in running environment, the most should there is not the dangerous process being currently running
(process that the application of some malicious third parties is opened), these dangerous processes can attempt to read the specific region storage of RAM or ROM
Secure data, cause the leakage of these secure datas, therefore, terminal receives in the second operating system and is used for accessing number of targets
According to access instruction after, terminal need through the second operating system to first operating system send run security context instruction, its
In, the instruction of this operation security context is used for indicating operation security context.
203, terminal is at the first operating system security context.
In the embodiment of the present invention, terminal is after the first operating system receives operation security context instruction, and terminal is permissible
At the first operating system security context.
Concrete, terminal comprises the following steps at the first operating system security context:
11) operation security context instruction is received in the first operating system;
12) close all nonsystematic processes under the first operating system, run security context instruction with response.
In this optional embodiment, terminal the first operating system receive operation security context instruction time, terminal
Can close all nonsystematic processes under the first operating system, including removing, the task data of nonsystematic application in internal memory is (main
If ACTIVITY), remove the service etc. in nonsystematic application in internal memory.
Optionally, after the first operating system receives and runs security context instruction, and close under the first operating system
All nonsystematic processes before, the method is further comprising the steps of:
21) whether output enters the confirmation of security context for prompting;
22) the confirmation instruction for confirmation input is received.
In this optional embodiment, first operating system receive run security context instruction after, need to
Whether family output enters the confirmation of security context for prompting, if receiving the confirmation that user inputs for confirmation
Instruction, terminal turns off all nonsystematic processes under the first operating system, so can improve Consumer's Experience.
204, the first data are sent to the first operating system by terminal, in order to according to the first number in the first operating system
Process according to the second data, obtain target data.
205, terminal output target data.
Concrete, the mode of terminal output target data specifically includes following steps:
31) application data is sent through the second operating system to the first operating system;
32) at the first operating system application data, in order to export target data in the first operating system.
In this optional embodiment, in order to avoid data are compromised after data access terminates, tie at data access
Shu Hou, also to remove the first data and the target data data in RAM and ROM that the first operating system is corresponding, and this needs
Second operating system sends application program to the first operating system and realizes.
In most of the cases, the access of file is needed by specific application program by user, such as DOC document, XLS
Document, JPG document, MP3 document, RMVB document etc., in requisition for using OFFICE application, picture to check, application, audio frequency are play
Application, video playback should be used for being converted to the data in file state that can be mutual with user, such as show in screen,
By loudspeaker broadcasting etc..
Second operating system have sent operation security context instruction to the first operating system and confirming the first operation system
Unite already at after under security context, send the installation kit of the application program that can open target data to the first operating system
(or comprise the target program data of executable program, run including executable program itself and application program and relied on
Library file, resource file and other data file etc.).Application program is vertical application, can only be by the second operation system
System provides, and the first operating system cannot obtain this application program by other channel.
Wherein, application program mainly performs following functions:
1, determine the security context of the first operating system, when the first operating system is not in security context, do not perform to beat
Open the task of target data, and self is destroyed after sending prompting;
2, as after confirming that the first operating system is in security context, perform open target data and export task;
3, after terminating to access target data (user is manual, or task terminates voluntarily), delete under the first operating system
The first data and target data and by self destroy.
In the method flow described by Fig. 2, receive in the second operating system and refer to for the access accessing target data
After order, terminal needs at the first operating system security context, and afterwards, the first data are sent to the first operation by terminal again
System, so, terminal just can access target data, not only reduces and carries out data conversion storage between dual operating systems to transmission bandwidth
Requirement, also improve the safety of data access.
Referring to Fig. 3, Fig. 3 is the structural representation of a kind of terminal disclosed in the embodiment of the present invention, and wherein, this terminal is installed
First operating system and the second operating system, this terminal is for performing the part in the data access method described by Fig. 1 or Fig. 2
Or Overall Steps, specifically refer to the description of Fig. 1 or Fig. 2, do not repeat them here.As it is shown on figure 3, this terminal 300 may include that
Receive unit 301, for receiving the access instruction for accessing target data in the second operating system, wherein,
In the memory space that described second operating system is corresponding, to have the first data, the access of described target data to depend on described in storage
First data;
Transmitting element 302, for being sent to described first operating system by described first data, in order to described first
Processing the second data according to described first data in operating system, obtain described target data, described second data are
The data of storage in the memory space that described first operating system is corresponding;
Output unit 303, is used for exporting described target data.
Referring to Fig. 4, Fig. 4 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention, wherein, wherein, and should
Terminal, for performing the part or all of step in the data access method described by Fig. 1 or Fig. 2, specifically refer to Fig. 1 or Fig. 2
Description, do not repeat them here.Terminal shown in Fig. 4 is to optimize further to obtain on the basis of the terminal shown in Fig. 3, with
Terminal shown in Fig. 3 is compared, the terminal shown in Fig. 4 in addition to all unit including the terminal shown in Fig. 3,
Described transmitting element 302 is additionally operable to receive for accessing mesh in the second operating system at described reception unit 301
After the access instruction of mark data, send operation security context through described second operating system to described first operating system and refer to
Order, the instruction of described operation security context is used for indicating operation security context;
Terminal 300 shown in Fig. 4 also includes:
Running unit 304, at described first operating system security context.
Optionally, described running unit 304 includes:
First receives subelement 3041, for receiving the instruction of described operation security context in described first operating system;
Close subelement 3042, for closing all nonsystematic processes under described first operating system, described with response
Operation security context instructs.
Optionally, described running unit 304 also includes:
Output subelement 3043, receives described for receiving subelement 3041 described first in described first operating system
After running security context instruction, and all nonsystematics under described first operating system closed by described closedown subelement 3042
Process, before responding the instruction of described operation security context, whether output enters the confirmation of security context for prompting;
Second receives subelement 3044, for receiving the confirmation instruction inputted for described confirmation.
Optionally, described output unit 303 export described target data mode particularly as follows:
Application data is sent to described first operating system through described second operating system;
At application data described in described first operating system, in order to export institute in described first operating system
State target data.
In the terminal 300 described by Fig. 3 or Fig. 4, terminal is respectively in the memory space storage that the first operating system is corresponding
Second data, and store the first data at the memory space that the second operating system is corresponding, receive in the second operating system and use
After accessing the access instruction of target data, it is only necessary to the first data are sent to the first operating system, it is possible to access mesh
Mark data, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
Referring to Fig. 5, Fig. 5 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention, wherein, wherein, and should
Terminal, for performing the part or all of step in the data access method described by Fig. 1 or Fig. 2, specifically refer to Fig. 1 or Fig. 2
Description, do not repeat them here.
As it is shown in figure 5, this terminal may include that at least one processor 501, such as CPU, at least two memorizer 502,
At least one input equipment 503, at least one output device 504.Wherein, memorizer 502 can be high-speed RAM memorizer, also
Can be non-labile memorizer (non-volatile memory), for example, at least one disk memory.Memorizer 502
Optionally can also is that at least one is located remotely from the storage device of aforementioned processor 501.This input equipment 503 can be to touch
Screen, keyboard or mouse etc..
Wherein, processor 501 can be in conjunction with the terminal described by Fig. 3 or Fig. 4, the memorizer that the second operating system is corresponding
Store batch processing code in 502, and above-mentioned processor 501 calls storage in memorizer corresponding to the second operating system 502
Program code, is used for performing following operation:
By input equipment 503 reception for accessing the access instruction of target data in the second operating system, wherein, exist
In the memory space that described second operating system is corresponding, storage has the first data, the access of described target data to depend on described the
One data;
By output device 504, described first data are sent to described first operating system, in order to described first
Processing the second data according to described first data in operating system, obtain described target data, described second data are
The data of storage in the memory space that described first operating system is corresponding;
Described target data is exported by output device 504.
Optionally, above-mentioned processor 501 is received by input equipment 503 in the second operating system and is used for accessing number of targets
According to access instruction after, and described by output device 504, described first data are sent to described first operating system
Before, also call in memorizer corresponding to the second operating system 502 program code of storage, be used for performing following operation:
Send operation security context through described second operating system to described first operating system by output device 504 to refer to
Order, the instruction of described operation security context is used for indicating operation security context;
At described first operating system security context.
Optionally, above-mentioned processor 501 includes at described first operating system security context:
Receive described operation security context by input equipment 503 in described first operating system to instruct;
Close all nonsystematic processes under described first operating system, to respond the instruction of described operation security context.
Optionally, above-mentioned processor 501 receives operation security context by input equipment 503 in described first operating system
After instruction, and before all nonsystematic processes under described first operating system of described closedown, described method also includes:
Whether entered the confirmation of security context for prompting by output device 504 output;
Receive, by input equipment 503, the confirmation inputted for described confirmation to instruct.
Optionally, above-mentioned processor 501 exports described target data by output device 504 and includes:
Application data is sent through described second operating system to described first operating system by output device 504;
At application data described in described first operating system, in order to export institute in described first operating system
State target data.
In the embodiment described by Fig. 5, terminal is respectively in the memory space storage second that the first operating system is corresponding
Data, and store the first data at the memory space that the second operating system is corresponding, receive in the second operating system and be used for visiting
After asking the access instruction of target data, it is only necessary to the first data are sent to the first operating system, it is possible to access number of targets
According to, thus reduce and between dual operating systems, carry out the data conversion storage requirement to transmission bandwidth.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some step can use other orders or carry out simultaneously.Secondly, those skilled in the art also should know
Knowing, embodiment described in this description belongs to preferred embodiment, involved action and the module not necessarily present invention
Necessary.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, and does not has the portion described in detail in certain embodiment
Point, may refer to the associated description of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, can be by another way
Realize.Such as, device embodiment described above is only schematically, and the division of the most described unit is only one
Logic function divides, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or can
To be integrated into another system, or some features can be ignored, or does not performs.Another point, shown or discussed each other
Coupling direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection,
Can be being electrical or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit
The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme
's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list
Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
If described integrated unit realizes and as independent production marketing or use using the form of SFU software functional unit
Time, can be stored in a computer-readable access to memory.Based on such understanding, technical scheme substantially or
What person said the part contributing prior art or this technical scheme completely or partially can be with the form body of software product
Revealing to come, this computer software product is stored in a memorizer, including some instructions with so that a computer equipment
(can be for personal computer, server or the network equipment etc.) perform all or part of of method described in each embodiment of the present invention
Step.And aforesaid memorizer includes: USB flash disk, read only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), portable hard drive, magnetic disc or CD.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can
Completing instructing relevant hardware by program, this program can be stored in a computer-readable memory, memorizer
May include that flash disk, read only memory (English: Read-Only Memory, be called for short: ROM), random access device (English:
RAM), disk or CD etc. Random Access Memory, is called for short:.
Above the embodiment of the present invention is described in detail, specific case used herein to the principle of the present invention and
Embodiment is set forth, and the explanation of above example is only intended to help to understand method and the core concept thereof of the present invention;
Simultaneously for one of ordinary skill in the art, according to the thought of the present invention, the most all can
Change part, and the most above-mentioned, this specification content should not be construed as limitation of the present invention.
Claims (10)
1. a data access method, it is characterised in that apply and installing the first operating system and the terminal of the second operating system
In, described method includes:
The access instruction for accessing target data is received, wherein, in described second operating system pair in the second operating system
In the memory space answered, storage has the first data, the access of described target data to depend on described first data;
Described first data are sent to described first operating system, in order to according to described in described first operating system
Second data are processed by one data, obtain described target data, and described second data are that described first operating system is corresponding
Memory space in storage data;
Export described target data.
Method the most according to claim 1, it is characterised in that described reception in the second operating system is used for accessing target
After the access instruction of data, and described described first data are sent to described first operating system before, described method
Also include:
Operation security context instruction, described operation security context is sent to described first operating system through described second operating system
Instruction is used for indicating operation security context;
At described first operating system security context.
Method the most according to claim 2, it is characterised in that described at described first operating system security context bag
Include:
The instruction of described operation security context is received in described first operating system;
Close all nonsystematic processes under described first operating system, to respond the instruction of described operation security context.
Method the most according to claim 3, it is characterised in that described reception by described first operating system runs safety
After environmental directives, and before all nonsystematic processes under described first operating system of described closedown, described method is also wrapped
Include:
Whether output enters the confirmation of security context for prompting;
Receive the confirmation instruction inputted for described confirmation.
5. according to the method described in any one of Claims 1 to 4, it is characterised in that the described target data of described output includes:
Application data is sent to described first operating system through described second operating system;
At application data described in described first operating system, in order to export described mesh in described first operating system
Mark data.
6. a terminal, it is characterised in that described terminal installs the first operating system and the second operating system, described terminal bag
Include:
Receive unit, for receiving for accessing the access instruction of target data in the second operating system, wherein, described the
In the memory space that two operating systems are corresponding, storage has the first data, the access of described target data to depend on described first number
According to;
Transmitting element, for being sent to described first operating system by described first data, in order in described first operation system
Processing the second data according to described first data in system, obtain described target data, described second data are described
The data of storage in the memory space that one operating system is corresponding;
Output unit, is used for exporting described target data.
Terminal the most according to claim 6, it is characterised in that described transmitting element is additionally operable at described reception unit
After two operating systems receive the access instruction for accessing target data, through described second operating system to described first behaviour
Making system and send operation security context instruction, the instruction of described operation security context is used for indicating operation security context;
Described terminal also includes:
Running unit, at described first operating system security context.
Terminal the most according to claim 7, it is characterised in that described running unit includes:
First receives subelement, for receiving the instruction of described operation security context in described first operating system;
Close subelement, for closing all nonsystematic processes under described first operating system, to respond described operation safety
Environmental directives.
Terminal the most according to claim 8, it is characterised in that described running unit also includes:
Output subelement, for receiving the instruction of described operation security context at described reception subelement in described first operating system
Afterwards, and all nonsystematic processes under described closedown subelement described first operating system of closedown, to respond described operation
Before security context instruction, whether output enters the confirmation of security context for prompting;
Second receives subelement, for receiving the confirmation instruction inputted for described confirmation.
10. according to the terminal described in any one of claim 6~9, it is characterised in that described output unit exports described number of targets
According to mode include:
Application data is sent to described first operating system through described second operating system;
At application data described in described first operating system, in order to export described mesh in described first operating system
Mark data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2016/098443 WO2017185582A1 (en) | 2016-04-28 | 2016-09-08 | Data processing method, accessing method, and terminal |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2016102736358 | 2016-04-28 | ||
CN201610273635 | 2016-04-28 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106326018A true CN106326018A (en) | 2017-01-11 |
CN106326018B CN106326018B (en) | 2020-01-10 |
Family
ID=57743914
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610694008.1A Active CN106326018B (en) | 2016-04-28 | 2016-08-19 | Data access method and terminal |
CN201610696406.7A Withdrawn CN106372527A (en) | 2016-04-28 | 2016-08-19 | Data processing method and terminal |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610696406.7A Withdrawn CN106372527A (en) | 2016-04-28 | 2016-08-19 | Data processing method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN106326018B (en) |
WO (1) | WO2017185582A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109491725A (en) * | 2018-11-12 | 2019-03-19 | 火烈鸟网络(广州)股份有限公司 | Application program can interact more extractions of root and system, storage medium, electronic equipment |
WO2021196842A1 (en) * | 2020-03-30 | 2021-10-07 | Oppo广东移动通信有限公司 | Data transmission method and apparatus, and wearable device and storage medium |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109857385B (en) * | 2018-12-24 | 2022-01-28 | 四川长虹电器股份有限公司 | Application program file packaging method, installation method and starting method |
JP7200922B2 (en) * | 2019-12-25 | 2023-01-10 | トヨタ自動車株式会社 | vehicle |
CN114138343A (en) * | 2020-09-04 | 2022-03-04 | 青岛海信移动通信技术股份有限公司 | Terminal and terminal starting method |
CN115344226B (en) * | 2022-10-20 | 2023-03-24 | 亿咖通(北京)科技有限公司 | Screen projection method, device, equipment and medium under virtualization management |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102981887A (en) * | 2011-09-06 | 2013-03-20 | 联想(北京)有限公司 | Data processing method and electronic device |
US20130254861A1 (en) * | 2011-06-03 | 2013-09-26 | Dell Products, Lp | System and Method for Providing Access to an Information Handling System |
US20130310034A1 (en) * | 2010-10-18 | 2013-11-21 | At&T Intellectual Property Ii, L.P. | Systems, Methods, and Computer Program Products for Managing Access to Femtocell Coverage |
CN103942503A (en) * | 2014-04-28 | 2014-07-23 | 上海新储集成电路有限公司 | Safe state switching system and switching method |
CN104091135A (en) * | 2014-02-24 | 2014-10-08 | 电子科技大学 | Intelligent terminal safety system and safety storage method |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1258724C (en) * | 2002-08-23 | 2006-06-07 | 英业达股份有限公司 | Update backup system for homogeneous double-system data conversion and its method |
US20070266444A1 (en) * | 2004-12-03 | 2007-11-15 | Moshe Segal | Method and System for Securing Data Stored in a Storage Device |
JP4631974B2 (en) * | 2009-01-08 | 2011-02-16 | ソニー株式会社 | Information processing apparatus, information processing method, program, and information processing system |
CN104468611B (en) * | 2014-12-24 | 2017-09-08 | 宇龙计算机通信科技(深圳)有限公司 | The data safety processing method and device switched based on dual system |
CN105279455A (en) * | 2015-09-23 | 2016-01-27 | 深圳市全智达科技有限公司 | Security architecture of mobile device and running method of application |
-
2016
- 2016-08-19 CN CN201610694008.1A patent/CN106326018B/en active Active
- 2016-08-19 CN CN201610696406.7A patent/CN106372527A/en not_active Withdrawn
- 2016-09-08 WO PCT/CN2016/098443 patent/WO2017185582A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130310034A1 (en) * | 2010-10-18 | 2013-11-21 | At&T Intellectual Property Ii, L.P. | Systems, Methods, and Computer Program Products for Managing Access to Femtocell Coverage |
US20130254861A1 (en) * | 2011-06-03 | 2013-09-26 | Dell Products, Lp | System and Method for Providing Access to an Information Handling System |
CN102981887A (en) * | 2011-09-06 | 2013-03-20 | 联想(北京)有限公司 | Data processing method and electronic device |
CN104091135A (en) * | 2014-02-24 | 2014-10-08 | 电子科技大学 | Intelligent terminal safety system and safety storage method |
CN103942503A (en) * | 2014-04-28 | 2014-07-23 | 上海新储集成电路有限公司 | Safe state switching system and switching method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109491725A (en) * | 2018-11-12 | 2019-03-19 | 火烈鸟网络(广州)股份有限公司 | Application program can interact more extractions of root and system, storage medium, electronic equipment |
CN109491725B (en) * | 2018-11-12 | 2022-12-27 | 火烈鸟网络(广州)股份有限公司 | Interactive multi-opening method and system of application program, storage medium and electronic equipment |
WO2021196842A1 (en) * | 2020-03-30 | 2021-10-07 | Oppo广东移动通信有限公司 | Data transmission method and apparatus, and wearable device and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN106326018B (en) | 2020-01-10 |
CN106372527A (en) | 2017-02-01 |
WO2017185582A1 (en) | 2017-11-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106326018A (en) | Data access method and terminal | |
EP3197059B1 (en) | Method for controlling sim card and sd card and electronic device implementing the same | |
KR102210995B1 (en) | Apparatus and method for notifying information of security in electric device and computer-readable recording medium for the same | |
CN106484484B (en) | Application program installs management method and terminal device | |
CN112287372B (en) | Method and apparatus for protecting clipboard privacy | |
CN107797841B (en) | Window control method and device, terminal equipment and storage medium | |
US20150012846A1 (en) | Method, System and Mobile Terminal for Deleting Chat Record | |
US10552132B2 (en) | Binary merging device, method, and computer program | |
CN103246483A (en) | Method, system and intelligent terminal for scanning files | |
CN104700003B (en) | A kind of file shell adding and hulling method, apparatus and system | |
CN106406940A (en) | System upgrading method, system upgrading apparatus, and terminal | |
KR20150066876A (en) | Method for controlling an user interface and an electronic device | |
US9462408B2 (en) | Information processing method and electronic device | |
WO2015193697A1 (en) | Mechanisms for controlling tag personalization | |
CN105262878A (en) | Processing method of automatic call recording and mobile terminal | |
KR102071530B1 (en) | Apparatas and method for proposing a response manual of occurring denial in an electronic device | |
KR102137686B1 (en) | Method for controlling an content integrity and an electronic device | |
CN104601341B (en) | One kind broadcast hold-up interception method and device | |
CN106294707A (en) | A kind of countdown information output intent and device | |
EP3852341B1 (en) | Information sharing method, device and non-transitory computer readable storage medium thereof | |
CN105740719A (en) | Wireless safe USB (Universal Serial Bus) flash disk and implementation method thereof | |
CN116939616A (en) | Equipment control method and device applied to telecommunication fraud prevention and electronic equipment | |
CN104580749A (en) | Method and device for controlling voice-recording function of terminal device | |
CN110895456A (en) | Data processing method, terminal, and computer-readable storage medium | |
CN111338899B (en) | Monitoring method, terminal and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210224 Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703 Patentee after: Shenzhen Microphone Holdings Co.,Ltd. Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong. Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd. |