CN106326018B - Data access method and terminal - Google Patents

Data access method and terminal Download PDF

Info

Publication number
CN106326018B
CN106326018B CN201610694008.1A CN201610694008A CN106326018B CN 106326018 B CN106326018 B CN 106326018B CN 201610694008 A CN201610694008 A CN 201610694008A CN 106326018 B CN106326018 B CN 106326018B
Authority
CN
China
Prior art keywords
data
operating system
target data
terminal
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610694008.1A
Other languages
Chinese (zh)
Other versions
CN106326018A (en
Inventor
曲大伟
王三新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Microphone Holdings Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to PCT/CN2016/098443 priority Critical patent/WO2017185582A1/en
Publication of CN106326018A publication Critical patent/CN106326018A/en
Application granted granted Critical
Publication of CN106326018B publication Critical patent/CN106326018B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/543User-generated data transfer, e.g. clipboards, dynamic data exchange [DDE], object linking and embedding [OLE]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Abstract

The embodiment of the invention discloses a data access method and a terminal. Wherein, the method comprises the following steps: receiving an access instruction for accessing target data in a second operating system, wherein first data is stored in a storage space corresponding to the second operating system, and the target data is accessed according to the first data; sending the first data to the first operating system so as to process second data in the first operating system according to the first data to obtain the target data, wherein the second data is data stored in a storage space corresponding to the first operating system; and outputting the target data. The embodiment of the invention can reduce the requirement of data transfer between the double operating systems on transmission bandwidth.

Description

Data access method and terminal
Technical Field
The present invention relates to the field of information technologies, and in particular, to a data access method and a terminal.
Background
With the development of terminals (such as smart phones, tablet computers and other terminals), terminals have become indispensable articles for daily life of people. Currently, more and more terminals have multiple operating systems, for example, many terminals have both a common operating system and a secure operating system. In practical applications, a situation of data unloading between two operating systems often occurs, for example, a terminal often transfers data stored in a storage space corresponding to one operating system to a storage space corresponding to another operating system for storage. However, in practice, it is found that when a terminal transmits large data stored in a storage space corresponding to one operating system to a storage space corresponding to another operating system for storage, the requirement on transmission bandwidth is high.
Disclosure of Invention
The embodiment of the invention provides a data access method and a terminal, which can reduce the requirement of data transfer between two operating systems on transmission bandwidth.
The first aspect of the embodiments of the present invention discloses a data access method, including:
receiving an access instruction for accessing target data in a second operating system, wherein first data is stored in a storage space corresponding to the second operating system, and the target data is accessed according to the first data;
sending the first data to the first operating system so as to process second data in the first operating system according to the first data to obtain the target data, wherein the second data is data stored in a storage space corresponding to the first operating system;
and outputting the target data.
A second aspect of the embodiments of the present invention discloses a terminal, including:
the data access method comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an access instruction for accessing target data in a second operating system, first data are stored in a storage space corresponding to the second operating system, and the target data are accessed according to the first data;
a sending unit, configured to send the first data to the first operating system, so as to process, in the first operating system, second data according to the first data, so as to obtain the target data, where the second data is data stored in a storage space corresponding to the first operating system;
an output unit for outputting the target data.
In the embodiment of the present invention, after the terminal receives the access instruction for accessing the target data in the second operating system, the terminal may send the first data to the first operating system, so that the second data is processed according to the first data in the first operating system to obtain the target data, and thus, the terminal may output the target data. The first data is stored in the storage space corresponding to the second operating system, the target data is accessed depending on the first data, and the second data is the data stored in the storage space corresponding to the first operating system. Therefore, according to the embodiment of the invention, the terminal respectively stores the second data in the storage space corresponding to the first operating system and stores the first data in the storage space corresponding to the second operating system, and after receiving the access instruction for accessing the target data in the second operating system, the terminal can access the target data only by sending the first data to the first operating system, so that the requirement of data transfer between the two operating systems on the transmission bandwidth is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of a data access method disclosed in an embodiment of the present invention;
FIG. 2 is a flow chart of another data access method disclosed in the embodiment of the invention;
fig. 3 is a schematic structural diagram of a terminal disclosed in the embodiment of the present invention;
fig. 4 is a schematic structural diagram of another terminal disclosed in the embodiment of the present invention;
fig. 5 is a schematic structural diagram of another terminal disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first" and "second," and the like in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In the embodiment of the present invention, the user terminal may include, but is not limited to, various user terminals such as a smart phone, a notebook Computer, a Personal Computer (PC), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), and an intelligent wearable Device (e.g., a smart watch and a smart bracelet). The operating system of the user terminal may include, but is not limited to, an Android operating system, an IOS operating system, a Symbian operating system, a Black Berry operating system, a Windows Phone8 operating system, and the like.
The embodiment of the invention discloses a data access method and a terminal, which can improve the security of data. The following are detailed below.
Referring to fig. 1, fig. 1 is a schematic flow chart of a data access method according to an embodiment of the present invention. As shown in fig. 1, the method may include the following steps.
101. The terminal receives an access instruction for accessing the target data in the second operating system.
In the embodiment of the invention, the terminal comprises at least one first operating system and at least one second operating system. Optionally, the first operating system may be a common operating system, the second operating system may be a secure operating system, the security of the common operating system is lower than that of the secure operating system, third-party applications, such as application programs APP, may be installed arbitrarily under the common operating system, a user may experience rich functions of the third-party applications under the common operating system, all applications under the secure operating system are applications developed in a customized manner, and installation of any third-party applications under the secure operating system is not allowed. The secure operating system may be an operating system that meets the security level of class B or above in the american Trusted Computer Systems Evaluation Criteria (TCSEC). The security level is referenced in the following table:
the first operating system in step 101 may be any one of the first operating systems of the terminal, and the second operating system in step 101 may be any one of the second operating systems of the terminal. And the storage spaces corresponding to the first operating system and the second operating system are different.
The target data may include one or a combination of more of picture data, text data, video data, or voice data, and the embodiments of the present invention are not limited thereto.
The first data is stored in the storage space corresponding to the second operating system, the second data is stored in the storage space corresponding to the first operating system, and the target data is accessed depending on the first data.
Alternatively, a part of the data may be extracted from the target data as the first data, and the remaining data of the target data other than the first data may be determined as the second data.
Alternatively, the associated information of the target data may be used as the first data, and the target data may be used as the second data, wherein the associated information includes, but is not limited to, a key, an encoding format, a special program for file access, and the like.
Wherein the accessing of the target data may be dependent on the first data being such that the target data cannot be accessed without the first data. If the first data is the associated information, when the target data is accessed, the associated information is needed to be used for analyzing the target data, and the target data can be accessed; if the first data is a part of the target data, the terminal can read the second data from the storage space corresponding to the first operating system under the second operating system, the terminal cannot read the first data from the storage space corresponding to the second operating system under the first operating system, the second data cannot be accessed under the condition of lacking the first data, and the terminal needs to combine the first data and the second data to obtain the target data before accessing the target data.
For example, assuming that the target data is encrypted, the first data is the associated information, which may be a key used for encryption, and if the user wants to access the encrypted target data, the encrypted target data must be decrypted by using the key, and the target data cannot be accessed after the decryption.
For another example, assuming that the target data is audio data, the audio data is split into first data and second data, the first data is the first 100 data of the audio data, the remaining data is the second data, the first data is stored in the storage space corresponding to the second operating system, and the second data is stored in the storage space corresponding to the first operating system. Second data in the absence of the first data, the terminal cannot access the second data under the first operating system, i.e., the terminal cannot access the audio data under the first operating system, the access of the audio data being dependent on the first data.
102. The terminal sends the first data to the first operating system so as to process the second data in the first operating system according to the first data to obtain target data.
In the embodiment of the present invention, the storage space corresponding to the first operating system stores the second data, and since the access of the target data depends on the first data, the terminal needs to send the first data to the first operating system, so that the second data is processed in the first operating system according to the first data to obtain the target data.
Optionally, the method for processing, by the terminal, the second data in the first operating system according to the first data to obtain the target data may specifically be:
11) the terminal acquires relative position information stored in a storage space corresponding to a second operating system, wherein the relative position information is the relative position information of the first data and the second data in the target data;
12) the terminal reads the first part of data from the storage space corresponding to the second operating system and reads the second part of data from the storage space corresponding to the first operating system under the second operating system;
13) and the terminal combines the first part of data and the second part of data according to the recorded relative position information under a second operating system to obtain target data.
In this optional embodiment, after splitting the target data into the first data and the second data in the first operating system in advance, the terminal obtains the relative position information of the first data and the second data in the target data in the first operating system in advance, and sends the relative position information to the storage space corresponding to the second operating system for storage.
In this embodiment, when the first operating system is a normal operating system and the second operating system is a secure operating system, the terminal may read the first data from the storage space corresponding to the second operating system, read the second data from the storage space corresponding to the first operating system, and combine the first data and the second data according to the relative location information stored in the storage space corresponding to the second operating system to obtain the target data.
For example, a user records a call under a first operating system, and obtains a recording file, since the recording content of the recording file in the last 5 minutes relates to user privacy, the terminal may extract the recording content of the last 5 minutes from the recording file as first data, and determine all data remaining in the recording file except the first data as second data, the terminal transmits the first data and relative position information of the first data and the second data in the recording file (the relative position information may be that the first data is located after the second data in target data) to a storage space corresponding to a second operating system for storage, and directly stores the second data in the storage space corresponding to the first operating system. If the user wants to check the audio file, the user can input an acquisition instruction for acquiring the audio file when the terminal is under the second operating system, the terminal reads the first data under the second operating system, reads the second data from the storage space corresponding to the first operating system, and adds the first data to the second data according to the relative position information of the first data and the second data to obtain the complete audio file.
Optionally, the relative position information of the first data and the second data in the target data may not be stored in the storage space corresponding to the first operating system; the terminal can directly write the relative position information into a specific position of the first data, and then send the first data to a storage space corresponding to the second operating system for storage. After the terminal reads the first data from the storage space corresponding to the second operating system, the terminal extracts the relative position information in the first data and combines the first data and the second data according to the relative position information.
It can be seen that by implementing this embodiment, when the user wants to access the target data, the terminal may restore the target data under the second operating system.
Optionally, the method for processing, by the terminal, the second data in the first operating system according to the first data to obtain the target data may specifically be:
21) the terminal acquires first data stored in a storage space corresponding to a second operating system;
22) and the terminal analyzes the second data by using the first data to obtain target data.
In this alternative embodiment, the first data is associated with the target data, and the target data is accessed in dependence on the first data. When the terminal needs to access the target data, the terminal must use the associated information to analyze the second data to obtain the target data.
For example: if the target data is an encrypted file, the associated information may be password information of the encrypted file, and if the user wants to view the encrypted file, the user must decrypt the encrypted file using the password information, and the user can view the file after decryption.
Therefore, the implementation of the embodiment can improve the security of the terminal data.
103. The terminal outputs the target data.
In the embodiment of the invention, the terminal outputs the target data in the first operating system. Specifically, the terminal may display the target data (e.g., display a video) in the first operating system, or the terminal may transmit the target data (e.g., play audio) to another external device (e.g., a speaker) via the first operating system.
In the method flow described in fig. 1, the terminal stores the second data in the storage space corresponding to the first operating system and stores the first data in the storage space corresponding to the second operating system, and after receiving the access instruction for accessing the target data in the second operating system, the terminal can access the target data only by sending the first data to the first operating system, thereby reducing the requirement of data transfer between the dual operating systems on the transmission bandwidth.
Referring to fig. 2, fig. 2 is a schematic flow chart of another data access method according to the embodiment of the present invention. As shown in fig. 2, the method may include the following steps.
201. The terminal receives an access instruction for accessing the target data in the second operating system.
202. And the terminal sends a running safety environment instruction to the first operating system through the second operating system.
Wherein the run safe environment instruction is to indicate a run safe environment.
In the embodiment of the invention, the system application of the operating system (such as an Android system) of the terminal is developed by a device manufacturer or is built in the system after being subjected to security detection, so that the data security risk of a general terminal mainly comes from third-party application downloaded by a user.
In the embodiment of the invention, the target data is accessed depending on the first data, when the target data needs to be accessed, since the first data and the target data are generally stored in a specific area in a memory (RAM) or an internal storage space (ROM), to protect the security of the data, firstly, security protection on an operating environment is required, that is, no running insecure processes (processes started by some malicious third-party applications) should exist, and the insecure processes may try to read the secure data stored in the specific area of the RAM or the ROM, so that the secure data is leaked, therefore, after the terminal receives an access instruction for accessing the target data in the second operating system, the terminal needs to send an operating secure environment instruction to the first operating system through the second operating system, wherein the operating secure environment instruction is used for instructing to operate a secure environment.
203. The terminal runs a secure environment in a first operating system.
In the embodiment of the invention, after the terminal receives the instruction for operating the security environment from the first operating system, the terminal can operate the security environment in the first operating system.
Specifically, the terminal running a secure environment in the first operating system includes the following steps:
11) receiving a running secure environment instruction at a first operating system;
12) all non-system processes under the first operating system are shut down in response to running the secure environment instruction.
In this optional implementation, when the terminal receives the operation security environment instruction, the terminal may close all non-system processes under the first operating system, including clearing task data (mainly ACTIVITY) of the non-system applications in the memory, clearing services in the non-system applications in the memory, and the like.
Optionally, after the first operating system receives the instruction to run the secure environment, and before all non-system processes under the first operating system are closed, the method further includes the following steps:
21) outputting confirmation information for prompting whether to enter a safe environment;
22) a confirmation instruction for confirming information input is received.
In this optional implementation, after the first operating system receives the instruction to run the secure environment, it is necessary to output confirmation information for prompting whether to enter the secure environment to the user, and if a confirmation instruction input by the user for the confirmation information is received, the terminal closes all non-system processes under the first operating system, so that the user experience can be improved.
204. The terminal sends the first data to the first operating system so as to process the second data in the first operating system according to the first data to obtain target data.
205. The terminal outputs the target data.
Specifically, the method for the terminal to output the target data specifically includes the following steps:
31) sending application data to the first operating system via the second operating system;
32) the application data is run at the first operating system to output the target data in the first operating system.
In this optional implementation, in order to avoid data leakage after the data access is finished, the data of the first data and the target data in the RAM and the ROM corresponding to the first operating system are also cleared, which needs the second operating system to send the application program to the first operating system.
In most cases, a user's access to a file requires a specific application program, such as DOC document, XLS document, JPG document, MP3 document, RMVB document, etc., and accordingly requires the use of OFFICE application, picture viewing application, audio playing application, video playing application to convert the data in the file into a state that can interact with the user, such as display in a screen, play through a speaker, etc.
After sending the instruction for running the secure environment to the first operating system and confirming that the first operating system is already in the secure environment, the second operating system sends an installation package of the application program (or object program data containing the executable program, including the executable program itself and library files, resource files and other data files, etc. on which the application program runs) capable of opening object data to the first operating system. The application program is a special application program and can only be provided through the second operating system, and the first operating system cannot obtain the application program through other channels.
Wherein, the application program mainly executes the following functions:
1. determining the security environment of the first operating system, when the first operating system is not in the security environment, not executing the task of opening the target data, and destroying the first operating system after sending a prompt;
2. if the first operating system is confirmed to be in the safe environment, opening target data and outputting a task;
3. and after the target data is accessed (manually by a user or the task is automatically ended), deleting the first data and the target data under the first operating system and destroying the first data and the target data.
In the method flow described in fig. 2, after receiving the access instruction for accessing the target data in the second operating system, the terminal needs to run the secure environment in the first operating system, and then the terminal sends the first data to the first operating system, so that the terminal can access the target data, which not only reduces the requirement of data transfer between the dual operating systems on the transmission bandwidth, but also improves the security of data access.
Please refer to fig. 3, and fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention, where the terminal is installed with a first operating system and a second operating system, and the terminal is configured to execute part or all of the steps in the data access method described in fig. 1 or fig. 2, and please refer to the description of fig. 1 or fig. 2 specifically, which is not described again here. As shown in fig. 3, the terminal 300 may include:
a receiving unit 301, configured to receive, in a second operating system, an access instruction for accessing target data, where first data is stored in a storage space corresponding to the second operating system, and access of the target data depends on the first data;
a sending unit 302, configured to send the first data to the first operating system, so as to process, in the first operating system, second data according to the first data, so as to obtain the target data, where the second data is data stored in a storage space corresponding to the first operating system;
an output unit 303, configured to output the target data.
Please refer to fig. 4, and fig. 4 is a schematic structural diagram of another terminal disclosed in the embodiments of the present invention, wherein the terminal is configured to perform part or all of the steps in the data access method described in fig. 1 or fig. 2, and please refer to the description of fig. 1 or fig. 2 for details, which are not repeated herein. The terminal shown in fig. 4 is further optimized on the basis of the terminal shown in fig. 3, and compared with the terminal shown in fig. 3, the terminal shown in fig. 4 comprises all the elements of the terminal shown in fig. 3,
the sending unit 302 is further configured to send, after the receiving unit 301 receives an access instruction for accessing target data in a second operating system, a running secure environment instruction to the first operating system via the second operating system, where the running secure environment instruction is used to instruct to run a secure environment;
the terminal 300 shown in fig. 4 further includes:
an execution unit 304, configured to execute a secure environment on the first operating system.
Optionally, the operation unit 304 includes:
a first receiving subunit 3041, configured to receive, at the first operating system, the running security environment instruction;
a closing subunit 3042, configured to close all non-system processes under the first operating system, so as to respond to the running security environment instruction.
Optionally, the operation unit 304 further includes:
an output subunit 3043, configured to output confirmation information used to prompt whether to enter a secure environment after the first receiving subunit 3041 receives the instruction to run the secure environment by the first operating system, and before the closing subunit 3042 closes all non-system processes under the first operating system to respond to the instruction to run the secure environment;
a second receiving subunit 3044, configured to receive a confirmation instruction for the confirmation information input.
Optionally, the manner of outputting the target data by the output unit 303 is specifically:
sending application data to the first operating system via the second operating system;
and running the application program data in the first operating system so as to output the target data in the first operating system.
In the terminal 300 described in fig. 3 or fig. 4, the terminal stores the second data in the storage space corresponding to the first operating system and stores the first data in the storage space corresponding to the second operating system, and after receiving the access instruction for accessing the target data in the second operating system, the terminal only needs to send the first data to the first operating system to access the target data, thereby reducing the requirement of data transfer between the dual operating systems on the transmission bandwidth.
Referring to fig. 5, fig. 5 is a schematic structural diagram of another terminal disclosed in the embodiment of the present invention, wherein the terminal is configured to execute part or all of the steps in the data access method described in fig. 1 or fig. 2, and specific reference is made to the description of fig. 1 or fig. 2, which is not repeated herein.
As shown in fig. 5, the terminal may include: at least one processor 501, such as a CPU, at least two memories 502, at least one input device 503, at least one output device 504. The memory 502 may be a high-speed RAM memory or a non-volatile memory (e.g., at least one disk memory). The memory 502 may optionally be at least one storage device located remotely from the processor 501. The input device 503 may be a touch screen, a keyboard, a mouse, or the like.
The processor 501 may be combined with the terminal described in fig. 3 or fig. 4, a set of program codes is stored in the memory 502 corresponding to the second operating system, and the processor 501 calls the program codes stored in the memory 502 corresponding to the second operating system to perform the following operations:
receiving, in a second operating system through an input device 503, an access instruction for accessing target data, where first data is stored in a storage space corresponding to the second operating system, and the target data is accessed in dependence on the first data;
sending the first data to the first operating system through an output device 504, so as to process second data in the first operating system according to the first data, so as to obtain the target data, where the second data is data stored in a storage space corresponding to the first operating system;
the target data is output through an output device 504.
Optionally, after receiving, by the processor 501, an access instruction for accessing target data through the input device 503 in the second operating system and before sending the first data to the first operating system through the output device 504, the processor 501 further calls a program code stored in the memory 502 corresponding to the second operating system, so as to perform the following operations:
sending, by an output device 504, a run secure environment instruction to the first operating system via the second operating system, the run secure environment instruction being indicative of a run secure environment;
a secure environment is run on the first operating system.
Optionally, the running, by the processor 501, of the secure environment in the first operating system includes:
receiving the run secure environment instruction at the first operating system via an input device 503;
and closing all non-system processes under the first operating system to respond to the running security environment instruction.
Optionally, after the processor 501 receives an instruction to run the secure environment from the first operating system through the input device 503 and before the shutdown of all non-system processes under the first operating system, the method further includes:
outputting confirmation information for prompting whether to enter the secure environment through the output device 504;
a confirmation instruction for the confirmation information input is received through the input device 503.
Optionally, the outputting, by the processor 501 through the output device 504, the target data includes:
sending application data to the first operating system via the second operating system through output device 504;
and running the application program data in the first operating system so as to output the target data in the first operating system.
In the embodiment described in fig. 5, the terminal stores the second data in the storage space corresponding to the first operating system and stores the first data in the storage space corresponding to the second operating system, and after receiving the access instruction for accessing the target data in the second operating system, the terminal only needs to send the first data to the first operating system to access the target data, thereby reducing the requirement of data transfer between the dual operating systems on the transmission bandwidth.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a memory and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above embodiments of the present invention are described in detail, and the principle and the implementation of the present invention are explained by applying specific embodiments, and the above description of the embodiments is only used to help understanding the method of the present invention and the core idea thereof; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in view of the above, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A data access method applied to a terminal in which a first operating system and a second operating system are installed, the method comprising:
receiving an access instruction for accessing target data in a second operating system, wherein first data is stored in a storage space corresponding to the second operating system, and the target data is accessed according to the first data;
sending the first data to the first operating system;
acquiring relative position information stored in a storage space of the second operating system, wherein the relative position information comprises relative positions of the first data and second data in the target data, the second data is data stored in the storage space corresponding to the first operating system, and the first data and the second data form the target data;
reading the first data from the storage space of the second operating system, and reading the second data from the storage space of the first operating system according to the first data;
combining the first data and the second data in the second operating system according to the relative position information to obtain the target data;
and outputting the target data.
2. The method of claim 1, wherein after receiving an access instruction in the second operating system for accessing the target data and before sending the first data to the first operating system, the method further comprises:
sending a running safe environment instruction to the first operating system through the second operating system, wherein the running safe environment instruction is used for indicating a running safe environment;
a secure environment is run on the first operating system.
3. The method of claim 2, wherein said running a secure environment on said first operating system comprises:
receiving the run secure environment instruction at the first operating system;
and closing all non-system processes under the first operating system to respond to the running security environment instruction.
4. The method of claim 3, wherein after receiving a run secure environment instruction by the first operating system and before the shutting down all non-system processes under the first operating system, the method further comprises:
outputting confirmation information for prompting whether to enter a safe environment;
receiving a confirmation instruction input aiming at the confirmation information.
5. The method according to any one of claims 1 to 4, wherein the outputting the target data comprises:
sending application data to the first operating system via the second operating system;
and running the application program data in the first operating system so as to output the target data in the first operating system.
6. A terminal, wherein the terminal is installed with a first operating system and a second operating system, the terminal comprising:
the data access method comprises a receiving unit, a processing unit and a processing unit, wherein the receiving unit is used for receiving an access instruction for accessing target data in a second operating system, first data are stored in a storage space corresponding to the second operating system, and the target data are accessed according to the first data;
a sending unit, configured to send the first data to the first operating system;
a location obtaining unit, configured to obtain relative location information stored in a storage space of the second operating system, where the relative location information includes a relative location of the first data and second data in the target data, the second data is data stored in a storage space corresponding to the first operating system, and the first data and the second data constitute the target data;
a reading unit, configured to read the first data from the storage space of the second operating system, and read the second data from the storage space of the first operating system according to the first data;
a combination unit, configured to combine the first data and the second data in the second operating system according to the relative position information to obtain the target data;
an output unit for outputting the target data.
7. The terminal according to claim 6, wherein the sending unit is further configured to send, after the receiving unit receives an access instruction for accessing target data in a second operating system, a run secure environment instruction to the first operating system via the second operating system, where the run secure environment instruction is used to instruct to run a secure environment;
the terminal further comprises:
and the running unit is used for running a safety environment in the first operating system.
8. The terminal according to claim 7, wherein the operation unit comprises:
a first receiving subunit, configured to receive, at the first operating system, the run secure environment instruction;
and the closing subunit is used for closing all non-system processes under the first operating system so as to respond to the running security environment instruction.
9. The terminal of claim 8, wherein the execution unit further comprises:
an output subunit, configured to output confirmation information for prompting whether to enter a secure environment after the receiving subunit receives the instruction to run the secure environment at the first operating system and before the shutdown subunit shuts down all non-system processes under the first operating system in response to the instruction to run the secure environment;
and the second receiving subunit is used for receiving a confirmation instruction input aiming at the confirmation information.
10. The terminal according to any one of claims 6 to 9, wherein the output unit outputs the target data in a manner including:
sending application data to the first operating system via the second operating system;
and running the application program data in the first operating system so as to output the target data in the first operating system.
CN201610694008.1A 2016-04-28 2016-08-19 Data access method and terminal Active CN106326018B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/098443 WO2017185582A1 (en) 2016-04-28 2016-09-08 Data processing method, accessing method, and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2016102736358 2016-04-28
CN201610273635 2016-04-28

Publications (2)

Publication Number Publication Date
CN106326018A CN106326018A (en) 2017-01-11
CN106326018B true CN106326018B (en) 2020-01-10

Family

ID=57743914

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610694008.1A Active CN106326018B (en) 2016-04-28 2016-08-19 Data access method and terminal
CN201610696406.7A Withdrawn CN106372527A (en) 2016-04-28 2016-08-19 Data processing method and terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201610696406.7A Withdrawn CN106372527A (en) 2016-04-28 2016-08-19 Data processing method and terminal

Country Status (2)

Country Link
CN (2) CN106326018B (en)
WO (1) WO2017185582A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109491725B (en) * 2018-11-12 2022-12-27 火烈鸟网络(广州)股份有限公司 Interactive multi-opening method and system of application program, storage medium and electronic equipment
CN109857385B (en) * 2018-12-24 2022-01-28 四川长虹电器股份有限公司 Application program file packaging method, installation method and starting method
JP7200922B2 (en) * 2019-12-25 2023-01-10 トヨタ自動車株式会社 vehicle
CN113542483B (en) * 2020-03-30 2022-03-18 Oppo广东移动通信有限公司 Data transmission method and device, wearable device and storage medium
CN114138343A (en) * 2020-09-04 2022-03-04 青岛海信移动通信技术股份有限公司 Terminal and terminal starting method
CN115344226B (en) * 2022-10-20 2023-03-24 亿咖通(北京)科技有限公司 Screen projection method, device, equipment and medium under virtualization management

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981887A (en) * 2011-09-06 2013-03-20 联想(北京)有限公司 Data processing method and electronic device
CN103942503A (en) * 2014-04-28 2014-07-23 上海新储集成电路有限公司 Safe state switching system and switching method
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Safety system and safety storage method of intelligent terminal

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1258724C (en) * 2002-08-23 2006-06-07 英业达股份有限公司 Update backup system for homogeneous double-system data conversion and its method
US20070266444A1 (en) * 2004-12-03 2007-11-15 Moshe Segal Method and System for Securing Data Stored in a Storage Device
JP4631974B2 (en) * 2009-01-08 2011-02-16 ソニー株式会社 Information processing apparatus, information processing method, program, and information processing system
US8295882B2 (en) * 2010-10-18 2012-10-23 At&T Intellectual Property I, Lp Systems, methods, and computer program products for managing access to femtocell coverage
US8468362B2 (en) * 2011-06-03 2013-06-18 Dell Products, Lp System and method for providing access to an information handling system
CN104468611B (en) * 2014-12-24 2017-09-08 宇龙计算机通信科技(深圳)有限公司 The data safety processing method and device switched based on dual system
CN105279455A (en) * 2015-09-23 2016-01-27 深圳市全智达科技有限公司 Security architecture of mobile device and running method of application

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102981887A (en) * 2011-09-06 2013-03-20 联想(北京)有限公司 Data processing method and electronic device
CN104091135A (en) * 2014-02-24 2014-10-08 电子科技大学 Safety system and safety storage method of intelligent terminal
CN103942503A (en) * 2014-04-28 2014-07-23 上海新储集成电路有限公司 Safe state switching system and switching method

Also Published As

Publication number Publication date
CN106372527A (en) 2017-02-01
CN106326018A (en) 2017-01-11
WO2017185582A1 (en) 2017-11-02

Similar Documents

Publication Publication Date Title
CN106326018B (en) Data access method and terminal
US9813393B2 (en) System and method for client-side analytic data collection
US20140359286A1 (en) Contact management method, apparatus and system for third-party application
CN107786331B (en) Data processing method, device, system and computer readable storage medium
CN112287372B (en) Method and apparatus for protecting clipboard privacy
US9911009B2 (en) Device and method for providing safety of data by using multiple modes in device
CN104125547A (en) Short message processing method and device
US10552132B2 (en) Binary merging device, method, and computer program
WO2014190716A1 (en) Contact management method, apparatus and system for third-party application
CN111163095A (en) Network attack analysis method, network attack analysis device, computing device, and medium
US9258318B2 (en) Systems and methods for informing users about applications available for download
Park et al. A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system
US20210226905A1 (en) Information sharing method, device and non-transitory computer readable storage medium thereof
CN113127844A (en) Variable access method, device, system, equipment and medium
KR102368208B1 (en) File leakage prevention based on security file system and commonly used file access interface
WO2016188079A1 (en) Data storage method for terminal device and terminal device
WO2020103060A1 (en) Data processing method and apparatus, system, server, and electronic device
CN107463808B (en) Method for calling functional module integrated in operating system
CN115277670A (en) Network connection control method and device of target application and electronic equipment
CN110516468B (en) Method and device for encrypting memory snapshot of virtual machine
CN110618967B (en) Application program running method, installation package generating method, device, equipment and medium
WO2016184213A1 (en) Method and apparatus for improving access security of wireless network and mobile terminal
KR102052651B1 (en) Method for controlling access to data and an electronic device thereof
US20180181727A1 (en) Electronic device, method for controlling thereof and computer-readable recording medium
CN111125742A (en) File management method, intelligent terminal and device with storage function

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20210224

Address after: 518057 Desai Science and Technology Building, 9789 Shennan Avenue, Yuehai Street, Nanshan District, Shenzhen City, Guangdong Province, 17th Floor (15th Floor of Natural Floor) 1702-1703

Patentee after: Shenzhen Microphone Holdings Co.,Ltd.

Address before: 518040 21 floor, east block, Times Technology Building, 7028 Shennan Road, Futian District, Shenzhen, Guangdong.

Patentee before: DONGGUAN GOLDEX COMMUNICATION TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right