WO2015014015A1 - Terminal - Google Patents

Terminal Download PDF

Info

Publication number
WO2015014015A1
WO2015014015A1 PCT/CN2013/084356 CN2013084356W WO2015014015A1 WO 2015014015 A1 WO2015014015 A1 WO 2015014015A1 CN 2013084356 W CN2013084356 W CN 2013084356W WO 2015014015 A1 WO2015014015 A1 WO 2015014015A1
Authority
WO
WIPO (PCT)
Prior art keywords
processor
data
terminal
monitoring module
external device
Prior art date
Application number
PCT/CN2013/084356
Other languages
French (fr)
Chinese (zh)
Inventor
祝芳浩
刘东海
袁刚
丁兆刚
冯耀辉
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201310326690.5A external-priority patent/CN103369148B/en
Priority claimed from CN201310325472XA external-priority patent/CN103402013A/en
Priority claimed from CN2013103270277A external-priority patent/CN103391190A/en
Priority claimed from CN201310326703.9A external-priority patent/CN103390138B/en
Priority claimed from CN201310326660.4A external-priority patent/CN103400086B/en
Priority claimed from CN2013103267221A external-priority patent/CN103391189A/en
Priority claimed from CN201310325602.XA external-priority patent/CN103402014B/en
Priority claimed from CN201310325579.4A external-priority patent/CN103400084B/en
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2015014015A1 publication Critical patent/WO2015014015A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Definitions

  • the present invention relates to the field of data security technologies, and in particular, to a terminal. Background technique
  • the processor can receive data from any external device 102; at the same time, any setting in the terminal
  • the communication module can interact with the CPU to exchange data such as voice service and data service.
  • the invention is based on the above problems, and proposes a new technical solution, which can make different types of data in the terminal be processed by different processors, and the data input to the processor can be accurately input by type identification.
  • the first processor or the second processor data crossover is avoided, and the security of the terminal is effectively improved.
  • the present invention provides a terminal, including: a first processor and a second processor, configured to separately process different types of data in the terminal; a peripheral monitoring module, connected to an external device of the terminal And performing type determination on data from an external device of the terminal, and determining to transmit data to the first processor or the second processor according to the determination result.
  • the identification and classification of data from external devices by setting up a dedicated peripheral monitoring module not only helps speed up processing, but also improves data security through data classification.
  • peripheral monitoring module transmits the classified data to the first processor or the second processor; in another case, A peripheral monitoring module is separately configured for each external device, and each of the peripheral monitoring modules transmits the classified data to the first processor or the second Processor.
  • the peripheral monitoring module is further configured to: directly transmit data to the first channel if there is a path between the first processor or the second processor a processor or the second processor, adding an identifier to data that needs to be transmitted to the second processor to be used by the first process if there is only a path between the first processor and the first processor Forwarding to the second processor, adding an identifier to data that needs to be transmitted to the first processor to be used by the second processor in the case where there is only a path between the second processor Forwarded to the first processor.
  • the peripheral monitoring module may have a connection path with the first processor or the second processor, and then the data interaction may be directly performed; or may be only related to the first processor or the second processor.
  • a path with a connection can be forwarded by the connected processor to the remaining processors.
  • the peripheral monitoring module is connected to the first processor.
  • the port connected to the peripheral monitoring module and the port connected to the second processor may be connected by the first processor.
  • the peripheral monitoring module directly uses the data transmission channel to transmit data to the second processor; in another case, the first processor establishes a DMA transmission channel by configuring the port The DMA transmission channel is directly used by the peripheral monitoring module to transmit data to the second processor in a manner of calling the bus of the first processor.
  • the method further includes: a restricted external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is connected to the first processor;
  • the peripheral monitoring module performs type determination on data from the restricted external device, directly transmits data corresponding to the first processor to the first processor, and needs to transmit to the first
  • the data of the second processor adds an identification to be forwarded by the first processor to the second processor.
  • the external device is restricted from accessing the data, and the data with high importance and high degree of privacy is more. Therefore, after the type identification of the data of the restricted external device is performed, only the first processor is still connected. Enables the first processor to further view and monitor all data, which helps to improve the security of the terminal; or restricts the external device to interact with the first processor more frequently, thus by directly putting all the data directly.
  • the transmission to the first processor enables the first processor to acquire the required data more quickly, which helps to improve data processing efficiency.
  • the method further includes: an unrestricted external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is connected to the second processor;
  • the peripheral monitoring module performs type determination on data from the non-restricted external device, and directly transmits data corresponding to the second processor to the second processor, and needs to transmit to the
  • the data of the first processor adds an identification to be forwarded by the second processor to the first processor.
  • the data that is accessed by the non-restricted external device has less importance, less privacy data, or more frequent data exchange with the second processor, so that all data is directly transmitted.
  • the second processor enables the second processor to acquire the required data more quickly, which helps to improve data processing efficiency.
  • the method further includes: a shared external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is simultaneously connected to the first processor And the second processor; wherein the peripheral monitoring module performs type determination on data from the shared external device, and transmits data to the first processor or the second processing according to the determination result Device.
  • the amount of various types of data touched by the shared external device is similar, and the frequency of interaction with the first processor and the second processor is also similar, so that various types of data can be directly transmitted to the first processor and The second processor facilitates the orderly execution of data processing and data interaction.
  • the first processor is configured to process private data in the terminal
  • the second processor is configured to process non-private data in the terminal.
  • the terminal there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor.
  • the data types are adjusted and changed.
  • the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
  • the peripheral monitoring module is further configured to: determine that data of an external device from the terminal corresponds to a protected application or an unprotected application, where the determining corresponds to the receiving The data of the protection application is private data, and the data corresponding to the unprotected application is non-private data.
  • the present invention also provides a terminal, including: a first processor and a second processor, configured to separately process different types of data in the terminal; a communication monitoring module, a communication module connected to the terminal, configured to The data from the communication module of the terminal performs type determination, and determines to transmit data to the first processor or the second processor according to the determination result.
  • the data from the external device can be identified and classified, which not only helps speed up the processing, but also improves data security through data classification.
  • all communication modules can be connected to the communication monitoring module, and then the classified monitoring data can be transmitted to the first processor or the second processor by the communication monitoring module; in another case, each can be The communication modules are separately configured with a communication monitoring module, and each of the communication monitoring modules transmits the classified data to the first processor or the second processor.
  • the communication monitoring module is further configured to: directly transmit data to the first channel if there is a path between the first processor or the second processor a processor or the second processor; adding an identification to data that needs to be transmitted to the second processor to be used by the first processor in the presence of a path only between the first processor Forwarding to the second processor; in only with the second Where there is a path between the processors, an identification is added to the data that needs to be transmitted to the first processor for forwarding by the second processor to the first processor.
  • the communication monitoring module may have a connection path with the first processor or the second processor, and may directly perform data interaction; or may only be associated with one of the first processor or the second processor. If there is a connected path, the remaining processors can perform data forwarding to the remaining processors.
  • the communication monitoring module is connected to the first processor.
  • the port connected to the communication monitoring module and the port connected to the second processor may be connected by the first processor.
  • the first processor establishes a DMA transmission channel by configuring the port, The manner of calling the bus of the first processor is directly used by the communication monitoring module to transmit the data to the second processor.
  • the method further includes: a restriction type communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is connected to the first processor;
  • the communication monitoring module performs type determination on data from the restricted communication module, directly transmits data corresponding to the first processor to the first processor, and needs to transmit to the second processor Data is added to the identifier for forwarding by the first processor to the second processor.
  • the restricted communication module contacts the data, and the data with high importance and high degree of privacy is more. Therefore, after the type identification of the data of the restricted communication module is performed, only the first processor is still connected.
  • the first processor enables further viewing and monitoring of all data, which helps to improve the security of the terminal; or, the restricted communication module can be more interactive with the first processor than the other communication module. High, so by transferring all data directly to the first processor, enabling the first processor to acquire the required data faster, helps to improve data processing efficiency.
  • the method further includes: an unrestricted communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is connected to the second processor;
  • the communication monitoring module performs type determination on data from the unrestricted communication module, and directly transmits data corresponding to the second processor to the second processor, and needs to transmit to the first
  • the data of the processor is added with an identification to be forwarded by the second processor to the first processor.
  • the non-restricted communication module contacts the data, has less importance, has less privacy data, or has a higher frequency of data interaction with the second processor, so that all data is directly transmitted.
  • the second processor enables the second processor to acquire the required data more quickly, which helps to improve data processing efficiency.
  • the method further includes: a shared communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is simultaneously connected to the first processor and the a second processor; wherein the communication monitoring module performs type determination on data from the shared communication module And transmitting data to the first processor or the second processor according to the judgment result.
  • the number of types of data touched by the shared communication module is similar, and the frequency of interaction with the first processor and the second processor is similar, so that various types of data can be directly transmitted to the first processor and The second processor facilitates the orderly execution of data processing and data interaction.
  • the first processor is configured to process private data in the terminal
  • the second processor is configured to process non-private data in the terminal.
  • the terminal there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor.
  • the data types are adjusted and changed.
  • the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
  • the communication monitoring module is further configured to: determine that data of the communication module from the terminal corresponds to a protected application or an unprotected application, where the determination corresponds to the The data of the protected application is private data, and the data corresponding to the unprotected application is non-private data.
  • the present invention also provides a terminal, including: a first processor and a second processor, configured to separately process different types of data in the terminal; wherein, the first processor is further configured to: The data of the at least one external device and/or the at least one communication module is type-determined, and according to the determination result, it is determined that the received data is processed by itself or transmitted to the second processor.
  • the identification and classification of data from external devices and/or communication modules by the first processor directly helps to reduce the improvement of the existing structure of the terminal and reduce the complexity of the terminal structure.
  • the technical solution may be specifically applied to an external device and/or a communication module connected only to the first processor, or to an external device and/or a communication module that are simultaneously connected to the first processor and the second processor. .
  • the method further includes: a restriction-type external device connected only to the first processor; and an unrestricted external device connected to only the second processor; wherein, the first processing Directly receiving data from the restricted type external device, and receiving data from the non-restricted external device directly forwarded by the second processor, and according to the external device from the restricted class or the unrestricted
  • the type determination of the data of the external device of the class it is determined that the received data is processed by itself or transmitted to the second processor.
  • type identification is performed on all data of the restricted class external device and the non-restricted class external device by the first processor, so that the first processor can view all the data, especially when the first process is performed.
  • the first processor is a "secure processor" relative to the second processor, thereby helping to avoid erroneous transmission of data and preventing malicious applications from passing through the first
  • the second processor steals important, private data.
  • the second processor is further configured to: at least one from the connection The data of the external device and/or the at least one communication module is type-determined, and according to the determination result, it is determined that the received data is processed by itself or transmitted to the first processor.
  • the data from the external device and/or the communication module is directly identified and classified by the second processor, which helps to reduce the improvement of the existing structure of the terminal and reduce the complexity of the terminal structure.
  • the technical solution may be specifically applied to an external device and/or a communication module connected only to the second processor, or to an external device and/or a communication module that are simultaneously connected to the first processor and the second processor. .
  • the method further includes: a restricted external device connected only to the first processor; and an unrestricted external device connected only to the second processor; a processor receives data from the restricted external device, and determines to process the received data by itself or transmits the data to the second processor according to a result of type determination of the received data; The second processor receives data from the non-restricted external device and determines to process the received data by itself or transmit the data to the first processor according to a result of type determination of the received data.
  • the external device is restricted from accessing the data, the data with high importance and high degree of privacy is more, or the external device is restricted to interact with the first processor more frequently; the non-restricted external device is exposed to the device.
  • the first processor and the second processor respectively identify, distribute, and process data from the restricted external device and the non-restricted external device, thereby helping to avoid data security problems caused by data crossover. Helps improve the efficiency of data processing and enhance the user experience.
  • the first processor is configured to process private data in the terminal
  • the second processor is configured to process non-private data in the terminal.
  • the terminal there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor.
  • the data types are adjusted and changed.
  • the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
  • the private data is data corresponding to a protected application
  • the non-private data is data corresponding to an unprotected application
  • the present invention also provides a terminal, comprising: a first processor and a second processor, configured to separately process different types of data in the terminal; and a communication module, configured to perform data received from an external communication device Type determining, and determining to transmit data to the first processor or the second processor according to the result of the determination.
  • the communication module directly recognizes and classifies the data from the external device and/or the data received by itself, which helps to reduce the improvement of the existing structure of the terminal and reduce the complexity of the terminal structure.
  • the communication module is further configured to: directly transmit data to the first process if there is a path between the first processor or the second processor Or the second An identifier is added to data that needs to be transmitted to the second processor for forwarding to the second processor by the first processor in the case where there is only a path between the first processor and the first processor Adding an identification to data that needs to be transmitted to the first processor for forwarding to the first processor by the second processor in the case where there is a path only between the second processor .
  • the communication module may have a connection path with the first processor or the second processor, and the data interaction may be directly performed; or only one of the first processor or the second processor may exist.
  • the connected path can be forwarded by the connected processor to the remaining processors.
  • the communication module is connected to the first processor.
  • the port connected to the communication module and the port connected to the second processor may be configured by the first processor.
  • the first processor establishes a DMA transmission channel by configuring the port to invoke the first The way of the bus of the processor, the communication module directly uses the DMA transmission channel to transmit data to the second processor.
  • the first processor is configured to process private data in the terminal
  • the second processor is configured to process non-private data in the terminal.
  • the terminal there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor.
  • the data types are adjusted and changed.
  • the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
  • the communication module is further configured to: determine that data from the external communication device corresponds to a protected application or an unprotected application, where the determination corresponds to the protected application.
  • the data is private data, and the data corresponding to the unprotected application is non-private data.
  • the first processor and the second processor are not intended to limit the number of processors in the terminal to two, and it is apparent that the terminal can actually contain more processors.
  • “first” and “second” represent the relationship between any two processors in the terminal, and are used to distinguish any two processors that are compared.
  • processor 1 and processor 2 when processor 1 and processor 2 are selected for comparison, either one of processor 1 and processor 2 may be referred to as a "first processor” and the other is “ “Second processor”; and when processor 2 and processor 3 are selected for comparison, either processor 2 and processor 3 may be referred to as “first processor” and the other as “second processor” " , So on and so forth.
  • processors can be used to process the same type of data, and the multiple processors should be treated as one processor group, then the "first processor” and the "second processor". It is also possible to actually represent a processor group for processing the same type of data, each processor group containing one or more processors. At the same time, in order to correspond to more types of data, there may obviously be more processor groups in the terminal. Such as “third processor group”, “fourth processor group” and so on.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer-usable storage medium (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code.
  • a computer-usable storage medium including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • FIG. 1 is a schematic diagram showing a terminal architecture of a conventional single processor in the related art
  • FIG. 2 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of a terminal in a specific embodiment of the embodiment shown in FIG. 2;
  • FIG. 4 is a schematic structural diagram of a terminal in another specific embodiment of the embodiment shown in FIG.
  • FIG. 6 is a diagram showing a terminal structure for monitoring an external device or a communication module according to an embodiment of the present invention
  • FIG. 7 shows a terminal for monitoring an external device or a communication module according to another embodiment of the present invention. Schematic;
  • FIG. 8 is a block diagram showing the structure of a terminal according to another embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of a terminal in a specific embodiment of the embodiment shown in FIG. 8.
  • FIG. 10 is a schematic structural diagram of a terminal in another specific embodiment of the embodiment shown in FIG. detailed description
  • FIG. 2 shows a schematic diagram of a terminal structure according to an embodiment of the present invention.
  • a terminal includes: a first processor (CPU1 shown in FIG. 2) and a second processor (CPU2 shown in FIG. 2) for processing separately Different types of data in the terminal.
  • CPU1 shown in FIG. 2
  • CPU2 shown in FIG. 2
  • the type of data from the external device 102 of the terminal can be identified within the terminal.
  • a peripheral monitoring module 104, an external device 102 connected to the terminal, and/or a communication monitoring module 106 wherein: the peripheral monitoring module 104 is configured to external device 102 from the terminal
  • the data is type-determined, and determines to transmit data to the first processor or the second processor according to the determination result;
  • the communication monitoring module 106 is configured to use a communication module from the terminal (as shown in FIG. 2)
  • the data of the illustrated Modem is type-determined, and based on the result of the determination, it is determined that the data is transmitted to the first processor or the second processor.
  • the type of data of the external device 102 from the terminal can be identified in the terminal.
  • a communication monitoring module 106 a communication module connected to the terminal (such as the Modem shown in FIG. 2), configured to perform type determination on data of the communication module from the terminal, and determine according to the determination result. Transmitting data to the first processor or the second processor.
  • peripheral monitoring module 104 and the communication monitoring module 106 are simultaneously shown in FIG. 2, those skilled in the art should understand that: according to actual conditions and requirements, only the peripheral monitoring module 104 may be set in the terminal, or Only the communication monitoring module 106 is provided, and the peripheral monitoring module 104 and the communication monitoring module 106 can also be set at the same time, which are easy to change and implement.
  • the data processed by the first processor and the second processor can be stored in different storage spaces respectively. Having, for example, storing data processed by the first processor in a first memory connected only to the first processor, and storing data processed by the second processor in a second memory connected only to the second processor, thereby Avoid data crossover and further improve the security of the terminal.
  • the first memory and the second memory may include a terminal
  • RAM RAM. EMMC and so on.
  • first processor and the second processor are not used to limit the number of processors in the terminal to two, and it is obvious that more processors can be included in the terminal.
  • first and second represent the relationship between any two processors in the terminal, and are used to distinguish any two processors that are compared.
  • processor 1 and processor 2 when processor 1 and processor 2 are selected for comparison, either processor 1 and processor 2 may be referred to as “first processor” and the other is “ “Second processor”; and when processor 2 and processor 3 are selected for comparison, either processor 2 and processor 3 may be referred to as “first processor” and the other as “second processor” " , So on and so forth.
  • processors can be used to process the same type of data, and the multiple processors should be treated as one processor group, then the "first processor” and the "second processor". It is also possible to actually represent a processor group for processing the same type of data, each processor group containing one or more processors. At the same time, in order to correspond to more types of data, it is obvious that there may be more processor groups in the terminal, such as "third processor group", "fourth processor group” and the like.
  • the first processor and the second processor are respectively used to process different types of data within the terminal, and thus involve classifying data within the terminal. For example, according to the importance of the data, the data is divided into core data and non-core data; or according to the privacy of the data, the data is divided into private data and non-private data; or according to the data transmission direction, the data is divided into Send data and received data, and so on.
  • Each classification can be preset by the manufacturer, or it can be determined by the user according to his actual situation.
  • data associated with certain applications can be used as private data or non-private data, such as "address book” and "call record”.
  • Application-related data such as ",” “short message”, “mail”, whether read or written, is counted as private data, or data related to a game application is treated as non-private data;
  • a certain type of data may be used as private data or non-private data, such as interactive data with online banking as private data, and software update package data as non-private data, etc., and may also include other The way to distinguish, not here - enumeration.
  • the identification and classification of data from the external device 102 and/or the communication module by setting up a dedicated peripheral monitoring module 104 and/or communication monitoring module 106 not only helps speed up processing but also improves data classification. Data security.
  • the specific data transmission method may be different:
  • peripheral monitoring module 104 and/or the communication monitoring module 106 may, depending on the type of data detected, Transfer directly to CPU1 or CPU2.
  • CPU1 can directly transmit data corresponding to CPU1, and data corresponding to CPU2 needs to be forwarded by CPU1.
  • the peripheral monitoring module 104 and/or the communication monitoring module 106 add an identifier to the data that needs to be transmitted to the CPU 2, and after receiving the data, the CPU 1 transmits the data to the CPU 2 by viewing the identification.
  • the peripheral monitoring module 104 and/or the communication monitoring module 106 notifies the CPU 1 (such as sending a notification message or other preset manner) after discovering that there is data that needs to be sent to the CPU 2, and is connected to the peripheral monitoring module by the CPU1.
  • the data transfer channel transfers data to CPU2.
  • a DMA transmission channel is established by configuring a port to directly use the DMA by the peripheral monitoring module 104 and/or the communication monitoring module 106 in a manner of calling the bus of the CPU1. Transfer channel to transfer data to CPU2.
  • the external device 102 in the terminal shown in FIG. 2 can be divided into: a restricted external device 102A connected only to the CPU 1 and a non-connected only to the CPU 2 according to the connection relationship with the CPU 1 and the CPU 2.
  • the class external device 102B is restricted and the shared class external device 102C is simultaneously connected to the CPU 1, CPU 2.
  • Modem in the terminal shown in Figure 2 according to its connection relationship with CPU1 and CPU2, it can be divided into: Modeml connected only to CPU1, Modem2 connected only to CPU2, and Modem3 connected to CPU1 and CPU2 at the same time.
  • the specific connection method used actually involves the classification of the external device 102 and the Modem. For example, it can be classified according to the type of data involved in each external device 102/Modem. For example, when more data (greater than or equal to the preset amount of data) processed by an external device 102/Modem is data of high importance and high privacy, it can be connected only to CPU1 (dedicated for handling important A processor with high data and high privacy; and when an external device 102/Modem processes all types of data, it can be connected to both CPU1 and CPU2 (ie, simultaneously connected to all processing) In order to speed up data interaction efficiency; when an external device processes more data with low importance and low privacy, it can be connected to CPU2 only.
  • each external device 102/Modem can be categorized according to the relationship between each external device 102/Modem and the processor. For example, when an external device 102/Modem interacts with the first processor frequently, it can be connected only to the first processor; when an external device 102/Modem interacts with the second processor frequently, Connect it only to the second processor; the rest can be connected to all processors at the same time.
  • the external device 102 is connected to the peripheral monitoring module 104 and the Modem is connected to the communication monitoring module 106, in fact, the "external device 102" shown in FIG. 2 does not represent the terminal. Contains only one external device, “Modem” does not mean that only one Modem is included in the terminal; “External Device 102", “Modem” in Figure 2 should actually be represented as a collection of one or more external devices, and one Or a collection of multiple modems.
  • connection relationship between the external device 102 or Modem in the "set” and the peripheral monitoring module 104 or the communication monitoring module 106 is not limited to that shown in FIG. The following is a detailed description with reference to FIG. 6 and FIG. 7.
  • the connection mode of the external device 102 and the Modem is similar, the two are described together, and the "monitoring module” is used instead of the specific "peripheral monitoring module 104" or “Communication Monitoring Module 106", but it is apparent that the external device 102 corresponds to the peripheral monitoring module 104, and the Modem corresponds to the communication monitoring module 106.
  • the external device 1 and the external device 2 are included in the terminal as an example.
  • multiple external devices such as the external device 1, the external device 2, and the like are connected to the same monitoring module, which helps reduce the number of monitoring modules used and reduces the complexity of the terminal;
  • a plurality of external devices such as an external device 1, an external device 2, and the like are respectively connected to corresponding monitoring modules, for example, the external device 1 is connected to the monitoring module 1, and the external device 2 is connected to the monitoring device.
  • Module 2, etc. helps to reduce the calculation amount of each monitoring module and improve data processing efficiency.
  • the specific connection modes of the external device 1 and the external device 2 can also be applied to communication modules such as Modeml and Modem2, and details are not described herein.
  • the monitoring module 1 and the monitoring module 2 are connected to the CPU1 and CPU2 respectively, but this is only for the specific For example, it is actually possible to use any of the specific connections as shown in Figures 2-4.
  • peripheral monitoring module 104 and/or communication monitoring module 106 the identification of data types within external devices and/or communication modules can be implemented in other ways.
  • Embodiment 1 Data type monitoring by a processor
  • the external device 102 and Modem connected to the CPU 1 include only connected to the CPU 1 or simultaneously connected to the CPU 1 and the CPU 2, and the data is transmitted to the CPU 1 , and the specific data type is recognized by the CPU 1 and The CPU 1 determines to directly process the data or forward the data to the CPU 2 based on the result of the determination.
  • the data can be directly forwarded to the CPU 1 by the CPU 2, and then the CPU 1 determines whether to directly process the data or forward the data to the CPU 1 according to the judgment result.
  • CPU2 the external device 102 and Modem connected to the CPU 2, including only connecting to the CPU 2 or simultaneously connected to the CPU 1, CPU 2, the data can be directly forwarded to the CPU 1 by the CPU 2, and then the CPU 1 determines whether to directly process the data or forward the data to the CPU 1 according to the judgment result.
  • the CPU 1 may be a processor in the terminal for processing data of high importance and high privacy, so as to avoid data parsing by other processors as much as possible, thereby reducing the possibility of stealing and leaking important and private data. Sex.
  • CPU1 and CPU2 can receive the data transmitted from the connected external device 102 or Modem, identify the data type, and determine whether to directly process it according to the recognition result, or forward it to other processors for processing.
  • Data identification and processing by multiple processors can help reduce the computational burden of a single CPU and improve the computational efficiency of data.
  • Embodiment 2 Type monitoring of data by Modem
  • the received data is type-recognized directly by the modem in the terminal, and based on the recognition result, it is determined which CPU should be processed. Although there may be one or more Modems in the terminal, for each Modem, the specific connection with the CPU is the same or similar. The following takes a specific Modem as an example to illustrate the connection relationship between it and the CPU.
  • the Modem establishes a connection with all CPUs in the terminal. For example, if it is connected to CPU1 and CPU2 at the same time, when the Modem needs to transfer data to any CPU, it can be directly transmitted.
  • Modem is only connected to a preset CPU in the terminal.
  • Modeml is only connected to CPU1
  • Modem2 is only connected to CPU2
  • Modeml needs to transfer data to CPU2.
  • Modem2 When Modem2 needs to transfer data to CPU1, it needs to perform data forwarding by CPU1 and CPU2.
  • FIG. 10 is a specific implementation manner.
  • multiple modems in the terminal can be connected to only the same CPU, for example, Modeml and Modem2 can be connected only to CPU1, thereby helping to improve data security. Sexuality, to avoid malicious applications receiving some data through CPU2.
  • the method further includes: an update unit (not shown), and updating, according to the received update instruction, a determination condition for determining the data, so that the monitoring module is configured according to The updated determination condition is to judge the private data and the non-private data.
  • the monitoring module may be the peripheral monitoring module 104 and/or the communication monitoring module 106 shown in FIG. 2-4, or may be the CPU1 shown in FIG. CPU2 can also be the Modem (or Modeml and Modem2) shown in Figure 9-10.
  • the type of the user's private data will also change.
  • the short message, the address book, and the like belong to the user's private data
  • the power on/off password, the application protection password, the terminal anti-theft password, and the screen unlock password are also private data of the user, and the data is selected by thinning.
  • the update of the judgment conditions makes the selection of data more accurate, thereby ensuring the security of the user's private data.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer-usable storage medium (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code.
  • a computer-usable storage medium including but not limited to disk storage, CD-ROM, optical storage, etc.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • a terminal which can make different types of data in the terminal be processed by different processors, and can be identified by type for data input to the processor. Accurate input into the first processor or the second processor avoids data crossover and effectively improves the security of the terminal.
  • first and second are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
  • the term “plurality” refers to two or more, unless specifically defined otherwise.

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The present invention provides a terminal, comprising: a first processor and a second processor, used to process different types of data in the terminal respectively; and an external monitoring module, used to perform type determination on data from an external device of the terminal, and determine, according to a determination result, to transmit the data to the first processor or the second processor. By means of the technical solution of the present invention, different types of data in the terminal may be processed by different processors, and type identification is performed for data input to the processor, so that the data is correctly input to the first processor or the second processor, thereby preventing data from crossing, and effectively improving the safety of the terminal.

Description

一种终端  Terminal
技术领域  Technical field
本发明涉及数据安全技术领域, 具体而言, 涉及一种终端。 背景技术  The present invention relates to the field of data security technologies, and in particular, to a terminal. Background technique
如图 1 所示, 在相关技术中, 终端内仅设置有单个处理器 (图 1 中所示的 CPU ) , 则该处理器能够接收来自任意外部设备 102 的数据; 同时, 终端内设置的任 意通信模块 (Modem ) 都能和该 CPU交互语音业务和数据业务等数据。  As shown in FIG. 1, in the related art, only a single processor (CPU shown in FIG. 1) is provided in the terminal, and the processor can receive data from any external device 102; at the same time, any setting in the terminal The communication module (Modem) can interact with the CPU to exchange data such as voice service and data service.
由于所有的数据都由同一个 CPU 进行处理, 并且都存储至同一个存储器中, 则 当终端内存在一些具有过高权限的应用程序时, 尤其是来源不定的第三方应用程序, 则这些应用程序能够轻易地控制终端中仅有的处理器, 来调用其中的任意数据, 包括 重要的、 私密的数据, 甚至任意上传至其他终端或服务器。  Since all data is processed by the same CPU and stored in the same memory, when there are some applications with excessive permissions in the terminal, especially third-party applications with uncertain sources, these applications It is easy to control the only processor in the terminal to call any data, including important, private data, and even upload it to other terminals or servers.
所以, 如何解决单个处理器给终端带来的数据安全问题, 成为目前亟待解决的技 术问题。 发明内容  Therefore, how to solve the data security problem brought by a single processor to the terminal has become a technical problem to be solved. Summary of the invention
本发明正是基于上述问题, 提出了一种新的技术方案, 可以使终端内不同类型的 数据, 釆用不同的处理器进行处理, 并且针对输入处理器的数据, 可以通过类型识别 而准确输入第一处理器或第二处理器中, 避免数据交叉, 有效提升了终端的安全性。  The invention is based on the above problems, and proposes a new technical solution, which can make different types of data in the terminal be processed by different processors, and the data input to the processor can be accurately input by type identification. In the first processor or the second processor, data crossover is avoided, and the security of the terminal is effectively improved.
有鉴于此, 本发明提出了一种终端, 包括: 第一处理器和第二处理器, 用于分别 处理所述终端中不同类型的数据; 外设监控模块, 连接至所述终端的外部设备, 用于 对来自所述终端的外部设备的数据进行类型判断, 并根据判断结果确定将数据传输至 所述第一处理器或所述第二处理器。  In view of this, the present invention provides a terminal, including: a first processor and a second processor, configured to separately process different types of data in the terminal; a peripheral monitoring module, connected to an external device of the terminal And performing type determination on data from an external device of the terminal, and determining to transmit data to the first processor or the second processor according to the determination result.
在该技术方案中, 针对终端内不同类型的数据, 釆用不同的处理器对其进行处 理, 使得数据处理过程在物理上被隔离, 有助于提升终端的数据安全性。  In this technical solution, different types of data in the terminal are processed by different processors, so that the data processing process is physically isolated, which helps to improve the data security of the terminal.
通过设置专门的外设监控模块, 对来自外部设备的数据进行识别和分类处理, 既 有助于加快处理速度, 又能够通过数据分类而提高数据安全性。  The identification and classification of data from external devices by setting up a dedicated peripheral monitoring module not only helps speed up processing, but also improves data security through data classification.
考虑到外部设备的数量问题, 则可以釆用多种具体的连接方式。 比如一种情况 下, 可以将所有的外部设备都连接至外设监控模块, 然后由外设监控模块将分类后的 数据传输至第一处理器或第二处理器; 另一种情况下, 可以为每个外部设备单独配置 一个外设监控模块, 并由每个外设监控模块将分类后的数据传输至第一处理器或第二 处理器。 Considering the number of external devices, you can use a variety of specific connections. For example, in one case, all external devices can be connected to the peripheral monitoring module, and then the peripheral monitoring module transmits the classified data to the first processor or the second processor; in another case, A peripheral monitoring module is separately configured for each external device, and each of the peripheral monitoring modules transmits the classified data to the first processor or the second Processor.
在上述技术方案中, 优选地, 所述外设监控模块还用于: 在与所述第一处理器或 所述第二处理器之间存在通路的情况下, 将数据直接传输至所述第一处理器或所述第 二处理器, 在仅与所述第一处理器之间存在通路的情况下, 为需要传输至所述第二处 理器的数据添加标识, 以由所述第一处理器转发至所述第二处理器, 在仅与所述第二 处理器之间存在通路的情况下, 为需要传输至所述第一处理器的数据添加标识, 以由 所述第二处理器转发至所述第一处理器。  In the above technical solution, preferably, the peripheral monitoring module is further configured to: directly transmit data to the first channel if there is a path between the first processor or the second processor a processor or the second processor, adding an identifier to data that needs to be transmitted to the second processor to be used by the first process if there is only a path between the first processor and the first processor Forwarding to the second processor, adding an identifier to data that needs to be transmitted to the first processor to be used by the second processor in the case where there is only a path between the second processor Forwarded to the first processor.
在该技术方案中, 外设监控模块可能与第一处理器或第二处理器之间存在连接的 通路, 则可以直接进行数据交互; 也可能仅与第一处理器或第二处理器中的一个存在 连接的通路, 则可以由该相连的处理器对其余的处理器进行数据转发。  In this technical solution, the peripheral monitoring module may have a connection path with the first processor or the second processor, and then the data interaction may be directly performed; or may be only related to the first processor or the second processor. A path with a connection can be forwarded by the connected processor to the remaining processors.
当然, 除了执行数据转发, 实际上也可以釆用其他的多种方式, 实现处理器之间 的相互协助。 以外设监控模块连接至第一处理器为例, 比如一种情况下, 可以由第一 处理器对连接至外设监控模块的端口、 连接至第二处理器 (或其他处理器) 的端口之 间进行配置, 以建立数据传输通道, 从而由外设监控模块直接利用该数据传输通道, 将数据传输至第二处理器; 另一种情况下, 第一处理器通过配置端口, 建立 DMA 传 输通道, 以调用第一处理器的总线的方式, 由外设监控模块直接利用该 DMA传输通 道, 将数据传输至第二处理器。  Of course, in addition to performing data forwarding, you can actually use other methods to achieve mutual assistance between processors. For example, the peripheral monitoring module is connected to the first processor. For example, in one case, the port connected to the peripheral monitoring module and the port connected to the second processor (or other processor) may be connected by the first processor. Between them to establish a data transmission channel, the peripheral monitoring module directly uses the data transmission channel to transmit data to the second processor; in another case, the first processor establishes a DMA transmission channel by configuring the port The DMA transmission channel is directly used by the peripheral monitoring module to transmit data to the second processor in a manner of calling the bus of the first processor.
在上述任一技术方案中, 优选地, 还包括: 限制类外部设备, 连接至所述外设监 控模块的一端, 且所述外设监控模块的另一端连接至所述第一处理器; 其中, 所述外 设监控模块对来自所述限制类外部设备的数据进行类型判断, 将对应于所述第一处理 器的数据直接传输至所述第一处理器, 并为需要传输至所述第二处理器的数据添加标 识, 以由所述第一处理器转发至所述第二处理器。  In any one of the above technical solutions, preferably, the method further includes: a restricted external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is connected to the first processor; The peripheral monitoring module performs type determination on data from the restricted external device, directly transmits data corresponding to the first processor to the first processor, and needs to transmit to the first The data of the second processor adds an identification to be forwarded by the first processor to the second processor.
在该技术方案中, 限制类外部设备接触到数据中, 重要性高、 私密程度高的数据 更多, 因而在对限制类外部设备的数据进行类型识别之后, 仍然仅连接至第一处理 器, 使得第一处理器能够对所有数据都实现进一步的查看和监控, 有助于提升终端的 安全性; 或者, 限制类外部设备与第一处理器的交互频率更高, 因而通过将所有数据 都直接传输至第一处理器, 使得第一处理器能够更快地获取所需数据, 有助于提高数 据处理效率。  In this technical solution, the external device is restricted from accessing the data, and the data with high importance and high degree of privacy is more. Therefore, after the type identification of the data of the restricted external device is performed, only the first processor is still connected. Enables the first processor to further view and monitor all data, which helps to improve the security of the terminal; or restricts the external device to interact with the first processor more frequently, thus by directly putting all the data directly The transmission to the first processor enables the first processor to acquire the required data more quickly, which helps to improve data processing efficiency.
在上述任一技术方案中, 优选地, 还包括: 非限制类外部设备, 连接至所述外设 监控模块的一端, 且所述外设监控模块的另一端连接至所述第二处理器; 其中, 所述 外设监控模块对来自所述非限制类外部设备的数据进行类型判断, 将对应于所述第二 处理器的数据直接传输至所述第二处理器, 并为需要传输至所述第一处理器的数据添 加标识, 以由所述第二处理器转发至所述第一处理器。  In any one of the foregoing technical solutions, preferably, the method further includes: an unrestricted external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is connected to the second processor; The peripheral monitoring module performs type determination on data from the non-restricted external device, and directly transmits data corresponding to the second processor to the second processor, and needs to transmit to the The data of the first processor adds an identification to be forwarded by the second processor to the first processor.
在该技术方案中, 非限制类外部设备接触到的数据中, 重要性低、 私密程度低的 数据更多, 或者与第二处理器的数据交互频率更高, 因而通过将所有数据都直接传输 至第二处理器, 使得第二处理器能够更快地获取所需数据, 有助于提高数据处理效 率。 In the technical solution, the data that is accessed by the non-restricted external device has less importance, less privacy data, or more frequent data exchange with the second processor, so that all data is directly transmitted. The second processor enables the second processor to acquire the required data more quickly, which helps to improve data processing efficiency.
在上述任一技术方案中, 优选地, 还包括: 共享类外部设备, 连接至所述外设监 控模块的一端, 且所述外设监控模块的另一端同时分别连接至所述第一处理器和所述 第二处理器; 其中, 所述外设监控模块对来自所述共享类外部设备的数据进行类型判 断, 并根据判断结果将数据传输至所述第一处理器或所述第二处理器。  In any one of the above technical solutions, preferably, the method further includes: a shared external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is simultaneously connected to the first processor And the second processor; wherein the peripheral monitoring module performs type determination on data from the shared external device, and transmits data to the first processor or the second processing according to the determination result Device.
在该技术方案中, 共享类外部设备接触到的各类数据的数量差不多, 与第一处理 器和第二处理器的交互频率也差不多, 因而可以将各类数据直接传输至第一处理器和 第二处理器, 有助于数据处理和数据交互的有序执行。  In this technical solution, the amount of various types of data touched by the shared external device is similar, and the frequency of interaction with the first processor and the second processor is also similar, so that various types of data can be directly transmitted to the first processor and The second processor facilitates the orderly execution of data processing and data interaction.
在上述任一技术方案中, 优选地, 所述第一处理器用于处理所述终端内的私密数 据, 所述第二处理器用于处理所述终端内的非私密数据。  In any one of the foregoing technical solutions, preferably, the first processor is configured to process private data in the terminal, and the second processor is configured to process non-private data in the terminal.
在该技术方案中, 终端内的数据可能存在多种类型, 比如数据的重要程度、 私密 程度、 数据量的大小、 数据格式的不同等, 甚至基于用户的实际需求, 对每个处理器 所处理的数据类型进行调整和变化。 在一种较为具体的实施例中, 可以根据数据的私 密程度, 将私密数据由第一处理器进行处理, 非私密数据由第二处理器进行处理。  In this technical solution, there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor. The data types are adjusted and changed. In a more specific embodiment, the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
在上述任一技术方案中, 优选地, 所述外设监控模块还用于: 判断来自所述终端 的外部设备的数据对应于受保护应用或不受保护应用, 其中, 判定对应于所述受保护 应用的数据为私密数据, 对应于所述不受保护应用的数据为非私密数据。  In any one of the foregoing technical solutions, preferably, the peripheral monitoring module is further configured to: determine that data of an external device from the terminal corresponds to a protected application or an unprotected application, where the determining corresponds to the receiving The data of the protection application is private data, and the data corresponding to the unprotected application is non-private data.
本发明还提出了一种终端, 包括: 第一处理器和第二处理器, 用于分别处理所述 终端中不同类型的数据; 通信监控模块, 连接至所述终端的通信模块, 用于对来自所 述终端的通信模块的数据进行类型判断, 并根据判断结果确定将数据传输至所述第一 处理器或所述第二处理器。  The present invention also provides a terminal, including: a first processor and a second processor, configured to separately process different types of data in the terminal; a communication monitoring module, a communication module connected to the terminal, configured to The data from the communication module of the terminal performs type determination, and determines to transmit data to the first processor or the second processor according to the determination result.
在该技术方案中, 针对终端内不同类型的数据, 釆用不同的处理器对其进行处 理, 使得数据处理过程在物理上被隔离, 有助于提升终端的数据安全性。  In this technical solution, different types of data in the terminal are processed by different processors, so that the data processing process is physically isolated, which helps to improve the data security of the terminal.
通过设置专门的通信监控模块, 对来自外部设备的数据进行识别和分类处理, 既 有助于加快处理速度, 又能够通过数据分类而提高数据安全性。  By setting up a special communication monitoring module, the data from the external device can be identified and classified, which not only helps speed up the processing, but also improves data security through data classification.
考虑到通信模块的数量问题, 则可以釆用多种具体的连接方式。 比如一种情况 下, 可以将所有的通信模块都连接至通信监控模块, 然后由通信监控模块将分类后的 数据传输至第一处理器或第二处理器; 另一种情况下, 可以为每个通信模块单独配置 一个通信监控模块, 并由每个通信监控模块将分类后的数据传输至第一处理器或第二 处理器。  Considering the number of communication modules, a variety of specific connection methods can be used. For example, in one case, all communication modules can be connected to the communication monitoring module, and then the classified monitoring data can be transmitted to the first processor or the second processor by the communication monitoring module; in another case, each can be The communication modules are separately configured with a communication monitoring module, and each of the communication monitoring modules transmits the classified data to the first processor or the second processor.
在上述技术方案中, 优选地, 所述通信监控模块还用于: 在与所述第一处理器或 所述第二处理器之间存在通路的情况下, 将数据直接传输至所述第一处理器或所述第 二处理器; 在仅与所述第一处理器之间存在通路的情况下, 为需要传输至所述第二处 理器的数据添加标识, 以由所述第一处理器转发至所述第二处理器; 在仅与所述第二 处理器之间存在通路的情况下, 为需要传输至所述第一处理器的数据添加标识, 以由 所述第二处理器转发至所述第一处理器。 In the above technical solution, preferably, the communication monitoring module is further configured to: directly transmit data to the first channel if there is a path between the first processor or the second processor a processor or the second processor; adding an identification to data that needs to be transmitted to the second processor to be used by the first processor in the presence of a path only between the first processor Forwarding to the second processor; in only with the second Where there is a path between the processors, an identification is added to the data that needs to be transmitted to the first processor for forwarding by the second processor to the first processor.
在该技术方案中, 通信监控模块可能与第一处理器或第二处理器之间存在连接的 通路, 则可以直接进行数据交互; 也可能仅与第一处理器或第二处理器中的一个存在 连接的通路, 则可以由该相连的处理器对其余的处理器进行数据转发。  In this technical solution, the communication monitoring module may have a connection path with the first processor or the second processor, and may directly perform data interaction; or may only be associated with one of the first processor or the second processor. If there is a connected path, the remaining processors can perform data forwarding to the remaining processors.
当然, 除了执行数据转发, 实际上也可以釆用其他的多种方式, 实现处理器之间 的相互协助。 以通信监控模块连接至第一处理器为例, 比如一种情况下, 可以由第一 处理器对连接至通信监控模块的端口、 连接至第二处理器 (或其他处理器) 的端口之 间进行配置, 以建立数据传输通道, 从而由通信监控模块直接利用该数据传输通道, 将数据传输至第二处理器; 另一种情况下, 第一处理器通过配置端口, 建立 DMA 传 输通道, 以调用第一处理器的总线的方式, 由通信监控模块直接利用该 DMA传输通 道, 将数据传输至第二处理器。  Of course, in addition to performing data forwarding, you can actually use other methods to achieve mutual assistance between processors. For example, the communication monitoring module is connected to the first processor. For example, in a case, the port connected to the communication monitoring module and the port connected to the second processor (or other processor) may be connected by the first processor. Performing configuration to establish a data transmission channel, so that the communication monitoring module directly utilizes the data transmission channel to transmit data to the second processor; in another case, the first processor establishes a DMA transmission channel by configuring the port, The manner of calling the bus of the first processor is directly used by the communication monitoring module to transmit the data to the second processor.
在上述任一技术方案中, 优选地, 还包括: 限制类通信模块, 连接至所述通信监 控模块的一端, 且所述通信监控模块的另一端连接至所述第一处理器; 其中, 所述通 信监控模块对来自所述限制类通信模块的数据进行类型判断, 将对应于所述第一处理 器的数据直接传输至所述第一处理器, 并为需要传输至所述第二处理器的数据添加标 识, 以由所述第一处理器转发至所述第二处理器。  In any one of the above aspects, preferably, the method further includes: a restriction type communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is connected to the first processor; The communication monitoring module performs type determination on data from the restricted communication module, directly transmits data corresponding to the first processor to the first processor, and needs to transmit to the second processor Data is added to the identifier for forwarding by the first processor to the second processor.
在该技术方案中, 限制类通信模块接触到数据中, 重要性高、 私密程度高的数据 更多, 因而在对限制类通信模块的数据进行类型识别之后, 仍然仅连接至第一处理 器, 使得第一处理器能够对所有数据都实现进一步的查看和监控, 有助于提升终端的 安全性; 或者, 限制类通信模块可以是相对于其他的通信模块, 与第一处理器的交互 频率更高, 因而通过将所有数据都直接传输至第一处理器, 使得第一处理器能够更快 地获取所需数据, 有助于提高数据处理效率。  In the technical solution, the restricted communication module contacts the data, and the data with high importance and high degree of privacy is more. Therefore, after the type identification of the data of the restricted communication module is performed, only the first processor is still connected. The first processor enables further viewing and monitoring of all data, which helps to improve the security of the terminal; or, the restricted communication module can be more interactive with the first processor than the other communication module. High, so by transferring all data directly to the first processor, enabling the first processor to acquire the required data faster, helps to improve data processing efficiency.
在上述任一技术方案中, 优选地, 还包括: 非限制类通信模块, 连接至所述通信 监控模块的一端, 且所述通信监控模块的另一端连接至所述第二处理器; 其中, 所述 通信监控模块对来自所述非限制类通信模块的数据进行类型判断, 将对应于所述第二 处理器的数据直接传输至所述第二处理器, 并为需要传输至所述第一处理器的数据添 加标识, 以由所述第二处理器转发至所述第一处理器。  In any one of the above aspects, preferably, the method further includes: an unrestricted communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is connected to the second processor; The communication monitoring module performs type determination on data from the unrestricted communication module, and directly transmits data corresponding to the second processor to the second processor, and needs to transmit to the first The data of the processor is added with an identification to be forwarded by the second processor to the first processor.
在该技术方案中, 非限制类通信模块接触到的数据中, 重要性低、 私密程度低的 数据更多, 或者与第二处理器的数据交互频率更高, 因而通过将所有数据都直接传输 至第二处理器, 使得第二处理器能够更快地获取所需数据, 有助于提高数据处理效 率。  In the technical solution, the non-restricted communication module contacts the data, has less importance, has less privacy data, or has a higher frequency of data interaction with the second processor, so that all data is directly transmitted. The second processor enables the second processor to acquire the required data more quickly, which helps to improve data processing efficiency.
在上述任一技术方案中, 优选地, 还包括: 共享类通信模块, 连接至所述通信监 控模块的一端, 且所述通信监控模块的另一端同时分别连接至所述第一处理器和所述 第二处理器; 其中, 所述通信监控模块对来自所述共享类通信模块的数据进行类型判 断, 并根据判断结果将数据传输至所述第一处理器或所述第二处理器。 In any one of the foregoing technical solutions, preferably, the method further includes: a shared communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is simultaneously connected to the first processor and the a second processor; wherein the communication monitoring module performs type determination on data from the shared communication module And transmitting data to the first processor or the second processor according to the judgment result.
在该技术方案中, 共享类通信模块接触到的各类数据的数量差不多, 与第一处理 器和第二处理器的交互频率也差不多, 因而可以将各类数据直接传输至第一处理器和 第二处理器, 有助于数据处理和数据交互的有序执行。  In the technical solution, the number of types of data touched by the shared communication module is similar, and the frequency of interaction with the first processor and the second processor is similar, so that various types of data can be directly transmitted to the first processor and The second processor facilitates the orderly execution of data processing and data interaction.
在上述任一技术方案中, 优选地, 所述第一处理器用于处理所述终端内的私密数 据, 所述第二处理器用于处理所述终端内的非私密数据。  In any one of the foregoing technical solutions, preferably, the first processor is configured to process private data in the terminal, and the second processor is configured to process non-private data in the terminal.
在该技术方案中, 终端内的数据可能存在多种类型, 比如数据的重要程度、 私密 程度、 数据量的大小、 数据格式的不同等, 甚至基于用户的实际需求, 对每个处理器 所处理的数据类型进行调整和变化。 在一种较为具体的实施例中, 可以根据数据的私 密程度, 将私密数据由第一处理器进行处理, 非私密数据由第二处理器进行处理。  In this technical solution, there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor. The data types are adjusted and changed. In a more specific embodiment, the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
在上述任一技术方案中, 优选地, 所述所述通信监控模块还用于: 判断来自所述 终端的通信模块的数据对应于受保护应用或不受保护应用, 其中, 判定对应于所述受 保护应用的数据为私密数据, 对应于所述不受保护应用的数据为非私密数据。  In any one of the foregoing technical solutions, the communication monitoring module is further configured to: determine that data of the communication module from the terminal corresponds to a protected application or an unprotected application, where the determination corresponds to the The data of the protected application is private data, and the data corresponding to the unprotected application is non-private data.
本发明还提出了一种终端, 包括: 第一处理器和第二处理器, 用于分别处理所述 终端中不同类型的数据; 其中, 所述第一处理器还用于: 对来自相连的至少一个外部 设备和 /或至少一个通信模块的数据进行类型判断, 并根据判断结果确定自行处理接收 到的数据, 或将数据传输至所述第二处理器。  The present invention also provides a terminal, including: a first processor and a second processor, configured to separately process different types of data in the terminal; wherein, the first processor is further configured to: The data of the at least one external device and/or the at least one communication module is type-determined, and according to the determination result, it is determined that the received data is processed by itself or transmitted to the second processor.
在该技术方案中, 针对终端内不同类型的数据, 釆用不同的处理器对其进行处 理, 使得数据处理过程在物理上被隔离, 有助于提升终端的数据安全性。  In this technical solution, different types of data in the terminal are processed by different processors, so that the data processing process is physically isolated, which helps to improve the data security of the terminal.
通过第一处理器直接对来自外部设备和 /或通信模块的数据进行识别和分类操作, 有助于减少对终端的现有结构的改进, 降低终端结构的复杂度。 特别地, 该技术方案 具体地可以应用于仅连接至第一处理器的外部设备和 /或通信模块, 或者应用于同时连 接至第一处理器和第二处理器的外部设备和 /或通信模块。  The identification and classification of data from external devices and/or communication modules by the first processor directly helps to reduce the improvement of the existing structure of the terminal and reduce the complexity of the terminal structure. In particular, the technical solution may be specifically applied to an external device and/or a communication module connected only to the first processor, or to an external device and/or a communication module that are simultaneously connected to the first processor and the second processor. .
在上述技术方案中, 优选地, 还包括: 限制类外部设备, 仅连接至所述第一处理 器; 非限制类外部设备, 仅连接至所述第二处理器; 其中, 所述第一处理器直接接收 来自所述限制类外部设备的数据, 并接收所述第二处理器直接转发的来自所述非限制 类外部设备的数据, 且根据对来自所述限制类外部设备或所述非限制类外部设备的数 据进行类型判断的结果, 确定自行处理接收到的数据, 或将数据传输至所述第二处理 器。  In the above technical solution, preferably, the method further includes: a restriction-type external device connected only to the first processor; and an unrestricted external device connected to only the second processor; wherein, the first processing Directly receiving data from the restricted type external device, and receiving data from the non-restricted external device directly forwarded by the second processor, and according to the external device from the restricted class or the unrestricted As a result of the type determination of the data of the external device of the class, it is determined that the received data is processed by itself or transmitted to the second processor.
在该技术方案中, 通过第一处理器对限制类外部设备和非限制类外部设备的所有 数据都执行类型识别, 使得第一处理器能够对所有的数据都进行查看, 尤其是当第一 处理器用于处理的数据的重要性更高、 私密程度更高时, 第一处理器是相对于第二处 理器的 "安全处理器" , 从而有助于避免数据的错误发送, 防止恶意应用通过第二处 理器窃取重要、 私密的数据。  In this technical solution, type identification is performed on all data of the restricted class external device and the non-restricted class external device by the first processor, so that the first processor can view all the data, especially when the first process is performed. When the data used for processing is more important and the privacy is higher, the first processor is a "secure processor" relative to the second processor, thereby helping to avoid erroneous transmission of data and preventing malicious applications from passing through the first The second processor steals important, private data.
在上述任一技术方案中, 优选地, 所述第二处理器还用于: 对来自相连的至少一 个外部设备和 /或至少一个通信模块的数据进行类型判断, 并根据判断结果确定自行处 理接收到的数据, 或将数据传输至所述第一处理器。 In any one of the above technical solutions, preferably, the second processor is further configured to: at least one from the connection The data of the external device and/or the at least one communication module is type-determined, and according to the determination result, it is determined that the received data is processed by itself or transmitted to the first processor.
在该技术方案中, 通过第二处理器直接对来自外部设备和 /或通信模块的数据进行 识别和分类操作, 有助于减少对终端的现有结构的改进, 降低终端结构的复杂度。 特 别地, 该技术方案具体地可以应用于仅连接至第二处理器的外部设备和 /或通信模块, 或者应用于同时连接至第一处理器和第二处理器的外部设备和 /或通信模块。  In the technical solution, the data from the external device and/or the communication module is directly identified and classified by the second processor, which helps to reduce the improvement of the existing structure of the terminal and reduce the complexity of the terminal structure. In particular, the technical solution may be specifically applied to an external device and/or a communication module connected only to the second processor, or to an external device and/or a communication module that are simultaneously connected to the first processor and the second processor. .
在上述任一技术方案中, 优选地, 还包括: 限制类外部设备, 仅连接至所述第一 处理器; 非限制类外部设备, 仅连接至所述第二处理器; 其中, 所述第一处理器接收 来自所述限制类外部设备的数据, 并根据对接收到的数据进行类型判断的结果, 确定 自行处理接收到的数据, 或将数据传输至所述第二处理器; 所述第二处理器接收来自 所述非限制类外部设备的数据, 并根据对接收到的数据进行类型判断的结果, 确定自 行处理接收到的数据, 或将数据传输至所述第一处理器。  In any one of the above technical solutions, preferably, the method further includes: a restricted external device connected only to the first processor; and an unrestricted external device connected only to the second processor; a processor receives data from the restricted external device, and determines to process the received data by itself or transmits the data to the second processor according to a result of type determination of the received data; The second processor receives data from the non-restricted external device and determines to process the received data by itself or transmit the data to the first processor according to a result of type determination of the received data.
在该技术方案中, 限制类外部设备接触到数据中, 重要性高、 私密程度高的数据 更多, 或者限制类外部设备与第一处理器的交互频率更高; 非限制类外部设备接触到 的数据中, 重要性低、 私密程度低的数据更多, 或者与第二处理器的数据交互频率更 高。 因而通过第一处理器和第二处理器分别对来自限制类外部设备和非限制类外部设 备的数据进行识别、 分发和处理, 一方面有助于避免数据交叉导致的数据安全问题, 另一方面有助于提高数据处理的效率, 从而提升用户使用体验。  In this technical solution, the external device is restricted from accessing the data, the data with high importance and high degree of privacy is more, or the external device is restricted to interact with the first processor more frequently; the non-restricted external device is exposed to the device. Of the data, there is more data with less importance and less privacy, or more frequent data exchange with the second processor. Therefore, the first processor and the second processor respectively identify, distribute, and process data from the restricted external device and the non-restricted external device, thereby helping to avoid data security problems caused by data crossover. Helps improve the efficiency of data processing and enhance the user experience.
在上述任一技术方案中, 优选地, 所述第一处理器用于处理所述终端内的私密数 据, 所述第二处理器用于处理所述终端内的非私密数据。  In any one of the foregoing technical solutions, preferably, the first processor is configured to process private data in the terminal, and the second processor is configured to process non-private data in the terminal.
在该技术方案中, 终端内的数据可能存在多种类型, 比如数据的重要程度、 私密 程度、 数据量的大小、 数据格式的不同等, 甚至基于用户的实际需求, 对每个处理器 所处理的数据类型进行调整和变化。 在一种较为具体的实施例中, 可以根据数据的私 密程度, 将私密数据由第一处理器进行处理, 非私密数据由第二处理器进行处理。  In this technical solution, there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor. The data types are adjusted and changed. In a more specific embodiment, the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
在上述任一技术方案中, 优选地, 所述私密数据为对应于受保护应用的数据, 所 述非私密数据为对应于不受保护应用的数据。  In any one of the foregoing technical solutions, preferably, the private data is data corresponding to a protected application, and the non-private data is data corresponding to an unprotected application.
本发明还提出了一种终端, 包括: 第一处理器和第二处理器, 用于分别处理所述 终端中不同类型的数据; 通信模块, 用于对接收到的来自外部通信设备的数据进行类 型判断, 并根据判断结果确定将数据传输至所述第一处理器或所述第二处理器。  The present invention also provides a terminal, comprising: a first processor and a second processor, configured to separately process different types of data in the terminal; and a communication module, configured to perform data received from an external communication device Type determining, and determining to transmit data to the first processor or the second processor according to the result of the determination.
在该技术方案中, 针对终端内不同类型的数据, 釆用不同的处理器对其进行处 理, 使得数据处理过程在物理上被隔离, 有助于提升终端的数据安全性。  In this technical solution, different types of data in the terminal are processed by different processors, so that the data processing process is physically isolated, which helps to improve the data security of the terminal.
通过通信模块直接对来自外部设备的数据和 /或自身接收到的数据进行识别和分类 操作, 有助于减少对终端的现有结构的改进, 降低终端结构的复杂度。  The communication module directly recognizes and classifies the data from the external device and/or the data received by itself, which helps to reduce the improvement of the existing structure of the terminal and reduce the complexity of the terminal structure.
在上述技术方案中, 优选地, 所述通信模块还用于: 在与所述第一处理器或所述 第二处理器之间存在通路的情况下, 将数据直接传输至所述第一处理器或所述第二处 理器; 在仅与所述第一处理器之间存在通路的情况下, 为需要传输至所述第二处理器 的数据添加标识, 以由所述第一处理器转发至所述第二处理器; 在仅与所述第二处理 器之间存在通路的情况下, 为需要传输至所述第一处理器的数据添加标识, 以由所述 第二处理器转发至所述第一处理器。 In the above technical solution, preferably, the communication module is further configured to: directly transmit data to the first process if there is a path between the first processor or the second processor Or the second An identifier is added to data that needs to be transmitted to the second processor for forwarding to the second processor by the first processor in the case where there is only a path between the first processor and the first processor Adding an identification to data that needs to be transmitted to the first processor for forwarding to the first processor by the second processor in the case where there is a path only between the second processor .
在该技术方案中, 通信模块可能与第一处理器或第二处理器之间存在连接的通 路, 则可以直接进行数据交互; 也可能仅与第一处理器或第二处理器中的一个存在连 接的通路, 则可以由该相连的处理器对其余的处理器进行数据转发。  In this technical solution, the communication module may have a connection path with the first processor or the second processor, and the data interaction may be directly performed; or only one of the first processor or the second processor may exist. The connected path can be forwarded by the connected processor to the remaining processors.
当然, 除了执行数据转发, 实际上也可以釆用其他的多种方式, 实现处理器之间 的相互协助。 以通信模块连接至第一处理器为例, 比如一种情况下, 可以由第一处理 器对连接至通信模块的端口、 连接至第二处理器 (或其他处理器) 的端口之间进行配 置, 以建立数据传输通道, 从而由通信模块直接利用该数据传输通道, 将数据传输至 第二处理器; 另一种情况下, 第一处理器通过配置端口, 建立 DMA 传输通道, 以调 用第一处理器的总线的方式, 由通信模块直接利用该 DMA 传输通道, 将数据传输至 第二处理器。  Of course, in addition to performing data forwarding, you can actually use other methods to achieve mutual assistance between processors. For example, the communication module is connected to the first processor. For example, in one case, the port connected to the communication module and the port connected to the second processor (or other processor) may be configured by the first processor. , to establish a data transmission channel, so that the communication module directly uses the data transmission channel to transmit data to the second processor; in another case, the first processor establishes a DMA transmission channel by configuring the port to invoke the first The way of the bus of the processor, the communication module directly uses the DMA transmission channel to transmit data to the second processor.
在上述任一技术方案中, 优选地, 所述第一处理器用于处理所述终端内的私密数 据, 所述第二处理器用于处理所述终端内的非私密数据。  In any one of the foregoing technical solutions, preferably, the first processor is configured to process private data in the terminal, and the second processor is configured to process non-private data in the terminal.
在该技术方案中, 终端内的数据可能存在多种类型, 比如数据的重要程度、 私密 程度、 数据量的大小、 数据格式的不同等, 甚至基于用户的实际需求, 对每个处理器 所处理的数据类型进行调整和变化。 在一种较为具体的实施例中, 可以根据数据的私 密程度, 将私密数据由第一处理器进行处理, 非私密数据由第二处理器进行处理。  In this technical solution, there may be multiple types of data in the terminal, such as the importance of the data, the degree of privacy, the size of the data, the difference in the data format, etc., even based on the actual needs of the user, processed by each processor. The data types are adjusted and changed. In a more specific embodiment, the private data may be processed by the first processor according to the degree of privacy of the data, and the non-private data is processed by the second processor.
在上述任一技术方案中, 优选地, 所述通信模块还用于: 判断来自所述外部通信 设备的数据对应于受保护应用或不受保护应用, 其中, 判定对应于所述受保护应用的 数据为私密数据, 对应于所述不受保护应用的数据为非私密数据。  In any one of the foregoing technical solutions, preferably, the communication module is further configured to: determine that data from the external communication device corresponds to a protected application or an unprotected application, where the determination corresponds to the protected application. The data is private data, and the data corresponding to the unprotected application is non-private data.
需要说明的是, 在上述的各个技术方案中:  It should be noted that, in each of the above technical solutions:
第一处理器和第二处理器并不用于限制终端内的处理器数量为两个, 而终端内实 际上显然可以包含更多的处理器。 其中, "第一" 和 "第二" 代表了终端内的任意两 个处理器之间的相互关系, 用于区分任意两个被进行比较的处理器。 比如对于包含有 3个处理器的终端, 当选取处理器 1和处理器 2进行比较时, 可以将处理器 1和处理 器 2 中的任一个称为 "第一处理器" , 另一个为 "第二处理器" ; 而当选取处理器 2 和处理器 3 进行比较时, 可以将处理器 2 和处理器 3 中的任一个称为 "第一处理 器" , 另一个为 "第二处理器" , 依此类推。  The first processor and the second processor are not intended to limit the number of processors in the terminal to two, and it is apparent that the terminal can actually contain more processors. Among them, "first" and "second" represent the relationship between any two processors in the terminal, and are used to distinguish any two processors that are compared. For example, for a terminal that includes three processors, when processor 1 and processor 2 are selected for comparison, either one of processor 1 and processor 2 may be referred to as a "first processor" and the other is " "Second processor"; and when processor 2 and processor 3 are selected for comparison, either processor 2 and processor 3 may be referred to as "first processor" and the other as "second processor" " , So on and so forth.
当然, 为了增强终端的处理能力, 可以使用多个处理器来处理同一类数据, 则这 多个处理器应该被视为一个处理器组, 则 "第一处理器" 和 "第二处理器" 实际上还 可以表示用于处理相同类型的数据的处理器组, 每个处理器组内包含有一个或多个处 理器。 同时, 为了对应于更多类型的数据, 终端内显然还可以存在更多的处理器组, 比如 "第三处理器组" 、 "第四处理器组" 等。 Of course, in order to enhance the processing capability of the terminal, multiple processors can be used to process the same type of data, and the multiple processors should be treated as one processor group, then the "first processor" and the "second processor". It is also possible to actually represent a processor group for processing the same type of data, each processor group containing one or more processors. At the same time, in order to correspond to more types of data, there may obviously be more processor groups in the terminal. Such as "third processor group", "fourth processor group" and so on.
通过以上技术方案, 可以使终端内不同类型的数据, 釆用不同的处理器进行处 理, 并且针对输入处理器的数据, 可以通过类型识别而准确输入第一处理器或第二处 理器中, 避免数据交叉, 有效提升了终端的安全性。  Through the above technical solution, different types of data in the terminal can be processed by different processors, and the data input to the processor can be accurately input into the first processor or the second processor by type identification, thereby avoiding Data crossover effectively improves the security of the terminal.
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或计算机程 序产品。 因此, 本发明可釆用完全硬件实施例、 完全软件实施例、 或结合软件和硬件 方面的实施例的形式。 而且, 本发明可釆用在一个或多个其中包含有计算机可用程序 代码的计算机可用存储介质 (包括但不限于磁盘存储器、 CD-ROM、 光学存储器等) 上实施的计算机程序产品的形式。  Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer-usable storage medium (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code.
本发明是参照根据本发明实施例的方法、 设备 (系统) 、 和计算机程序产品的流 程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图和 /或方框图中的 每一流程和 /或方框、 以及流程图和 /或方框图中的流程和 /或方框的结合。 可提供这些 计算机程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设 备的处理器以产生一个机器, 使得通过计算机或其他可编程数据处理设备的处理器执 行的指令产生用于实现在流程图一个流程或多个流程和 /或方框图一个方框或多个方框 中指定的功能的装置。  The present invention has been described with reference to flowchart illustrations and/or block diagrams of a method, a device (system), and a computer program product according to an embodiment of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定 方式工作的计算机可读存储器中, 使得存储在该计算机可读存储器中的指令产生包括 指令装置的制造品, 该指令装置实现在流程图一个流程或多个流程和 /或方框图一个方 框或多个方框中指定的功能。  The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计 算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理, 从而在计算 机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和 /或方 框图一个方框或多个方框中指定的功能的步骤。 附图说明  These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram. DRAWINGS
图 1示出了相关技术中的传统单处理器的终端构架示意图;  FIG. 1 is a schematic diagram showing a terminal architecture of a conventional single processor in the related art;
图 2示出了根据本发明的一个实施例的终端结构示意图;  2 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
图 3为图 2所示的实施例的一种具体的实施方式下的终端结构示意图; 图 4为图 2所示的实施例的另一种具体的实施方式下的终端结构示意图; 图 5 示出了根据本发明的实施例的终端中的外部设备和通信模块与处理器之间的 连接结构的示意图;  3 is a schematic structural diagram of a terminal in a specific embodiment of the embodiment shown in FIG. 2; FIG. 4 is a schematic structural diagram of a terminal in another specific embodiment of the embodiment shown in FIG. A schematic diagram of a connection structure between an external device and a communication module and a processor in a terminal according to an embodiment of the present invention;
图 6 示出了根据本发明的一个实施例的对外部设备或通信模块进行监控的终端结 构示意图;  6 is a diagram showing a terminal structure for monitoring an external device or a communication module according to an embodiment of the present invention;
图 7 示出了根据本发明的另一个实施例的对外部设备或通信模块进行监控的终端 结构示意图; FIG. 7 shows a terminal for monitoring an external device or a communication module according to another embodiment of the present invention. Schematic;
图 8示出了根据本发明的另一个实施例的终端结构示意图;  FIG. 8 is a block diagram showing the structure of a terminal according to another embodiment of the present invention; FIG.
图 9为图 8所示的实施例的一种具体的实施方式下的终端结构示意图; 图 10为图 8所示的实施例的另一种具体的实施方式下的终端结构示意图。 具体实施方式  9 is a schematic structural diagram of a terminal in a specific embodiment of the embodiment shown in FIG. 8. FIG. 10 is a schematic structural diagram of a terminal in another specific embodiment of the embodiment shown in FIG. detailed description
为了能够更清楚地理解本发明的上述目的、 特征和优点, 下面结合附图和具体实 施方式对本发明进行进一步的详细描述。 需要说明的是, 在不冲突的情况下, 本申请 的实施例及实施例中的特征可以相互组合。  The present invention will be further described in detail with reference to the drawings and specific embodiments thereof. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
在下面的描述中阐述了很多具体细节以便于充分理解本发明, 但是, 本发明还可 以釆用其他不同于在此描述的其他方式来实施, 因此, 本发明的保护范围并不受下面 公开的具体实施例的限制。  In the following description, numerous specific details are set forth in order to provide a thorough understanding of the invention, but the invention may be practiced in other embodiments other than those described herein. Limitations of specific embodiments.
图 2示出了根据本发明的一个实施例的终端结构示意图。  FIG. 2 shows a schematic diagram of a terminal structure according to an embodiment of the present invention.
如图 2所示, 根据本发明的一个实施例的终端, 包括: 第一处理器 (如图 2所示 的 CPU1 ) 和第二处理器 (如图 2 所示的 CPU2 ) , 用于分别处理所述终端中不同类 型的数据。  As shown in FIG. 2, a terminal according to an embodiment of the present invention includes: a first processor (CPU1 shown in FIG. 2) and a second processor (CPU2 shown in FIG. 2) for processing separately Different types of data in the terminal.
一方面, 终端内可以对来自终端的外部设备 102 的数据进行类型识别。 具体地, 可以设置: 外设监控模块 104, 连接至所述终端的外部设备 102, 和 /或通信监控模块 106, 其中: 所述外设监控模块 104 用于对来自所述终端的外部设备 102 的数据进行 类型判断, 并根据判断结果确定将数据传输至所述第一处理器或所述第二处理器; 所 述通信监控模块 106用于对来自所述终端的通信模块 (如图 2所示的 Modem ) 的数据 进行类型判断, 并根据判断结果确定将数据传输至所述第一处理器或所述第二处理 器。  In one aspect, the type of data from the external device 102 of the terminal can be identified within the terminal. Specifically, a peripheral monitoring module 104, an external device 102 connected to the terminal, and/or a communication monitoring module 106, wherein: the peripheral monitoring module 104 is configured to external device 102 from the terminal The data is type-determined, and determines to transmit data to the first processor or the second processor according to the determination result; the communication monitoring module 106 is configured to use a communication module from the terminal (as shown in FIG. 2) The data of the illustrated Modem is type-determined, and based on the result of the determination, it is determined that the data is transmitted to the first processor or the second processor.
另一方面, 终端内可以对来自终端的外部设备 102 的数据进行类型识别。 具体 地, 可以设置: 通信监控模块 106 , 连接至所述终端的通信模块 (如图 2 所示的 Modem ) , 用于对来自所述终端的通信模块的数据进行类型判断, 并根据判断结果确 定将数据传输至所述第一处理器或所述第二处理器。  On the other hand, the type of data of the external device 102 from the terminal can be identified in the terminal. Specifically, a communication monitoring module 106, a communication module connected to the terminal (such as the Modem shown in FIG. 2), configured to perform type determination on data of the communication module from the terminal, and determine according to the determination result. Transmitting data to the first processor or the second processor.
当然, 虽然图 2 中同时示出了外设监控模块 104和通信监控模块 106, 但本领域 技术人员应该理解的是: 根据实际情况和需求, 终端内可以仅设置外设监控模块 104, 也可以仅设置通信监控模块 106, 还可以同时设置外设监控模块 104和通信监控 模块 106 , 这都是容易改动和实现的。  Of course, although the peripheral monitoring module 104 and the communication monitoring module 106 are simultaneously shown in FIG. 2, those skilled in the art should understand that: according to actual conditions and requirements, only the peripheral monitoring module 104 may be set in the terminal, or Only the communication monitoring module 106 is provided, and the peripheral monitoring module 104 and the communication monitoring module 106 can also be set at the same time, which are easy to change and implement.
在该技术方案中, 通过第一处理器和第二处理器, 分别对终端内的不同类型的数 据, 釆用不同的处理器对其进行处理, 使得数据处理过程在物理上被隔离, 有助于提 升终端的数据安全性。  In the technical solution, different types of data in the terminal are processed by different processors by the first processor and the second processor, so that the data processing process is physically isolated, which is helpful. Improve the data security of the terminal.
同时, 第一处理器和第二处理器所处理的数据, 可以分别存储在不同的存储空间 内, 比如将第一处理器处理的数据存储在仅连接至第一处理器的第一存储器中, 将第 二处理器处理的数据存储在仅连接至第二处理器的第二存储器中, 从而避免数据交 叉, 进一步提升终端的安全性。 具体地, 第一存储器和第二存储器可以包括终端的At the same time, the data processed by the first processor and the second processor can be stored in different storage spaces respectively. Having, for example, storing data processed by the first processor in a first memory connected only to the first processor, and storing data processed by the second processor in a second memory connected only to the second processor, thereby Avoid data crossover and further improve the security of the terminal. Specifically, the first memory and the second memory may include a terminal
RAM . EMMC等。 RAM. EMMC and so on.
1、 处理器的数量  1, the number of processors
需要说明的是, 第一处理器和第二处理器并不用于限制终端内的处理器数量为两 个, 而终端内实际上显然可以包含更多的处理器。 其中, "第一" 和 "第二" 代表了 终端内的任意两个处理器之间的相互关系, 用于区分任意两个被进行比较的处理器。 比如对于包含有 3个处理器的终端, 当选取处理器 1和处理器 2进行比较时, 可以将 处理器 1和处理器 2中的任一个称为 "第一处理器" , 另一个为 "第二处理器" ; 而 当选取处理器 2和处理器 3进行比较时, 可以将处理器 2和处理器 3中的任一个称为 "第一处理器" , 另一个为 "第二处理器" , 依此类推。  It should be noted that the first processor and the second processor are not used to limit the number of processors in the terminal to two, and it is obvious that more processors can be included in the terminal. Among them, "first" and "second" represent the relationship between any two processors in the terminal, and are used to distinguish any two processors that are compared. For example, for a terminal including three processors, when processor 1 and processor 2 are selected for comparison, either processor 1 and processor 2 may be referred to as "first processor" and the other is " "Second processor"; and when processor 2 and processor 3 are selected for comparison, either processor 2 and processor 3 may be referred to as "first processor" and the other as "second processor" " , So on and so forth.
当然, 为了增强终端的处理能力, 可以使用多个处理器来处理同一类数据, 则这 多个处理器应该被视为一个处理器组, 则 "第一处理器" 和 "第二处理器" 实际上还 可以表示用于处理相同类型的数据的处理器组, 每个处理器组内包含有一个或多个处 理器。 同时, 为了对应于更多类型的数据, 终端内显然还可以存在更多的处理器组, 比如 "第三处理器组" 、 "第四处理器组" 等。  Of course, in order to enhance the processing capability of the terminal, multiple processors can be used to process the same type of data, and the multiple processors should be treated as one processor group, then the "first processor" and the "second processor". It is also possible to actually represent a processor group for processing the same type of data, each processor group containing one or more processors. At the same time, in order to correspond to more types of data, it is obvious that there may be more processor groups in the terminal, such as "third processor group", "fourth processor group" and the like.
2、 数据分类  2, data classification
第一处理器和第二处理器分别用于处理终端内的不同类型的数据, 因而涉及到对 终端内的数据进行分类。 比如说, 根据数据的重要性, 将数据分为核心数据和非核心 数据; 或者根据数据的私密性, 将数据分为私密数据和非私密数据; 或者根据数据的 传输方向, 将数据分为待发送数据和接收到的数据等等。  The first processor and the second processor are respectively used to process different types of data within the terminal, and thus involve classifying data within the terminal. For example, according to the importance of the data, the data is divided into core data and non-core data; or according to the privacy of the data, the data is divided into private data and non-private data; or according to the data transmission direction, the data is divided into Send data and received data, and so on.
每种分类情况均可以由厂商来预设, 也可以由用户根据自己的实际情况来确定。 以私密数据和非私密数据的分类方式为例, 譬如一种情况下, 可以将与某些应用程序 相关联的数据都作为私密数据或非私密数据, 比如将与 "通讯录" 、 "通话记录" 、 "短信息" 、 "邮件" 等应用程序相关的数据, 不论读取还是写入, 都算作私密数 据, 或将与某个游戏应用相关的数据, 都作为非私密数据; 譬如另一种情况下, 可以 将某个类型的数据作为私密数据或非私密数据, 比如将与网上银行的交互数据都作为 私密数据, 而将软件的更新包数据作为非私密数据等, 还可以包含其他的区分方式, 此处不进行——列举。  Each classification can be preset by the manufacturer, or it can be determined by the user according to his actual situation. For example, in the case of classification of private data and non-private data, for example, data associated with certain applications can be used as private data or non-private data, such as "address book" and "call record". Application-related data such as "," "short message", "mail", whether read or written, is counted as private data, or data related to a game application is treated as non-private data; In this case, a certain type of data may be used as private data or non-private data, such as interactive data with online banking as private data, and software update package data as non-private data, etc., and may also include other The way to distinguish, not here - enumeration.
3、 数据传输  3, data transmission
通过设置专门的外设监控模块 104和 /或通信监控模块 106 , 对来自外部设备 102 和 /或通信模块的数据进行识别和分类处理, 既有助于加快处理速度, 又能够通过数据 分类而提高数据安全性。  The identification and classification of data from the external device 102 and/or the communication module by setting up a dedicated peripheral monitoring module 104 and/or communication monitoring module 106 not only helps speed up processing but also improves data classification. Data security.
针对外设监控模块 104和 /或通信监控模块 106与 CPU1或 CPU2之间釆用的连接 方式, 具体的数据传输方式可能存在差异: For the connection between the peripheral monitoring module 104 and/or the communication monitoring module 106 and the CPU 1 or CPU 2 The way, the specific data transmission method may be different:
( 1 ) 如图 2 所示, 假定外设监控模块 104 和 /或通信监控模块 106 同时连接至 CPU1 和 CPU2 , 则外设监控模块 104 和 /或通信监控模块 106 根据检测到的数据类 型, 可以直接传输至 CPU1或 CPU2。  (1) As shown in FIG. 2, assuming that the peripheral monitoring module 104 and/or the communication monitoring module 106 are simultaneously connected to the CPU 1 and the CPU 2, the peripheral monitoring module 104 and/or the communication monitoring module 106 may, depending on the type of data detected, Transfer directly to CPU1 or CPU2.
( 2 ) 如图 3 所示, 假定外设监控模块 104 和 /或通信监控模块 106 仅连接至 (2) As shown in Figure 3, it is assumed that the peripheral monitoring module 104 and/or the communication monitoring module 106 are only connected to
CPU1 , 则对于 CPU1对应的数据, 可以直接发送, 而对于 CPU2对应的数据, 需要由 CPU1进行数据转发。 CPU1 can directly transmit data corresponding to CPU1, and data corresponding to CPU2 needs to be forwarded by CPU1.
( 3 ) 如图 4 所示, 假定外设监控模块 104 和 /或通信监控模块 106 仅连接至 CPU2, 则对于 CPU2对应的数据, 可以直接发送, 而对于 CPU1对应的数据, 需要由 CPU2进行数据转发。  (3) As shown in FIG. 4, assuming that the peripheral monitoring module 104 and/or the communication monitoring module 106 are only connected to the CPU 2, the data corresponding to the CPU 2 can be directly transmitted, and for the data corresponding to the CPU 1, the data needs to be performed by the CPU 2. Forward.
在方式 (2 ) 、 (3 ) 中, 具体的数据转发方式有很多种, 比如以 (2 ) 为例, 即 由 CPU1协助 CPU2的数据交互:  In modes (2) and (3), there are many specific data forwarding methods. For example, (2), that is, CPU1 assists CPU2 in data interaction:
1 ) 外设监控模块 104和 /或通信监控模块 106为需要传输至 CPU2的数据添加标 识, 则 CPU 1接收到该数据后, 通过对标识的查看, 进而发送给 CPU2。  1) The peripheral monitoring module 104 and/or the communication monitoring module 106 add an identifier to the data that needs to be transmitted to the CPU 2, and after receiving the data, the CPU 1 transmits the data to the CPU 2 by viewing the identification.
2 ) 外设监控模块 104和 /或通信监控模块 106在发现存在需要发送至 CPU2的数 据后, 通知 CPU1 (如发送通知消息或其他预设的方式) , 并由 CPU1 对连接至外设 监控模块 104和 /或通信监控模块 106的端口、 连接至 CPU2 (或其他处理器) 的端口 之间进行配置, 以建立数据传输通道, 从而由外设监控模块 104 和 /或通信监控模块 106直接利用该数据传输通道, 将数据传输至 CPU2。  2) The peripheral monitoring module 104 and/or the communication monitoring module 106 notifies the CPU 1 (such as sending a notification message or other preset manner) after discovering that there is data that needs to be sent to the CPU 2, and is connected to the peripheral monitoring module by the CPU1. 104 and/or a port of the communication monitoring module 106, a port connected to the CPU 2 (or other processor) to configure a data transmission channel, thereby being directly utilized by the peripheral monitoring module 104 and/or the communication monitoring module 106 The data transfer channel transfers data to CPU2.
3 ) 与 2 ) 类似, 但不是建立数据传输通道, 而是通过配置端口, 建立 DMA传输 通道, 以调用 CPU1的总线的方式, 由外设监控模块 104和 /或通信监控模块 106直接 利用该 DMA传输通道, 将数据传输至 CPU2。  3) Similar to 2), but instead of establishing a data transmission channel, a DMA transmission channel is established by configuring a port to directly use the DMA by the peripheral monitoring module 104 and/or the communication monitoring module 106 in a manner of calling the bus of the CPU1. Transfer channel to transfer data to CPU2.
4、 外部设备和 Modem的类型  4. Types of external devices and modems
如图 5所示, 针对图 2所示的终端内的外部设备 102, 根据其与 CPU1 和 CPU2 的连接关系, 可以分为: 仅连接至 CPU1的限制类外部设备 102A、 仅连接至 CPU2的 非限制类外部设备 102B和同时连接至 CPU1、 CPU2的共享类外部设备 102C。  As shown in FIG. 5, the external device 102 in the terminal shown in FIG. 2 can be divided into: a restricted external device 102A connected only to the CPU 1 and a non-connected only to the CPU 2 according to the connection relationship with the CPU 1 and the CPU 2. The class external device 102B is restricted and the shared class external device 102C is simultaneously connected to the CPU 1, CPU 2.
针对图 2所示的终端内的 Modem, 才艮据其与 CPU1和 CPU2的连接关系, 可以分 为: 仅连接至 CPU1 的 Modeml、 仅连接至 CPU2的 Modem2和同时连接至 CPU1、 CPU2的 Modem3。  For the Modem in the terminal shown in Figure 2, according to its connection relationship with CPU1 and CPU2, it can be divided into: Modeml connected only to CPU1, Modem2 connected only to CPU2, and Modem3 connected to CPU1 and CPU2 at the same time.
具体釆用哪种连接方式, 实际上也涉及到对外部设备 102 和 Modem 的分类。 例 如可以根据每个外部设备 102/Modem 所涉及到的数据类型的不同, 从而对其进行归 类。 比如, 当某个外部设备 102/Modem 处理的数据更多的 (大于或等于预设的数据 量) 是重要性高、 私密性高的数据, 则可以使其仅连接至 CPU1 (专用于处理重要性 高、 私密性高的数据的处理器) ; 而当某个外部设备 102/Modem 处理的各种类型的 数据都差不多, 则可以使其同时连接至 CPU1 和 CPU2 (即同时连接至所有处理 器) , 以便于加快数据交互效率; 当某个外部设备处理的数据更多的是重要性低、 私 密性低的数据, 则可以将其仅连接至 CPU2。 The specific connection method used actually involves the classification of the external device 102 and the Modem. For example, it can be classified according to the type of data involved in each external device 102/Modem. For example, when more data (greater than or equal to the preset amount of data) processed by an external device 102/Modem is data of high importance and high privacy, it can be connected only to CPU1 (dedicated for handling important A processor with high data and high privacy; and when an external device 102/Modem processes all types of data, it can be connected to both CPU1 and CPU2 (ie, simultaneously connected to all processing) In order to speed up data interaction efficiency; when an external device processes more data with low importance and low privacy, it can be connected to CPU2 only.
或者, 也可以根据每个外部设备 102/Modem 与处理器之间的关系, 从而对其进 行归类。 比如, 当某个外部设备 102/Modem 与第一处理器的交互频繁, 则可以使其 仅连接至第一处理器; 当某个外部设备 102/Modem 与第二处理器的交互频繁, 则可 以将其仅连接至第二处理器; 其余的可以同时连接至所有处理器。  Alternatively, it can be categorized according to the relationship between each external device 102/Modem and the processor. For example, when an external device 102/Modem interacts with the first processor frequently, it can be connected only to the first processor; when an external device 102/Modem interacts with the second processor frequently, Connect it only to the second processor; the rest can be connected to all processors at the same time.
需要说明的是, 虽然图 2 中简要示意为外部设备 102连接至外设监控模块 104、 Modem连接至通信监控模块 106 , 但实际上, 图 2所示的 "外部设备 102" 并不表示 终端内仅包含一个外部设备, " Modem" 也不表示终端内仅包含一个 Modem; 图 2 中的 "外部设备 102" 、 "Modem" 其实际上应当表示为一个或多个外部设备构成的 集合、 以及一个或多个 Modem构成的集合。  It should be noted that although the external device 102 is connected to the peripheral monitoring module 104 and the Modem is connected to the communication monitoring module 106, in fact, the "external device 102" shown in FIG. 2 does not represent the terminal. Contains only one external device, "Modem" does not mean that only one Modem is included in the terminal; "External Device 102", "Modem" in Figure 2 should actually be represented as a collection of one or more external devices, and one Or a collection of multiple modems.
那么, 对于 "集合" 内的外部设备 102或 Modem与外设监控模块 104或通信监 控模块 106之间的连接关系, 并不限于图 2所示。 下面结合图 6和图 7进行具体说 明, 其中, 由于外部设备 102 和 Modem 的连接方式类似, 因而将两者共同进行描 述, 并使用 "监控模块" 替代了具体的 "外设监控模块 104 " 或 "通信监控模块 106" , 但显然外部设备 102对应于外设监控模块 104 , Modem对应于通信监控模块 106。  Then, the connection relationship between the external device 102 or Modem in the "set" and the peripheral monitoring module 104 or the communication monitoring module 106 is not limited to that shown in FIG. The following is a detailed description with reference to FIG. 6 and FIG. 7. Where, because the connection mode of the external device 102 and the Modem is similar, the two are described together, and the "monitoring module" is used instead of the specific "peripheral monitoring module 104" or "Communication Monitoring Module 106", but it is apparent that the external device 102 corresponds to the peripheral monitoring module 104, and the Modem corresponds to the communication monitoring module 106.
以终端内包含外部设备 1、 外部设备 2为例进行说明。 在一种情况下, 如图 6所 示, 外部设备 1、 外部设备 2 等多个外部设备都连接至同一个监控模块, 则有助于减 少使用的监控模块的数量, 降低终端复杂度; 在另一种情况下, 如图 7 所示, 外部设 备 1、 外部设备 2 等多个外部设备, 分别各自连接至对应的监控模块, 比如外部设备 1 连接至监控模块 1、 外部设备 2连接至监控模块 2等, 有助于降低每个监控模块的 计算量, 提高数据处理效率。  The external device 1 and the external device 2 are included in the terminal as an example. In one case, as shown in FIG. 6, multiple external devices such as the external device 1, the external device 2, and the like are connected to the same monitoring module, which helps reduce the number of monitoring modules used and reduces the complexity of the terminal; In another case, as shown in FIG. 7, a plurality of external devices such as an external device 1, an external device 2, and the like are respectively connected to corresponding monitoring modules, for example, the external device 1 is connected to the monitoring module 1, and the external device 2 is connected to the monitoring device. Module 2, etc., helps to reduce the calculation amount of each monitoring module and improve data processing efficiency.
其中, 上述的外部设备 1、 外部设备 2 等的具体连接方式, 也可以应用于 Modeml、 Modem2 等通信模块, 具体不再赘述。 同时, 虽然图 6 中釆用了监控模块 直接连接至 CPU1、 CPU2的方式, 图 7中釆用了监控模块 1、 监控模块 2分别仅连接 至 CPU1、 CPU2的方式, 但这仅用于具体的举例, 其实际上显然可以釆用如图 2-4中 所示的任一种具体的连接方式。  The specific connection modes of the external device 1 and the external device 2 can also be applied to communication modules such as Modeml and Modem2, and details are not described herein. At the same time, although the way in which the monitoring module is directly connected to the CPU1 and CPU2 is used in Fig. 6, the monitoring module 1 and the monitoring module 2 are connected to the CPU1 and CPU2 respectively, but this is only for the specific For example, it is actually possible to use any of the specific connections as shown in Figures 2-4.
除了使用单独的外设监控模块 104和 /或通信监控模块 106 , 实际上还可以釆用其 他方式实现对外部设备和 /或通信模块内的数据类型的识别。  In addition to using a separate peripheral monitoring module 104 and/or communication monitoring module 106, the identification of data types within external devices and/or communication modules can be implemented in other ways.
实施方式一: 由处理器进行数据的类型监控  Embodiment 1: Data type monitoring by a processor
一、 仅由单个处理器执行数据的类型监控  1. Type monitoring of data performed by a single processor
如图 8 所示, 假定由 CPU1 执行数据的类型监控, 即仅在 CPU1 内设置 "监控 器" 功能。 与 CPU1相连的外部设备 102和 Modem, 包括仅连接至 CPU1或同时连接 至 CPU1、 CPU2 , 将数据都传输至 CPU1 , 由 CPU1 识别出其具体的数据类型, 并由 CPU1根据判断结果确定直接处理数据或将数据转发至 CPU2。 As shown in Figure 8, it is assumed that the type monitoring of data is performed by CPU1, that is, the "Monitor" function is set only in CPU1. The external device 102 and Modem connected to the CPU 1 include only connected to the CPU 1 or simultaneously connected to the CPU 1 and the CPU 2, and the data is transmitted to the CPU 1 , and the specific data type is recognized by the CPU 1 and The CPU 1 determines to directly process the data or forward the data to the CPU 2 based on the result of the determination.
对于与 CPU2相连的外部设备 102和 Modem, 包括仅连接至 CPU2或同时连接至 CPU1、 CPU2 , 可以首先由 CPU2 将数据直接转发至 CPU1 , 然后由 CPU1 根据判断 结果确定直接处理数据或将数据转发至 CPU2。  For the external device 102 and Modem connected to the CPU 2, including only connecting to the CPU 2 or simultaneously connected to the CPU 1, CPU 2, the data can be directly forwarded to the CPU 1 by the CPU 2, and then the CPU 1 determines whether to directly process the data or forward the data to the CPU 1 according to the judgment result. CPU2.
特别地, CPU1 可以是终端内用于处理重要性高、 私密性高的数据的处理器, 使 得尽可能避免由其他处理器先对数据进行解析, 降低重要、 私密数据被窃取、 外泄的 可能性。  In particular, the CPU 1 may be a processor in the terminal for processing data of high importance and high privacy, so as to avoid data parsing by other processors as much as possible, thereby reducing the possibility of stealing and leaking important and private data. Sex.
二、 由多个处理器执行数据的类型监控  Second, the type monitoring of data performed by multiple processors
如图 8所示, 假定由 CPU1和 CPU2执行数据的类型监控, 即在 CPU1和 CPU2 内都设置 "监控器" 功能。 CPU1 和 CPU2 可以接收各自相连的外部设备 102 或 Modem传输过来的数据, 并对数据类型进行识别, 且根据识别结果, 确定自身直接处 理, 或转发至其他处理器进行处理。  As shown in Fig. 8, it is assumed that the type monitoring of data is performed by CPU1 and CPU2, that is, the "monitor" function is set in both CPU1 and CPU2. CPU1 and CPU2 can receive the data transmitted from the connected external device 102 or Modem, identify the data type, and determine whether to directly process it according to the recognition result, or forward it to other processors for processing.
通过多个处理器分别进行数据的类型识别和处理, 有助于降低单个 CPU 的运算 负担, 提高数据的运算效率。  Data identification and processing by multiple processors can help reduce the computational burden of a single CPU and improve the computational efficiency of data.
实施方式二: 由 Modem进行数据的类型监控  Embodiment 2: Type monitoring of data by Modem
由终端内的 Modem 直接对接收到的数据进行类型识别, 并根据识别结果, 确定 应当由哪个 CPU 进行处理。 虽然终端内可能存在一个或多个 Modem , 但对于每个 Modem, 其与 CPU的具体连接方式都是相同或相似的。 下面以某个具体的 Modem为 例, 说明其与 CPU之间的连接关系。  The received data is type-recognized directly by the modem in the terminal, and based on the recognition result, it is determined which CPU should be processed. Although there may be one or more Modems in the terminal, for each Modem, the specific connection with the CPU is the same or similar. The following takes a specific Modem as an example to illustrate the connection relationship between it and the CPU.
一、 同时连接至所有 CPU  First, connect to all CPUs at the same time
如图 9所示, Modem与终端内的所有 CPU都建立连接, 比如同时连接至 CPU1 和 CPU2 , 则当 Modem需要将数据传输至任意一个 CPU时, 都可以直接传输即可。  As shown in Figure 9, the Modem establishes a connection with all CPUs in the terminal. For example, if it is connected to CPU1 and CPU2 at the same time, when the Modem needs to transfer data to any CPU, it can be directly transmitted.
二、 仅连接至某个 CPU  Second, only connect to a certain CPU
如图 10所示, Modem仅与终端内的某个预设的 CPU相连, 比如 Modeml仅连接 至 CPU1、 Modem2 仅连接至 CPU2 , 则当 Modeml 需要将数据传输至 CPU2、 As shown in Figure 10, the Modem is only connected to a preset CPU in the terminal. For example, Modeml is only connected to CPU1, Modem2 is only connected to CPU2, then Modeml needs to transfer data to CPU2.
Modem2需要将数据传输至 CPU1时, 需要由 CPU1、 CPU2执行数据转发。 When Modem2 needs to transfer data to CPU1, it needs to perform data forwarding by CPU1 and CPU2.
当然, 图 10均为一种具体的实施方式, 实际上, 终端内的多个 Modem可以分别 仅连接至同一个 CPU , 比如 Modeml和 Modem2可以都仅连接至 CPU1 , 从而有助于 提高数据的安全性, 避免恶意应用通过 CPU2接收到部分数据。  Of course, FIG. 10 is a specific implementation manner. In fact, multiple modems in the terminal can be connected to only the same CPU, for example, Modeml and Modem2 can be connected only to CPU1, thereby helping to improve data security. Sexuality, to avoid malicious applications receiving some data through CPU2.
此外, 在本发明的任一技术方案中, 优选地, 还可以包括: 更新单元 (图中未示 出) , 根据接收到的更新指令, 更新对数据进行判断的判定条件, 以使监控模块根据 更新后的判定条件进行私密数据和非私密数据的判断, 该监控模块可以为图 2-4 所示 的外设监控模块 104和 /或通信监控模块 106 , 也可以为图 8所示的 CPU1和 CPU2 , 也可以为图 9- 10中所示的 Modem (或 Modeml和 Modem2 ) 。  In addition, in any aspect of the present invention, preferably, the method further includes: an update unit (not shown), and updating, according to the received update instruction, a determination condition for determining the data, so that the monitoring module is configured according to The updated determination condition is to judge the private data and the non-private data. The monitoring module may be the peripheral monitoring module 104 and/or the communication monitoring module 106 shown in FIG. 2-4, or may be the CPU1 shown in FIG. CPU2 can also be the Modem (or Modeml and Modem2) shown in Figure 9-10.
在该技术方案中, 随着终端业务的增多, 用户的私密数据的种类也将发生变化, 比如在通信业务中, 短信、 通信录等属于用户的私密数据; 在终端系统中, 开关机密 码、 应用保护密码、 终端防盗密码以及屏幕解锁密码等也属于用户的私密数据, 通过 对数据稀选的判断条件的更新, 使得对数据的稀选更加准确, 从而确保用户私密数据 的安全性。 In this technical solution, as the terminal service increases, the type of the user's private data will also change. For example, in the communication service, the short message, the address book, and the like belong to the user's private data; in the terminal system, the power on/off password, the application protection password, the terminal anti-theft password, and the screen unlock password are also private data of the user, and the data is selected by thinning. The update of the judgment conditions makes the selection of data more accurate, thereby ensuring the security of the user's private data.
本领域内的技术人员应明白, 本发明的实施例可提供为方法、 系统、 或计算机程 序产品。 因此, 本发明可釆用完全硬件实施例、 完全软件实施例、 或结合软件和硬件 方面的实施例的形式。 而且, 本发明可釆用在一个或多个其中包含有计算机可用程序 代码的计算机可用存储介质 (包括但不限于磁盘存储器、 CD-ROM、 光学存储器等) 上实施的计算机程序产品的形式。  Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can be embodied in the form of one or more computer program products embodied on a computer-usable storage medium (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer usable program code.
本发明是参照根据本发明实施例的方法、 设备 (系统) 、 和计算机程序产品的流 程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图和 /或方框图中的 每一流程和 /或方框、 以及流程图和 /或方框图中的流程和 /或方框的结合。 可提供这些 计算机程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设 备的处理器以产生一个机器, 使得通过计算机或其他可编程数据处理设备的处理器执 行的指令产生用于实现在流程图一个流程或多个流程和 /或方框图一个方框或多个方框 中指定的功能的装置。  The present invention has been described with reference to flowchart illustrations and/or block diagrams of a method, a device (system), and a computer program product according to an embodiment of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定 方式工作的计算机可读存储器中, 使得存储在该计算机可读存储器中的指令产生包括 指令装置的制造品, 该指令装置实现在流程图一个流程或多个流程和 /或方框图一个方 框或多个方框中指定的功能。  The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计 算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理, 从而在计算 机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和 /或方 框图一个方框或多个方框中指定的功能的步骤。  These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
以上结合附图详细说明了本发明的技术方案, 本文提出了一种终端, 可以使终端 内不同类型的数据, 釆用不同的处理器进行处理, 并且针对输入处理器的数据, 可以 通过类型识别而准确输入第一处理器或第二处理器中, 避免数据交叉, 有效提升了终 端的安全性。  The technical solution of the present invention is described in detail above with reference to the accompanying drawings. In this paper, a terminal is provided, which can make different types of data in the terminal be processed by different processors, and can be identified by type for data input to the processor. Accurate input into the first processor or the second processor avoids data crossover and effectively improves the security of the terminal.
在本发明中, 术语"第一"、 "第二 "仅用于描述目的, 而不能理解为指示或暗示相 对重要性。 术语"多个"指两个或两个以上, 除非另有明确的限定。  In the present invention, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The term "plurality" refers to two or more, unless specifically defined otherwise.
以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技 术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的 任何修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。  The above description is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claim
1. 一种终端, 其特征在于, 包括: A terminal, comprising:
第一处理器和第二处理器, 用于分别处理所述终端中不同类型的数据; 外设监控模块, 连接至所述终端的外部设备, 用于对来自所述终端的外部设备的 数据进行类型判断, 并根据判断结果确定将数据传输至所述第一处理器或所述第二处 理器。  a first processor and a second processor, configured to separately process different types of data in the terminal; a peripheral monitoring module, connected to an external device of the terminal, configured to perform data on an external device from the terminal Type determining, and determining to transmit data to the first processor or the second processor according to the result of the determination.
2. 根据权利要求 1所述的终端, 其特征在于, 所述外设监控模块还用于: 在与所述第一处理器或所述第二处理器之间存在通路的情况下, 将数据直接传输 至所述第一处理器或所述第二处理器;  The terminal according to claim 1, wherein the peripheral monitoring module is further configured to: when there is a path between the first processor or the second processor, Directly transmitted to the first processor or the second processor;
在仅与所述第一处理器之间存在通路的情况下, 为需要传输至所述第二处理器的 数据添加标识, 以由所述第一处理器转发至所述第二处理器;  Adding an identifier to data that needs to be transmitted to the second processor for forwarding to the second processor by the first processor, in the case where there is only a path between the first processor;
在仅与所述第二处理器之间存在通路的情况下, 为需要传输至所述第一处理器的 数据添加标识, 以由所述第二处理器转发至所述第一处理器。  In the case where there is only a path between the second processor, an identification is added to the data that needs to be transmitted to the first processor for forwarding by the second processor to the first processor.
3. 根据权利要求 2所述的终端, 其特征在于, 还包括:  The terminal according to claim 2, further comprising:
限制类外部设备, 连接至所述外设监控模块的一端, 且所述外设监控模块的另一 端连接至所述第一处理器;  Restricting an external device, connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is connected to the first processor;
其中, 所述外设监控模块对来自所述限制类外部设备的数据进行类型判断, 将对 应于所述第一处理器的数据直接传输至所述第一处理器, 并为需要传输至所述第二处 理器的数据添加标识, 以由所述第一处理器转发至所述第二处理器。  The peripheral monitoring module performs type determination on data from the restricted external device, directly transmits data corresponding to the first processor to the first processor, and needs to transmit to the first processor The data of the second processor adds an identification to be forwarded by the first processor to the second processor.
4. 根据权利要求 2所述的终端, 其特征在于, 还包括:  The terminal according to claim 2, further comprising:
非限制类外部设备, 连接至所述外设监控模块的一端, 且所述外设监控模块的另 一端连接至所述第二处理器;  a non-limiting external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is connected to the second processor;
其中, 所述外设监控模块对来自所述非限制类外部设备的数据进行类型判断, 将 对应于所述第二处理器的数据直接传输至所述第二处理器, 并为需要传输至所述第一 处理器的数据添加标识, 以由所述第二处理器转发至所述第一处理器。  The peripheral monitoring module performs type determination on data from the non-restricted external device, and directly transmits data corresponding to the second processor to the second processor, and needs to transmit to the The data of the first processor adds an identification to be forwarded by the second processor to the first processor.
5. 根据权利要求 2所述的终端, 其特征在于, 还包括:  The terminal according to claim 2, further comprising:
共享类外部设备, 连接至所述外设监控模块的一端, 且所述外设监控模块的另一 端同时分别连接至所述第一处理器和所述第二处理器;  a shared external device connected to one end of the peripheral monitoring module, and the other end of the peripheral monitoring module is simultaneously connected to the first processor and the second processor respectively;
其中, 所述外设监控模块对来自所述共享类外部设备的数据进行类型判断, 并根 据判断结果将数据传输至所述第一处理器或所述第二处理器。  The peripheral monitoring module performs type determination on data from the shared external device, and transmits data to the first processor or the second processor according to the determination result.
6. 根据权利要求 1 至 5 中任一项所述的终端, 其特征在于, 所述第一处理器用 于处理所述终端内的私密数据, 所述第二处理器用于处理所述终端内的非私密数据。  The terminal according to any one of claims 1 to 5, wherein the first processor is configured to process private data in the terminal, and the second processor is configured to process the terminal in the terminal Non-private data.
7. 根据权利要求 6所述的终端, 其特征在于, 所述外设监控模块还用于: 判断来自所述终端的外部设备的数据对应于受保护应用或不受保护应用, 其中, 判定对应于所述受保护应用的数据为私密数据, 对应于所述不受保护应用的数据为非 私密数据。 The terminal according to claim 6, wherein the peripheral monitoring module is further configured to: determine that data of an external device from the terminal corresponds to a protected application or an unprotected application, where It is determined that the data corresponding to the protected application is private data, and the data corresponding to the unprotected application is non-private data.
8. 一种终端, 其特征在于, 包括:  8. A terminal, comprising:
第一处理器和第二处理器, 用于分别处理所述终端中不同类型的数据; 通信监控模块, 连接至所述终端的通信模块, 用于对来自所述终端的通信模块的 数据进行类型判断, 并根据判断结果确定将数据传输至所述第一处理器或所述第二处 理器。  a first processor and a second processor, configured to separately process different types of data in the terminal; a communication monitoring module, a communication module connected to the terminal, configured to perform data type on the communication module from the terminal Judging, and determining to transmit data to the first processor or the second processor according to the judgment result.
9. 根据权利要求 8所述的终端, 其特征在于, 所述通信监控模块还用于: 在与所述第一处理器或所述第二处理器之间存在通路的情况下, 将数据直接传输 至所述第一处理器或所述第二处理器;  The terminal according to claim 8, wherein the communication monitoring module is further configured to: directly direct data in a path between the first processor or the second processor Transmitting to the first processor or the second processor;
在仅与所述第一处理器之间存在通路的情况下, 为需要传输至所述第二处理器的 数据添加标识, 以由所述第一处理器转发至所述第二处理器;  Adding an identifier to data that needs to be transmitted to the second processor for forwarding to the second processor by the first processor, in the case where there is only a path between the first processor;
在仅与所述第二处理器之间存在通路的情况下, 为需要传输至所述第一处理器的 数据添加标识, 以由所述第二处理器转发至所述第一处理器。  In the case where there is only a path between the second processor, an identification is added to the data that needs to be transmitted to the first processor for forwarding by the second processor to the first processor.
10. 根据权利要求 9所述的终端, 其特征在于, 还包括:  The terminal according to claim 9, further comprising:
限制类通信模块, 连接至所述通信监控模块的一端, 且所述通信监控模块的另一 端连接至所述第一处理器;  a restriction type communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is connected to the first processor;
其中, 所述通信监控模块对来自所述限制类通信模块的数据进行类型判断, 将对 应于所述第一处理器的数据直接传输至所述第一处理器, 并为需要传输至所述第二处 理器的数据添加标识, 以由所述第一处理器转发至所述第二处理器。  The communication monitoring module performs type determination on data from the restricted communication module, directly transmits data corresponding to the first processor to the first processor, and needs to transmit to the first The data of the second processor adds an identification to be forwarded by the first processor to the second processor.
1 1. 根据权利要求 9所述的终端, 其特征在于, 还包括:  The terminal according to claim 9, further comprising:
非限制类通信模块, 连接至所述通信监控模块的一端, 且所述通信监控模块的另 一端连接至所述第二处理器;  An unrestricted communication module is connected to one end of the communication monitoring module, and the other end of the communication monitoring module is connected to the second processor;
其中, 所述通信监控模块对来自所述非限制类通信模块的数据进行类型判断, 将 对应于所述第二处理器的数据直接传输至所述第二处理器, 并为需要传输至所述第一 处理器的数据添加标识, 以由所述第二处理器转发至所述第一处理器。  The communication monitoring module performs type determination on data from the unrestricted communication module, and directly transmits data corresponding to the second processor to the second processor, and needs to transmit to the The data of the first processor adds an identification to be forwarded by the second processor to the first processor.
12. 根据权利要求 9所述的终端, 其特征在于, 还包括:  The terminal according to claim 9, further comprising:
共享类通信模块, 连接至所述通信监控模块的一端, 且所述通信监控模块的另一 端同时分别连接至所述第一处理器和所述第二处理器;  a shared communication module, connected to one end of the communication monitoring module, and the other end of the communication monitoring module is simultaneously connected to the first processor and the second processor, respectively;
其中, 所述通信监控模块对来自所述共享类通信模块的数据进行类型判断, 并根 据判断结果将数据传输至所述第一处理器或所述第二处理器。  The communication monitoring module performs type determination on data from the shared communication module, and transmits data to the first processor or the second processor according to the determination result.
13. 根据权利要求 8 至 12 中任一项所述的终端, 其特征在于, 所述第一处理器 用于处理所述终端内的私密数据, 所述第二处理器用于处理所述终端内的非私密数 据。  The terminal according to any one of claims 8 to 12, wherein the first processor is configured to process private data in the terminal, and the second processor is configured to process the terminal in the terminal. Non-private data.
14. 根据权利要求 13所述的终端, 其特征在于, 所述通信监控模块还用于: 判断来自所述终端的通信模块的数据对应于受保护应用或不受保护应用, 其中, 判定对应于所述受保护应用的数据为私密数据, 对应于所述不受保护应用的数据为非 私密数据。 The terminal according to claim 13, wherein the communication monitoring module is further configured to: Determining that the data of the communication module from the terminal corresponds to a protected application or an unprotected application, wherein the data corresponding to the protected application is determined to be private data, and the data corresponding to the unprotected application is non-private data.
15. 一种终端, 其特征在于, 包括:  15. A terminal, comprising:
第一处理器和第二处理器, 用于分别处理所述终端中不同类型的数据; 其中, 所述第一处理器还用于: 对来自相连的至少一个外部设备和 /或至少一个通 信模块的数据进行类型判断, 并根据判断结果确定自行处理接收到的数据, 或将数据 传输至所述第二处理器。  a first processor and a second processor, configured to separately process different types of data in the terminal; wherein the first processor is further configured to: connect at least one external device and/or at least one communication module from the connection The data is subjected to type determination, and it is determined according to the judgment result that the received data is processed by itself or transmitted to the second processor.
16. 根据权利要求 15所述的终端, 其特征在于, 还包括:  The terminal according to claim 15, further comprising:
限制类外部设备, 仅连接至所述第一处理器;  Restricting external devices, only connected to the first processor;
非限制类外部设备, 仅连接至所述第二处理器;  Non-restricted external device, only connected to the second processor;
其中, 所述第一处理器直接接收来自所述限制类外部设备的数据, 并接收所述第 二处理器直接转发的来自所述非限制类外部设备的数据, 且根据对来自所述限制类外 部设备或所述非限制类外部设备的数据进行类型判断的结果, 确定自行处理接收到的 数据, 或将数据传输至所述第二处理器。  The first processor directly receives data from the restricted external device, and receives data from the non-restricted external device directly forwarded by the second processor, and according to the pair from the restricted class As a result of the type determination of the data of the external device or the non-restricted external device, it is determined that the received data is processed by itself or transmitted to the second processor.
17. 根据权利要求 15 所述的终端, 其特征在于, 所述第二处理器还用于: 对来 自相连的至少一个外部设备和 /或至少一个通信模块的数据进行类型判断, 并根据判断 结果确定自行处理接收到的数据, 或将数据传输至所述第一处理器。  The terminal according to claim 15, wherein the second processor is further configured to: perform type determination on data from the connected at least one external device and/or the at least one communication module, and according to the determination result It is determined that the received data is processed by itself or transmitted to the first processor.
18. 根据权利要求 17所述的终端, 其特征在于, 还包括:  The terminal according to claim 17, further comprising:
限制类外部设备, 仅连接至所述第一处理器;  Restricting external devices, only connected to the first processor;
非限制类外部设备, 仅连接至所述第二处理器;  Non-restricted external device, only connected to the second processor;
其中, 所述第一处理器接收来自所述限制类外部设备的数据, 并根据对接收到的 数据进行类型判断的结果, 确定自行处理接收到的数据, 或将数据传输至所述第二处 理器;  The first processor receives data from the restricted external device, and determines to process the received data by itself or transmits the data to the second processing according to a result of performing type determination on the received data. Device
所述第二处理器接收来自所述非限制类外部设备的数据, 并根据对接收到的数据 进行类型判断的结果, 确定自行处理接收到的数据, 或将数据传输至所述第一处理 器。  The second processor receives data from the non-restricted external device, and determines to process the received data by itself or transmit the data to the first processor according to a result of performing type determination on the received data. .
19. 根据权利要求 15至 18 中任一项所述的终端, 其特征在于, 所述第一处理器 用于处理所述终端内的私密数据, 所述第二处理器用于处理所述终端内的非私密数 据。  The terminal according to any one of claims 15 to 18, wherein the first processor is configured to process private data in the terminal, and the second processor is configured to process the terminal in the terminal. Non-private data.
20. 根据权利要求 19 所述的终端, 其特征在于, 所述私密数据为对应于受保护 应用的数据, 所述非私密数据为对应于不受保护应用的数据。  The terminal according to claim 19, wherein the private data is data corresponding to a protected application, and the non-private data is data corresponding to an unprotected application.
21. 一种终端, 其特征在于, 包括:  21. A terminal, comprising:
第一处理器和第二处理器, 用于分别处理所述终端中不同类型的数据; 通信模块, 用于对接收到的来自外部通信设备的数据进行类型判断, 并根据判断 结果确定将数据传输至所述第一处理器或所述第二处理器。 a first processor and a second processor, configured to separately process different types of data in the terminal; a communication module, configured to perform type determination on the received data from the external communication device, and determine As a result, it is determined that the data is transmitted to the first processor or the second processor.
22. 根据权利要求 21所述的终端, 其特征在于, 所述通信模块还用于: 在与所述第一处理器或所述第二处理器之间存在通路的情况下, 将数据直接传输 至所述第一处理器或所述第二处理器;  The terminal according to claim 21, wherein the communication module is further configured to: directly transmit data when there is a path between the first processor or the second processor To the first processor or the second processor;
在仅与所述第一处理器之间存在通路的情况下, 为需要传输至所述第二处理器的 数据添加标识, 以由所述第一处理器转发至所述第二处理器;  Adding an identifier to data that needs to be transmitted to the second processor for forwarding to the second processor by the first processor, in the case where there is only a path between the first processor;
在仅与所述第二处理器之间存在通路的情况下, 为需要传输至所述第一处理器的 数据添加标识, 以由所述第二处理器转发至所述第一处理器。  In the case where there is only a path between the second processor, an identification is added to the data that needs to be transmitted to the first processor for forwarding by the second processor to the first processor.
23. 根据权利要求 21或 22所述的终端, 其特征在于, 所述第一处理器用于处理 所述终端内的私密数据, 所述第二处理器用于处理所述终端内的非私密数据。  The terminal according to claim 21 or 22, wherein the first processor is configured to process private data in the terminal, and the second processor is configured to process non-private data in the terminal.
24. 根据权利要求 23所述的终端, 其特征在于, 所述通信模块还用于: 判断来自所述外部通信设备的数据对应于受保护应用或不受保护应用, 其中, 判 定对应于所述受保护应用的数据为私密数据, 对应于所述不受保护应用的数据为非私 密数据。  The terminal according to claim 23, wherein the communication module is further configured to: determine that data from the external communication device corresponds to a protected application or an unprotected application, wherein the determining corresponds to the The data of the protected application is private data, and the data corresponding to the unprotected application is non-private data.
PCT/CN2013/084356 2013-07-30 2013-09-26 Terminal WO2015014015A1 (en)

Applications Claiming Priority (16)

Application Number Priority Date Filing Date Title
CN201310326690.5A CN103369148B (en) 2013-07-30 2013-07-30 Terminal and data processing method
CN201310327027.7 2013-07-30
CN201310325472XA CN103402013A (en) 2013-07-30 2013-07-30 Terminal and data processing method
CN2013103270277A CN103391190A (en) 2013-07-30 2013-07-30 Terminal and data processing method
CN201310326703.9A CN103390138B (en) 2013-07-30 2013-07-30 A kind of terminal
CN201310326660.4 2013-07-30
CN201310326660.4A CN103400086B (en) 2013-07-30 2013-07-30 A kind of terminal
CN2013103267221A CN103391189A (en) 2013-07-30 2013-07-30 Terminal and data processing method
CN201310325472.X 2013-07-30
CN201310325602.X 2013-07-30
CN201310326690.5 2013-07-30
CN201310325602.XA CN103402014B (en) 2013-07-30 2013-07-30 Terminal and data processing method
CN201310326722.1 2013-07-30
CN201310325579.4A CN103400084B (en) 2013-07-30 2013-07-30 A kind of terminal
CN201310326703.9 2013-07-30
CN201310325579.4 2013-07-30

Publications (1)

Publication Number Publication Date
WO2015014015A1 true WO2015014015A1 (en) 2015-02-05

Family

ID=52430917

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/084356 WO2015014015A1 (en) 2013-07-30 2013-09-26 Terminal

Country Status (1)

Country Link
WO (1) WO2015014015A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794256A (en) * 2004-12-23 2006-06-28 因芬尼昂技术股份公司 Data processing device, telecommunication terminal equipment and method for processing data by data processing equipment
CN101304322A (en) * 2008-06-30 2008-11-12 杭州华三通信技术有限公司 Network equipment and packet forwarding method
CN101860894A (en) * 2010-03-04 2010-10-13 宇龙计算机通信科技(深圳)有限公司 System, method and mobile terminal for communication between mobile terminal processors
CN102857999A (en) * 2012-05-14 2013-01-02 中兴通讯股份有限公司 Multimode terminal and service implementation method for multimode terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794256A (en) * 2004-12-23 2006-06-28 因芬尼昂技术股份公司 Data processing device, telecommunication terminal equipment and method for processing data by data processing equipment
CN101304322A (en) * 2008-06-30 2008-11-12 杭州华三通信技术有限公司 Network equipment and packet forwarding method
CN101860894A (en) * 2010-03-04 2010-10-13 宇龙计算机通信科技(深圳)有限公司 System, method and mobile terminal for communication between mobile terminal processors
CN102857999A (en) * 2012-05-14 2013-01-02 中兴通讯股份有限公司 Multimode terminal and service implementation method for multimode terminal

Similar Documents

Publication Publication Date Title
US10678913B2 (en) Apparatus and method for enhancing security of data on a host computing device and a peripheral device
EP3329416B1 (en) Secure input/output device management
CN104216761B (en) It is a kind of that the method for sharing equipment is used in the device that can run two kinds of operating system
US11294846B2 (en) System, apparatus and method for secure communication on a bus
KR101491293B1 (en) Gateway apparatus and message routing method thereof
WO2016049076A1 (en) Securing audio communications
US20230071723A1 (en) Technologies for establishing secure channel between i/o subsystem and trusted application for secure i/o data transfer
WO2017016070A1 (en) Sharing method, sharing apparatus and sharing system for virtual sim card
WO2019154175A1 (en) Method and system for accessing resource services
TWI541657B (en) Electronic device providing real-time switching and sharing of usb electronic apparatuses among hosts
WO2017105768A1 (en) Technologies for protecting audio data with trusted i/o
WO2016082549A1 (en) Method and apparatus for establishing device mapping
CN113449347B (en) Microprocessor, data processing method, electronic device, and storage medium
WO2016136223A1 (en) Interconnection device, management device, resource-disaggregated computer system, method, and program
US11727153B2 (en) Multi-master security circuit
WO2016115833A1 (en) Data processing apparatus and data processing method
AU2015301504B2 (en) End point secured network
WO2015014015A1 (en) Terminal
US10585689B1 (en) Shared memory interface for application processes
US20230025979A1 (en) Systems and methods for peripheral device security
CN106899545A (en) A kind of system and method for terminal security communication
WO2015014017A1 (en) Terminal, load balancing method, and load balancing apparatus
JP2015216450A (en) Information processing apparatus, information processing system and relay program
TWM494348U (en) Electronic device providing real-time switching and sharing of USB electronic apparatuses among hosts
CN113449331B (en) Microprocessor, data processing method, electronic device, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13890338

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13890338

Country of ref document: EP

Kind code of ref document: A1