WO2016045168A1 - 数据处理方法和数据处理装置 - Google Patents

数据处理方法和数据处理装置 Download PDF

Info

Publication number
WO2016045168A1
WO2016045168A1 PCT/CN2014/090105 CN2014090105W WO2016045168A1 WO 2016045168 A1 WO2016045168 A1 WO 2016045168A1 CN 2014090105 W CN2014090105 W CN 2014090105W WO 2016045168 A1 WO2016045168 A1 WO 2016045168A1
Authority
WO
WIPO (PCT)
Prior art keywords
storage area
operating system
data
terminal
identification card
Prior art date
Application number
PCT/CN2014/090105
Other languages
English (en)
French (fr)
Inventor
罗李敏
Original Assignee
酷派软件技术(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 酷派软件技术(深圳)有限公司 filed Critical 酷派软件技术(深圳)有限公司
Priority to EP14902630.4A priority Critical patent/EP3200436B1/en
Publication of WO2016045168A1 publication Critical patent/WO2016045168A1/zh
Priority to US15/468,662 priority patent/US10085152B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M19/00Current supply arrangements for telephone systems
    • H04M19/02Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone
    • H04M19/04Current supply arrangements for telephone systems providing ringing current or supervisory tones, e.g. dialling tone or busy tone the ringing-current being generated at the substations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0622Securing storage systems in relation to access
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • G06F3/0623Securing storage systems in relation to content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/065Replication mechanisms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0673Single storage device
    • G06F3/0679Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Definitions

  • the present invention relates to the field of data storage technologies, and in particular, to a data processing method and a data processing device.
  • the mobile terminal has no special security protection for the key information such as contacts and short messages on the SIM card, and is directly saved in the built-in storage of the SIM card.
  • the defect of data storage in the existing SIM card is that no security level is assigned to the card contact, and all contacts and short messages on the card are visible to all users.
  • the invention is based on the above problems, and proposes a new technical solution, which can perform security level division on the identification card, thereby ensuring the security of data stored in the identity identification card.
  • the present invention provides a data processing method for a terminal, the terminal including a plurality of operating systems, including: when receiving a command to store data to an identification card in the terminal, determining Determining a first operating system currently used by the terminal; storing the data to the first of the identification cards when the currently used first operating system is a specified operating system of the plurality of operating systems of the terminal a storage area, where the currently used first operating system is a non-designated operating system among the plurality of operating systems of the terminal, storing the data to a second storage area of the identification card.
  • the specific storage location of the data stored in the identification card in the identification card may be determined according to the operating system currently used by the terminal. For example, when the operating system is a designated operating system, the data is stored in a storage area of the identification card, and when the operating system is a non-designated operating system, the data is stored to another storage area, specifically, the storage area is specified.
  • the domain can be the operating system with the highest security level in the terminal, or it can be an operating system specified by the user, such as the security system in the existing dual-system terminal. For example, when the terminal is in a normal system, the data to be stored is stored in the normal storage area of the identity card as general information.
  • the data to be stored is stored in the secure storage area of the identification card as security.
  • Information in this way, the data in the identification card is divided into security levels, and the common information and security information are distinguished, which can ensure the security of the data and protect the privacy information of the user.
  • the method further includes: determining whether the first storage area exists in the identity identification card when the currently used first operating system is the specified operating system; When the first storage area does not exist in the identification card, the first storage area is created in the identification card.
  • the data stored when the specified operating system is directly stored may be stored in the first storage area, but when the first storage area does not exist in the identification card
  • the first storage area needs to be created according to the parameter of the first storage area set in advance, wherein the data of the first storage area includes parameters such as the capacity size of the storage area.
  • the method further includes: when storing the data to the first storage area of the identity identification card, generating a key according to the identification information of the terminal, and storing the key separately The designated operating system and the first storage area in the identification card.
  • determining a second operating system currently used by the terminal when receiving a read command to the identity card, determining a second operating system currently used by the terminal; when the currently used second operating system is the non- When the operating system is specified, only the currently used second operating system is allowed to read the second data in the second storage area of the identification card; when the currently used second operating system is the specified operating system Detecting whether the first storage area exists in the identity identification card; when the determination result is that the first storage area exists in the identity identification card, determining that the currently used second operating system is stored Whether the key and the key stored in the first storage area match; when the determination result is a match, allowing the currently used second operating system to read the first data in the first storage area, otherwise, The currently used second operating system is not allowed to read the first data in the first storage area.
  • the identification information of the terminal such as IMEI (International Mobile Equipment Identity, International Mobile Equipment Identity), IMSI (International Mobile Subscriber Identification), MEID (Mobile Equipment Identifier), and other information generation keys, and the key is separated
  • IMEI International Mobile Equipment Identity, International Mobile Equipment Identity
  • IMSI International Mobile Subscriber Identification
  • MEID Mobile Equipment Identifier
  • the data of a storage area if not matched, is only allowed to read the data in the second storage area, so that if the user uses the specified operating system of his own terminal to store the data to the first storage area of the identification card, then The other operating systems of the terminal and the operating systems of other terminals cannot read the content in the first storage area of the identification card, thereby ensuring the information security of the user and improving the user experience.
  • the method further includes: performing encryption processing on the first data in the first storage area by using the key generated by the specified operating system; and adopting, when the determination result is a match, The key stored in the first storage area decrypts the first data in the first storage area.
  • the stored data can also be encrypted, so that when the terminal reads, only the operating system of the terminal that can be decrypted can be read, thereby further ensuring the security of the data.
  • the method further includes: setting the first storage area and the second storage area in the identity identification card according to the received setting command, and the first storage area and the The capacity corresponding to the second storage area is described.
  • the user or the manufacturer can set different storage areas in the identification card according to individual needs, and set the capacity of each storage area, thereby meeting the different needs of different users or different vendors, and improving the user experience.
  • a data processing apparatus for a terminal comprising a plurality of operating systems, comprising: a determining unit, when receiving an identification card that stores data into the terminal And determining, by the command, a first operating system currently used by the terminal; and storing, by the storage unit, the data storage when the currently used first operating system is a specified operating system of the plurality of operating systems of the terminal To the first storage area of the identification card, And when the currently used first operating system is a non-designated operating system among the plurality of operating systems of the terminal, storing the data to a second storage area of the identification card.
  • the specific storage location of the data stored in the identification card in the identification card may be determined according to the operating system currently used by the terminal. For example, when the operating system is a designated operating system, the data is stored in a storage area of the identification card, and when the operating system is a non-designated operating system, the data is stored to another storage area. Specifically, the designated storage area may be The operating system with the highest security level in the terminal can also be an operating system specified by the user, such as the security system in the existing dual system terminal. For example, when the terminal is in a normal system, the data to be stored is stored in the normal storage area of the identity card as general information. When the terminal is in the security system, the data to be stored is stored in the secure storage area of the identification card as security. Information, in this way, the data in the identification card is divided into security levels, and the common information and security information are distinguished, which can ensure the security of the data and protect the privacy information of the user.
  • the method further includes: determining, by the determining unit, whether the first storage area exists in the identity identification card when the currently used first operating system is the specified operating system; Creating a unit, where the first storage area is not present in the identity card, the first storage area is created in the identity card.
  • the data stored when the specified operating system is directly stored may be stored in the first storage area, but when the first storage area does not exist in the identification card
  • the first storage area needs to be created according to the parameter of the first storage area set in advance, wherein the data of the first storage area includes parameters such as the capacity size of the storage area.
  • the method further includes: a key storage unit, when storing the data to the first storage area of the identity identification card, generating a key according to the identification information of the terminal, and The keys are stored to the first storage area in the specified operating system and the identification card, respectively.
  • the determining unit is further configured to: when receiving a read command to the identity identification card, determine a second operating system currently used by the terminal; the device further includes: a processing unit, when the currently used second operating system is the non-designated operating system, allowing only the currently used second operating system to read the identity card a second data in the second storage area; the detecting unit, when the currently used second operating system is the specified operating system, detecting whether the first storage area exists in the identification card; When the result of the determination is that the first storage area exists in the identity identification card, it is determined whether the key stored in the currently used second operating system matches the key stored in the first storage area; The processing unit is further configured to: when the determination result is a match, allowing the currently used second operating system to read the first data in the first storage area, otherwise, disallowing the currently used second operating system Reading the first data in the first storage area.
  • a key is generated according to the identification information of the terminal (such as IMEI, IMSI, MEID, etc.), and the key is separately stored to the designated operating system and the identification card of the terminal.
  • a storage area In this way, when any terminal wants to read the data of the first storage area of the identification card, it needs to match the key stored by itself with the key stored in the identification card, and if the two match, the reading is allowed.
  • the data of a storage area if not matched, is only allowed to read the data in the second storage area, so that if the user uses the specified operating system of his own terminal to store the data to the first storage area of the identification card, then The other operating systems of the terminal and the operating systems of other terminals cannot read the content in the first storage area of the identification card, thereby ensuring the information security of the user and improving the user experience.
  • the method further includes: an encryption unit that performs encryption processing on the first data in the first storage area by using the key generated by the specified operating system; and a decryption unit, in the determination result For matching, the first data in the first storage area is decrypted by using a key stored in the first storage area.
  • the stored data can also be encrypted, so that when the terminal reads, only the operating system of the terminal that can be decrypted can be read, thereby further ensuring the security of the data.
  • the method further includes: a setting unit, configured to set the first storage area and the second storage area in the identity identification card according to the received setting command, and the first storage A capacity corresponding to the area and the second storage area.
  • the user or the manufacturer can set the identity card according to individual needs. Different storage areas and the capacity of each storage area to meet the different needs of different users or different vendors to enhance the user experience.
  • the user can set the secure storage area of the identification card according to the individual needs, so that other operating systems and other terminals cannot view the security data in the secure storage area, thereby protecting the user's private information and improving the user experience. .
  • FIG. 1 shows a flow chart of a data processing method according to an embodiment of the present invention
  • FIG. 2 shows a block diagram of a data processing apparatus in accordance with an embodiment of the present invention
  • FIG. 3 is a schematic diagram showing identification card data information according to an embodiment of the present invention.
  • FIG. 4 shows a detailed flow chart of a data processing method in accordance with one embodiment of the present invention
  • FIG. 5 shows a schematic diagram of identification card data information in accordance with another embodiment of the present invention.
  • FIG. 1 shows a flow chart of a data processing method in accordance with an embodiment of the present invention.
  • a data processing method includes: Step 102, when receiving a command to store data to an identity card in the terminal, determining a first use currently used by the terminal An operating system; step 104, when the currently used first operating system is a specified operating system of the plurality of operating systems of the terminal, storing the data to a first storage area of the identification card, When the currently used first operating system is a non-designated operating system among the plurality of operating systems of the terminal, storing the data to the identity Identify the second storage area of the card.
  • the specific storage location of the data stored in the identification card in the identification card may be determined according to the operating system currently used by the terminal. For example, when the operating system is a designated operating system, the data is stored in a storage area of the identification card, and when the operating system is a non-designated operating system, the data is stored to another storage area. Specifically, the designated storage area may be The operating system with the highest security level in the terminal can also be an operating system specified by the user, such as the security system in the existing dual system terminal. For example, when the terminal is in a normal system, the data to be stored is stored in the normal storage area of the identity card as general information. When the terminal is in the security system, the data to be stored is stored in the secure storage area of the identification card as security. Information, in this way, the data in the identification card is divided into security levels, and the common information and security information are distinguished, which can ensure the security of the data and protect the privacy information of the user.
  • the method further includes: determining whether the first storage area exists in the identity identification card when the currently used first operating system is the specified operating system; When the first storage area does not exist in the identification card, the first storage area is created in the identification card.
  • the data stored when the specified operating system is directly stored may be stored in the first storage area, but when the first storage area does not exist in the identification card
  • the first storage area needs to be created according to the parameter of the first storage area set in advance, wherein the data of the first storage area includes parameters such as the capacity size of the storage area.
  • the method further includes: when storing the data to the first storage area of the identity identification card, generating a key according to the identification information of the terminal, and storing the key separately The designated operating system and the first storage area in the identification card.
  • determining a second operating system currently used by the terminal when receiving a read command to the identity card, determining a second operating system currently used by the terminal; when the currently used second operating system is the non- When the operating system is specified, only the currently used second operating system is allowed to read the second data in the second storage area of the identification card; when the currently used second operating system is the specified operating system Detecting whether the first storage area exists in the identity identification card; when the determination result is that the first storage area exists in the identity identification card, Determining whether a key stored in the currently used second operating system matches a key stored in the first storage area; and when the determination result is a match, allowing the currently used second operating system to read the Determining the first data in the first storage area, otherwise, not allowing the currently used second operating system to read the first data in the first storage area.
  • a key is generated according to the identification information of the terminal (such as IMEI, IMSI, MEID, etc.), and the key is separately stored to the designated operating system and the identification card of the terminal.
  • a storage area In this way, when any terminal wants to read the data of the first storage area of the identification card, it needs to match the key stored by itself with the key stored in the identification card, and if the two match, the reading is allowed.
  • the data of a storage area if not matched, is only allowed to read the data in the second storage area, so that if the user uses the specified operating system of his own terminal to store the data to the first storage area of the identification card, then The other operating systems of the terminal and the operating systems of other terminals cannot read the content in the first storage area of the identification card, thereby ensuring the information security of the user and improving the user experience.
  • the method further includes: performing encryption processing on the first data in the first storage area by using the key generated by the specified operating system; and adopting, when the determination result is a match, The key stored in the first storage area decrypts the first data in the first storage area.
  • the stored data can also be encrypted, so that when the terminal reads, only the operating system of the terminal that can be decrypted can be read, thereby further ensuring the security of the data.
  • the method further includes: setting the first storage area and the second storage area in the identity identification card according to the received setting command, and the first storage area and the The capacity corresponding to the second storage area is described.
  • the user or the manufacturer can set different storage areas in the identification card according to individual needs, and set the capacity of each storage area, thereby meeting the different needs of different users or different vendors, and improving the user experience.
  • FIG. 2 shows a block diagram of a data processing apparatus in accordance with an embodiment of the present invention.
  • a data processing apparatus 200 is used for a terminal,
  • the terminal includes a plurality of operating systems, including: a determining unit 202, when receiving a command to store data to an identity card in the terminal, determining a first operating system currently used by the terminal; the storage unit 204, When the currently used first operating system is a specified operating system of the plurality of operating systems of the terminal, storing the data to a first storage area of the identification card, in the currently used When an operating system is a non-designated operating system among the plurality of operating systems of the terminal, the data is stored to the second storage area of the identification card.
  • the specific storage location of the data stored in the identification card in the identification card may be determined according to the operating system currently used by the terminal. For example, when the operating system is a designated operating system, the data is stored in a storage area of the identification card, and when the operating system is a non-designated operating system, the data is stored to another storage area. Specifically, the designated storage area may be The operating system with the highest security level in the terminal can also be an operating system specified by the user, such as the security system in the existing dual system terminal. For example, when the terminal is in a normal system, the data to be stored is stored in the normal storage area of the identity card as general information. When the terminal is in the security system, the data to be stored is stored in the secure storage area of the identification card as security. Information, in this way, the data in the identification card is divided into security levels, and the common information and security information are distinguished, which can ensure the security of the data and protect the privacy information of the user.
  • the determining unit 206 is configured to determine whether the first storage area exists in the identity identification card when the currently used first operating system is the specified operating system; And a creating unit 208, wherein the first storage area is created in the identity identification card when the first storage area does not exist in the identity identification card.
  • the data stored when the specified operating system is directly stored may be stored in the first storage area, but when the first storage area does not exist in the identification card
  • the first storage area needs to be created according to the parameter of the first storage area set in advance, wherein the data of the first storage area includes parameters such as the capacity size of the storage area.
  • the method further includes: a key storage unit 210, when storing the data to the first storage area of the identity identification card, generating a key according to the identification information of the terminal, and The keys are stored to the designated operating system and the identification card, respectively The first storage area in .
  • the determining unit 204 is further configured to: when receiving a read command to the identity card, determine a second operating system currently used by the terminal; the device further includes The processing unit 212, when the currently used second operating system is the non-designated operating system, only allowing the currently used second operating system to read the second storage area of the identification card The second data; the detecting unit 214, when the currently used second operating system is the specified operating system, detecting whether the first storage area exists in the identification card; the matching unit 216, in the judgment result is When the first storage area exists in the identification card, it is determined whether the key stored in the currently used second operating system matches the key stored in the first storage area; the processing unit 212 further And: when the judgment result is a match, allowing the currently used second operating system to read the first data in the first storage area, otherwise, not allowing the currently used Second operating system of the first data in the first storage area of the read.
  • a key is generated according to the identification information of the terminal (such as IMEI, IMSI, MEID, etc.), and the key is separately stored to the designated operating system and the identification card of the terminal.
  • a storage area In this way, when any terminal wants to read the data of the first storage area of the identification card, it needs to match the key stored by itself with the key stored in the identification card, and if the two match, the reading is allowed.
  • the data of a storage area if not matched, is only allowed to read the data in the second storage area, so that if the user uses the specified operating system of his own terminal to store the data to the first storage area of the identification card, then The other operating systems of the terminal and the operating systems of other terminals cannot read the content in the first storage area of the identification card, thereby ensuring the information security of the user and improving the user experience.
  • the method further includes: an encryption unit 218, performing encryption processing on the first data in the first storage area by using the key generated by the specified operating system; and a decryption unit 220, When the result of the determination is a match, the first data in the first storage area is decrypted by using a key stored in the first storage area.
  • the stored data can also be encrypted, so that when the terminal reads, only the operating system of the terminal that can be decrypted can Read, further ensuring the security of the data.
  • the method further includes: a setting unit 222, configured to set the first storage area and the second storage area in the identity identification card according to the received setting command, and the first A storage area and a capacity corresponding to the second storage area.
  • the user or the manufacturer can set different storage areas in the identification card according to individual needs, and set the capacity of each storage area, thereby meeting the different needs of different users or different vendors, and improving the user experience.
  • the user When the user has a secure storage requirement, the user switches to the security system, and the operation of the card is saved with security information.
  • the saved information is only visible to the security system.
  • the SIM used by the terminal user has a corresponding storage space.
  • a card reader or a short message is normally read or written, the number of contacts of the card is first read from the card, and then the corresponding contact is read from the corresponding card storage space. content.
  • the terminal when the user performs a contact operation under the normal Android system, the terminal first reads the area for storing the contact capacity in the card storage according to the normal operation flow, and after reading, traverses the storage space according to the capacity. Read and display the contact.
  • the terminal When the user switches to the security system, the terminal performs a secure storage mode.
  • the security contact read/write process is:
  • Step 402 The terminal first determines whether the current SIM has a secure storage area, that is, reads the last end of the card storage space. If it is found to be non-empty, it is not 0xFFFF, indicating that the card has initialized the secure storage area.
  • Step 404 The terminal determines whether the security contact stored by the card is stored by the local device, that is, reads the security contact key on the SIM card, and compares it with the key stored in the local security system, if it matches Indicates that the card security contact can be read by the local terminal. If it does not match, it means that the security contact of the card is not created locally, and reading is prohibited.
  • Step 406 After confirming that the security contact on the SIM card can be read, the terminal starts to read sequentially according to the number of security contacts, and the specific data of the security contact on the card is encrypted. The terminal decrypts using the SIM card and the key stored on the terminal, and displays the contact in the security system.
  • the contact when the contact is stored, correspondingly, if it is a secure contact store, if the number of secure contacts on the SIM card is empty, the newly created secure contact capacity is written at the bottom of the SIM card storage space.
  • a set of keys is generated according to the unique identifier of the IMEI of the terminal, and are respectively stored in the mobile phone security system and the SIM card security contact key storage area.
  • the security system encrypts the security contact input by the user and stores it in the corresponding SIM card secure storage area.
  • the SIM's normal contacts can be read normally on any terminal, but the security contacts in the SIM card can only be read by the user-specific security system.
  • the stored data of the secure contact is encrypted, ensuring security.
  • the technical solution of the present invention is described in detail above with reference to the accompanying drawings.
  • the user can set a secure storage area of the identification card according to individual needs, so that other operating systems and other terminals cannot view the security storage area. Secure data to protect users' private information and enhance the user experience.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

提供了一种数据处理方法,用于终端,所述终端包括多个操作系统,包括:当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统(102);在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域,在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份识别卡的第二存储区域(104)。相应地,还提供了一种数据处理装置。通过技术方案,用户可以根据个人需要设置身份识别卡的安全存储区域,使得其他操作系统和其他终端均不能查看该安全存储区域内的安全数据,从而保护用户的隐私信息,提升用户的使用体验。

Description

数据处理方法和数据处理装置 技术领域
本发明涉及数据存储技术领域,具体而言,涉及一种数据处理方法和一种数据处理装置。
背景技术
目前手机终端针对SIM卡上的联系人、短信等关键信息没有特殊的安全保护,直接保存在SIM卡的内置存储中。现有的SIM卡中数据存储的缺陷在于:没有针对卡联系人做安全等级划分,卡上所有联系人、短信对所有用户都是可见的。
因此需要一种新的技术方案,可以对身份识别卡做安全等级划分,从而保证身份识别卡内存储的数据的安全性。
发明内容
本发明正是基于上述问题,提出了一种新的技术方案,可以对身份识别卡做安全等级划分,从而保证身份识别卡内存储的数据的安全性。
有鉴于此,本发明提出了一种数据处理方法,用于终端,所述终端包括多个操作系统,包括:当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统;在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域,在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份识别卡的第二存储区域。
在该技术方案中,可以根据终端当前使用的操作系统,确定存储至身份识别卡的数据在身份识别卡中具体的存储位置。比如,在操作系统为指定操作系统时,将数据存储至身份识别卡的一个存储区域,在操作系统为非指定操作系统时,将数据存储至另一个存储区域,具体地,指定存储区 域可以是终端中安全级别最高的操作系统,也可以是用户指定的某个操作系统,如现有双系统终端中的安全系统。例如,当终端处于普通系统时,将需存储的数据存储至身份识别卡的普通存储区域作为普通信息,当终端处于安全系统时,将需存储的数据存储至身份识别卡的安全存储区域作为安全信息,这样,将身份识别卡中的数据进行安全级别划分,区别普通信息和安全信息,可以保证数据的安全,保护用户的隐私信息。
在上述技术方案中,优选地,还包括:在所述当前使用的第一操作系统为所述指定操作系统时,判断所述身份识别卡中是否存在所述第一存储区域;以及在所述身份识别卡中不存在所述第一存储区域时,在所述身份识别卡中创建所述第一存储区域。
在该技术方案中,如果身份识别卡中,已存在第一存储区域,则可以直接将指定操作系统时存储的数据存储至第一存储区域,但是当身份识别卡中不存在第一存储区域时,需要根据预先设置的第一存储区域的参数创建第一存储区域,其中,第一存储区域的数据包括该存储区域的容量大小等参数。
在上述技术方案中,优选地,还包括:将所述数据存储至所述身份识别卡的第一存储区域时,根据所述终端的标识信息生成密钥,并将所述密钥分别存储至所述指定操作系统和所述身份识别卡中的第一存储区域。
在上述技术方案中,优选地,当接收到对所述身份识别卡的读取命令时,确定所述终端当前使用的第二操作系统;当所述当前使用的第二操作系统为所述非指定操作系统时,只允许所述当前使用的第二操作系统读取所述身份识别卡的第二存储区域中的第二数据;当所述当前使用的第二操作系统为所述指定操作系统时,检测所述身份识别卡中是否存在所述第一存储区域;在判断结果为所述身份识别卡中存在所述第一存储区域时,判断所述当前使用的第二操作系统中存储的密钥和所述第一存储区域中存储的密钥是否匹配;在判断结果为匹配时,允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据,否则,不允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据。
在将数据存储至第一存储区域时,根据终端的标识信息,如IMEI (International Mobile Equipment Identity,移动设备国际识别码)、IMSI(International Mobile Subscriber Identification,国际移动用户识别码)、MEID(Mobile Equipment Identifier,移动设备识别码)等信息生成密钥,并将该密钥分别存储至终端的指定操作系统和身份识别卡的第一存储区域。这样,在任一终端想读取身份识别卡的第一存储区域的数据时,需要其将自身存储的密钥和身份识别卡中存储的密钥进行匹配,如果两者匹配,则允许读取第一存储区域的数据,如果不匹配,则只允许其读取第二存储区域中的数据,这样,如果用户使用自己的终端的指定操作系统将数据存储至身份识别卡的第一存储区域,则该终端的其他操作系统以及其他终端的操作系统,均不能读取到其身份识别卡中第一存储区域中的内容,从而保证了用户的信息安全,提升用户的使用体验。
在上述技术方案中,优选地,还包括:采用所述指定操作系统生成的所述密钥对所述第一存储区域中的第一数据进行加密处理;以及在判断结果为匹配时,采用所述第一存储区域中存储的密钥对所述第一存储区域中的第一数据进行解密处理。
在该技术方案中,为了进一步保证数据的安全,还可以对存储的数据进行加密,这样,终端在进行读取时,只有能解密的终端的操作系统可以读取,进一步保证了数据的安全。
在上述技术方案中,优选地,还包括:根据接收到的设置命令,在所述身份识别卡中设置所述第一存储区域和所述第二存储区域,以及所述第一存储区域和所述第二存储区域对应的容量。
在该技术方案中,用户或厂商可以根据个人需要设置身份识别卡中的不同存储区域,并设置每个存储区域的容量,从而满足不同用户或不同厂商的不同需求,提升用户的使用体验。
根据本发明的另一方面,还提供了一种数据处理装置,用于终端,所述终端包括多个操作系统,包括:确定单元,当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统;存储单元,在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域, 在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份识别卡的第二存储区域。
在该技术方案中,可以根据终端当前使用的操作系统,确定存储至身份识别卡的数据在身份识别卡中具体的存储位置。比如,在操作系统为指定操作系统时,将数据存储至身份识别卡的一个存储区域,在操作系统为非指定操作系统时,将数据存储至另一个存储区域,具体地,指定存储区域可以是终端中安全级别最高的操作系统,也可以是用户指定的某个操作系统,如现有双系统终端中的安全系统。例如,当终端处于普通系统时,将需存储的数据存储至身份识别卡的普通存储区域作为普通信息,当终端处于安全系统时,将需存储的数据存储至身份识别卡的安全存储区域作为安全信息,这样,将身份识别卡中的数据进行安全级别划分,区别普通信息和安全信息,可以保证数据的安全,保护用户的隐私信息。
在上述技术方案中,优选地,还包括:判断单元,在所述当前使用的第一操作系统为所述指定操作系统时,判断所述身份识别卡中是否存在所述第一存储区域;以及创建单元,在所述身份识别卡中不存在所述第一存储区域时,在所述身份识别卡中创建所述第一存储区域。
在该技术方案中,如果身份识别卡中,已存在第一存储区域,则可以直接将指定操作系统时存储的数据存储至第一存储区域,但是当身份识别卡中不存在第一存储区域时,需要根据预先设置的第一存储区域的参数创建第一存储区域,其中,第一存储区域的数据包括该存储区域的容量大小等参数。
在上述技术方案中,优选地,还包括:密钥存储单元,在将所述数据存储至所述身份识别卡的第一存储区域时,根据所述终端的标识信息生成密钥,并将所述密钥分别存储至所述指定操作系统和所述身份识别卡中的第一存储区域。
在上述技术方案中,优选地,所述确定单元还用于:当接收到对所述身份识别卡的读取命令时,确定所述终端当前使用的第二操作系统;所述装置还包括:处理单元,当所述当前使用的第二操作系统为所述非指定操作系统时,只允许所述当前使用的第二操作系统读取所述身份识别卡的第 二存储区域中的第二数据;检测单元,当所述当前使用的第二操作系统为所述指定操作系统时,检测所述身份识别卡中是否存在所述第一存储区域;匹配单元,在判断结果为所述身份识别卡中存在所述第一存储区域时,判断所述当前使用的第二操作系统中存储的密钥和所述第一存储区域中存储的密钥是否匹配;所述处理单元还用于:在判断结果为匹配时,允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据,否则,不允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据。
在将数据存储至第一存储区域时,根据终端的标识信息(如IMEI、IMSI、MEID等信息)等生成密钥,并将该密钥分别存储至终端的指定操作系统和身份识别卡的第一存储区域。这样,在任一终端想读取身份识别卡的第一存储区域的数据时,需要其将自身存储的密钥和身份识别卡中存储的密钥进行匹配,如果两者匹配,则允许读取第一存储区域的数据,如果不匹配,则只允许其读取第二存储区域中的数据,这样,如果用户使用自己的终端的指定操作系统将数据存储至身份识别卡的第一存储区域,则该终端的其他操作系统以及其他终端的操作系统,均不能读取到其身份识别卡中第一存储区域中的内容,从而保证了用户的信息安全,提升用户的使用体验。
在上述技术方案中,优选地,还包括:加密单元,采用所述指定操作系统生成的所述密钥对所述第一存储区域中的第一数据进行加密处理;以及解密单元,在判断结果为匹配时,采用所述第一存储区域中存储的密钥对所述第一存储区域中的第一数据进行解密处理。
在该技术方案中,为了进一步保证数据的安全,还可以对存储的数据进行加密,这样,终端在进行读取时,只有能解密的终端的操作系统可以读取,进一步保证了数据的安全。
在上述技术方案中,优选地,还包括:设置单元,根据接收到的设置命令,在所述身份识别卡中设置所述第一存储区域和所述第二存储区域,以及所述第一存储区域和所述第二存储区域对应的容量。
在该技术方案中,用户或厂商可以根据个人需要设置身份识别卡中的 不同存储区域,并设置每个存储区域的容量,从而满足不同用户或不同厂商的不同需求,提升用户的使用体验。
通过以上技术方案,用户可以根据个人需要设置身份识别卡的安全存储区域,使得其他操作系统和其他终端均不能查看该安全存储区域内的安全数据,从而保护用户的隐私信息,提升用户的使用体验。
附图说明
图1示出了根据本发明的实施例的数据处理方法的流程图;
图2示出了根据本发明的实施例的数据处理装置的框图;
图3示出了根据本发明的一个实施例的身份识别卡数据信息的示意图;
图4示出了根据本发明的一个实施例的数据处理方法的具体流程图;
图5示出了根据本发明的另一个实施例的身份识别卡数据信息的示意图。
具体实施方式
为了能够更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。
图1示出了根据本发明的实施例的数据处理方法的流程图。
如图1所示,根据本发明的实施例的数据处理方法,包括:步骤102,当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统;步骤104,在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域,在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份 识别卡的第二存储区域。
在该技术方案中,可以根据终端当前使用的操作系统,确定存储至身份识别卡的数据在身份识别卡中具体的存储位置。比如,在操作系统为指定操作系统时,将数据存储至身份识别卡的一个存储区域,在操作系统为非指定操作系统时,将数据存储至另一个存储区域,具体地,指定存储区域可以是终端中安全级别最高的操作系统,也可以是用户指定的某个操作系统,如现有双系统终端中的安全系统。例如,当终端处于普通系统时,将需存储的数据存储至身份识别卡的普通存储区域作为普通信息,当终端处于安全系统时,将需存储的数据存储至身份识别卡的安全存储区域作为安全信息,这样,将身份识别卡中的数据进行安全级别划分,区别普通信息和安全信息,可以保证数据的安全,保护用户的隐私信息。
在上述技术方案中,优选地,还包括:在所述当前使用的第一操作系统为所述指定操作系统时,判断所述身份识别卡中是否存在所述第一存储区域;以及在所述身份识别卡中不存在所述第一存储区域时,在所述身份识别卡中创建所述第一存储区域。
在该技术方案中,如果身份识别卡中,已存在第一存储区域,则可以直接将指定操作系统时存储的数据存储至第一存储区域,但是当身份识别卡中不存在第一存储区域时,需要根据预先设置的第一存储区域的参数创建第一存储区域,其中,第一存储区域的数据包括该存储区域的容量大小等参数。
在上述技术方案中,优选地,还包括:将所述数据存储至所述身份识别卡的第一存储区域时,根据所述终端的标识信息生成密钥,并将所述密钥分别存储至所述指定操作系统和所述身份识别卡中的第一存储区域。
在上述技术方案中,优选地,当接收到对所述身份识别卡的读取命令时,确定所述终端当前使用的第二操作系统;当所述当前使用的第二操作系统为所述非指定操作系统时,只允许所述当前使用的第二操作系统读取所述身份识别卡的第二存储区域中的第二数据;当所述当前使用的第二操作系统为所述指定操作系统时,检测所述身份识别卡中是否存在所述第一存储区域;在判断结果为所述身份识别卡中存在所述第一存储区域时,判 断所述当前使用的第二操作系统中存储的密钥和所述第一存储区域中存储的密钥是否匹配;在判断结果为匹配时,允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据,否则,不允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据。
在将数据存储至第一存储区域时,根据终端的标识信息(如IMEI、IMSI、MEID等信息)等生成密钥,并将该密钥分别存储至终端的指定操作系统和身份识别卡的第一存储区域。这样,在任一终端想读取身份识别卡的第一存储区域的数据时,需要其将自身存储的密钥和身份识别卡中存储的密钥进行匹配,如果两者匹配,则允许读取第一存储区域的数据,如果不匹配,则只允许其读取第二存储区域中的数据,这样,如果用户使用自己的终端的指定操作系统将数据存储至身份识别卡的第一存储区域,则该终端的其他操作系统以及其他终端的操作系统,均不能读取到其身份识别卡中第一存储区域中的内容,从而保证了用户的信息安全,提升用户的使用体验。
在上述技术方案中,优选地,还包括:采用所述指定操作系统生成的所述密钥对所述第一存储区域中的第一数据进行加密处理;以及在判断结果为匹配时,采用所述第一存储区域中存储的密钥对所述第一存储区域中的第一数据进行解密处理。
在该技术方案中,为了进一步保证数据的安全,还可以对存储的数据进行加密,这样,终端在进行读取时,只有能解密的终端的操作系统可以读取,进一步保证了数据的安全。
在上述技术方案中,优选地,还包括:根据接收到的设置命令,在所述身份识别卡中设置所述第一存储区域和所述第二存储区域,以及所述第一存储区域和所述第二存储区域对应的容量。
在该技术方案中,用户或厂商可以根据个人需要设置身份识别卡中的不同存储区域,并设置每个存储区域的容量,从而满足不同用户或不同厂商的不同需求,提升用户的使用体验。
图2示出了根据本发明的实施例的数据处理装置的框图。
如图2所示,根据本发明的实施例的数据处理装置200,用于终端, 所述终端包括多个操作系统,包括:确定单元202,当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统;存储单元204,在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域,在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份识别卡的第二存储区域。
在该技术方案中,可以根据终端当前使用的操作系统,确定存储至身份识别卡的数据在身份识别卡中具体的存储位置。比如,在操作系统为指定操作系统时,将数据存储至身份识别卡的一个存储区域,在操作系统为非指定操作系统时,将数据存储至另一个存储区域,具体地,指定存储区域可以是终端中安全级别最高的操作系统,也可以是用户指定的某个操作系统,如现有双系统终端中的安全系统。例如,当终端处于普通系统时,将需存储的数据存储至身份识别卡的普通存储区域作为普通信息,当终端处于安全系统时,将需存储的数据存储至身份识别卡的安全存储区域作为安全信息,这样,将身份识别卡中的数据进行安全级别划分,区别普通信息和安全信息,可以保证数据的安全,保护用户的隐私信息。
在上述技术方案中,优选地,还包括:判断单元206,在所述当前使用的第一操作系统为所述指定操作系统时,判断所述身份识别卡中是否存在所述第一存储区域;以及创建单元208,在所述身份识别卡中不存在所述第一存储区域时,在所述身份识别卡中创建所述第一存储区域。
在该技术方案中,如果身份识别卡中,已存在第一存储区域,则可以直接将指定操作系统时存储的数据存储至第一存储区域,但是当身份识别卡中不存在第一存储区域时,需要根据预先设置的第一存储区域的参数创建第一存储区域,其中,第一存储区域的数据包括该存储区域的容量大小等参数。
在上述技术方案中,优选地,还包括:密钥存储单元210,在将所述数据存储至所述身份识别卡的第一存储区域时,根据所述终端的标识信息生成密钥,并将所述密钥分别存储至所述指定操作系统和所述身份识别卡 中的第一存储区域。
在上述技术方案中,优选地,所述确定单元204还用于:当接收到对所述身份识别卡的读取命令时,确定所述终端当前使用的第二操作系统;所述装置还包括:处理单元212,当所述当前使用的第二操作系统为所述非指定操作系统时,只允许所述当前使用的第二操作系统读取所述身份识别卡的第二存储区域中的第二数据;检测单元214,当所述当前使用的第二操作系统为所述指定操作系统时,检测所述身份识别卡中是否存在所述第一存储区域;匹配单元216,在判断结果为所述身份识别卡中存在所述第一存储区域时,判断所述当前使用的第二操作系统中存储的密钥和所述第一存储区域中存储的密钥是否匹配;所述处理单元212还用于:在判断结果为匹配时,允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据,否则,不允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据。
在将数据存储至第一存储区域时,根据终端的标识信息(如IMEI、IMSI、MEID等信息)等生成密钥,并将该密钥分别存储至终端的指定操作系统和身份识别卡的第一存储区域。这样,在任一终端想读取身份识别卡的第一存储区域的数据时,需要其将自身存储的密钥和身份识别卡中存储的密钥进行匹配,如果两者匹配,则允许读取第一存储区域的数据,如果不匹配,则只允许其读取第二存储区域中的数据,这样,如果用户使用自己的终端的指定操作系统将数据存储至身份识别卡的第一存储区域,则该终端的其他操作系统以及其他终端的操作系统,均不能读取到其身份识别卡中第一存储区域中的内容,从而保证了用户的信息安全,提升用户的使用体验。
在上述技术方案中,优选地,还包括:加密单元218,采用所述指定操作系统生成的所述密钥对所述第一存储区域中的第一数据进行加密处理;以及解密单元220,在判断结果为匹配时,采用所述第一存储区域中存储的密钥对所述第一存储区域中的第一数据进行解密处理。
在该技术方案中,为了进一步保证数据的安全,还可以对存储的数据进行加密,这样,终端在进行读取时,只有能解密的终端的操作系统可以 读取,进一步保证了数据的安全。
在上述技术方案中,优选地,还包括:设置单元222,根据接收到的设置命令,在所述身份识别卡中设置所述第一存储区域和所述第二存储区域,以及所述第一存储区域和所述第二存储区域对应的容量。
在该技术方案中,用户或厂商可以根据个人需要设置身份识别卡中的不同存储区域,并设置每个存储区域的容量,从而满足不同用户或不同厂商的不同需求,提升用户的使用体验。
下面以双系统终端为例,详细说明本发明的技术方案。
基于双系统的终端,存在Android系统(相当于非指定操作系统)及安全操作系统(相当于指定操作系统)两个系统,两个系统都可以对卡联系人、卡短信进行存储。当用户在android系统操作SIM卡时,保存到卡上的信息默认为公共信息,这些信息在其他手机上也是可以查看和修改的。
当用户有安全存储需求时,用户切换到安全系统,此时对卡的操作会以安全信息保存。保存的信息只对安全系统可见。
终端用户所使用的SIM有对应的存储空间,正常读写卡联系人或短信时,首先从卡上读取卡的联系人数量,再依次从对应的卡存储空间中读取相应的联系人具体内容。如图3所示,当用户在普通Android系统下进行联系人操作时,终端按正常操作流程,先读取卡存储中用于保存联系人容量的区域,读取后,依据容量遍历存储空间,将联系人读取并显示。
当用户切换到安全系统后,终端进行安全存储模式。
如图4所示,安全联系人读/写过程为:
步骤402,终端先会判断当前的SIM是否存在安全存储区域,即读取卡存储空间的最后端,如果发现为非空,即为非0xFFFF,则表明该卡已经初始化过安全存储区域。
步骤404,终端将判断该卡存储的安全联系人是否为本机所存储的,即读取SIM卡上的安全联系人密钥,与本机安全系统中存储的密钥进行比较,如果匹配则表示该卡安全联系人可以被本机终端读取,如果不匹配则表示该卡的安全联系人非本机创建,禁止读取。
步骤406,确认SIM卡上的安全联系人可以读取后,终端开始依据安全联系人数量开始依次读取,同时卡上的安全联系人具体数据是经过加密的。终端利用SIM卡和终端上存储的密钥进行解密,并在安全系统中显示联系人。
如图5所示,在存储联系人时,相应的,如果是安全联系人存储,如果SIM卡上安全联系人数量为空,则会在SIM卡存储空间底部写入相应新建的安全联系人容量,同时根据终端的IMEI等唯一标识生成一组密钥,分别存储于手机安全系统和SIM卡安全联系人密钥存储区域。同时安全系统对用户输入的安全联系人进行加密,再存储到对应的SIM卡安全存储区域。
这样,确保了SIM的普通联系人在任何终端上都可以被正常读取,但SIM卡中的安全联系人只有用户特定的安全系统才能读取。同时安全联系人的存储数据是加密的,确保了安全性。
以上结合附图详细说明了本发明的技术方案,通过本发明的技术方案,用户可以根据个人需要设置身份识别卡的安全存储区域,使得其他操作系统和其他终端均不能查看该安全存储区域内的安全数据,从而保护用户的隐私信息,提升用户的使用体验。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (12)

  1. 一种数据处理方法,用于终端,所述终端包括多个操作系统,其特征在于,包括:
    当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统;
    在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域,在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份识别卡的第二存储区域。
  2. 根据权利要求1所述的数据处理方法,其特征在于,还包括:
    在所述当前使用的第一操作系统为所述指定操作系统时,判断所述身份识别卡中是否存在所述第一存储区域;以及
    在所述身份识别卡中不存在所述第一存储区域时,在所述身份识别卡中创建所述第一存储区域。
  3. 根据权利要求1所述的数据处理方法,其特征在于,还包括:
    将所述数据存储至所述身份识别卡的第一存储区域时,根据所述终端的标识信息生成密钥,并将所述密钥分别存储至所述指定操作系统和所述身份识别卡中的第一存储区域。
  4. 根据权利要求3所述的数据处理方法,其特征在于,
    当接收到对所述身份识别卡的读取命令时,确定所述终端当前使用的第二操作系统;
    当所述当前使用的第二操作系统为所述非指定操作系统时,只允许所述当前使用的第二操作系统读取所述身份识别卡的第二存储区域中的第二数据;
    当所述当前使用的第二操作系统为所述指定操作系统时,检测所述身份识别卡中是否存在所述第一存储区域;
    在判断结果为所述身份识别卡中存在所述第一存储区域时,判断所述当前使用的第二操作系统中存储的密钥和所述第一存储区域中存储的密钥 是否匹配;
    在判断结果为匹配时,允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据,否则,不允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据。
  5. 根据权利要求4所述的数据处理方法,其特征在于,还包括:
    采用所述指定操作系统生成的所述密钥对所述第一存储区域中的第一数据进行加密处理;以及
    在判断结果为匹配时,采用所述第一存储区域中存储的密钥对所述第一存储区域中的第一数据进行解密处理。
  6. 根据权利要求1至5中任一项所述的数据处理方法,其特征在于,还包括:
    根据接收到的设置命令,在所述身份识别卡中设置所述第一存储区域和所述第二存储区域,以及所述第一存储区域和所述第二存储区域对应的容量。
  7. 一种数据处理装置,用于终端,所述终端包括多个操作系统,其特征在于,包括:
    确定单元,当接收到将数据存储至所述终端中的身份识别卡的命令时,确定所述终端当前使用的第一操作系统;
    存储单元,在所述当前使用的第一操作系统为所述终端的多个操作系统中的指定操作系统时,将所述数据存储至所述身份识别卡的第一存储区域,在所述当前使用的第一操作系统为所述终端的多个操作系统中的非指定操作系统时,将所述数据存储至所述身份识别卡的第二存储区域。
  8. 根据权利要求7所述的数据处理装置,其特征在于,还包括:
    判断单元,在所述当前使用的第一操作系统为所述指定操作系统时,判断所述身份识别卡中是否存在所述第一存储区域;以及
    创建单元,在所述身份识别卡中不存在所述第一存储区域时,在所述身份识别卡中创建所述第一存储区域。
  9. 根据权利要求7所述的数据处理装置,其特征在于,还包括:
    密钥存储单元,在将所述数据存储至所述身份识别卡的第一存储区域 时,根据所述终端的标识信息生成密钥,并将所述密钥分别存储至所述指定操作系统和所述身份识别卡中的第一存储区域。
  10. 根据权利要求9所述的数据处理装置,其特征在于,
    所述确定单元还用于:
    当接收到对所述身份识别卡的读取命令时,确定所述终端当前使用的第二操作系统;
    所述装置还包括:
    处理单元,当所述当前使用的第二操作系统为所述非指定操作系统时,只允许所述当前使用的第二操作系统读取所述身份识别卡的第二存储区域中的第二数据;
    检测单元,当所述当前使用的第二操作系统为所述指定操作系统时,检测所述身份识别卡中是否存在所述第一存储区域;
    匹配单元,在判断结果为所述身份识别卡中存在所述第一存储区域时,判断所述当前使用的第二操作系统中存储的密钥和所述第一存储区域中存储的密钥是否匹配;
    所述处理单元还用于:
    在判断结果为匹配时,允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据,否则,不允许所述当前使用的第二操作系统读取所述第一存储区域中的第一数据。
  11. 根据权利要求10所述的数据处理装置,其特征在于,还包括:
    加密单元,采用所述指定操作系统生成的所述密钥对所述第一存储区域中的第一数据进行加密处理;以及
    解密单元,在判断结果为匹配时,采用所述第一存储区域中存储的密钥对所述第一存储区域中的第一数据进行解密处理。
  12. 根据权利要求7至11中任一项所述的数据处理装置,其特征在于,还包括:
    设置单元,根据接收到的设置命令,在所述身份识别卡中设置所述第一存储区域和所述第二存储区域,以及所述第一存储区域和所述第二存储区域对应的容量。
PCT/CN2014/090105 2014-09-28 2014-10-31 数据处理方法和数据处理装置 WO2016045168A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP14902630.4A EP3200436B1 (en) 2014-09-28 2014-10-31 Data processing method and data processing apparatus
US15/468,662 US10085152B2 (en) 2014-09-28 2017-03-24 Data processing method, data processing apparatus and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410507842.6 2014-09-28
CN201410507842.6A CN105447402A (zh) 2014-09-28 2014-09-28 数据处理方法和数据处理装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/468,662 Continuation-In-Part US10085152B2 (en) 2014-09-28 2017-03-24 Data processing method, data processing apparatus and terminal

Publications (1)

Publication Number Publication Date
WO2016045168A1 true WO2016045168A1 (zh) 2016-03-31

Family

ID=55557565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/090105 WO2016045168A1 (zh) 2014-09-28 2014-10-31 数据处理方法和数据处理装置

Country Status (4)

Country Link
US (1) US10085152B2 (zh)
EP (1) EP3200436B1 (zh)
CN (1) CN105447402A (zh)
WO (1) WO2016045168A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3547195B1 (en) 2016-12-29 2020-11-25 Huawei Technologies Co., Ltd. System-on-chip and method for switching secure operating systems
CN109117081A (zh) * 2017-06-23 2019-01-01 中兴通讯股份有限公司 数据存储方法及装置、多功能卡、存储介质
CN112230852A (zh) * 2020-10-14 2021-01-15 北京华信安天信息科技有限公司 一种终端及处理sim卡中数据的方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1869931A (zh) * 2005-05-24 2006-11-29 乐金电子(昆山)电脑有限公司 移动终端机的操作系统更新系统及方法
CN101615123A (zh) * 2008-06-26 2009-12-30 比亚迪股份有限公司 一种移动终端操作系统的引导方法及移动终端
US20100135492A1 (en) * 2008-12-03 2010-06-03 Shenzhen Futaihong Precision Industry Co., Ltd. Anti-theft system and method for mobile phone
CN103544114A (zh) * 2013-10-12 2014-01-29 上海柯斯软件有限公司 基于单cpu卡的多m1卡控制系统及其控制方法

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003505802A (ja) * 1999-07-22 2003-02-12 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ データを記憶するためのデータキャリヤおよびそのようなデータキャリヤのための回路装置
FI114663B (fi) * 2001-12-20 2004-11-30 Nokia Corp Menetelmä ja järjestelmä käyttöjärjestelmätoimintojen suorittamiseksi sekä elektroniikkalaite
GB0226874D0 (en) * 2002-11-18 2002-12-24 Advanced Risc Mach Ltd Switching between secure and non-secure processing modes
KR100551962B1 (ko) * 2003-05-14 2006-02-20 주식회사 라스트정보기술 크래커 방지 기능을 갖는 컴퓨터 시스템
US7930501B2 (en) * 2004-04-23 2011-04-19 Panasonic Corporation Memory card, access device, and processing method of memory card
CN100487715C (zh) * 2007-01-12 2009-05-13 深圳兆日技术有限公司 一种数据安全存储系统和装置及方法
US8775824B2 (en) * 2008-01-02 2014-07-08 Arm Limited Protecting the security of secure data sent from a central processor for processing by a further processing device
US20120115435A1 (en) * 2010-11-09 2012-05-10 Microsoft Corporation Privacy in Mobile Device Communications
CN102263846B (zh) * 2011-08-15 2017-02-15 中兴通讯股份有限公司 一种用户信息存储方法及设备
GB2508344A (en) * 2012-11-28 2014-06-04 Ibm Creating an operating system dump
KR102096550B1 (ko) * 2013-08-12 2020-04-02 씨아이에스 맥스웰, 엘엘씨 운영 시스템 통합 도메인 관리
CN103413102A (zh) * 2013-08-30 2013-11-27 深圳市中兴移动通信有限公司 私密数据管理装置及其方法和移动终端
CN103458125B (zh) * 2013-09-06 2015-10-28 叶鼎 一种高等级私密性智能手机及其私密信息的保护方法
KR20150092890A (ko) * 2014-02-06 2015-08-17 한국전자통신연구원 가상화 기반 보안 강화 장치 및 그 방법

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1869931A (zh) * 2005-05-24 2006-11-29 乐金电子(昆山)电脑有限公司 移动终端机的操作系统更新系统及方法
CN101615123A (zh) * 2008-06-26 2009-12-30 比亚迪股份有限公司 一种移动终端操作系统的引导方法及移动终端
US20100135492A1 (en) * 2008-12-03 2010-06-03 Shenzhen Futaihong Precision Industry Co., Ltd. Anti-theft system and method for mobile phone
CN103544114A (zh) * 2013-10-12 2014-01-29 上海柯斯软件有限公司 基于单cpu卡的多m1卡控制系统及其控制方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3200436A4 *

Also Published As

Publication number Publication date
EP3200436A1 (en) 2017-08-02
US10085152B2 (en) 2018-09-25
EP3200436B1 (en) 2022-09-28
EP3200436A4 (en) 2018-04-18
CN105447402A (zh) 2016-03-30
US20170201877A1 (en) 2017-07-13

Similar Documents

Publication Publication Date Title
US8457308B2 (en) Communication system and method for protecting messages between two mobile phones
US9225696B2 (en) Method for different users to securely access their respective partitioned data in an electronic apparatus
WO2017202025A1 (zh) 终端文件加密方法、终端文件解密方法和终端
JP6397046B2 (ja) アドレス帳保護方法、装置及び通信システム
CN106874743B (zh) 一种智能卡密码保存及提取的方法及系统
CN104318286B (zh) Nfc标签数据的管理方法、管理系统和终端
WO2013182154A1 (zh) 一种对通讯终端上应用程序加、解密的方法、系统和终端
CN102291717B (zh) 数据保护方法和终端
CN106572427B (zh) 一种近距离通信的建立方法和装置
CN105933886B (zh) 一种esim号码的写入方法、安全系统、esim号码服务器及终端
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
CN102867157A (zh) 移动终端和数据保护方法
US11405782B2 (en) Methods and systems for securing and utilizing a personal data store on a mobile device
US20130073840A1 (en) Apparatus and method for generating and managing an encryption key
CN101815292A (zh) 一种移动终端的数据保护装置及方法
WO2016045168A1 (zh) 数据处理方法和数据处理装置
KR101067146B1 (ko) 휴대용 단말의 암호화 메시지 처리 방법 및 그 휴대용 단말
CN103458101B (zh) 一种手机私密联系人的硬件加密存储方法及系统
JP6349712B2 (ja) 携帯端末設定方法
KR20080099117A (ko) 임베디드 시스템에서 이동성 요소의 인증을 위한 방법
TW201424332A (zh) 個人資訊保護系統及方法
CN105635096A (zh) 数据模块的访问方法、系统和终端
KR20140047312A (ko) 개인 프라이버시 설정 장치 및 방법
US9306914B2 (en) Method and system for backing up profiles of authentication module
WO2015154398A1 (zh) 数据处理方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14902630

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2014902630

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014902630

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE