WO2016192161A1 - 一种数据处理方法和装置 - Google Patents
一种数据处理方法和装置 Download PDFInfo
- Publication number
- WO2016192161A1 WO2016192161A1 PCT/CN2015/082936 CN2015082936W WO2016192161A1 WO 2016192161 A1 WO2016192161 A1 WO 2016192161A1 CN 2015082936 W CN2015082936 W CN 2015082936W WO 2016192161 A1 WO2016192161 A1 WO 2016192161A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- operating system
- application
- target application
- data
- information list
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- the present invention relates to the field of terminal technologies, and in particular, to a data processing method and apparatus.
- a dual-system terminal is installed with a private private domain system (PPP system) and a secure enterprise domain (SED) system.
- PPP system private private domain system
- SED secure enterprise domain
- the system is a system with security mechanism, which is higher than the standard domain system; secondly, the security domain system can only process and store voice service data, and the standard domain system can process and store voice service data and data service data;
- data service data is stored and processed by a system with a lower security level, it is easy to cause important data service data (such as bank account number and password, WIFI account number and password, account number and password of various social applications, etc.) Lost or illegally leaked, the security of its terminal is still not high.
- important data service data such as bank account number and password, WIFI account number and password, account number and password of various social applications, etc.
- the present invention is based on the above problems, and proposes a new technical solution, which can filter received data service data and allocate important data service data to a system with a higher security level to prevent important data service data. Loss and illegal disclosure, thereby improving the security of the terminal.
- the first aspect of the present invention provides a data processing method for a terminal, where the terminal includes a first operating system and a second operating system, and the security level of the second operating system is higher than the first The security level of the operating system, the method includes:
- the data that processes the data service data is the second operating system
- the data is Service data is distributed to the second operating system for processing.
- determining whether the operating system that processes the data service data is a second operating system includes:
- the application information list includes the application identifier of the target application, determining that the operating system that processes the data service data is the second operating system.
- the method before the receiving, by the terminal of the first operating system, the data service data, the method further includes:
- the terminal running in the first operating system receives an installation package of the target application
- determining whether the operating system that installs the target application is a second operating system includes:
- the application information list includes the application identifier of the target application, it is determined that the operating system that installs the target application is the second operating system.
- the method further includes:
- the second aspect of the present invention further provides a data processing apparatus, configured for a terminal, where the terminal includes a first operating system and a second operating system, and the security level of the second operating system is higher than the first The security level of the operating system, the device includes:
- a receiving module configured to receive data service data
- a detecting module configured to determine whether an operating system that processes the data service data is a second operating system
- an allocating module configured to: if the operating system that processes the data service data is the second operating system, allocate the data service data to the second operating system for processing.
- the detecting module includes:
- An application detecting unit configured to determine a target application that processes the data service data
- a detecting unit configured to detect whether an application identifier of the target application is included in a preset application information list, where the application information list is used to store an application identifier of an application processed by the second operating system, if the application The information list includes the application identifier of the target application, and then determines that the operating system that processes the data service data is the second operating system.
- the receiving module is further configured to: receive an installation package of the target application;
- the detecting module is further configured to: determine whether an operating system that installs the target application is a second operating system;
- the device also includes:
- an installation module configured to install the target application to the second operating system if the application information list includes an application identifier of the target application.
- the detecting module is specifically configured to:
- the application information list is used to store an application identifier of the application processed by the second operating system, if the application information list includes Determining an application identifier of the target application, determining that an operating system installing the target application is the second operating system.
- the device further includes:
- a prompting module if the application identifier of the target application is not included in the application information list, prompting the user whether to install the target application to the second operating system;
- the installation module is further configured to: if the confirmation instruction for the prompt input is received, install the target application to the second operating system;
- an update module configured to add an application identifier of the target application to the application information list if a confirmation instruction for the prompt input is received.
- a third aspect of the present invention also provides a terminal, the terminal comprising a processor and a memory, wherein the memory stores a set of program codes, and the processor is configured to call the stored in the memory Program code to do the following:
- the data service data is allocated to the second operating system for processing.
- the determining, by the processor, whether the operating system that processes the data service data is a second operating system includes:
- the application information list includes the application identifier of the target application, determining that the operating system that processes the data service data is the second operating system.
- the processor of the first operating system before the processor of the first operating system receives the data service data, the processor further executes:
- the terminal running in the first operating system receives an installation package of the target application
- the determining, by the processor, whether the operating system for installing the target application is a second operating system includes:
- the application information list includes the application identifier of the target application, it is determined that the operating system that installs the target application is the second operating system.
- the processor further performs:
- the data service data is important data, and the data service data is allocated to the second operating system for processing, and the important data service data is allocated to a system with a higher security level, thereby preventing important data. Loss and illegal disclosure of data service data, thereby improving the security performance of the terminal.
- FIG. 1 is a flowchart of a data processing method according to an embodiment of the present invention.
- FIG. 2 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
- FIG. 3 is a flowchart of another data processing method according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a detection module according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of another terminal according to an embodiment of the present disclosure.
- FIG. 8 is a schematic structural diagram of still another terminal according to an embodiment of the present invention.
- FIG. 1 is a flowchart of a data processing method according to an embodiment of the present invention. The method is applied to a terminal, where the terminal is provided with a first operating system and a second operating system, and the security level of the second operating system is higher than the security level of the first operating system, as shown in FIG. Methods include:
- Step S110 The terminal running the first operating system receives the data service data.
- the first operating system may be run in the background of the terminal, or may be run on the front end of the terminal, that is, whether the first operating system is running in the background or the front end, and the terminal receives data service data, Invoking the first operating system to filter the data service data; specifically, when the terminal receives the data service data through the external hardware device, the data service data is delivered to the first operating system, where the first The operating system performs filtering detection on the data service data.
- Modem1 corresponds to SIM1 and Modem2 corresponds to SIM2.
- ordinary voice service data such as ordinary contact dialing, SMS or call
- the first operating system processes, the important voice service data of Modem1 and Modem2 (such as important contact dialing, short message or call) are processed by the second operating system, and the data service data is first filtered by the first operating system, and then by the first operating system.
- the important data service data obtained by the filtering is allocated to the second operating system for processing. Since the security level of the second operating system is higher than that of the first operating system, the loss and illegal leakage of important data service data can be reduced, thereby improving the The security performance of the terminal.
- the first operating system may include a standard domain system
- the second operating system may include a security domain system.
- Step S120 determining whether the operating system that processes the data service data is the second operating system; if the determination result is yes, executing step S130; otherwise, processing the received data service data by the first operating system.
- the terminal may determine a target application that processes the data service data, and detect whether the application identifier of the target application is included in the preset application information list, where the application information list is used. And storing an application identifier of the application processed by the second operating system, if the application information list includes an application identifier of the target application, determining that an operating system that processes the data service data is the second operation system.
- the specific step of the terminal determining the target application for processing the data service data may be: the terminal may record an application interface allocated for each application, and after receiving the data service data, the terminal may acquire the data service. Data-carrying application interface, according to the acquisition The application interface determines the target application of the data business data.
- the application identifier may pre-store the application identifier of the application processed by the second operating system.
- the application identifier may include an application name and/or keyword information, and the application name may be, for example, WeChat, QQ, NetEase mailbox, etc.
- the name corresponding to each application; the keyword information can identify keywords of a type of application such as a bank control;
- the application information list may be stored in the terminal before leaving the factory, or may be set by the user.
- the application identifier is exemplified by the application name.
- the terminal may detect whether the application name of the target application is included in the application information list, if the application information list Determining, by the application name of the target application, determining that an operating system that processes the data service data is the second operating system;
- the application identifier takes the keyword information as an example. After determining the target application of the data service data, the terminal may obtain an application name of the target application, and the terminal further applies an application name and application information of the target application.
- the keyword information in the list is subjected to fuzzy matching. If the matching is successful, the operating system that processes the data service data is determined to be the second operating system. It should be noted that how to perform module matching by keyword information is a technology in the field. Persons understandable and will not repeat them here.
- the terminal may determine a target application that processes the data service data, and determine an operating system that executes the target application according to a preset correspondence between the application and the operating system. If the determined operating system is the second operating system, the terminal determines that the operating system that processes the data service data is the second operating system.
- the terminal information may be in advance stored in the system information list of the corresponding relationship between the application and the operating system.
- the system information list may identify the corresponding application by using the application identifier, where the application identifier includes the application name and/or keyword information.
- the application name may be a name corresponding to each application such as WeChat, QQ, Netease mailbox, etc.
- the keyword information may be a keyword indicating a type of application such as a bank control;
- system information list may be stored in the terminal before leaving the factory, or may be set by the user.
- the application identifier is exemplified by the application name.
- the terminal may query the operating system corresponding to the target application according to the application name of the target application, if the query is The operating system is the second operating system, and determining that the operating system that processes the data service data is the second operating system;
- the application identifier takes the keyword information as an example.
- the terminal may obtain an application name of the target application, and the terminal further applies an application name and system information of the target application.
- Step S130 the data service data is allocated to the second operating system for processing.
- the second operating system may process the data service data by means of display or storage, etc., assuming that the data service data is WeChat data, the terminal may display the received WeChat data, and/or store the WeChat data locally.
- the terminal running in the first operating system receives the data service data, and determines whether the operating system that processes the data service data is the second operating system, which is equivalent to filtering the detected data service data. If the result of the determination is yes, indicating that the data service data is important data, the data service data is allocated to the second operating system for processing, and the important data service data is allocated to a higher security level.
- the system processes, thereby preventing the loss and illegal leakage of important data service data, thereby improving the security performance of the terminal.
- FIG. 3 is a flowchart of another data processing method according to an embodiment of the present invention; the method is applied to a terminal, where the terminal is provided with a first operating system and a second operating system, where the The security level of the second operating system is higher than the security level of the first operating system.
- the method shown in FIG. 3 may include:
- Step S310 the terminal running in the first operating system receives the installation package of the target application.
- the terminal can determine whether the received data is an installation package of the application according to the identifier of the installation package. If the determination result is yes, the terminal uses the application corresponding to the installation package as the target application.
- Step S320 it is determined whether the operating system of the target application is the second operating system, if the operating system of the target application is the second operating system, step S330 is performed; Otherwise, the target application is installed on the first operating system.
- the first operating system may include a standard domain system
- the second operating system may include a security domain system.
- the terminal running the first operating system when it receives the installation package of the target application, it may detect whether the preset application information list includes the application identifier of the target application, if The application information list includes an application identifier of the target application, and then determines that an operating system that installs the target application is the second operating system.
- the application identifier is pre-stored with the application identifier of the application processed by the second operating system.
- the application identifier may include an application name and/or keyword information, and the application name may be, for example, WeChat, QQ, and Netease.
- the name corresponding to each application such as a mailbox;
- the keyword information may identify keywords of a type of application such as a bank control;
- the application information list may be stored in the terminal before leaving the factory, or may be set by the user.
- the application identifier is an example of an application name
- the terminal may obtain an application name of the installation package, and detect whether an entry containing the application name of the target application exists in the application information list, and if the determination result is yes, determine
- the application information list includes an application identifier of the target application.
- the application identifier is an example of the keyword information
- the terminal may obtain an application name of the installation package, and perform fuzzy matching on the application information in the application information list. If the matching is successful, determine the application information list. Contains the application ID of the target application. It should be noted that how to perform module matching by keyword information is understandable by those skilled in the art, and details are not described herein again.
- the terminal may prompt the user whether to install the target application to the second operating system, if receiving the input for the prompt Confirming the instruction, executing step S330, and adding an application identifier of the target application to the application information list, so that when the terminal subsequently receives the data service data of the target application, the data service may be The data is distributed to the second operating system for processing.
- the terminal running in the first operating system may determine to execute the target application according to the corresponding relationship between the preset application and the operating system.
- An operating system of the program if the determined operating system is the second operating system, executing step S330; if the determined operating system is the first operating system, The target application is installed on the first operating system.
- the terminal pre-stores a system information list of the corresponding relationship between the application and the operating system.
- the system information list may identify the corresponding application by using the application identifier, where the application identifier includes the application name and/or keyword information.
- the application name may be a name corresponding to each application such as WeChat, QQ, Netease mailbox, etc.
- the keyword information may be a keyword for identifying a type of application such as a bank control
- the system information list may be a factory It is stored in the terminal before, and can also be set by the user.
- the application identifier is an example of an application name.
- the terminal may query the operating system corresponding to the target application according to the application name of the installation package, and if the queried operating system is the first In the second operating system, step S330 is performed; if the queried operating system is the first operating system, the installation package of the target application is installed in the first operating system.
- the application identifier takes the keyword information as an example.
- the terminal may obtain the application name of the installation package, and the terminal further uses the application name of the target application and the system information list.
- the keyword information is subjected to fuzzy matching, and detects whether the operating system corresponding to the successfully matched keyword information is the second operating system. If the determination result is yes, step S330 is performed; if the operating system is the first operating system, The installation package of the target application is installed on the first operating system.
- the terminal may directly install the installation package in the first operating system; further, the terminal may prompt the user whether to The target application is installed in the second operating system, and if the confirmation instruction for the prompt input is received, step S330 is performed, and the application identifier of the target application is added to the application information list to When the terminal subsequently receives the data service data of the target application, the data service data may be allocated to the second operating system for processing.
- Step S330 installing the target application to the second operating system.
- the terminal running the first operating system receives the target application.
- the application identifier of the target application may be detected in the application information list. If the determination result is yes, indicating that the data service data of the target application is important data, the target application is used.
- the program is installed in the second operating system, so that the data of the target application is processed by the second operating system, and the important data service data is allocated to the system with higher security level, thereby preventing important data service data. Loss and illegal disclosure, which improves the security of the terminal.
- FIG. 4 is a flowchart of still another data processing method according to an embodiment of the present invention; the method is applied to a terminal, where the terminal is provided with a first operating system and a second operating system, where the The security level of the second operating system is higher than the security level of the first operating system, and the second operating system is a security domain system.
- the first operating system uses a standard domain system as an example, as shown in FIG.
- the method can include:
- Step S410 the terminal running in the standard domain system receives the installation package of the target application.
- Step S420 Detect whether an application identifier of the target application is included in the application information list, where the application information list is used to store an application identifier of an application processed by the security domain system.
- Step S430 if the application information list includes the application identifier of the target application, the target application is installed in the security domain system.
- Step S440 if the application identifier of the target application is not included in the application information list, the target application is installed in the standard domain system.
- Step S450 the terminal running in the standard domain system receives data service data.
- Step S460 determining whether the operating system that processes the data service data is a secure domain system.
- Step S470 If the operating system that processes the data service data is the security domain system, the data service data is allocated to the security domain system for processing.
- Step S480 If the operating system that processes the data service data is not the security domain system, the standard domain system processes the data service data.
- FIG. 5 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention.
- the data processing apparatus is used for a terminal, a first operating system and a second operating system on the terminal, and the second The security level of the operating system is higher than the security level of the first operating system.
- the data processing device 5 as shown in FIG. 5 may include at least a receiving module 51, a detecting module 52, and an allocating module 53, among them:
- the receiving module 51 is configured to receive data service data.
- the detecting module 52 is configured to determine whether an operating system that processes the data service data is a second operating system
- FIG. 6 is a schematic structural diagram of a detection module according to an embodiment of the present invention. As shown in FIG. 6, the detection module 52 may further include an application detection unit 521 and a detection unit 522, where:
- An application detecting unit 521 configured to determine a target application that processes the data service data
- the detecting unit 522 is configured to detect whether the preset application information list includes an application identifier of the target application, where the application information list is used to store an application identifier of the application processed by the second operating system, if The application information list includes the application identifier of the target application, and then determines that the operating system that processes the data service data is the second operating system.
- the allocating module 53 is configured to allocate the data service data to the second operating system for processing if the operating system for processing the data service data is the second operating system.
- the receiving module 51 is further configured to: receive an installation package of the target application;
- the detecting module 52 is further configured to: determine whether an operating system that installs the target application is a second operating system;
- the detecting module 52 may be configured to detect whether the application identifier of the target application is included in the preset application information list, where the application information list is used to store an application identifier of the application processed by the second operating system. If the application information list includes the application identifier of the target application, it is determined that the operating system that installs the target application is the second operating system.
- the data processing device 5 shown in FIG. 5 may further include:
- the installation module 54 is configured to install the target application to the second operating system if the application information list includes an application identifier of the target application.
- the data processing device 5 may further include a prompting module 55 and an updating module 56, wherein:
- the prompting module 55 is configured to prompt the user whether to install the target application to the second operating system if the application identifier of the target application is not included in the application information list;
- the installation module 54 is further configured to: if the confirmation instruction for the prompt input is received, install the target application to the second operating system;
- the update module 56 is configured to add an application identifier of the target application to the application information list if a confirmation instruction for the prompt input is received.
- the first operating system is a standard domain system
- the second operating system is a security domain system.
- FIG. 7 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
- the terminal 7 in the embodiment of the present invention includes the data processing apparatus 5 as described above.
- the terminal 7 installed with multiple systems receives the data service data
- the terminal 7 running the current system receives the switching instruction for the target system, it determines whether the operating system that processes the data service data is For the second operating system, if the operating system that processes the data service data is the second operating system, the data service data is allocated to the second operating system for processing, and important data service data is allocated. It handles the system with higher security level, thus preventing the loss and illegal leakage of important data service data, thereby improving the security performance of the terminal.
- FIG. 8 is a schematic structural diagram of still another terminal according to an embodiment of the present invention.
- the terminal 8 may include: at least one processor 81, such as a CPU, at least one communication bus 82, and a memory. 83; communication bus 82 is used to implement connection communication between these components; memory 83 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
- a set of program codes is stored in the memory 83, and the processor 81 is configured to call the program code stored in the memory 83 for performing the following operations:
- the data service data is allocated to the second operating system for processing.
- the determining, by the processor 81, whether the operating system that processes the data service data is a second operating system includes:
- the application information list is used to store an application identifier of the application processed by the second operating system
- the application information list includes the application identifier of the target application, determining that the operating system that processes the data service data is the second operating system.
- the processor 81 before the processor of the first operating system receives the data service data, the processor 81 further executes:
- the terminal running in the first operating system receives an installation package of the target application
- the specific operation of the processor 81 to determine whether the operating system of the target application is the second operating system includes:
- the application information list includes the application identifier of the target application, it is determined that the operating system that installs the target application is the second operating system.
- the processor 81 further performs:
- Modules or units in the apparatus of the embodiments of the present invention may be combined, divided, and deleted according to actual needs.
- the module or unit in the embodiment of the present invention may be implemented by a general-purpose integrated circuit, such as a CPU (Central Processing Unit) or an ASIC (Application Specific Integrated Circuit).
- a general-purpose integrated circuit such as a CPU (Central Processing Unit) or an ASIC (Application Specific Integrated Circuit).
- the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Stored Programmes (AREA)
Abstract
一种数据处理方法,包括:运行在第一操作系统的终端接收数据业务数据;判断处理所述数据业务数据的操作系统是否为第二操作系统,其中,所述第二操作系统的安全等级高于所述第一操作系统的安全等级;若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。相应地,还公开了一种数据处理装置。可以过滤接收到的数据业务数据,并将重要的数据业务数据分配给安全等级较高的系统处理,从而防止重要的数据业务数据的丢失和非法泄露,进而提升终端的安全性能。
Description
本申请要求于2015年5月29日提交中国专利局,申请号为201510288853.4、发明名称为“一种数据处理方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
本发明涉及终端技术领域,尤其涉及一种数据处理方法和装置。
目前,随着技术的发展,一个终端上可以同时运行两个独立的系统,且这两个系统之间可以互相通信,但各个系统在功能和安全性等方面有所不同;以目前市面上的双系统终端为例,终端上安装有安全等级较低的标准域(Personal Private Domain)系统(简称PPD系统)和安全等级较高的安全域(Secure Enterprise Domain)系统(简称SED系统),安全域系统是含有安全机制的系统,其安全性比标准域系统高;其次,安全域系统只能处理和存储语音业务数据,而标准域系统可以处理和存储语音业务数据和数据业务数据;
由于,数据业务数据都是由安全等级较低的系统存储和处理,因此,很容易造成重要的数据业务数据(如银行账号和密码、WIFI账号和密码、各种社交应用的账号和密码等)丢失或遭到非法泄露,其终端的安全性仍然不高。
发明内容
本发明正是基于上述问题,提出了一种新的技术方案,可以过滤接收到的数据业务数据,并将重要的数据业务数据分配给安全等级较高的系统处理,从而防止重要的数据业务数据的丢失和非法泄露,进而提升终端的安全性能。
有鉴于此,本发明第一方面提供了一种数据处理方法,用于终端,所述终端包括第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,所述方法包括:
运行在第一操作系统的终端接收数据业务数据;
判断处理所述数据业务数据的操作系统是否为第二操作系统;
若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据
业务数据分配给所述第二操作系统处理。
可选的,所述判断处理所述数据业务数据的操作系统是否为第二操作系统包括:
确定处理所述数据业务数据的目标应用程序;
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;
若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
可选的,所述运行在第一操作系统的终端接收数据业务数据之前,所述方法还包括:
运行在所述第一操作系统的所述终端接收目标应用程序的安装包;
判断安装所述目标应用程序的操作系统是否为第二操作系统;
若安装所述目标应用程序的操作系统为所述第二操作系统,则将所述目标应用程序安装于所述第二操作系统。
可选的,所述判断安装所述目标应用程序的操作系统是否为第二操作系统包括:
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;
若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
可选的,若所述应用信息列表中不包含所述目标应用程序的应用标识,所述方法还包括:
提示用户是否将所述目标应用程序安装于所述第二操作系统;
若接收到针对所述提示输入的确认指令,则执行所述将所述目标应用程序安装于所述第二操作系统的步骤,并将所述目标应用程序的应用标识添加到所述应用信息列表中。
相应的,本发明第二方面还提供了一种数据处理装置,用于终端,所述终端包括第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,所述装置包括:
接收模块,用于接收数据业务数据;
检测模块,用于判断处理所述数据业务数据的操作系统是否为第二操作系统;
分配模块,用于若处理所述数据业务数据的操作系统是所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
可选的,所述检测模块包括:
应用程序检测单元,用于确定处理所述数据业务数据的目标应用程序;
检测单元,用于检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
可选的,所述接收模块还用于:接收目标应用程序的安装包;
所述检测模块还用于:判断安装所述目标应用程序的操作系统是否为第二操作系统;
所述装置还包括:
安装模块,用于若所述应用信息列表中包含所述目标应用程序的应用标识,则将所述目标应用程序安装于所述第二操作系统。
可选的,所述检测模块具体用于:
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
可选的,所述装置还包括:
提示模块,用于若所述应用信息列表中不包含所述目标应用程序的应用标识,则提示用户是否将所述目标应用程序安装于所述第二操作系统;
所述安装模块还用于:若接收到针对所述提示输入的确认指令,则将所述目标应用程序安装于所述第二操作系统;
更新模块,用于若接收到针对所述提示输入的确认指令,则将所述目标应用程序的应用标识添加到所述应用信息列表中。
本发明第三方面还提供了一种终端,所述终端包括处理器和存储器,其中,所述存储器中存储一组程序代码,且所述处理器用于调用所述存储器中存储的
程序代码,用于执行以下操作:
运行在第一操作系统的终端接收数据业务数据;
判断处理所述数据业务数据的操作系统是否为第二操作系统;
若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
可选的,所述处理器判断处理所述数据业务数据的操作系统是否为第二操作系统的具体操作包括:
确定处理所述数据业务数据的目标应用程序;
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;
若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
可选的,所述处理器运行在第一操作系统的终端接收数据业务数据之前,还执行:
运行在所述第一操作系统的所述终端接收目标应用程序的安装包;
判断安装所述目标应用程序的操作系统是否为第二操作系统;
若安装所述目标应用程序的操作系统为所述第二操作系统,则将所述目标应用程序安装于所述第二操作系统。
可选的,所述处理器判断安装所述目标应用程序的操作系统是否为第二操作系统的具体操作包括:
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;
若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
可选的,若所述应用信息列表中不包含所述目标应用程序的应用标识,所述处理器还执行:
提示用户是否将所述目标应用程序安装于所述第二操作系统;
若接收到针对所述提示输入的确认指令,则执行所述将所述目标应用程序安装于所述第二操作系统的步骤,并将所述目标应用程序的应用标识添加到所
述应用信息列表中。
实施本发明,具有以下有益效果:
运行在所述第一操作系统的终端接收数据业务数据,再判断处理所述数据业务数据的操作系统是否为第二操作系统,相当于过滤检测到的数据业务数据,若判断结果为是,说明所述数据业务数据为重要的数据,则将所述数据业务数据分配给所述第二操作系统处理,实现了将重要的数据业务数据分配给安全等级较高的系统处理,从而防止了重要的数据业务数据的丢失和非法泄露,进而提升了终端的安全性能。
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本发明实施例提供的一种数据处理方法的流程图;
图2是本发明实施例提供的一种终端的结构示意图;
图3是本发明实施例提供的另一种数据处理方法的流程图;
图4是本发明实施例提供的又一种数据处理方法的流程图;
图5是本发明实施例提供的一种数据处理装置的结构示意图;
图6是本发明实施例提供的一种检测模块的结构示意图;
图7是本发明实施例提供的另一种终端的结构示意图;
图8是本发明实施例提供的又一种终端的结构示意图。
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
请参阅图1,图1是本发明实施例提供的一种数据处理方法的流程图;所
述方法应用于终端,所述终端上设有第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,如图1所示所述方法包括:
步骤S110,运行在第一操作系统的终端接收数据业务数据。
所述第一操作系统可以在所述终端的后台运行,也可以在所述终端的前端运行,也就是说,无论第一操作系统是运行在后台还是前端,终端接收到数据业务数据时,都调用第一操作系统对该数据业务数据进行过滤处理;具体的,终端通过外部硬件设备接收到数据业务数据时,则将所述数据业务数据交给所述第一操作系统,由所述第一操作系统对所述数据业务数据进行过滤检测。
以双卡双待手机为例,Modem1对应卡槽SIM1,Modem2对应卡槽SIM2,如图2所示,假设,Modem1和Modem2的普通语音业务数据(如普通联系人拨号、短信或通话等)由第一操作系统处理,Modem1和Modem2的重要语音业务数据(如重要联系人拨号、短信或通话等)由第二操作系统处理,数据业务数据先由第一操作系统过滤后,由第一操作系统将过滤得到的重要数据业务数据分配给第二操作系统处理,由于,第二操作系统的安全等级高于第一操作系统,因此,可以降低重要的数据业务数据的丢失和非法泄露,进而提升了终端的安全性能。
其中,所述第一操作系统可以包括标准域系统,所述第二操作系统可以包括安全域系统。
步骤S120,判断处理所述数据业务数据的操作系统是否为第二操作系统;若判断结果为是,则执行步骤S130;否则,由所述第一操作系统处理接收到的所述数据业务数据。
在一种可选的实施方式中,终端可以确定处理所述数据业务数据的目标应用程序,并检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
其中,终端确定处理所述数据业务数据的目标应用程序的具体步骤可以为:终端可以记录为每个应用程序分配的应用程序接口,当终端接收到数据业务数据后,终端可以获取所述数据业务数据携带的应用程序接口,根据获取到
的应用程序接口确定所述数据业务数据的目标应用程序。
其中,应用信息列表中可以预先存储由第二操作系统处理的应用程序的应用标识;可选的,应用标识可以包括应用名称和/或关键字信息,应用名称可以如微信、QQ、网易邮箱等等各个应用程序对应的名称;关键字信息可以如银行控件等标识一类应用程序的关键字;
需要说明的是,所述应用信息列表可以是出厂前就存储于所述终端的,也可以由用户自行设置。
所述应用标识以应用名称为例,终端在确定处理所述数据业务数据的目标应用程序之后,可以检测所述应用信息列表中是否包含所述目标应用程序的应用名称,若所述应用信息列表中包含所述目标应用程序的应用名称,则判定处理所述数据业务数据的操作系统为所述第二操作系统;
所述应用标识以关键字信息为例,终端在确定所述数据业务数据的目标应用程序之后,可以获取所述目标应用程序的应用名称,终端再将所述目标应用程序的应用名称与应用信息列表中的关键字信息进行模糊匹配,若匹配成功,则判定处理所述数据业务数据的操作系统为所述第二操作系统;需要说明的是,如何通过关键字信息进行模块匹配是本领域技术人员可理解的,在此不再赘述。
在另一种可选的实施方式中,终端可以确定处理所述数据业务数据的目标应用程序,并根据预设的应用程序与操作系统的对应关系,确定执行所述目标应用程序的操作系统,若确定的所述操作系统为所述第二操作系统,终端则判定处理所述数据业务数据的操作系统为所述第二操作系统。
其中,终端确定处理所述数据业务数据的目标应用程序的具体步骤可以参考上述描述,在此不再赘述。
其中,终端预先可以存储应用程序与操作系统的对应关系的系统信息列表;可选的,系统信息列表可以通过应用标识来标识对应的应用程序,所述应用标识包括应用名称和/或关键字信息,应用名称可以如微信、QQ、网易邮箱等等各个应用程序对应的名称;关键字信息可以如银行控件等标识一类应用程序的关键字;
需要说明的是,所述系统信息列表可以是出厂前就存储于所述终端的,也可以由用户自行设置。
所述应用标识以应用名称为例,终端在确定处理所述数据业务数据的目标应用程序之后,可以根据所述目标应用程序的应用名称查询所述目标应用程序对应的操作系统,若查询到的操作系统为第二操作系统,则判定处理所述数据业务数据的操作系统为所述第二操作系统;
所述应用标识以关键字信息为例,终端在确定所述数据业务数据的目标应用程序之后,可以获取所述目标应用程序的应用名称,终端再将所述目标应用程序的应用名称与系统信息列表中的关键字信息进行模糊匹配,并检测匹配成功的关键系信息对应的操作系统是否为第二操作系统,若判定结果为是,则判定处理所述数据业务数据的操作系统为所述第二操作系统;需要说明的是,如何通过关键字信息进行模块匹配是本领域技术人员可理解的,在此不再赘述。
步骤S130,将所述数据业务数据分配给所述第二操作系统处理。
第二操作系统可以通过显示或存储等方式处理所述数据业务数据,假设,所述数据业务数据为微信的数据,终端可以显示接收到的微信数据,和/或将微信数据存储于本地。
在图1所示的实施例中,运行在第一操作系统的终端接收数据业务数据,再判断处理所述数据业务数据的操作系统是否为第二操作系统,相当于过滤检测到的数据业务数据,若判断结果为是,说明所述数据业务数据为重要的数据,则将所述数据业务数据分配给所述第二操作系统处理,实现了将重要的数据业务数据分配给安全等级较高的系统处理,从而防止了重要的数据业务数据的丢失和非法泄露,进而提升了终端的安全性能。
请参阅图3,图3是本发明实施例提供的另一种数据处理方法的流程图;所述方法应用于终端,所述终端上设有第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,如图3所示所述方法可以包括:
步骤S310,运行在第一操作系统的终端接收目标应用程序的安装包。
终端可以根据安装包的标识判断接收到的数据是否为应用程序的安装包,若判断结果为是,终端则将安装包对应的应用程序作为目标应用程序。
步骤S320,判断安装所述目标应用程序的操作系统是否为第二操作系统,若安装所述目标应用程序的操作系统为所述第二操作系统,则执行步骤S330;
否则,将所述目标应用程序安装于第一操作系统。
其中,所述第一操作系统可以包括标准域系统,所述第二操作系统可以包括安全域系统。
在一种可选的实施方式中,运行在第一操作系统的终端接收到目标应用程序的安装包时,可以检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
其中,应用信息列表中预先存储了由第二操作系统处理的应用程序的应用标识;可选的,所述应用标识可以包括应用名称和/或关键字信息,应用名称可以如微信、QQ、网易邮箱等等各个应用程序对应的名称;关键字信息可以如银行控件等标识一类应用程序的关键字;
需要说明的是,所述应用信息列表可以是出厂前就存储于所述终端的,也可以由用户自行设置。
所述应用标识以应用名称为例,终端可以获取安装包的应用名称,并检测所述应用信息列表中是否存在包含所述目标应用程序的应用名称的表项,若判断结果为是,则判定所述应用信息列表中包含所述目标应用程序的应用标识。
所述应用标识以关键字信息为例,终端可以获取安装包的应用名称,并将所述应用名称与应用信息列表中的关键字信息进行模糊匹配,若匹配成功,则判定所述应用信息列表中包含所述目标应用程序的应用标识。需要说明的是,如何通过关键字信息进行模块匹配是本领域技术人员可理解的,在此不再赘述。
进一步的,若所述应用信息列表中不包含所述目标应用程序的应用标识,终端可以提示用户是否将所述目标应用程序安装于所述第二操作系统,若接收到针对所述提示输入的确认指令,则执行步骤S330,并将所述目标应用程序的应用标识添加到所述应用信息列表中,以使终端后续接收到所述目标应用程序的数据业务数据时,可以将所述数据业务数据分配给第二操作系统处理。
在另一种可选的实施方式中,运行在第一操作系统的终端接收到目标应用程序的安装包时,终端可以根据预设的应用程序与操作系统的对应关系,确定执行所述目标应用程序的操作系统,若确定的所述操作系统为所述第二操作系统,则执行步骤S330;若确定的所述操作系统为第一操作系统,则将所述目
标应用程序安装于第一操作系统。
其中,终端预先存储了应用程序与操作系统的对应关系的系统信息列表;可选的,系统信息列表可以通过应用标识来标识对应的应用程序,所述应用标识包括应用名称和/或关键字信息,应用名称可以如微信、QQ、网易邮箱等等各个应用程序对应的名称;关键字信息可以如银行控件等标识一类应用程序的关键字;需要说明的是,所述系统信息列表可以是出厂前就存储于所述终端的,也可以由用户自行设置。
所述应用标识以应用名称为例,终端在接收到目标应用程序的安装包之后,可以根据所述安装包的应用名称查询所述目标应用程序对应的操作系统,若查询到的操作系统为第二操作系统,则执行步骤S330;若查询到的操作系统为第一操作系统,则将所述目标应用程序的安装包安装于第一操作系统。
所述应用标识以关键字信息为例,终端在接收到目标应用程序的安装包之后,可以获取所述安装包的应用名称,终端再将所述目标应用程序的应用名称与系统信息列表中的关键字信息进行模糊匹配,并检测匹配成功的关键字信息对应的操作系统是否为第二操作系统,若判定结果为是,则执行步骤S330;若其操作系统为第一操作系统,则将所述目标应用程序的安装包安装于第一操作系统。
若所述系统信息列表中不存在包含所述安装包的应用标识的表项,可选的,终端可以直接将所述安装包安装于第一操作系统;进一步的,终端可以提示用户是否将所述目标应用程序安装于所述第二操作系统,若接收到针对所述提示输入的确认指令,则执行步骤S330,并将所述目标应用程序的应用标识添加到所述应用信息列表中,以使终端后续接收到所述目标应用程序的数据业务数据时,可以将所述数据业务数据分配给第二操作系统处理。
步骤S330,将所述目标应用程序安装于所述第二操作系统。
需要说明的是,终端如何根据安装包安装应用程序是本领域技术人员可理解的,在此不再赘述。
需要指出的是,上述图1和图3对应的两个流程可以在同一个实施例中同时存在(如图4所示),也可以在一个实施例中只采用其中一个过程与现有技术相结合的情况,本发明实施例并未对此进行限制。
在图3所示的实施例中,运行在第一操作系统的终端接收到目标应用程序
的安装包时,可以先检测应用信息列表中是否包含所述目标应用程序的应用标识,若判断结果为是,说明所述目标应用程序的数据业务数据为重要的数据,则将所述目标应用程序安装于第二操作系统,以使由第二操作系统处理所述目标应用程序的数据,实现了将重要的数据业务数据分配给安全等级较高的系统处理,从而防止了重要的数据业务数据的丢失和非法泄露,进而提升了终端的安全性能。
请参阅图4,图4是本发明实施例提供的又一种数据处理方法的流程图;所述方法应用于终端,所述终端上设有第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,所述第二操作系统以安全域系统为例,所述第一操作系统以标准域系统为例,如图4所示所述方法可以包括:
步骤S410,运行在标准域系统的终端接收目标应用程序的安装包。
步骤S420,检测应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储安全域系统处理的应用程序的应用标识。
步骤S430,若所述应用信息列表中包含所述目标应用程序的应用标识,则将所述目标应用程序安装于所述安全域系统。
步骤S440,若所述应用信息列表中不包含所述目标应用程序的应用标识,则将所述目标应用程序安装于所述标准域系统。
步骤S450,运行在所述标准域系统的终端接收数据业务数据。
步骤S460,判断处理所述数据业务数据的操作系统是否为安全域系统。
步骤S470,若处理所述数据业务数据的操作系统为所述安全域系统,则将所述数据业务数据分配给所述安全域系统处理。
步骤S480,若处理所述数据业务数据的操作系统不为所述安全域系统,所述标准域系统则处理所述数据业务数据。
请参阅图5,图5是本发明实施例提供的一种数据处理装置的结构示意图;所述数据处理装置用于终端,所述终端上第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级;如图5所示所述数据处理装置5至少可以包括:接收模块51、检测模块52以及分配模块53,
其中:
接收模块51,用于接收数据业务数据;
检测模块52,用于判断处理所述数据业务数据的操作系统是否为第二操作系统;
图6是本发明实施例提供的一种检测模块的结构示意图,如图6所示,所述检测模块52还可以包括应用程序检测单元521和检测单元522,其中:
应用程序检测单元521,用于确定处理所述数据业务数据的目标应用程序;
检测单元522,用于检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
分配模块53,用于若处理所述数据业务数据的操作系统是所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
进一步的,所述接收模块51还可以用于:接收目标应用程序的安装包;
所述检测模块52还可以用于:判断安装所述目标应用程序的操作系统是否为第二操作系统;
具体的,所述检测模块52可以检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
如图5所示所述数据处理装置5还可以包括:
安装模块54,用于若所述应用信息列表中包含所述目标应用程序的应用标识,则将所述目标应用程序安装于所述第二操作系统。
再进一步的,所述数据处理装置5还可以包括提示模块55以及更新模块56,其中:
提示模块55,用于若所述应用信息列表中不包含所述目标应用程序的应用标识,则提示用户是否将所述目标应用程序安装于所述第二操作系统;
所述安装模块54还用于:若接收到针对所述提示输入的确认指令,则将所述目标应用程序安装于所述第二操作系统;
更新模块56,用于若接收到针对所述提示输入的确认指令,则将所述目标应用程序的应用标识添加到所述应用信息列表中。
其中,所述第一操作系统为标准域系统,所述第二操作系统为安全域系统。
可理解的是,本实施例的数据处理装置5的各功能模块的功能可根据上述方法实施例中的方法具体实现,可以具体对应参考图1~图3方法实施例的相关描述,此处不再赘述。
请参阅图7,图7是本发明实施例提供的一种终端的结构示意图;如图7所示,本发明实施例中的终端7包括如上述所述的数据处理装置5。
在本发明实施例中,安装有多系统的终端7接收到数据业务数据时,当运行在当前系统的终端7接收到针对目标系统的切换指令时,判断处理所述数据业务数据的操作系统是否为第二操作系统,若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理,实现了将重要的数据业务数据分配给安全等级较高的系统处理,从而防止了重要的数据业务数据的丢失和非法泄露,进而提升了终端的安全性能。
请参阅图8,图8是本发明实施例提供的又一种终端的结构示意图,如图8所示,该终端8可以包括:至少一个处理器81,例如CPU,至少一个通信总线82以及存储器83;通信总线82用于实现这些组件之间的连接通信;存储器83可以是高速RAM存储器,也可以是非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。存储器83中存储一组程序代码,且处理器81用于调用存储器83中存储的程序代码,用于执行以下操作:
运行在第一操作系统的终端接收数据业务数据;
判断处理所述数据业务数据的操作系统是否为第二操作系统;
若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
可选的,所述处理器81判断处理所述数据业务数据的操作系统是否为第二操作系统的具体操作包括:
确定处理所述数据业务数据的目标应用程序;
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述
应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;
若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
可选的,所述处理器81运行在第一操作系统的终端接收数据业务数据之前,还执行:
运行在所述第一操作系统的所述终端接收目标应用程序的安装包;
判断安装所述目标应用程序的操作系统是否为第二操作系统;
若安装所述目标应用程序的操作系统为所述第二操作系统,则将所述目标应用程序安装于所述第二操作系统。
进一步的,所述处理器81判断安装所述目标应用程序的操作系统是否为第二操作系统的具体操作包括:
检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;
若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
可选的,若所述应用信息列表中不包含所述目标应用程序的应用标识,所述处理器81还执行:
提示用户是否将所述目标应用程序安装于所述第二操作系统;
若接收到针对所述提示输入的确认指令,则执行所述将所述目标应用程序安装于所述第二操作系统的步骤,并将所述目标应用程序的应用标识添加到所述应用信息列表中。
需要说明的是,在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详细描述的部分,可以参见其他实施例的相关描述。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本发明实施例所必须的。
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。
本发明实施例装置中的模块或单元可以根据实际需要进行合并、划分和删减。
本发明实施例中所述模块或单元,可以通过通用集成电路,例如CPU(Central Processing Unit,中央处理器),或通过ASIC(Application Specific Integrated Circuit,专用集成电路)来实现。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)或随机存储记忆体(Random Access Memory,RAM)等。
以上所揭露的仅为本发明较佳实施例而已,当然不能以此来限定本发明之权利范围,因此依本发明权利要求所作的等同变化,仍属本发明所涵盖的范围。
Claims (15)
- 一种数据处理方法,用于终端,其特征在于,所述终端上安装有第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,所述方法包括:运行在第一操作系统的终端接收数据业务数据;判断处理所述数据业务数据的操作系统是否为第二操作系统;若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
- 如权利要求1所述的方法,其特征在于,所述判断处理所述数据业务数据的操作系统是否为第二操作系统包括:确定处理所述数据业务数据的目标应用程序;检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
- 如权利要求1所述的方法,其特征在于,所述运行在第一操作系统的终端接收数据业务数据之前,所述方法还包括:运行在所述第一操作系统的所述终端接收目标应用程序的安装包;判断安装所述目标应用程序的操作系统是否为第二操作系统;若安装所述目标应用程序的操作系统为所述第二操作系统,则将所述目标应用程序安装于所述第二操作系统。
- 如权利要求3所述的方法,其特征在于,所述判断安装所述目标应用程序的操作系统是否为第二操作系统包括:检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
- 如权利要求4所述的方法,其特征在于,若所述应用信息列表中不包含所述目标应用程序的应用标识,所述方法还包括:提示用户是否将所述目标应用程序安装于所述第二操作系统;若接收到针对所述提示输入的确认指令,则执行所述将所述目标应用程序安装于所述第二操作系统的步骤,并将所述目标应用程序的应用标识添加到所述应用信息列表中。
- 一种数据处理装置,用于终端,其特征在于,所述终端上安装有第一操作系统和第二操作系统,所述第二操作系统的安全等级高于所述第一操作系统的安全等级,所述装置包括:接收模块,用于接收数据业务数据;检测模块,用于判断处理所述数据业务数据的操作系统是否为第二操作系统;分配模块,用于若处理所述数据业务数据的操作系统是所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
- 如权利要求6所述的装置,其特征在于,所述检测模块包括:应用程序检测单元,用于确定处理所述数据业务数据的目标应用程序;检测单元,用于检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
- 如权利要求6所述的装置,其特征在于,所述接收模块还用于:接收目标应用程序的安装包;所述检测模块还用于:判断安装所述目标应用程序的操作系统是否为第二 操作系统;所述装置还包括:安装模块,用于若所述应用信息列表中包含所述目标应用程序的应用标识,则将所述目标应用程序安装于所述第二操作系统。
- 如权利要求8所述的装置,其特征在于,所述检测模块具体用于:检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识,若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
- 如权利要求9所述的装置,其特征在于,所述装置还包括:提示模块,用于若所述应用信息列表中不包含所述目标应用程序的应用标识,则提示用户是否将所述目标应用程序安装于所述第二操作系统;所述安装模块还用于:若接收到针对所述提示输入的确认指令,则将所述目标应用程序安装于所述第二操作系统;更新模块,用于若接收到针对所述提示输入的确认指令,则将所述目标应用程序的应用标识添加到所述应用信息列表中。
- 一种终端,其特征在于,所述终端包括处理器和存储器,其中,所述存储器中存储一组程序代码,且所述处理器用于调用所述存储器中存储的程序代码,用于执行以下操作:运行在第一操作系统的终端接收数据业务数据;判断处理所述数据业务数据的操作系统是否为第二操作系统;若处理所述数据业务数据的操作系统为所述第二操作系统,则将所述数据业务数据分配给所述第二操作系统处理。
- 如权利要求11所述的终端,其特征在于,所述处理器判断处理所述数据业务数据的操作系统是否为第二操作系统的具体操作包括:确定处理所述数据业务数据的目标应用程序;检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;若所述应用信息列表中包含所述目标应用程序的应用标识,则判定处理所述数据业务数据的操作系统为所述第二操作系统。
- 如权利要求11所述的终端,其特征在于,所述处理器运行在第一操作系统的终端接收数据业务数据之前,还执行:运行在所述第一操作系统的所述终端接收目标应用程序的安装包;判断安装所述目标应用程序的操作系统是否为第二操作系统;若安装所述目标应用程序的操作系统为所述第二操作系统,则将所述目标应用程序安装于所述第二操作系统。
- 如权利要求13所述的终端,其特征在于,所述处理器判断安装所述目标应用程序的操作系统是否为第二操作系统的具体操作包括:检测预设的应用信息列表中是否包含所述目标应用程序的应用标识,所述应用信息列表用于存储所述第二操作系统处理的应用程序的应用标识;若所述应用信息列表中包含所述目标应用程序的应用标识,则判定安装所述目标应用程序的操作系统为所述第二操作系统。
- 如权利要求14所述的终端,其特征在于,若所述应用信息列表中不包含所述目标应用程序的应用标识,所述处理器还执行:提示用户是否将所述目标应用程序安装于所述第二操作系统;若接收到针对所述提示输入的确认指令,则执行所述将所述目标应用程序安装于所述第二操作系统的步骤,并将所述目标应用程序的应用标识添加到所述应用信息列表中。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510288853.4 | 2015-05-29 | ||
CN201510288853.4A CN104866782A (zh) | 2015-05-29 | 2015-05-29 | 一种数据处理方法和装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016192161A1 true WO2016192161A1 (zh) | 2016-12-08 |
Family
ID=53912604
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/082936 WO2016192161A1 (zh) | 2015-05-29 | 2015-06-30 | 一种数据处理方法和装置 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104866782A (zh) |
WO (1) | WO2016192161A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110675872A (zh) * | 2019-09-27 | 2020-01-10 | 青岛海信电器股份有限公司 | 基于多系统显示设备的语音交互方法及多系统显示设备 |
CN114258010A (zh) * | 2020-09-25 | 2022-03-29 | 中国移动通信有限公司研究院 | 信息处理方法、装置、设备及可读存储介质 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049533B (zh) * | 2015-08-31 | 2019-02-01 | 宇龙计算机通信科技(深圳)有限公司 | 一种终端系统升级的方法及系统 |
CN106549934B (zh) * | 2015-09-23 | 2020-04-21 | 深圳市全智达科技有限公司 | 网络设备安全系统 |
CN105975302A (zh) * | 2016-05-03 | 2016-09-28 | 深圳市金立通信设备有限公司 | 一种应用安装方法及终端 |
CN110222492B (zh) * | 2019-05-05 | 2021-04-20 | 深圳汇茂科技股份有限公司 | 系统切换方法、装置、计算机设备和计算机可读存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708329A (zh) * | 2011-02-22 | 2012-10-03 | 宏达国际电子股份有限公司 | 数据安全管理系统和方法 |
US20140191974A1 (en) * | 2013-01-05 | 2014-07-10 | Sony Corporation | Input apparatus, output apparatus, and storage medium |
CN104168557A (zh) * | 2014-08-28 | 2014-11-26 | 酷派软件技术(深圳)有限公司 | 操作系统的升级方法和操作系统的升级装置 |
CN104268454A (zh) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | 用于终端的应用程序的管理方法及装置 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102011115135A1 (de) * | 2011-10-07 | 2013-04-11 | Giesecke & Devrient Gmbh | Mikroprozessorsystem mit gesicherter Laufzeitumgebung |
EP2618266A4 (en) * | 2011-11-04 | 2015-08-05 | Sk Planet Co Ltd | PROCESS FOR COOPERATION BETWEEN A SAFE REGION AND AN UNCERTAIN REGION, METHOD, SERVER AND DEVICE FOR CONTROLLING THE DOWNLOAD OF SAFE APPLICATIONS AND CONTROL SYSTEM FOR USING THIS METHOD |
US20130301830A1 (en) * | 2012-05-08 | 2013-11-14 | Hagai Bar-El | Device, system, and method of secure entry and handling of passwords |
CN103413089B (zh) * | 2013-08-28 | 2016-12-28 | 天翼电信终端有限公司 | 移动终端及其实现双系统的方法 |
CN103714459A (zh) * | 2013-12-26 | 2014-04-09 | 电子科技大学 | 一种智能终端安全支付系统及方法 |
CN104102876A (zh) * | 2014-07-17 | 2014-10-15 | 北京握奇智能科技有限公司 | 保障客户端运行安全的装置 |
CN104462989A (zh) * | 2014-12-25 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | 多系统间应用程序的安装方法、安装系统和终端 |
-
2015
- 2015-05-29 CN CN201510288853.4A patent/CN104866782A/zh active Pending
- 2015-06-30 WO PCT/CN2015/082936 patent/WO2016192161A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708329A (zh) * | 2011-02-22 | 2012-10-03 | 宏达国际电子股份有限公司 | 数据安全管理系统和方法 |
US20140191974A1 (en) * | 2013-01-05 | 2014-07-10 | Sony Corporation | Input apparatus, output apparatus, and storage medium |
CN104168557A (zh) * | 2014-08-28 | 2014-11-26 | 酷派软件技术(深圳)有限公司 | 操作系统的升级方法和操作系统的升级装置 |
CN104268454A (zh) * | 2014-09-28 | 2015-01-07 | 酷派软件技术(深圳)有限公司 | 用于终端的应用程序的管理方法及装置 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110675872A (zh) * | 2019-09-27 | 2020-01-10 | 青岛海信电器股份有限公司 | 基于多系统显示设备的语音交互方法及多系统显示设备 |
CN110675872B (zh) * | 2019-09-27 | 2023-09-01 | 海信视像科技股份有限公司 | 基于多系统显示设备的语音交互方法及多系统显示设备 |
CN114258010A (zh) * | 2020-09-25 | 2022-03-29 | 中国移动通信有限公司研究院 | 信息处理方法、装置、设备及可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN104866782A (zh) | 2015-08-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016192161A1 (zh) | 一种数据处理方法和装置 | |
CN109492378B (zh) | 一种基于设备识别码的身份验证方法、服务器及介质 | |
US10346481B2 (en) | Customizing operating system based on detected carrier | |
US10999721B2 (en) | Communication identifier binding processing method and terminal | |
CN103856446A (zh) | 一种登录方法、装置及开放平台系统 | |
EP2611226B1 (en) | Processing method and system for over-the-air bootstrap | |
US9585022B2 (en) | Profile integration management | |
EP2825956B1 (en) | Method, apparatus and system of recovering an operating system on a portable communication device | |
CN110278192B (zh) | 外网访问内网的方法、装置、计算机设备及可读存储介质 | |
CN105630551A (zh) | 一种安装应用软件的方法、装置及电子设备 | |
KR20130108613A (ko) | 프로세스 간 통신을 위한 방법, 장치 및 컴퓨터 기록 매체 | |
US11272336B2 (en) | System, method, and computer program for transferring subscriber identity module (SIM) information for SIM card or eSIM activation | |
EP3457308A1 (en) | Method for improving information security and terminal | |
CN108563472B (zh) | 基于多开应用的服务插件加载方法及装置 | |
CN103249027B (zh) | 一种终端业务处理的方法和设备 | |
CN106487798A (zh) | 数据同步方法及装置 | |
CN112738046A (zh) | 一种一键登录的方法、终端及系统服务器 | |
CN110597662B (zh) | 备份数据自动验证方法、装置、用户设备及存储介质 | |
CN107040497B (zh) | 网络账号防盗方法及装置 | |
CN104394526A (zh) | 恢复数据业务的方法和电子设备 | |
CN106507300A (zh) | 一种找回丢失终端的方法、装置及终端 | |
US9069639B2 (en) | Managing a user proxy configuration in a daemon that frequently loads and unloads | |
CN106302935B (zh) | 一种通信信息的识别方法及系统 | |
CN108513287B (zh) | 一种sim卡激活方法、装置、终端和存储介质 | |
US20170060612A1 (en) | Terminal device, system for controlling virtual machine and method employing the same |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15893817 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25/04/2018) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15893817 Country of ref document: EP Kind code of ref document: A1 |