WO2017181539A1 - 一种信息处理方法和装置 - Google Patents

一种信息处理方法和装置 Download PDF

Info

Publication number
WO2017181539A1
WO2017181539A1 PCT/CN2016/089807 CN2016089807W WO2017181539A1 WO 2017181539 A1 WO2017181539 A1 WO 2017181539A1 CN 2016089807 W CN2016089807 W CN 2016089807W WO 2017181539 A1 WO2017181539 A1 WO 2017181539A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
stored
terminal
user
preset condition
Prior art date
Application number
PCT/CN2016/089807
Other languages
English (en)
French (fr)
Inventor
魏明业
潘万鹏
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017181539A1 publication Critical patent/WO2017181539A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/79Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in semiconductor storage media, e.g. directly-addressable memories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • G06F12/1408Protection against unauthorised use of memory or access to memory by using cryptography

Definitions

  • the present application relates to, but is not limited to, information storage technology in the field of communications, and in particular, to an information processing method and apparatus.
  • the methods for distinguishing between the security domain and the common domain are discriminated by the storage area, and the data that needs to be stored in the security area must be switched to the security area for storage, and the data that needs to be stored in the normal area must be switched to the normal area.
  • the limitation is large, the operation is troublesome, and it is not convenient for the user to operate, resulting in poor user experience.
  • the embodiment of the invention provides an information processing method and device, which solves the problem that the data that needs to be stored in the security area of the relevant terminal must be switched to the security area for storage, and the data that needs to be stored in the normal area must be switched to the normal area for storage.
  • the problem is that the operation is improved, the user operation is more favorable, the convenience of data storage is greatly enhanced, and the interaction ability between the user and the terminal can be enhanced.
  • An information processing method comprising:
  • the to-be-stored The stored data is subjected to an encryption process, and the data to be stored is stored in the first storage area of the terminal in a first form; wherein the first form is a form that matches a first area of the terminal.
  • the acquiring the data to be stored and receiving the first operation performed by the user on the terminal includes:
  • the working mode of the terminal is a preset working mode
  • the data to be stored is acquired and the touch operation of the terminal is received by the user; wherein, in the preset working mode, the terminal can identify Whether the touch operation satisfies a preset condition, and the working mode of processing the data to be stored according to the touch operation.
  • the method further includes: after determining whether the first operation of the terminal by the user meets a preset condition, if the first operation of the terminal by the user does not satisfy a preset condition, The to-be-stored data is stored in a second storage area of the terminal.
  • the determining whether the first operation of the terminal by the user meets a preset condition includes:
  • the first storage area of the terminal includes:
  • the first encryption process is performed on the data to be stored, and the identifier information is set on the data to be stored after the first encryption process.
  • the second encryption process is performed on the data to be stored after the identifier information is set, and the data to be stored after the second encryption process is stored in the first storage area of the terminal.
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • An information processing apparatus comprising: a first acquisition unit, a first determination unit, and a first processing unit.
  • the first acquiring unit is configured to acquire data to be stored, and receive a first operation performed by the user on the terminal.
  • the first determining unit is configured to determine whether the first operation of the terminal by the user meets a preset condition.
  • the first processing unit is configured to perform encryption processing on the data to be stored, and to store the data to be stored in a first form, if the first operation of the terminal meets a preset condition by the user Stored in a first storage area of the terminal; wherein the first form is in a form that matches a first area of the terminal.
  • the first acquiring unit acquires data to be stored, and receiving the first operation of the user by the terminal includes:
  • the working mode of the terminal is a preset working mode
  • the data to be stored is acquired and the touch operation of the terminal is received by the user; wherein, in the preset working mode, the terminal can identify Whether the touch operation satisfies a preset condition and the pair to be stored according to the touch operation The working mode in which the data is processed.
  • the device further includes: a second processing unit.
  • the second processing unit is configured to: after the first determining unit determines whether the first operation of the terminal by the user meets a preset condition, if the first operation of the terminal is not satisfied by the user Setting a condition, storing the to-be-stored data in a second storage area of the terminal.
  • the first determining unit includes: a determining module and a first processing module.
  • the determining, by the first determining unit, whether the first operation of the terminal by the user meets a preset condition includes:
  • the determining module is configured to determine whether the touch pressure of the touch operation of the user is within a preset threshold range
  • the first processing module is configured to determine that the first operation of the user is satisfied if the touch pressure of the touch operation of the user is within the preset threshold range Preset condition
  • the first processing unit includes: a second processing module and a third processing module.
  • the first storage area of the terminal includes:
  • the second processing module is configured to perform a first encryption process on the data to be stored, and perform a first encryption process, if the first operation of the terminal meets a preset condition by the user
  • the data to be stored sets identification information.
  • the third processing module is configured to perform second encryption processing on the to-be-stored data after setting the identification information, and store the to-be-stored data after performing the second encryption processing on the first end of the terminal In the storage area.
  • the device further includes: a third processing unit, a second determining unit, and a fourth processing unit.
  • the third processing unit is configured to perform first decryption processing on the data to be stored stored in the terminal according to a decryption rule to obtain first data.
  • the second determining unit is configured to determine whether the identification information of the first data is correct.
  • the fourth processing unit is configured to perform a second decryption process on the first data to obtain the to-be-stored data if the identification information of the first data is correct.
  • the device further includes: a second acquiring unit and a first storage unit.
  • the second obtaining unit is configured to acquire a logical address of the data to be stored.
  • the first storage unit is configured to store the to-be-stored data in an area of the terminal corresponding to the logical address of the to-be-stored data according to the logical address of the data to be stored.
  • the device further includes: a third obtaining unit and a second storage unit.
  • the third obtaining unit is configured to acquire a physical address of the data to be stored.
  • the second storage unit is configured to store the to-be-stored data in an area of the terminal corresponding to the physical address of the to-be-stored data according to the physical address of the data to be stored.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the described information processing method.
  • the information processing method and device after acquiring the data to be stored and receiving the first operation of the user on the terminal, determining whether the first operation of the terminal meets the preset condition, if the first operation meets the preset
  • the condition is that the stored data is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form; thus, the relationship between the first operation of the terminal and the preset condition may be directly treated according to the user.
  • the data is stored and stored without switching the storage area of the terminal to store data, and the data that needs to be stored in the security area of the relevant terminal must be switched to the secure area for storage, and the data that needs to be stored in the normal area must be switched to the normal area.
  • the problem of storage improves the achievability of the operation, is more conducive to user operations, and greatly enhances the convenience of data storage; at the same time, it can enhance the interaction ability between the user and the terminal.
  • FIG. 1 is a schematic flowchart diagram of an information processing method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart diagram of another information processing method according to an embodiment of the present invention.
  • FIG. 3 is a schematic flowchart diagram of still another information processing method according to an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of an information processing method according to another embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of another information processing apparatus according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of still another information processing apparatus according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of an information processing apparatus according to another embodiment of the present invention.
  • FIG. 9 is a schematic structural diagram of another information processing apparatus according to another embodiment of the present invention.
  • FIG. 10 is a schematic structural diagram of still another information processing apparatus according to another embodiment of the present invention.
  • FIG. 11 is a schematic structural diagram of an information processing apparatus according to still another embodiment of the present invention.
  • An embodiment of the present invention provides an information processing method. Referring to FIG. 1, the method may include steps 101-103:
  • Step 101 Acquire data to be stored, and receive a first operation performed by the user on the terminal.
  • Step 101 Acquire data to be stored, and receive a first operation performed by the user on the terminal may be implemented by the terminal.
  • the data to be stored may be data that needs to be stored in the terminal, and the data to be stored may be received by the terminal, or may be obtained by the terminal according to the acquisition instruction information.
  • the user's first operation on the terminal may include various forms of touch operations by the user on the terminal.
  • Step 102 Determine whether the first operation of the terminal by the user meets a preset condition.
  • Step 102 determines whether the first operation of the terminal by the user meets the preset condition, which may be implemented by the terminal. It can be determined whether each type of touch operation performed by the user on the terminal satisfies each different preset condition corresponding to each type of touch operation.
  • Step 103 If the first operation of the terminal meets the preset condition, the data to be stored is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form.
  • Step 103 If the first operation of the terminal meets the preset condition, the data to be stored is encrypted, and the data to be stored is stored in the first storage area of the terminal in the first form, which may be implemented by the information processing device. . If the first operation of the terminal meets the preset condition, the stored data may be encrypted, and the identification information is added to form a first form of data to be stored, and then the processed data to be stored is stored in the first storage of the terminal. In the area.
  • the information processing method provided by the embodiment of the present invention obtains the data to be stored and receives the first operation performed by the user on the terminal, and then determines whether the first operation of the terminal meets the preset condition, and if the first operation meets the preset condition, Then, the storage data is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form; thus, the data may be directly stored according to the relationship between the first operation of the terminal and the preset condition by the user. Processing and storing, without switching the storage area of the terminal to store data, solving the data in the relevant terminal that needs to be stored in the secure area must be switched to the secure area for storage, and the data that needs to be stored in the normal area must be switched to the normal area for storage.
  • the problem improves the achievability of the operation, is more conducive to user operations, greatly enhances the convenience of data storage; at the same time, it can enhance the interaction ability between the user and the terminal.
  • An embodiment of the present invention provides an information processing method. Referring to FIG. 2, the method may include steps 201-204:
  • Step 201 When the working mode of the terminal is the preset working mode, the terminal acquires data to be stored and receives a touch operation performed by the user on the terminal.
  • the preset working mode may be that the data to be stored is encrypted according to the touch operation of the user, and the data to be stored after the processing is stored in the first form in the first storage area of the terminal.
  • the working mode of the terminal is the preset working mode
  • the data to be stored that needs to be stored may be directly obtained or the data to be stored sent by other users may be received, and the touch operation performed by the user on the terminal may be received.
  • Step 202 The terminal determines whether the touch operation performed by the user on the terminal meets a preset condition.
  • Determining whether the touch operation of the user on the terminal meets the preset condition may be determining whether the touch pressure of the touch operation of the user meets the preset threshold, and whether the shape of the closed graphic formed by the touch operation is a preset shape or touch Whether the control operation is a double tap, whether the touch operation is a long press or touch operation Whether the touch time is implemented within a preset time range, and which method is used to determine whether the touch operation of the user meets the preset condition may be determined according to factors such as the actual operating environment and the convenience of operation. .
  • the shape of the closed figure formed by the touch operation satisfies the preset shape in the preset shape, and may be a closed shape such as a circle, a triangle, a quadrangle, or a heart shape.
  • the preset shape may be preset by the user according to his or her preference.
  • the starting point or the end point of the touch operation may be the position of the data to be stored displayed on the terminal, and whether the touch operation is a touch operation of the long touch or touch operation.
  • the preset time in the preset time range may be set by the user according to the obtained test value or the like in advance, for example, the preset time may be set to 5s.
  • step 202 determines that the touch operation of the terminal meets the preset condition
  • the user may choose to perform step 203 or step 204. If the touch operation of the terminal meets the preset condition, step 203 is performed, if the user is to the terminal. If the touch operation does not satisfy the preset condition, step 204 is performed.
  • Step 203 If the touch operation of the terminal meets the preset condition, the terminal performs encryption processing on the stored data and stores the data to be stored in the first storage area of the terminal in the first form.
  • Step 204 If the touch operation of the terminal does not meet the preset condition, the data to be stored is directly stored in the second storage area of the terminal.
  • the touch operation of the terminal does not meet the preset condition; or if the graphic of the closed pattern formed by the touch operation of the user belongs to a preset shape, the touch operation of the user meets the preset condition, if the user is to the terminal If the graphic of the closed pattern formed by the touch operation does not belong to the preset shape, the touch operation of the user does not satisfy the preset condition; or if the touch operation of the user is double-clicked, the touch operation of the user to the terminal is satisfied.
  • the preset condition is that if the touch operation of the terminal is not double-clicked, the touch operation of the user does not meet the preset condition; or if the touch time of the touch operation performed by the user is within a preset time range The touch operation of the terminal meets the preset condition, and the touch time of the touch operation of the user is not within the preset time range. Touch operation of a user terminal does not satisfy the preset condition.
  • the data to be stored is stored in the storage area of the terminal in the first form after the encryption process is performed on the storage data; if the touch operation of the terminal does not meet the preset condition Then, no processing is performed on the stored data, and the data to be stored is directly stored in the storage area of the terminal.
  • the first storage area and the second storage area of the terminal in the embodiment of the present invention may be in the same read only memory (ROM) belonging to the terminal, or the first storage area and the second of the terminal.
  • the storage area may be in a different ROM of the terminal.
  • the data to be stored in the terminal may be stored in the first area or the second area of the terminal according to the touch operation of the user.
  • the storage data is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form; thus, the data may be directly stored according to the relationship between the first operation of the terminal and the preset condition by the user.
  • Processing and storing, without switching the storage area of the terminal to store data solving the data in the relevant terminal that needs to be stored in the secure area must be switched to the secure area for storage, and the data that needs to be stored in the normal area must be switched to the normal area for storage.
  • the problem improves the achievability of the operation, is more conducive to user operations, greatly enhances the convenience of data storage; at the same time, it can enhance the interaction ability between the user and the terminal.
  • An embodiment of the present invention provides an information processing method. Referring to FIG. 3, the method may include steps 301-306:
  • Step 301 When the working mode of the terminal is a preset working mode, the terminal receives the first request instruction.
  • Step 302 The terminal acquires data to be stored in response to the first request instruction, and receives the user-to-terminal Touch operation.
  • the terminal in the embodiment After receiving the first request command, the terminal in the embodiment obtains the data to be stored according to the first request command, and may be a touch click operation of the receiving user, and then obtain a to-be-storage corresponding to the touch click operation according to the operation.
  • Data for example, the user needs to create a new contact or store data information received through WeChat, QQ or short message.
  • the user can click the corresponding contact information or data information, and the terminal receives the first request command sent by the user and recognizes
  • the terminal acquires the data to be stored corresponding to the touch click operation, and also receives other touch operations of the terminal other than the touch click operation.
  • the data source of the data to be stored and the generation method of the first request instruction is not limited to this, and other feasible solutions are also possible.
  • Step 303 The terminal determines whether the touch pressure of the touch operation of the user is within a preset threshold range.
  • the preset threshold may be preset by the user according to factors such as convenience of operation, achievability, and tolerance of the screen of the terminal.
  • the value of the preset threshold is not limited herein, and any pressure value that can implement the solution is not limited. The scope is feasible.
  • Step 303 After determining whether the touch pressure of the touch operation of the terminal is within a preset threshold, the method may perform step 304 to 305 or step 306, if the touch pressure of the touch operation of the user is within a preset threshold range. If the touch pressure of the touch operation of the terminal is not within the preset threshold range, step 306 is performed.
  • Step 304 If the touch pressure of the touch operation of the user is within a preset threshold, the terminal performs the first encryption process on the stored data, and sets the identification information on the data to be stored after the first encryption process.
  • Step 305 The terminal performs a second encryption process on the data to be stored after the identifier information is set, and stores the to-be-stored data in the second encryption process in the first storage area of the terminal.
  • the terminal may perform the first encryption process on the stored data, and then set the identification information on the data after the first encryption process, and then set the identification letter
  • the data of the information is stored in the second encryption process; wherein the first encryption process may be performed according to the rule of storing the data in the security zone in the terminal, and the identifier information may be added to the data after the first encryption process is performed.
  • the B0 01 field may be added to the header file, and the A0 01 field may be added to the tail file; the second encryption processing is performed on the data after the identification information is set to ensure again
  • the encryption rule of the second encryption process is not uniquely limited herein as long as it is an encryption rule that meets the requirements to achieve confidentiality of the data.
  • Step 306 If the touch pressure of the touch operation of the terminal is not within the preset threshold, the terminal directly stores the data to be stored in the second storage area of the terminal.
  • the method may further include steps 307-309:
  • Step 307 The terminal performs first decryption processing on the data to be stored stored in the terminal according to the decryption rule to obtain the first data.
  • the decryption rule may be a decryption rule corresponding to the encryption rule of the first encryption process, and may be a decryption rule corresponding to the rule of the security zone storing data in the terminal; the first decryption process may be performed to obtain the first
  • the data can be obtained at the same time as the identification information of the first data; wherein the identification information is preferably the field information in the header file and the tail file of the first data.
  • Step 308 The terminal determines whether the identification information of the first data is correct.
  • Determining whether the identification information of the first data is correct may be determined by determining whether the information of the field in the header file and the tail file of the first data meets the requirement, if the information of the field in the header file and the tail file of the first data meets the requirement.
  • the identification information of the first data is correct; for example, it may be determined whether the field in the header file of the first data includes the B0 01 field, and whether the field in the tail file includes the A0 01 field, if the header of the first data is in the field If the B0 01 field is included and the field of the tail file includes the A0 01 field, the identification information of the first data is correct; if the identification information of the first data is incorrect, the second decryption operation is not performed.
  • Step 309 If the identification information of the first data is correct, the terminal performs a second decryption process on the first data to obtain data to be stored.
  • the decryption rule of the second decryption process may be a decryption rule corresponding to the encryption rule of the second encryption process, and the data processed for the different encryption rules may have different decryption rules.
  • the logical address of the data to be stored may also be obtained, and the data to be stored is stored in an area of the terminal corresponding to the logical address of the data to be stored according to the logical address of the data to be stored.
  • the physical address of the data to be stored may be obtained, and the data to be stored is stored in an area of the terminal corresponding to the physical address of the data to be stored according to the physical address of the data to be stored.
  • the addressing mode can be based on the address segment addressing method.
  • the logical address corresponding to the security area can be replaced with the corresponding security area for storage.
  • the addressing mode uses MAC address addressing, that is, when the data is stored, the physical address (Media Access Control, MAC address) corresponding to the security zone can be used to switch to the corresponding security zone for storage.
  • an implementation scheme for storing data to be stored according to a relationship between a first operation of the terminal and a preset condition by the user is applicable not only to the data storage of the data to be stored but also applicable.
  • the communication data may be encrypted by using the encryption method provided in the present invention to implement communication with the peer user; if the user performs the first operation on the terminal If the preset condition is not satisfied, the original communication data is directly transmitted to the opposite user without performing any processing on the communication data.
  • the description of the same steps or concepts in the other embodiments may refer to the descriptions in other embodiments, and details are not described herein again.
  • only the user touches the terminal If the touch pressure of the operation is within the preset threshold range, the first operation of the terminal meets the preset condition, and the touch pressure of the touch operation of the user is not within the preset threshold range, and the first operation of the terminal does not satisfy the preset.
  • the touch pressure of the user's touch operation on the terminal is within a preset threshold range, and the first operation of the terminal does not satisfy the preset condition, and the touch pressure of the user's touch operation on the terminal is not in advance.
  • the first operation of the terminal satisfies the preset condition in the threshold range, and the specific implementation solution may be determined according to a specific implementation scheme.
  • the storage data is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form; thus, the data may be directly stored according to the relationship between the first operation of the terminal and the preset condition by the user.
  • An embodiment of the present invention provides an information processing apparatus 4, which may be applied to an information processing method provided by the embodiment corresponding to FIG. 1 to FIG. 4, and the apparatus may include: a first acquiring unit, as shown in FIG. 41.
  • the first obtaining unit 41 is configured to acquire data to be stored, and receive a first operation performed by the user on the terminal.
  • the first determining unit 42 is configured to determine whether the first operation of the terminal by the user satisfies a preset condition.
  • the first processing unit 43 is configured to perform encryption processing on the data to be stored if the first operation of the terminal meets the preset condition, and store the data to be stored in the first storage area of the terminal in the first form.
  • the first form is a form that matches the first area of the terminal.
  • the information processing apparatus determines whether the first operation of the terminal meets the preset condition after the first operation of the terminal is satisfied by acquiring the data to be stored and receiving the first operation of the user, and if the first operation meets the preset condition, Then, the storage data is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form; thus, the data may be directly stored according to the relationship between the first operation of the terminal and the preset condition by the user. Processing and storing, without switching the storage area of the terminal to store data, solving the data in the relevant terminal that needs to be stored in the secure area must be switched to the secure area for storage, and the data that needs to be stored in the normal area must be switched to the normal area for storage.
  • the problem improves the achievability of the operation, is more conducive to user operations, greatly enhances the convenience of data storage; at the same time, it can enhance the interaction ability between the user and the terminal.
  • the first obtaining unit 41 acquires data to be stored, and receives the first operation of the user by the terminal, including:
  • the working mode of the terminal is the preset working mode
  • the data to be stored is acquired and the touch operation of the user to the terminal is received.
  • the terminal can recognize whether the touch operation satisfies the preset condition and processes the data to be processed according to the touch operation.
  • the apparatus further includes: a second processing unit 44.
  • the second processing unit 44 is configured to determine, at the first determining unit, the user to the terminal After the first operation of the terminal satisfies the preset condition, if the first operation of the terminal does not satisfy the preset condition, the data to be stored is directly stored in the second storage area of the terminal.
  • the first determining unit 42 includes: a determining module 421 and a first processing module 422.
  • the determining, by the first determining unit, whether the first operation of the terminal by the user meets a preset condition includes:
  • the determining module 421 is configured to determine whether the touch pressure of the touch operation of the user is within a preset threshold range.
  • the first processing module 422 is configured to determine that the first operation of the user meets the preset condition if the touch pressure of the touch operation of the user is within a preset threshold.
  • the first processing module 422 is further configured to determine that the first operation of the user does not satisfy the preset condition if the touch pressure of the touch operation of the user is not within the preset threshold.
  • the first processing unit 43 includes: a second processing module 431 and a third processing module 432 .
  • the first storage area of the terminal includes:
  • the second processing module 431 is configured to perform a first encryption process on the data to be stored if the first operation of the terminal meets the preset condition, and set the identifier information on the data to be stored after the first encryption process.
  • the third processing module 432 is configured to perform second encryption processing on the to-be-stored data after setting the identification information, and store the to-be-stored data after the second encryption processing in the first storage area of the terminal.
  • the apparatus further includes: a third processing unit 45, a second determining unit 46, and a fourth processing unit 47.
  • the third processing unit 45 is configured to perform first decryption processing on the data to be stored stored in the terminal according to the decryption rule to obtain the first data.
  • the second determining unit 46 is configured to determine whether the identification information of the first data is correct.
  • the fourth processing unit 47 is configured to perform a second decryption process on the first data if the identification information of the first data is correct, to obtain data to be stored.
  • the apparatus further includes: a second obtaining unit 48 and a first storage unit 49.
  • the second obtaining unit 48 is configured to acquire a logical address of the data to be stored.
  • the first storage unit 49 is configured to store the data to be stored in an area of the terminal corresponding to the logical address of the data to be stored according to the logical address of the data to be stored.
  • the apparatus may further include: a third obtaining unit 410 and a second storage unit 411.
  • the third obtaining unit 410 is configured to acquire a physical address of the data to be stored.
  • the second storage unit 411 is configured to store the to-be-stored data in an area of the terminal corresponding to the physical address of the data to be stored according to the physical address of the data to be stored.
  • the information processing apparatus determines whether the first operation of the terminal meets the preset condition after the first operation of the terminal is satisfied by acquiring the data to be stored and receiving the first operation of the user, and if the first operation meets the preset condition, Then, the storage data is encrypted, and the data to be stored is stored in the first storage area of the terminal in a first form; thus, the data may be directly stored according to the relationship between the first operation of the terminal and the preset condition by the user. Processing and storing, without switching the storage area of the terminal to store data, solving the data in the relevant terminal that needs to be stored in the secure area must be switched to the secure area for storage, and the data that needs to be stored in the normal area must be switched to the normal area for storage.
  • the problem improves the achievability of the operation, is more conducive to user operations, greatly enhances the convenience of data storage; at the same time, it can enhance the interaction ability between the user and the terminal.
  • the module 432, the third processing unit 45, the second determining unit 46, the fourth processing unit 47, the second obtaining unit 48, the first storage unit 49, the third obtaining unit 410, and the second storage unit 411 may all be located by wireless data transmission.
  • Central processing unit in the device Central Processing Unit in the device (Central Processing Unit, CPU, Micro Processor Unit (MPU), Digital Signal Processor (DSP), or Field Programmable Gate Array (FPGA).
  • CPU Central Processing Unit
  • MPU Micro Processor Unit
  • DSP Digital Signal Processor
  • FPGA Field Programmable Gate Array
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the described information processing method.
  • embodiments of the present invention can be provided as a method, system, or computer program product.
  • embodiments of the invention may take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware.
  • embodiments of the invention may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) in which computer usable program code is embodied.
  • Embodiments of the invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG.
  • These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • the information processing method and device provided by the embodiments of the present invention are obtained by acquiring data to be stored and connecting After receiving the first operation of the user on the terminal, determining whether the first operation of the terminal meets the preset condition, if the first operation meets the preset condition, the data to be stored is encrypted, and the data to be stored is in the first form.
  • the data is stored in the first storage area of the terminal; in this way, the stored data can be processed and stored according to the relationship between the first operation and the preset condition of the terminal, and the storage area of the terminal is not required to store data, thereby solving the problem.
  • the data in the related terminal that needs to be stored in the secure area must be switched to the secure area for storage.
  • the data stored in the normal area must be switched to the normal area for storage, which improves the achievability of the operation and is more conducive to user operations. Greatly enhance the convenience of data storage; at the same time, it can enhance the interaction ability between users and terminals.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Storage Device Security (AREA)

Abstract

一种信息处理方法和装置,所述方法包括:获取待存储数据,并接收用户对终端的第一操作(101);判断所述用户对所述终端的第一操作是否满足预设条件(102);如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行加密处理,并以第一形式将所述待存储数据存储在所述终端的第一存储区域中(103);其中,所述第一形式为与所述终端的第一区域匹配的形式。

Description

一种信息处理方法和装置 技术领域
本申请涉及但不限于通信领域中的信息存储技术,尤其涉及一种信息处理方法和装置。
背景技术
随着电子产品的推广、普及与发展,电子产品功能越来越多、性能越来越强、体验越来越丰富,给人们的生活带来很多便利。当然,用户对电子产品的使用越来越多,存储在电子产品中的数据越来越多。基于用户的隐私问题,目前的终端中存在安全区域和普通区域;其中,安全区域用于存储需要进行安全保护的数据,普通区域用于存储普通数据。
但是,相关技术方案中区分安全域和普通域的方法都是通过存储区域来判别的,需要在安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储,局限性较大,操作起来比较麻烦,不便于用户操作,导致用户体验度较差。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供了一种信息处理方法和装置,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
一种信息处理方法,所述方法包括:
获取待存储数据,并接收用户对终端的第一操作。
判断所述用户对所述终端的第一操作是否满足预设条件。
如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存 储数据进行加密处理,并以第一形式将所述待存储数据存储在所述终端的第一存储区域中;其中,所述第一形式为与所述终端的第一区域匹配的形式。
可选地,所述获取待存储数据,并接收用户对终端的第一操作包括:
当所述终端的工作模式为预设工作模式时,获取所述待存储数据并接收所述用户对所述终端的触控操作;其中,在所述预设工作模式下,所述终端能够识别所述触控操作是否满足预设条件,并根据所述触控操作对所述待存储数据进行处理的工作模式。
可选地,所述方法还包括:在判断所述用户对所述终端的第一操作是否满足预设条件之后,如果所述用户对所述终端的第一操作不满足预设条件,则将所述待存储数据存储在所述终端的第二存储区域中。
可选地,所述判断所述用户对所述终端的第一操作是否满足预设条件包括:
判断所述用户对所述终端的触控操作的触控压力是否在预设阈值范围内。
如果所述用户对所述终端的触控操作的触控压力在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作满足预设条件。
如果所述用户对所述终端的触控操作的触控压力没有在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作不满足预设条件。
可选地,所述如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行加密处理并以第一形式将所述待存储数据存储在所述终端的第一存储区域中包括:
如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行第一加密处理,并对进行第一加密处理后的所述待存储数据设置标识信息。
对设置标识信息后的所述待存储数据进行第二加密处理,并将进行第二加密处理后的所述待存储数据存储在所述终端的所述第一存储区域中。
可选地,所述方法还包括:
根据解密规则对存储在所述终端中的待存储数据进行第一解密处理,得 到第一数据。
判断所述第一数据的标识信息是否正确。
如果所述第一数据的标识信息正确,则对所述第一数据进行第二解密处理,得到所述待存储数据。
可选地,所述方法还包括:
获取所述待存储数据的逻辑地址。
根据所述待存储数据的逻辑地址,将所述待存储数据存储在所述终端的与所述待存储数据的逻辑地址对应的区域中。
可选地,所述方法还包括:
获取所述待存储数据的物理地址。
根据所述待存储数据的物理地址,将所述待存储数据存储在所述终端的与所述待存储数据的物理地址对应的区域中。
一种信息处理装置,所述装置包括:第一获取单元、第一判断单元和第一处理单元。
所述第一获取单元,设置为获取待存储数据,并接收用户对终端的第一操作。
所述第一判断单元,设置为判断所述用户对所述终端的第一操作是否满足预设条件。
所述第一处理单元,设置为如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行加密处理,并以第一形式将所述待存储数据存储在所述终端的第一存储区域中;其中,所述第一形式为与所述终端的第一区域匹配的形式。
可选地,所述第一获取单元获取待存储数据,并接收用户对终端的第一操作包括:
当所述终端的工作模式为预设工作模式时,获取所述待存储数据并接收所述用户对所述终端的触控操作;其中,在所述预设工作模式下,所述终端能够识别所述触控操作是否满足预设条件并根据所述触控操作对所述待存储 数据进行处理的工作模式。
可选地,所述装置还包括:第二处理单元。
所述第二处理单元,设置为在所述第一判断单元判断所述用户对所述终端的第一操作是否满足预设条件之后,如果所述用户对所述终端的第一操作不满足预设条件,则将所述待存储数据存储在所述终端的第二存储区域中。
可选地,述第一判断单元包括:判断模块和第一处理模块。
所述第一判断单元判断所述用户对所述终端的第一操作是否满足预设条件包括:
所述判断模块,设置为判断所述用户对所述终端的触控操作的触控压力是否在预设阈值范围内;
所述第一处理模块,设置为如果所述用户对所述终端的触控操作的触控压力在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作满足预设条件;
所述第一处理模块,还设置为如果所述用户对所述终端的触控操作的触控压力没有在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作不满足预设条件。
可选地,所述第一处理单元包括:第二处理模块和第三处理模块。
所述如果所述用户对所述终端的所述第一操作满足预设条件,则所述第一处理单元对所述待存储数据进行加密处理并以第一形式将所述待存储数据存储在所述终端的第一存储区域中包括:
所述第二处理模块,设置为如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行第一加密处理,并对进行第一加密处理后的所述待存储数据设置标识信息。
所述第三处理模块,设置为对设置标识信息后的所述待存储数据进行第二加密处理,并将进行第二加密处理后的所述待存储数据存储在所述终端的所述第一存储区域中。
可选地,所述装置还包括:第三处理单元、第二判断单元和第四处理单元。
所述第三处理单元,设置为根据解密规则对存储在所述终端中的待存储数据进行第一解密处理,得到第一数据。
所述第二判断单元,设置为判断所述第一数据的标识信息是否正确。
所述第四处理单元,设置为如果所述第一数据的标识信息正确,则对所述第一数据进行第二解密处理,得到所述待存储数据。
可选地,所述装置还包括:第二获取单元和第一存储单元。
所述第二获取单元,设置为获取所述待存储数据的逻辑地址。
所述第一存储单元,设置为根据所述待存储数据的逻辑地址,将所述待存储数据存储在所述终端的与所述待存储数据的逻辑地址对应的区域中。
可选地,所述装置还包括:第三获取单元和第二存储单元。
所述第三获取单元,设置为获取所述待存储数据的物理地址。
所述第二存储单元,设置为根据所述待存储数据的物理地址,将所述待存储数据存储在所述终端的与所述待存储数据的物理地址对应的区域中。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的信息处理方法。
本发明实施例所提供的信息处理方法和装置,通过获取待存储数据并接收用户对终端的第一操作之后,判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
图1为本发明的实施例提供的一种信息处理方法的流程示意图;
图2为本发明的实施例提供的另一种信息处理方法的流程示意图;
图3为本发明的实施例提供的又一种信息处理方法的流程示意图;
图4为本发明的另一实施例提供的一种信息处理方法的流程示意图;
图5为本发明的实施例提供的一种信息处理装置的结构示意图;
图6为本发明的实施例提供的另一种信息处理装置的结构示意图;
图7为本发明的实施例提供的又一种信息处理装置的结构示意图;
图8为本发明的另一实施例提供的一种信息处理装置的结构示意图;
图9为本发明的另一实施例提供的另一种信息处理装置的结构示意图;
图10为本发明的另一实施例提供的又一种信息处理装置的结构示意图;
图11为本发明的又一实施例提供的一种信息处理装置的结构示意图。
本发明的实施方式
下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。
本发明实施例提供一种信息处理方法,参照图1所示,该方法可以包括步骤101-103:
步骤101、获取待存储数据,并接收用户对终端的第一操作。
步骤101获取待存储数据,并接收用户对终端的第一操作可以是由终端来实现的。待存储数据可以是需要存储在终端中的数据,待存储数据可以是终端接收到的,也可以是终端根据获取指令信息自己获取得到的。用户对终端的第一操作可以包括用户对终端的多种形式的触控操作。
步骤102、判断用户对终端的第一操作是否满足预设条件。
步骤102判断用户对终端的第一操作是否满足预设条件,可以是由终端来实现的。可以判断用户对终端的每种形式的触控操作是否满足每种形式的触控操作对应的每种不同的预设条件。
步骤103、如果用户对终端的第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中。
步骤103如果用户对终端的第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中可以是由信息处理装置来实现的。如果用户对终端的第一操作满足预设条件,可以对待存储数据进行加密处理,并添加标识信息之后形成第一形式的待存储数据,然后将处理之后的待存储数据存储在终端的第一存储区域中。
本发明实施例所提供的信息处理方法,通过获取待存储数据并接收用户对终端的第一操作,之后判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
本发明的实施例提供一种信息处理方法,参照图2所示,该方法可以包括步骤201-204:
步骤201、当终端的工作模式为预设工作模式时,终端获取待存储数据并接收用户对终端的触控操作。
其中,预设工作模式下终端能够识别触控操作是否满足预设条件并根据触控操作对待存储数据进行处理的工作模式。
预设工作模式可以是能够根据用户的触控操作对待存储数据进行加密处理并将处理之后的待存储数据以第一形式存储在终端的第一存储区域中。终端的工作模式为预设工作模式时,可以直接获取需要存储的待存储数据或者接收其它用户发送过来的待存储数据,同时接收用户对终端的触控操作。
步骤202、终端判断用户对终端的触控操作是否满足预设条件。
判断用户对终端的触控操作是否满足预设条件可以是通过判断用户对终端的触控操作的触控压力是否满足预设阈值、触控操作形成的封闭图形的形状是否为预设形状、触控操作是否为双击、触控操作是否为长按即触控操作 的触控时间是否在预设时间范围内等方式来实现的,采用哪一种方式来判断用户对终端的触控操作是否满足预设条件可以根据实际运行环境和操作的便捷性等因素来确定。其中,触控操作形成的封闭图形的形状是否满足预设形状中的预设形状可以是圆形、三角形、四边形、桃心形等封闭形状,该预设形状可以是用户根据自己的喜好预先设定完成的,可选地,此时的触控操作的起始点或者终点可以是需要存储的待存储数据所显示在终端上的位置;触控操作是否为长按即触控操作的触控时间是否在预设时间范围内中的预设时间可以是用户预先根据得到的测试数值等设置好的,例如可以设置预设时间为5s。
其中,步骤202判断用户对终端的触控操作是否满足预设条件之后可以选择执行步骤203或者步骤204,如果用户对终端的触控操作满足预设条件,则执行步骤203,如果用户对终端的触控操作不满足预设条件,则执行步骤204。
步骤203、如果用户对终端的触控操作满足预设条件,则终端对待存储数据进行加密处理并以第一形式将待存储数据存储在终端的第一存储区域中。
步骤204、如果用户对终端的触控操作不满足预设条件,则直接将待存储数据存储在终端的第二存储区域中。
如果用户对终端的触控操作的触控压力在预设阈值范围内则用户对终端的触控操作满足预设条件,如果用户对终端的触控操作的触控压力不在预设阈值范围内则用户对终端的触控操作不满足预设条件;或者,如果用户对终端进行触控操作形成的封闭图案的图形属于预设形状则用户对终端的触控操作满足预设条件,如果用户对终端进行触控操作形成的封闭图案的图形不属于预设形状则用户对终端的触控操作不满足预设条件;或者,如果用户对终端的触控操作为双击则用户对终端的触控操作满足预设条件,如果用户对终端的触控操作不为双击则用户对终端的触控操作不满足预设条件;或者,如果用户对终端进行的触控操作的触控时间在预设时间范围内则用户对终端的触控操作满足预设条件,如果用户对终端的触控操作的触控时间没有在预设时间范围内则用户对终端的触控操作不满足预设条件。
如果用户对终端的触控操作满足预设条件,则对待存储数据进行加密处理之后以第一形式将待存储数据存储在终端的存储区域中;如果用户对终端的触控操作不满足预设条件则不对待存储数据进行任何处理,直接将该待存储数据存储在终端的存储区域中。需要说明的是,本发明实施例中的终端的第一存储区域和第二存储区域可以是属于终端的同一只读存储器(Read Only Memory,ROM)中,或者终端的第一存储区域和第二存储区域可以是分属于终端的不同ROM中的;本实施例中的待存储数据在终端中存储时可以直接根据用户的触控操作将待存储数据存储在终端的第一区域或者第二区域中,避免了相关技术中存储每种不同等级的数据时需要切换到对应的安全区域或者普通区域才能存储对应的数据的问题,极大的降低了操作复杂度,增强了可操作性。
需要说明的是,本实施例中与其它实施例中相同步骤或者概念的解释可以参照其它实施例中的描述,此处不再赘述。
本发明实施例所提供的信息处理方法,通过获取待存储数据并接收用户对终端的第一操作之后,判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
本发明的实施例提供一种信息处理方法,参照图3所示,该方法可以包括步骤301-306:
步骤301、当终端的工作模式为预设工作模式时,终端接收第一请求指令。
其中,预设工作模式下终端能够识别触控操作是否满足预设条件并根据触控操作对待存储数据进行处理的工作模式。
步骤302、终端响应第一请求指令获取待存储数据,并接收用户对终端 的触控操作。
本实施例中的终端在接收到第一请求指令后,根据该第一请求指令来获取待存储数据,可以是接收用户的触控点击操作然后根据该操作获取与触控点击操作对应的待存储数据;例如用户需要新建联系人或者存储通过微信、QQ或者短信息等接收到的数据信息,此时用户可以点击对应的联系人信息或者数据信息后终端接收到用户发送的第一请求指令并识别到该第一请求指令为获取待存储数据,终端就会获取触控点击操作对应的待存储数据,同时还可以接收用户对终端的除触控点击操作之外的其它触控操作。当然,此处只是举例说明待存储数据的数据来源和第一请求指令的生成方式,并没有限定只能是如此,其它可行的方案也是可以的。
步骤303、终端判断用户对终端的触控操作的触控压力是否在预设阈值范围内。
其中,该预设阈值可以是用户根据操作的便捷性、可实现性、终端的屏幕可承受等因素预先设定的,此处不限定该预设阈值的数值,任何可以实现该方案的压力数值范围均是可行的。
步骤303判断用户对终端的触控操作的触控压力是否在预设阈值范围内之后可以选择执行步骤304~305或者步骤306,如果用户对终端的触控操作的触控压力在预设阈值范围内,则执行步骤304~305,如果用户对终端的触控操作的触控压力不在预设阈值范围内,则执行步骤306。
步骤304、如果用户对终端的触控操作的触控压力在预设阈值范围内,则终端对待存储数据进行第一加密处理,并对进行第一加密处理后的待存储数据设置标识信息。
步骤305、终端对设置标识信息后的待存储数据进行第二加密处理,并将进行第二加密处理后的待存储数据存储在终端的第一存储区域中。
如果用户对终端的触控操作的触控压力在预设阈值范围内,则说明用户对终端的触控操作的满足预设条件,此时终端需要存储的待存储数据为需要采用安全存储格式进行存储的数据;终端可以对待存储数据进行第一加密处理,然后对进行第一加密处理后的数据设置标识信息,然后对设置过标识信 息的数据进行第二加密处理后进行存储;其中,第一加密处理可以是根据终端中的安全区域存储数据的规则进行加密处理的,对进行第一加密处理后的数据设置标识信息可以是增加对应数据的头文件和尾文件字段,例如可以是在头文件中增加B0 01字段,可以在尾文件中增加A0 01字段等;对进行标识信息设置后的数据进行第二加密处理是为了再次保证数据的安全性,第二加密处理的加密规则此处不作唯一的限定只要是符合要求能够实现对数据的保密的加密规则均是可行的。
步骤306、如果用户对终端的触控操作的触控压力没有在预设阈值范围内,则终端直接将待存储数据存储在终端的第二存储区域中。
参照图4所示,该方法还可以包括步骤307-309:
步骤307、终端根据解密规则对存储在终端中的待存储数据进行第一解密处理,得到第一数据。
该解密规则可以是与第一加密处理的加密规则相对应的解密规则,可选地,可以是与终端中的安全区域存储数据的规则对应的解密规则;进行第一解密处理之后可以得到第一数据,同时能够得到第一数据的标识信息;其中,该标识信息优选的可以是第一数据的头文件和尾文件中的字段信息。
步骤308、终端判断第一数据的标识信息是否正确。
判断第一数据的标识信息是否正确,可以是通过判断第一数据的头文件和尾文件中的字段的信息是否符合要求,如果第一数据的头文件和尾文件中的字段的信息符合要求则第一数据的标识信息正确;例如,可以判断第一数据的头文件中的字段中是否包括B0 01字段,尾文件中的字段中是否包括A0 01字段,如果第一数据的头文件的字段中包括B0 01字段且尾文件的字段中包括A0 01字段,则第一数据的标识信息正确;如果第一数据的标识信息不正确则不进行第二解密操作。
步骤309、如果第一数据的标识信息正确,则终端对第一数据进行第二解密处理,得到待存储数据。
第二解密处理的解密规则可以是与第二加密处理的加密规则对应的解密规则,对于不同加密规则处理的数据可以具有不同的解密规则。
还可以获取待存储数据的逻辑地址,并根据待存储数据的逻辑地址,将待存储数据存储在终端的与待存储数据的逻辑地址对应的区域中。
或者,还可以获取待存储数据的物理地址,并根据待存储数据的物理地址,将待存储数据存储在终端的与待存储数据的物理地址对应的区域中。
对于在同一ROM中分离的安全区域,寻址方式可以采用按照地址段寻址方法,按照逻辑地址进行寻址即存储数据的时候可以采用安全区域对应的逻辑地址换到对应的安全区域进行存储,对于独立ROM空间作为安全区域,寻址方式采用MAC地址寻址即存储数据的时候可以采用安全区域对应的物理地址(Media Access Control,MAC)地址切换到对应的安全区域进行存储。
本发明实施例中的信息处理方法中根据用户对终端的第一操作与预设条件之间的关系来存储待存储数据的实现方案,不仅可以适用于待存储数据的数据存储中,还可以适用于通信中,如果用户对终端的第一操作满足预设条件,则可以采用本发明中提供的加密方式对通信数据进行加密处理,实现与对端用户的通信;如果用户对终端的第一操作不满足预设条件则不对通信数据进行任何处理直接向对端用户传送原始通信数据。
需要说明的是,本实施例中与其它实施例中相同步骤或者概念的解释可以参照其它实施例中的描述,此处不再赘述;而且,本实施例中只是举例说明用户对终端的触控操作的触控压力在预设阈值范围内则终端的第一操作满足预设条件,用户对终端的触控操作的触控压力没有在预设阈值范围内则终端的第一操作不满足预设条件,当然,也可以是用户对终端的触控操作的触控压力在预设阈值范围内则终端的第一操作不满足预设条件,用户对终端的触控操作的触控压力没有在预设阈值范围内则终端的第一操作满足预设条件,具体实现方案可以根据具体的实现方案来确定。
本发明实施例所提供的信息处理方法,通过获取待存储数据并接收用户对终端的第一操作之后,判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数 据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
本发明的实施例提供一种信息处理装置4,该装置可以应用于图1~4对应的实施例提供的一种信息处理方法中,参照图5所示,该装置可以包括:第一获取单元41、第一判断单元42和第一处理单元43。
第一获取单元41,设置为获取待存储数据,并接收用户对终端的第一操作。
第一判断单元42,设置为判断用户对终端的第一操作是否满足预设条件。
第一处理单元43,设置为如果用户对终端的第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中。其中,第一形式为与终端的第一区域匹配的形式。
本发明实施例所提供的信息处理装置,通过获取待存储数据并接收用户对终端的第一操作之后,判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
第一获取单元41获取待存储数据,并接收用户对终端的第一操作包括:
当终端的工作模式为预设工作模式时,获取待存储数据并接收用户对终端的触控操作。
其中,在预设工作模式下,终端能够识别触控操作是否满足预设条件并根据触控操作对待存储数据进行处理的工作模式。
可选地,参照图6所示,该装置还包括:第二处理单元44。
第二处理单元44,设置为在所述第一判断单元判断所述用户对所述终端 的第一操作是否满足预设条件之后,如果用户对终端的第一操作不满足预设条件,则直接将待存储数据存储在终端的第二存储区域中。
可选地,参照图7所示,第一判断单元42包括:判断模块421和第一处理模块422。
所述第一判断单元判断所述用户对所述终端的第一操作是否满足预设条件包括:
判断模块421,设置为判断用户对终端的触控操作的触控压力是否在预设阈值范围内。
第一处理模块422,设置为如果用户对终端的触控操作的触控压力在预设阈值范围内,则确定用户对终端的第一操作满足预设条件。
第一处理模块422,还设置为如果用户对终端的触控操作的触控压力没有在预设阈值范围内,则确定用户对终端的第一操作不满足预设条件。
可选地,参照图8所示,第一处理单元43包括:第二处理模块431和第三处理模块432。
所述如果所述用户对所述终端的所述第一操作满足预设条件,则所述第一处理单元对所述待存储数据进行加密处理并以第一形式将所述待存储数据存储在所述终端的第一存储区域中包括:
第二处理模块431,设置为如果用户对终端的第一操作满足预设条件,则对待存储数据进行第一加密处理,并对进行第一加密处理后的待存储数据设置标识信息。
第三处理模块432,设置为对设置标识信息后的待存储数据进行第二加密处理,并将进行第二加密处理后的待存储数据存储在终端的第一存储区域中。
可选地,参照图9所示,该装置还包括:第三处理单元45、第二判断单元46和第四处理单元47。
第三处理单元45,设置为根据解密规则对存储在终端中的待存储数据进行第一解密处理,得到第一数据。
第二判断单元46,设置为判断第一数据的标识信息是否正确。
第四处理单元47,设置为如果第一数据的标识信息正确,则对第一数据进行第二解密处理,得到待存储数据。
可选地,参照10所示,该装置还包括:第二获取单元48和第一存储单元49。
第二获取单元48,设置为获取待存储数据的逻辑地址。
第一存储单元49,设置为根据待存储数据的逻辑地址,将待存储数据存储在终端的与待存储数据的逻辑地址对应的区域中。
可选地,参照图11所示,该装置还可以包括:第三获取单元410和第二存储单元411。
第三获取单元410,设置为获取待存储数据的物理地址。
第二存储单元411,设置为根据待存储数据的物理地址,将待存储数据存储在终端的与待存储数据的物理地址对应的区域中。
需要说明的是,本实施例中每个单元和模块之间的交互过程,可以参照图1~4对应的实施例提供的一种信息处理方法中的交互过程,此处不再赘述。
本发明实施例所提供的信息处理装置,通过获取待存储数据并接收用户对终端的第一操作之后,判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。
在实际应用中,所述第一获取单元41、第一判断单元42、第一处理单元43、第二处理单元44、判断模块421、第一处理模块422、第二处理模块431、第三处理模块432、第三处理单元45、第二判断单元46、第四处理单元47、第二获取单元48、第一存储单元49、第三获取单元410和第二存储单元411均可由位于无线数据发送设备中的中央处理器(Central Processing Unit, CPU)、微处理器(Micro Processor Unit,MPU)、数字信号处理器(Digital Signal Processor,DSP)或现场可编程门阵列(Field Programmable Gate Array,FPGA)等实现。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的信息处理方法。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明实施例可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明实施例是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
工业实用性
本发明实施例所提供的信息处理方法和装置,通过获取待存储数据并接 收用户对终端的第一操作之后,判断用户对终端的第一操作是否满足预设条件,如果第一操作满足预设条件,则对待存储数据进行加密处理,并以第一形式将待存储数据存储在终端的第一存储区域中;这样,可以直接根据用户对终端的第一操作与预设条件之间的关系对待存储数据进行处理并存储,无需切换终端的存储区域来存储数据,解决了相关的终端中需要再安全区域存储的数据必须切换到安全区域来存储,需要在普通区域存储的数据必须切换到普通区域来存储的问题,提高了操作的可实现性,更有利于用户操作,极大的增强了数据存储的便利性;同时,可以增强用户和终端的交互能力。

Claims (16)

  1. 一种信息处理方法,所述方法包括:
    获取待存储数据,并接收用户对终端的第一操作;
    判断所述用户对所述终端的第一操作是否满足预设条件;
    如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行加密处理,并以第一形式将所述待存储数据存储在所述终端的第一存储区域中;其中,所述第一形式为与所述终端的第一区域匹配的形式。
  2. 根据权利要求1所述的信息处理方法,其中,所述获取待存储数据,并接收用户对终端的第一操作包括:
    当所述终端的工作模式为预设工作模式时,获取所述待存储数据并接收所述用户对所述终端的触控操作;其中,在所述预设工作模式下,所述终端能够识别所述触控操作是否满足预设条件,并根据所述触控操作对所述待存储数据进行处理的工作模式。
  3. 根据权利要求1或2所述的信息处理方法,所述方法还包括:在判断所述用户对所述终端的第一操作是否满足预设条件之后,如果所述用户对所述终端的第一操作不满足预设条件,则将所述待存储数据存储在所述终端的第二存储区域中。
  4. 根据权利要求2所述的信息处理方法,其中,所述判断所述用户对所述终端的第一操作是否满足预设条件包括:
    判断所述用户对所述终端的触控操作的触控压力是否在预设阈值范围内;
    如果所述用户对所述终端的触控操作的触控压力在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作满足预设条件;
    如果所述用户对所述终端的触控操作的触控压力没有在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作不满足预设条件。
  5. 根据权利要求1或4所述的信息处理方法,其中,所述如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行加密处 理并以第一形式将所述待存储数据存储在所述终端的第一存储区域中包括:
    如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行第一加密处理,并对进行第一加密处理后的所述待存储数据设置标识信息;
    对设置标识信息后的所述待存储数据进行第二加密处理,并将进行第二加密处理后的所述待存储数据存储在所述终端的所述第一存储区域中。
  6. 根据权利要求5所述的信息处理方法,所述方法还包括:
    根据解密规则对存储在所述终端中的待存储数据进行第一解密处理,得到第一数据;
    判断所述第一数据的标识信息是否正确;
    如果所述第一数据的标识信息正确,则对所述第一数据进行第二解密处理,得到所述待存储数据。
  7. 根据权利要求1所述的信息处理方法,所述方法还包括:
    获取所述待存储数据的逻辑地址;
    根据所述待存储数据的逻辑地址,将所述待存储数据存储在所述终端的与所述待存储数据的逻辑地址对应的区域中。
  8. 根据权利要求1所述的信息处理方法,所述方法还包括:
    获取所述待存储数据的物理地址;
    根据所述待存储数据的物理地址,将所述待存储数据存储在所述终端的与所述待存储数据的物理地址对应的区域中。
  9. 一种信息处理装置,所述装置包括:第一获取单元、第一判断单元和第一处理单元;
    所述第一获取单元,设置为获取待存储数据,并接收用户对终端的第一操作;
    所述第一判断单元,设置为判断所述用户对所述终端的第一操作是否满足预设条件;
    所述第一处理单元,设置为如果所述用户对所述终端的所述第一操作满 足预设条件,则对所述待存储数据进行加密处理,并以第一形式将所述待存储数据存储在所述终端的第一存储区域中;其中,所述第一形式为与所述终端的第一区域匹配的形式。
  10. 根据权利要求8所述的信息处理装置,其中,所述第一获取单元获取待存储数据,并接收用户对终端的第一操作包括:
    当所述终端的工作模式为预设工作模式时,获取所述待存储数据并接收所述用户对所述终端的触控操作;其中,在所述预设工作模式下,所述终端能够识别所述触控操作是否满足预设条件并根据所述触控操作对所述待存储数据进行处理的工作模式。
  11. 根据权利要求9或10所述的信息处理装置,所述装置还包括:第二处理单元;
    所述第二处理单元,设置为在所述第一判断单元判断所述用户对所述终端的第一操作是否满足预设条件之后,如果所述用户对所述终端的第一操作不满足预设条件,则将所述待存储数据存储在所述终端的第二存储区域中。
  12. 根据权利要求10所述的信息处理装置,其中,所述第一判断单元包括:判断模块和第一处理模块;
    所述第一判断单元判断所述用户对所述终端的第一操作是否满足预设条件包括:
    所述判断模块,设置为判断所述用户对所述终端的触控操作的触控压力是否在预设阈值范围内;
    所述第一处理模块,设置为如果所述用户对所述终端的触控操作的触控压力在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作满足预设条件;
    所述第一处理模块,还设置为如果所述用户对所述终端的触控操作的触控压力没有在所述预设阈值范围内,则确定所述用户对所述终端的所述第一操作不满足预设条件。
  13. 根据权利要求9或12所述的信息处理装置,其中,所述第一处理单元包括:第二处理模块和第三处理模块;
    所述如果所述用户对所述终端的所述第一操作满足预设条件,则所述第一处理单元对所述待存储数据进行加密处理并以第一形式将所述待存储数据存储在所述终端的第一存储区域中包括:
    所述第二处理模块,设置为如果所述用户对所述终端的所述第一操作满足预设条件,则对所述待存储数据进行第一加密处理,并对进行第一加密处理后的所述待存储数据设置标识信息;
    所述第三处理模块,设置为对设置标识信息后的所述待存储数据进行第二加密处理,并将进行第二加密处理后的所述待存储数据存储在所述终端的所述第一存储区域中。
  14. 根据权利要求8所述的信息处理装置,所述装置还包括:第三处理单元、第二判断单元和第四处理单元;
    所述第三处理单元,设置为根据解密规则对存储在所述终端中的待存储数据进行第一解密处理,得到第一数据;
    所述第二判断单元,设置为判断所述第一数据的标识信息是否正确;
    所述第四处理单元,设置为如果所述第一数据的标识信息正确,则对所述第一数据进行第二解密处理,得到所述待存储数据。
  15. 根据权利要求9所述的信息处理装置,所述装置还包括:第二获取单元和第一存储单元;
    所述第二获取单元,设置为获取所述待存储数据的逻辑地址;
    所述第一存储单元,设置为根据所述待存储数据的逻辑地址,将所述待存储数据存储在所述终端的与所述待存储数据的逻辑地址对应的区域中。
  16. 根据权利要求9所述的信息处理装置,所述装置还包括:第三获取单元和第二存储单元;
    所述第三获取单元,设置为获取所述待存储数据的物理地址;
    所述第二存储单元,设置为根据所述待存储数据的物理地址,将所述待存储数据存储在所述终端的与所述待存储数据的物理地址对应的区域中。
PCT/CN2016/089807 2016-04-20 2016-07-12 一种信息处理方法和装置 WO2017181539A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610250211.XA CN107305468A (zh) 2016-04-20 2016-04-20 一种信息处理方法和装置
CN201610250211.X 2016-04-20

Publications (1)

Publication Number Publication Date
WO2017181539A1 true WO2017181539A1 (zh) 2017-10-26

Family

ID=60115709

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/089807 WO2017181539A1 (zh) 2016-04-20 2016-07-12 一种信息处理方法和装置

Country Status (2)

Country Link
CN (1) CN107305468A (zh)
WO (1) WO2017181539A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110806827A (zh) * 2019-10-30 2020-02-18 北京字节跳动网络技术有限公司 信息处理方法、装置、电子设备及介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030079119A1 (en) * 2001-10-19 2003-04-24 Lefevre Marc Method and system for implementing host-dependent SCSI behavior in a heterogeneous host environment
CN101847129A (zh) * 2010-04-30 2010-09-29 武汉天喻信息产业股份有限公司 安全移动存储设备的数据安全保护方法
CN103617404A (zh) * 2013-12-17 2014-03-05 天津赢达信科技有限公司 一种安全分区的存储装置
CN104092743A (zh) * 2014-06-27 2014-10-08 清华大学 云环境下用户数据的保护方法及系统
CN105069362A (zh) * 2015-06-30 2015-11-18 广东轩辕网络科技股份有限公司 一种存储方法及装置

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103617398B (zh) * 2013-11-27 2017-07-07 北京深思数盾科技股份有限公司 一种数据文件的保护方法及装置
CN105095787A (zh) * 2015-05-19 2015-11-25 努比亚技术有限公司 一种信息处理方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030079119A1 (en) * 2001-10-19 2003-04-24 Lefevre Marc Method and system for implementing host-dependent SCSI behavior in a heterogeneous host environment
CN101847129A (zh) * 2010-04-30 2010-09-29 武汉天喻信息产业股份有限公司 安全移动存储设备的数据安全保护方法
CN103617404A (zh) * 2013-12-17 2014-03-05 天津赢达信科技有限公司 一种安全分区的存储装置
CN104092743A (zh) * 2014-06-27 2014-10-08 清华大学 云环境下用户数据的保护方法及系统
CN105069362A (zh) * 2015-06-30 2015-11-18 广东轩辕网络科技股份有限公司 一种存储方法及装置

Also Published As

Publication number Publication date
CN107305468A (zh) 2017-10-31

Similar Documents

Publication Publication Date Title
WO2020029589A1 (zh) 基于联邦学习的模型参数获取方法、系统及可读存储介质
CN106412907B (zh) 一种网络接入方法、相关设备及系统
CN106533669B (zh) 设备识别的方法、装置和系统
US10742620B2 (en) Method for dynamic encryption and signing, terminal and server
US8572375B2 (en) Device pairing based on graphically encoded data
US9258402B2 (en) System and method for controlling mobile devices
CN107786331B (zh) 数据处理方法、装置、系统及计算机可读存储介质
CN109451006B (zh) 一种数据传输方法、装置、服务器及计算机存储介质
WO2019024230A1 (zh) 信息加密解密方法、装置、计算机设备和存储介质
CN110099064B (zh) 一种基于物联网的文件处理方法、装置、设备和存储介质
US20110038552A1 (en) Graphically encoded data copy and paste
WO2019228270A1 (zh) 接入无线路由器的方法、设备和计算机可读存储介质
US10789372B2 (en) Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
CN110222086A (zh) 基于区块链的数据管理方法、装置、设备和存储介质
CN109347839B (zh) 集中式密码管理方法、装置、电子设备及计算机存储介质
WO2017032128A1 (zh) 一种终端解锁的方法及终端
WO2017032088A1 (zh) 一种主题确定方法及终端
CN105069365A (zh) 一种数据处理的方法及移动终端
US20200320182A1 (en) Data encryption or decryption method and apparatus, and terminal device
CN103701586A (zh) 获取密钥的方法和装置
CN105022965B (zh) 一种数据加密方法及装置
WO2017181539A1 (zh) 一种信息处理方法和装置
CN112115495A (zh) 可离线云端数据存储方法、系统、计算机设备及存储介质
CN106648913B (zh) 数据采集软件标识方法及装置
TW201717597A (zh) 配對方法、配對裝置、智慧終端機及智慧卡

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16899126

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16899126

Country of ref document: EP

Kind code of ref document: A1