WO2019051800A1 - 基于双系统的数据访问方法及内核 - Google Patents

基于双系统的数据访问方法及内核 Download PDF

Info

Publication number
WO2019051800A1
WO2019051800A1 PCT/CN2017/101943 CN2017101943W WO2019051800A1 WO 2019051800 A1 WO2019051800 A1 WO 2019051800A1 CN 2017101943 W CN2017101943 W CN 2017101943W WO 2019051800 A1 WO2019051800 A1 WO 2019051800A1
Authority
WO
WIPO (PCT)
Prior art keywords
instruction
linux kernel
data
encryption process
access
Prior art date
Application number
PCT/CN2017/101943
Other languages
English (en)
French (fr)
Inventor
王辉
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to PCT/CN2017/101943 priority Critical patent/WO2019051800A1/zh
Publication of WO2019051800A1 publication Critical patent/WO2019051800A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present application relates to the field of communications, and in particular, to a data access method and a kernel based on dual systems.
  • the Android dual system of the terminal device is currently running on the same Linux kernel. Since the common system and the private system access the hardware system through the same Linux kernel, the user may access the private data in the private system. Part of the legacy is left in the Linux kernel, which further leads to the possibility of direct access to private data left in the Linux kernel through a specific instruction in a common system, thus presenting a security hole.
  • the invention provides a dual system-based data access method and a kernel, so that a common system and a private system are respectively run on different Linux kernels, and the entire process of private data access is encrypted, thereby further improving the dual system.
  • Data security which enables more comprehensive protection of user privacy information.
  • the present invention provides a data access method based on a dual system, which is applied to a terminal device, where the first Android system, a second Android system, and a hardware system are disposed, and the first Android system includes An Android application layer, a first Linux kernel, and a third Linux kernel, the second Android system includes a second Android application layer, a second Linux kernel, and the third Linux kernel, the first Android system being a user privacy system
  • the second Android system is a common system for users;
  • the method includes:
  • the third Linux kernel acquires an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer;
  • the first Linux kernel acquires data corresponding to the decrypted access instruction from the hardware system.
  • the method further includes:
  • the third Linux kernel acquires data sent by the first Linux kernel, where the data is data after the first data encryption process is performed by the first Linux kernel;
  • the third Linux kernel sends the encrypted data after the second data encryption process to the first Android application layer, so that the first Android application layer decrypts the data after the second data encryption process. And displaying the decrypted data to the user.
  • the method before the third Linux kernel performs the second instruction encryption process on the access instruction, the method further includes:
  • the third Linux kernel determines whether the access instruction is a security instruction
  • the third Linux kernel performs a second instruction encryption process on the access instruction.
  • the method further includes:
  • the third Linux kernel performs a change process on the access instruction to obtain a changed access instruction, wherein the changed access instruction causes the data acquired by the first Linux kernel from the hardware system to be dummy data. ;
  • the third Linux kernel performs a second instruction encryption process on the changed access instruction.
  • the third Linux kernel determines whether the access instruction is a security instruction, including:
  • the third Linux kernel determines whether the user authentication information is reserved user authentication information.
  • the present invention further provides a Linux kernel, where the Linux kernel is a third Linux kernel, and is applied to a terminal device, where the first Android system, the second Android system, and the hardware system are disposed in the terminal device,
  • the first Android system includes a first Android application layer, a first Linux kernel, and a third Linux kernel
  • the second Android system includes a second Android application layer, a second Linux kernel, and the third Linux kernel
  • the first The Android system is a user privacy system
  • the second Android system is a user common system
  • the kernel includes:
  • An instruction obtaining module configured to acquire an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer;
  • An instruction encryption module configured to perform a second instruction encryption process on the access instruction to obtain an encryption instruction after the second instruction encryption process
  • An instruction decryption module configured to send the encrypted instruction after the second instruction encryption process to the first Linux kernel, so that the first Linux kernel decrypts the instruction after the second instruction encryption process
  • the first Linux kernel acquires data corresponding to the decrypted access instruction from the hardware system.
  • the core further includes:
  • a data encryption module configured to perform second data encryption processing on the data to obtain encrypted data after the second data encryption process
  • a data decryption module configured to send the encrypted data after the second data encryption process to the first Android application layer, so that the first Android application layer decrypts the data after the second data encryption process And displaying the decrypted data to the user.
  • the core further includes:
  • An instruction determining module configured to determine whether the access instruction is a security instruction
  • the core further includes:
  • the instruction change module is configured to perform a change process on the access instruction when the access instruction is not a security instruction, to obtain a changed access instruction, wherein the changed access instruction is in the first Linux
  • the data obtained by the core from the hardware system is dummy data
  • the instruction encryption module is further configured to perform a second instruction encryption process on the changed access instruction.
  • the instruction determining module is specifically configured to:
  • the present invention provides a terminal device comprising: a memory, a processor, and a computer program, wherein the computer program is stored in the memory, the processor running the computer program to perform the first aspect and the first aspect A dual system based data access method as described in various possible designs.
  • the present invention also provides a storage medium comprising: a readable storage medium and a computer program for implementing the first aspect and the first aspect of the various possible dual system based data access methods.
  • the present invention provides a dual system based data access method by setting a third Linux kernel between a first Android application layer and a first Linux kernel and between a second Android application layer and a second Linux kernel, wherein the third The Linux kernel only receives and sends access commands and encrypts access commands.
  • the common system and the private system in the terminal device are respectively run on different Linux kernels, thereby realizing data between the running cores of the common system and the private system. Isolation further enhances the data security of private systems, thereby enabling more comprehensive protection of user privacy information.
  • FIG. 2 is a flowchart of a dual system based data access method according to an exemplary embodiment of the present invention
  • FIG. 4 is a flowchart of a dual system based data access method according to still another exemplary embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a Linux kernel according to an exemplary embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a Linux kernel according to still another exemplary embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a Linux kernel according to still another exemplary embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of a hardware of a terminal device according to an exemplary embodiment of the present invention.
  • FIG. 1 is a schematic diagram of a dual system architecture provided by the present invention.
  • the dual system in this embodiment includes a first Android system and a second Android system, where the first Android system is a user privacy system, and the second Android system is a user common system.
  • the first Android system includes a first Android application layer, a first Linux kernel, and a third Linux kernel;
  • the second Android system includes a second Android application layer, a second Linux kernel, and a third Linux kernel.
  • the dual system described above communicates with the hardware system on the terminal device.
  • the first Android system must first establish communication with the first Linux kernel through the third Linux kernel, thereby instructing the hardware system to perform corresponding operations; similarly, the second The Android system must also first establish a communication with the second Linux kernel through the third Linux kernel, thereby instructing the hardware system to perform corresponding operations.
  • FIG. 2 is a flow chart of a dual system based data access method according to an exemplary embodiment of the present invention. As shown in FIG. 2, the method provided in this embodiment includes:
  • Step 101 The third Linux kernel acquires an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer.
  • the user inputs an instruction for accessing the hardware system of the terminal device through the user interaction interface of the first Android application layer. For example, if the user needs to view the private photo, the user may select a photo storage path through the touch screen to send the photo to the third Linux kernel.
  • the access command may also send a photo access command to the third Linux kernel directly by voice recognition input.
  • the manner in which a specific user inputs an instruction is not specifically limited.
  • the first Android application layer After the user inputs the access instruction, the first Android application layer performs the first instruction encryption on the instruction by using a corresponding encryption algorithm, where the encryption algorithm may be based on an Advanced Encryption Standard (AES) or a data encryption standard ( Data Encryption Standard (DES) is set, but in this embodiment, the encryption algorithm of the first instruction encryption process is not specifically limited.
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • the first Android application layer After performing the first instruction encryption process on the instruction input by the user in the first Android application layer, the first Android application layer sends the access instruction to the third Linux kernel, so that the third Linux kernel further performs the access instruction. Encryption processing.
  • Step 102 The third Linux kernel performs a second instruction encryption process on the access instruction to obtain an encrypted instruction after the second instruction encryption process.
  • the third Linux kernel passes the The corresponding encryption algorithm performs a second instruction encryption process on the access instruction, and the encryption algorithm may be set according to AES or DES.
  • the encryption algorithm of the second instruction encryption process is not specifically limited. .
  • different encryption standards may be selected during the first instruction encryption process and the second instruction encryption process.
  • the third Linux kernel does not perform any storage behavior after performing the second instruction encryption process on the access instruction, but directly sends the encrypted instruction after the second instruction encryption process to the first Linux kernel, after sending The third Linux kernel is self-cleaning.
  • the third Linux kernel only encrypts and sends and receives, does not identify the specific content of the command itself, and performs timely cleanup after encryption, so that data is not left in the third Linux kernel, eliminating the need to retrieve the system through the common system.
  • Step 103 The third Linux kernel sends the encrypted instruction of the second instruction encryption process to the first Linux kernel, so that the first Linux kernel decrypts the instruction after the second instruction encryption process, and the first Linux kernel slave hardware The data corresponding to the decrypted access instruction is obtained in the system.
  • the third Linux kernel continues to send the encrypted instruction after the second instruction encryption process to the first Linux kernel.
  • the first Linux kernel decrypts the second instruction encrypted processing instruction according to a preset decryption algorithm, and transmits the decrypted access instruction to the processor of the hardware system through the driver interface, in the processor of the hardware system.
  • the decrypted access instruction is further processed into a binary code command that can be directly recognized by the hardware system according to the preset command correspondence relationship, so that the first Linux kernel obtains the data corresponding to the decrypted access instruction from the hardware system.
  • a third Linux kernel is set between the first Android application layer and the first Linux kernel and between the second Android application layer and the second Linux kernel, wherein the third Linux kernel only receives the access command. And sending and encrypting the access instruction, so that the common system and the private system in the terminal device are respectively run on different Linux kernels, thereby realizing data isolation between the running cores of the common system and the private system, and further improving the privacy system. Data security, which enables more comprehensive protection of user privacy information.
  • Step 201 The third Linux kernel acquires an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer.
  • Step 202 The third Linux kernel performs a second instruction encryption process on the access instruction to obtain an encrypted instruction after the second instruction encryption process.
  • Step 203 The third Linux kernel sends the encrypted instruction of the second instruction encryption process to the first Linux kernel, so that the first Linux kernel decrypts the instruction after the second instruction encryption process, and the first Linux kernel slave hardware The data corresponding to the decrypted access instruction is obtained in the system.
  • Step 204 The third Linux kernel acquires data sent by the first Linux kernel, where the data is the data after the first data encryption process is performed by the first Linux kernel.
  • the first Linux kernel encrypts the data for the first time by using a corresponding encryption algorithm, where the encryption algorithm may be based on an advanced encryption standard (Advanced Encryption Standard). It is abbreviated as AES or Data Encryption Standard (DES).
  • AES Advanced Encryption Standard
  • DES Data Encryption Standard
  • the encryption algorithm of the first data encryption process is not specifically limited.
  • the first Linux kernel After the first Linux kernel performs the first instruction encryption process on the user-entered instruction, the first Linux kernel sends the data to the third Linux kernel, so that the third Linux kernel further encrypts the data.
  • Step 205 The third Linux kernel performs a second data encryption process on the data to obtain the encrypted data after the second data encryption process.
  • the third Linux kernel after receiving the data sent by the third Linux kernel, the third Linux kernel performs a second instruction encryption process on the data by using a corresponding encryption algorithm, and the encryption algorithm may be set according to AES or DES, in this implementation.
  • the encryption algorithm for the second data encryption process is not specifically limited.
  • different encryption standards may be selected in the first data encryption process and the second data encryption process.
  • the third Linux kernel does not perform any storage behavior after performing the second data encryption process on the data, but directly sends the encrypted data after the second instruction encryption process to the first Linux kernel. After the transmission, The third Linux kernel is self-cleaning.
  • the third Linux kernel only performs the functions of encryption and sending and receiving, does not identify the data itself, and cleans it in time after encryption, so that data is not left in the third Linux kernel, eliminating the need to retrieve the third through the common system.
  • Step 206 The third Linux kernel sends the encrypted data after the second data encryption process to the first
  • the Android application layer is configured to enable the first Android application layer to decrypt the data after the second data encryption process, and display the decrypted data to the user.
  • the third Linux kernel continues to send the second data encryption processed data to the first Android application layer.
  • the first Android application layer decrypts the second data encryption processed instruction according to the preset decryption algorithm, and wants the user to display the decrypted data through the user interaction interface of the first Android application layer.
  • FIG. 4 is a flowchart of a dual system based data access method according to still another exemplary embodiment of the present invention. As shown in FIG. 4, the method provided in this embodiment includes:
  • Step 301 The third Linux kernel acquires an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer.
  • step 301 For the specific implementation of the step 301, refer to the description of step 101 in the embodiment shown in FIG. 2, and details are not described herein again.
  • Step 302 The third Linux kernel determines whether the access instruction is a security instruction. If not, step 303 is performed, and if yes, step 304 is performed.
  • the third Linux kernel determines whether the access instruction is a security instruction according to a preset determination rule.
  • the user needs to input the user verification information while inputting the instruction in the first Android application layer.
  • the user authentication information may be a text password, such as a pure digital password, or a combination of numbers and letters, or a biometric such as fingerprint information, iris information, or face information, and the identification is more secure by biometrics. Therefore, when the third Linux kernel obtains the access instruction sent by the first Android application layer, the user authentication information input by the user is also obtained, and the third Linux kernel determines whether the obtained user verification information is a preset user verification.
  • the third Linux kernel determines the access instruction as a security instruction, and if the user verification information input by the user does not match the preset user verification information, The third Linux kernel determines the access instruction as a non-secure instruction.
  • Step 303 The third Linux kernel performs a change process on the access command to obtain the changed access command.
  • the third Linux kernel determines the access command as non-secure If so, the access command is directly changed, so that the changed access command causes the data acquired by the first Linux kernel from the hardware system to be dummy data.
  • the dummy data may be data preset by the user to confuse the system intruder in the hardware system.
  • Step 304 The third Linux kernel performs a second instruction encryption process on the access instruction to obtain an encrypted instruction after the second instruction encryption process.
  • Step 305 The third Linux kernel sends the encrypted instruction of the second instruction encryption process to the first Linux kernel, so that the first Linux kernel decrypts the instruction after the second instruction encryption process, and the first Linux kernel slave hardware The data corresponding to the decrypted access instruction is obtained in the system.
  • Step 306 The third Linux kernel acquires data sent by the first Linux kernel, where the data is data that is processed by the first Linux kernel for the first time.
  • Step 307 The third Linux kernel performs a second data encryption process on the data to obtain the encrypted data after the second data encryption process.
  • Step 308 The third Linux kernel sends the encrypted data after the second data encryption process to the first Android application layer, so that the first Android application layer decrypts the data after the second data encryption process, and displays the data to the user. Decrypted data.
  • FIG. 5 is a schematic structural diagram of a Linux kernel according to an exemplary embodiment of the present invention.
  • the Linux kernel is a third Linux kernel, and is applied to a terminal device.
  • the terminal device is provided with a first Android system, a second Android system, and a hardware system.
  • the first Android system includes a first Android application layer, a first Linux kernel, and a first
  • the third Linux kernel includes a second Android application layer, a second Linux kernel, and a third Linux kernel.
  • the first Android system is a user privacy system
  • the second Android system is a user common system.
  • the kernel provided in this embodiment includes:
  • the instruction obtaining module 401 is configured to obtain an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer;
  • the instruction encryption module 402 is configured to perform a second instruction encryption process on the access instruction to obtain an encryption instruction after the second instruction encryption process;
  • the instruction decryption module 403 is configured to send the encrypted instruction after the second instruction encryption process to the first Linux The kernel, so that the first Linux kernel decrypts the instruction after the second instruction is encrypted, and the first Linux kernel obtains the data corresponding to the decrypted access instruction from the hardware system.
  • FIG. 6 is a schematic structural diagram of a Linux kernel according to still another exemplary embodiment of the present invention.
  • the kernel provided in this embodiment includes:
  • the instruction obtaining module 501 is configured to obtain an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer;
  • the instruction encryption module 502 is configured to perform a second instruction encryption process on the access instruction to obtain an encryption instruction after the second instruction encryption process;
  • the instruction decryption module 503 is configured to send the encrypted instruction of the second instruction encryption process to the first Linux kernel, so that the first Linux kernel decrypts the instruction after the second instruction encryption process, the first Linux kernel slave hardware The data corresponding to the decrypted access instruction is obtained in the system.
  • the data obtaining module 504 is configured to obtain data sent by the first Linux kernel, where the data is the data after the first data encryption process is performed by the first Linux kernel;
  • the data encryption module 505 is configured to perform second data encryption processing on the data to obtain encrypted data after the second data encryption processing;
  • the data decryption module 506 is configured to send the encrypted data after the second data encryption process to the first Android application layer, so that the first Android application layer decrypts the data after the second data encryption process, and displays the data to the user. Decrypted data.
  • FIG. 7 is a schematic diagram showing the structure of a Linux kernel according to still another exemplary embodiment of the present invention.
  • the kernel provided in this embodiment further includes:
  • the instruction obtaining module 601 is configured to obtain an access instruction sent by the first Android application layer, where the access instruction is an instruction after the first instruction encryption process is performed by the first Android application layer;
  • the instruction determining module 602 is configured to determine whether the access instruction is a security instruction; if the determination result is yes, the third Linux kernel performs a second instruction encryption process on the access instruction;
  • the instruction change module 603 is configured to perform a change process on the access command when the access command is not a secure command, and obtain a changed access command, wherein the changed access command causes the data acquired by the first Linux kernel from the hardware system to be pseudo. data;
  • the instruction encryption module 604 is configured to perform a second instruction encryption process on the access instruction to obtain an encryption instruction after the second instruction encryption process;
  • the instruction decryption module 605 is configured to send the encrypted instruction after the second instruction encryption process to the first Linux The kernel, so that the first Linux kernel decrypts the instruction after the second instruction is encrypted, and the first Linux kernel obtains the data corresponding to the decrypted access instruction from the hardware system.
  • the data obtaining module 606 is configured to obtain data sent by the first Linux kernel, where the data is the data after the first data encryption process is performed by the first Linux kernel;
  • the data encryption module 607 is configured to perform second data encryption processing on the data to obtain encrypted data after the second data encryption process;
  • the data decryption module 608 is configured to send the encrypted data after the second data encryption process to the first Android application layer, so that the first Android application layer decrypts the data after the second data encryption process, and displays the data to the user. Decrypted data.
  • the instruction encryption module 604 is further configured to perform a second instruction encryption process on the changed access instruction.
  • the command determining module 602 is specifically configured to: obtain user authentication information sent by the first Android application layer; and determine whether the user verification information is reserved user authentication information.
  • the memory 702 is configured to store a computer program, and the memory may also be a flash memory.
  • the processor 701 is configured to execute an execution instruction of the memory storage to implement each step in the above decoding method. For details, refer to the related description in the foregoing method embodiments.
  • the terminal device 70 may further include:
  • the present application further provides a storage medium in which an execution instruction is stored.
  • the terminal device executes the execution instruction, the terminal device performs the dual system-based data access method provided by the various embodiments described above.
  • the application also provides a program product comprising an execution instruction stored in a readable storage medium.
  • At least one processor of the terminal device can read the execution instructions from a readable storage medium, and the at least one processor executes the execution instructions such that the terminal device implements the dual system based data access method provided by the various embodiments described above.
  • the processor may be a central processing unit (English: Central Processing Unit, CPU for short), or may be other general-purpose processors, digital signal processors (English: Digital Signal Processor, Abbreviation: DSP), ASIC (English: Application Specific Integrated Circuit, referred to as ASIC).
  • the general purpose processor may be a microprocessor or the processor or any conventional processor or the like. The steps of the method disclosed in connection with the present application may be directly embodied by hardware processor execution or by a combination of hardware and software modules in a processor.
  • All or part of the steps of implementing the above method embodiments may be performed by hardware associated with the program instructions.
  • the aforementioned program can be stored in a readable memory.
  • the steps including the foregoing method embodiments are performed; and the foregoing memory (storage medium) includes: read-only memory (English: read-only memory, abbreviation: ROM), RAM, flash memory, hard disk, Solid state drive, magnetic tape (English: magnetic tape), floppy disk (English: floppy disk), optical disc (English: optical disc) and any combination thereof.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明提供一种基于双系统的数据访问方法及内核。所述方法包括:第三Linux内核获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令;第三Linux内核对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;第三Linux内核将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。通过本实施例提供的方法,实现了常用系统和私密系统分别运行在不同的Linux内核上,并对私密数据访问的整个过程都进行加密处理,进一步地提高双系统的数据安全性,从而实现用户隐私信息更全面的保护。

Description

基于双系统的数据访问方法及内核 技术领域
本申请涉及通信领域,尤其涉及一种基于双系统的数据访问方法及内核。
背景技术
随着通信技术的快速发展,用户也将越来越多的数据存储在终端设备上,其中包括很多个人隐私信息,甚至是一些商业机密信息。数据存储在终端设备上在给人们生活和工作带来极大便利的同时,也大大增加了用户信息泄露的可能性。
目前,许多终端设备厂商通过在终端设备中安装Android双系统来区分用户的数据存储,即一个常用系统,另一个为私密系统。用户在常用系统中,可以使用大部分的常用功能,例如打电话,拍照等,但是无法访问私密系统下生成和存储的数据。而当用户需要访问一些私密信息或者操作时,例如,用户查看私密相册或者私密文件时,需要先通过用户身份验证之后,切换到私密系统。
但是,目前终端设备的Android双系统都是运行在同一个Linux内核上,由于常用系统和私密系统都是通过同一个Linux内核来访问硬件系统的,因此,用户在私密系统中访问隐私数据之后可能会部分遗留在Linux内核中,进一步导致在常用系统中存在通过特定指令直接去访问遗留在Linux内核中隐私数据的可能性,从而存在着安全漏洞。
发明内容
本发明提供一种基于双系统的数据访问方法及内核,以实现常用系统和私密系统分别运行在不同的Linux内核上,并对私密数据访问的整个过程都进行加密处理,进一步地提高双系统的数据安全性,从而实现用户隐私信息更全面的保护。
第一方面,本发明提供一种基于双系统的数据访问方法,应用于终端设备,所述终端设备中设置有第一Android系统、第二Android系统以及硬件系统,所述第一Android系统包括第一Android应用层、第一Linux内核以及第三Linux内核,所述第二Android系统包括第二Android应用层、第二Linux内核以及所述第三Linux内核,所述第一Android系统为用户私密系统,所述第二Android系统为用户常用系统; 所述方法包括:
所述第三Linux内核获取所述第一Android应用层发送的访问指令,其中,所述访问指令为所述第一Android应用层进行第一次指令加密处理后的指令;
所述第三Linux内核对所述访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
所述第三Linux内核将所述第二次指令加密处理后的加密指令发送至所述第一Linux内核,以使所述第一Linux内核对所述第二次指令加密处理后的指令进行解密,所述第一Linux内核从所述硬件系统中获取所述解密后的访问指令对应的数据。
在一种可能的设计中,在所述第三Linux内核将所述第二次指令加密处理后的加密指令发送至所述第一Linux内核之后,所述方法还包括:
所述第三Linux内核获取所述第一Linux内核发送的数据,其中,所述数据为所述第一Linux内核进行第一次数据加密处理后的数据;
所述第三Linux内核对所述数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据;
所述第三Linux内核将所述第二次数据加密处理后的加密数据发送至第一Android应用层,以使所述第一Android应用层对所述第二次数据加密处理后的数据进行解密,并向用户显示所述解密后的数据。
在一种可能的设计中,在所述第三Linux内核对所述访问指令进行第二次指令加密处理之前,所述方法还包括:
所述第三Linux内核判断所述访问指令是否为安全指令;
若判断结果为是,则所述第三Linux内核对所述访问指令进行第二次指令加密处理。
在一种可能的设计中,若所述第三Linux内核判断所述访问指令不是安全指令,所述方法还包括:
所述第三Linux内核对所述访问指令进行变更处理,得到变更后的访问指令,其中,所述变更后的访问指令使得所述第一Linux内核从所述硬件系统中获取的数据为伪数据;
所述第三Linux内核对所述变更后的访问指令进行第二次指令加密处理。
在一种可能的设计中,所述第三Linux内核判断所述访问指令是否为安全指令,包括:
所述第三Linux内核获取所述第一Android应用层发送的用户验证信息;
所述第三Linux内核判断所述用户验证信息是否为预留的用户验证信息。
第二方面,本发明还提供一种Linux内核,所述Linux内核为第三Linux内核,应用于终端设备,所述终端设备中设置有第一Android系统、第二Android系统以及硬件系统,所述第一Android系统包括第一Android应用层、第一Linux内核以及第三Linux内核,所述第二Android系统包括第二Android应用层、第二Linux内核以及所述第三Linux内核,所述第一Android系统为用户私密系统,所述第二Android系统为用户常用系统;所述内核包括:
指令获取模块,用于获取所述第一Android应用层发送的访问指令,其中,所述访问指令为所述第一Android应用层进行第一次指令加密处理后的指令;
指令加密模块,用于对所述访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
指令解密模块,用于将所述第二次指令加密处理后的加密指令发送至所述第一Linux内核,以使所述第一Linux内核对所述第二次指令加密处理后的指令进行解密,所述第一Linux内核从所述硬件系统中获取所述解密后的访问指令对应的数据。
在一种可能的设计中,所述内核还包括:
数据获取模块,用于获取所述第一Linux内核发送的数据,其中,所述数据为所述第一Linux内核进行第一次数据加密处理后的数据;
数据加密模块,用于对所述数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据;
数据解密模块,用于将所述第二次数据加密处理后的加密数据发送至第一Android应用层,以使所述第一Android应用层对所述第二次数据加密处理后的数据进行解密,并向用户显示所述解密后的数据。
在一种可能的设计中,所述内核还包括:
指令判断模块,用于判断所述访问指令是否为安全指令;
若判断结果为是,则所述第三Linux内核对所述访问指令进行第二次指令加密处理。
在一种可能的设计中,所述内核还包括:
指令更改模块,在所述访问指令不是安全指令时,用于对所述访问指令进行变更处理,得到变更后的访问指令,其中,所述变更后的访问指令使得所述第一Linux内 核从所述硬件系统中获取的数据为伪数据;
所述指令加密模块,还用于对所述变更后的访问指令进行第二次指令加密处理。
在一种可能的设计中,所述指令判断模块,具体用于:
获取所述第一Android应用层发送的用户验证信息;
判断所述用户验证信息是否为预留的用户验证信息。
第三方面,本发明提供一种终端设备,包括:存储器、处理器以及计算机程序,所述计算机程序存储在所述存储器中,所述处理器运行所述计算机程序执行第一方面及第一方面各种可能的设计所述的基于双系统的数据访问方法。
第四方面,本发明还提供一种存储介质,包括:可读存储介质和计算机程序,所述计算机程序用于实现第一方面及第一方面各种可能的基于双系统的数据访问方法。
本发明提供一种基于双系统的数据访问方法,通过在第一Android应用层和第一Linux内核之间以及第二Android应用层和第二Linux内核之间设置第三Linux内核,其中,第三Linux内核只进行访问指令的接收和发送以及对访问指令进行加密,实现终端设备中的常用系统和私密系统分别运行在不同的Linux内核上,从而实现常用系统和私密系统的运行内核之间的数据隔离,进一步地提高私密系统的数据安全性,从而实现用户隐私信息更全面的保护。
附图说明
图1是本发明提供的双系统架构示意图;
图2是本发明根据一示例性实施例示出的基于双系统的数据访问方法流程图;
图3是本发明根据又一示例性实施例示出的基于双系统的数据访问方法流程图;
图4是本发明根据再一示例性实施例示出的基于双系统的数据访问方法流程图;
图5是本发明根据一示例性实施例示出的Linux内核结构示意图;
图6是本发明根据又一示例性实施例示出的Linux内核结构示意图;
图7是本发明根据再一示例性实施例示出的Linux内核结构示意图;
图8为本发明根据一示例性实施例示出的终端设备的硬件结构示意图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实 施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
图1是本发明提供的双系统架构示意图。如图1所示,本实施例中的双系统包括有第一Android系统和第二Android系统,其中,第一Android系统为用户私密系统,第二Android系统为用户常用系统。第一Android系统包括第一Android应用层、第一Linux内核以及第三Linux内核;第二Android系统包括第二Android应用层、第二Linux内核以及第三Linux内核。上述的双系统与终端设备上的硬件系统进行通信,具体地,第一Android系统必须先通过第三Linux内核才能与第一Linux内核建立通信,从而指示硬件系统进行相应操作;同理,第二Android系统也必须先通过第三Linux内核才能与第二Linux内核建立通信,从而指示硬件系统进行相应操作。
图2是本发明根据一示例性实施例示出的基于双系统的数据访问方法流程图。如图2所示,本实施例提供的方法包括:
步骤101、第三Linux内核获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令。
具体地,用户通过第一Android应用层的用户交互界面输入访问终端设备硬件系统的指令,例如,用户需要查看私密照片,则可以是通过触屏选择照片的存放路径以向第三Linux内核发送照片访问指令,也可以是直接通过语音识别输入的方式向第三Linux内核发送照片访问指令。本实施例中,并不对具体用户输入指令的方式进行具体的限定。
在用户输入访问指令之后,第一Android应用层通过相应的加密算法对该指令进行第一次指令加密,其中该加密算法可以是根据高级加密标准(Advanced Encryption Standard,简称AES)或者数据加密标准(Data Encryption Standard,简称DES)设置的,但是本实施例中,并不对第一次指令加密处理的加密算法进行具体的限定。
在第一Android应用层中对用户输入的指令进行第一次指令加密处理后,第一Android应用层将该访问指令发送给第三Linux内核,以使第三Linux内核对该访问指令进行进一步地加密处理。
步骤102、第三Linux内核对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令。
具体地,第三Linux内核在接收到第一Android应用层发送的访问指令之后,通 过相应的加密算法对该访问指令进行第二次指令加密处理,该加密算法可以是根据AES或者DES设置的,在本实施例中,并不对第二次指令加密处理的加密算法进行具体的限定。但是,为了进一步降低访问指令被拦截破解的可能性,可以在第一次指令加密处理和第二次指令加密处理过程中选择不同的加密标准。其中第三Linux内核在对访问指令进行第二次指令加密处理之后,并不对其进行任何的存储行为,而是直接将第二次指令加密处理后的加密指令发送至第一Linux内核,发送之后,第三Linux内核进行自清理。第三Linux内核只进行加密以及发送接收,并不对命令本身具体地内容进行识别,且在进行加密之后进行及时清理,从而不会在第三Linux内核中残留数据,消除了通过常用系统调取第三Linux内核中数据从而访问第一Linux内核中数据的可能性。
步骤103、第三Linux内核将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
具体地,在第三Linux内核对访问指令进行第二次指令加密处理之后,第三Linux内核继续将第二次指令加密处理后的加密指令发送至第一Linux内核中。第一Linux内核根据预设的解密算法对第二次指令加密处理后的指令进行解密,并将该解密后的访问指令通过驱动接口传输至硬件系统的处理器中,在硬件系统的处理器中进一步地将该解密后的访问指令根据预设的命令对应关系处理成硬件系统可以直接识别的二进制代码命令,从而实现第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
本实施例中,通过在第一Android应用层和第一Linux内核之间以及第二Android应用层和第二Linux内核之间设置第三Linux内核,其中,第三Linux内核只进行访问指令的接收和发送以及对访问指令进行加密,实现终端设备中的常用系统和私密系统分别运行在不同的Linux内核上,从而实现常用系统和私密系统的运行内核之间的数据隔离,进一步地提高私密系统的数据安全性,从而实现用户隐私信息更全面的保护。
在图2所示实施例的基础上,图3是本发明根据又一示例性实施例示出的基于双系统的数据访问方法流程图。如图3所示,本实施例提供的方法包括:
步骤201、第三Linux内核获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令。
步骤202、第三Linux内核对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令。
步骤203、第三Linux内核将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
其中,步骤201-203的具体实现方式参照图2所示实施例中步骤101-103的描述,这里不再赘述。
步骤204、第三Linux内核获取第一Linux内核发送的数据,其中,上述数据为第一Linux内核进行第一次数据加密处理后的数据。
具体地,第一Linux内核从硬件系统中获取到数据之后,,第一Linux内核通过相应的加密算法对该数据进行第一次数据加密,其中该加密算法可以是根据高级加密标准(Advanced Encryption Standard,简称AES)或者数据加密标准(Data Encryption Standard,简称DES)设置的,但是本实施例中,并不对第一次数据加密处理的加密算法进行具体的限定。
在第一Linux内核对用户输入的指令进行第一次指令加密处理之后,第一Linux内核将该数据发送给第三Linux内核,以使第三Linux内核对该数据进行进一步地加密处理。
步骤205、第三Linux内核对数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据。
具体地,第三Linux内核在接收到第三Linux内核发送的数据之后,通过相应的加密算法对该数据进行第二次指令加密处理,该加密算法可以是根据AES或者DES设置的,在本实施例中,并不对第二次数据加密处理的加密算法进行具体的限定。但是,为了进一步降低访问指令被拦截破解的可能性,可以在第一次数据加密处理和第二次数据加密处理过程中选择不同的加密标准。其中第三Linux内核在对数据进行第二次数据加密处理之后,并不对其进行任何的存储行为,而是直接将第二次指令加密处理后的加密数据发送至第一Linux内核,发送之后,第三Linux内核进行自清理。第三Linux内核只进行加密以及发送接收的功能,并不对数据本身进行识别,且在进行加密之后进行及时清理,从而不会在第三Linux内核中残留数据,消除了通过常用系统调取第三Linux内核中数据从而访问第一Linux内核中数据的可能性。
步骤206、第三Linux内核将第二次数据加密处理后的加密数据发送至第一 Android应用层,以使第一Android应用层对第二次数据加密处理后的数据进行解密,并向用户显示解密后的数据。
具体地,在第三Linux内核对数据进行第二次指令加密处理之后,第三Linux内核继续将第二次数据加密处理后的数据发送至第一Android应用层中。第一Android应用层根据预设的解密算法对第二次数据加密处理后的指令进行解密,并将该解密后的数据通过第一Android应用层的用户交互界面想用户进行显示。
在图3所示实施例的基础上,图4是本发明根据再一示例性实施例示出的基于双系统的数据访问方法流程图。如图4所示,本实施例提供的方法包括:
步骤301、第三Linux内核获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令。
其中,步骤301的具体实现方式参照图2所示实施例中步骤101的描述,这里不再赘述。
步骤302、第三Linux内核判断访问指令是否为安全指令,若否,则执行步骤303,若是,则执行步骤304。
具体地,在第三Linux内核获取第一Android应用层发送的访问指令之后,第三Linux内核根据预设的判断规则判断该访问指令是否为安全指令。可选地,用户在第一Android应用层输入指令的同时,还需要输入用户验证信息。该用户验证信息可以是文字密码,例如纯数字密码,或者,数字加字母组合,还可以是指纹信息、虹膜信息或人脸信息等生物特征,通过生物特征进行识别安全性更高。因此,在第三Linux内核获取到第一Android应用层发送的访问指令的同时也会获取到用户输入的用户验证信息,第三Linux内核通过判断获取到的用户验证信息是否为预设的用户验证信息,从而确定该访问指令是否为安全指令。如果用户输入的用户验证信息与预设的用户验证信息相符合,则第三Linux内核将该访问指令判断为安全指令,若用户输入的用户验证信息与预设的用户验证信息不相符合,则第三Linux内核将该访问指令判断为非安全指令。通过在用户输入访问指令的同时,还需要进行用户身份的识别,从而使得及时用户不小心停留在私密系统,他人也无法直接地进行数据访问,进一步地提高了私密系统的安全性。
步骤303、第三Linux内核对访问指令进行变更处理,得到变更后的访问指令。
考虑到系统侵入者可能会因为无法通过用户验证而采取其他更加暴力的破解方式对系统进行进一步地破坏。因此,如果第三Linux内核将该访问指令判断为非安全指 令,则直接对访问指令进行变更处理,从而将变更后的访问指令使得所述第一Linux内核从所述硬件系统中获取的数据为伪数据。其中,伪数据可以是用户预设在硬件系统中用于迷惑系统侵入者的数据。
步骤304、第三Linux内核对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令。
步骤305、第三Linux内核将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
其中,步骤304-305的具体实现方式参照图2所示实施例中步骤102-103的描述,这里不再赘述。
步骤306、第三Linux内核获取第一Linux内核发送的数据,其中,上述数据为第一Linux内核进行第一次数据加密处理后的数据。
步骤307、第三Linux内核对数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据。
步骤308、第三Linux内核将第二次数据加密处理后的加密数据发送至第一Android应用层,以使第一Android应用层对第二次数据加密处理后的数据进行解密,并向用户显示解密后的数据。
其中,步骤306-308的具体实现方式参照图3所示实施例中步骤204-206的描述,这里不再赘述。
图5是本发明根据一示例性实施例示出的Linux内核结构示意图。其中,Linux内核为第三Linux内核,应用于终端设备,终端设备中设置有第一Android系统、第二Android系统以及硬件系统,第一Android系统包括第一Android应用层、第一Linux内核以及第三Linux内核,第二Android系统包括第二Android应用层、第二Linux内核以及第三Linux内核,第一Android系统为用户私密系统,第二Android系统为用户常用系统。如图5所示,本实施例提供的内核,包括:
指令获取模块401,用于获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令;
指令加密模块402,用于对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
指令解密模块403,用于将第二次指令加密处理后的加密指令发送至第一Linux 内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
在图5所示的实施例的基础上,图6是本发明根据又一示例性实施例示出的Linux内核结构示意图。如图6所示,本实施例提供的内核,包括:
指令获取模块501,用于获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令;
指令加密模块502,用于对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
指令解密模块503,用于将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
数据获取模块504,用于获取第一Linux内核发送的数据,其中,数据为第一Linux内核进行第一次数据加密处理后的数据;
数据加密模块505,用于对数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据;
数据解密模块506,用于将第二次数据加密处理后的加密数据发送至第一Android应用层,以使第一Android应用层对第二次数据加密处理后的数据进行解密,并向用户显示解密后的数据。
在图6所示的实施例的基础上,图7是本发明根据再一示例性实施例示出的Linux内核结构示意图。如图7所示,本实施例提供的内核,还包括:
指令获取模块601,用于获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令;
指令判断模块602,用于判断访问指令是否为安全指令;若判断结果为是,则第三Linux内核对访问指令进行第二次指令加密处理;
指令更改模块603,在访问指令不是安全指令时,用于对访问指令进行变更处理,得到变更后的访问指令,其中,变更后的访问指令使得第一Linux内核从硬件系统中获取的数据为伪数据;
指令加密模块604,用于对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
指令解密模块605,用于将第二次指令加密处理后的加密指令发送至第一Linux 内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
数据获取模块606,用于获取第一Linux内核发送的数据,其中,数据为第一Linux内核进行第一次数据加密处理后的数据;
数据加密模块607,用于对数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据;
数据解密模块608,用于将第二次数据加密处理后的加密数据发送至第一Android应用层,以使第一Android应用层对第二次数据加密处理后的数据进行解密,并向用户显示解密后的数据。
此外,指令加密模块604,还用于对变更后的访问指令进行第二次指令加密处理。
其中,指令判断模块602,具体用于:获取第一Android应用层发送的用户验证信息;判断用户验证信息是否为预留的用户验证信息。
图8为本发明根据一示例性实施例示出的终端设备的硬件结构示意图。如图8所示,该终端设备70包括:处理器701以及存储器702;其中
存储器702,用于存储计算机程序,该存储器还可以是flash(闪存)。
处理器701,用于执行存储器存储的执行指令,以实现上述译码方法中的各个步骤。具体可以参见前面方法实施例中的相关描述。
可选地,存储器702既可以是独立的,也可以跟处理器701集成在一起。
当存储器702是独立于处理器701之外的器件时,终端设备70还可以包括:
总线703,用于连接存储器702和处理器701。
本申请还提供一种存储介质,存储介质中存储有执行指令,当终端设备的至少一个处理器执行该执行指令时,终端设备执行上述的各种实施方式提供的基于双系统的数据访问方法。
本申请还提供一种程序产品,该程序产品包括执行指令,该执行指令存储在可读存储介质中。终端设备的至少一个处理器可以从可读存储介质读取该执行指令,至少一个处理器执行该执行指令使得终端设备实施上述的各种实施方式提供的基于双系统的数据访问方法。
在上述终端设备的实施例中,应理解,处理器可以是中央处理单元(英文:Central Processing Unit,简称:CPU),还可以是其他通用处理器、数字信号处理器(英文:Digital Signal Processor,简称:DSP)、专用集成电路(英文:Application Specific  Integrated Circuit,简称:ASIC)等。通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。结合本申请所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
实现上述各方法实施例的全部或部分步骤可以通过程序指令相关的硬件来完成。前述的程序可以存储于一可读取存储器中。该程序在执行时,执行包括上述各方法实施例的步骤;而前述的存储器(存储介质)包括:只读存储器(英文:read-only memory,缩写:ROM)、RAM、快闪存储器、硬盘、固态硬盘、磁带(英文:magnetic tape)、软盘(英文:floppy disk)、光盘(英文:optical disc)及其任意组合。
最后应说明的是:尽管参照前述各实施例对本方案进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不能使相应技术方案的本质脱离本申请各实施例技术方案的范围。

Claims (10)

  1. 一种基于双系统的数据访问方法,其特征在于,应用于终端设备,终端设备中设置有第一Android系统、第二Android系统以及硬件系统,第一Android系统包括第一Android应用层、第一Linux内核以及第三Linux内核,第二Android系统包括第二Android应用层、第二Linux内核以及第三Linux内核,第一Android系统为用户私密系统,第二Android系统为用户常用系统;方法包括:
    第三Linux内核获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令;
    第三Linux内核对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
    第三Linux内核将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
  2. 根据权利要求1所述的方法,其特征在于,在第三Linux内核将第二次指令加密处理后的加密指令发送至第一Linux内核之后,还包括:
    第三Linux内核获取第一Linux内核发送的数据,其中,数据为第一Linux内核进行第一次数据加密处理后的数据;
    第三Linux内核对数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据;
    第三Linux内核将第二次数据加密处理后的加密数据发送至第一Android应用层,以使第一Android应用层对第二次数据加密处理后的数据进行解密,并向用户显示解密后的数据。
  3. 根据权利要求1所述的方法,其特征在于,在第三Linux内核对访问指令进行第二次指令加密处理之前,还包括:
    第三Linux内核判断访问指令是否为安全指令;
    若判断结果为是,则第三Linux内核对访问指令进行第二次指令加密处理。
  4. 根据权利要求3所述的方法,其特征在于,若第三Linux内核判断访问指令不是安全指令,方法还包括:
    第三Linux内核对访问指令进行变更处理,得到变更后的访问指令,其中,变更后的访问指令使得第一Linux内核从硬件系统中获取的数据为伪数据;
    第三Linux内核对变更后的访问指令进行第二次指令加密处理。
  5. 根据权利要求3或4所述的方法,其特征在于,第三Linux内核判断访问指令是否为安全指令,包括:
    第三Linux内核获取第一Android应用层发送的用户验证信息;
    第三Linux内核判断用户验证信息是否为预留的用户验证信息。
  6. 一种Linux内核,Linux内核为第三Linux内核,其特征在于,应用于终端设备,终端设备中设置有第一Android系统、第二Android系统以及硬件系统,第一Android系统包括第一Android应用层、第一Linux内核以及第三Linux内核,第二Android系统包括第二Android应用层、第二Linux内核以及第三Linux内核,第一Android系统为用户私密系统,第二Android系统为用户常用系统;所述内核包括:
    指令获取模块,用于获取第一Android应用层发送的访问指令,其中,访问指令为第一Android应用层进行第一次指令加密处理后的指令;
    指令加密模块,用于对访问指令进行第二次指令加密处理,得到第二次指令加密处理后的加密指令;
    指令解密模块,用于将第二次指令加密处理后的加密指令发送至第一Linux内核,以使第一Linux内核对第二次指令加密处理后的指令进行解密,第一Linux内核从硬件系统中获取解密后的访问指令对应的数据。
  7. 根据权利要求6所述的内核,其特征在于,还包括:
    数据获取模块,用于获取第一Linux内核发送的数据,其中,数据为第一Linux内核进行第一次数据加密处理后的数据;
    数据加密模块,用于对数据进行第二次数据加密处理,得到第二次数据加密处理后的加密数据;
    数据解密模块,用于将第二次数据加密处理后的加密数据发送至第一Android应用层,以使第一Android应用层对第二次数据加密处理后的数据进行解密,并向用户显示解密后的数据。
  8. 根据权利要求6所述的内核,其特征在于,还包括:
    指令判断模块,用于判断访问指令是否为安全指令;
    若判断结果为是,则第三Linux内核对访问指令进行第二次指令加密处理。
  9. 根据权利要求8所述的内核,其特征在于,还包括:
    指令更改模块,在访问指令不是安全指令时,用于对访问指令进行变更处理,得 到变更后的访问指令,其中,变更后的访问指令使得第一Linux内核从硬件系统中获取的数据为伪数据;
    指令加密模块,还用于对变更后的访问指令进行第二次指令加密处理。
  10. 根据权利要求8或9所述的内核,其特征在于,指令判断模块,具体用于:
    获取第一Android应用层发送的用户验证信息;
    判断用户验证信息是否为预留的用户验证信息。
PCT/CN2017/101943 2017-09-15 2017-09-15 基于双系统的数据访问方法及内核 WO2019051800A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/101943 WO2019051800A1 (zh) 2017-09-15 2017-09-15 基于双系统的数据访问方法及内核

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/101943 WO2019051800A1 (zh) 2017-09-15 2017-09-15 基于双系统的数据访问方法及内核

Publications (1)

Publication Number Publication Date
WO2019051800A1 true WO2019051800A1 (zh) 2019-03-21

Family

ID=65722234

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/101943 WO2019051800A1 (zh) 2017-09-15 2017-09-15 基于双系统的数据访问方法及内核

Country Status (1)

Country Link
WO (1) WO2019051800A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342425A (zh) * 2021-08-06 2021-09-03 苏州浪潮智能科技有限公司 一种Linux嵌入式系统的启动方法、装置和存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547102A (zh) * 2008-11-26 2009-09-30 邵峰晶 一种内部网络化的新型计算机体系结构及装置
CN102624699A (zh) * 2012-01-19 2012-08-01 歌尔声学股份有限公司 一种保护数据的方法和系统
CN103425106A (zh) * 2013-08-08 2013-12-04 华南理工大学 一种基于Linux的EtherCAT主/从站控制系统及方法
CN104537302A (zh) * 2015-01-16 2015-04-22 宇龙计算机通信科技(深圳)有限公司 一种终端的安全启动方法、装置及终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101547102A (zh) * 2008-11-26 2009-09-30 邵峰晶 一种内部网络化的新型计算机体系结构及装置
CN102624699A (zh) * 2012-01-19 2012-08-01 歌尔声学股份有限公司 一种保护数据的方法和系统
CN103425106A (zh) * 2013-08-08 2013-12-04 华南理工大学 一种基于Linux的EtherCAT主/从站控制系统及方法
CN104537302A (zh) * 2015-01-16 2015-04-22 宇龙计算机通信科技(深圳)有限公司 一种终端的安全启动方法、装置及终端

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
SHI, YONGHONG ET AL.: "Design of Security Gateway Based On Dual-Homed Architecture", INTERNATIONAL CONFERENCE ON ROBOTS & INTELLIGENT SYSTEM, 31 December 2016 (2016-12-31), pages 159 - 163, XP033016037, DOI: 10.1109/ICRIS.2016.34 *
YUAN, FEI: "Realize Architecture of Real-time Embedded Operating System based on the Double Cores of µC/OS and Linux", JOURNAL OF CHENGDU UNIVERSITY, vol. 25, no. 2, 30 June 2006 (2006-06-30), pages 97 - 99, 103 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342425A (zh) * 2021-08-06 2021-09-03 苏州浪潮智能科技有限公司 一种Linux嵌入式系统的启动方法、装置和存储介质

Similar Documents

Publication Publication Date Title
CN112513857A (zh) 可信执行环境中的个性化密码安全访问控制
US11848753B2 (en) Securing audio communications
US8627106B2 (en) System and method for biometrically secured, transparent encryption and decryption
US10360369B2 (en) Securing sensor data
US9507964B2 (en) Regulating access using information regarding a host machine of a portable storage drive
US20070014416A1 (en) System and method for protecting against dictionary attacks on password-protected TPM keys
WO2016192165A1 (zh) 一种数据加密方法及装置
CN108763917B (zh) 一种数据加解密方法及装置
WO2022028289A1 (zh) 数据加密方法、数据解密方法、装置、终端和存储介质
US9529733B1 (en) Systems and methods for securely accessing encrypted data stores
US20150319147A1 (en) System and method for file encrypting and decrypting
WO2020186457A1 (zh) 网络摄像机的认证方法和装置
WO2017166362A1 (zh) 一种esim号码的写入方法、安全系统、esim号码服务器及终端
US10430596B2 (en) Information processing method, terminal and nonvolatile machine-readable medium
US10929566B2 (en) Information processing device and information processing system
US11735319B2 (en) Method and system for processing medical data
WO2021051591A1 (zh) 安全键盘实现方法、装置、计算机设备及存储介质
US11531626B2 (en) System and method to protect digital content on external storage
US10192056B1 (en) Systems and methods for authenticating whole disk encryption systems
WO2019051800A1 (zh) 基于双系统的数据访问方法及内核
CN110674525A (zh) 一种电子设备及其文件处理方法
KR101745390B1 (ko) 데이터 유출 방지장치 및 그 방법
WO2024018517A1 (ja) 2要素認証システム、2要素認証方法、及び2要素認証プログラム
US20230283467A1 (en) Method for Secure Access to Digital Data
KR20190026327A (ko) 웨어러블 단말을 이용한 데이터 암복호 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17924875

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17924875

Country of ref document: EP

Kind code of ref document: A1