WO2016173118A1 - Secure data access control method and system, and terminal - Google Patents

Secure data access control method and system, and terminal Download PDF

Info

Publication number
WO2016173118A1
WO2016173118A1 PCT/CN2015/082980 CN2015082980W WO2016173118A1 WO 2016173118 A1 WO2016173118 A1 WO 2016173118A1 CN 2015082980 W CN2015082980 W CN 2015082980W WO 2016173118 A1 WO2016173118 A1 WO 2016173118A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
access mode
storage area
secure data
data storage
Prior art date
Application number
PCT/CN2015/082980
Other languages
French (fr)
Chinese (zh)
Inventor
张学林
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2016173118A1 publication Critical patent/WO2016173118A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to an access control method for secure data, an access control system for secure data, and a terminal.
  • Solution 1 backup protection.
  • cloud data backup if the security operating system has data loss or damage, you can quickly restore the private data in the secure operating system through cloud backup to protect the privacy data of the security operating system.
  • Solution 3 Shield the security operating system hardware to achieve the protection of private data.
  • An application for protection of dual-system data has been proposed, specifically to partially block some hardware in the secure operating system through cloud instructions, so that users cannot steal private data in the secure operating system; in addition, by modifying the command parameters, The hardware of the secure operating system is effective to protect the data security of the secure operating system in the dual system.
  • Solution 2 Data masquerading protection, this solution is to prevent non-secure operating system access and steal the installation system privacy data.
  • the loss of private data cannot be completely protected. For example, if the mobile phone is lost or stolen, if the other person can enter the secure operating system, the privacy data in the secure operating system still has the risk of leaking.
  • Solution 3 Hardware shielding protection, this scheme can effectively protect the privacy data from being stolen, but in the case of a fault in the security operating system, it is impossible to enter the security operating system, and there may be a situation in which the security operating system privacy data cannot be obtained, if the security operation is urgently needed Important privacy data in the system will be very troublesome.
  • the invention is based on the above problems, and proposes a new technical solution, which can be more adapted to the actual needs of users, effectively protects the security data of the security system from being stolen, and prevents the loss of private data, thereby further improving the user. Privacy security.
  • an aspect of the present invention provides a method for controlling access to secure data, which is used in a terminal, and a plurality of operating systems are installed on the terminal, and the access control method includes: according to the received data access request, Determining a current access mode of the secure data storage area in the target operating system of the terminal; determining, according to the determination result, whether to allow access to the security data stored in the secure data storage area, wherein the security level of the target operating system A security level higher than other operating systems of the plurality of operating systems except the target operating system.
  • an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system.
  • the zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area.
  • This method can completely prevent data leakage caused by data backup.
  • the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data.
  • the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the user's hidden Private security.
  • the current access mode of the secure data storage area is a secure access mode
  • determining whether the data access request is from the target operating system, and determining that the current access mode is The secure access mode allows access to the secure data, otherwise access to the secure data is prohibited.
  • a secure access mode can be set for the secure data storage area.
  • the secure access mode only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
  • the security data when it is determined that the current access mode of the secure data storage area is a shared access mode, accessing the security data is allowed; or when determining that the current access mode of the secure data storage area is a masked access In the mode, access to the security data is prohibited.
  • a shared access mode and a masked access mode can also be set for the secure data storage area.
  • each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited.
  • the system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
  • the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
  • the user when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the user experience when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the method before determining the current access mode of the secure data storage area according to the received data access request, the method further includes: presetting the current access of the secure data storage area mode.
  • the access mode may be preset according to actual needs or user instructions, wherein the setting of the access mode cannot be simply changed through the settings in the mobile phone, but needs to pass the special There are instructions to change.
  • the instruction to change the access mode may be in the following form:
  • op state state op is a change operation
  • the previous state represents the original access mode
  • the latter state represents the new access mode
  • op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode.
  • 000 means unsafe
  • ops and states there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
  • Another aspect of the present invention provides a security data access control system for a terminal, the terminal having a plurality of operating systems installed thereon, the access control system comprising: a determining module, configured to access according to the received data a request, determining a current access mode of the secure data storage area in the target operating system of the terminal; and a control module, configured to determine, according to the determination result, whether to allow access to the security data stored in the secure data storage area, where The security level of the target operating system is higher than the security level of the other operating systems except the target operating system.
  • an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system.
  • the zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area.
  • This method can completely prevent data leakage caused by data backup.
  • the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data.
  • the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the privacy of users.
  • the determining module is further configured to: when determining the security When the current access mode of the data storage area is the secure access mode, determining whether the data access request is from the target operating system; and the control module is specifically configured to: when determining that the current access mode is the secure access mode Allowing access to the security data, otherwise accessing the security data is prohibited.
  • a secure access mode can be set for the secure data storage area.
  • the secure access mode only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
  • control module is further configured to: when determining that the current access mode of the secure data storage area is a shared access mode, allowing access to the security data; or when determining the security data When the current access mode of the storage area is the masked access mode, access to the security data is prohibited.
  • a shared access mode and a masked access mode can also be set for the secure data storage area.
  • each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited.
  • the system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
  • the determining module is further configured to: determine, when the access to the security data is prohibited, whether to reset an access mode of the secure data storage area in the target operating system;
  • the method includes: a reset module, configured to reset an access of the secure data storage area in the target operating system according to the received reset command when determining to reset an access mode of the secure data storage area mode.
  • the user when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the user experience when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the method further includes: a setting module, configured to preset the secure data storage area before determining the current access mode of the secure data storage area according to the received data access request The current access mode.
  • the access mode may be preset according to actual needs or user instructions, where The settings of the access mode cannot be changed simply by the settings in the phone, but need to be converted by proprietary instructions.
  • the instruction to change the access mode may be in the following form:
  • op state state op is a change operation
  • the previous state represents the original access mode
  • the latter state represents the new access mode
  • op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode.
  • 000 means unsafe
  • ops and states there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
  • a further aspect of the present invention provides a terminal having a plurality of operating systems installed thereon, the terminal including a processor and a memory, wherein the memory stores a set of program codes, and the processor is used by the processor Calling the program code stored in the memory to perform the following operations:
  • the processor executes:
  • the current access mode of the secure data storage area is a secure access mode
  • determining whether the data access request is from the target operating system and allowing access when determining that the current access mode is the secure access mode
  • the security data is otherwise disabled from accessing the security data.
  • the processor executes:
  • the processor executes:
  • the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
  • the processor further performs: before determining the current access mode of the secure data storage area according to the received data access request:
  • the user's actual needs can be more adapted, the security data of the security operating system is effectively protected from being stolen, and the loss of private data is prevented, thereby further improving the privacy of the user.
  • FIG. 1 is a flow chart showing an access control method of secure data according to an embodiment of the present invention
  • FIG. 2 is a block diagram showing the structure of an access control system for secure data according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 4 is a diagram showing an access mode transition of a secure data storage area in accordance with one embodiment of the present invention.
  • FIG. 5 is a flow chart showing an access control method of secure data according to another embodiment of the present invention.
  • FIG. 6 shows a schematic structural diagram of a terminal according to another embodiment of the present invention.
  • FIG. 1 shows a flow of an access control method for secure data according to an embodiment of the present invention. schematic diagram.
  • an access control method for secure data is used for a terminal, where multiple operating systems are installed on the terminal, including:
  • Step 102 Determine, according to the received data access request, a current access mode of the secure data storage area in the target operating system of the terminal.
  • Step 104 Determine, according to the determination result, whether to access the security data stored in the secure data storage area, wherein the security level of the target operating system is higher than the security level of other operating systems except the target operating system among the plurality of operating systems.
  • an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system.
  • the zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area.
  • This method can completely prevent data leakage caused by data backup.
  • the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data.
  • the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the privacy of users.
  • a secure access mode can be set for the secure data storage area.
  • the secure access mode only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
  • a shared access mode and a masked access mode can also be set for the secure data storage area.
  • each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited.
  • the system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
  • the user when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the user experience when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the method further includes: preset a current access mode of the secure data storage area.
  • the access mode can be preset according to actual needs or user instructions, wherein the setting of the access mode cannot be simply changed by the setting in the mobile phone, but needs to be converted by a proprietary instruction.
  • the instruction to change the access mode may be in the following form:
  • op state state op is a change operation
  • the previous state represents the original access mode
  • the latter state represents the new access mode
  • op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode.
  • 000 means unsafe
  • ops and states there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
  • FIG. 2 is a block diagram showing the structure of an access control system for secure data according to an embodiment of the present invention.
  • the access control system 200 for secure data is used for a terminal, and a plurality of operating systems are installed on the terminal, and the method includes: a determining module 202, configured to access the data according to the received data. Determining a current access mode of the secure data storage area in the target operating system of the terminal; the control module 204, configured to determine, according to the determination result, whether to allow access to the stored secure data The security data in the storage area, wherein the security level of the target operating system is higher than the security level of other operating systems except the target operating system among the multiple operating systems.
  • an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system.
  • the zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area.
  • This method can completely prevent data leakage caused by data backup.
  • the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data.
  • the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the privacy of users.
  • the determining module 202 is further configured to: determine that the data access request is from the target operating system when determining that the current access mode of the secure data storage area is the secure access mode; and the control module 204 is specifically configured to: When it is determined that the current access mode is the secure access mode, access to secure data is allowed, otherwise access to secure data is prohibited.
  • a secure access mode can be set for the secure data storage area.
  • the secure access mode only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
  • control module 204 is further configured to: when determining that the current access mode of the secure data storage area is the shared access mode, permit access to the secure data; or when determining that the current access mode of the secure data storage area is Access to secure data is prohibited when the access mode is blocked.
  • a shared access mode and a masked access mode can also be set for the secure data storage area.
  • each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited.
  • the system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
  • the determining module 202 is further configured to: determine, when the access to the security data is prohibited, whether to reset the access mode of the secure data storage area in the target operating system; and further include: a reset module 206, And when determining to reset the access mode of the secure data storage area, resetting the access mode of the secure data storage area in the target operating system according to the received reset instruction.
  • the user when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the user experience when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved.
  • the setting module 208 is configured to preset a current access mode of the secure data storage area before determining the current access mode of the secure data storage area according to the received data access request.
  • the access mode can be preset according to actual needs or user instructions, wherein the setting of the access mode cannot be simply changed by the setting in the mobile phone, but needs to be converted by a proprietary instruction.
  • the instruction to change the access mode may be in the following form:
  • op state state op is a change operation
  • the previous state represents the original access mode
  • the latter state represents the new access mode
  • op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode.
  • 000 means unsafe
  • ops and states there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
  • FIG. 3 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • a terminal 300 includes an access control system 200 for security data. Therefore, the terminal 300 has the same access control system 200 as the security data according to any one of the above technical solutions. The technical effects will not be described here.
  • FIG. 4 is a diagram showing an access mode transition of a secure data storage area in accordance with one embodiment of the present invention.
  • an access security identifier lock can be set for the secure data storage area of the security system (target operating system), and then access protection for the secure data storage area is controlled in different scenarios by the security identifier lock, wherein the security identifier lock
  • the different lock states correspond to different access modes of the secure data store.
  • the security identification lock can have three lock states: Safe, Unsafe, and Share. Among them, when in the Safe lock state, only the security system can normally access the data in the data storage area. When the Unsafe lock state is in use, neither the security system nor the non-secure system can access the data in the data storage area, but in the Share lock state. Both the security system and the non-secure system can access the data in the data store.
  • the remote security command can also be triggered to trigger the change of the security lock state to Unsafe, preventing others from entering the security system to obtain private data.
  • the system fails, and the security lock status is triggered to change to Share according to the preset trigger mechanism.
  • the user cannot simply change the security lock state through the settings in the mobile phone, but needs to change the security lock state through a proprietary instruction.
  • the instruction to change the access mode may be in the following form:
  • op state state op is a change operation
  • the previous state represents the original access mode
  • the latter state represents the new access mode
  • op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode.
  • 000 means unsafe
  • ops and states there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
  • the user's actual needs can be more adapted, the security data of the security operating system is effectively protected from being stolen, and the loss of private data is prevented, thereby further improving the privacy of the user.
  • FIG. 5 is a flow chart showing an access control method of secure data according to another embodiment of the present invention.
  • an access control method for security data includes:
  • Step 502 Set an access lock state of the data storage area of the security system (target operating system) (that is, a current access mode of the preset secure data storage area);
  • Step 504 Determine the current access lock status (current access mode) of the security system data storage area according to the received access request for the security system data. If it is the Safe status (secure access mode), go to step 506, if it is Share Status (shared access mode), then step 508 is performed, if Unsafe state (mask access mode), then step 510;
  • Step 506 it is determined whether the current system is a security system (ie, it is determined whether the system that issued the access request is a security system), if it is a security system, step 508 is performed, otherwise step 510 is performed;
  • Step 508 normal access to the security system data
  • Step 510 When the security system data cannot be accessed, determine whether to reset the access lock state of the security system data storage area, and if yes, execute step 512; otherwise, end the process;
  • Step 512 Send an instruction to set an access lock state of the security system data storage area. After the setting is completed, return to step 504 to continue to determine the current access lock status of the security system data storage area.
  • the terminal 6 is a block diagram showing the structure of a terminal according to another embodiment of the present invention.
  • the terminal 6 may include: at least one processor 61, such as a CPU, at least one communication bus 62, and a memory 63;
  • the bus 62 is used to implement connection communication between these components;
  • the memory 63 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory.
  • a set of program codes is stored in the memory 63, and the processor 61 is configured to call the program code stored in the memory 63 for performing the following operations:
  • the processor 61 performs:
  • the current access mode of the secure data storage area is a secure access mode
  • determining whether the data access request is from the target operating system and allowing access when determining that the current access mode is the secure access mode
  • the security data is otherwise disabled from accessing the security data.
  • the processor 61 performs:
  • the processor 61 performs:
  • the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
  • the processor 61 further performs: before determining the current access mode of the secure data storage area according to the received data access request:
  • the user's actual needs can be more adapted, the security data of the security operating system is effectively protected from being stolen, and the loss of private data is prevented, thereby further improving the privacy of the user.

Abstract

A secure data access control method, a secure data access control system, and a terminal, a plurality of operating systems being installed on the terminal, and the access control method comprising: according to a received data access request, judging the current access mode of a secure data storage area in a target operating system of the terminal (102); and according to a judgement result, determining whether access is permitted to the secure data stored in the secure data storage area, wherein the security level of the target operating system is higher than the security levels of other operating systems apart from the target operating system in the plurality of operating systems (104). The technical solution can be more adapted to the actual requirements of a user. Secure data of a secure operating system is effectively protected from being stolen, and the loss of privacy data is prevented, so that the privacy security of the user is further improved.

Description

安全数据的访问控制方法及系统、终端Security data access control method and system, terminal
本申请要求于2015年4月30日提交中国专利局,申请号为201510219696.1、发明名称为“安全数据的访问控制方法及系统、终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to Chinese Patent Application No. 201510219696.1, entitled "Access Control Method and System for Secure Data, Terminals", filed on April 30, 2015, the entire contents of which are incorporated by reference. In this application.
技术领域Technical field
本发明涉及终端技术领域,具体而言,涉及一种安全数据的访问控制方法、一种安全数据的访问控制系统和一种终端。The present invention relates to the field of terminal technologies, and in particular, to an access control method for secure data, an access control system for secure data, and a terminal.
背景技术Background technique
目前,现有安全操作系统隐私数据的保护方法主要有如下方案:At present, the existing security system privacy data protection methods mainly have the following solutions:
方案一、备份保护。通过云端数据备份,若安全操作系统出现数据丢失、破坏等情况,可快速通过云端备份恢复安全操作系统中的隐私数据,达到对安全操作系统隐私数据的保护。Solution 1, backup protection. Through cloud data backup, if the security operating system has data loss or damage, you can quickly restore the private data in the secure operating system through cloud backup to protect the privacy data of the security operating system.
方案二、数据伪装保护。其他非安全操作系统访问安全操作系统中隐私数据时,将安全操作系统中的数据通过伪装处理后显示,从而保护了安全操作系统隐私数据不被窃取。Option 2, data camouflage protection. When other non-secure operating systems access the private data in the secure operating system, the data in the secure operating system is displayed by masquerading, thereby protecting the privacy data of the secure operating system from being stolen.
方案三、屏蔽安全操作系统硬件达到隐私数据的保护。已有人提出一种双系统数据的保护方法的申请,具体是通过云端指令快速屏蔽安全操作系统中的部分硬件,让用户无法窃取安全操作系统中的私密数据;另外,可以通过修改指令参数,让安全操作系统的硬件有效,从而保护双系统中安全操作系统的数据安全。Solution 3: Shield the security operating system hardware to achieve the protection of private data. An application for protection of dual-system data has been proposed, specifically to partially block some hardware in the secure operating system through cloud instructions, so that users cannot steal private data in the secure operating system; in addition, by modifying the command parameters, The hardware of the secure operating system is effective to protect the data security of the secure operating system in the dual system.
现有技术方案的缺陷描述如下:The defects of the prior art solutions are described as follows:
方案一、备份保护方案虽然可以通过数据备份防止数据丢失、破坏,但仍存在隐私数据泄露的危险,这种云端数据泄露案例已有很多,如小米账号的泄露、CSDN(Chinese Software Develop Net,中国软件开发联盟)账号的泄露等。一旦发生隐私数据泄漏,将会存在很大的安全隐患。Solution 1. Although the backup protection scheme can prevent data loss and destruction through data backup, there is still the danger of leakage of private data. There are many cases of cloud data leakage, such as the leakage of Xiaomi account, CSDN (Chinese Software Develop Net, China) Software Development Alliance) account leaks, etc. In the event of a private data breach, there will be a significant security risk.
方案二、数据伪装保护,这种方案是为了防止非安全操作系统访问、窃取安装系统隐私数据。但还是不能彻底的保护隐私数据的丢失,例如手机丢失、被窃,别人如果能进入安全操作系统,那么安全操作系统中的隐私数据仍然存在泄露的风险。 Solution 2: Data masquerading protection, this solution is to prevent non-secure operating system access and steal the installation system privacy data. However, the loss of private data cannot be completely protected. For example, if the mobile phone is lost or stolen, if the other person can enter the secure operating system, the privacy data in the secure operating system still has the risk of leaking.
方案三、硬件屏蔽保护,这种方案可以有效的保护隐私数据被窃取,但在安全操作系统出现故障,无法进入安全操作系统,可会出现安全操作系统隐私数据无法获取的窘况,如果急需安全操作系统中的重要隐私数据,将会非常麻烦。Solution 3: Hardware shielding protection, this scheme can effectively protect the privacy data from being stolen, but in the case of a fault in the security operating system, it is impossible to enter the security operating system, and there may be a situation in which the security operating system privacy data cannot be obtained, if the security operation is urgently needed Important privacy data in the system will be very troublesome.
因此,如何进一步提升安全操作系统的隐私数据的安全,成为亟待解决的技术问题。Therefore, how to further improve the security of the privacy data of the security operating system has become a technical problem to be solved urgently.
发明内容Summary of the invention
本发明正是基于上述问题,提出了一种新的技术方案,可以更加适应用户的实际需求,有效地保护了安全系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。The invention is based on the above problems, and proposes a new technical solution, which can be more adapted to the actual needs of users, effectively protects the security data of the security system from being stolen, and prevents the loss of private data, thereby further improving the user. Privacy security.
有鉴于此,本发明的一方面提出了一种安全数据的访问控制方法,用于终端,所述终端上安装有多个操作系统,所述访问控制方法包括:根据接收到的数据访问请求,判断所述终端的目标操作系统中的安全数据存储区的当前访问模式;根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。In view of this, an aspect of the present invention provides a method for controlling access to secure data, which is used in a terminal, and a plurality of operating systems are installed on the terminal, and the access control method includes: according to the received data access request, Determining a current access mode of the secure data storage area in the target operating system of the terminal; determining, according to the determination result, whether to allow access to the security data stored in the secure data storage area, wherein the security level of the target operating system A security level higher than other operating systems of the plurality of operating systems except the target operating system.
在该技术方案中,可以为目标操作系统(即安全操作系统)的安全数据存储区设置访问模式,其中,不同的访问模式可以对应不同的访问权限,例如,可以为安全操作系统的安全数据存储区设定访问安全标识锁,然后通过安全标识锁在不同场景控制对安全数据存储区的访问保护,其中,安全标识锁的不同锁状态对应于安全数据存储区的不同访问模式。通过这种方法可以彻底防止因数据备份而导致的数据泄露,同时,如果手机被窃,同样可以通过远程发送指令触发访问模式的转变,防止别人进入安全操作系统获取隐私数据,另外,若安全操作系统出现故障,也可以根据事先设定的触发机制,触发访问模式的转变。因此,当安全数据存储区接收到数据访问请求时,终端就可以根据当前的访问模式确定是否运行其被访问,从而可以更加适应用户的实际需求,有效地保护了终端的安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐 私安全。In this technical solution, an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system. The zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area. This method can completely prevent data leakage caused by data backup. At the same time, if the mobile phone is stolen, the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data. In addition, if the security operation is performed, If the system fails, the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the user's hidden Private security.
在上述技术方案中,优选地,当判定所述安全数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统,并在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。In the above technical solution, preferably, when it is determined that the current access mode of the secure data storage area is a secure access mode, determining whether the data access request is from the target operating system, and determining that the current access mode is The secure access mode allows access to the secure data, otherwise access to the secure data is prohibited.
在该技术方案中,可以为安全数据存储区设置安全访问模式,在安全访问模式下,只有目标操作系统可以正常访问安全数据存储区的数据,禁止终端中的其他系统访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In the technical solution, a secure access mode can be set for the secure data storage area. In the secure access mode, only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。In the above technical solution, preferably, when it is determined that the current access mode of the secure data storage area is a shared access mode, accessing the security data is allowed; or when determining that the current access mode of the secure data storage area is a masked access In the mode, access to the security data is prohibited.
在该技术方案中,还可以为安全数据存储区设置共享访问模式和屏蔽访问模式,在共享访问模式下,每个系统都可以正常访问安全数据存储区的数据,在屏蔽访问模式下,禁止所有系统正常访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In this technical solution, a shared access mode and a masked access mode can also be set for the secure data storage area. In the shared access mode, each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited. The system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所述安全数据存储区的访问模式;以及在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。In the above technical solution, preferably, when access to the security data is prohibited, determining whether to reset an access mode of the secure data storage area in the target operating system; and determining to reset the security data In the access mode of the storage area, the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
在该技术方案中,当访问安全数据的请求被禁止时,可以提示用户是否重置访问模式,并可以根据用户的设置重置访问模式,从而使访问模式的设置和转变更具灵活性,提升了用户体验。In the technical solution, when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved. The user experience.
在上述技术方案中,优选地,根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,还包括:预设所述安全数据存储区的所述当前访问模式。In the above technical solution, preferably, before determining the current access mode of the secure data storage area according to the received data access request, the method further includes: presetting the current access of the secure data storage area mode.
在该技术方案中,可以根据实际需求或用户指令预设访问模式,其中,访问模式的设置不能简单地通过手机中的设置进行转变,而是需要通过专 有指令来转变的。具体地,变更访问模式的指令可以是如下形式:In the technical solution, the access mode may be preset according to actual needs or user instructions, wherein the setting of the access mode cannot be simply changed through the settings in the mobile phone, but needs to pass the special There are instructions to change. Specifically, the instruction to change the access mode may be in the following form:
command:=op state stateCommand:=op state state
op:=change|otherOp:=change|other
state:=safe|share|unsafeState:=safe|share|unsafe
其中,op state state中,op是变更操作,前一个state代表原访问模式,后一个state代表新访问模式,op和state分别可以由2、3bit(字节)二进制表示,比如000表示unsafe,unsafe代表屏蔽访问模式。目前的op和state还不多,后边如有扩展,可以增加二进制bit位数进行实现。Among them, in op state state, op is a change operation, the previous state represents the original access mode, the latter state represents the new access mode, op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode. At present, there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
本发明的另一方面提出了一种安全数据的访问控制系统,用于终端,所述终端上安装有多个操作系统,所述访问控制系统包括:判断模块,用于根据接收到的数据访问请求,判断所述终端的目标操作系统中的安全数据存储区的当前访问模式;控制模块,用于根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。Another aspect of the present invention provides a security data access control system for a terminal, the terminal having a plurality of operating systems installed thereon, the access control system comprising: a determining module, configured to access according to the received data a request, determining a current access mode of the secure data storage area in the target operating system of the terminal; and a control module, configured to determine, according to the determination result, whether to allow access to the security data stored in the secure data storage area, where The security level of the target operating system is higher than the security level of the other operating systems except the target operating system.
在该技术方案中,可以为目标操作系统(即安全操作系统)的安全数据存储区设置访问模式,其中,不同的访问模式可以对应不同的访问权限,例如,可以为安全操作系统的安全数据存储区设定访问安全标识锁,然后通过安全标识锁在不同场景控制对安全数据存储区的访问保护,其中,安全标识锁的不同锁状态对应于安全数据存储区的不同访问模式。通过这种方法可以彻底防止因数据备份而导致的数据泄露,同时,如果手机被窃,同样可以通过远程发送指令触发访问模式的转变,防止别人进入安全操作系统获取隐私数据,另外,若安全操作系统出现故障,也可以根据事先设定的触发机制,触发访问模式的转变。因此,当安全数据存储区接收到数据访问请求时,终端就可以根据当前的访问模式确定是否运行其被访问,从而可以更加适应用户的实际需求,有效地保护了终端的安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。In this technical solution, an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system. The zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area. This method can completely prevent data leakage caused by data backup. At the same time, if the mobile phone is stolen, the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data. In addition, if the security operation is performed, If the system fails, the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the privacy of users.
在上述技术方案中,优选地,所述判断模块还用于:当判定所述安全 数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统;以及所述控制模块具体用于:在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。In the above technical solution, preferably, the determining module is further configured to: when determining the security When the current access mode of the data storage area is the secure access mode, determining whether the data access request is from the target operating system; and the control module is specifically configured to: when determining that the current access mode is the secure access mode Allowing access to the security data, otherwise accessing the security data is prohibited.
在该技术方案中,可以为安全数据存储区设置安全访问模式,在安全访问模式下,只有目标操作系统可以正常访问安全数据存储区的数据,禁止终端中的其他系统访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In the technical solution, a secure access mode can be set for the secure data storage area. In the secure access mode, only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,所述控制模块具体还用于:当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。In the above technical solution, preferably, the control module is further configured to: when determining that the current access mode of the secure data storage area is a shared access mode, allowing access to the security data; or when determining the security data When the current access mode of the storage area is the masked access mode, access to the security data is prohibited.
在该技术方案中,还可以为安全数据存储区设置共享访问模式和屏蔽访问模式,在共享访问模式下,每个系统都可以正常访问安全数据存储区的数据,在屏蔽访问模式下,禁止所有系统正常访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In this technical solution, a shared access mode and a masked access mode can also be set for the secure data storage area. In the shared access mode, each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited. The system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,所述判断模块还用于:当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所述安全数据存储区的访问模式;以及还包括:重置模块,用于在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。In the above technical solution, preferably, the determining module is further configured to: determine, when the access to the security data is prohibited, whether to reset an access mode of the secure data storage area in the target operating system; The method includes: a reset module, configured to reset an access of the secure data storage area in the target operating system according to the received reset command when determining to reset an access mode of the secure data storage area mode.
在该技术方案中,当访问安全数据的请求被禁止时,可以提示用户是否重置访问模式,并可以根据用户的设置重置访问模式,从而使访问模式的设置和转变更具灵活性,提升了用户体验。In the technical solution, when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved. The user experience.
在上述技术方案中,优选地,还包括:设置模块,用于根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,预设所述安全数据存储区的所述当前访问模式。In the above technical solution, preferably, the method further includes: a setting module, configured to preset the secure data storage area before determining the current access mode of the secure data storage area according to the received data access request The current access mode.
在该技术方案中,可以根据实际需求或用户指令预设访问模式,其中, 访问模式的设置不能简单地通过手机中的设置进行转变,而是需要通过专有指令来转变的。具体地,变更访问模式的指令可以是如下形式:In this technical solution, the access mode may be preset according to actual needs or user instructions, where The settings of the access mode cannot be changed simply by the settings in the phone, but need to be converted by proprietary instructions. Specifically, the instruction to change the access mode may be in the following form:
command:=op state stateCommand:=op state state
op:=change|otherOp:=change|other
state:=safe|share|unsafeState:=safe|share|unsafe
其中,op state state中,op是变更操作,前一个state代表原访问模式,后一个state代表新访问模式,op和state分别可以由2、3bit(字节)二进制表示,比如000表示unsafe,unsafe代表屏蔽访问模式。目前的op和state还不多,后边如有扩展,可以增加二进制bit位数进行实现。Among them, in op state state, op is a change operation, the previous state represents the original access mode, the latter state represents the new access mode, op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode. At present, there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
本发明的再一方面提出了一种终端,所述终端上安装有多个操作系统,所述终端包括处理器和存储器,其中,所述存储器中存储一组程序代码,且所述处理器用于调用所述存储器中存储的程序代码,用于执行以下操作:A further aspect of the present invention provides a terminal having a plurality of operating systems installed thereon, the terminal including a processor and a memory, wherein the memory stores a set of program codes, and the processor is used by the processor Calling the program code stored in the memory to perform the following operations:
根据接收到的数据访问请求,判断所述终端的目标操作系统中的安全数据存储区的当前访问模式;Determining, according to the received data access request, a current access mode of the secure data storage area in the target operating system of the terminal;
根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。Determining, according to the judgment result, whether to access the security data stored in the secure data storage area, wherein the security level of the target operating system is higher than other operations of the plurality of operating systems except the target operating system The security level of the system.
在该技术方案中,可选地,所述处理器执行:In the technical solution, optionally, the processor executes:
当判定所述安全数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统,并在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is a secure access mode, determining whether the data access request is from the target operating system, and allowing access when determining that the current access mode is the secure access mode The security data is otherwise disabled from accessing the security data.
在该技术方案中,可选地,所述处理器执行:In the technical solution, optionally, the processor executes:
当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者Allowing access to the secure data when it is determined that the current access mode of the secure data storage area is a shared access mode; or
当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is the masked access mode, access to the secure data is prohibited.
在该技术方案中,可选地,所述处理器执行:In the technical solution, optionally, the processor executes:
当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所述安全数据存储区的访问模式;以及 Determining whether to reset an access mode of the secure data storage area in the target operating system when accessing the security data is prohibited;
在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。When it is determined that the access mode of the secure data storage area is reset, the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
在该技术方案中,可选地,所述处理器根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,还执行:In the technical solution, optionally, the processor further performs: before determining the current access mode of the secure data storage area according to the received data access request:
预设所述安全数据存储区的所述当前访问模式。Presetting the current access mode of the secure data storage area.
通过以上技术方案,可以更加适应用户的实际需求,有效地保护了安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。Through the above technical solutions, the user's actual needs can be more adapted, the security data of the security operating system is effectively protected from being stolen, and the loss of private data is prevented, thereby further improving the privacy of the user.
附图说明DRAWINGS
图1示出了根据本发明的一个实施例的安全数据的访问控制方法的流程示意图;1 is a flow chart showing an access control method of secure data according to an embodiment of the present invention;
图2示出了根据本发明的一个实施例的安全数据的访问控制系统的结构示意图;2 is a block diagram showing the structure of an access control system for secure data according to an embodiment of the present invention;
图3示出了根据本发明的一个实施例的终端的结构示意图;FIG. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention; FIG.
图4示出了根据本发明的一个实施例的安全数据存储区的访问模式转换示意图;4 is a diagram showing an access mode transition of a secure data storage area in accordance with one embodiment of the present invention;
图5示出了根据本发明的另一个实施例的安全数据的访问控制方法的流程示意图;FIG. 5 is a flow chart showing an access control method of secure data according to another embodiment of the present invention; FIG.
图6示出了根据本发明的另一个实施例的终端的结构示意图。FIG. 6 shows a schematic structural diagram of a terminal according to another embodiment of the present invention.
具体实施方式detailed description
为了可以更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。The above described objects, features and advantages of the present invention will become more apparent from the detailed description of the appended claims. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict.
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是,本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。In the following description, numerous specific details are set forth in order to provide a full understanding of the invention, but the invention may be practiced otherwise than as described herein. Limitations of the embodiments.
图1示出了根据本发明的一个实施例的安全数据的访问控制方法的流程 示意图。FIG. 1 shows a flow of an access control method for secure data according to an embodiment of the present invention. schematic diagram.
如图1所示,根据本发明的一个实施例的安全数据的访问控制方法,用于终端,终端上安装有多个操作系统,包括:As shown in FIG. 1 , an access control method for secure data according to an embodiment of the present invention is used for a terminal, where multiple operating systems are installed on the terminal, including:
步骤102,根据接收到的数据访问请求,判断终端的目标操作系统中的安全数据存储区的当前访问模式。Step 102: Determine, according to the received data access request, a current access mode of the secure data storage area in the target operating system of the terminal.
步骤104,根据判断结果,确定是否允许访问存储在安全数据存储区中的安全数据,其中,目标操作系统的安全等级高于多个操作系统中除目标操作系统外的其他操作系统的安全等级。Step 104: Determine, according to the determination result, whether to access the security data stored in the secure data storage area, wherein the security level of the target operating system is higher than the security level of other operating systems except the target operating system among the plurality of operating systems.
在该技术方案中,可以为目标操作系统(即安全操作系统)的安全数据存储区设置访问模式,其中,不同的访问模式可以对应不同的访问权限,例如,可以为安全操作系统的安全数据存储区设定访问安全标识锁,然后通过安全标识锁在不同场景控制对安全数据存储区的访问保护,其中,安全标识锁的不同锁状态对应于安全数据存储区的不同访问模式。通过这种方法可以彻底防止因数据备份而导致的数据泄露,同时,如果手机被窃,同样可以通过远程发送指令触发访问模式的转变,防止别人进入安全操作系统获取隐私数据,另外,若安全操作系统出现故障,也可以根据事先设定的触发机制,触发访问模式的转变。因此,当安全数据存储区接收到数据访问请求时,终端就可以根据当前的访问模式确定是否运行其被访问,从而可以更加适应用户的实际需求,有效地保护了终端的安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。In this technical solution, an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system. The zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area. This method can completely prevent data leakage caused by data backup. At the same time, if the mobile phone is stolen, the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data. In addition, if the security operation is performed, If the system fails, the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the privacy of users.
在上述技术方案中,优选地,当判定安全数据存储区的当前访问模式为安全访问模式时,判断数据访问请求是否来自目标操作系统,并在判定当前访问模式为安全访问模式时,允许访问安全数据,否则禁止访问安全数据。In the above technical solution, preferably, when it is determined that the current access mode of the secure data storage area is the secure access mode, determining whether the data access request is from the target operating system, and allowing access security when determining that the current access mode is the secure access mode Data, otherwise access to secure data is prohibited.
在该技术方案中,可以为安全数据存储区设置安全访问模式,在安全访问模式下,只有目标操作系统可以正常访问安全数据存储区的数据,禁止终端中的其他系统访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In the technical solution, a secure access mode can be set for the secure data storage area. In the secure access mode, only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,当判定安全数据存储区的当前访问模式为共享访问模式时,允许访问安全数据;或者当判定安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问安全数据。 In the above technical solution, preferably, when it is determined that the current access mode of the secure data storage area is the shared access mode, access to the secure data is permitted; or when it is determined that the current access mode of the secure data storage area is the blocked access mode, the access security is prohibited. data.
在该技术方案中,还可以为安全数据存储区设置共享访问模式和屏蔽访问模式,在共享访问模式下,每个系统都可以正常访问安全数据存储区的数据,在屏蔽访问模式下,禁止所有系统正常访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In this technical solution, a shared access mode and a masked access mode can also be set for the secure data storage area. In the shared access mode, each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited. The system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,当禁止访问安全数据时,判断是否重新设定目标操作系统中的安全数据存储区的访问模式;以及在判定重新设定安全数据存储区的访问模式时,根据接收到的重置指令,重新设定目标操作系统中的安全数据存储区的访问模式。In the above technical solution, preferably, when access to the security data is prohibited, determining whether to reset the access mode of the secure data storage area in the target operating system; and when determining to reset the access mode of the secure data storage area, according to The received reset command resets the access mode of the secure data storage area in the target operating system.
在该技术方案中,当访问安全数据的请求被禁止时,可以提示用户是否重置访问模式,并可以根据用户的设置重置访问模式,从而使访问模式的设置和转变更具灵活性,提升了用户体验。In the technical solution, when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved. The user experience.
在上述技术方案中,优选地,在步骤102之前,还包括:预设安全数据存储区的当前访问模式。In the above technical solution, preferably, before step 102, the method further includes: preset a current access mode of the secure data storage area.
在该技术方案中,可以根据实际需求或用户指令预设访问模式,其中,访问模式的设置不能简单地通过手机中的设置进行转变,而是需要通过专有指令来转变的。具体地,变更访问模式的指令可以是如下形式:In this technical solution, the access mode can be preset according to actual needs or user instructions, wherein the setting of the access mode cannot be simply changed by the setting in the mobile phone, but needs to be converted by a proprietary instruction. Specifically, the instruction to change the access mode may be in the following form:
command:=op state stateCommand:=op state state
op:=change|otherOp:=change|other
state:=safe|share|unsafeState:=safe|share|unsafe
其中,op state state中,op是变更操作,前一个state代表原访问模式,后一个state代表新访问模式,op和state分别可以由2、3bit(字节)二进制表示,比如000表示unsafe,unsafe代表屏蔽访问模式。目前的op和state还不多,后边如有扩展,可以增加二进制bit位数进行实现。Among them, in op state state, op is a change operation, the previous state represents the original access mode, the latter state represents the new access mode, op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode. At present, there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
图2示出了根据本发明的一个实施例的安全数据的访问控制系统的结构示意图。2 is a block diagram showing the structure of an access control system for secure data according to an embodiment of the present invention.
如图2所示,根据本发明的一个实施例的安全数据的访问控制系统200,用于终端,终端上安装有多个操作系统,包括:判断模块202,用于根据接收到的数据访问请求,判断终端的目标操作系统中的安全数据存储区的当前访问模式;控制模块204,用于根据判断结果,确定是否允许访问存储在安全数据 存储区中的安全数据,其中,目标操作系统的安全等级高于多个操作系统中除目标操作系统外的其他操作系统的安全等级。As shown in FIG. 2, the access control system 200 for secure data according to an embodiment of the present invention is used for a terminal, and a plurality of operating systems are installed on the terminal, and the method includes: a determining module 202, configured to access the data according to the received data. Determining a current access mode of the secure data storage area in the target operating system of the terminal; the control module 204, configured to determine, according to the determination result, whether to allow access to the stored secure data The security data in the storage area, wherein the security level of the target operating system is higher than the security level of other operating systems except the target operating system among the multiple operating systems.
在该技术方案中,可以为目标操作系统(即安全操作系统)的安全数据存储区设置访问模式,其中,不同的访问模式可以对应不同的访问权限,例如,可以为安全操作系统的安全数据存储区设定访问安全标识锁,然后通过安全标识锁在不同场景控制对安全数据存储区的访问保护,其中,安全标识锁的不同锁状态对应于安全数据存储区的不同访问模式。通过这种方法可以彻底防止因数据备份而导致的数据泄露,同时,如果手机被窃,同样可以通过远程发送指令触发访问模式的转变,防止别人进入安全操作系统获取隐私数据,另外,若安全操作系统出现故障,也可以根据事先设定的触发机制,触发访问模式的转变。因此,当安全数据存储区接收到数据访问请求时,终端就可以根据当前的访问模式确定是否运行其被访问,从而可以更加适应用户的实际需求,有效地保护了终端的安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。In this technical solution, an access mode may be set for a secure data storage area of a target operating system (ie, a secure operating system), wherein different access modes may correspond to different access rights, for example, may be secure data storage for a secure operating system. The zone is set to access the security identifier lock, and then the access protection of the secure data storage area is controlled in different scenarios by the security identifier lock, wherein different lock states of the security identifier lock correspond to different access modes of the secure data storage area. This method can completely prevent data leakage caused by data backup. At the same time, if the mobile phone is stolen, the remote access command can also trigger the change of access mode to prevent others from entering the secure operating system to obtain private data. In addition, if the security operation is performed, If the system fails, the access mode can be triggered according to a preset trigger mechanism. Therefore, when the secure data storage area receives the data access request, the terminal can determine whether to run the access according to the current access mode, thereby being more suitable for the actual needs of the user, and effectively protecting the security data of the secure operating system of the terminal. Not being stolen, preventing the loss of private data, thereby further enhancing the privacy of users.
在上述技术方案中,优选地,判断模块202还用于:当判定安全数据存储区的当前访问模式为安全访问模式时,判断数据访问请求是否来自目标操作系统;以及控制模块204具体用于:在判定当前访问模式为安全访问模式时,允许访问安全数据,否则禁止访问安全数据。In the above technical solution, the determining module 202 is further configured to: determine that the data access request is from the target operating system when determining that the current access mode of the secure data storage area is the secure access mode; and the control module 204 is specifically configured to: When it is determined that the current access mode is the secure access mode, access to secure data is allowed, otherwise access to secure data is prohibited.
在该技术方案中,可以为安全数据存储区设置安全访问模式,在安全访问模式下,只有目标操作系统可以正常访问安全数据存储区的数据,禁止终端中的其他系统访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。In the technical solution, a secure access mode can be set for the secure data storage area. In the secure access mode, only the target operating system can normally access the data of the secure data storage area, and other systems in the terminal are prohibited from accessing the data of the secure data storage area. Therefore, the security data of the secure operating system of the terminal is effectively protected from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,控制模块204具体还用于:当判定安全数据存储区的当前访问模式为共享访问模式时,允许访问安全数据;或者当判定安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问安全数据。In the above technical solution, preferably, the control module 204 is further configured to: when determining that the current access mode of the secure data storage area is the shared access mode, permit access to the secure data; or when determining that the current access mode of the secure data storage area is Access to secure data is prohibited when the access mode is blocked.
在该技术方案中,还可以为安全数据存储区设置共享访问模式和屏蔽访问模式,在共享访问模式下,每个系统都可以正常访问安全数据存储区的数据,在屏蔽访问模式下,禁止所有系统正常访问安全数据存储区的数据,从而有效地保护了终端的安全操作系统的安全数据不被窃取,进一步提升了用户的隐私安全。 In this technical solution, a shared access mode and a masked access mode can also be set for the secure data storage area. In the shared access mode, each system can normally access the data of the secure data storage area, and in the shielded access mode, all are prohibited. The system normally accesses the data of the secure data storage area, thereby effectively protecting the security data of the secure operating system of the terminal from being stolen, thereby further improving the privacy of the user.
在上述技术方案中,优选地,判断模块202还用于:当禁止访问安全数据时,判断是否重新设定目标操作系统中的安全数据存储区的访问模式;以及还包括:重置模块206,用于在判定重新设定安全数据存储区的访问模式时,根据接收到的重置指令,重新设定目标操作系统中的安全数据存储区的访问模式。In the foregoing technical solution, the determining module 202 is further configured to: determine, when the access to the security data is prohibited, whether to reset the access mode of the secure data storage area in the target operating system; and further include: a reset module 206, And when determining to reset the access mode of the secure data storage area, resetting the access mode of the secure data storage area in the target operating system according to the received reset instruction.
在该技术方案中,当访问安全数据的请求被禁止时,可以提示用户是否重置访问模式,并可以根据用户的设置重置访问模式,从而使访问模式的设置和转变更具灵活性,提升了用户体验。In the technical solution, when the request for accessing the security data is prohibited, the user may be prompted to reset the access mode, and the access mode may be reset according to the user's setting, thereby making the setting and transition of the access mode more flexible and improved. The user experience.
在上述技术方案中,优选地,还包括:设置模块208,用于根据接收到的数据访问请求,判断安全数据存储区的当前访问模式之前,预设安全数据存储区的当前访问模式。In the above technical solution, preferably, the setting module 208 is configured to preset a current access mode of the secure data storage area before determining the current access mode of the secure data storage area according to the received data access request.
在该技术方案中,可以根据实际需求或用户指令预设访问模式,其中,访问模式的设置不能简单地通过手机中的设置进行转变,而是需要通过专有指令来转变的。具体地,变更访问模式的指令可以是如下形式:In this technical solution, the access mode can be preset according to actual needs or user instructions, wherein the setting of the access mode cannot be simply changed by the setting in the mobile phone, but needs to be converted by a proprietary instruction. Specifically, the instruction to change the access mode may be in the following form:
command:=op state stateCommand:=op state state
op:=change|otherOp:=change|other
state:=safe|share|unsafeState:=safe|share|unsafe
其中,op state state中,op是变更操作,前一个state代表原访问模式,后一个state代表新访问模式,op和state分别可以由2、3bit(字节)二进制表示,比如000表示unsafe,unsafe代表屏蔽访问模式。目前的op和state还不多,后边如有扩展,可以增加二进制bit位数进行实现。Among them, in op state state, op is a change operation, the previous state represents the original access mode, the latter state represents the new access mode, op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode. At present, there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
图3示出了根据本发明的一个实施例的终端的结构示意图。FIG. 3 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
如图3所示,根据本发明的一个实施例的终端300,包括安全数据的访问控制系统200,因此,终端300具有和上述技术方案中任一项所述的安全数据的访问控制系统200相同的技术效果,在此不再赘述。As shown in FIG. 3, a terminal 300 according to an embodiment of the present invention includes an access control system 200 for security data. Therefore, the terminal 300 has the same access control system 200 as the security data according to any one of the above technical solutions. The technical effects will not be described here.
图4示出了根据本发明的一个实施例的安全数据存储区的访问模式转换示意图。4 is a diagram showing an access mode transition of a secure data storage area in accordance with one embodiment of the present invention.
如图4所示,可以为安全系统(目标操作系统)的安全数据存储区设定访问安全标识锁,然后通过安全标识锁在不同场景控制对安全数据存储区的访问保护,其中,安全标识锁的不同锁状态对应于安全数据存储区的不同访问模式。 安全标识锁可以有Safe、Unsafe、Share三种锁状态。其中,处于Safe锁状态时,只有安全系统可以正常访问数据存储区的数据,处于Unsafe锁状态时,无论是安全系统还是非安全系统都不可以访问数据存储区的数据,而处于Share锁状态时,安全系统和非安全系统都可以访问数据存储区的数据。As shown in FIG. 4, an access security identifier lock can be set for the secure data storage area of the security system (target operating system), and then access protection for the secure data storage area is controlled in different scenarios by the security identifier lock, wherein the security identifier lock The different lock states correspond to different access modes of the secure data store. The security identification lock can have three lock states: Safe, Unsafe, and Share. Among them, when in the Safe lock state, only the security system can normally access the data in the data storage area. When the Unsafe lock state is in use, neither the security system nor the non-secure system can access the data in the data storage area, but in the Share lock state. Both the security system and the non-secure system can access the data in the data store.
通过设置不同的触发事件,还可以控制安全锁状态间的互相转变。通过这种方法可以彻底防止因数据备份而导致的数据泄露,同时,如果手机被窃,同样可以通过远程发送指令触发安全锁状态向Unsafe转变,防止别人进入安全系统获取隐私数据,另外,若安全系统出现故障,根据事先设定的触发机制,触发安全锁状态向Share转变。并且,用户不能简单地通过手机中的设置转变安全锁状态,而是需要通过专有指令来转变安全锁状态,具体地,变更访问模式的指令可以是如下形式:By setting different trigger events, you can also control the transition between security lock states. In this way, data leakage caused by data backup can be completely prevented. At the same time, if the mobile phone is stolen, the remote security command can also be triggered to trigger the change of the security lock state to Unsafe, preventing others from entering the security system to obtain private data. The system fails, and the security lock status is triggered to change to Share according to the preset trigger mechanism. Moreover, the user cannot simply change the security lock state through the settings in the mobile phone, but needs to change the security lock state through a proprietary instruction. Specifically, the instruction to change the access mode may be in the following form:
command:=op state stateCommand:=op state state
op:=change|otherOp:=change|other
state:=safe|share|unsafeState:=safe|share|unsafe
其中,op state state中,op是变更操作,前一个state代表原访问模式,后一个state代表新访问模式,op和state分别可以由2、3bit(字节)二进制表示,比如000表示unsafe,unsafe代表屏蔽访问模式。目前的op和state还不多,后边如有扩展,可以增加二进制bit位数进行实现。Among them, in op state state, op is a change operation, the previous state represents the original access mode, the latter state represents the new access mode, op and state can be represented by 2, 3 bit (byte) binary respectively, such as 000 means unsafe, unsafe Represents the masked access mode. At present, there are not many ops and states. If there is an extension later, you can increase the number of binary bits to achieve.
通过该技术方案,可以更加适应用户的实际需求,有效地保护了安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。Through this technical solution, the user's actual needs can be more adapted, the security data of the security operating system is effectively protected from being stolen, and the loss of private data is prevented, thereby further improving the privacy of the user.
图5示出了根据本发明的另一个实施例的安全数据的访问控制方法的流程示意图。FIG. 5 is a flow chart showing an access control method of secure data according to another embodiment of the present invention.
如图5所示,根据本发明的另一个实施例的安全数据的访问控制方法,包括:As shown in FIG. 5, an access control method for security data according to another embodiment of the present invention includes:
步骤502,设置安全系统(目标操作系统)数据存储区的访问锁状态(即预设安全数据存储区的当前访问模式);Step 502: Set an access lock state of the data storage area of the security system (target operating system) (that is, a current access mode of the preset secure data storage area);
步骤504,根据接收到的对安全系统数据的访问请求,判断安全系统数据存储区的当前访问锁状态(当前访问模式),若为Safe状态(安全访问模式),则执行步骤506,若为Share状态(共享访问模式),则执行步骤508,若为 Unsafe状态(屏蔽访问模式),则执行步骤510;Step 504: Determine the current access lock status (current access mode) of the security system data storage area according to the received access request for the security system data. If it is the Safe status (secure access mode), go to step 506, if it is Share Status (shared access mode), then step 508 is performed, if Unsafe state (mask access mode), then step 510;
步骤506,判断当前所处系统是否为安全系统(即判断发出访问请求的系统是否为安全系统),若是安全系统,则执行步骤508,否则执行步骤510; Step 506, it is determined whether the current system is a security system (ie, it is determined whether the system that issued the access request is a security system), if it is a security system, step 508 is performed, otherwise step 510 is performed;
步骤508,正常访问安全系统数据; Step 508, normal access to the security system data;
步骤510,当无法访问安全系统数据时,判断是否重新设置安全系统数据存储区的访问锁状态,若是,则执行步骤512,否则,结束进程;Step 510: When the security system data cannot be accessed, determine whether to reset the access lock state of the security system data storage area, and if yes, execute step 512; otherwise, end the process;
步骤512,发送指令设置安全系统数据存储区的访问锁状态,在设置完成后,返回步骤504,继续根据判断安全系统数据存储区的当前访问锁状态。Step 512: Send an instruction to set an access lock state of the security system data storage area. After the setting is completed, return to step 504 to continue to determine the current access lock status of the security system data storage area.
图6示出了根据本发明的另一个实施例的终端的结构示意图,如图6所示,该终端6可以包括:至少一个处理器61,例如CPU,至少一个通信总线62以及存储器63;通信总线62用于实现这些组件之间的连接通信;存储器63可以是高速RAM存储器,也可以是非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。存储器63中存储一组程序代码,且处理器61用于调用存储器63中存储的程序代码,用于执行以下操作:6 is a block diagram showing the structure of a terminal according to another embodiment of the present invention. As shown in FIG. 6, the terminal 6 may include: at least one processor 61, such as a CPU, at least one communication bus 62, and a memory 63; The bus 62 is used to implement connection communication between these components; the memory 63 may be a high speed RAM memory or a non-volatile memory such as at least one disk memory. A set of program codes is stored in the memory 63, and the processor 61 is configured to call the program code stored in the memory 63 for performing the following operations:
根据接收到的数据访问请求,判断所述终端的目标操作系统中的安全数据存储区的当前访问模式;Determining, according to the received data access request, a current access mode of the secure data storage area in the target operating system of the terminal;
根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。Determining, according to the judgment result, whether to access the security data stored in the secure data storage area, wherein the security level of the target operating system is higher than other operations of the plurality of operating systems except the target operating system The security level of the system.
可选地,所述处理器61执行:Optionally, the processor 61 performs:
当判定所述安全数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统,并在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is a secure access mode, determining whether the data access request is from the target operating system, and allowing access when determining that the current access mode is the secure access mode The security data is otherwise disabled from accessing the security data.
可选地,所述处理器61执行:Optionally, the processor 61 performs:
当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者Allowing access to the secure data when it is determined that the current access mode of the secure data storage area is a shared access mode; or
当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is the masked access mode, access to the secure data is prohibited.
可选地,所述处理器61执行:Optionally, the processor 61 performs:
当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所 述安全数据存储区的访问模式;以及When access to the security data is prohibited, determining whether to reset the location in the target operating system The access mode of the secure data storage area;
在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。When it is determined that the access mode of the secure data storage area is reset, the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
可选地,所述处理器61根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,还执行:Optionally, the processor 61 further performs: before determining the current access mode of the secure data storage area according to the received data access request:
预设所述安全数据存储区的所述当前访问模式。Presetting the current access mode of the secure data storage area.
通过该技术方案,可以更加适应用户的实际需求,有效地保护了安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。Through this technical solution, the user's actual needs can be more adapted, the security data of the security operating system is effectively protected from being stolen, and the loss of private data is prevented, thereby further improving the privacy of the user.
以上结合附图详细说明了本发明的技术方案,通过以上技术方案,可以更加适应用户的实际需求,有效地保护了安全操作系统的安全数据不被窃取,防止了隐私数据的丢失,从而进一步提升了用户的隐私安全。The technical solutions of the present invention are described in detail above with reference to the accompanying drawings. The above technical solutions can be more adapted to the actual needs of users, effectively protect the security data of the security operating system from being stolen, and prevent the loss of private data, thereby further improving. The privacy of the user is safe.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (15)

  1. 一种安全数据的访问控制方法,用于终端,其特征在于,所述终端上安装有多个操作系统,目标操作系统所述访问控制方法包括:An access control method for a secure data is used in a terminal, wherein a plurality of operating systems are installed on the terminal, and the access control method of the target operating system includes:
    根据接收到的数据访问请求,判断所述终端的目标操作系统中的安全数据存储区的当前访问模式;Determining, according to the received data access request, a current access mode of the secure data storage area in the target operating system of the terminal;
    根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。Determining, according to the judgment result, whether to access the security data stored in the secure data storage area, wherein the security level of the target operating system is higher than other operations of the plurality of operating systems except the target operating system The security level of the system.
  2. 根据权利要求1所述的安全数据的访问控制方法,其特征在于,The access control method for secure data according to claim 1, wherein
    当判定所述安全数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统,并在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is a secure access mode, determining whether the data access request is from the target operating system, and allowing access when determining that the current access mode is the secure access mode The security data is otherwise disabled from accessing the security data.
  3. 根据权利要求1所述的安全数据的访问控制方法,其特征在于,The access control method for secure data according to claim 1, wherein
    当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者Allowing access to the secure data when it is determined that the current access mode of the secure data storage area is a shared access mode; or
    当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is the masked access mode, access to the secure data is prohibited.
  4. 根据权利要求2或3所述的安全数据的访问控制方法,其特征在于,当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所述安全数据存储区的访问模式;以及The access control method for secure data according to claim 2 or 3, wherein when access to the secure data is prohibited, determining whether to reset an access mode of the secure data storage area in the target operating system ;as well as
    在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。When it is determined that the access mode of the secure data storage area is reset, the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
  5. 根据权利要求1至3中任一项所述的安全数据的访问控制方法,其特征在于,根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,还包括:The access control method for secure data according to any one of claims 1 to 3, characterized in that, before determining the current access mode of the secure data storage area, based on the received data access request, include:
    预设所述安全数据存储区的所述当前访问模式。Presetting the current access mode of the secure data storage area.
  6. 一种安全数据的访问控制系统,用于终端,其特征在于,所述终端上安装有多个操作系统,所述访问控制系统包括:An access control system for security data is provided for a terminal, wherein a plurality of operating systems are installed on the terminal, and the access control system includes:
    判断模块,用于根据接收到的数据访问请求,判断所述终端的目标操作系 统中的安全数据存储区的当前访问模式;a determining module, configured to determine a target operating system of the terminal according to the received data access request The current access mode of the secure data storage area in the system;
    控制模块,用于根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。a control module, configured to determine, according to the determination result, whether to allow access to the security data stored in the secure data storage area, wherein a security level of the target operating system is higher than the target operation in the multiple operating systems The security level of other operating systems outside the system.
  7. 根据权利要求6所述的安全数据的访问控制系统,其特征在于,所述判断模块还用于:当判定所述安全数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统;以及The security data access control system according to claim 6, wherein the determining module is further configured to: determine the data access request when determining that the current access mode of the secure data storage area is a secure access mode Whether it comes from the target operating system;
    所述控制模块具体用于:在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。The control module is specifically configured to: when determining that the current access mode is the secure access mode, permit access to the security data, otherwise prohibit accessing the security data.
  8. 根据权利要求6所述的安全数据的访问控制系统,其特征在于,所述控制模块具体还用于:The security data access control system according to claim 6, wherein the control module is further configured to:
    当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者Allowing access to the secure data when it is determined that the current access mode of the secure data storage area is a shared access mode; or
    当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is the masked access mode, access to the secure data is prohibited.
  9. 根据权利要求7或8所述的安全数据的访问控制系统,其特征在于,所述判断模块还用于:当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所述安全数据存储区的访问模式;以及还包括:The security data access control system according to claim 7 or 8, wherein the determining module is further configured to: when the access to the security data is prohibited, determine whether to reset the location in the target operating system The access mode of the secure data storage area; and also includes:
    重置模块,用于在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。And a reset module, configured to reset an access mode of the secure data storage area in the target operating system according to the received reset command when determining to reset the access mode of the secure data storage area.
  10. 根据权利要求6至8中任一项所述的安全数据的访问控制系统,其特征在于,还包括:The access control system for secure data according to any one of claims 6 to 8, further comprising:
    设置模块,用于根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,预设所述安全数据存储区的所述当前访问模式。And a setting module, configured to preset the current access mode of the secure data storage area before determining the current access mode of the secure data storage area according to the received data access request.
  11. 一种终端,其特征在于,所述终端上安装有多个操作系统,所述终端包括处理器和存储器,其中,所述存储器中存储一组程序代码,且所述处理器用于调用所述存储器中存储的程序代码,用于执行以下操作:A terminal, wherein a plurality of operating systems are installed on the terminal, the terminal includes a processor and a memory, wherein the memory stores a set of program codes, and the processor is configured to invoke the memory The program code stored in it to do the following:
    根据接收到的数据访问请求,判断所述终端的目标操作系统中的安全数据存储区的当前访问模式; Determining, according to the received data access request, a current access mode of the secure data storage area in the target operating system of the terminal;
    根据判断结果,确定是否允许访问存储在所述安全数据存储区中的安全数据,其中,所述目标操作系统的安全等级高于所述多个操作系统中除所述目标操作系统外的其他操作系统的安全等级。Determining, according to the judgment result, whether to access the security data stored in the secure data storage area, wherein the security level of the target operating system is higher than other operations of the plurality of operating systems except the target operating system The security level of the system.
  12. 根据权利要求11所述的终端,其特征在于,所述处理器执行:The terminal of claim 11 wherein said processor executes:
    当判定所述安全数据存储区的当前访问模式为安全访问模式时,判断所述数据访问请求是否来自所述目标操作系统,并在判定所述当前访问模式为所述安全访问模式时,允许访问所述安全数据,否则禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is a secure access mode, determining whether the data access request is from the target operating system, and allowing access when determining that the current access mode is the secure access mode The security data is otherwise disabled from accessing the security data.
  13. 根据权利要求11所述的终端,其特征在于,所述处理器执行:The terminal of claim 11 wherein said processor executes:
    当判定所述安全数据存储区的当前访问模式为共享访问模式时,允许访问所述安全数据;或者Allowing access to the secure data when it is determined that the current access mode of the secure data storage area is a shared access mode; or
    当判定所述安全数据存储区的当前访问模式为屏蔽访问模式时,禁止访问所述安全数据。When it is determined that the current access mode of the secure data storage area is the masked access mode, access to the secure data is prohibited.
  14. 根据权利要求12或13所述的终端,其特征在于,所述处理器执行:The terminal according to claim 12 or 13, wherein the processor executes:
    当禁止访问所述安全数据时,判断是否重新设定所述目标操作系统中的所述安全数据存储区的访问模式;以及Determining whether to reset an access mode of the secure data storage area in the target operating system when accessing the security data is prohibited;
    在判定重新设定所述安全数据存储区的访问模式时,根据接收到的重置指令,重新设定所述目标操作系统中的所述安全数据存储区的访问模式。When it is determined that the access mode of the secure data storage area is reset, the access mode of the secure data storage area in the target operating system is reset according to the received reset command.
  15. 根据权利要求11至13中任一项所述的终端,其特征在于,所述处理器根据接收到的所述数据访问请求,判断所述安全数据存储区的所述当前访问模式之前,还执行:The terminal according to any one of claims 11 to 13, wherein the processor further performs before determining the current access mode of the secure data storage area according to the received data access request. :
    预设所述安全数据存储区的所述当前访问模式。 Presetting the current access mode of the secure data storage area.
PCT/CN2015/082980 2015-04-30 2015-06-30 Secure data access control method and system, and terminal WO2016173118A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510219696.1 2015-04-30
CN201510219696.1A CN105631344B (en) 2015-04-30 2015-04-30 The access control method and system of secure data, terminal

Publications (1)

Publication Number Publication Date
WO2016173118A1 true WO2016173118A1 (en) 2016-11-03

Family

ID=56046265

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/082980 WO2016173118A1 (en) 2015-04-30 2015-06-30 Secure data access control method and system, and terminal

Country Status (2)

Country Link
CN (1) CN105631344B (en)
WO (1) WO2016173118A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559421B (en) * 2016-11-08 2019-09-10 北京科技大学 The access control method and system of data object under a kind of cloud computing environment
CN111182124B (en) * 2018-11-13 2021-07-06 深圳市知赢科技有限公司 Mobile terminal, operation method of double systems of mobile terminal and storage device
CN111062054A (en) * 2019-12-13 2020-04-24 重庆擎华信息科技有限公司 Data processing method, device and system
CN115051819A (en) * 2022-03-01 2022-09-13 深圳开源互联网安全技术有限公司 Request response method, device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172411A1 (en) * 2008-01-02 2009-07-02 Arm Limited Protecting the security of secure data sent from a central processor for processing by a further processing device
CN103369524A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN104115152A (en) * 2012-02-16 2014-10-22 三星电子株式会社 Method and apparatus for protecting digital content using device authentication
CN104184738A (en) * 2014-09-01 2014-12-03 宇龙计算机通信科技(深圳)有限公司 Information sharing method and information sharing device of terminal and terminal
CN104202343A (en) * 2014-09-26 2014-12-10 酷派软件技术(深圳)有限公司 Data transmission method, data transmission device and data transmission system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0226874D0 (en) * 2002-11-18 2002-12-24 Advanced Risc Mach Ltd Switching between secure and non-secure processing modes
CN101309478B (en) * 2008-06-25 2014-11-19 宇龙计算机通信科技(深圳)有限公司 Method for mobile terminal data access
CN104168291A (en) * 2014-08-29 2014-11-26 宇龙计算机通信科技(深圳)有限公司 Data access method, data access device and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090172411A1 (en) * 2008-01-02 2009-07-02 Arm Limited Protecting the security of secure data sent from a central processor for processing by a further processing device
CN104115152A (en) * 2012-02-16 2014-10-22 三星电子株式会社 Method and apparatus for protecting digital content using device authentication
CN103369524A (en) * 2013-07-30 2013-10-23 东莞宇龙通信科技有限公司 Terminal and data processing method
CN104184738A (en) * 2014-09-01 2014-12-03 宇龙计算机通信科技(深圳)有限公司 Information sharing method and information sharing device of terminal and terminal
CN104202343A (en) * 2014-09-26 2014-12-10 酷派软件技术(深圳)有限公司 Data transmission method, data transmission device and data transmission system

Also Published As

Publication number Publication date
CN105631344A (en) 2016-06-01
CN105631344B (en) 2018-11-06

Similar Documents

Publication Publication Date Title
CN101084504B (en) Integrated circuit with improved device security
US10848563B2 (en) On-device, application-specific compliance enforcement
WO2016173118A1 (en) Secure data access control method and system, and terminal
US10757100B2 (en) Methods and apparatus for protecting domains of a device from unauthorized accesses
KR101567620B1 (en) Secure memory management system and method
US10867049B2 (en) Dynamic security module terminal device and method of operating same
US8572404B2 (en) Security and safety manager implementation in a multi-core processor
CN104268470B (en) Method of controlling security and safety control
US20080263256A1 (en) Logic Device with Write Protected Memory Management Unit Registers
GB2515047A (en) Security protection of software libraries in a data processing apparatus
EP3243158A1 (en) Method for data protection using isolated environment in mobile device
JP2018124893A (en) Computer system and file access controlling method
CN109446799A (en) Internal storage data guard method, security component and computer equipment and storage medium
US6763465B1 (en) Method of ensuring that the PC is not used to make unauthorized and surreptitious telephone calls
US11194899B2 (en) Apparatus and methods for transitioning between a secure area and a less-secure area
CN104462898A (en) Object file protecting method and device based on Android system
WO2017168016A1 (en) Method and system for protecting a computer file against possible malware encryption
WO2022105610A1 (en) Data protection method, apparatus, storage medium, and computer device
KR101207434B1 (en) System and Method for Preventing Collision Between Different Digital Documents Protection System
CN111209561B (en) Application calling method and device of terminal equipment and terminal equipment
CN105184173A (en) Method and device for request processing
KR20140023459A (en) Program protection apparatus and program protection method
KR102623168B1 (en) Data protection system
CN111027078A (en) Method and system for managing electric energy meter application
CN103886251B (en) The method and device of system reinforcement

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15890497

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11.04.2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15890497

Country of ref document: EP

Kind code of ref document: A1