CN103390137B - A kind of terminal - Google Patents

A kind of terminal Download PDF

Info

Publication number
CN103390137B
CN103390137B CN201310325797.8A CN201310325797A CN103390137B CN 103390137 B CN103390137 B CN 103390137B CN 201310325797 A CN201310325797 A CN 201310325797A CN 103390137 B CN103390137 B CN 103390137B
Authority
CN
China
Prior art keywords
data
processor
cpu
private data
cpu1
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310325797.8A
Other languages
Chinese (zh)
Other versions
CN103390137A (en
Inventor
冯耀辉
丁兆刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd, Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201310325797.8A priority Critical patent/CN103390137B/en
Priority to PCT/CN2013/084354 priority patent/WO2015014014A1/en
Publication of CN103390137A publication Critical patent/CN103390137A/en
Application granted granted Critical
Publication of CN103390137B publication Critical patent/CN103390137B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Multi Processors (AREA)

Abstract

The invention provides a kind of terminal, including: first processor, for processing the private data in described terminal;Second processor, for processing the non-private data in described terminal;External equipment, is connected to described first processor, and interacts with described first processor;Wherein, described second processor and described external equipment perform the mutual forwarding of data by described first processor, to realize interaction.By technical scheme, the private data in terminal and non-private data can be made to be physically isolated process, it is ensured that private data cannot be obtained by unsafe application program, is effectively improved the safety of terminal.

Description

A kind of terminal
Technical field
The present invention relates to technical field of data security, in particular to a kind of terminal.
Background technology
As it is shown in figure 1, terminal is provided with a lot of peripheral hardware (i.e. external equipment 102), such as show Screen, touch screen, photographing unit, button, communication module, sensor assembly etc..In the related, Be provided only with single processor (CPU shown in Fig. 1) in terminal, then this processor can be in office Under the control of meaning application program, send data to any peripheral hardware, it is also possible to receive from any peripheral hardware Data, then, when tag memory has the application program of too high authority at some, especially originate indefinite Third party application, then these application programs can control only process in terminal easily Device, calls private data, is the most arbitrarily uploaded to other-end or server.Simultaneously as should All data handled by only processor are all in identical memory space (shown in Fig. 1 RAM and ROM) in, thus above-mentioned application program is the most most probably by simple breaking techniques, i.e. Private data can be obtained in this memory space.Therefore, for the application program in terminal, particularly When some third party application in terminal, it is from some unique hacker or personal information The when of dealer, the private datas such as the user profile caused in terminal are in the most unsafe shape Under state.
So, how to solve the problem of data safety that single processor brings to terminal, become the most urgently Technical problem to be solved.
Summary of the invention
The present invention is based at least one of the problems referred to above, it is proposed that a kind of new technical scheme, can So that private data and non-private data in terminal are physically isolated process, it is ensured that private data Cannot be obtained by unsafe application program, be effectively improved the safety of terminal.
In view of this, the present invention proposes a kind of terminal, including: first processor, it is used for processing institute State the private data in terminal;Second processor, for processing the non-private data in described terminal; External equipment, is connected to described first processor, and interacts with described first processor;Its In, described second processor and described external equipment perform the mutual of data by described first processor Forward, to realize interaction.
In this technical scheme, first pass through setting and be respectively used to process private data and non-private data Multiple processors so that be able between private data and non-private data physically by effectively every From, thus when avoiding the most only using single processor, only just may be used by cracking in authority etc. Any application is made to obtain private data from this single processor easily.Meanwhile, by first Mutual between processor and the second processor, is controlled the second processor with outside by first processor The interaction of equipment, it is ensured that the second processor cannot touch private data, it is to avoid private data quilt The problem obtained and leak.
In technique scheme, it is preferable that also include: the first storage device, corresponding to described the One processor, carries out the storage of private data for described first processor;Second storage device, right Second processor described in Ying Yu, carries out the storage of non-private data for described second processor.
In this technical scheme, the processor for private data and non-private data uses physically The storage device being separated so that private data and non-private data are processing and store when, all Realize isolation physically, thus obtain more preferable data safe effect.
In technique scheme, it is preferable that described external equipment is used for: transmission will be there is a need to Data are all transmitted to described first processor;Described first processor is used for: directly to private data Process, and by the transmission of non-private data to described second processor.
In this technical scheme, owing to external equipment cannot carry out type identification to data, thus by institute There are data all to send to first processor, and performed type identification and data distribution by first processor. Owing to first processor is specifically designed to process private data, it is for the second processor, more The processor of safety, thus all data are all sent to first processor, even if non-secret therein Data are obtained and profit by other application programs (application program relative to being originally sent to) With, also it is not result in the leakage of private information;As long as and ensure that private data will not be by second Reason device processes, it becomes possible to be physically segregated unauthorized applications based on the second processor to secret The acquisition of data and utilization, ensure that the data safety of terminal.
In technique scheme, it is preferable that described second processor is used for: the number of transmission will be needed According to all transmitting to described first processor, to be forwarded to described external equipment by described first processor.
In this technical scheme, the second processor does not directly interact with external equipment, but passes through First processor indirectly connects and alternately, thus avoids both to be connected simultaneously to external equipment, Private data and non-private data are kept apart the most as much as possible.
In technique scheme, it is preferable that also include: kind judging device, be arranged on described outside On path between portion's equipment and described first processor, for the data from described external equipment Carry out type judgement, and according to judged result, described data are added corresponding mark;Wherein, described First processor receive from the data of described kind judging device time, if the mark of these data Represent that it is private data, the most directly process, if the mark of these data represents that it is non-private data, Then it is forwarded to described second processor.
In this technical scheme, kind judging device the data from external equipment are carried out type knowledge Not, and perform the type identification operation without first processor, thus contribute to reducing the first process The requirement of device so that reduce first processor and the production cost of whole terminal, or will count accordingly Calculate resource and be used for other increasingly complex processing procedures, to improve treatment effeciency.
In technique scheme, it is preferable that also include: at least one first communication module, respectively It is connected to described first processor and described second processor, for carrying out private with described first processor Ciphertext data mutual, and carry out the mutual of non-private data with described second processor.
In this technical scheme, when data uplink, then first processor and the second processor profit respectively Carry out data transmission with first communication module;When data downstream, can be direct by first communication module Downlink data is carried out type identification, thus carries out data distribution according to recognition result so that secret number It is respectively allocated to first processor and the second processor according to non-private data, it is achieved number physically According to isolation, contribute to promoting the safety of terminal.
In technique scheme, it is preferable that also include: at least one second communication module, with institute State first processor be connected and carry out data interaction;Wherein, described first processor is to from described The private data of at least one second communication module processes, and will from described at least one second The non-private data transmission of communication module processes to described second processor.
In this technical scheme, owing to first processor is the " safe handling relative to the second processor Device ", only it is connected with first processor thereby through by second communication module so that private data will not Through the second processor, it is impossible to got by the second processor by unauthorized applications, contribute to carrying Rise the safety of terminal.Meanwhile, by being carried out the type identification of data by first processor, contribute to Reduce the configuration needs to second communication module, and correspondingly control the manufacturing cost of terminal.
By above technical scheme, the private data in terminal and non-private data can be made physically It is isolated process, it is ensured that private data cannot be obtained by unsafe application program, is effectively improved end The safety of end.
Accompanying drawing explanation
Fig. 1 shows the structural representation of the terminal in correlation technique;
Fig. 2 shows the concrete structure schematic diagram of terminal according to an embodiment of the invention;
Fig. 3 shows that the terminal comprising two or more processor according to an embodiment of the invention is tied Structure schematic diagram;
Fig. 4 shows the terminal comprising two or more processor according to another embodiment of the invention Structural representation;
Fig. 5 is the terminal structure schematic diagram under a kind of detailed description of the invention of the embodiment shown in Fig. 4;
Fig. 6 shows the concrete structure schematic diagram of terminal according to another embodiment of the invention;
Fig. 7 shows the terminal comprising two or more processor according to still another embodiment of the invention Structural representation;
Fig. 8 shows the terminal comprising two or more processor according to still another embodiment of the invention Structural representation;
Fig. 9 is the terminal structure schematic diagram under a kind of detailed description of the invention of the embodiment shown in Fig. 8;
Figure 10 shows the company of single communication module according to an embodiment of the invention and processor Connect structural representation;
Figure 11 shows the company of multiple communication module according to an embodiment of the invention and processor Connect structural representation;
Figure 12 is Figure 10 or each communication module of embodiment illustrated in fig. 11 and more than 2 processors A kind of attachment structure schematic diagram;
Figure 13 is Figure 10 or each communication module of embodiment illustrated in fig. 11 and more than 2 processors Another kind of attachment structure schematic diagram;
Figure 14 is the attachment structure schematic diagram under a kind of detailed description of the invention of embodiment illustrated in fig. 13;
Figure 15 shows single communication module according to another embodiment of the invention and processor Attachment structure schematic diagram;
Figure 16 shows multiple communication modules according to another embodiment of the invention and processor Attachment structure schematic diagram;
Figure 17 is Figure 15 or each communication module of embodiment illustrated in fig. 16 and more than 2 processors A kind of attachment structure schematic diagram;
Figure 18 is Figure 15 or each communication module of embodiment illustrated in fig. 16 and more than 2 processors Another kind of attachment structure schematic diagram;
Figure 19 is the attachment structure schematic diagram under a kind of detailed description of the invention of embodiment illustrated in fig. 18.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, below in conjunction with attached The present invention is further described in detail by figure and detailed description of the invention.It should be noted that not In the case of conflict, the feature in embodiments herein and embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention, but, The present invention can implement to use other to be different from other modes described here, therefore, and the present invention Protection domain do not limited by following public specific embodiment.
Fig. 2 shows the concrete structure schematic diagram of terminal according to an embodiment of the invention.
As in figure 2 it is shown, the present invention proposes a kind of terminal, including CPU1, it is used for processing described Private data in terminal;CPU2, for processing the non-private data in described terminal;Outside sets Standby, it is connected to described CPU1, and interacts with described CPU1;Wherein, described CPU2 and Described external equipment performs the mutual forwarding of data by described CPU1, to realize interaction.
In this technical scheme, first pass through setting and be respectively used to process private data and non-private data CPU1 and CPU2 so that be able between private data and non-private data physically by effectively Isolation, thus when avoiding the most only using single processor, only by cracking in authority etc. just Any application can be made easily to obtain private data from this single processor.Meanwhile, pass through Mutual between CPU1 and CPU2, is controlled the mutual mistake of CPU2 and external equipment by CPU1 Journey, it is ensured that CPU2 cannot touch private data, it is to avoid private data is acquired and asking of leaking Topic.
Specifically, for private data and non-private data, can be preset by manufacturer, it is also possible to by User determines according to the practical situation of oneself.Such as, in the case of one, journey will can be applied with some The data that sequence is associated all as private data or non-private data, such as will with " address list ", The data that the application program such as " message registration ", " short message ", " mail " is relevant, no matter reading Or write, all can be regarded as private data, or by the data relevant to certain game application, all as non- Private data;Such as in the case of another kind, can be using the data of certain type as private data or non- Private data, such as using the interaction data with Web bank all as private data, and by software more New bag data are as non-private data etc., it is also possible to comprise other differentiation mode, the most do not carry out one One enumerates.
For external equipment 102, including the multiple hardwares equipment pre-set in terminal, except Fig. 2 Shown in display screen (such as LCD, Liquid Crystal Display, liquid crystal display), touch Touch screen (TW:Touch Window), photographing unit (CAMERA), button (KEY) etc. it Outward, it is also possible to include such as: for communication module, the sensor of wireless mobile communications (SENSOR), WIFI(Wireless Fidelity, WLAN) module, bluetooth (BT, Bluetooth) module, GPS(Global Position System, global positioning system) module, NFC(Near field Communication, near-field communication) module, audio codec (AUDIO CODEC) etc..
In technique scheme, it is preferable that CPU1 and CPU2 can be with common storage space, i.e. RAM, ROM etc., but in order to prevent malicious application from obtaining private from shared memory space Ciphertext data, the most in fig. 2, CPU1 employs RAM1 and ROM1, CPU2 and then uses RAM2 and ROM2, can physically separate the memory space that CPU1 with CPU2 uses mutually From.Separated storage device is used physically so that private data due to CPU1 and CPU2 With non-private data processing and store when, all realize isolation physically, thus obtain more preferably Data safe effect.
In technique scheme, it is preferable that described external equipment 102 is used for: passed there is a need to Defeated data are all transmitted to described CPU1;Described CPU1 is used for: directly carry out private data Process, and by non-private data transmission to described CPU2.
In this technical scheme, owing to external equipment 102 cannot carry out type identification to data, thus All data are all sent to CPU1, and is performed type identification and data distribution by CPU1.Due to CPU1 is specifically designed to process private data, is for CPU2, safer process Device, thus all data are all sent to CPU1, even if non-private data therein is applied by other Program (application program relative to being originally sent to) obtains and utilizes, and is also not result in private The leakage of confidential information;As long as and ensure that private data will not be by CPU2 process, it becomes possible to It is physically segregated unauthorized applications based on CPU2 to the acquisition of private data and utilization, thus really Protect the data safety of terminal.
In technique scheme, it is preferable that described CPU2 is used for: the data of transmission will be needed all Transmission is to described CPU1, to be forwarded to described external equipment 102 by described CPU1.
In this technical scheme, CPU2 does not directly interact with external equipment 102, but passes through CPU1 indirectly connects and alternately, thus avoids both to be connected simultaneously to external equipment 102, Private data and non-private data are kept apart the most as much as possible.
Below be all with terminal comprise the situation of an a CPU1 and CPU2 carry out be describe and Analyze, but in order to obtain higher disposal ability, or reach more excellent safe effect, eventually End can comprise greater number of CPU1 and/or greater number of CPU2, below in conjunction with Fig. 3- 5, terminal to include CPU1, CPU1A and CPU1B etc. for process that private data processes The processor that device and CPU2, CPU2A and CPU2B etc. process for non-private data is Example, illustrates the terminal structure in the case of greater number of processor and process strategy.When So, it should be appreciated by those skilled in the art: multiple for secret number for terminal only comprises According to the processor processed or only comprise the situation of multiple processor processed for non-private data, with And in the case of processor is more, its catenation principle is actually identical, will not in the application Repeat again.
Although it should be noted that there is a lot of external equipment 102 in terminal, but each external equipment Attachment structure between 102 and CPU1, CPU2 and data transfer mode, the most similar , thus in order to clearly describe its concrete attachment structure and data transmission policies, under Each embodiment of face will be described in detail as a example by some external equipment 102.And this area Technical staff it is clearly understood that: below based on the attachment structure described by " external equipment 102 " and Data transmission policies, actually display can be applicable to any external equipment 102 terminal.
It addition, the various circuit switching control modes mentioned in above technical scheme, all can apply to In each technical scheme following, it is achieved kind judging device 104 is to CPU and external equipment 102 Interactive controlling.
Embodiment one
For processing in multiple CPU of private data/non-private data, using certain CPU as with " relaying " of external equipment 102, other CPU are then by should " relaying " realize with outside Equipment 102 mutual.
Specifically, as shown in Figure 3, it is assumed that set up between CPU1 and external equipment 102 and connect, And other are for processing multiple CPU of private data, it is connected by " series connection " mode with CPU1; Simultaneously, it is assumed that connected by " in parallel " mode for processing multiple CPU of non-private data.
For " series connection " mode: when CPU1 needs mutual with external equipment 102, then CPU1 Direct and external equipment 102 carries out data interaction;When CPU1A needs to carry out with external equipment 102 Time mutual, then carried out data forwarding by CPU1;When CPU1B needs to carry out with external equipment 102 Time mutual, then carried out data forwarding by CPU1A, CPU1.
For " in parallel " mode: when CPU2 needs mutual with external equipment 102, then CPU2 Data forwarding can be carried out by CPU1 by sending request to CPU1, thus indirectly sets with outside Standby 102 carry out data interaction;When CPU2A need with external equipment 102 interact time, then by CPU2 and CPU1 carries out data forwarding successively;When CPU2B needs to hand over external equipment 102 Time mutually, also carried out data forwarding successively by CPU2 and CPU1.
Certainly, the connected mode of " in parallel " can also be used for the CPU of private data process, Even part uses " series connection ", part to use the connected mode of " in parallel ";And for non-secret number The connected mode of " series connection ", even part can also be used " string is used according to the CPU processed Connection ", part use " in parallel " connected mode, this is apparent from.But due to only CPU1 is directly connected with external equipment 102, if thus other any CPU hope and external equipment 102 is mutual, and the most at least needing to be carried out forwarding by CPU1 can realize.
Mutual, when interacting between multiple CPU except with external equipment 102, it is also possible to The data needing other CPU forward.Such as interact as CPU1 with CPU2 or CPU1A Time, then direct interaction;When CPU1 Yu CPU1B interacts, then CPU1A is needed to enter Row forwards;When CPU2 Yu CPU1, CPU2A or CPU2B interact, then direct interaction ?;When CPU2A Yu CPU2B interacts, then CPU2 is needed to forward.
Additionally, on the basis of " in parallel ", also likely to be present between CPU2A with CPU2B and be connected (not shown), it is possible to realize directly data interaction between the two.Further, CPU is worked as More time, between all of CPU, the most all may directly perform data interaction, and nothing Need the forwarding of other CPU.
Embodiment two
In the multiple CPU for processing private data, each CPU all " in parallel " to outsides set Standby 102, and directly interact with external equipment 102, without other CPU as " in Continue ".
Specifically, as shown in Figure 4, for processing CPU1, CPU1A, CPU1B of private data It is respectively connecting to external equipment 102;Meanwhile, for process non-private data CPU2, CPU2A, CPU2B are not then connected with external equipment 102.
Meanwhile, between multiple CPU with same treatment function, can use in above-mentioned word " series connection " and/or " in parallel " mode mentioned.As a kind of specific embodiment, Fig. 4 shows Go out: have employed " series connection " side for processing CPU1, CPU1A, CPU1B of private data Formula, and have employed " in parallel " side for processing CPU2, CPU2A, CPU2B of non-private data Formula.
When the externally connected equipment 102 of a part of CPU, such as process for private data CPU, then these CPU can directly interact with external equipment 102, including the transmission of data And reception;And other CPU not being directly connected to external equipment 102, it is the most now for non- The CPU that private data processes, when these CPU need to interact with external equipment 102, needs Relate to the interaction between these CPU and the CPU being connected directly to external equipment 102.
(1) processing procedure of data uplink
(figure does not shows assuming that each CPU all can directly carry out data interaction with other any CPU Go out concrete annexation), then CPU2A or CPU2B directly can will need the data sent to pass Transport to be connected directly to the CPU of external equipment 102, such as transmit to CPU1A or CPU1B, so After be forwarded to external equipment 102 further by CPU1A or CPU1B.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, ratio as shown in Figure 4, CPU2A or CPU2B is merely able to carry out direct interaction with CPU2, then CPU2A or CPU2B can To send data to CPU2, CPU2 send to CPU1, and be forwarded to target by CPU1 CPU。
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to appointment Other kinds of CPU interact, than as it is shown in figure 5, as same type of CPU, CPU2 with CPU2A be adjacent, can direct interaction, and as different types of CPU, CPU2 also Can be with CPU1 direct interaction;Similarly, then CPU2A can directly with adjacent CPU2, CPU2B direct interaction, additionally it is possible to CPU1A direct interaction, then CPU2A can pass through The adjacent C PU indirect communication such as CPU2 are to CPU1, and are further transmitted to external equipment by CPU1 102, it is also possible to by being directly transferred to CPU1A, and be further transmitted to outside by CPU1A and set Standby 102.
(2) processing procedure of data downstream
Need to be sent data to, by external equipment 102, the CPU that is joined directly together, such as transmit to CPU1A, is then further transmitted to target CPU.
Such as after external equipment 102 sends data to CPU1A: in the case of the first, CPU1A finds that these data are non-private data, but unclear by which CPU process;Second In the case of Zhong, CPU1A finds that these data are non-private data, and knows and be entered by which CPU Row processes.
In above-mentioned two situations, it is still necessary to be analyzed according to the concrete connection of CPU:
(figure does not shows assuming that each CPU all can directly carry out data interaction with other any CPU Go out concrete annexation), then for the first situation, data can directly be transmitted by CPU1A To any one for processing CPU, the such as CPU2A of non-private data, then true by CPU2A Fixed concrete target CPU;For the second situation, CPU1A can directly send data to mesh Mark CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, ratio as shown in Figure 4, CPU1A is merely able to carry out direct interaction with CPU1 and CPU1B, then CPU1A can be by data Send to CPU1, CPU1 send to CPU2, and be forwarded to target CPU by CPU2.
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to appointment Other kinds of CPU interact, than as it is shown in figure 5, as same type of CPU, CPU1 with CPU1A be adjacent, can direct interaction, and as different types of CPU, CPU1 also Can be with CPU2 direct interaction;Similarly, then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, then receive outside as CPU1A During the non-private data that equipment 102 sends, can by adjacent C PU indirect communication such as CPU1 extremely For processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
In the technical scheme described by Fig. 2-5, it is all by external equipment 102 phase direct with CPU Even, and directly data transmission is performed.Below in conjunction with Fig. 6-9, to herein disclosed another kind of feelings Condition is specifically described, and wherein, between external equipment 102 and CPU, is also provided with type and sentences Disconnected device 104.
As shown in Figure 6, terminal can also include: kind judging device 104, be arranged on described outside On path between portion's equipment 102 and described CPU1, for from described external equipment 102 Data carry out type judgement, and according to judged result, described data are added corresponding mark;Wherein, Described CPU1 receive from the data of described kind judging device 104 time, if these data Mark represents that it is private data, the most directly processes, if the mark of these data represents that it is non-secret number According to, then it is forwarded to described CPU2.
In this technical scheme, the data from external equipment 102 are entered kind judging device 104 Row type identification, and perform the type identification operation without CPU1, thus contribute to reducing right The requirement of CPU1 so that reduce CPU1 and the production cost of whole terminal, or will count accordingly Calculate resource and be used for other increasingly complex processing procedures, to improve treatment effeciency.
It is similar to the situation shown in Fig. 3-5, when terminal is provided with kind judging device 104, also There may be the situation of multiple processor, then for the various circuit switching controlling parties shown in Fig. 6 Formula, all can apply to below in conjunction with in each technical scheme described by Fig. 7-9, it is achieved type is sentenced The disconnected device 104 interactive controlling to CPU Yu external equipment 102.
Embodiment one
For processing in multiple CPU of private data/non-private data, using certain CPU as with " relaying " of external equipment 102, other CPU are then by should " relaying " realize with outside Equipment 102 mutual.
Specifically, as shown in Figure 7, it is assumed that set up between CPU1 and external equipment 102 and connect (realizing the forwarding of data particular by kind judging device 104), and other are used for processing secret Multiple CPU of data, are connected by " series connection " mode with CPU1;Simultaneously, it is assumed that be used for processing Multiple CPU of non-private data are connected by " in parallel " mode.
For " series connection " mode: when CPU1 needs mutual with external equipment 102, then CPU1 Direct and external equipment 102 carries out data interaction;When CPU1A needs to carry out with external equipment 102 Time mutual, then carried out data forwarding by CPU1;When CPU1B needs to carry out with external equipment 102 Time mutual, then carried out data forwarding by CPU1A, CPU1.
For " in parallel " mode: when CPU2 needs mutual with external equipment 102, then CPU2 Data forwarding can be carried out by CPU1 by sending request to CPU1, thus indirectly sets with outside Standby 102 carry out data interaction;When CPU2A need with external equipment 102 interact time, then by CPU2 and CPU1 carries out data forwarding successively;When CPU2B needs to hand over external equipment 102 Time mutually, also carried out data forwarding successively by CPU2 and CPU1.
Certainly, the connected mode of " in parallel " can also be used for the CPU of private data process, Even part uses " series connection ", part to use the connected mode of " in parallel ";And for non-secret number The connected mode of " series connection ", even part can also be used " string is used according to the CPU processed Connection ", part use " in parallel " connected mode, this is apparent from.But due to only CPU1 is directly connected with external equipment 102, if thus other any CPU hope and external equipment 102 is mutual, and the most at least needing to be carried out forwarding by CPU1 can realize.
Mutual, when interacting between multiple CPU except with external equipment 102, it is also possible to The data needing other CPU forward.Such as interact as CPU1 with CPU2 or CPU1A Time, then direct interaction;When CPU1 Yu CPU1B interacts, then CPU1A is needed to enter Row forwards;When CPU2 Yu CPU1, CPU2A or CPU2B interact, then direct interaction ?;When CPU2A Yu CPU2B interacts, then CPU2 is needed to forward.
Additionally, on the basis of " in parallel ", also likely to be present between CPU2A with CPU2B and be connected (not shown), it is possible to realize directly data interaction between the two.Further, CPU is worked as More time, between all of CPU, the most all may directly perform data interaction, and nothing Need the forwarding of other CPU.
Embodiment two
In the multiple CPU for processing private data, each CPU all " in parallel " to outsides set Standby 102, and directly interact with external equipment 102, without other CPU as " in Continue ".
Specifically, as shown in Figure 8, for processing CPU1, CPU1A, CPU1B of private data It is respectively connecting to external equipment 102;Meanwhile, for process non-private data CPU2, CPU2A, CPU2B are also respectively connecting to external equipment 102.
Meanwhile, between multiple CPU with same treatment function, can use in above-mentioned word " series connection " and/or " in parallel " mode mentioned.As a kind of specific embodiment, Fig. 8 shows Go out: have employed " series connection " side for processing CPU1, CPU1A, CPU1B of private data Formula, and have employed " in parallel " side for processing CPU2, CPU2A, CPU2B of non-private data Formula.
When the externally connected equipment 102 of a part of CPU, such as process for private data CPU, then these CPU can be by directly (owing to up process need not kind judging device 104 Carry out type judgement, thus may be considered " directly " transmission) hand over external equipment 102 Mutually, including transmission and the reception of data;And what other were not directly connected to external equipment 102 CPU, the most now for the CPU processed for non-private data, when these CPU need with outside When equipment 102 interacts, need to relate to these CPU and be connected directly to external equipment 102 CPU between interaction.
(1) processing procedure of data uplink
(figure does not shows assuming that each CPU all can directly carry out data interaction with other any CPU Go out concrete annexation), then CPU2A or CPU2B directly can will need the data sent to pass Transport to be connected directly to the CPU of external equipment 102, such as transmit to CPU1A or CPU1B, so After be forwarded to external equipment 102 further by CPU1A or CPU1B.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, ratio as shown in Figure 4, CPU2A or CPU2B is merely able to carry out direct interaction with CPU2, then CPU2A or CPU2B can To send data to CPU2, CPU2 send to CPU1, and be forwarded to target by CPU1 CPU。
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to appointment Other kinds of CPU interact, than as it is shown in figure 5, as same type of CPU, CPU2 with CPU2A be adjacent, can direct interaction, and as different types of CPU, CPU2 also Can be with CPU1 direct interaction;Similarly, then CPU2A can directly with adjacent CPU2, CPU2B direct interaction, additionally it is possible to CPU1A direct interaction, then CPU2A can pass through The adjacent C PU indirect communication such as CPU2 are to CPU1, and are further transmitted to external equipment by CPU1 102, it is also possible to by being directly transferred to CPU1A, and be further transmitted to outside by CPU1A and set Standby 102.
(2) processing procedure of data downstream
Need to be sent data to kind judging device 104 by external equipment 102, type judge dress Put 104 CPU being forwarded to be joined directly together, be such as forwarded to CPU1A, be then further transmitted to Target CPU.
Such as after external equipment 102 sends data to CPU1A: in the case of the first, CPU1A finds that these data are non-private data, but unclear by which CPU process;Second In the case of Zhong, CPU1A finds that these data are non-private data, and knows and be entered by which CPU Row processes.
In above-mentioned two situations, it is still necessary to be analyzed according to the concrete connection of CPU:
(figure does not shows assuming that each CPU all can directly carry out data interaction with other any CPU Go out concrete annexation), then for the first situation, data can directly be transmitted by CPU1A To any one for processing CPU, the such as CPU2A of non-private data, then true by CPU2A Fixed concrete target CPU;For the second situation, CPU1A can directly send data to mesh Mark CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, ratio as shown in Figure 8, CPU1A is merely able to carry out direct interaction with CPU1 and CPU1B, then CPU1A can be by data Send to CPU1, CPU1 send to CPU2, and be forwarded to target CPU by CPU2.
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to appointment Other kinds of CPU interact, than as it is shown in figure 9, as same type of CPU, CPU1 with CPU1A be adjacent, can direct interaction, and as different types of CPU, CPU1 also Can be with CPU2 direct interaction;Similarly, then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, then receive outside as CPU1A During the non-private data that equipment 102 sends, can by adjacent C PU indirect communication such as CPU1 extremely For processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
Described above is all the data interaction between CPU and external equipment 102, and for end For end, also include the data interaction between other-end or server, then relate to CPU with logical Up-downgoing data interaction between letter module.
As shown in Figure 10, it is assumed that CPU1 is used for processing private data, CPU2 is used for processing non-secret Data, and communication module 106 is for the transmitting-receiving of up-downgoing data.So, for upstream data, by It is respectively connecting to CPU1 and CPU2 in communication module 106, thus from the data of CPU1 is exactly Private data, data from CPU2 are just non-private datas;For downlink data, by communication mould Block 106 directly carries out type identification to the data received, if private data, is then directly transferred to CPU1, if non-private data, is then directly transferred to CPU2.
By communication module 106, data are carried out type identification so that private data and non-private data It is respectively allocated to CPU1 and CPU2, it is achieved data isolation physically, contributes to promoting terminal Safety.
Meanwhile, in order to promote safety further, it is also possible to add a merit for communication module 106 Can, i.e. when communication module 106 is mutual with CPU1, cut off the connection with CPU2, when communication mould When block 106 is mutual with CPU2, cut off the connection with CPU1;Or, communication module 106 with Add circuit switch module between CPU1, CPU2 (not shown in figure, to be similar to shown in Fig. 6-9 Kind judging device 104), controlled by circuit switch module self or CPU1, CPU2 System, it is achieved when communication module 106 is mutual with CPU1, cuts off the connection with CPU2, work as communication When module 106 is mutual with CPU2, cut off the connection with CPU1.By the company's on and off to circuit Open so that physically separate private data and non-private data, contribute to promoting further the peace of terminal Quan Xing.
Terminal can also exist multiple communication module 106, ratio as shown in figure 11, including communication mould Block 106A and communication module 106B, be both respectively connecting to CPU1 and CPU2, then for logical For letter module 106A or communication module 106B, actually with the communication module 106 shown in Figure 10 It is identical, can use for reference and use the process strategy of communication module 106 correspondence shown in Figure 10, Thus here is omitted.
Similar situation shown in Fig. 7-9, multiple for processing private data when terminal exists CPU, and/or multiple when the CPU processing non-private data, described in Figure 10-11 Communication module 106(be used for illustrating, communication module 106A and communication module 106B phase therewith With), above-mentioned multiple CPU can take following strategy.
Wherein, the most still for process private data CPU include CPU1, CPU1A and CPU1B, as a example by the CPU for processing non-private data includes CPU2, CPU2A and CPU2B Illustrate.
Embodiment one
Communication module 106 is only connected to one for processing the CPU of private data and one for locating Manage the CPU of non-private data, be such as connected to CPU1 and CPU2.
So, during for data uplink, private data/non-private data is directly passed by CPU1/CPU2 Transport to communication module 106, and CPU1A, CPU1B need to transmit to CPU1 private data, and It is forwarded to communication module 106 by CPU1;Similarly, CPU2A, CPU2B need non-secret number According to transmission to CPU2, and it is forwarded to communication module 106 by CPU2.
During for data downstream, all of private data is all sent to CPU1 by communication module 106, All of non-private data is all sent to CPU2, wherein, in the case of the first, communication module 106 can be by modes such as the parsings to data, it is thus understood that for processing target CPU of these data, Then communication module 106 can add corresponding mark on the data, thus as CPU1 or CPU2 After receiving these data, corresponding target CPU can be determined according to the mark added, to realize Forward;In the case of the second, communication module 106 cannot learn target CPU of the data received, Then communication module 106 directly transmits it to CPU1 or CPU2, by CPU1 or CPU2 voluntarily Determine corresponding target CPU.
Based on the different connected modes between multiple CPU, when carrying out data transmission between CPU, Different situations can be there is.As shown in figure 12, CPU1, CPU1A and CPU1B use ratio The mode " connected ", CPU2, CPU2A and CPU2B use the mode of " in parallel ", Then when CPU1B needs send upstream data or receive downlink data, need via CPU1A and The two-stage transmission of CPU1, can realize;And for CPU2A and CPU2B, the most only need The Primary Transmit wanting CPU2 can realize.
Certainly, it is similar to description during Fig. 7-9, for any type of multiple CPU, as being used for locating Reason private data or the CPU of non-private data, all can according to actual needs and use " series connection " or The connected mode of " in parallel ", it might even be possible to simultaneously use the mode of " series connection " and " in parallel " to carry out Connect.
Embodiment two
As shown in figure 13, communication module 106 can also be respectively connecting to all of CPU, then for Upstream data, each CPU can be directly transferred to communication module 106, and without by other CPU performs forwarding, advantageously reduces data transmission delay.And for downlink data, if communication module 106 will be understood that concrete target CPU, then can be directly transferred to this target CPU;If communication Module 106 can not recognize concrete target CPU, then take following manner:
In the case of the first, communication module 106 carries out type identification to downlink data, and according to identification As a result, send data to certain acquiescence or arbitrary for processing the CPU of same type data, than As by private data default transport to CPU1, non-private data default transport is to CPU2, or by private Ciphertext data arbitrarily transmits to CPU1, CPU1A or CPU1B, non-private data is arbitrarily transmitted to CPU2, CPU2A or CPU2B, then further determined that by the CPU receiving this downlink data And it is forwarded to concrete target CPU.
In the case of the second, communication module 106 does not carry out type identification to downlink data, the most directly will Downlink data transmission is to certain acquiescence or arbitrary CPU, and is directly carried out type identification by this CPU Or be forwarded to other CPU and carry out type identification, then according to recognition result, send to target CPU.Specifically, such as default transport is to CPU1, then by CPU1 carry out type identification (or Specify that all downlink datas are carried out type identification by CPU1A, then need transmission to enter to CPU1A Row type identification), and according to recognition result by downlink data transmission to concrete target CPU.
Above-mentioned in the case of each, actually further comprises the data between dissimilar CPU and hand over Mutually, following multiple situation is the most also comprised:
(figure does not shows assuming that each CPU all can directly carry out data interaction with other any CPU Go out concrete annexation).Assuming that CPU1A have received non-private data, if then CPU1A Do not know target CPU that these data are corresponding, then can directly send data to any one for locating Manage the CPU of non-private data, such as CPU2A, then decided specific aims by CPU2A CPU;If CPU1A knows target CPU that these data are corresponding, then can directly data be transmitted To target CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, such as Figure 13 institute Showing, CPU1A is merely able to carry out direct interaction with CPU1 and CPU1B, then CPU1A can be by Data send to CPU1, CPU1 send to CPU2, and be forwarded to target by CPU2 CPU。
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to appointment Other kinds of CPU interact, ratio as shown in figure 14, as same type of CPU, CPU1 with CPU1A be adjacent, can direct interaction, and as different types of CPU, CPU1 also Can be with CPU2 direct interaction;Similarly, then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, then receive communication as CPU1A During the non-private data that module 106 sends, can by adjacent C PU indirect communication such as CPU1 extremely For processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
In the technical scheme described by Figure 10-14, communication module 106 is respectively connecting to for processing The CPU of private data and for processing the CPU of non-private data;And at following Figure 15-19 In, communication module 106A shown in each communication module 106(or Figure 16 and communication module 106B) all it is only attached to a type of CPU, is such as only connected to for processing private data CPU, or it is only connected to the CPU for processing non-private data.
Specifically, as shown in figure 15, communication module 106 is only connected to CPU1, then for upper line number According to, CPU1 can directly interact with communication module 106, and CPU2 then needs CPU1 to make For relaying, indirectly interact with communication module 106.For downlink data, in the case of the first, Communication module 106 can carry out type identification to downlink data, and according to recognition result to downlink data Add mark, then all send to CPU1, by CPU1 according to the mark on downlink data, really Determine to process voluntarily, or send to CPU2 process;In the case of the second, communication module 106 Downlink data is not carried out type identification, then after it being carried out type identification by CPU1, to secret number According to directly processing, and non-private data is forwarded to CPU2 process.
Certainly, communication module 106 can also be connected to CPU2, the direct and communication module by CPU2 106 interact, and CPU1 must realize and the mould that communicates indirectly using CPU2 as " relaying " Block 106 mutual.But owing to CPU2 is used for processing non-private data, for CPU1 it is Unsafe CPU, because private data can circulate in CPU2, may cause unauthorized applications Therefrom steal.Therefore, in order to obtain safer applied environment, it is more likely to the mould that communicates Block 106 is directly connected with CPU1.In each technical scheme following, will with communication module 106 with CPU1 illustrates as a example by being connected, but based on foregoing description, this obviously can not be understood as that A kind of restriction or restriction.
As shown in figure 16, when terminal exists multiple communication module, such as include communication module 106A and communication module 106B, then be respectively connecting to CPU1.So, for communication module 106A Or for communication module 106B, be identical with the communication module 106 shown in Figure 14, can use Corresponding connected mode or process strategy, here is omitted.
Similar situation shown in Figure 10-14, multiple for processing private data when terminal exists CPU, and/or multiple when the CPU processing non-private data, described in Figure 15-16 Communication module 106(be used for illustrating, communication module 106A and communication module 106B phase therewith With), above-mentioned multiple CPU can take following strategy.
Wherein, the most still for process private data CPU include CPU1, CPU1A and CPU1B, as a example by the CPU for processing non-private data includes CPU2, CPU2A and CPU2B Illustrate.
Embodiment one
Communication module 106 is only connected to one for processing the CPU of private data or one for locating Manage the CPU of non-private data, be such as connected to CPU1.
So, during for data uplink, CPU1 directly interacts with communication module 106, and its He all of CPU be required to directly or indirectly by need the data sent transmission to CPU1, by CPU1 is forwarded to communication module 106, it is achieved the up transmission of data.
During for data downstream, in the case of the first, communication module 106 can be by the solution to data The modes such as analysis, it is thus understood that for processing target CPU of these data, then communication module 106 can be at this Corresponding mark is added in data, thus after CPU1 receives these data, can be according to interpolation Mark, determine corresponding target CPU, with realize forward;In the case of the second, communication module 106 targets CPU that cannot learn the data received, then communication module 106 directly transmits it to CPU1, is determined corresponding target CPU voluntarily by CPU1, and certainly, communication module 106 can be right The type of data is identified, and after determining that it is private data or non-private data, is just sent to CPU1, or communication module 106 do not performs type identification operation, but is transmitted directly to CPU1, Type identification is carried out by the CPU1 data to receiving.
Based on the different connected modes between multiple CPU, when carrying out data transmission between CPU, Different situations can be there is.As shown in figure 17, CPU1, CPU1A and CPU1B use ratio The mode " connected ", CPU2, CPU2A and CPU2B use the mode of " in parallel ", Then when CPU1B needs send upstream data or receive downlink data, need via CPU1A and The two-stage transmission of CPU1, can realize;And for CPU2A and CPU2B, the most only need The Primary Transmit wanting CPU2 can realize.
Certainly, it is similar to description during Figure 12-14, for any type of multiple CPU, as being used for Process private data or the CPU of non-private data, all can use " series connection " according to actual needs Or the connected mode of " in parallel ", it might even be possible to use the mode of " series connection " and " in parallel " to enter simultaneously Row connects.
Embodiment two
As shown in figure 18, communication module 106 can also be respectively connecting to all of same type CPU, is such as connected simultaneously to all CPU(for processing private data and refers specifically in figure CPU1, CPU1A and CPU1B).
So, for upstream data, each CPU for processing private data can directly pass Transport to communication module 106, and without performing forwarding by other CPU, advantageously reduce data transmission Time delay, and for processing the CPU of non-private data, then remain a need for forwarding the data to certain for locating CPU, the such as CPU1 of reason private data, can realize the up transmission of data.
And for downlink data, if communication module 106 will be understood that concrete target CPU, it is assumed that These data are private data, then can be directly transferred to this target CPU, it is assumed that these data are non-secret Data, then, after this non-private data being added mark, being directly transferred to certain CPU(being connected should CPU can be acquiescence or arbitrary, such as gives tacit consent to and all sends to CPU1, or randomly chooses one The CPU being connected), it is assumed that for CPU1, then it is forwarded to accordingly according to the mark in data by CPU1 Target CPU;If communication module 106 can not recognize concrete target CPU, then take down State mode:
In the case of the first, communication module 106 carries out type identification to downlink data, and according to identification As a result, send data to certain acquiescence or arbitrary for processing the CPU of same type data, than As by private data default transport to CPU1, write from memory after non-private data is added corresponding type identification Recognize and transmit to CPU1, or private data is arbitrarily transmitted to CPU1, CPU1A or CPU1B, will Non-private data add after corresponding type identification arbitrarily transmission to CPU1, CPU1A or CPU1B, is then further determined that by the CPU receiving this downlink data and is forwarded to concrete mesh Mark CPU.
In the case of the second, communication module 106 does not carry out type identification to downlink data, the most directly will Downlink data transmission is to certain acquiescence or arbitrary CPU, and is directly carried out type identification by this CPU Or be forwarded to other CPU and carry out type identification, then according to recognition result, send to target CPU.Specifically, such as default transport is to CPU1, then by CPU1 carry out type identification (or Specify that all downlink datas are carried out type identification by CPU1A, then need transmission to enter to CPU1A Row type identification), and according to recognition result by downlink data transmission to concrete target CPU.
Above-mentioned in the case of each, actually further comprises the data between dissimilar CPU and hand over Mutually, following multiple situation is the most also comprised:
(figure does not shows assuming that each CPU all can directly carry out data interaction with other any CPU Go out concrete annexation).Assuming that CPU1A have received non-private data, if then CPU1A Do not know target CPU that these data are corresponding, then can directly send data to any one for locating Manage the CPU of non-private data, such as CPU2A, then decided specific aims by CPU2A CPU;If CPU1A knows target CPU that these data are corresponding, then can directly data be transmitted To target CPU, such as CPU2A.
Assuming that each CPU is only capable of carries out direct interaction with adjacent CPU, such as Figure 18 institute Showing, CPU1A is merely able to carry out direct interaction with CPU1 and CPU1B, then CPU1A can be by Data send to CPU1, CPU1 send to CPU2, and be forwarded to target by CPU2 CPU。
Assuming that each CPU is except carrying out direct interaction with adjacent CPU, additionally it is possible to appointment Other kinds of CPU interact, ratio as shown in figure 19, as same type of CPU, CPU1 with CPU1A be adjacent, can direct interaction, and as different types of CPU, CPU1 also Can be with CPU2 direct interaction;Similarly, then CPU1A can directly with adjacent CPU1, CPU1B direct interaction, additionally it is possible to CPU2A direct interaction, then receive communication as CPU1A During the non-private data that module 106 sends, can by adjacent C PU indirect communication such as CPU1 extremely For processing the CPU of non-private data, it is also possible to by being directly transferred to CPU2A, and by CPU2A determines and transmits to final target CPU.
Technical scheme is described in detail, it is contemplated that in correlation technique, eventually above in association with accompanying drawing End only comprises single cpu, the operation such as the most all data all are carried out processing by this CPU, storage, holds Easily obtained private data by any application the most easily, cause the leakage of privacy of user.Therefore, Present applicant proposes a kind of terminal, the private data in terminal and non-private data can be made physically It is isolated process, it is ensured that private data cannot be obtained by unsafe application program, is effectively improved end The safety of end.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention Protection domain within.

Claims (5)

1. a terminal, it is characterised in that including:
First processor, for processing the private data in described terminal;
Second processor, for processing the non-private data in described terminal;
External equipment, is connected to described first processor, and interacts with described first processor;
Wherein, described second processor and described external equipment perform data by described first processor Mutual forwarding, to realize interaction;
Described external equipment is used for: all transmit the data that be there is a need to transmission to described first processor In;
Described first processor is used for: directly processes private data, and is passed by non-private data Transport to described second processor;
Described second processor is used for: all transmit the data needing transmission to described first processor, To be forwarded to described external equipment by described first processor.
Terminal the most according to claim 1, it is characterised in that also include:
First storage device, corresponding to described first processor, carries out private for described first processor The storage of ciphertext data;
Second storage device, corresponding to described second processor, carries out non-for described second processor The storage of private data.
Terminal the most according to claim 1, it is characterised in that also include:
Kind judging device, is arranged on the path between described external equipment and described first processor On, for the data from described external equipment are carried out type judgement, and according to judged result to institute State data and add corresponding mark;
Wherein, described first processor receive from the data of described kind judging device time, If the mark of these data represents that it is private data, the most directly process, if the mark of these data represents it For non-private data, then it is forwarded to described second processor.
Terminal the most according to any one of claim 1 to 3, it is characterised in that also wrap Include:
At least one first communication module, is respectively connecting to described first processor and described second and processes Device, for carrying out the mutual of private data with described first processor, and enters with described second processor Row non-private data mutual.
Terminal the most according to any one of claim 1 to 3, it is characterised in that also wrap Include:
At least one second communication module, is connected with described first processor and carries out data interaction;
Wherein, described first processor is to the private data from least one second communication module described Process, and the non-private data from least one second communication module described is transmitted to described Second processor processes.
CN201310325797.8A 2013-07-30 2013-07-30 A kind of terminal Active CN103390137B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310325797.8A CN103390137B (en) 2013-07-30 2013-07-30 A kind of terminal
PCT/CN2013/084354 WO2015014014A1 (en) 2013-07-30 2013-09-26 Terminal, data interaction method and data interaction system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310325797.8A CN103390137B (en) 2013-07-30 2013-07-30 A kind of terminal

Publications (2)

Publication Number Publication Date
CN103390137A CN103390137A (en) 2013-11-13
CN103390137B true CN103390137B (en) 2016-09-21

Family

ID=49534406

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310325797.8A Active CN103390137B (en) 2013-07-30 2013-07-30 A kind of terminal

Country Status (1)

Country Link
CN (1) CN103390137B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959153B (en) * 2018-08-01 2021-04-06 广州视源电子科技股份有限公司 All-in-one machine, data continuous transmission method, device, equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909446A (en) * 2005-08-04 2007-02-07 迪康公司 Process, device and computer program for data decryption by using host-processor and co-processor
CN101183413A (en) * 2007-12-14 2008-05-21 西安电子科技大学 Architecture of trusted platform module and method for providing service thereof
CN201766674U (en) * 2010-09-19 2011-03-16 公安部第一研究所 Digital video decoding system
CN102118393A (en) * 2011-01-21 2011-07-06 成都卫士通信息产业股份有限公司 Safety sensing convergence device for Internet of things
CN102685740A (en) * 2012-03-29 2012-09-19 公安部第三研究所 Short-distance wireless communication node and wireless communication method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE10136335B4 (en) * 2001-07-26 2007-03-22 Infineon Technologies Ag Processor with several arithmetic units
US7984301B2 (en) * 2006-08-17 2011-07-19 Inside Contactless S.A. Bi-processor architecture for secure systems

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1909446A (en) * 2005-08-04 2007-02-07 迪康公司 Process, device and computer program for data decryption by using host-processor and co-processor
CN101183413A (en) * 2007-12-14 2008-05-21 西安电子科技大学 Architecture of trusted platform module and method for providing service thereof
CN201766674U (en) * 2010-09-19 2011-03-16 公安部第一研究所 Digital video decoding system
CN102118393A (en) * 2011-01-21 2011-07-06 成都卫士通信息产业股份有限公司 Safety sensing convergence device for Internet of things
CN102685740A (en) * 2012-03-29 2012-09-19 公安部第三研究所 Short-distance wireless communication node and wireless communication method

Also Published As

Publication number Publication date
CN103390137A (en) 2013-11-13

Similar Documents

Publication Publication Date Title
TWI481213B (en) System and method for facilitating wireless communication
KR101769895B1 (en) User terminal device, Internet of Things control method, computer program and storage medium therefor
JP6842919B2 (en) Network connection method, hotspot terminal and management terminal
EP2933965B1 (en) Method, device and system for accessing network
US8630271B2 (en) Communication device, communication system, communication method and communication program
EP3007515B1 (en) Method, terminal, client and system for accessing wireless network
TW201330566A (en) System and method for facilitating wireless communication
WO2016045167A1 (en) Data transmission method, apparatus, and system
US9351140B2 (en) Special handling of certain types of communications
CA3157336A1 (en) Upper layer device architecture for ultra-wide band enabled device
CN105101465B (en) Wireless network configuration method and radio network configuration system
US20160112464A1 (en) Session transfer protocol between different browsers on different devices
CN106332070A (en) Secure communication method, device and system
US20230096370A1 (en) Cross platform credential sharing
US20190141047A1 (en) Vehicle network access control method and infotainment apparatus therefor
CN103400086B (en) A kind of terminal
WO2019000813A1 (en) Communication method and device
CN103390137B (en) A kind of terminal
CN103390142B (en) A kind of terminal
CN103400080B (en) A kind of terminal
CN103390136B (en) A kind of terminal
CN103400084B (en) A kind of terminal
CN103402199A (en) Terminal and safe data processing method
CN110392076B (en) Method, device and storage medium for vehicle-to-any V2X communication
US9319106B2 (en) Communicating with near field communication device in stopped state

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant