Data access method, data access system and terminal

A data access and terminal technology, which is applied in the field of data access and data access systems, can solve the problems of wasting storage space, weakening the use of multi-domain and multi-space, unfavorable application data sharing, etc., and achieve the effect of realizing sharing and avoiding completion of sharing

Inactive Publication Date: 2016-06-01
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Although this resource isolation technology can effectively protect the user's private data, since the areas accessed by processes in different spaces are strictly isolated in the data partition, although it can ensure that applications in different spaces run in the system at the same time without affecting each other, It is not conducive to data sharing between applications in different spaces. In addition, when the same application is installed in each space domain, each space domain will save the relevant data of the application, resulting in waste of storage space and weakening the multi-domain Use of multiple spaces

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data access method, data access system and terminal
  • Data access method, data access system and terminal
  • Data access method, data access system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Such as Figure 6 As shown in , enter the fingerprint entry interface according to the prompt, select the finger to be entered, such as the left middle finger, and perform fingerprint entry. When the fingerprint entry is successful, access to the specified data in another spatial domain is allowed.

Embodiment 2

[0074] Such as Figure 7 As shown, enter the voice recording interface according to the prompt, and record the voice according to the prompt "Please record the voice". After the recording is completed, click OK to start the matching process with the preset voice information. access.

Embodiment 3

[0076] Such as Figure 8 As shown in Figure 1, using the built-in camera of the mobile terminal, when the user is close to the camera and one eye is completely displayed in the image, the iris information of the user is collected as biometric information. When the user keeps a certain distance from the camera and the user's face is When in the lens, take a frontal photo of the user, collect the image, match the collected iris information or face picture with the preset information, and allow access to specified data in another spatial domain after the matching is successful.

[0077] The technical solution of the present invention has been described in detail above in conjunction with the accompanying drawings, considering the technical problem of how to design a new multi-user domain data access solution to improve the fluency and security of the operating system proposed in the related art. The present invention proposes a new data access scheme, wherein the first type of sp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data access method, a data access system and a terminal. The data access method comprises the steps that when it is detected that any application program of the terminal sends out a call request for accessing designated data, whether the application program runs in the first-class space domain or the second-class space domain is judged; when it is determined that the application program runs in the second-class space domain, biological feature information of a user is obtained; whether the biological feature information is matched with preset biological feature information or not is judged; when it is determined that the biological feature information is matched with the preset biological feature information, the application program is allowed to access the designated data. According to the technical scheme, private data of the same application program in the different space domains can be stored in the safe domain (namely the first-class space domain), and the storage space of the terminal is saved; meanwhile, due to the matching of the user biological feature information and the preset biological feature information, the running efficiency of the application program is improved, and user private information is effectively protected.

Description

technical field [0001] The present invention relates to the field of terminals, in particular to a data access method, a data access system and a terminal. Background technique [0002] In related technologies, the multi-domain and multi-space technology is a resource isolation technology based on the Android multi-user mechanism. Applications in different domains or spaces are relatively independent, that is, the same application can exist in different space domains. , these applications are application processes generated by the same apk (abbreviation of Android Package, that is, Android installation package), and they can run in the system at the same time without affecting each other. Through isolation technology, there is a resource directory and an application in each space Directories, they all share the data partition of the system, but are isolated from each other, that is, applications or processes in different spaces cannot access resource directories or applicati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/62
CPCG06F21/32G06F21/6245
Inventor 刘东海吴殿清汪智勇
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products