Data processing method and device, equipment and machine readable medium

A data processing and processor technology, applied in the computer field, can solve problems such as file leakage, achieve the effect of improving security and reducing the risk of key leakage

Pending Publication Date: 2020-07-10
BANMA ZHIXING NETWORK HONGKONG CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when the mobile device is maliciously invaded and obtained permissions, the malicious process can use the obtained per

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, equipment and machine readable medium
  • Data processing method and device, equipment and machine readable medium
  • Data processing method and device, equipment and machine readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] refer to figure 1 , shows a flow chart of the steps of Embodiment 1 of a data processing method of the present application, the device to which the method is applied is loaded with a first operating system and a second operating system; wherein, the first operating system corresponds to the first execution Environment, the namespace of the first operating system includes: files; the second operating system corresponds to a second execution environment, and the second operating system stores a key corresponding to the file; the method may specifically Including the following steps:

[0075] Step 101. Send a file processing request to the second operating system; the file processing request can be used to process the file, and the processing can specifically include: encryption processing or decryption processing;

[0076] Step 102, receiving a processing result returned by the second operating system.

[0077] figure 1 At least one step included in the illustrated met...

Embodiment 2

[0101] refer to figure 2 , shows a flow chart of the steps of Embodiment 2 of a data processing method of the present application, the device to which the method is applied may be loaded with a first operating system and a second operating system; wherein, the first operating system may correspond to the second operating system An execution environment, the namespace of the first operating system may include: a file; the second operating system may correspond to a second execution environment, and a key corresponding to the file may be stored in the second operating system;

[0102] The method may specifically include the following steps:

[0103] Step 201: Receive a file processing request sent by the first operating system; the file processing request can be used to process the file, and the processing can specifically include: encryption processing or decryption processing;

[0104] Step 202, process the file processing request to obtain a processing result;

[0105] Ste...

Embodiment 3

[0117] refer to image 3 , shows a flow chart of steps in Embodiment 3 of a data processing method of the present application, the device to which the method is applied may be loaded with a first operating system and a second operating system; wherein, the first operating system may correspond to the second operating system An execution environment, the namespace of the first operating system may include: a file; the second operating system may correspond to a second execution environment, and a key corresponding to the file may be stored in the second operating system;

[0118] The method may specifically include the following steps:

[0119] Step 301, the first operating system sends a decryption request to the second operating system; the decryption request may correspond to an encrypted image file;

[0120] Step 302, the second operating system decrypts the encrypted image file, and sends the decryption result to the first operating system; the decryption result may inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data processing method and device and a machine readable medium. Equipment applied to the method is loaded with a first operating system and a second operating system. The first operating system corresponds to a first execution environment, and a namespace of the first operating system comprises a file. The second operating system corresponds to a secondexecution environment, and a secret key corresponding to the file is stored in the second operating system. According to the embodiment of the invention, the file security can be improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a data processing method, a data processing device, a device and a machine-readable medium. Background technique [0002] With the popularity of mobile devices and the development of the mobile Internet, mobile devices have become portable electronic devices integrating communication, payment and entertainment functions. At present, personal data such as users' chat records, payment tool passwords, and bank card information are stored on mobile devices; whether these data stored on mobile devices are safe or not has become an issue of increasing concern to users. [0003] A related technology has an FDE (Full Disk Encryption) function. When the FDE function is enabled, all data written to the disk needs to be encrypted first, and all data read needs to be decrypted first. [0004] A related technology has an FBE (File Based Encryption) function. When the FBE fu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/78
CPCG06F21/602G06F21/78G06F2221/2107
Inventor 李诚许来光
Owner BANMA ZHIXING NETWORK HONGKONG CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products