CN105528538B - The starting method and starter of terminal system - Google Patents

The starting method and starter of terminal system Download PDF

Info

Publication number
CN105528538B
CN105528538B CN201410515114.XA CN201410515114A CN105528538B CN 105528538 B CN105528538 B CN 105528538B CN 201410515114 A CN201410515114 A CN 201410515114A CN 105528538 B CN105528538 B CN 105528538B
Authority
CN
China
Prior art keywords
identification code
terminal
code
starting
card
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410515114.XA
Other languages
Chinese (zh)
Other versions
CN105528538A (en
Inventor
浠绘案
任永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Coolpad Software Technology Shenzhen Co Ltd
Original Assignee
Coolpad Software Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Coolpad Software Technology Shenzhen Co Ltd filed Critical Coolpad Software Technology Shenzhen Co Ltd
Priority to CN201410515114.XA priority Critical patent/CN105528538B/en
Publication of CN105528538A publication Critical patent/CN105528538A/en
Application granted granted Critical
Publication of CN105528538B publication Critical patent/CN105528538B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides the starting methods and starter of a kind of terminal system, the terminal includes the first system and second system, the starting method, it include: under the first system, if receiving the instruction for starting the second system, the identification code of the subscriber identification card in the terminal and/or the identification code of safe digital card are obtained;Judge whether the identification code of the subscriber identification card matches with the first identifier code for being stored in designated position, and/or judge whether the identification code of the safe digital card matches with the second identification code for being stored in the designated position, if so, starting the second system.Technical solution of the present invention can avoid the complicated processes for requiring user's participation in starting security system every time, facilitate the operation of user, be conducive to the experience for promoting user under the premise of ensuring second system safety.

Description

The starting method and starter of terminal system
Technical field
The present invention relates to field of terminal technology, in particular to the starting method and a kind of terminal of a kind of terminal system The starter of system.
Background technique
Currently, intelligent mobile terminal (such as smart phone) mainly passes through password when the starting for executing dual system, switching The mode of authorization ensures the safety issue of system.But the mode of password authorization belongs to the scheme of software protection, and software Usually there is following safety issue in the scheme of protection:
1) password of software design is easy by Brute Force;
2) it in bootstrap process, is easy to get password by hook program, so as to cause password leakage;
3) user requires input password in the starting of the system of execution, switching every time, causes user's operation cumbersome, influences User experience, certain customers may not enable cryptoguard to reduce the cumbersome of operation, the safety of terminal caused not have It ensures.
Therefore, under the premise of how ensuring security of system in the starting of system, switching, the operation of user is reduced Process becomes technical problem urgently to be resolved to promote the experience of user.
Summary of the invention
The present invention is based at least one above-mentioned technical problem, proposes a kind of starting scheme of new terminal system, So that avoiding requiring the cumbersome of user's participation in starting security system every time under the premise of ensuring second system safety Process facilitates the operation of user, is conducive to the experience for promoting user.
In view of this, the terminal includes the first system and the invention proposes a kind of starting method of terminal system Two system, the starting method, comprising: under the first system, if receiving the instruction for starting the second system, obtain Take the identification code of the subscriber identification card in the terminal and/or the identification code of safe digital card;Judge the user identity Whether the identification code of identification card matches with the first identifier code for being stored in designated position, and/or judges the safe digital card Identification code whether match with the second identification code for being stored in the designated position, if so, starting the second system.
In the technical scheme, the first system can be conventional system, and second system can be security system, due to SIM (Subscriber Identity Module, subscriber identification card) card and SD card (Secure Digital Memory Card, safe digital card) identification code be all it is unique, therefore, by obtaining when receiving the instruction of starting second system The identification code of the SIM card of terminal and/or the identification code of SD card, and by with the first identifier code for being stored in designated position and/or Second identification code is matched, and to start second system in successful match, makes it possible to ensure that the clean boot of second system. Simultaneously as being manually entered password without user, avoids and require user in starting security system every time in the prior art The complicated processes of participation facilitate the operation of user, are conducive to the experience for promoting user.
In the above-mentioned technical solutions, it is preferable that the designated position includes: cyberspace corresponding with the terminal; Then whether match with the first identifier code in the identification code for judging the subscriber identification card, and/or judges the peace Before the step of whether identification code of full digital code card matches with the second identification code, further includes: from the cyberspace Obtain the first identifier code and/or the second identification code.
In the technical scheme, due to be obtained from cyberspace corresponding with terminal above-mentioned first identifier code and/ Or second identification code, so even user can also be by modifying the first identifier stored in cyberspace in lost terminal And/or second identification code is inconsistent with the identification code of the identification code of the SIM card in terminal and/or SD card to ensure, Jin Ershi Now to the protection of second system, it is ensured that second system can not be started.
In the above-mentioned technical solutions, it is preferable that when starting the first system every time, and/or receiving starting institute When stating the instruction of second system, execution obtains the first identifier code and/or the second identification code from the cyberspace The step of.
In the technical scheme, by starting the first system every time and/or in the finger for receiving starting second system When enabling, first identifier code and/or second identification code are obtained from the corresponding cyberspace of terminal, so that matching every time in execution Cheng Shi can use newest matching key (i.e. first identifier code and/or second identification code), and then according to the demand of user Determine whether to start second system.
In the above-mentioned technical solutions, it is preferable that the designated position includes: the memory space of the terminal inner;Then institute State the starting method of terminal system further include: according to predetermined period or when the terminal connects network every time, from the end It holds and obtains the first identifier code and/or the second identification code in corresponding cyberspace, to update the memory space The first identifier code of middle storage and/or the second identification code.
In the technical scheme, terminal also can store the first identifier code and/or second got from cyberspace Identification code, when needing to start second system, directly to use first identifier code and/or the second identification code progress of storage Match, shortens the time for obtaining first identifier code and/or second identification code.Certainly, the first mark in order to ensure being stored in terminal Know code and/or second identification code is the actual demand of user, it can also be according to predetermined period or in connection network Shi Dougeng every time The first identifier code and/or second identification code stored in new terminal.
In the above-mentioned technical solutions, it is preferable that further include: when receiving the instruction for exiting the second system every time, It prompts the user whether to modify the first identifier code for being stored in the specified location and/or the second identification code.
In the technical scheme, by when exiting second system every time, prompting user's modification to be stored in above-mentioned specific bit The first identifier code and/or second identification code for setting (memory space in cyberspace or terminal), so that not needing to open in user When with second system, can time update enter the matching key (i.e. first identifier code and/or second identification code) of second system, And then ensure that terminal is used (such as lost terminal or maliciously being stolen by other people data of second system) Shi Wufa by other users Into second system, it is effectively protected the safety of second system.
According to the second aspect of the invention, it is also proposed that a kind of starter of terminal system, the terminal include first System and second system, the starter, comprising: first acquisition unit, for being opened if receiving under the first system The instruction of the second system is moved, then obtains the identification code and/or safe digital card of the subscriber identification card in the terminal Identification code;Judging unit, for judging the identification code of the subscriber identification card that the first acquisition unit is got Whether match with the first identifier code for being stored in designated position, and/or judge the safe digital card identification code whether with The second identification code for being stored in the designated position matches;Execution unit, for determining the user in the judging unit The identification code of identification card matches with the first identifier code, and/or determines the safe digital in the judging unit When the identification code of card and the second identification code match, start the second system.
In the technical scheme, the first system can be conventional system, and second system can be security system, due to SIM (Subscriber Identity Module, subscriber identification card) card and SD card (Secure Digital Memory Card, safe digital card) identification code be all it is unique, therefore, by obtaining when receiving the instruction of starting second system The identification code of the SIM card of terminal and/or the identification code of SD card, and by with the first identifier code for being stored in designated position and/or Second identification code is matched, and to start second system in successful match, makes it possible to ensure that the clean boot of second system. Simultaneously as being manually entered password without user, avoids and require user in starting security system every time in the prior art The complicated processes of participation facilitate the operation of user, are conducive to the experience for promoting user.
In the above-mentioned technical solutions, it is preferable that the designated position includes: cyberspace corresponding with the terminal; The starter of the terminal system, further includes: second acquisition unit, for judging the user identity in the judging unit Whether the identification code of identification card matches with the first identifier code, and/or judge the safe digital card identification code whether Before matching with the second identification code, the first identifier code and/or second mark are obtained from the cyberspace Know code.
In the technical scheme, due to be obtained from cyberspace corresponding with terminal above-mentioned first identifier code and/ Or second identification code, so even user can also be by modifying the first identifier stored in cyberspace in lost terminal And/or second identification code is inconsistent with the identification code of the identification code of the SIM card in terminal and/or SD card to ensure, Jin Ershi Now to the protection of second system, it is ensured that second system can not be started.
In the above-mentioned technical solutions, it is preferable that the second acquisition unit is specifically used for: starting first system every time When system, and/or when receiving the instruction for starting the second system, the first identifier code is obtained from the cyberspace And/or the second identification code.
In the technical scheme, by starting the first system every time and/or in the finger for receiving starting second system When enabling, first identifier code and/or second identification code are obtained from the corresponding cyberspace of terminal, so that matching every time in execution Cheng Shi can use newest matching key (i.e. first identifier code and/or second identification code), and then according to the demand of user Determine whether to start second system.
In the above-mentioned technical solutions, it is preferable that the designated position includes: the memory space of the terminal inner;It is described The starter of terminal system, further includes: updating unit, for connecting network every time according to predetermined period or in the terminal When, the first identifier code and/or the second identification code are obtained, from cyberspace corresponding with the terminal to update The first identifier code stored in the memory space and/or the second identification code.
In the technical scheme, terminal also can store the first identifier code and/or second got from cyberspace Identification code, when needing to start second system, directly to use first identifier code and/or the second identification code progress of storage Match, shortens the time for obtaining first identifier code and/or second identification code.Certainly, the first mark in order to ensure being stored in terminal Know code and/or second identification code is the actual demand of user, it can also be according to predetermined period or in connection network Shi Dougeng every time The first identifier code and/or second identification code stored in new terminal.
In the above-mentioned technical solutions, it is preferable that further include: prompt unit, for exiting described second in each receive When the instruction of system, prompt the user whether that modification is stored in the first identifier code of the specified location and/or described Second identification code.
In the technical scheme, by when exiting second system every time, prompting user's modification to be stored in above-mentioned specific bit The first identifier code and/or second identification code for setting (memory space in cyberspace or terminal), so that not needing to open in user When with second system, can time update enter the matching key (i.e. first identifier code and/or second identification code) of second system, And then ensure that terminal is used (such as lost terminal or maliciously being stolen by other people data of second system) Shi Wufa by other users Into second system, it is effectively protected the safety of second system.
By above technical scheme, so that avoiding under the premise of ensuring second system safety in each starting safety The complicated processes that user's participation is required when system, facilitate the operation of user, are conducive to the experience for promoting user.
Detailed description of the invention
Fig. 1 shows the schematic flow diagram of the starting method of terminal system according to an embodiment of the invention;
Fig. 2 shows the schematic block diagrams of the starter of terminal system according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of the starter of terminal system according to another embodiment of the invention;
Fig. 4 shows the schematic flow diagram of the starting method of terminal system according to another embodiment of the invention;
Fig. 5 shows the schematic flow diagram of the starting method of terminal system according to still another embodiment of the invention;
Fig. 6 shows the schematic flow diagram of the starting method of the terminal system of still another embodiment in accordance with the present invention.
Specific embodiment
To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.
In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the starting method of terminal system according to an embodiment of the invention.
Terminal of the present invention includes the first system and second system, as shown in Figure 1, an implementation according to the present invention The starting method of the terminal system of example, comprising: step 102, under the first system, if receiving the starting second system Instruction, then obtain the identification code of the subscriber identification card in the terminal and/or the identification code of safe digital card;Step 104, judge whether the identification code of the subscriber identification card matches with the first identifier code for being stored in designated position, and/ Or judge whether the identification code of the safe digital card matches with the second identification code for being stored in the designated position, if so, Then start the second system.
In the technical scheme, the first system can be conventional system, and second system can be security system, due to SIM (Subscriber Identity Module, subscriber identification card) card and SD card (Secure Digital Memory Card, safe digital card) identification code be all it is unique, therefore, by obtaining when receiving the instruction of starting second system The identification code of the SIM card of terminal and/or the identification code of SD card, and by with the first identifier code for being stored in designated position and/or Second identification code is matched, and to start second system in successful match, makes it possible to ensure that the clean boot of second system. Simultaneously as being manually entered password without user, avoids and require user in starting security system every time in the prior art The complicated processes of participation facilitate the operation of user, are conducive to the experience for promoting user.
In the above-mentioned technical solutions, it is preferable that the designated position includes: cyberspace corresponding with the terminal; Then whether match with the first identifier code in the identification code for judging the subscriber identification card, and/or judges the peace Before the step of whether identification code of full digital code card matches with the second identification code, further includes: from the cyberspace Obtain the first identifier code and/or the second identification code.
In the technical scheme, due to be obtained from cyberspace corresponding with terminal above-mentioned first identifier code and/ Or second identification code, so even user can also be by modifying the first identifier stored in cyberspace in lost terminal And/or second identification code is inconsistent with the identification code of the identification code of the SIM card in terminal and/or SD card to ensure, Jin Ershi Now to the protection of second system, it is ensured that second system can not be started.
In the above-mentioned technical solutions, it is preferable that when starting the first system every time, and/or receiving starting institute When stating the instruction of second system, execution obtains the first identifier code and/or the second identification code from the cyberspace The step of.
In the technical scheme, by starting the first system every time and/or in the finger for receiving starting second system When enabling, first identifier code and/or second identification code are obtained from the corresponding cyberspace of terminal, so that matching every time in execution Cheng Shi can use newest matching key (i.e. first identifier code and/or second identification code), and then according to the demand of user Determine whether to start second system.
In the above-mentioned technical solutions, it is preferable that the designated position includes: the memory space of the terminal inner;Then institute State the starting method of terminal system further include: according to predetermined period or when the terminal connects network every time, from the end It holds and obtains the first identifier code and/or the second identification code in corresponding cyberspace, to update the memory space The first identifier code of middle storage and/or the second identification code.
In the technical scheme, terminal also can store the first identifier code and/or second got from cyberspace Identification code, when needing to start second system, directly to use first identifier code and/or the second identification code progress of storage Match, shortens the time for obtaining first identifier code and/or second identification code.Certainly, the first mark in order to ensure being stored in terminal Know code and/or second identification code is the actual demand of user, it can also be according to predetermined period or in connection network Shi Dougeng every time The first identifier code and/or second identification code stored in new terminal.
In the above-mentioned technical solutions, it is preferable that further include: when receiving the instruction for exiting the second system every time, It prompts the user whether to modify the first identifier code for being stored in the specified location and/or the second identification code.
In the technical scheme, by when exiting second system every time, prompting user's modification to be stored in above-mentioned specific bit The first identifier code and/or second identification code for setting (memory space in cyberspace or terminal), so that not needing to open in user When with second system, can time update enter the matching key (i.e. first identifier code and/or second identification code) of second system, And then ensure that terminal is used (such as lost terminal or maliciously being stolen by other people data of second system) Shi Wufa by other users Into second system, it is effectively protected the safety of second system.
Fig. 2 shows the schematic block diagrams of the starter of terminal system according to an embodiment of the invention.
Terminal of the present invention includes the first system and second system, as indicated with 2, according to one embodiment of present invention Terminal system starter 200, comprising: first acquisition unit 202 is opened if receiving under the first system The instruction of the second system is moved, then obtains the identification code and/or safe digital card of the subscriber identification card in the terminal Identification code;Judging unit 204, for judging the subscriber identification card that the first acquisition unit 202 is got Whether identification code matches with the first identifier code for being stored in designated position, and/or judges the identification code of the safe digital card Whether match with the second identification code for being stored in the designated position;Execution unit 206, in the judging unit 204 The identification code and the first identifier code for determining the subscriber identification card match, and/or sentence in the judging unit 204 When the identification code of the fixed safe digital card and the second identification code match, start the second system.
In the technical scheme, the first system can be conventional system, and second system can be security system, due to SIM (Subscriber Identity Module, subscriber identification card) card and SD card (Secure Digital Memory Card, safe digital card) identification code be all it is unique, therefore, by obtaining when receiving the instruction of starting second system The identification code of the SIM card of terminal and/or the identification code of SD card, and by with the first identifier code for being stored in designated position and/or Second identification code is matched, and to start second system in successful match, makes it possible to ensure that the clean boot of second system. Simultaneously as being manually entered password without user, avoids and require user in starting security system every time in the prior art The complicated processes of participation facilitate the operation of user, are conducive to the experience for promoting user.
In the above-mentioned technical solutions, it is preferable that the designated position includes: cyberspace corresponding with the terminal; The starter 200 of the terminal system, further includes: second acquisition unit 208, for judging institute in the judging unit 204 Whether the identification code for stating subscriber identification card matches with the first identifier code, and/or judges the safe digital card Before whether identification code matches with the second identification code, obtained from the cyberspace first identifier code and/or The second identification code.
In the technical scheme, due to be obtained from cyberspace corresponding with terminal above-mentioned first identifier code and/ Or second identification code, so even user can also be by modifying the first identifier stored in cyberspace in lost terminal And/or second identification code is inconsistent with the identification code of the identification code of the SIM card in terminal and/or SD card to ensure, Jin Ershi Now to the protection of second system, it is ensured that second system can not be started.
In the above-mentioned technical solutions, it is preferable that the second acquisition unit 208 is specifically used for: starting described every time When one system, and/or when receiving the instruction for starting the second system, first mark is obtained from the cyberspace Know code and/or the second identification code.
In the technical scheme, by starting the first system every time and/or in the finger for receiving starting second system When enabling, first identifier code and/or second identification code are obtained from the corresponding cyberspace of terminal, so that matching every time in execution Cheng Shi can use newest matching key (i.e. first identifier code and/or second identification code), and then according to the demand of user Determine whether to start second system.
In the above-mentioned technical solutions, it is preferable that the designated position includes: the memory space of the terminal inner;It is described The starter of terminal system, further includes: updating unit 210, for connecting net every time according to predetermined period or in the terminal When network, the first identifier code and/or the second identification code are obtained, from cyberspace corresponding with the terminal with more The first identifier code stored in the new memory space and/or the second identification code.
In the technical scheme, terminal also can store the first identifier code and/or second got from cyberspace Identification code, when needing to start second system, directly to use first identifier code and/or the second identification code progress of storage Match, shortens the time for obtaining first identifier code and/or second identification code.Certainly, the first mark in order to ensure being stored in terminal Know code and/or second identification code is the actual demand of user, it can also be according to predetermined period or in connection network Shi Dougeng every time The first identifier code and/or second identification code stored in new terminal.
In the above-mentioned technical solutions, it is preferable that further include: prompt unit 212, for exiting described the receiving every time When the instruction of two system, prompt the user whether that modification is stored in the first identifier code and/or the institute of the specified location State second identification code.
In the technical scheme, by when exiting second system every time, prompting user's modification to be stored in above-mentioned specific bit The first identifier code and/or second identification code for setting (memory space in cyberspace or terminal), so that not needing to open in user When with second system, can time update enter the matching key (i.e. first identifier code and/or second identification code) of second system, And then ensure that terminal is used (such as lost terminal or maliciously being stolen by other people data of second system) Shi Wufa by other users Into second system, it is effectively protected the safety of second system.
Fig. 3 shows the schematic block diagram of the starter of terminal system according to another embodiment of the invention.
As shown in figure 3, the starter 300 of terminal system according to another embodiment of the invention, comprising:
Setup module 302 can read No. IMSI/CID after the module is by initialization SIM/SD card.User can be with By cloud Account Activation authentication functions, and can be saved the unique identifier read (IMSI/CID) code as authorization signaling In cloud account.Certainly, authorization signaling is also possible to by user oneself setting.The MEID that above-mentioned cloud account passes through mobile phone (Mobile Equipment Identifier) is bound with mobile phone.
Authentication module 304, user authenticate well signaling by cloud account setup, and after conventional system starting, can initialize SIM/SD card, and No. IMSI/CID is read, and matched with the authorization signaling saved in cloud account, successful match then runs peace Total system starting;It fails to match, then can not start security system.
Starting module 306 enables security system after authentication module 304 authenticates successfully;Failed authentication then prompts nothing Method enables security system.
Specific process flow can refer to Fig. 4.
Fig. 4 shows the schematic flow diagram of the starting method of terminal system according to another embodiment of the invention.
As shown in figure 4, the starting method of terminal system according to another embodiment of the invention, comprising:
Step 402, conventional system starts, and by cloud account setup authorization signaling, wherein conventional system starts and passes through Cloud account setup authorization signaling can be and meanwhile operation be also possible to not operate simultaneously.
Step 404, SIM/SD card is initialized.
Step 406, reading SIM/SD card authentication number, i.e., No. IMSI/CID.
Step 408, judge whether authentication number matches with authentication signaling, if so, thening follow the steps 410;Otherwise, step is executed Rapid 412.
Step 410, when determining that authentication number matches with authentication signaling, security system is enabled.
Step 412, when determining that authentication number is mismatched with authentication signaling, unauthorized is prompted, security system can not be started.
Technical solution of the present invention can be exemplified below two kinds of application scenarios therein there are many application scenarios.
Application scenarios one:
After the SIM/SD card of mobile phone takes out, if reloading SIM/SD card, reflected by the identification code to SIM/SD Power can be made whether starting security system.
Specific flow chart can be as shown in Figure 5.
As shown in figure 5, the starting method of terminal system according to still another embodiment of the invention, comprising:
Step 502, start conventional system.
Step 504, No. IMSI/CID for reading SIM/SD card.
Step 506, judge whether to enable security system, if so, thening follow the steps 510;Otherwise, step 508 is executed.
Step 508, when determining not enable security system, normal operating conventional system.
Step 510, determine enable security system when, judge authenticate signaling whether successful match, if so, thening follow the steps 512;Otherwise, step 514 is executed.
Step 512, when determining to authenticate signaling successful match, start security system.
Step 514, when it fails to match for judgement authentication signaling, prompt can not enable security system.
In this application, if taking out the mobile phone lending of SIM/SD card or losing, other users can not necessarily start safety System.
Application scenarios two:
Mobile phone and SIM/SD card are lent or are lost simultaneously, can authenticate signaling by cloud account setup, ensure data to reach The purpose of safety.
Specific flow chart can be as shown in Figure 6.
As shown in fig. 6, the starting method of the terminal system of still another embodiment in accordance with the present invention, comprising:
Step 602, start conventional system, and by cloud Account Activation authentication functions, that is, pass through cloud account setup authentication letter It enables.
Step 604, No. IMSI/CID for reading SIM/SD card.
Step 606, judge whether to enable security system, if so, thening follow the steps 610;Otherwise, step 608 is executed.
Step 608, when determining not enable security system, normal operating conventional system.
Step 610, determine enable security system when, judge authenticate signaling whether successful match, if so, thening follow the steps 612;Otherwise, step 614 is executed.
Step 612, when determining to authenticate signaling successful match, start security system.
Step 614, when it fails to match for judgement authentication signaling, prompt can not enable security system, and execute step 616.
Step 616, judge whether the IMSI/CID of cloud account updates, if so, thening follow the steps 610;Otherwise, it continues to execute Step 614.It should be noted that can be set one judges number, if whether the IMSI/CID to cloud account updates judgement Pre-determined number (such as 3 times) does not update still, then is no longer judged.
The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, it is contemplated that current intelligent mobile terminal (such as intelligence Energy mobile phone) when the starting for executing dual system, switching, ensure that the safety of system is asked mainly by way of password authorization Topic.But the mode of password authorization belongs to the scheme of software protection, and usually there are a variety of safeties and ask in the scheme of software protection Topic.Therefore, the invention proposes a kind of starting schemes of new terminal system, so that in the premise for ensuring second system safety Under, the complicated processes for requiring user's participation in starting security system every time are avoided, the operation of user is facilitated, is conducive to mention Rise the experience of user.
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (8)

1. a kind of starting method of terminal system, the terminal include the first system and second system, which is characterized in that described to open Dynamic method, comprising:
Under the first system, if receiving the instruction for starting the second system, user's body in the terminal is obtained Part identification code of identification card and/or the identification code of safe digital card;
Judge whether the identification code of the subscriber identification card matches with the first identifier code for being stored in designated position, and/ Or judge whether the identification code of the safe digital card matches with the second identification code for being stored in the designated position, if so, Then start the second system;
When receiving the instruction for exiting the second system every time, prompt the user whether that modification is stored in the designated position The first identifier code at place and/or the second identification code.
2. the starting method of terminal system according to claim 1, which is characterized in that the designated position includes: and institute State the corresponding cyberspace of terminal;
Then whether match with the first identifier code in the identification code for judging the subscriber identification card, and/or judges institute Before stating the step of whether the identification code of safe digital card matches with the second identification code, further includes:
The first identifier code and/or the second identification code are obtained from the cyberspace.
3. the starting method of terminal system according to claim 2, which is characterized in that
When starting the first system every time, and/or when receiving the instruction for starting the second system, execute from described The step of first identifier code and/or the second identification code are obtained in cyberspace.
4. the starting method of terminal system according to claim 1, which is characterized in that the designated position includes: described The memory space of terminal inner;
The then starting method of the terminal system further include:
According to predetermined period or when the terminal connects network every time, obtained from cyberspace corresponding with the terminal The first identifier code and/or the second identification code, with update the first identifier code stored in the memory space and/ Or the second identification code.
5. a kind of starter of terminal system, the terminal include the first system and second system, which is characterized in that described to open Dynamic device, comprising:
First acquisition unit, for if receiving the instruction for starting the second system, obtaining institute under the first system State the identification code of the subscriber identification card in terminal and/or the identification code of safe digital card;
Judging unit, for judge the subscriber identification card that the first acquisition unit is got identification code whether with The first identifier code for being stored in designated position matches, and/or judge the safe digital card identification code whether be stored in The second identification code of the designated position matches;
Execution unit, for determining the identification code and the first identifier code of the subscriber identification card in the judging unit Match, and/or when the judging unit determines that the identification code of the safe digital card and the second identification code match, Start the second system;
Prompt unit, for when receiving the instruction for exiting the second system every time, prompting the user whether modification storage In the first identifier code of the specified location and/or the second identification code.
6. the starter of terminal system according to claim 5, which is characterized in that the designated position includes: and institute State the corresponding cyberspace of terminal;
The starter of the terminal system, further includes:
Second acquisition unit, for judging the identification code of the subscriber identification card whether with described in the judging unit One identification code matches, and/or before judging whether the identification code of the safe digital card matches with the second identification code, The first identifier code and/or the second identification code are obtained from the cyberspace.
7. the starter of terminal system according to claim 6, which is characterized in that the second acquisition unit is specifically used In:
When starting the first system every time, and/or when receiving the instruction for starting the second system, from the network The first identifier code and/or the second identification code are obtained in space.
8. the starter of terminal system according to claim 5, which is characterized in that the designated position includes: described The memory space of terminal inner;
The starter of the terminal system, further includes:
Updating unit, for according to predetermined period or when the terminal connects network every time, from corresponding with the terminal The first identifier code and/or the second identification code are obtained in cyberspace, to update the institute stored in the memory space State first identifier code and/or the second identification code.
CN201410515114.XA 2014-09-28 2014-09-28 The starting method and starter of terminal system Active CN105528538B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410515114.XA CN105528538B (en) 2014-09-28 2014-09-28 The starting method and starter of terminal system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410515114.XA CN105528538B (en) 2014-09-28 2014-09-28 The starting method and starter of terminal system

Publications (2)

Publication Number Publication Date
CN105528538A CN105528538A (en) 2016-04-27
CN105528538B true CN105528538B (en) 2019-06-11

Family

ID=55770759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410515114.XA Active CN105528538B (en) 2014-09-28 2014-09-28 The starting method and starter of terminal system

Country Status (1)

Country Link
CN (1) CN105528538B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109960536B (en) * 2019-03-27 2021-09-14 联想(北京)有限公司 Electronic equipment safety starting method and device and electronic equipment
CN114077453A (en) * 2020-08-04 2022-02-22 成都鼎桥通信技术有限公司 Starting method and device of application system and terminal

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method
CN102289622A (en) * 2011-09-01 2011-12-21 西安电子科技大学 Trusted startup method based on authentication policy file and hardware information collection
CN202870831U (en) * 2012-08-20 2013-04-10 潘力 Novel computer and networking certification system
CN103164644A (en) * 2011-12-19 2013-06-19 联想(北京)有限公司 Terminal device and starting machine controlling method thereof
CN103353931A (en) * 2012-02-14 2013-10-16 杰纳斯技术股份有限公司 Security-enhanced computer systems and methods
CN103713915A (en) * 2012-09-29 2014-04-09 联想(北京)有限公司 System starting method and electronic equipment
CN103886267A (en) * 2012-12-20 2014-06-25 联想(北京)有限公司 Method, device, chip and computer mainboard for isolating and switching internal and external network and computer

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1755572A (en) * 2004-09-30 2006-04-05 联想(北京)有限公司 Computer security startup method
CN102289622A (en) * 2011-09-01 2011-12-21 西安电子科技大学 Trusted startup method based on authentication policy file and hardware information collection
CN103164644A (en) * 2011-12-19 2013-06-19 联想(北京)有限公司 Terminal device and starting machine controlling method thereof
CN103353931A (en) * 2012-02-14 2013-10-16 杰纳斯技术股份有限公司 Security-enhanced computer systems and methods
CN202870831U (en) * 2012-08-20 2013-04-10 潘力 Novel computer and networking certification system
CN103713915A (en) * 2012-09-29 2014-04-09 联想(北京)有限公司 System starting method and electronic equipment
CN103886267A (en) * 2012-12-20 2014-06-25 联想(北京)有限公司 Method, device, chip and computer mainboard for isolating and switching internal and external network and computer

Also Published As

Publication number Publication date
CN105528538A (en) 2016-04-27

Similar Documents

Publication Publication Date Title
US20120149331A1 (en) Method and system for remote control of smart card
CN104821031B (en) Bluetooth cellular phone intelligent lock control system dynamic confirming method
CN107832670B (en) Face recognition method and related product
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
JP6129325B2 (en) Method, system, and terminal for encrypting and decrypting application program in communication terminal
EP2530964B1 (en) Method and device for terminal network locking
CN105553928B (en) Communication method, device and system based on biological feature recognition
CN103188668A (en) Security protection method and security protection system for mobile terminal application
TW201816648A (en) Business realization method and apparatus
WO2011003304A1 (en) Phone-card locking method and device for wireless communication
CN108156601A (en) A kind of method and device of locking SIM card
CN108809982B (en) Secret-free authentication method and system based on trusted execution environment
CN105528538B (en) The starting method and starter of terminal system
CN108696870A (en) A kind of mobile terminal authentication method based on SWP-SIM technologies
KR101417025B1 (en) Method for removable element authentication in an embedded system
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
CN104038615A (en) Authentication method and authentication device of communication device
CN105678149B (en) A kind of unlocking method and terminal
US10841797B2 (en) Method for generating and injecting SIMLOCK password and device for the same
CN107154999B (en) Terminal and unlocking method and storage device based on environmental information
CN109636983A (en) A kind of access control method, device and access control system
CN104134025B (en) Mobile terminal locking method, device and mobile terminal based on SIM card
CN107463815A (en) Method for authenticating and device
CN104838680B (en) Implementation method, system and the communication terminal of virtual user identifying card
KR100950662B1 (en) A method of certifying smart card for Identification Module using Network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant