CN108235766B - Terminal device control method and terminal device - Google Patents

Terminal device control method and terminal device Download PDF

Info

Publication number
CN108235766B
CN108235766B CN201780002579.7A CN201780002579A CN108235766B CN 108235766 B CN108235766 B CN 108235766B CN 201780002579 A CN201780002579 A CN 201780002579A CN 108235766 B CN108235766 B CN 108235766B
Authority
CN
China
Prior art keywords
detection
terminal device
domain
data
terminal equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780002579.7A
Other languages
Chinese (zh)
Other versions
CN108235766A (en
Inventor
骆磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Cloudoptek Technology Co ltd
Original Assignee
Cloudminds Shenzhen Holdings Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloudminds Shenzhen Holdings Co Ltd filed Critical Cloudminds Shenzhen Holdings Co Ltd
Publication of CN108235766A publication Critical patent/CN108235766A/en
Application granted granted Critical
Publication of CN108235766B publication Critical patent/CN108235766B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/62Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light
    • G01N21/63Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light optically excited
    • G01N21/65Raman scattering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Pathology (AREA)
  • Immunology (AREA)
  • Bioethics (AREA)
  • Biochemistry (AREA)
  • Chemical & Material Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Telephone Function (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A control method of terminal equipment and the terminal equipment relate to the field of information processing. The embodiment of the application can ensure the data security and the security of using the terminal equipment when the substance detection function is integrated on the terminal equipment. The method comprises the following steps: the terminal equipment acquires an entry instruction; entering a detection domain according to an entering instruction; and performing substance detection on the substance to be detected in the detection domain and acquiring a detection result, wherein data generated by the terminal equipment in the detection domain is isolated from data generated in other working domains of the terminal equipment. The application is applied to control of the terminal equipment.

Description

Terminal device control method and terminal device
Technical Field
The present application relates to the field of information processing, and in particular, to a control method for a terminal device and a terminal device.
Background
In the prior art, in the detection of a substance, it is usually performed by a special detection device, such as a raman detector that detects the substance by using raman spectroscopy. With the technological progress, the special detection equipment can be made smaller and smaller, the cost can be gradually reduced, and the equipment can gradually enter the consumer market for detecting pesticide residues, true and false wine and other functions in daily life. In addition, due to the rapid development of the mobile internet technology, a detection module for detecting substances and other terminal devices such as a mobile network terminal can be integrated on one device in the future, so that an operator can complete detection more conveniently.
However, the inventor of the present application has found that at least the following problems exist when the substance detection module is integrated with other terminal devices in the prior art: 1. data security issues. In the process of detecting substances, special processing is usually required to be performed on the collected data to obtain a detection result, and algorithms, databases, detected substance information and the like involved in the process are data which need to be kept secret. The risk of data leakage exists when the mobile network terminal is placed in the mobile network terminal. 2. The problem of safety in use. Since the detection is usually performed by means of emitting laser light, etc., when the detection is performed by misoperation or network attack, etc., the triggering of these functions may cause damage to surrounding articles or hurt human body.
Disclosure of Invention
The embodiment of the invention provides a control method of terminal equipment and the terminal equipment, which are mainly used for solving the problems of data leakage and false triggering of a detection function caused by network attack and misoperation of an operator when a substance detection function is integrated on other terminal equipment.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, an embodiment of the present invention provides a method for controlling a terminal device, including: the terminal equipment acquires an entry instruction; entering a detection domain according to an entering instruction; and performing substance detection on the substance to be detected in the detection domain and acquiring a detection result, wherein data generated by the terminal equipment in the detection domain is isolated from data generated in other working domains of the terminal equipment.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes at least two working domains, where the at least two working domains include a detection domain; in the detection domain, the terminal equipment installs an application according to the push information of the management and control platform; the terminal device further includes: an acquisition unit for acquiring an entry instruction; the control unit is used for controlling the terminal equipment to enter the detection domain according to the entering instruction after the obtaining unit obtains the entering instruction; and the detection unit is used for performing substance detection on the substance to be detected in the detection domain after the control unit controls the terminal equipment to enter the detection domain.
In a third aspect, an embodiment of the present invention provides a terminal device, including: a communication interface, a memory for storing computer executable code for controlling the processor to perform the method of controlling a terminal device as provided by the embodiments of the first aspect described above, and a processor.
In a fourth aspect, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for a terminal device, which includes program codes designed to execute the method for controlling the terminal device provided in the embodiment of the first aspect.
In a fifth aspect, an embodiment of the present invention provides a computer program, which is directly loadable into an internal memory of a computer and contains a software code, and the computer program can be loaded into and executed by the computer to implement the control method of the terminal device provided in the embodiment of the first aspect.
The terminal equipment is divided into a plurality of working domains, and a detection domain which is isolated from data of other working domains is set for material detection in the working domains. The data generated in the detection domain and the data generated in other working domains are isolated from each other, namely the detection data acquired in the material detection process and the data generated in the process of processing the detection data are isolated from the data generated in the other working domains, so that the detection data can be prevented from being accessed by the applications in the other working domains, and the detection data cannot be leaked when the applications in the other working domains exist at backdoors or are attacked by viruses and trojans in the other working domains. In addition, since the terminal device performs material detection in the detection domain, applications in other working domains cannot call devices such as a laser emission lens used for detecting materials, and further, the devices such as the laser emission lens cannot be started when the applications in other working domains are cracked or attacked. Meanwhile, the terminal equipment in the application can enter the detection domain according to the entering instruction after acquiring the entering instruction, so that the possibility that an operator mistakenly enters the detection domain to perform misoperation on the detection function in the detection domain is reduced, and the safety of the terminal equipment in use is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a control method of a terminal device according to an embodiment of the present invention;
fig. 2 is an exemplary diagram of a specific implementation process of a terminal device control method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a control method of a terminal device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As used in this application, the terms "unit," "component," "module," "system," and the like are intended to refer to a computer-related entity, either hardware, firmware, a combination of hardware and software, or software in execution. For example, a component may be, but is not limited to being: a process running on a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of example, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. In addition, these components can execute from various computer readable media having various data structures thereon. The components may communicate by way of local and/or remote processes such as in accordance with a signal having one or more data packets (e.g., data from one component interacting with another component in a local system, distributed system, and/or across a network such as the internet with other systems by way of the signal).
This application is intended to present various aspects, embodiments or features around a system that may include a number of devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules etc. discussed in connection with the figures. Furthermore, a combination of these schemes may also be used.
Additionally, in embodiments of the present invention, the term "exemplary" is used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, the term using examples is intended to present concepts in a concrete fashion.
In the embodiment of the present invention, information (information), signal (signal), message (message), and channel (channel) may be mixed, and it should be noted that the intended meanings are consistent when the differences are not emphasized. "of", "corresponding", and "corresponding" may sometimes be used in combination, it being noted that the intended meaning is consistent when no distinction is made.
The service scenario described in the embodiment of the present invention is for more clearly illustrating the technical solution of the embodiment of the present invention, and does not form a limitation on the technical solution provided in the embodiment of the present invention, and it can be known by a person skilled in the art that with the occurrence of a new service scenario, the technical solution provided in the embodiment of the present invention is also applicable to similar technical problems.
The technical skill related to the present application is described as follows:
the virtualization technology is a resource management technology, mainly transparentizes bottom-layer physical hardware by abstracting and converting various entity resources of a computer, such as computing capacity, storage capacity and the like, and then presents the bottom-layer physical hardware to a user in a virtual machine mode.
Currently, in the field of terminal devices, a virtualization technology can isolate a terminal device into multiple separate operating environments, and isolate applications and stored data installed in each operating environment from each other, that is, separate different domains in the terminal device. Specifically, virtualization of terminal devices can be divided into three categories:
first, underlying virtualization. Full isolation from the operating system kernel to the runtime environment can be achieved in the underlying virtualization. And providing virtual machines to an upper layer on the basis of a microkernel mechanism on the hardware, wherein a complete operating system runs inside the virtual machines, and the virtual machines are independent and invisible. The scheme can be simply understood as follows: a combination of virtual machine + multi-operating system kernel + multi-operating system. The method is characterized in that: good isolation and high implementation difficulty.
Second, system virtualization. The system virtualization is to realize the isolation of multiple systems based on a container mechanism in an operating system kernel layer, the multiple operating systems are independent and invisible, and the scheme is simply understood as follows: operating system kernel + multiple operating systems combination. The method is characterized in that: the isolation is moderate, and the realization difficulty is small.
Third, framework virtualization. The framework virtualization is to realize the isolation of application environments based on an operating system multi-user mechanism at a system framework layer, wherein multiple sets of application environments are isolated from each other. This solution can be understood as: a combination of operating system kernel + operating system + multi-user environment. The method is characterized in that: the isolation is poor, and the realization difficulty is low.
In the present application, the detection domain and other working domains are different operating environments partitioned in the terminal device by using the virtualization technology.
The method and the terminal device are applied to a scene for controlling the terminal device when the function for detecting the substance is integrated on the terminal device. For example, a raman substance detection function is integrated into a terminal device to enable raman detection of a substance by the terminal device.
The embodiment of the application provides a control method of a terminal device, wherein a detection domain which is isolated from data of other working domains is arranged in the terminal device, so that the effect of protecting the safety of detection data and the like can be realized by a method of entering the detection domain and executing a detection task in the detection domain when the terminal device is used for detecting the material. As shown in fig. 1, the method comprises the steps of:
s101, the terminal equipment acquires unlocking information in a locking state. The unlocking information includes identity authentication information of an operator.
Specifically, the unlocking information may include biological information of the operator, such as fingerprint, iris, and the like, and the unlocking information may further include information capable of verifying the identity of the operator, such as an account password, and the like.
And S102, unlocking the terminal equipment after the identity of the operator is authenticated.
S103, the terminal equipment acquires an entering instruction.
Specifically, the terminal device generates an entry instruction after passing the identity authentication of the operator according to the unlocking information and unlocking the terminal device, so as to enter the detection domain according to the entry instruction.
In the application, before entering the detection domain, the operator accessing the detection domain is limited by authenticating the identity authentication information of the operator. The method and the device avoid anyone to access the detection domain, reduce the possibility that the operator enters the detection domain by mistake to carry out misoperation on the detection function in the detection domain, and improve the safety of the detection domain.
In one implementation, before the terminal device acquires the unlocking information in the locked state, the method further includes: and receiving a starting-up instruction, starting up according to the starting-up instruction, and entering a locking state after starting up.
In this embodiment, the terminal device may directly enter the locked state after being powered on, and then enter the detection domain by performing the above steps S101 to S103. Therefore, the terminal equipment enters the detection domain after the terminal equipment is started and acquires correct unlocking information, and an operator can directly start a substance detection task of a substance to be detected conveniently. Furthermore, after the identity of the operator is authenticated once when the system is started up every time, the identity of the operator can be directly acquired according to the operation of the operator to enter the detection domain without being authenticated again when the operator enters the detection domain next time, so that the repeated operation of the operator is avoided.
It should be noted that, the above-mentioned steps S101 to S102 are optional steps, and in some cases, when the terminal device can obtain the entry instruction by other means, the steps S101 to S102 may not be executed. For example, the terminal device may acquire the entry instruction by receiving an entry instruction triggered by an operator.
And S104, entering a detection domain according to the entering command.
And S105, detecting the substance to be detected in the detection domain and acquiring the detection result.
Wherein, the data generated by the terminal device in the detection domain and the data generated by the terminal device in other working domains are isolated from each other.
In one embodiment, in the process of detecting the substance, the terminal device detects the substance to be detected through a predetermined detection application. Further, in order to facilitate the detection of the substance to be detected by the operator, the method further comprises: after entering the detection domain, the detection application is opened.
For example, the detection application may be set to a Launcher (desktop Launcher) of the detection domain, so that the detection application directly serves as a desktop UI (User Interface) of the detection domain. And directly opening the detection application by starting the desktop mode after the terminal equipment enters the detection domain. In this embodiment, after entering the detection domain, the operator does not need to input an operation instruction to open the detection application, and the terminal device can automatically open the detection application, so that the operator can directly perform substance detection through the detection application, and the use experience of the operator is improved.
Further, before opening the detection application, the method may further include: obtaining recommendation information of the management and control platform, obtaining an installation package of the detection application according to the recommendation information, and installing the detection application according to the installation package.
In this embodiment, in order to ensure the security of information in the detection domain, the application installation in the detection domain is limited by a manner of installing the detection application by obtaining push information of the management and control platform. Therefore, the problem that the possibility that the detection domain is attacked maliciously is increased due to the fact that other applications which are not authenticated by the control platform are installed in the detection domain is solved. For example, basic applications such as settings, cameras, galleries, clocks, calendars, notepads, recorders, flashlights and calculators can be included in the detection domain, and when new applications need to be added in the detection domain, the applications must be installed through the recommendation information of the management and control platform. Therefore, the installation of the application such as a browser, an instant chat tool and the like in the detection domain can be prevented in this way, and the safety of the application in the detection domain is ensured.
In addition, in the process of performing substance detection on the substance to be detected and acquiring the detection result, specifically taking raman detection as an example, the terminal device calls a laser emission device in the detection domain to acquire raman spectrum data of the substance to be detected. And then, calling a Raman preprocessing algorithm to carry out background subtraction, filtering and denoising, substrate deduction, normalization and other processing on the acquired Raman spectrum data. And then, analyzing the preprocessed data by calling a Raman detection algorithm, specifically, matching the preprocessed Raman spectrum data and acquiring an analysis result by a Raman neural network matching algorithm based on a calibrated Raman spectrum database.
Considering that confidential data may be involved in processing the collected detection data with the relevant algorithm, for example, in the above example, the raman preprocessing algorithm, the detection algorithm, the raman spectrum database, and the spectrum and name of the detected substance on the collected data may be contents to be kept secret. In another embodiment provided by the present application, step S105 specifically includes:
s105, collecting detection data of the substance to be detected 105 a.
For example, in a raman detection process, raman spectral data is collected.
S105, 105b, sending the detection data to the data processing device, so that the data processing device can obtain the detection result according to the detection data.
For example, the collected raman spectrum data is sent to a server or other cloud devices for data processing through the internet. And then calling a Raman preprocessing algorithm, a Raman neural network matching algorithm and a Raman spectrum database in the server to process and analyze the acquired Raman spectrum data and obtain a detection result. And finally, feeding back the obtained detection result to the terminal equipment.
S105, 105c, receiving the detection result sent by the data processing equipment.
In the embodiment, the terminal device sends the detection data to the data processing device after acquiring the detection data, and the data processing device performs specific data processing, so that the risk of information leakage caused by storing information such as an algorithm and a database for data processing in the terminal device is avoided.
Further, in order to ensure data security when data is transmitted between the terminal device and the data processing device, in an embodiment, the method further includes:
and when the terminal equipment enters the detection domain, switching the SIM card corresponding to the detection domain into a main card of the terminal equipment so as to send the detection data to the data processing equipment by using the SIM card corresponding to the detection domain.
For example, a function option of "cut the domain or not cut the card" is added to the setting of the terminal device. When the option is opened, when the terminal device detects that the SIM card enters the detection domain, the appointed SIM card is switched to the main card of the terminal device. And then the SIM card is utilized to send the detection data to the data processing equipment.
In another embodiment, the method further comprises:
receiving a connection instruction in a detection domain; the connection instruction is used for instructing the terminal equipment to connect the wireless local area network. And judging whether the wireless local area network is a network in the network white list, if so, connecting the terminal equipment to the wireless local area network according to the connection instruction so as to send the detection data to the data processing equipment by using the wireless local area network.
S106, in the detection domain, receiving the notification message. And displaying prompt information to the operator according to the notification message. And when receiving an opening instruction, switching from the detection domain to other work domains corresponding to the notification message and opening the notification message.
The opening instruction comprises an instruction of opening a notification message triggered by the operator according to the prompt message.
For example, when the terminal device is in the detection domain, if there is an incoming call, a short message or other notification information at this time. The terminal device displays prompt information about the communication information to the operator, such as a sign that unread information is displayed in a status bar of the terminal device or an incoming call is displayed above the screen. And switching to other work domains from the detection domain after receiving an opening instruction triggered by an operator, opening the notification message, for example, displaying a prompt message to the operator when receiving a WeChat message, and switching the terminal equipment to the work domain with the WeChat application after receiving the opening instruction. In addition, if the operator does not trigger the open command, for example, the operator hangs up the incoming call when receiving the incoming call notification, the incoming call remains in the detection field.
In this embodiment, it is considered that convenience of the operator when using other functions of the terminal device is also taken into consideration while ensuring security of the detection domain. And further, when the terminal device receives the notification message in the detection domain, the relevant information can be displayed to the operator. When the operator determines that the notification message is to be opened, the terminal device is automatically switched to the other work domain and the notification message is opened. Therefore, the operator can know that a new notification message needs to be checked in the detection domain, and the problem that data leakage can be caused when the operator directly checks the notification message in the detection domain can be avoided.
It should be noted that the steps S106 and S105 are not necessarily related to each other. As long as it is satisfied that the terminal device is in the detection domain, the content of step S106 can be executed according to specific needs to achieve the above technical effects.
Optionally, the method for controlling the terminal device provided by the present application includes that the terminal device performs system upgrade through an Over-the-Air Technology (OTA Technology).
Optionally, the method provided by the present application further includes that the terminal device sends the current state and the detection result to the management and control platform. So that the management and control platform can know the use condition of the terminal equipment.
Fig. 2 is an exemplary diagram of a specific implementation process of the foregoing embodiment of the present application. Specifically, the substance to be detected is subjected to raman detection in a detection domain of the terminal device, and detected detection data is sent to the cloud platform through the communication network, wherein the data can be sent by using the communication base station through a mobile communication function of the terminal device, and further, in order to ensure safe and rapid transmission of the data, the data can be transmitted by using a VPN tunnel. And then, after receiving the detection data, the Raman cloud service equipment in the cloud platform processes the detection data by using a Raman preprocessing algorithm, a Raman detection algorithm and a Raman database in the cloud platform to obtain a detection result, and feeds the detection result back to the terminal equipment. In addition, the specific OTA server and the control platform can also be arranged in the cloud platform, and the terminal equipment performs system upgrade by using the OTA technology through the OTA server and sends the current state and the detection result to the control platform. So that the management and control platform can know the use condition of the terminal equipment.
The terminal equipment is divided into a plurality of working domains, and a detection domain which is isolated from data of other working domains is set for material detection in the working domains. The data generated in the detection domain and the data generated in other working domains are isolated from each other, namely the detection data acquired in the material detection process and the data generated in the process of processing the detection data are isolated from the data generated in the other working domains, so that the detection data can be prevented from being accessed by the applications in the other working domains, and the detection data cannot be leaked when the applications in the other working domains exist at backdoors or are attacked by viruses and trojans in the other working domains. In addition, since the terminal device performs material detection in the detection domain, applications in other working domains cannot call devices such as a laser emission lens used for detecting materials, and further, the devices such as the laser emission lens cannot be started when the applications in other working domains are cracked or attacked. Meanwhile, the terminal equipment in the application can enter the detection domain according to the entering instruction after acquiring the entering instruction, so that the possibility that an operator mistakenly enters the detection domain to perform misoperation on the detection function in the detection domain is reduced, and the safety of the terminal equipment in use is further improved.
An embodiment of the present application further provides another method for controlling a terminal device, and as shown in fig. 3, the method includes the following steps:
s201, the terminal equipment acquires an entering instruction.
Specifically, the terminal device obtains the entry instruction in another work domain before the detection domain. Illustratively, the terminal device receives operator-triggered entry instructions at other work domains.
S202, entering a detection domain according to an entering command.
Specifically, the terminal device switches the terminal device from the other work domain to the detection domain according to the entering instruction.
And S203, detecting the substance to be detected in the detection domain and acquiring the detection result.
Wherein, the data generated by the terminal device in the detection domain and the data generated by the terminal device in other working domains are isolated from each other.
The specific implementation manner and effect of the steps S201 to S203 may refer to the content of the steps S103 to S105, and repeated details are not repeated.
And S204, switching the terminal equipment to other work domains.
In the embodiment of the application, the probability that the terminal equipment is possibly attacked by a network or operated by mistake is relatively increased when the terminal equipment is in the detection domain for a long time. Furthermore, in this embodiment, after the terminal device in another working domain acquires the entry instruction, the terminal device is switched to the detection domain, and then tasks such as substance detection are performed in the detection domain. And after the terminal equipment is detected, switching the terminal equipment back to the previous working domain. Thereby reducing the possibility of the detection domain being attacked or mishandled. In addition, by the method, the terminal equipment can be in other working domains which are more convenient to use when the detection task is not executed, so that the operation habit of an operator can be better met, and the user experience is improved.
Based on the control method of the terminal equipment, the application provides the terminal equipment. Fig. 4 shows a schematic diagram of a possible structure of a terminal device according to the present application. Specifically, the terminal device 30 includes: an acquisition unit 301, a control unit 302, a detection unit 303, wherein:
an acquisition unit 301 for acquiring an entry instruction;
a control unit 302, configured to control the terminal device to enter the detection domain according to the entry instruction after the acquisition unit 301 acquires the entry instruction;
a detecting unit 303, configured to perform substance detection on a substance to be detected in a detection domain to obtain a detection result after the control unit 302 controls the terminal device to enter the detection domain, where data generated by the terminal device under the detection domain is isolated from data generated by other working domains of the terminal device.
Optionally, the terminal device 30 further includes an authentication unit 304;
the acquiring unit 301 is further configured to acquire unlocking information in the locked state, where the unlocking information includes identity authentication information of an operator;
an authentication unit 304, configured to authenticate the identity of the operator according to the unlocking information after the obtaining unit 301 obtains the unlocking information;
the control unit 302 is further configured to unlock the terminal device after the authentication unit 304 passes identity authentication of the operator; and after the terminal equipment is unlocked, an entry instruction is generated.
Alternatively to this, the first and second parts may,
an obtaining unit 301, specifically configured to obtain an entry instruction in other work domains;
the control unit 302 is further configured to switch the terminal device to another working domain after performing substance detection on the substance to be detected in the detection domain to obtain a detection result.
Alternatively to this, the first and second parts may,
the control unit 301 is further configured to automatically open a detection application after entering a detection domain;
the detection unit 302 is specifically used for performing substance detection on a substance to be detected through detection application.
Alternatively to this, the first and second parts may,
the obtaining unit 301 is further configured to obtain recommendation information of the management and control platform;
the control unit 302 is configured to obtain recommendation information of the management and control platform in the obtaining unit 301, obtain an installation package of the detection application according to the recommendation information, and install the detection application according to the installation package.
Alternatively to this, the first and second parts may,
the detection unit 303 is specifically configured to collect detection data of a substance to be detected after the control unit 302 controls the terminal device to enter the detection domain; sending the detection data to data processing equipment so that the data processing equipment can obtain a detection result according to the detection data; receiving the detection result sent by the data processing equipment
Alternatively to this, the first and second parts may,
the control unit 302 is further configured to, when the terminal device enters the working domain, switch the SIM card corresponding to the detection domain to the main card of the terminal device when the terminal device enters the detection domain, so as to send the detection data to the data processing device by using the SIM card corresponding to the detection domain.
Alternatively to this, the first and second parts may,
an obtaining unit 301, configured to receive a notification message in a detection domain;
the control unit 302 is further configured to display a prompt message to an operator according to the notification message after the obtaining unit 301 receives the notification message; and when receiving an opening instruction, switching from the detection domain to other work domains corresponding to the notification message and opening the notification message, wherein the opening instruction comprises an instruction for opening the notification message triggered by the operator according to the prompt message.
Since the terminal device in the embodiment of the present application can be applied to implement the method embodiment, the technical effect obtained by the terminal device can also refer to the method embodiment, and the embodiment of the present application is not described herein again.
In the case of an integrated unit, fig. 5 shows a possible structural diagram of the terminal device according to the above-described embodiment. The terminal device 40 includes: a processing module 401 and a communication module 402. The processing module 401 is configured to control and manage actions of the terminal device, for example, the processing module 401 is configured to control the communication module 402 to support the terminal device to perform steps S101 and S103 in fig. 1, step S201 in fig. 3, and/or other processes for the techniques described herein, and the processing module 601 is configured to support the terminal device to perform steps S102, S104 to S106 in fig. 1, steps S202 to S204 in fig. 3, and/or other processes for the techniques described herein. The communication module 402 is used to support the communication between the terminal device and other entity devices, and the terminal device 40 may further include a storage module 403 for storing program codes and data of the terminal device 40.
The Processing module 401 may be a Processor or a controller, and may be, for example, a Central Processing Unit (CPU), a general purpose Processor, a Digital Signal Processor (DSP), an Application-Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs, and microprocessors, among others. The communication module 402 may be a transceiver, a transceiving circuit or a communication interface, etc. The memory module 6403 may be a memory.
When the processing module 401 is a processor, the communication module 402 is a communication interface, and the storage module 403 is a memory, the terminal device according to the embodiment of the present invention may be the terminal device shown in fig. 6.
Referring to fig. 6, the terminal device 50 includes: a processor 501, a communication interface 502, a memory 503, and a bus 504. Wherein, the communication interface 502, the processor 501 and the memory 503 are connected to each other by a bus 504; the bus 504 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 6, but this does not indicate only one bus or one type of bus.
The steps of a method or algorithm described in connection with the disclosure herein may be embodied in hardware or in software instructions executed by a processor. An embodiment of the present invention further provides a storage medium, where the storage medium may include a memory 503 for storing computer software instructions for the terminal device, and the storage medium contains program codes designed to execute the control method of the terminal device provided in the foregoing embodiment. Specifically, the software instructions may be composed of corresponding software modules, and the software modules may be stored in a Random Access Memory (RAM), a flash Memory, a Read Only Memory (ROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a register, a hard disk, a removable hard disk, a compact disc Read Only Memory (CD-ROM), or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor.
The embodiment of the present invention further provides a computer program, where the computer program may be directly loaded into the memory 503 and contains a software code, and the computer program is loaded and executed by a computer, so as to implement the control method of the terminal device provided in the foregoing embodiment.
Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in this invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The above-mentioned embodiments, objects, technical solutions and advantages of the present invention are further described in detail, it should be understood that the above-mentioned embodiments are only exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made on the basis of the technical solutions of the present invention should be included in the scope of the present invention.

Claims (14)

1. A control method of a terminal device, wherein a function for substance detection is integrated in the terminal device, the terminal device is divided into a plurality of work domains, and a detection domain isolated from data of other work domains is set for substance detection in the plurality of work domains, the control method comprising:
the terminal equipment acquires an entry instruction;
entering a detection domain according to the entering instruction;
when the terminal equipment enters a detection domain, switching the SIM card corresponding to the detection domain into a main card of the terminal equipment so as to send detection data to data processing equipment by using the SIM card corresponding to the detection domain, and opening detection application after entering the detection domain;
and in the detection domain, performing substance detection on the substance to be detected through the detection application, and acquiring a detection result, wherein data generated by the terminal equipment in the detection domain is isolated from data generated by other working domains of the terminal equipment.
2. The method of claim 1, further comprising:
acquiring unlocking information in a locking state, wherein the unlocking information comprises identity authentication information of an operator;
authenticating the identity of the operator according to the unlocking information;
after the identity of the operator is authenticated, unlocking the terminal equipment; and after the terminal equipment is unlocked, generating the access instruction.
3. The method of claim 1, wherein the terminal device obtaining the entry instruction comprises: the terminal equipment acquires the entering instruction when in other working domains;
and after the detection result is obtained, switching the terminal equipment to the other working domains.
4. The method of claim 1, wherein prior to said opening a detection application, the method further comprises:
obtaining recommendation information of a management and control platform, obtaining an installation package of the detection application according to the recommendation information, and installing the detection application according to the installation package.
5. The method according to claim 1, wherein the detecting the substance in the detection domain to obtain the detection result comprises:
collecting detection data of a substance to be detected;
sending the detection data to data processing equipment so that the data processing equipment can obtain a detection result according to the detection data;
and receiving the detection result sent by the data processing equipment.
6. The method according to any one of claims 1-5, further comprising:
receiving a notification message in the detection domain;
displaying prompt information to an operator according to the notification message;
receiving an opening instruction, switching from the detection domain to other working domains corresponding to the notification message, and opening the notification message; the opening instruction comprises an instruction which is triggered by the operator according to the prompt message and opens the notification message.
7. A terminal device, wherein a function for detecting a substance is integrated in the terminal device, the terminal device is divided into a plurality of operation domains, and a detection domain isolated from data of other operation domains is set for substance detection in the plurality of operation domains, the terminal device comprising:
an acquisition unit for acquiring an entry instruction;
the control unit is used for controlling the terminal equipment to enter a detection domain according to the entering instruction after the obtaining unit obtains the entering instruction;
the control unit is further used for switching the SIM card corresponding to the detection domain into a main card of the terminal equipment when the terminal equipment enters the working domain and enters the detection domain, so that the SIM card corresponding to the detection domain is used for sending detection data to the data processing equipment, and after the SIM card corresponding to the detection domain enters the detection domain, the detection application is automatically opened;
and the detection unit is used for performing substance detection on the substance to be detected in the detection domain through the detection application and acquiring a detection result after the control unit controls the terminal equipment to enter the detection domain, and data generated by the terminal equipment under the detection domain is isolated from data generated by other working domains of the terminal equipment.
8. The terminal device according to claim 7, comprising:
the acquisition unit is further used for acquiring unlocking information in a locking state, wherein the unlocking information comprises identity authentication information of an operator;
the authentication unit is used for authenticating the identity of the operator according to the unlocking information after the acquisition unit acquires the unlocking information;
the control unit is also used for unlocking the terminal equipment after the authentication unit passes the identity authentication of the operator; and after the terminal equipment is unlocked, generating the access instruction.
9. The terminal device according to claim 7, comprising:
the obtaining unit is specifically configured to obtain the entry instruction in other work domains;
the control unit is further configured to switch the terminal device to the other working domains after performing substance detection on the substance to be detected in the detection domain to obtain a detection result.
10. The terminal device according to claim 7, comprising:
the acquisition unit is also used for acquiring recommendation information of the management and control platform;
the control unit is used for acquiring the recommendation information of the management and control platform at the acquisition unit, acquiring the installation package of the detection application according to the recommendation information and installing the detection application according to the installation package.
11. The terminal device according to claim 7, comprising:
the detection unit is specifically used for acquiring detection data of a substance to be detected after the control unit controls the terminal equipment to enter a detection domain; sending the detection data to data processing equipment so that the data processing equipment can obtain a detection result according to the detection data; and receiving the detection result sent by the data processing equipment.
12. The terminal device according to any of claims 7-11, comprising:
the acquiring unit is further configured to receive a notification message in the detection domain;
the control unit is also used for displaying prompt information to an operator according to the notification message after the acquisition unit receives the notification message; and when an opening instruction is received, switching from the detection domain to other work domains corresponding to the notification message and opening the notification message, wherein the opening instruction comprises an instruction for opening the notification message triggered by the operator according to the prompt message.
13. A terminal device, comprising: a memory, a communication interface and a processor, the memory and the communication interface being coupled to the processor, the memory being used for storing computer executable code, the processor being used for executing the computer executable code to control execution of the control method of the terminal device according to any one of claims 1 to 6, the communication interface being used for data transmission of the terminal device with an external device.
14. A computer storage medium for storing computer software instructions for a terminal device, comprising program code designed to execute the method for controlling a terminal device according to any one of claims 1 to 6.
CN201780002579.7A 2017-12-26 2017-12-26 Terminal device control method and terminal device Active CN108235766B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/118740 WO2019127043A1 (en) 2017-12-26 2017-12-26 Terminal device control method and terminal device

Publications (2)

Publication Number Publication Date
CN108235766A CN108235766A (en) 2018-06-29
CN108235766B true CN108235766B (en) 2022-03-04

Family

ID=62645502

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780002579.7A Active CN108235766B (en) 2017-12-26 2017-12-26 Terminal device control method and terminal device

Country Status (2)

Country Link
CN (1) CN108235766B (en)
WO (1) WO2019127043A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112033950A (en) * 2020-09-10 2020-12-04 青海省农林科学院 Pesticide residue detection method
CN112540892B (en) * 2020-12-08 2023-01-20 公安部第三研究所 Mobile phone isolation detection system and method
CN113092376A (en) * 2021-04-13 2021-07-09 威海诚悦光电科技有限公司 Handheld white spirit authenticity detection device and method based on laser spectrum technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101915742A (en) * 2010-08-10 2010-12-15 北京路源光科技有限公司 Raman technology based biodiesel on-line detector
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof
CN104182251A (en) * 2014-08-12 2014-12-03 小米科技有限责任公司 Crop characteristic detecting method, device and terminal
CN105162951A (en) * 2015-07-28 2015-12-16 努比亚技术有限公司 Mobile terminal, and portable pesticide residues detection system and method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314166A (en) * 2010-07-07 2012-01-11 柳平增 Intelligent crop production measurement and control system based on Internet of Things
US9151709B2 (en) * 2010-09-10 2015-10-06 The Curators Of The University Of Missouri Multiple phase flow system for detecting and isolating substances
CN103582184A (en) * 2013-10-31 2014-02-12 中晟国计科技有限公司 Double-card smart phone high in safety performance
WO2015101992A2 (en) * 2014-01-03 2015-07-09 Verifood, Ltd. Spectrometry systems, methods, and applications
US10024717B2 (en) * 2015-11-24 2018-07-17 Trutag Technologies, Inc. Tag reading using targeted spatial spectral detection
CN205385008U (en) * 2016-03-17 2016-07-13 杨金凤 Organic remaining material of food sets to music check out test set
CN106203035B (en) * 2016-06-28 2019-04-02 Oppo广东移动通信有限公司 A kind of data access control method and mobile terminal
CN106485589A (en) * 2016-10-20 2017-03-08 河南省农业科学院 A kind of Agriculture enterprise group KXG based on Internet of Things

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101915742A (en) * 2010-08-10 2010-12-15 北京路源光科技有限公司 Raman technology based biodiesel on-line detector
CN104182251A (en) * 2014-08-12 2014-12-03 小米科技有限责任公司 Crop characteristic detecting method, device and terminal
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof
CN105162951A (en) * 2015-07-28 2015-12-16 努比亚技术有限公司 Mobile terminal, and portable pesticide residues detection system and method

Also Published As

Publication number Publication date
CN108235766A (en) 2018-06-29
WO2019127043A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
US9426661B2 (en) Secure lock for mobile device
US11055406B2 (en) Application security protection method, terminal, and storage medium
US9213829B2 (en) Computing device including a port and a guest domain
EP3370449B1 (en) Method and device for configuring security indication information
KR101700552B1 (en) Context based switching to a secure operating system environment
JP5981035B2 (en) Hardware access protection
CN108235766B (en) Terminal device control method and terminal device
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
CN106557669A (en) A kind of authority control method and device of application program installation process
EP2437198A1 (en) Secure pin reset process
US20220046030A1 (en) Simulating user interactions for malware analysis
US9858400B2 (en) Information processing system, terminal, and authentication method
US10019577B2 (en) Hardware hardened advanced threat protection
JP2019518285A (en) Method and terminal for enhancing information security
CN106557687A (en) A kind of authority control method and device of application program installation process
US10372472B2 (en) System, method, and computer program product for conditionally preventing use of hardware virtualization
US20140289127A1 (en) Secured Online Transactions
WO2014036932A1 (en) A user interface hijacking prevention device and method
CN116635851A (en) Method and system for application security
US20180101485A1 (en) Method and apparatus for accessing private data in physical memory of electronic device
US11228910B2 (en) Mobile communication device and method of determining security status thereof
CN102467622B (en) Method and device for monitoring opened file
US20140068776A1 (en) User interface hijacking prevention device and method
CN109933990B (en) Multi-mode matching-based security vulnerability discovery method and device and electronic equipment
CN112346743A (en) Application program installation method and device, terminal equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220607

Address after: 1904-010, 20th floor, building 4, No. 11, Changchun Bridge Road, Haidian District, Beijing 100089

Patentee after: BEIJING CLOUDOPTEK TECHNOLOGY Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: CLOUDMINDS (SHENZHEN) HOLDINGS Co.,Ltd.

TR01 Transfer of patent right