CN110780926B - Switching method of operating system, terminal and computer storage medium - Google Patents

Switching method of operating system, terminal and computer storage medium Download PDF

Info

Publication number
CN110780926B
CN110780926B CN201810852132.5A CN201810852132A CN110780926B CN 110780926 B CN110780926 B CN 110780926B CN 201810852132 A CN201810852132 A CN 201810852132A CN 110780926 B CN110780926 B CN 110780926B
Authority
CN
China
Prior art keywords
operating system
terminal
authentication information
information
foreground
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810852132.5A
Other languages
Chinese (zh)
Other versions
CN110780926A (en
Inventor
陈璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201810852132.5A priority Critical patent/CN110780926B/en
Priority to PCT/CN2019/098222 priority patent/WO2020024912A1/en
Publication of CN110780926A publication Critical patent/CN110780926A/en
Application granted granted Critical
Publication of CN110780926B publication Critical patent/CN110780926B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • G06F9/441Multiboot arrangements, i.e. selecting an operating system to be loaded
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a switching method of an operating system, which comprises the following steps: when an operating system of a foreground of the terminal is switched from a first operating system to a second operating system, acquiring identity authentication information through the second operating system; setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system; deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operation system of the foreground of the terminal to be switched from the first operation system to the second operation system. The embodiment of the invention also discloses a terminal and a computer storage medium.

Description

Switching method of operating system, terminal and computer storage medium
Technical Field
The present invention relates to, but not limited to, the field of computer technologies, and in particular, to a method for switching an operating system, a terminal, and a computer storage medium.
Background
At present, the switching systems of the dual-system mobile phones in the market are all explicitly switched, for example, the first operating system is switched to the second operating system through a first switching button in the first operating system, and the second operating system is switched to the first operating system through a second switching button in the second operating system. However, users of mobile phones using dual operating systems mostly use one of the operating systems as a hidden operating system, and do not want to be snooped by others.
However, in the current dual-operating-system mobile phone, the user can only switch between the operating systems by displaying the switch button while using the mobile phone.
Disclosure of Invention
In view of this, embodiments of the present invention are expected to provide a switching method of operating systems, a terminal and a computer storage medium, so as to solve the problem in the related art that switching between operating systems can only be performed by displaying a switching button, implement hidden switching between dual operating systems of a terminal, ensure the security of a hidden operating system, and improve the intelligence of a terminal.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the embodiment of the invention provides a method for adjusting output parameters of multimedia information, which is applied to a terminal comprising a first operating system and a second operating system, and comprises the following steps:
when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring identity authentication information through the second operating system;
setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;
deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operation system of the foreground of the terminal to be switched from the first operation system to the second operation system.
Optionally, when the authentication information is stored in the memory corresponding to the second operating system, after deleting the visual control in the first operating system, the method further includes:
when a foreground of the terminal runs a first operating system, acquiring information to be verified through a second operating system;
determining whether the information to be verified is matched with the authentication information through a second operating system;
when the information to be verified is matched with the authentication information, a second switching request is generated through a second operating system;
and responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.
An embodiment of the present invention provides a terminal, including: a processor, a memory, and a communication bus;
the communication bus is used for realizing communication connection between the processor and the memory;
the processor is used for executing the switching program of the operating system in the memory to realize the following steps:
when an operating system of a foreground of the terminal is switched from a first operating system to a second operating system, acquiring identity authentication information through the second operating system;
setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;
deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operation system of the foreground of the terminal to be switched from the first operation system to the second operation system.
Embodiments of the present invention provide a computer storage medium, where one or more programs are stored, and the one or more programs are executable by one or more processors to implement the steps of the switching method for an operating system as described above.
According to the switching method of the operating systems, the terminal and the computer storage medium provided by the embodiment of the invention, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, the second operating system is used for acquiring the identity authentication information; setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system; deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling an operating system of a foreground of the terminal to be switched from a first operating system to a second operating system; that is to say, in the embodiment of the present invention, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, the terminal can set the authentication information through the second operating system to replace the visual control in the first operating system, and delete the visual control after the authentication information is successfully set, so that when the operating system of the foreground of the terminal is switched from the second operating system to the first operating system, the visual control is no longer presented in the first operating system, and it is ensured that the terminal does not display any information related to system switching when running the first operating system.
Drawings
Fig. 1 is a flowchart illustrating a method for switching an operating system according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a terminal according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating another switching method for an operating system according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a switching method of an operating system according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
It should be appreciated that reference throughout this specification to "embodiments of the invention" or "embodiments described previously" means that a particular feature, structure or characteristic described in connection with the embodiments is included in at least one embodiment of the present invention. Thus, the appearances of the phrase "in an embodiment of the present invention" or "in the foregoing embodiments" in various places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention. The above-mentioned serial numbers of the embodiments of the present invention are only for description, and do not represent the advantages and disadvantages of the embodiments.
The embodiment of the invention provides a switching method of an operating system, which can be applied to a terminal, wherein the terminal comprises a first operating system and a second operating system, and the first operating system and the second operating system are two completely independent operating systems. In an embodiment of the present invention, the first operating system may be referred to as a public operating system, and the second operating system may be referred to as a hidden operating system. Further, in the running process of the terminal, the operating system running in the foreground of the terminal can be switched between the first operating system and the second operating system.
In the embodiment of the invention, the core idea of the invention is to use a hidden switching mode to realize switching between two operating systems in the terminal, and compared with the method of switching two operating systems in the terminal through a visual control such as a visual button in the related art, the method is more secure and hidden.
Based on the foregoing embodiments, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal, and as shown in fig. 1, the method includes the following steps:
step 101, when an operating system of a foreground of the terminal is switched from a first operating system to a second operating system, acquiring identity authentication information through the second operating system.
Here, the identity authentication information includes at least one of voice information, text information, and biometric information; of course, the identity authentication information may also include other information, which is not specifically limited in this embodiment of the present invention. In the embodiment of the present invention, exemplarily, during initialization of the terminal and after each shutdown and restart of the terminal, the foreground of the terminal loads the first operating system. The terminal detects that the operating system of the terminal is switched from the first operating system to the second operating system, and the terminal can acquire the identity authentication information through the second operating system.
Illustratively, as shown in fig. 2, the terminal 20 of the present invention includes a first operating system 21 and a second operating system 22, wherein the first operating system includes a first interface 211 and a second interface 212; the second operating system comprises an information acquisition module 221, an information processing module 222 and a setting module 223; further, the first interface 211 is responsible for notifying the information acquisition module 221 to acquire identity authentication information, where the identity authentication information is used to set authentication information; the information acquisition module 221 is configured to process the collected information to be verified, compare the information to be verified with the set authentication information, and if the information to be verified is matched with the set authentication information, indicate that the authentication is passed, send a switching request to the information processing module 222; a second interface 212, such as a visual control, for sending the switching request to the information processing module 222; an information processing module 222, configured to respond to the switching request and perform switching between the two operating systems; the setting module 223 is responsible for setting the hidden switching mode and instructing the first operating system 21 to delete the second interface 212 through the cross-system channel. It should be noted that, the first interface 211 is different from the second interface 212, and the first interface 211 may be a preset program and is a non-visual interface (in fig. 2, a dashed line box indicates that the first interface 211 is a non-visual interface), and when the terminal 20 determines that the acquired information conforms to preset information, the terminal can call the first interface 211 to notify the information acquisition module 221; the second interface 212 is used to control the switching from the first operating system 21 to the second operating system 22, and is a visual interface (the black bold border in fig. 2 indicates that the first interface 211 is a visual interface), such as a visual touch button.
In this embodiment of the present invention, before the step 101, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring the identity authentication information through the second operating system, the method may further include:
first, when the terminal 20 is in an initialized state, a first operating system 21 runs in a foreground of the terminal 20 to obtain a first switching request generated by touching a visual control.
Illustratively, when the terminal 20 is initialized, the terminal 20 loads and runs the first operating system 21 in the foreground of the terminal 20; then, when the user touches the second interface 212, such as a visual control, in the first operating system 21, the terminal 20 generates a first switching request, and sends the first switching request to the information processing module 222 in the second operating system 22 through the second interface 212 in the first operating system 21.
Second, in response to the first switching request, the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22.
Here, the information processing module 222 switches the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22 in response to the first switching request; at this time, the foreground of the terminal 20 runs the second operating system 22, and the terminal 20 may obtain the authentication information for setting the authentication information through the second operating system 22.
And 102, setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system.
Wherein the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22.
Here, the terminal 20 sets the authentication information according to the authentication information after acquiring the authentication information, and saves the authentication information into a memory corresponding to the second operating system 22. That is, the setting and storage of the authentication information are all completed by the terminal through the second operating system 22, and since the second operating system 22 and the first operating system 21 are two completely independent systems, the information processed by the second operating system 22 is stored in the memory corresponding to the second operating system 22, and the first operating system 21 cannot call the memory corresponding to the first operation. In practical application, even if an illegal user breaks through the first operating system 21, the second operating system 22 is not damaged, and the information in the memory corresponding to the second operating system 22 cannot be acquired, so that the security of the hidden operating system is ensured.
And 103, deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system.
The visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.
Here, after the terminal 20 stores the authentication information in the memory corresponding to the second operating system 22, the terminal may instruct the first operating system 21 to delete the visual control in the first operating system 21 through the cross-system channel, such as the second interface 212 described above; then, after deleting the second interface 212 of the public operating system, i.e. the system switching interface in the first operating system 21, the first operating system 21 has no switching interface, and at this time, the first operating system 21, i.e. the public system, appears to be a single-system mobile phone.
In the method for switching operating systems provided in the embodiment of the present invention, when the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22, the second operating system 22 obtains the identity authentication information; setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system 21; wherein, the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22; when the authentication information is stored in the memory corresponding to the second operating system 22, deleting the visual control in the first operating system 21; the visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22; that is to say, in the embodiment of the present invention, when the operating system in the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22, the terminal 20 can set the authentication information through the second operating system 22 to replace the visual control in the first operating system 21, and delete the visual control after the authentication information is successfully set, so that when the operating system in the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, the visual control is no longer presented in the first operating system 21, and it is ensured that no information related to system switching is displayed when the terminal 20 runs the first operating system 21, so that the terminal 20 only appears to have one operating system when running the first operating system 21, the problem that switching between operating systems can be performed only by displaying a switching button in the related art is solved, hidden switching between two operating systems of the terminal 20 is realized, the security of the hidden operating systems is ensured, and the intelligence of the terminal 20 is improved.
Based on the foregoing embodiment, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal 20 (described with reference to the schematic diagram shown in fig. 2), and as shown in fig. 3, the method includes the following steps:
step 301, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, receiving a setting instruction through the second operating system.
Here, the preset instruction may be generated by completing a preset operation, for example, when the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22, the foreground of the terminal 20 is operated with the second operating system 22, and the second operating system 22 includes a setting button for turning on or off a hidden switching mode in the terminal 20. When the user touches the setting button in the second operating system 22, the setting of the hidden switching mode in the terminal 20 is turned on, so that the terminal can be triggered to generate the setting instruction through the second operating system 22.
And step 302, responding to the setting instruction, and acquiring the identity authentication information through the second operating system.
Here, the terminal 20, after generating the setting instruction, acquires, in response to the setting instruction, authentication information for setting authentication information by the second operating system. Here, the obtaining of the authentication information by the second operating system 22 may be receiving the authentication information input by the user by calling the information collecting module 221 by the second operating system 22.
Step 303, setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system.
Wherein the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22.
And step 304, deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system.
The visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.
In this embodiment of the present invention, in step 304, after the authentication information is stored in the memory corresponding to the second operating system and the visual control in the first operating system is deleted, if the first operating system 21 is running in the foreground of the terminal 20, the terminal 20 may further obtain a second switching request generated by the second operating system, and respond to the second switching request through the second operating system to switch the operating system in the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.
In practical applications, the switching of the operating system in the foreground of the terminal 20 from the second operating system 22 to the first operating system 21 may be implemented in a display switching manner; illustratively, the second operating system 22 presents a visual control for controlling the operating system of the foreground of the terminal 20 to switch from the second operating system 22 to the first operating system 21, and the terminal 20 obtains the touch operation by touching the visual control in the second operating system 22 by the user and generates a second switch request through the second operating system 22.
Here, after the terminal 20 acquires the second switching request generated by the second operating system 22, the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22 in response to the second switching request through the second operating system 22. That is to say, after the terminal 20 deletes the visual control in the first operating system 21, the second switching request for switching the operating system in the foreground of the terminal 20 from the first operating system 21 to the second operating system can only be generated by the terminal 20 through the second operating system 22 of the terminal, and even if the visual control is installed again to the first operating system 21, the second operating system 22 in the terminal 20 will not receive the external second switching request, and will not respond to the external second switching request, and can only respond to the second switching request generated by the second operating system 22, so as to ensure the security of the hidden operating system.
It should be noted that, for the descriptions of the same steps and the same contents in this embodiment as those in other embodiments, reference may be made to the descriptions in other embodiments, which are not described herein again.
Based on the foregoing embodiment, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal 20 (described with reference to a schematic diagram shown in fig. 2), and as shown in fig. 4, the method includes the following steps:
step 401, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, obtaining the identity authentication information through the second operating system.
And 402, setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system.
Wherein the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22.
And step 403, deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system.
The visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.
And 404, when the foreground of the terminal runs the first operating system, acquiring the information to be verified through the second operating system.
Here, the information to be verified includes at least one of voice information, text information, and biometric information; of course, the information to be verified may also include other information, which is not specifically limited in this embodiment of the present invention. When the foreground of the terminal 20 runs the first operating system 21, the terminal 20 may obtain the information to be verified through the second operating system 22 running in the background of the terminal.
Illustratively, referring to fig. 2, when the operating system in the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, assuming that the authentication information includes a preset fingerprint, when the first operating system 21 is run in the foreground of the terminal 20, and a user touches a fingerprint identification key of the terminal 20, the first interface 211 is triggered to start working, and the information collecting module 221 is notified to collect the fingerprint as the information to be verified.
In this embodiment of the present invention, the authentication information may be a preset word, and the step 404, when the foreground of the terminal runs the first operating system, acquiring the information to be verified through the second operating system may include: when the foreground of the terminal 20 runs the first operating system 21, voice information is collected through the second operating system 22.
Illustratively, referring to fig. 2, when the operating system of the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, assuming that the authentication information includes a password, such as a preset keyword, when the first operating system 21 is run in the foreground of the terminal 20, when a user inputs voice to the terminal 20, the first interface 211 starts to work, and notifies the information collecting module 221 to collect voice as information to be verified.
In another embodiment of the present invention, the authentication information may be preset biometric information, and the step 404, when the first operating system is run in the foreground of the terminal, acquiring the information to be verified through the second operating system may include: when the first operating system 21 is operated in the foreground of the terminal 20, the biometric information is collected through the second operating system.
Step 405, determining whether the information to be verified is matched with the authentication information through the second operating system.
In this embodiment of the present invention, the authentication information includes preset words, and the step 405 of determining whether the information to be verified and the authentication information are matched by the second operating system may include:
a1, analyzing the voice information through the second operating system 22, and acquiring a keyword in an analysis result.
Here, the terminal 20 performs analysis processing on the acquired voice information through the second operating system 22, and acquires a keyword in an analysis result.
And A2, determining whether the keyword comprises preset characters through the second operating system 22.
Here, the terminal 20 compares the keyword with the preset text through the second operating system 22 to determine whether the keyword includes the preset text.
And A3, when the key words comprise preset characters, determining that the information to be verified conforms to the authentication information through the second operating system 22.
Here, when the terminal 20 determines that the keyword includes the preset character, it determines that the collected information to be verified conforms to the authentication information, and at this time, the authentication is passed.
In another embodiment of the present invention, the authentication information includes preset biometric information, and the step 405 of determining whether the information to be verified matches the authentication information through the second operating system may include:
and B1, determining whether the biological characteristic information accords with preset biological characteristic information through a second operating system 22.
Here, the biometric information may include not only the above-described fingerprint but also an iris, a human face, and the like.
For example, the preset biometric information may be a fingerprint of a thumb of a right hand of the user, and when the operating system of the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, the terminal 20 obtains information to be verified, such as a current fingerprint collected by the fingerprint identification module, through the second operating system 22; then, the terminal 20 compares the current fingerprint with the preset fingerprint progressing.
And B2, when the biological characteristic information accords with the biological characteristic information, determining that the information to be verified accords with the authentication information through the second operating system 22.
Here, when the current fingerprint is the same as the preset fingerprint, such as the fingerprint of the thumb of the right hand of the user, the terminal 20 determines that the biometric information matches the biometric information, and further determines that the information to be verified matches the authentication information through the second operating system 22.
And 406, generating a second switching request through the second operating system when the information to be verified is matched with the authentication information.
Step 407, responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.
In the embodiment of the present invention, after the terminal 20 deletes the visual control in the first operating system 21, the second switching request for switching the operating system in the foreground of the terminal 20 from the first operating system 21 to the second operating system 22 can only be generated by the terminal 20 through its own second operating system 22, and even if the visual control is installed again to the first operating system 21, the second operating system 22 in the terminal 20 will not receive the external second switching request, and will not respond to the external second switching request, and can only respond to the second switching request generated by the second operating system 22, so as to ensure the security of the hidden operating system.
It should be noted that, for the description of the same steps and the same contents in this embodiment as those in other embodiments, reference may be made to the description in the other embodiments, which is not repeated herein.
Based on the foregoing embodiment, an embodiment of the present invention provides a terminal 50, where the terminal 50 corresponds to the terminal 20 in fig. 2, and the terminal 50 may be applied to the method for switching an operating system provided in the embodiments corresponding to fig. 1, 3, and 4, and as shown in fig. 5, the terminal 50 may include: a processor 51, a memory 52 and a communication bus 53, wherein:
when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22, acquiring the identity authentication information through the second operating system 22; the terminal 50 includes a first operating system 21 and a second operating system 22;
setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system 22; wherein, the authentication information is used to determine whether the operating system of the terminal 50 can be switched from the first operating system 21 to the second operating system 22;
deleting the visual control in the first operating system 21 when the authentication information is stored in the memory corresponding to the second operating system 22; the visual control is used for controlling the switching of the operating system of the foreground of the terminal 50 from the first operating system 21 to the second operating system 22.
In other embodiments of the present invention, the processor 51 is configured to execute the following steps before the step of obtaining the identity authentication information through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 in the memory 52:
when the terminal 50 is in an initialized state, a first operating system 21 runs on a foreground of the terminal 50, and a first switching request generated by touching a visual control is acquired;
in response to the first switching request, the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22.
In other embodiments of the present invention, the processor 51 is configured to execute the step of obtaining the identity authentication information through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 in the memory 52, and further implement the following steps:
receiving a setting instruction through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22;
in response to the setting instruction, the authentication information is acquired by the second operating system 22.
In other embodiments of the present invention, the processor 51 is configured to execute the following steps after the authentication information is stored in the memory corresponding to the second operating system 22 in the memory 52 and the visual control in the first operating system 21 is deleted:
when the foreground of the terminal 50 runs the first operating system 21, acquiring a second switching request generated by the second operating system 22;
the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 by the second operating system 22 in response to the second switching request.
In other embodiments of the present invention, when the processor 51 is configured to execute the step of obtaining the second switch request generated by the second operating system 22 in the memory 52 when the first operating system 21 runs in the foreground of the terminal 50, the following steps may also be implemented:
when the foreground of the terminal 50 runs the first operating system 21, the information to be verified is obtained through the second operating system 22;
determining whether the information to be verified is matched with the authentication information through the second operating system 22;
when the information to be verified matches the authentication information, a second handover request is generated by the second operating system 22.
In other embodiments of the present invention, the authentication information includes preset words, and the processor 51 is configured to execute the following steps when the step of acquiring the information to be verified through the second operating system 22 in the memory 52 is executed when the first operating system 21 is run in the foreground of the terminal 50:
when the foreground of the terminal 50 runs the first operating system 21, acquiring voice information through the second operating system 22;
correspondingly, determining whether the information to be verified is matched with the authentication information through the second operating system 22 includes:
analyzing the voice information through the second operating system 22, and acquiring a keyword in an analysis result;
determining whether the keyword includes a preset word through the second operating system 22;
when the keyword includes the preset character, it is determined by the second operating system 22 that the information to be verified matches the authentication information.
In other embodiments of the present invention, the authentication information includes the preset biometric information processor 51 for executing the step of acquiring the information to be verified through the second operating system 22 when the first operating system 21 is run in the foreground of the terminal 50 in the memory 52, and the following steps can be further implemented:
when the foreground of the terminal 50 runs the first operating system 21, the biological characteristic information is collected through the second operating system 22;
accordingly, determining whether the information to be verified and the authentication information are matched through the second operating system 22 includes:
determining whether the biometric information conforms to preset biometric information through the second operating system 22;
when the biometric information matches the biometric information, it is determined by the second operating system 22 that the information to be verified matches the authentication information.
It should be noted that, for a specific implementation process of the step executed by the processor in this embodiment, reference may be made to the implementation process in the switching method of the operating system provided in the embodiments corresponding to fig. 1, 2, and 4, and details are not described here again.
Based on the foregoing embodiments, embodiments of the present invention provide a computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the steps of:
when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22, acquiring the identity authentication information through the second operating system 22;
setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system 22; wherein, the authentication information is used to determine whether the operating system of the terminal 50 can be switched from the first operating system 21 to the second operating system 22;
when the authentication information is stored in the memory corresponding to the second operating system 22, deleting the visual control in the first operating system 21; the visual control is used for controlling the switching of the operating system of the foreground of the terminal 50 from the first operating system 21 to the second operating system 22.
In other embodiments of the invention, the one or more programs are executable by the one or more processors and are further for performing the steps of:
when the terminal 50 is in an initialization state, a first operating system 21 runs in a foreground of the terminal 50, and a first switching request generated by touching a visual control is acquired;
in response to the first switching request, the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22.
In other embodiments of the present invention, the one or more programs may be executed by the one or more processors when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22, and when the identity authentication information is acquired by the second operating system 22, the following steps may also be implemented:
receiving a setting instruction through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22;
in response to the setting instruction, the authentication information is acquired by the second operating system 22.
In other embodiments of the invention, the one or more programs are executable by the one or more processors for further performing the steps of:
when the foreground of the terminal 50 runs the first operating system 21, acquiring a second switching request generated by the second operating system 22;
the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 by the second operating system 22 in response to the second switching request.
In other embodiments of the present invention, when the one or more programs are executed by the one or more processors, and when the first operating system 21 is run in the foreground of the terminal 50, and the second switching request generated by the second operating system 22 is obtained, the following steps may also be implemented:
when the foreground of the terminal 50 runs the first operating system 21, the information to be verified is obtained through the second operating system 22;
determining whether the information to be verified is matched with the authentication information through the second operating system 22;
when the information to be verified matches the authentication information, a second handover request is generated by the second operating system 22.
In other embodiments of the present invention, the authentication information includes preset words, and when the one or more programs are executed by the one or more processors, and when the foreground of the terminal 50 runs the first operating system 21, and obtains the information to be verified through the second operating system 22, the following steps may also be implemented:
when the foreground of the terminal 50 runs the first operating system 21, acquiring voice information through the second operating system 22;
accordingly, determining whether the information to be verified and the authentication information are matched through the second operating system 22 includes:
the voice information is analyzed through the second operating system 22, and a keyword in an analysis result is obtained;
determining, by the second operating system 22, whether the keyword includes a preset word;
when the keyword includes the preset character, it is determined by the second operating system 22 that the information to be verified matches the authentication information.
In other embodiments of the present invention, the authentication information includes preset biometric information, and the one or more programs can be executed by the one or more processors when the foreground of the terminal 50 runs the first operating system 21 and acquires the information to be verified through the second operating system 22, and the following steps can be further implemented:
when the foreground of the terminal 50 runs the first operating system 21, the biological characteristic information is collected through the second operating system 22;
correspondingly, determining whether the information to be verified is matched with the authentication information through the second operating system 22 includes:
determining whether the biometric information conforms to the preset biometric information through the second operating system 22;
when the biometric information matches the biometric information, it is determined by the second operating system 22 that the information to be verified matches the authentication information.
It should be noted that, for a specific implementation process of the step executed by the processor in this embodiment, reference may be made to the implementation process in the switching method of the operating system provided in the embodiments corresponding to fig. 1, 2, and 4, and details are not described here again.
The computer storage medium may be a Memory such as a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a magnetic Random Access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); and may be various electronic devices such as mobile phones, computers, tablet devices, personal digital assistants, etc., including one or any combination of the above-mentioned memories.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of "comprising a" \8230; "defining an element does not exclude the presence of additional like elements in the process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method described in the embodiments of the present invention.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A switching method of an operating system is characterized in that the method is applied to a terminal comprising a first operating system and a second operating system, and the method comprises the following steps:
when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring identity authentication information through the second operating system;
setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;
deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operating system of the foreground of the terminal to be switched from the first operating system to the second operating system;
acquiring a second switching request generated by the second operating system;
and responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.
2. The method according to claim 1, wherein before the operating system of the foreground of the terminal is switched from the first operating system to the second operating system and the identity authentication information is acquired by the second operating system, the method further comprises:
when the terminal is in an initialization state, the first operating system is operated on a foreground of the terminal, and a first switching request generated by touching the visual control is obtained;
and responding to the first switching request, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.
3. The method according to claim 1, wherein the obtaining, by the second operating system, the identity authentication information when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system comprises:
when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, receiving a setting instruction through the second operating system;
and responding to the setting instruction, and acquiring identity authentication information through the second operating system.
4. The method of claim 1, wherein obtaining the second handover request generated by the second operating system comprises:
when the first operating system runs on the foreground of the terminal, the information to be verified is obtained through the second operating system;
determining whether the information to be verified is matched with the authentication information through the second operating system;
and when the information to be verified is matched with the authentication information, generating a second switching request through the second operating system.
5. The method of claim 4, wherein the authentication information includes a preset text, and when the first operating system is run in a foreground of the terminal, obtaining the information to be verified through the second operating system includes:
when the first operating system runs on the foreground of the terminal, voice information is collected through the second operating system;
correspondingly, the determining, by the second operating system, whether the information to be verified matches the authentication information includes:
analyzing the voice information through the second operating system, and acquiring a keyword in an analysis result;
determining whether the keyword is the preset character or not through the second operating system;
and when the keyword is the preset character, determining that the information to be verified is matched with the authentication information through the second operating system.
6. The method according to claim 4, wherein the authentication information includes preset biometric information, and the obtaining of the information to be verified through the second operating system when the first operating system is run in the foreground of the terminal includes:
when the first operating system runs on the foreground of the terminal, collecting biological characteristic information through the second operating system;
correspondingly, the determining, by the second operating system, whether the information to be verified matches the authentication information includes:
determining whether the biological characteristic information accords with the preset biological characteristic information or not through the second operating system;
and when the biological characteristic information accords with the biological characteristic information, determining that the information to be verified is matched with the authentication information through the second operating system.
7. A terminal, characterized in that the terminal comprises: a processor, a memory, and a communication bus;
the communication bus is used for realizing communication connection between the processor and the memory;
the processor is used for executing a switching program of an operating system in the memory to realize the following steps:
when an operating system of a foreground of the terminal is switched from a first operating system to a second operating system, acquiring identity authentication information through the second operating system;
setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;
deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operating system of the foreground of the terminal to be switched from the first operating system to the second operating system;
acquiring a second switching request generated by the second operating system;
and responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.
8. The terminal according to claim 7, wherein the processor performs the step of obtaining the authentication information through the second operating system when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, and further implements the steps of:
when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, receiving a setting instruction through the second operating system;
and responding to the setting instruction, and acquiring identity authentication information through the second operating system.
9. The terminal according to claim 7, wherein the processor, when executing the step of obtaining the second handover request generated by the second operating system, implements the following steps:
when the first operating system runs on the foreground of the terminal, the information to be verified is obtained through the second operating system;
determining whether the information to be verified is matched with the authentication information through the second operating system;
and when the information to be verified is matched with the authentication information, generating a second switching request through the second operating system.
10. A computer storage medium, characterized in that the computer storage medium stores one or more programs executable by one or more processors to implement the steps of the switching method of an operating system according to any one of claims 1 to 6.
CN201810852132.5A 2018-07-30 2018-07-30 Switching method of operating system, terminal and computer storage medium Active CN110780926B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810852132.5A CN110780926B (en) 2018-07-30 2018-07-30 Switching method of operating system, terminal and computer storage medium
PCT/CN2019/098222 WO2020024912A1 (en) 2018-07-30 2019-07-29 Operating system switching method, terminal, and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810852132.5A CN110780926B (en) 2018-07-30 2018-07-30 Switching method of operating system, terminal and computer storage medium

Publications (2)

Publication Number Publication Date
CN110780926A CN110780926A (en) 2020-02-11
CN110780926B true CN110780926B (en) 2022-11-15

Family

ID=69230823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810852132.5A Active CN110780926B (en) 2018-07-30 2018-07-30 Switching method of operating system, terminal and computer storage medium

Country Status (2)

Country Link
CN (1) CN110780926B (en)
WO (1) WO2020024912A1 (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007066333A1 (en) * 2005-12-07 2007-06-14 Swartz Alon R A practical platform for high risk applications

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2011202832B2 (en) * 2010-12-21 2013-01-24 Lg Electronics Inc. Mobile terminal and method of controlling a mode switching therein
CN102033781B (en) * 2011-01-27 2012-07-18 中标软件有限公司 Desktop system switching method for virtual machine
US8959533B2 (en) * 2012-10-10 2015-02-17 Lenovo (Singapore) Pte. Ltd. Communicating between a first operating environment and a second operating environment in an operating system
CN102970413B (en) * 2012-10-26 2014-11-12 广东欧珀移动通信有限公司 Operation method of smart phone
CN103902322B (en) * 2012-12-28 2017-06-27 联想(北京)有限公司 System switching method and electronic equipment
CN104104786B (en) * 2013-04-12 2016-09-28 中国银联股份有限公司 A kind of method externally carrying body continued power and terminal unit
US9645864B2 (en) * 2014-02-06 2017-05-09 Intel Corporation Technologies for operating system transitions in multiple-operating-system environments
CN104199688B (en) * 2014-08-15 2016-09-21 努比亚技术有限公司 A kind of mobile terminal and the method and apparatus of pilot brush machine thereof
CN105653358A (en) * 2014-11-14 2016-06-08 南京酷派软件技术有限公司 Method and device for switching operation system and terminal
CN104462935B (en) * 2014-12-24 2018-01-09 宇龙计算机通信科技(深圳)有限公司 The safe verification method and terminal of application program in multiple operating system
CN104484229A (en) * 2014-12-29 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and device for switching operating system, and terminal
KR20160099182A (en) * 2015-02-11 2016-08-22 한국전자통신연구원 Method for providing security service for wireless device and apparatus thereof
CN106161733B (en) * 2015-03-26 2020-02-21 深圳酷派技术有限公司 System switching method and device and mobile terminal
CN106412226A (en) * 2016-05-26 2017-02-15 深圳市金立通信设备有限公司 Terminal control method and terminal
CN106096344A (en) * 2016-05-26 2016-11-09 南京酷派软件技术有限公司 Business performs method, business performs device and terminal
CN107102891B (en) * 2017-03-01 2020-10-30 北京珠穆朗玛移动通信有限公司 Application management method based on dual systems and mobile terminal

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007066333A1 (en) * 2005-12-07 2007-06-14 Swartz Alon R A practical platform for high risk applications

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
信息安全模型研究及安全操作系统设计;蔡勉等;《计算机系统应用》;20061005(第10期);全文 *

Also Published As

Publication number Publication date
CN110780926A (en) 2020-02-11
WO2020024912A1 (en) 2020-02-06

Similar Documents

Publication Publication Date Title
US10885218B2 (en) Privacy protection method and terminal device
EP3608809B1 (en) Device power-on method using power button integrated with fingerprint sensor
CN104866752B (en) A kind of application guard method and user terminal
CN105843681B (en) Mobile terminal and operating system switching method thereof
CN107102891B (en) Application management method based on dual systems and mobile terminal
CN108605220B (en) Application processing method and device for embedded universal integrated circuit card
CN105677222B (en) Application message methods of exhibiting, application message show device and terminal
CN104809174A (en) Opening method of terminal application
CN105205379A (en) Control method and device for terminal application and terminal
CN104572175A (en) Method and device for rapidly starting non-privacy type applications
CN111176543A (en) Method, device, computer equipment and storage medium for realizing electronic signature
CN108572866B (en) Application program management method, application program management device and mobile terminal
CN104808899A (en) Terminal
WO2019011083A1 (en) Private information processing method and apparatus, and mobile terminal
CN110780926B (en) Switching method of operating system, terminal and computer storage medium
CN113938733A (en) Shortcut key control method and device for remote control equipment, storage medium and device
CN107704337B (en) Factory setting restoring method, mobile terminal and device with storage function
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN110222492B (en) System switching method and device, computer equipment and computer readable storage medium
CN105677198B (en) Method for sending information and information transmitting apparatus
CN108037912A (en) Show the method, apparatus of page info
CN111400477A (en) Information processing method, system and computer readable storage medium
CN104239095A (en) Operating-system starting method, device and terminal equipment
US20200081597A1 (en) Application program management method and apparatus
CN108182089B (en) Computer starting method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant