CN114666442B - Working mode switching method, device, equipment and storage medium - Google Patents

Working mode switching method, device, equipment and storage medium Download PDF

Info

Publication number
CN114666442B
CN114666442B CN202011530767.7A CN202011530767A CN114666442B CN 114666442 B CN114666442 B CN 114666442B CN 202011530767 A CN202011530767 A CN 202011530767A CN 114666442 B CN114666442 B CN 114666442B
Authority
CN
China
Prior art keywords
terminal
mode
secret
working mode
working
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011530767.7A
Other languages
Chinese (zh)
Other versions
CN114666442A (en
Inventor
张耀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu TD Tech Ltd
Original Assignee
Chengdu TD Tech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu TD Tech Ltd filed Critical Chengdu TD Tech Ltd
Priority to CN202011530767.7A priority Critical patent/CN114666442B/en
Publication of CN114666442A publication Critical patent/CN114666442A/en
Application granted granted Critical
Publication of CN114666442B publication Critical patent/CN114666442B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a working mode switching method, a device, equipment and a storage medium, wherein the method judges whether identification information is acquired or not through a terminal, the identification information comprises a first identification, and the first identification corresponds to a secret mode; if the first identifier is acquired, detecting whether the working mode of the terminal is a secret mode; if not, the working mode of the terminal is switched to the secret mode, so that staff of the secret mechanism can bring the terminal into the working area during working, secret information leakage is avoided, informationized office can be effectively popularized, staff working efficiency is improved, and labor cost is reduced. And after the working mode is switched, according to a preset detection period, detecting whether the working mode of the terminal is a secret mode, and if the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal, thereby avoiding the problem that secret information is revealed due to secret failure of the terminal.

Description

Working mode switching method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of terminals, in particular to a method, a device, equipment and a storage medium for switching working modes.
Background
With the rapid development of electronic technology, terminals are rapidly popularized, and for example, mobile terminals are used by more and more people. The mobile terminal brings convenience to life of people and brings problems to people.
In the related art, taking an example that an employee of a security organization uses a mobile terminal, the employee of the security organization may easily leak security information when using the mobile terminal, which may result in some irrecoverable losses. Thus, it is currently generally required for staff of security institutions to be unable to bring mobile terminals into a work area while working.
However, if staff of the security organization do not bring the mobile terminal into the work area while working, office inconvenience may be caused, thereby reducing staff work efficiency, increasing labor costs, and the like.
Disclosure of Invention
In order to solve the problems in the prior art, the application provides a method, a device, equipment and a storage medium for switching working modes.
In order to achieve the above object, the embodiment of the present invention provides the following technical solutions:
in a first aspect, an embodiment of the present application provides a method for switching a working mode, which is applied to a terminal, where the method includes:
Judging whether identification information is acquired or not, wherein the identification information comprises a first identification, and the first identification corresponds to a secret mode;
if the first identifier is acquired, detecting whether the working mode of the terminal is the secret mode;
if the working mode of the terminal is not the secret mode, switching the working mode of the terminal into the secret mode, and detecting whether the working mode of the terminal is the secret mode according to a preset detection period after the working mode is switched;
if the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal.
In one possible implementation manner, the switching the operation mode of the terminal to the security mode includes:
determining a first terminal function and application corresponding to the security mode according to a pre-stored corresponding relation between the working mode and the terminal function and application;
all the remaining functions and the remaining applications except the first terminal function and the first application in the terminal are forbidden, and whether the first terminal function and the first application of the terminal are started or not is detected;
and if the first terminal function and the application of the terminal are not started, performing a first terminal function and application starting prompt.
In one possible implementation manner, the disabling all remaining functions and remaining applications of the terminal except the first terminal function and application includes:
invoking a control interface of the residual functions in the terminal, and prohibiting the residual functions in the terminal through the control interface, wherein the control interface is used for controlling the prohibition or the enablement of the residual functions;
and adding the rest application in the terminal into a blacklist, and prohibiting the rest application in the terminal through the blacklist.
In one possible implementation, the method further includes:
and if the working mode of the terminal is detected not to be the secret mode and the frequency of detecting that the working mode of the terminal is not the secret mode does not reach the preset frequency, the step of switching the working mode of the terminal into the secret mode is executed again.
In one possible implementation, the identification information further includes a second identification, the second identification corresponding to a leisure mode.
The method further comprises the steps of:
if the second identifier is acquired, detecting whether the working mode of the terminal is the leisure mode;
And if the working mode of the terminal is not the leisure mode, switching the working mode of the terminal into the leisure mode.
In one possible implementation manner, the switching the operation mode of the terminal to the leisure mode includes:
determining a second terminal function and application corresponding to the leisure mode according to the corresponding relation between the pre-stored working mode and the terminal function and application;
detecting whether the second terminal function and application are forbidden;
and if the second terminal function and the application are forbidden, performing forbidden processing on the second terminal function and the application.
In a second aspect, an embodiment of the present application provides a working mode switching device, which is applied to a terminal, where the device includes:
the judging module is used for judging whether the identification information is acquired or not, wherein the identification information comprises a first identification, and the first identification corresponds to a secret mode;
the first detection module is used for detecting whether the working mode of the terminal is the secret mode if the first identifier is acquired;
the first switching module is used for switching the working mode of the terminal into the secret mode if the working mode of the terminal is not the secret mode, and detecting whether the working mode of the terminal is the secret mode according to a preset detection period after the working mode is switched;
And the closing module is used for closing the terminal if the times of detecting that the working mode of the terminal is not the secret mode reach the preset times.
In one possible implementation manner, the first switching module is specifically configured to:
determining a first terminal function and application corresponding to the security mode according to a pre-stored corresponding relation between the working mode and the terminal function and application;
all the remaining functions and the remaining applications except the first terminal function and the first application in the terminal are forbidden, and whether the first terminal function and the first application of the terminal are started or not is detected;
and if the first terminal function and the application of the terminal are not started, performing a first terminal function and application starting prompt.
In one possible implementation manner, the first switching module is specifically configured to:
invoking a control interface of the residual functions in the terminal, and prohibiting the residual functions in the terminal through the control interface, wherein the control interface is used for controlling the prohibition or the enablement of the residual functions;
and adding the rest application in the terminal into a blacklist, and prohibiting the rest application in the terminal through the blacklist.
In one possible implementation manner, the first switching module is further configured to:
and if the working mode of the terminal is detected not to be the secret mode and the frequency of detecting that the working mode of the terminal is not the secret mode does not reach the preset frequency, the step of switching the working mode of the terminal into the secret mode is executed again.
In one possible implementation, the identification information further includes a second identification, the second identification corresponding to a leisure mode.
The apparatus further comprises:
the second detection module is further configured to detect whether a working mode of the terminal is the leisure mode if the second identifier is acquired;
and the second switching module is further used for switching the working mode of the terminal into the leisure mode if the working mode of the terminal is not the leisure mode.
In one possible implementation manner, the second switching module is specifically configured to:
determining a second terminal function and application corresponding to the leisure mode according to the corresponding relation between the pre-stored working mode and the terminal function and application;
detecting whether the second terminal function and application are forbidden;
and if the second terminal function and the application are forbidden, performing forbidden processing on the second terminal function and the application.
In a third aspect, an embodiment of the present application provides an operation mode switching device, including:
a processor;
a memory; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising means for performing the operating mode switching method as described above for the first aspect and the various possible designs of the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program that causes a server to execute the operation mode switching method described in the above first aspect and the various possible designs of the first aspect.
In a fifth aspect, embodiments of the present application provide a computer program product comprising computer instructions for execution by a processor of the operating mode switching method according to the first aspect and the various possible designs of the first aspect.
The method comprises the steps that whether identification information is acquired or not is judged through a terminal, the identification information comprises a first identification, and the first identification corresponds to a secret mode; if the first identifier is acquired, detecting whether the working mode of the terminal is a secret mode; if not, the working mode of the terminal is switched to the secret mode, so that staff of the secret mechanism can bring the terminal into the working area during working, secret information leakage is avoided, informationized office can be effectively popularized, staff working efficiency is improved, and labor cost is reduced. And after the working mode is switched, according to a preset detection period, detecting whether the working mode of the terminal is a secret mode, and if the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal, thereby avoiding the problem that secret information is revealed due to secret failure of the terminal.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
Fig. 1 is a schematic diagram of an architecture of a working mode switching system according to an embodiment of the present application;
fig. 2 is a flow chart of a method for switching working modes according to an embodiment of the present application;
fig. 3 is a flow chart of another method for switching operation modes according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a working mode switching device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of another operation mode switching device according to an embodiment of the present application;
FIG. 6A is a diagram of a possible basic hardware architecture of an operation mode switching device according to an embodiment of the present application;
fig. 6B is another possible basic hardware architecture diagram of the operation mode switching device according to the embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In the related art, taking an example that an employee of a security organization uses a mobile terminal, the employee of the security organization may easily leak the security information when using the mobile terminal, for example, the employee uses the mobile terminal to make a call to leak the security information when working, thereby causing some irrecoverable losses. Thus, for staff of security authorities, it is often required that they cannot bring mobile terminals into the work area at work
However, if the staff of the security organization does not bring the mobile terminal into the work area during work, office inconvenience may be caused, for example, the staff needs to process related work using office application software installed on the mobile terminal, if the staff does not bring the mobile terminal into the work area, the staff may need to manually complete, thereby reducing staff work efficiency, increasing labor costs, etc.
Therefore, in view of the above problems, the present application provides a working mode switching method, when a first identifier is acquired, the working mode of a terminal is switched to a secret mode, so that staff of a secret mechanism can bring the terminal into a working area during working, secret information leakage is avoided, effective popularization of informationized office can be performed, working efficiency of staff is improved, and labor cost is reduced. And after the working mode is switched, according to a preset detection period, detecting whether the working mode of the terminal is a secret mode, and if the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal, thereby avoiding the problem that secret information is revealed due to secret failure of the terminal.
The working mode switching method provided by the embodiment of the application can be applied to the working mode switching of the terminal in various situations, for example, the working mode switching of the terminal when staff of the security mechanism brings the terminal into a working area during working, the working mode switching of the terminal in different time periods, the working mode switching of the terminal in different users, and the like, and the working mode switching method can be specifically determined according to actual conditions.
Optionally, fig. 1 is a schematic diagram of an architecture of a working mode switching system according to an embodiment of the present application. In fig. 1, the configuration includes a terminal including at least one of an acquisition device 101, a processor 102, and a display device 103, taking an example of switching an operation mode of the terminal when an employee of the security organization brings the terminal into an operation area during work.
It will be appreciated that the architecture illustrated in the embodiments of the present application does not constitute a specific limitation on the operating mode switching architecture. In other possible embodiments of the present application, the architecture may include more or fewer components than those illustrated, or some components may be combined, some components may be separated, or different component arrangements may be specifically determined according to the actual application scenario, and the present application is not limited herein. The components shown in fig. 1 may be implemented in hardware, software, or a combination of software and hardware.
In a specific implementation, the obtaining device 101 may be configured to obtain the identification information, where the identification information includes a first identifier, and the first identifier corresponds to the security mode.
The processor 102 can acquire the first identifier from the acquiring device 101, and then switch the working mode of the terminal to the secret mode, so that staff of the secret mechanism can bring the terminal into the working area during working, secret information leakage is avoided, informationized office can be effectively popularized, working efficiency of staff is improved, and labor cost is reduced. After the working mode is switched, the processor 102 can also detect whether the working mode of the terminal is a secret mode according to a preset detection period, if the number of times of detecting that the working mode of the terminal is not the secret mode reaches the preset number of times, the terminal is closed, so that the problem that secret information is revealed due to secret failure of the terminal is avoided, and the method is suitable for application.
The display device 103 may be configured to display the first identifier, the operation mode of the terminal, and the like.
The display device may also be a touch display screen for receiving user instructions while displaying the above to enable interaction with a user.
It should be understood that the above-described processor may be implemented by a processor that reads instructions in a memory and executes the instructions, or may be implemented by a chip circuit.
The terminal may be referred to as an intelligent terminal device, or may be referred to as a User Equipment (UE), a Mobile Station (MS), or the like. A terminal is a device that provides a user with a voice and/or data connection, or a chip provided in the device, for example, a handheld device having a wireless connection function, an in-vehicle device, or the like. Examples of terminals may include, for example: a mobile phone, a tablet computer, a notebook computer, a palm computer, a mobile internet device (Mobile Internet Devices, MID), a wearable device, a Virtual Reality (VR) device, an augmented Reality (Augmented Reality, AR) device, a wireless terminal in industrial control, a wireless terminal in unmanned operation, a wireless terminal in teleoperation, a wireless terminal in smart grid, a wireless terminal in transportation security, a wireless terminal in smart city, a wireless terminal in smart home, and the like.
In addition, the system architecture and the service scenario described in the embodiments of the present application are for more clearly describing the technical solution of the embodiments of the present application, and do not constitute a limitation on the technical solution provided in the embodiments of the present application, and as a person of ordinary skill in the art can know, with the evolution of the system architecture and the appearance of a new service scenario, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The following describes the technical solutions of the present application and how the technical solutions of the present application solve the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 2 is a schematic flow chart of a method for switching a working mode according to an embodiment of the present application, where an execution body of the embodiment of the present application may be a terminal in the embodiment of fig. 1, and may specifically be determined according to an actual situation, which is not particularly limited in the embodiment of the present application. As shown in fig. 2, the method may include:
s201: judging whether the identification information is acquired or not, wherein the identification information comprises a first identification, and the first identification corresponds to a secret mode.
Here, the terminal may be provided therein with acquisition means for acquiring the identification information. In this embodiment of the present application, taking an example of switching a working mode of the terminal when the employee of the security mechanism brings the terminal into the working area during working, an entrance integrated circuit card (Integrated Circuit Card, IC card) is provided at an entrance of the security mechanism, and the first identifier is written. Here, the first identifier may be understood as an entry identifier. The acquiring device provided in the terminal may be a near field communication (Near Field Communication, NFC) card reader, and the terminal may read the entrance IC card through the NFC card reader.
The terminal monitors the information read by the NFC card reader, and further judges whether the identification information is acquired or not, namely judges whether the first identification is acquired or not. And if the first identification is acquired, indicating that the staff enters a working area during working.
S202: if the first identifier is acquired, detecting whether the working mode of the terminal is the security mode.
Here, it is known from the above that if the first identifier is obtained, it indicates that the employee is working in the work area. The terminal needs to detect whether its operation mode is the above-mentioned secret mode.
The terminal may determine, according to a pre-stored correspondence between a working mode and a terminal function and an application, a first terminal function and an application corresponding to the security mode, and further detect whether all remaining functions and remaining applications except the first terminal function and the application in the terminal are prohibited, and detect whether the first terminal function and the application of the terminal are started. If all the remaining functions and the remaining applications except the first terminal function and the first application are forbidden in the detection terminal and the first terminal function and the first application of the terminal are started, the terminal determines that the working mode is the confidentiality mode. Otherwise, the terminal determines that the working mode is not the security mode.
The corresponding relation between the pre-stored working mode and the terminal function and the application can be determined by a security mechanism, for example, in the security mode, the telephone and short message functions of the terminal, the data transmission function of the terminal and the like are forbidden, and the application used by the work is allowed to be started and the like.
S203: if the working mode of the terminal is not the security mode, switching the working mode of the terminal to the security mode, and detecting whether the working mode of the terminal is the security mode according to a preset detection period after the working mode is switched.
In this embodiment of the present application, the terminal may determine, according to a pre-stored correspondence between a working mode and a terminal function and an application, a first terminal function and an application corresponding to the security mode, further, prohibit all remaining functions and remaining applications in the terminal except for the first terminal function and the application, and detect whether the first terminal function and the application of the terminal are started. If the first terminal function and the application are not started, the terminal can perform a first terminal function and application starting prompt to prompt an employee to start the function and application which need to be used in the terminal for work, thereby facilitating the work of the employee and improving the work efficiency of the employee.
When the terminal prohibits all the residual functions and the residual applications except the first terminal function and the application, the control interface of the residual functions in the terminal can be called, and the residual functions in the terminal are prohibited through the control interface, wherein the control interface is used for controlling the prohibition or the enablement of the residual functions. The remaining applications in the terminal may also be added to a blacklist, and the remaining applications in the terminal may be prohibited by the blacklist.
For example, if in the secure mode, the telephone and sms functions of the terminal and the data transmission functions of the terminal need to be disabled, applications that are not in operative use need to be blacklisted. The terminal can call the control interface of the telephone and short message functions and the data transmission function of the terminal, and forbid the functions in the terminal through the control interface. The terminal may also add the application that is not in use to a blacklist, and prohibit the application in the terminal through the blacklist.
Here, the terminal may further add a control interface to the remaining functions of the terminal, before all of the remaining functions and the remaining applications of the terminal except the first terminal function and the application are disabled, the control interface being used to control the disabling or enabling of the remaining functions. Likewise, the terminal may further add a blacklist to the terminal, where the application in the blacklist is prohibited. For example, in the telephone flow, the terminal may add forbidden logic in the incoming call and dialing flow, and may also provide setting and inquiring interfaces. Also, a disabling function is added in the module with the data transmission function, and an interface for inquiring whether to disable can be added. The terminal can also add the function of running a blacklist of the application in the source code of the system starting application, and takes the application package name as a judgment basis. If the package name of a certain application is added into the blacklist, the terminal prohibits the application from being started.
S204: and if the frequency of detecting that the working mode of the terminal is not the security mode reaches the preset frequency, closing the terminal.
After the working mode of the terminal is switched to the security mode, the terminal detects whether the working mode of the terminal is the security mode according to a preset detection period, and if the number of times that the working mode of the terminal is not the security mode reaches the preset number of times, the terminal is closed, so that the problem that security information is leaked due to security failure of the terminal is avoided.
The preset detection period and the preset times can be set according to practical situations, and the embodiment of the application is not particularly limited.
In addition, if the terminal detects that the operation mode is not the security mode and the number of times of detecting that the operation mode is not the security mode does not reach the preset number of times, the step of switching the operation mode of the terminal to the security mode may be re-performed. For example, the preset number of times is one, the terminal starts the timing check logic after switching the operation mode of the terminal to the security mode, and periodically checks that the operation mode of the terminal is switched to the security mode, and immediately switches the operation mode of the terminal to the security mode if the operation mode is not the security mode, and rechecks the operation mode of the terminal if the operation mode is not the security mode, and closes the terminal for safety.
As can be seen from the above description, in the embodiment of the present application, the terminal determines whether to acquire the identification information, where the identification information includes a first identifier, and the first identifier corresponds to a security mode; if the first identifier is acquired, detecting whether the working mode of the terminal is a secret mode; if not, the working mode of the terminal is switched to the secret mode, so that staff of the secret mechanism can bring the terminal into the working area during working, secret information leakage is avoided, informationized office can be effectively popularized, staff working efficiency is improved, and labor cost is reduced. And after the working mode is switched, according to a preset detection period, detecting whether the working mode of the terminal is a secret mode, and if the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal, thereby avoiding the problem that secret information is revealed due to secret failure of the terminal.
In addition, in this embodiment of the present application, the above identification information further includes a second identification, where the second identification corresponds to a leisure mode, that is, an exit IC card is set at an exit of the security mechanism, and the second identification is written. Fig. 3 is a flow chart illustrating another method for switching operation modes according to an embodiment of the present application. As shown in fig. 3, the method includes:
S301: judging whether the identification information is acquired or not, wherein the identification information comprises a first identification and a second identification, the first identification corresponds to a security mode, and the second identification corresponds to a leisure mode.
Here, a gate IC card is provided at the exit of the security mechanism, and a second identification, which can be understood as a gate identification, is written. An acquiring device may be disposed in the terminal, and the acquiring device may be an NFC card reader, through which the terminal may read the outgoing IC card.
The terminal monitors the information read by the NFC card reader, and further judges whether the identification information is acquired, namely whether the first identification or the second identification is acquired. And if the first identification is acquired, indicating that the staff enters a working area during working. And if the second identification is acquired, indicating that the staff leaves the working area.
S302: if the first identifier is acquired, detecting whether the working mode of the terminal is the security mode.
S303: if the working mode of the terminal is not the security mode, switching the working mode of the terminal to the security mode, and detecting whether the working mode of the terminal is the security mode according to a preset detection period after the working mode is switched.
S304: and if the frequency of detecting that the working mode of the terminal is not the security mode reaches the preset frequency, closing the terminal.
The implementation manners of steps S302-S304 are the same as those of steps S202-S204, and are not repeated here.
S305: and if the second identifier is acquired, detecting whether the working mode of the terminal is the leisure mode.
Here, it is known from the above that if the second identifier is obtained, it indicates that the employee leaves the work area. The terminal needs to detect whether its operation mode is the above-mentioned leisure mode.
For example, the terminal may determine a second terminal function and application corresponding to the leisure mode according to a pre-stored correspondence between the working mode and the terminal function and application, and further detect whether the second terminal function and application are prohibited. If the second terminal function and application are disabled, the terminal determines that the operation mode of the terminal is not the leisure mode. Otherwise, the terminal determines that the working mode of the terminal is the leisure mode.
S306: and if the working mode of the terminal is not the leisure mode, switching the working mode of the terminal to the leisure mode.
In this embodiment of the present application, the terminal may determine, according to a pre-stored correspondence between a working mode and a terminal function and an application, a second terminal function and an application corresponding to the leisure mode, and further detect whether the second terminal function and the application are prohibited. And if the second terminal function and the application are forbidden, the terminal performs forbidden processing on the second terminal function and the application.
When the terminal performs the forbidden release processing on the second terminal function and the application, a control interface of the function of the terminal can be called, and the forbidden release processing is performed through the control interface, wherein the control interface is used for controlling the forbidden or enabled function. The application in the terminal may also be removed from the blacklist such that the application is not barred.
For example, if in leisure mode the telephone and text messaging functions of the terminal, the data transfer functions of the terminal need to be enabled, applications that are not in operative use need to be removed from the blacklist. The terminal can call the control interface of the telephone and short message functions and the data transmission function of the terminal, and the functions in the terminal are started through the control interface. The terminal can also move the application which is not used in work out of the blacklist and enable the application.
In addition, after the operation mode of the terminal is switched to the leisure mode, the terminal may further detect whether the operation mode of the terminal is the leisure mode again. If the working mode of the terminal is not the leisure mode, the terminal can switch the working mode of the terminal into the leisure mode again, so that the problem that the user cannot conveniently use the terminal due to failure in switching the working mode once is avoided.
As can be seen from the above description, in the embodiment of the present application, the terminal determines whether to acquire the identification information, where the identification information includes a first identifier and a second identifier, the first identifier corresponds to a security mode, and the second identifier corresponds to a leisure mode; if the first identifier is acquired, detecting whether the working mode of the terminal is a secret mode; if not, the working mode of the terminal is switched to the secret mode, so that staff of the secret mechanism can bring the terminal into the working area during working, secret information leakage is avoided, informationized office can be effectively popularized, staff working efficiency is improved, and labor cost is reduced. And after the working mode is switched, according to a preset detection period, detecting whether the working mode of the terminal is a secret mode, and if the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal, thereby avoiding the problem that secret information is revealed due to secret failure of the terminal. In addition, if the second identifier is acquired, whether the working mode of the terminal is a leisure mode or not is detected; if not, the working mode of the terminal is switched to a leisure mode, so that staff of the security mechanism leaves the working area after working, the terminal can be conveniently used, and the application requirements of users in different scenes are met.
Corresponding to the working mode switching method of the above embodiments, fig. 4 is a schematic structural diagram of the working mode switching device provided in the embodiment of the present application. For convenience of explanation, only portions relevant to the embodiments of the present application are shown. Fig. 4 is a schematic structural diagram of an operation mode switching device according to an embodiment of the present application, where the operation mode switching device 40 includes: the device comprises a judging module 401, a first detecting module 402, a first switching module 403 and a closing module 404. The operation mode switching device may be the terminal itself, or a chip or an integrated circuit for realizing the function of the terminal. Here, the division of the judging module, the first detecting module, the first switching module and the closing module is just a division of a logic function, and the judging module, the first detecting module, the first switching module and the closing module may be integrated or independent physically.
The determining module 401 is configured to determine whether to obtain the identification information, where the identification information includes a first identification, and the first identification corresponds to a security mode.
The first detection module 402 is configured to detect whether the working mode of the terminal is the security mode if the first identifier is acquired.
And a first switching module 403, configured to switch the operation mode of the terminal to the security mode if the operation mode of the terminal is not the security mode, and detect whether the operation mode of the terminal is the security mode according to a preset detection period after the operation mode is switched.
And a closing module 404, configured to close the terminal if the number of times that the working mode of the terminal is detected not to be the security mode reaches a preset number of times.
In one possible implementation manner, the first switching module 403 is specifically configured to:
determining a first terminal function and application corresponding to the security mode according to a pre-stored corresponding relation between the working mode and the terminal function and application;
all the remaining functions and the remaining applications except the first terminal function and the first application in the terminal are forbidden, and whether the first terminal function and the first application of the terminal are started or not is detected;
and if the first terminal function and the application of the terminal are not started, performing a first terminal function and application starting prompt.
In one possible implementation manner, the first switching module 403 is specifically configured to:
invoking a control interface of the residual functions in the terminal, and prohibiting the residual functions in the terminal through the control interface, wherein the control interface is used for controlling the prohibition or the enablement of the residual functions;
and adding the rest application in the terminal into a blacklist, and prohibiting the rest application in the terminal through the blacklist.
In a possible implementation manner, the first switching module 403 is further configured to:
and if the working mode of the terminal is detected not to be the secret mode and the frequency of detecting that the working mode of the terminal is not the secret mode does not reach the preset frequency, the step of switching the working mode of the terminal into the secret mode is executed again.
The device provided in the embodiment of the present application may be used to implement the technical solution of the embodiment of the method described in fig. 2, and its implementation principle and technical effects are similar, and the embodiment of the present application will not be described here again.
Fig. 5 is a schematic structural diagram of another operation mode switching device according to an embodiment of the present application. On the basis of fig. 4, the operation mode switching device 40 further includes: a second detection module 405 and a second switching module 406.
The identification information further comprises a second identification, and the second identification corresponds to the leisure mode.
The second detection module 405 is further configured to detect whether the working mode of the terminal is the leisure mode if the second identifier is acquired.
The second switching module 406 is further configured to switch the operation mode of the terminal to the leisure mode if the operation mode of the terminal is not the leisure mode.
In one possible implementation manner, the second switching module 406 is specifically configured to:
determining a second terminal function and application corresponding to the leisure mode according to the corresponding relation between the pre-stored working mode and the terminal function and application;
detecting whether the second terminal function and application are forbidden;
and if the second terminal function and the application are forbidden, performing forbidden processing on the second terminal function and the application.
The device provided in the embodiment of the present application may be used to implement the technical solution of the embodiment of the method described in fig. 3, and its implementation principle and technical effects are similar, and the embodiment of the present application will not be described here again.
Alternatively, fig. 6A and 6B schematically provide one possible basic hardware architecture of the operation mode switching device described in the present application, respectively.
Referring to fig. 6A and 6B, the operation mode switching device includes at least one processor 601 and a communication interface 603. Further optionally, a memory 602 and a bus 604 may also be included.
Wherein the number of processors 601 may be one or more in the operation mode switching device, fig. 6A and 6B illustrate only one of the processors 601. Alternatively, the processor 601 may be a central processing unit (Central Processing Unit, CPU), a graphics processor (Graphics Processing Unit, GPU) or digital signal processing (Digital Signal Process, DSP). If the operation mode switching device has a plurality of processors 601, the types of the plurality of processors 601 may be different or may be the same. Alternatively, the plurality of processors 601 of the operation mode switching device may be integrated as a multi-core processor.
Memory 602 stores computer instructions and data; the memory 602 may store computer instructions and data required to implement the above-described operating mode switching method provided herein, for example, the memory 602 stores instructions for implementing the steps of the above-described operating mode switching method. The memory 602 may be any one or any combination of the following storage media: nonvolatile memory (e.g., read Only Memory (ROM), solid State Disk (SSD), hard disk (HDD), optical disk), volatile memory).
The communication interface 603 may provide information input/output for the at least one processor. Any one or any combination of the following devices may also be included: a network interface (e.g., ethernet interface), a wireless network card, etc., having network access functionality.
Optionally, the communication interface 603 may also be used for data communication with other computing devices or terminals by an operating mode switching device.
Further alternatively, FIGS. 6A and 6B represent bus 604 with a bold line. A bus 604 may connect the processor 601 with the memory 602 and the communication interface 603. Thus, through bus 604, processor 601 may access memory 602 and may also interact with other computing devices or terminals using communication interface 603.
In the present application, the operating mode switching device executes the computer instructions in the memory 602, so that the operating mode switching device implements the above-mentioned operating mode switching method provided in the present application, or the operating mode switching device deploys the above-mentioned operating mode switching device.
From the viewpoint of logical functional partitioning, as illustrated in fig. 6A, the memory 602 may include a determination module 401, a first detection module 402, a first switching module 403, and a shutdown module 404. The inclusion herein is not limited to a physical structure, and may involve only the functions of the determining module, the first detecting module, the first switching module, and the closing module, respectively, when the instructions stored in the memory are executed.
For example, as shown in fig. 6B, the memory 602 may further include a second detection module 405 and a second switching module 406. The inclusion herein is not limited to a physical structure, and may involve only the functions of the second detection module and the second switching module, respectively, when the instructions stored in the memory are executed.
In addition, the above-mentioned operation mode switching device may be implemented in hardware as a hardware module or as a circuit unit, as well as in software as in fig. 6A and 6B.
The present application provides a computer-readable storage medium storing a computer program that causes a server to execute the above-described operation mode switching method provided by the present application.
The present application provides a computer program product comprising computer instructions for execution by a processor of the above-described method of operating mode switching provided herein.
The present application provides a chip comprising at least one processor and a communication interface providing information input and/or output for the at least one processor. Further, the chip may also include at least one memory for storing computer instructions. The at least one processor is configured to invoke and execute the computer instructions to execute the method for switching a working mode provided in the present application.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in hardware plus software functional units.

Claims (7)

1. An operation mode switching method, which is characterized by being applied to a terminal, comprises the following steps:
judging whether identification information is acquired or not, wherein the identification information comprises a first identification, and the first identification corresponds to a secret mode;
if the first identifier is acquired, detecting whether the working mode of the terminal is the secret mode;
if the working mode of the terminal is not the secret mode, switching the working mode of the terminal into the secret mode, and detecting whether the working mode of the terminal is the secret mode according to a preset detection period after the working mode is switched;
If the frequency of detecting that the working mode of the terminal is not the secret mode reaches the preset frequency, closing the terminal;
if the working mode of the terminal is detected not to be the secret mode and the frequency of detecting that the working mode of the terminal is not the secret mode does not reach the preset frequency, the step of switching the working mode of the terminal into the secret mode is executed again;
the identification information also comprises a second identification, and the second identification corresponds to the leisure mode;
the method further comprises the steps of:
if the second identifier is acquired, detecting whether the working mode of the terminal is the leisure mode;
and if the working mode of the terminal is not the leisure mode, switching the working mode of the terminal into the leisure mode.
2. The method of claim 1, wherein the switching the operation mode of the terminal to the secure mode comprises:
determining a first terminal function and application corresponding to the security mode according to a pre-stored corresponding relation between the working mode and the terminal function and application;
all the remaining functions and the remaining applications except the first terminal function and the first application in the terminal are forbidden, and whether the first terminal function and the first application of the terminal are started or not is detected;
And if the first terminal function and the application of the terminal are not started, performing a first terminal function and application starting prompt.
3. The method of claim 2, wherein the disabling all remaining functions and remaining applications of the terminal other than the first terminal function and application comprises:
invoking a control interface of the residual functions in the terminal, and prohibiting the residual functions in the terminal through the control interface, wherein the control interface is used for controlling the prohibition or the enablement of the residual functions;
and adding the rest application in the terminal into a blacklist, and prohibiting the rest application in the terminal through the blacklist.
4. The method according to claim 1, wherein said switching the operation mode of the terminal to the leisure mode comprises:
determining a second terminal function and application corresponding to the leisure mode according to the corresponding relation between the pre-stored working mode and the terminal function and application;
detecting whether the second terminal function and application are forbidden;
and if the second terminal function and the application are forbidden, performing forbidden processing on the second terminal function and the application.
5. An operation mode switching device, which is applied to a terminal, the device comprising:
the judging module is used for judging whether the identification information is acquired or not, wherein the identification information comprises a first identification, and the first identification corresponds to a secret mode;
the first detection module is used for detecting whether the working mode of the terminal is the secret mode if the first identifier is acquired;
the first switching module is used for switching the working mode of the terminal into the secret mode if the working mode of the terminal is not the secret mode, and detecting whether the working mode of the terminal is the secret mode according to a preset detection period after the working mode is switched;
the closing module is used for closing the terminal if the times of detecting that the working mode of the terminal is not the secret mode reach the preset times;
the first switching module is further configured to:
if the working mode of the terminal is detected not to be the secret mode and the frequency of detecting that the working mode of the terminal is not the secret mode does not reach the preset frequency, the step of switching the working mode of the terminal into the secret mode is executed again;
The operation mode switching device further includes: the second detection module and the second switching module;
the identification information further comprises a second identification, and the second identification corresponds to the leisure mode;
the second detection module is configured to detect whether the working mode of the terminal is the leisure mode if the second identifier is acquired;
and the second switching module is used for switching the working mode of the terminal into the leisure mode if the working mode of the terminal is not the leisure mode.
6. An operating mode switching device, the device comprising:
a processor;
a memory; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor, the computer program comprising instructions for performing the method of any of claims 1-4.
7. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, which causes a server to perform the method of any one of claims 1-4.
CN202011530767.7A 2020-12-22 2020-12-22 Working mode switching method, device, equipment and storage medium Active CN114666442B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011530767.7A CN114666442B (en) 2020-12-22 2020-12-22 Working mode switching method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011530767.7A CN114666442B (en) 2020-12-22 2020-12-22 Working mode switching method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN114666442A CN114666442A (en) 2022-06-24
CN114666442B true CN114666442B (en) 2023-07-04

Family

ID=82024156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011530767.7A Active CN114666442B (en) 2020-12-22 2020-12-22 Working mode switching method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114666442B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760213A (en) * 2012-06-04 2012-10-31 中国电力科学研究院 Credible Agent based MT (Mobile Terminal) credible state monitoring method
CN105608349A (en) * 2015-11-25 2016-05-25 东莞酷派软件技术有限公司 Terminal mode switching method and apparatus as well as terminal
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 A kind of intelligent terminal's mode switching method and its device
CN106657631A (en) * 2016-12-14 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal use mode switching method and apparatus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100087137A1 (en) * 2008-10-03 2010-04-08 Fischer John J Vehicle safety system
CN104618584A (en) * 2015-01-09 2015-05-13 深圳市前海富达科技有限公司 Method and system for switching intelligent terminal safe work mode
US10219146B2 (en) * 2016-06-09 2019-02-26 Scott Russell Schultz Learning gamification and safety control application for mobile devices
CN109068277A (en) * 2018-07-10 2018-12-21 肖孝鸿 A method of realizing mobile terminal managing and control system platform
CN111475835A (en) * 2020-03-20 2020-07-31 深圳市筑泰防务智能科技有限公司 Method, device, terminal, system and readable storage medium for switching working modes of terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102760213A (en) * 2012-06-04 2012-10-31 中国电力科学研究院 Credible Agent based MT (Mobile Terminal) credible state monitoring method
CN105608349A (en) * 2015-11-25 2016-05-25 东莞酷派软件技术有限公司 Terminal mode switching method and apparatus as well as terminal
CN106557678A (en) * 2016-11-09 2017-04-05 珠海格力电器股份有限公司 A kind of intelligent terminal's mode switching method and its device
CN106657631A (en) * 2016-12-14 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal use mode switching method and apparatus

Also Published As

Publication number Publication date
CN114666442A (en) 2022-06-24

Similar Documents

Publication Publication Date Title
CN103391374B (en) Dual system terminal supporting seamless switching
US8718602B2 (en) Method and system for remote control of smart card
CA3026587A1 (en) Mobile payment method and device
CA2857624A1 (en) Method and apparatus for securing touch input
CN101815116A (en) Mobile telephone method and device based on multi-user
CN107861773A (en) Associate management-control method, device, storage medium and the mobile terminal started
CN107957913A (en) Associate management-control method, device, storage medium and the mobile terminal started
CN111246451A (en) Function setting method and device of SIM card, storage medium and terminal
CN102082863A (en) Terminal and software call method on same
CN108733428A (en) Control method for screen display and device
CN104252388B (en) Untrusted environment in mobile device and the switching between trusted context
CN109905389A (en) Method for controlling mobile terminal, device and computer readable storage medium
CN110062929A (en) A kind of method, apparatus and terminal showing data
CN103458394A (en) Mobile terminal, processing method and processing device for internal information of mobile terminal
KR20160096646A (en) Method and device for managing blacklist
CN114666442B (en) Working mode switching method, device, equipment and storage medium
CN105516500A (en) Method and system for selecting device mode
CN115567901A (en) Method, device, equipment and storage medium for operating user identity identification card
CN101127995A (en) An information processing method for phone-card separated mobile terminal
CN107608726A (en) Monitoring method, device, electronic equipment and storage medium
CN104281811A (en) Terminal self-destruction method, system and device
EP3214768B1 (en) Nfc power management device and method
CN107911527A (en) A kind of information protecting method, terminal device and computer-readable recording medium
CN115543500A (en) Window processing method and electronic equipment
CN111913773A (en) NFC card control method, NFC card control device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant