WO2019127043A1 - Terminal device control method and terminal device - Google Patents

Terminal device control method and terminal device Download PDF

Info

Publication number
WO2019127043A1
WO2019127043A1 PCT/CN2017/118740 CN2017118740W WO2019127043A1 WO 2019127043 A1 WO2019127043 A1 WO 2019127043A1 CN 2017118740 W CN2017118740 W CN 2017118740W WO 2019127043 A1 WO2019127043 A1 WO 2019127043A1
Authority
WO
WIPO (PCT)
Prior art keywords
detection
terminal device
domain
data
substance
Prior art date
Application number
PCT/CN2017/118740
Other languages
French (fr)
Chinese (zh)
Inventor
骆磊
Original Assignee
深圳达闼科技控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳达闼科技控股有限公司 filed Critical 深圳达闼科技控股有限公司
Priority to CN201780002579.7A priority Critical patent/CN108235766B/en
Priority to PCT/CN2017/118740 priority patent/WO2019127043A1/en
Publication of WO2019127043A1 publication Critical patent/WO2019127043A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/62Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light
    • G01N21/63Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light optically excited
    • G01N21/65Raman scattering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to the field of information processing, and in particular, to a method and a terminal device for controlling a terminal device.
  • the detection module for detecting substances and other terminal devices can be integrated on one device, thereby enabling the operator to complete the detection work more conveniently.
  • the problem of data security In the process of material detection, it is usually necessary to perform special processing on the collected data to obtain the detection result, and the algorithms, databases, and detected substance information involved in the middle are all data that need to be kept secret. There is a risk of data leakage when placed in a mobile network terminal.
  • the problem of using security Since the detection is usually performed by means of a laser or the like during the detection process, when these operations are triggered by a malfunction or a network attack, the surrounding objects or personal injury may be damaged.
  • An embodiment of the present invention provides a method for controlling a terminal device and a terminal device, which are mainly used to solve the problem of preventing data leakage due to network attacks and operator misoperations when the substance detecting function is integrated on other terminal devices.
  • the problem of false triggering detection function is mainly used to solve the problem of preventing data leakage due to network attacks and operator misoperations when the substance detecting function is integrated on other terminal devices.
  • an embodiment of the present invention provides a method for controlling a terminal device, including: acquiring, by an end device, an entry instruction; entering an detection domain according to an entry instruction; performing substance detection on the detection substance in the detection domain, and acquiring the detection result,
  • the data generated by the terminal device in the detection domain is isolated from the data generated in other working areas of the terminal device.
  • an embodiment of the present invention provides a terminal device, where a terminal device includes at least two working domains, and at least two working domains include a detection domain.
  • the terminal device is configured according to a control platform.
  • the terminal device further includes: an obtaining unit, configured to acquire an entry instruction; and a control unit, configured to: after the obtaining unit acquires the entry instruction, control the terminal device to enter the detection domain according to the entry instruction; and the detecting unit is configured to be in the control After the unit controls the terminal device to enter the detection domain, the substance to be detected is detected in the detection domain.
  • an embodiment of the present invention provides a terminal device, including: a communication interface, a memory, and a processor, the memory is configured to store computer execution code, and the computer execution code is used to control the processor to execute the embodiment of the first aspect.
  • the method of controlling the terminal device provided.
  • an embodiment of the present invention provides a computer storage medium for storing computer software instructions for a terminal device, which is designed to perform the control method of the terminal device provided by the embodiment of the first aspect. code.
  • an embodiment of the present invention provides a computer program that can be directly loaded into an internal memory of a computer and includes software code, and the computer program can be loaded and executed by a computer to implement the embodiment of the first aspect.
  • the method of controlling the terminal device provided.
  • the terminal device is divided into multiple working domains, and a detection domain that is isolated from the data of other working domains is set for substance detection in multiple working domains.
  • the data generated in the detection domain is isolated from the data generated in other working domains, that is, the detection data acquired during the substance detection process and the data generated during the processing of the detection data are isolated from the data generated in other working domains. Therefore, it is possible to prevent applications in other working domains from accessing the detection data, and then the detection data is not leaked when the application in other working domains exists in the backdoor or in other working domains by viruses or Trojans.
  • the terminal device in the present application performs substance detection in the detection domain, applications in other working fields cannot call a device such as a laser emitting lens used for detecting a substance, and when an application in another working domain is cracked or attacked, Devices such as laser emitting lenses are also not turned on.
  • the terminal device in the present application needs to enter the detection domain according to the entry command after obtaining the entry instruction, the possibility that the operator mistakenly enters the detection domain to perform the misoperation of the detection function in the detection domain is further reduced, thereby further improving the possibility. The security of the terminal device when it is used.
  • FIG. 1 is a schematic flowchart of a method for controlling a terminal device according to an embodiment of the present invention
  • FIG. 2 is a diagram showing an example of a specific implementation process of a method for controlling a terminal device according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart diagram of a method for controlling a terminal device according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread in execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be a component.
  • One or more components can reside within a process and/or thread of execution, and a component can be located in a computer and/or distributed between two or more computers. Moreover, these components can execute from various computer readable media having various data structures thereon.
  • These components may be passed, for example, by having one or more data packets (eg, data from one component that interacts with the local system, another component of the distributed system, and/or signaled through, such as the Internet)
  • the network interacts with other systems to communicate in a local and/or remote process.
  • the application will present various aspects, embodiments, or features in a system that can include multiple devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules, etc. discussed in connection with the figures. In addition, a combination of these schemes can also be used.
  • the word "exemplary” is used to mean an example, an illustration, or a description. Any embodiment or design described as “example” in this application should not be construed as preferred or advantageous over other embodiments or designs. Rather, the term use examples is intended to present concepts in a concrete manner.
  • information, signal, message, and channel may sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the difference is not emphasized. “of”, “corresponding (relevant)” and “corresponding” can sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the distinction is not emphasized.
  • Virtualization technology is a kind of resource management technology. It transparently transforms the underlying physical hardware by abstracting various physical resources of the computer, such as computing power and storage capacity, and presents it to users in the form of virtual machines.
  • virtualization technology can be used to isolate one terminal device into multiple separate operating environments, and the applications installed in each operating environment and the stored data are isolated from each other, that is, different in the terminal device. Domain. Specifically, the virtualization of terminal devices can be divided into three categories:
  • the first category the underlying virtualization. Full isolation from the operating system kernel to the runtime environment can be achieved in the underlying virtualization.
  • the virtual machine On the hardware, the virtual machine is provided to the upper layer based on the microkernel mechanism, and the virtual machine runs a complete operating system inside, and the virtual machines are independent and invisible.
  • the solution can be simply understood as: virtual machine + multi-operating system kernel + multi-operating system combination. The method is characterized by good isolation and difficulty in implementation.
  • System virtualization is based on the container mechanism to achieve multi-system isolation in the operating system kernel layer. Multiple operating systems are independent and invisible. The solution is simply understood as: operating system kernel + multiple operating system combinations. The method is characterized by medium isolation and low difficulty in implementation.
  • Framework virtualization is the isolation of the application environment based on the operating system multi-user mechanism in the system framework layer, in which multiple sets of application environments are isolated from each other.
  • the solution can be understood as: a combination of operating system kernel + operating system + multi-user environment.
  • the method is characterized by poor isolation and low difficulty in implementation.
  • the detection domain and other working domains in the present application are the different operating environments defined by the virtualization technology in the terminal device.
  • the method and the terminal device of the present application are applied to a scenario in which a terminal device is controlled when the substance detecting function is integrated on the terminal device.
  • the Raman substance detection function is integrated on the terminal device to enable Raman detection of the substance by the terminal device.
  • An embodiment of the present application provides a method for controlling a terminal device, where a detection domain that is isolated from data of other working domains is set in the terminal device, and then, when the device is detected by the terminal device, the detection domain is entered.
  • the method of performing the detection task in the detection domain realizes the effect of protecting the security of the detection data. As shown in Figure 1, the method includes the following steps:
  • the terminal device acquires unlocking information in a locked state.
  • the unlocking information includes the identity authentication information of the operator.
  • the unlocking information may include information about the operator's biological information such as a fingerprint, an iris, and the like, and the unlocking information may further include information such as an account password that can verify the identity of the operator.
  • the terminal device acquires an entry instruction.
  • the terminal device After the terminal device passes the identity authentication according to the unlocking information and unlocks the terminal device, the terminal device generates an entry instruction to enter the detection domain according to the entry instruction.
  • the operator accessing the detection domain is restricted by authenticating the operator identity authentication information before entering the detection domain. It avoids anyone's access to the detection domain, reduces the possibility of the operator accidentally entering the detection domain and mishandling the detection function in the detection domain, and improves the security of the detection domain.
  • the method before acquiring the unlocking information in the locked state of the terminal device, the method further includes: receiving the power-on command, starting the power according to the power-on command, and entering the locked state after the power-on.
  • the terminal device can directly enter the locked state after being powered on, and then enter the detection domain by performing the above steps S101-S103. In this way, after booting up and obtaining the correct unlocking information, the terminal device enters the detection domain, thereby facilitating the operator to directly start the substance detection task of the substance to be detected. Further, after the identity of the operator is authenticated once each time the device is turned on, the next time the user enters the detection domain, the identity of the operator may not be authenticated, and the entry instruction is directly entered into the detection domain according to the operation of the operator, thereby Avoid operator repeat operations.
  • S101-S102 is an optional step.
  • the steps of S101-S102 may not be performed.
  • the terminal device can acquire an incoming command by receiving an operator-initiated entry command.
  • the data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
  • the terminal device performs substance detection of the substance to be detected by a predetermined detection when the substance is detected. Further, in order to facilitate the operator to detect the detected substance, the method further comprises: after entering the detection domain, opening the detection application.
  • the detection application can set the Launcher of the detection domain so that the detection application directly serves as the desktop UI (User Interface) of the detection domain.
  • the detection application is directly opened by starting the desktop.
  • the operator does not need to input an operation instruction to open the detection application, and the terminal device can automatically open the detection application, so that the operator can directly perform substance detection through the detection application, thereby improving the operator's Use experience.
  • the method may further include: obtaining recommendation information of the management platform, acquiring an installation package of the detection application according to the recommendation information, and installing the detection application according to the installation package.
  • the manner of detecting the application is installed by acquiring the push information of the management platform to limit the application installation in the detection domain.
  • the problem that the detection domain is maliciously attacked due to installation of other unmanaged platform-authenticated applications in the detection domain is avoided.
  • basic applications such as settings, camera, gallery, clock, calendar, notepad, recorder, flashlight, and calculator can be included in the detection domain.
  • a new application needs to be added in the detection domain, it must pass the recommendation information of the management platform. To install the app. Therefore, in this way, it is possible to prevent applications such as a browser and a live chat tool from being installed in the detection domain, thereby ensuring the security of the application in the detection domain.
  • Raman detection is taken as an example, and the terminal device calls a laser emitting device in the detection domain to collect Raman spectrum data of the substance to be detected. Then, the Raman preprocessing algorithm is called to perform background subtraction, filter denoising, deduction substrate and normalization on the collected Raman spectral data.
  • the Raman detection algorithm is used to analyze the pre-processed data.
  • the Raman neural network matching algorithm can be used to match and obtain the pre-processed Raman spectral data based on the calibrated Raman spectroscopy database. result.
  • step S105 specifically includes:
  • Raman spectroscopy data is acquired during Raman detection.
  • S105b Send the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data.
  • the collected Raman spectral data is sent over the Internet to a server or other cloud device for data processing.
  • the Raman preprocessing algorithm, the Raman neural network matching algorithm and the Raman spectroscopy database are called in the server to process and analyze the collected Raman spectroscopy data and obtain the detection result.
  • the obtained detection result is fed back to the terminal device.
  • S105c Receive a detection result sent by the data processing device.
  • the detection data is sent to the data processing device, and the data processing device performs specific data processing, thereby avoiding storing information such as an algorithm and a database for data processing in the data processing device.
  • the risk of information leakage in the terminal device is a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, or a database for data processing in the data processing device. The risk of information leakage in the terminal device.
  • the method further includes:
  • the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is sent to the data processing device by using the SIM card corresponding to the detection domain.
  • a function option of "cutting the domain whether to cut the card" is added.
  • the option is turned on, when the terminal device detects the entry into the detection domain, the designated SIM card is switched to the primary card of the terminal device. The test data is then transmitted to the data processing device using the SIM card.
  • the method further includes:
  • connection instruction is received; the connection instruction is used to instruct the terminal device to connect to the wireless local area network. Determining whether the wireless local area network is a network in the network white list, and if so, connecting the terminal device to the wireless local area network according to the connection instruction, so as to send the detection data to the data processing device by using the wireless local area network.
  • S106 Receive a notification message in the detection domain.
  • a prompt message is displayed to the operator based on the notification message.
  • the detection domain switches to the other work domain corresponding to the notification message and opens the notification message.
  • the open command includes an instruction to open a notification message triggered by the operator according to the prompt information.
  • the terminal device when the terminal device is in the detection domain, if there is an incoming call, a short message or other notification information at this time. Then, the terminal device displays the prompt information about the communication information to the operator, for example, displaying a flag of unread information in the status bar of the terminal device or displaying an incoming call at the top of the screen.
  • the terminal device After receiving an open command triggered by the operator, switching from the detection domain to another working domain, and opening the notification message, for example, when receiving a WeChat message, displaying a prompt message to the operator, after receiving the open command, Then switch the terminal device to the working domain where the WeChat application is installed.
  • the operator does not trigger an open command, such as when the operator hangs up the incoming call when receiving the incoming call notification, it remains in the detection domain.
  • the terminal device receives the notification message in the detection domain, the related information can be displayed to the operator.
  • the terminal device is automatically switched to another working domain and the notification message is opened. Therefore, the operator can also know that a new notification message needs to be viewed in the detection domain, and can prevent the operator from directly viewing the notification message in the detection domain, which may cause data leakage.
  • steps S106 and the previous steps S105 are not necessarily related to each other. As long as the terminal device is satisfied in the detection domain, the content of step S106 can be performed according to specific needs to achieve the above technical effects.
  • the method for controlling the terminal device provided by the application includes: the terminal device performs system upgrade by using an Over-the-Air Technology (OTA) technology.
  • OTA Over-the-Air Technology
  • the method provided by the application further includes: the terminal device sends the current state and the detection result to the management platform. So that the control platform can understand the use of the terminal equipment.
  • FIG. 2 is an exemplary diagram of a specific implementation process of the foregoing embodiment of the present application.
  • Raman detection is performed on the detected substance in the detection domain of the terminal device, and the detected detection data is sent to the cloud platform through the communication network, where the data can be transmitted by using the communication base station by using the mobile communication function of the terminal device.
  • a VPN tunnel can be used to transmit data.
  • the Raman cloud service device in the cloud platform uses the Raman preprocessing algorithm, the Raman detection algorithm and the Raman database in the cloud platform to process the detection data and obtain the detection result, and the detection result is obtained after receiving the detection data. Feedback to the terminal device.
  • the specific OTA server and the control platform can also be set in the cloud platform.
  • the terminal device uses the OTA technology to perform system upgrade through the OTA server, and sends the current state and detection result to the management platform. So that the control platform can understand the use of the terminal equipment.
  • the terminal device is divided into multiple working domains, and a detection domain that is isolated from the data of other working domains is set for substance detection in multiple working domains.
  • the data generated in the detection domain is isolated from the data generated in other working domains, that is, the detection data acquired during the substance detection process and the data generated during the processing of the detection data are isolated from the data generated in other working domains. Therefore, it is possible to prevent applications in other working domains from accessing the detection data, and then the detection data is not leaked when the application in other working domains exists in the backdoor or in other working domains by viruses or Trojans.
  • the terminal device in the present application performs substance detection in the detection domain, applications in other working fields cannot call a device such as a laser emitting lens used for detecting a substance, and when an application in another working domain is cracked or attacked, Devices such as laser emitting lenses are also not turned on.
  • the terminal device in the present application needs to enter the detection domain according to the entry command after obtaining the entry instruction, the possibility that the operator mistakenly enters the detection domain to perform the misoperation of the detection function in the detection domain is further reduced, thereby further improving the possibility. The security of the terminal device when it is used.
  • the embodiment of the present application further provides another method for controlling a terminal device. As shown in FIG. 3, the method includes the following steps:
  • the terminal device acquires an entry instruction.
  • the terminal device acquires an entry instruction in another working domain before the detection domain.
  • the terminal device receives an operator-initiated entry command in other work areas.
  • the terminal device switches the terminal device from another working domain to the detection domain according to the entry instruction.
  • the data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
  • the terminal device when the terminal device is in the detection domain for a long time, the probability of being attacked by a network or erroneously operated is relatively increased.
  • the terminal device after the terminal device in another working domain acquires the entry instruction, the terminal device is switched to the detection domain, and then the task of substance detection and the like is performed in the detection domain. After the terminal device detects the terminal device, the terminal device is switched back to the previous working domain. This reduces the likelihood that the detection domain will be attacked or mishandled.
  • the terminal device can be more conformed to the operating habits of the operator and improve the user experience when the other device is in a more convenient use field when the detection task is not performed.
  • FIG. 4 shows a possible structural diagram of a terminal device related to the present application.
  • the terminal device 30 includes: an obtaining unit 301, a control unit 302, and a detecting unit 303, where:
  • An obtaining unit 301 configured to acquire an entry instruction
  • the control unit 302 is configured to control the terminal device to enter the detection domain according to the entry instruction after the acquisition unit 301 acquires the entry instruction;
  • the detecting unit 303 is configured to: after the control unit 302 controls the terminal device to enter the detection domain, perform a substance detection to obtain a detection result in the detection domain, and the terminal device generates data under the detection domain and other working areas of the terminal device. The resulting data is isolated from each other.
  • the terminal device 30 further includes an authentication unit 304;
  • the obtaining unit 301 is further configured to acquire unlocking information in a locked state, where the unlocking information includes identity authentication information of the operator;
  • the authentication unit 304 is configured to authenticate the identity of the operator according to the unlocking information after the acquiring unit 301 acquires the unlocking information.
  • the control unit 302 is further configured to: after the authentication unit 304 performs identity authentication on the operator, unlock the terminal device; and after unlocking the terminal device, generate an entry instruction.
  • the obtaining unit 301 is specifically configured to acquire an entry instruction in another working domain
  • the control unit 302 is further configured to switch the terminal device to another working domain after performing the substance detection to obtain the detection result in the detection domain.
  • the control unit 301 is further configured to automatically open the detection application after entering the detection domain;
  • the detecting unit 302 is specifically configured to perform substance detection on the substance to be detected by the detecting application.
  • the obtaining unit 301 is further configured to obtain recommendation information of the management platform
  • the control unit 302 is configured to obtain the recommendation information of the management platform in the obtaining unit 301, acquire an installation package of the detection application according to the recommendation information, and install the detection application according to the installation package.
  • the detecting unit 303 is specifically configured to: after the control unit 302 controls the terminal device to enter the detection domain, collect detection data of the substance to be detected; send the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data; and receives the data processing. Test result sent by the device
  • the control unit 302 is further configured to: when the terminal device enters the working domain, when the terminal device enters the detection domain, the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is detected by using the SIM card corresponding to the detection domain. Send to the data processing device.
  • the obtaining unit 301 is further configured to receive a notification message in the detection domain.
  • the control unit 302 is further configured to: after the receiving unit 301 receives the notification message, display the prompt information to the operator according to the notification message; when receiving the open instruction, switch from the detection domain to another working domain corresponding to the notification message and open the notification message,
  • the open command includes an instruction to open a notification message triggered by the operator according to the prompt information.
  • the terminal device in the embodiment of the present application can be applied to implement the foregoing method embodiments. Therefore, the technical solutions that can be obtained are also referred to the foregoing method embodiments.
  • FIG. 5 shows a possible structural diagram of the terminal device involved in the above embodiment.
  • the terminal device 40 includes a processing module 401 and a communication module 402.
  • the processing module 401 is configured to perform control management on the actions of the terminal device.
  • the processing module 401 is configured to control the communication module 402 to support the terminal device to perform steps S101 and S103 in FIG. 1 , step S201 in FIG. 3 , and/or Other processes of the described techniques are used by the processing module 601 to support the terminal device in performing steps S102, S104-S106 in FIG. 1, steps S202-S204 in FIG. 3, and/or other processes for the techniques described herein.
  • the communication module 402 is configured to support communication between the terminal device and other physical devices, and the terminal device 40 may further include a storage module 403 for storing program codes and data of the terminal device 40.
  • the processing module 401 can be a processor or a controller, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication module 402 can be a transceiver, a transceiver circuit, a communication interface, or the like.
  • the storage module 6403 can be a memory.
  • the terminal device When the processing module 401 is a processor, the communication module 402 is a communication interface, and the storage module 403 is a memory, the terminal device according to the embodiment of the present invention may be the terminal device shown in FIG. 6.
  • the terminal device 50 includes a processor 501, a communication interface 502, a memory 503, and a bus 504.
  • the communication interface 502, the processor 501, and the memory 503 are connected to each other through a bus 504.
  • the bus 504 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. Wait.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 6, but it does not mean that there is only one bus or one type of bus.
  • the steps of a method or algorithm described in connection with the present disclosure may be implemented in a hardware, or may be implemented by a processor executing software instructions.
  • the embodiment of the present invention further provides a storage medium, which may include a memory 503 for storing computer software instructions used by the terminal device, and includes program code designed to execute the control method of the terminal device provided in the foregoing embodiment.
  • the software instructions may be composed of corresponding software modules, and the software modules may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), and an erasable programmable only.
  • An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the embodiment of the present invention further provides a computer program, which can be directly loaded into the memory 503 and contains software code, and the computer program can be loaded and executed by the computer to implement the control method of the terminal device provided by the foregoing embodiment. .
  • the functions described herein can be implemented in hardware, software, firmware, or any combination thereof.
  • the functions may be stored in a computer readable medium or transmitted as one or more instructions or code on a computer readable medium.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Pathology (AREA)
  • Immunology (AREA)
  • Biochemistry (AREA)
  • Chemical & Material Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Bioethics (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)
  • Telephone Function (AREA)

Abstract

A terminal device control method and a terminal device, relating to the field of information processing. Embodiments of the present application can ensure the security of data and the security of using a terminal device when a substance detection function is integrated on the terminal device. The method comprises: a terminal device obtains an entry instruction; enters a detection domain according to the entry instruction; performs substance detection on substances to be detected in the detection domain, and obtains the detection result, data generated by the terminal device in the detection domain being isolated from data generated in other working domains of the terminal device. The present application is applied to the control of the terminal device.

Description

一种终端设备的控制方法及终端设备Terminal device control method and terminal device 技术领域Technical field
本申请涉及信息处理领域,尤其涉及一种终端设备的控制方法及终端设备。The present application relates to the field of information processing, and in particular, to a method and a terminal device for controlling a terminal device.
背景技术Background technique
现有技术中,在进行物质检测时,通常是通过专门的检测设备来完成,例如利用拉曼光谱来检测物质的拉曼检测仪。随着科技进步,这种专门的检测设备会做的越来越小,成本也会逐渐降低,进而此类设备也会逐渐进入消费者市场以用于日常生活中检测农药残留、检测真假酒等功能。加之移动互联网技术的快速发展,未来可以将用于检测物质的检测模块与移动网络终端等其他终端设备集成在一台设备上,从而能够使操作者更加便捷的完成检测工作。In the prior art, when performing substance detection, it is usually performed by a special detection device, such as a Raman detector that uses Raman spectroscopy to detect a substance. With the advancement of science and technology, this kind of special testing equipment will be made smaller and smaller, and the cost will gradually decrease. Then such equipment will gradually enter the consumer market for the detection of pesticide residues in daily life and the detection of true and false wines. And other functions. Coupled with the rapid development of mobile Internet technology, in the future, the detection module for detecting substances and other terminal devices such as mobile network terminals can be integrated on one device, thereby enabling the operator to complete the detection work more conveniently.
但本申请发明人发现,现有技术中当将物质检测模块与其他终端设备集成时至少会存在以下问题:1、数据安全性的问题。在进行物质检测过程中,通常需要将采集到的数据进行特殊处理进而得到检测结果,这中间涉及的算法、数据库以及检测到的物质信息等都是需要保密的数据。放在移动网络终端中则存在数据泄露的风险。2、使用安全性的问题。由于在检测过程中,通常会利用发射激光等手段进行检测,因此当发生误操作或者受到网络攻击等情况时触发了这些功能则可能造成周围物品或伤害人身等损害。However, the inventors of the present application have found that at least the following problems exist when integrating the substance detecting module with other terminal devices in the prior art: 1. The problem of data security. In the process of material detection, it is usually necessary to perform special processing on the collected data to obtain the detection result, and the algorithms, databases, and detected substance information involved in the middle are all data that need to be kept secret. There is a risk of data leakage when placed in a mobile network terminal. 2. The problem of using security. Since the detection is usually performed by means of a laser or the like during the detection process, when these operations are triggered by a malfunction or a network attack, the surrounding objects or personal injury may be damaged.
发明内容Summary of the invention
本发明的实施例提供了一种终端设备的控制方法及终端设备,主要用于解决当将物质检测功能集成在其他终端设备上时,如何避免由于网络攻击以及操作者的误操作从而导致数据泄露、误触发检测功能的问题。An embodiment of the present invention provides a method for controlling a terminal device and a terminal device, which are mainly used to solve the problem of preventing data leakage due to network attacks and operator misoperations when the substance detecting function is integrated on other terminal devices. The problem of false triggering detection function.
为达到上述目的,本申请采用如下技术方案:To achieve the above objectives, the present application adopts the following technical solutions:
第一方面,本发明的实施例提供了一种终端设备的控制方法,包括:终端设备获取进入指令;根据进入指令,进入检测域;在检测域中对待检测物质进行物质检测并获取检测结果,终端设备在检测域中产生的数据与终端设备的其他工作域中产生的数据相互隔离。In a first aspect, an embodiment of the present invention provides a method for controlling a terminal device, including: acquiring, by an end device, an entry instruction; entering an detection domain according to an entry instruction; performing substance detection on the detection substance in the detection domain, and acquiring the detection result, The data generated by the terminal device in the detection domain is isolated from the data generated in other working areas of the terminal device.
第二方面,本发明的实施例提供了一种终端设备,其特征在于,终端设备包括至少两个工作域,至少两个工作域中包括检测域;在检测域中,终端设备根据管控平台的推送信息安装应用;终端设备还包括:获取单元,用于获取进入指令;控制单元,用于在获取单元获取进入指令后,根据进入指令,控制终端设备进入检测域;检测单元,用于在控制单元控制终端设备进入检测域后,在检测域中,对待检测物质进行物质检测。In a second aspect, an embodiment of the present invention provides a terminal device, where a terminal device includes at least two working domains, and at least two working domains include a detection domain. In the detection domain, the terminal device is configured according to a control platform. The terminal device further includes: an obtaining unit, configured to acquire an entry instruction; and a control unit, configured to: after the obtaining unit acquires the entry instruction, control the terminal device to enter the detection domain according to the entry instruction; and the detecting unit is configured to be in the control After the unit controls the terminal device to enter the detection domain, the substance to be detected is detected in the detection domain.
第三方面,本发明的实施例提供了一种终端设备,包括:通信接口、存储器和处理器,存储器用于存储计算机执行代码,计算机执行代码用于控制处理器执行上述第一方面的实施例所提供的终端设备的控制方法。In a third aspect, an embodiment of the present invention provides a terminal device, including: a communication interface, a memory, and a processor, the memory is configured to store computer execution code, and the computer execution code is used to control the processor to execute the embodiment of the first aspect. The method of controlling the terminal device provided.
第四方面,本发明的实施例提供了一种计算机存储介质,用于储存为终端设备所用的计算机软件指令,其包含执行上述第一方面的实施例所提供的终端设备的控制方法所设计的程序代码。In a fourth aspect, an embodiment of the present invention provides a computer storage medium for storing computer software instructions for a terminal device, which is designed to perform the control method of the terminal device provided by the embodiment of the first aspect. code.
第五方面,本发明的实施例提供了一种计算机程序,可直接加载到计算机的内部存储器中,并含有软件代码,计算机程序经由计算机载入并执行后能够实现上述第一方面的实施例所提供的终端设备的控制方法。In a fifth aspect, an embodiment of the present invention provides a computer program that can be directly loaded into an internal memory of a computer and includes software code, and the computer program can be loaded and executed by a computer to implement the embodiment of the first aspect. The method of controlling the terminal device provided.
本申请中将终端设备划分为多个工作域,并在多个工作域中为物质检测设置一个与其他工作域的数据相互隔离的检测域。其中,由于检测域中产生的数据与其他工作域中产生的数据相互隔离,即物质检测过程中获取的检测数据以及对检测数据进行处理过程中产生的数据与其他工作域中产生的数据进行隔离,从而能够避免其他工作域中的应用访问检测数据,进而当其他工作域中的应用存在后门或者在其他工作域中受到病毒、木马攻击时不会泄漏检测数据。并且由于本申请中终端设备是在检测域中进行物质检测,因此其他工作域中的应用无法调用检测物质时所用的激光发射镜头等装置,进而当其他工作域中的应用被破解或者受到攻击时也不会开启激光发射镜头等装置。同时,由于本申请中终端设备需要在获取进入指令后,才能根据进入指令进入检测域,因此也降低了操作者误进入检测域对检测域内的检测功能进行误操作的可能性,从而进一步提高了终端设备在使用时的安全性。In the present application, the terminal device is divided into multiple working domains, and a detection domain that is isolated from the data of other working domains is set for substance detection in multiple working domains. The data generated in the detection domain is isolated from the data generated in other working domains, that is, the detection data acquired during the substance detection process and the data generated during the processing of the detection data are isolated from the data generated in other working domains. Therefore, it is possible to prevent applications in other working domains from accessing the detection data, and then the detection data is not leaked when the application in other working domains exists in the backdoor or in other working domains by viruses or Trojans. Moreover, since the terminal device in the present application performs substance detection in the detection domain, applications in other working fields cannot call a device such as a laser emitting lens used for detecting a substance, and when an application in another working domain is cracked or attacked, Devices such as laser emitting lenses are also not turned on. At the same time, since the terminal device in the present application needs to enter the detection domain according to the entry command after obtaining the entry instruction, the possibility that the operator mistakenly enters the detection domain to perform the misoperation of the detection function in the detection domain is further reduced, thereby further improving the possibility. The security of the terminal device when it is used.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only the present invention. For some embodiments, other drawings may be obtained from those of ordinary skill in the art without departing from the drawings.
图1为本发明的实施例所提供的一种终端设备的控制方法的流程示意图;1 is a schematic flowchart of a method for controlling a terminal device according to an embodiment of the present invention;
图2为本发明的实施例所提供的一种终端设备控制方法的具体实现过程的示例图;2 is a diagram showing an example of a specific implementation process of a method for controlling a terminal device according to an embodiment of the present invention;
图3为本发明的实施例所提供的一种终端设备的控制方法的流程示意图;FIG. 3 is a schematic flowchart diagram of a method for controlling a terminal device according to an embodiment of the present invention;
图4为本发明的实施例所提供的一种终端设备的结构示意图;4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
图5为本发明的实施例所提供的一种终端设备的结构示意图;FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;
图6为本发明的实施例所提供的一种终端设备的结构示意图。FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
如本申请所使用的,术语“单元”、“组件”、“模块”、“系统”等等旨在指代计算机相关实体,该计算机相关实体可以是硬件、固件、硬件和软件的结合、软件或者运行中的软件。例如,组件可以是,但不限于是:在处理器上运行的处理、处理器、对象、可执行文件、执行中的线程、程序和/或计算机。作为示例,在计算设备上运行的应用和该计算设备都可以是组件。一个或多个组件可以存在于执行中的过程和/或线程中,并且组件可以位于一个计算机中以及/或者分布在两个或更多个计算机之间。此外,这些组件能够从在其上具有各种数据结构的各种计算机可读介质中执行。这些 组件可以通过诸如根据具有一个或多个数据分组(例如,来自一个组件的数据,该组件与本地系统、分布式系统中的另一个组件进行交互和/或以信号的方式通过诸如互联网之类的网络与其它系统进行交互)的信号,以本地和/或远程过程的方式进行通信。As used herein, the terms "unit", "component", "module", "system" and the like are intended to mean a computer-related entity, which may be hardware, firmware, a combination of hardware and software, software. Or running software. For example, a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread in execution, a program, and/or a computer. As an example, both an application running on a computing device and the computing device can be a component. One or more components can reside within a process and/or thread of execution, and a component can be located in a computer and/or distributed between two or more computers. Moreover, these components can execute from various computer readable media having various data structures thereon. These components may be passed, for example, by having one or more data packets (eg, data from one component that interacts with the local system, another component of the distributed system, and/or signaled through, such as the Internet) The network interacts with other systems to communicate in a local and/or remote process.
本申请将围绕可包括多个设备、组件、模块等的系统来呈现各个方面、实施例或特征。应当理解和明白的是,各个系统可以包括另外的设备、组件、模块等,并且/或者可以并不包括结合附图讨论的所有设备、组件、模块等。此外,还可以使用这些方案的组合。The application will present various aspects, embodiments, or features in a system that can include multiple devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules, etc. discussed in connection with the figures. In addition, a combination of these schemes can also be used.
另外,在本发明实施例中,“示例的”一词用于表示作例子、例证或说明。本申请中被描述为“示例”的任何实施例或设计方案不应被解释为比其它实施例或设计方案更优选或更具优势。确切而言,使用示例的一词旨在以具体方式呈现概念。In addition, in the embodiments of the present invention, the word "exemplary" is used to mean an example, an illustration, or a description. Any embodiment or design described as "example" in this application should not be construed as preferred or advantageous over other embodiments or designs. Rather, the term use examples is intended to present concepts in a concrete manner.
本发明实施例中,信息(information),信号(signal),消息(message),信道(channel)有时可以混用,应当指出的是,在不强调其区别时,其所要表达的含义是一致的。“的(of)”,“相应的(corresponding,relevant)”和“对应的(corresponding)”有时可以混用,应当指出的是,在不强调其区别时,其所要表达的含义是一致的。In the embodiment of the present invention, information, signal, message, and channel may sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the difference is not emphasized. "of", "corresponding (relevant)" and "corresponding" can sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the distinction is not emphasized.
本发明实施例描述的业务场景是为了更加清楚的说明本发明实施例的技术方案,并不构成对于本发明实施例提供的技术方案的限定,本领域普通技术人员可知,随着新业务场景的出现,本发明实施例提供的技术方案对于类似的技术问题,同样适用。The service scenarios described in the embodiments of the present invention are for the purpose of illustrating the technical solutions of the embodiments of the present invention, and are not limited to the technical solutions provided by the embodiments of the present invention. It should be noted that the technical solutions provided by the embodiments of the present invention are equally applicable to similar technical problems.
以下对本申请涉及的专业技术进行介绍:The following describes the expertise involved in this application:
虚拟化技术是一种资源管理技术,主要通过将计算机的各种实体资源如计算能力及存储能力等予以抽象转换的方式透明化底层物理硬件,再以虚拟机的形式呈现给用户。Virtualization technology is a kind of resource management technology. It transparently transforms the underlying physical hardware by abstracting various physical resources of the computer, such as computing power and storage capacity, and presents it to users in the form of virtual machines.
目前,在终端设备领域,利用虚拟化技术可以将一台终端设备隔离出多个单独的运行环境并且在每个运行环境中安装的应用及存储的数据相互隔离,即将在终端设备中划分出不同的域。具体的,终端设备的虚拟化可分为三类:At present, in the field of terminal equipment, virtualization technology can be used to isolate one terminal device into multiple separate operating environments, and the applications installed in each operating environment and the stored data are isolated from each other, that is, different in the terminal device. Domain. Specifically, the virtualization of terminal devices can be divided into three categories:
第一类,底层虚拟化。在底层虚拟化中可以实现从操作系统内核到运行环境的全隔离。在硬件之上基于微内核机制对上层提供虚拟机,虚拟机内部运行完整操作系统,虚拟机之间相互独立且不可见。其方案可简单理解为:虚拟机+多操作系统内核+多操作系统的组合。该方法特点为:隔离性好,实现难度大。The first category, the underlying virtualization. Full isolation from the operating system kernel to the runtime environment can be achieved in the underlying virtualization. On the hardware, the virtual machine is provided to the upper layer based on the microkernel mechanism, and the virtual machine runs a complete operating system inside, and the virtual machines are independent and invisible. The solution can be simply understood as: virtual machine + multi-operating system kernel + multi-operating system combination. The method is characterized by good isolation and difficulty in implementation.
第二类,系统虚拟化。系统虚拟化是在操作系统内核层基于容器机制实现多系统的隔离,多个操作系统之间相互独立且不可见,其方案简单理解为:操作系统内核+多操作系统的组合。该方法特点为:隔离性中等,实现难度小。The second category, system virtualization. System virtualization is based on the container mechanism to achieve multi-system isolation in the operating system kernel layer. Multiple operating systems are independent and invisible. The solution is simply understood as: operating system kernel + multiple operating system combinations. The method is characterized by medium isolation and low difficulty in implementation.
第三类,框架虚拟化。框架虚拟化是在系统框架层基于操作系统多用户机制实现应用环境的隔离,其中多套应用环境之间相互隔离。该方案可理解为:操作系统内核+操作系统+多用户环境的组合。该方法特点为:隔离性差,实现难度低。The third category, framework virtualization. Framework virtualization is the isolation of the application environment based on the operating system multi-user mechanism in the system framework layer, in which multiple sets of application environments are isolated from each other. The solution can be understood as: a combination of operating system kernel + operating system + multi-user environment. The method is characterized by poor isolation and low difficulty in implementation.
本申请中检测域以及其他工作域即为上述利用虚拟化技术在终端设备中划分出的不同运行环境。The detection domain and other working domains in the present application are the different operating environments defined by the virtualization technology in the terminal device.
本申请方法及终端设备应用于将用于物质检测功能集成在终端设备上时,对终端设备进行控制的场景中。例如,将拉曼物质检测功能集成在终端设备上,以实现通过该终端设备能够对物质进行拉曼检测。The method and the terminal device of the present application are applied to a scenario in which a terminal device is controlled when the substance detecting function is integrated on the terminal device. For example, the Raman substance detection function is integrated on the terminal device to enable Raman detection of the substance by the terminal device.
本申请实施例提供一种终端设备的控制方法,该方法中在终端设备中设置一个与其他工作域的数据相互隔离的检测域,进而能够在利用终端设备进行物质检测时,通过进入检测域并在检测域中执行检测任务的方法实现保护检测数据的安全性等效果。如图1所示,该方法包括以下步骤:An embodiment of the present application provides a method for controlling a terminal device, where a detection domain that is isolated from data of other working domains is set in the terminal device, and then, when the device is detected by the terminal device, the detection domain is entered. The method of performing the detection task in the detection domain realizes the effect of protecting the security of the detection data. As shown in Figure 1, the method includes the following steps:
S101、终端设备在锁定状态下获取解锁信息。其中,解锁信息中包含操作者的身份认证信息。S101. The terminal device acquires unlocking information in a locked state. The unlocking information includes the identity authentication information of the operator.
具体的,解锁信息可以包括操作者的生物信息如指纹、虹膜等信息,解锁信息中还可以包括账号密码等能够验证操作者身份的信息。Specifically, the unlocking information may include information about the operator's biological information such as a fingerprint, an iris, and the like, and the unlocking information may further include information such as an account password that can verify the identity of the operator.
S102、在操作者的身份被认证通过后,解锁终端设备。S102: After the identity of the operator is authenticated, the terminal device is unlocked.
S103、终端设备获取进入指令。S103. The terminal device acquires an entry instruction.
具体的,终端设备在根据解锁信息对操作者进行身份认证通过并且 解锁终端设备后生成进入指令,以便根据该进入指令进入检测域。Specifically, after the terminal device passes the identity authentication according to the unlocking information and unlocks the terminal device, the terminal device generates an entry instruction to enter the detection domain according to the entry instruction.
本申请中,在进入检测域之前,通过认证操作者身份认证信息的方式,来限制访问检测域的操作者。避免了任何人都能够对检测域进行访问,降低了操作者误进入检测域对检测域内的检测功能进行误操作的可能性,提高了检测域的安全性。In the present application, the operator accessing the detection domain is restricted by authenticating the operator identity authentication information before entering the detection domain. It avoids anyone's access to the detection domain, reduces the possibility of the operator accidentally entering the detection domain and mishandling the detection function in the detection domain, and improves the security of the detection domain.
在一种实现方式中,在终端设备正在锁定状态下获取解锁信息之前,该方法还包括:接收开机指令,根据开机指令开机并在开机后进入锁定状态。In an implementation manner, before acquiring the unlocking information in the locked state of the terminal device, the method further includes: receiving the power-on command, starting the power according to the power-on command, and entering the locked state after the power-on.
在该实施方式中,终端设备在开机后可以直接进入锁定状态,之后通过执行上述步骤S101-S103的方式进入检测域。这样一来,在开机并获取正确的解锁信息后终端设备便进入了检测域,从而方便操作者直接开始对待检测物质的物质检测任务。进一步的,在每次开机时对操作者的身份进行一次认证后,在下次进入检测域时可以不需要再对操作者的身份进行认证而直接根据操作者的操作获取进入指令进入检测域,从而避免操作者的重复操作。In this embodiment, the terminal device can directly enter the locked state after being powered on, and then enter the detection domain by performing the above steps S101-S103. In this way, after booting up and obtaining the correct unlocking information, the terminal device enters the detection domain, thereby facilitating the operator to directly start the substance detection task of the substance to be detected. Further, after the identity of the operator is authenticated once each time the device is turned on, the next time the user enters the detection domain, the identity of the operator may not be authenticated, and the entry instruction is directly entered into the detection domain according to the operation of the operator, thereby Avoid operator repeat operations.
需要说明的是,上述S101-S102为可选步骤,在一些情况下当终端设备能够通过其他方式获取进入指令时,也可以不执行S101-S102的步骤。例如,终端设备可以通过接收操作者触发的进入指令的方式来获取进入指令。It should be noted that the above S101-S102 is an optional step. In some cases, when the terminal device can acquire the entry instruction by other means, the steps of S101-S102 may not be performed. For example, the terminal device can acquire an incoming command by receiving an operator-initiated entry command.
S104、根据进入指令,进入检测域。S104. Enter the detection domain according to the entry instruction.
S105、在检测域中对待检测物质进行物质检测并获取检测结果。S105. Perform substance detection on the substance to be detected in the detection domain and obtain a detection result.
其中,终端设备在检测域中产生的数据与终端设备的其他工作域中产生的数据相互隔离。The data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
在一种实施例中,在进行物质检测时,终端设备通过预定的检测应用对待检测物质进行物质检测。进一步的,为了方便操作者对待检测物质进行检测,该方法还包括:在进入检测域后,打开检测应用。In one embodiment, the terminal device performs substance detection of the substance to be detected by a predetermined detection when the substance is detected. Further, in order to facilitate the operator to detect the detected substance, the method further comprises: after entering the detection domain, opening the detection application.
例如,可以将检测应用设置检测域的Launcher(桌面启动器),使检测应用直接作为检测域的桌面UI(User Interface,用户界面)。当终端设备进入检测域后通过启动桌面的方式,直接打开检测应用。本实施例中, 在进入检测域后,操作者不需要再输入操作指令来打开检测应用,终端设备就能够自动打开检测应用,以便操作者直接能够通过检测应用进行物质检测,提高了操作者的使用体验。For example, the detection application can set the Launcher of the detection domain so that the detection application directly serves as the desktop UI (User Interface) of the detection domain. When the terminal device enters the detection domain, the detection application is directly opened by starting the desktop. In this embodiment, after entering the detection domain, the operator does not need to input an operation instruction to open the detection application, and the terminal device can automatically open the detection application, so that the operator can directly perform substance detection through the detection application, thereby improving the operator's Use experience.
进一步的,在打开检测应用之前,该方法还可以包括:获取管控平台的推荐信息,根据推荐信息获取检测应用的安装包并根据所述安装包安装检测应用。Further, before the detection application is opened, the method may further include: obtaining recommendation information of the management platform, acquiring an installation package of the detection application according to the recommendation information, and installing the detection application according to the installation package.
本实施例中为了保证检测域中信息的安全性,通过获取管控平台的推送信息来安装检测应用的方式,来限制检测域中的应用安装。从而避免了由于其他未经管控平台认证的应用安装在检测域中而导致检测域受到恶意攻击的可能性增加的问题。例如,在检测域中可以包括设置、相机、图库、时钟、日历、记事本、录音机、手电筒以及计算器等基本应用,当需要在检测域中添加新应用时,则必须经过管控平台的推荐信息来安装应用。因此可以通过这种方式来阻止在检测域中安装浏览器、即时聊天工具等应用,确保了检测域内应用的安全性。In this embodiment, in order to ensure the security of the information in the detection domain, the manner of detecting the application is installed by acquiring the push information of the management platform to limit the application installation in the detection domain. Thereby, the problem that the detection domain is maliciously attacked due to installation of other unmanaged platform-authenticated applications in the detection domain is avoided. For example, basic applications such as settings, camera, gallery, clock, calendar, notepad, recorder, flashlight, and calculator can be included in the detection domain. When a new application needs to be added in the detection domain, it must pass the recommendation information of the management platform. To install the app. Therefore, in this way, it is possible to prevent applications such as a browser and a live chat tool from being installed in the detection domain, thereby ensuring the security of the application in the detection domain.
另外,在对待检测物质进行物质检测并获取检测结果的过程中,具体的以拉曼检测为例,终端设备在检测域中调用激光发射装置,采集待检测物质的拉曼光谱数据。然后调用拉曼预处理算法对采集到的拉曼光谱数据进行背景扣除、滤波去噪、扣基底以及归一化等处理。再调用拉曼检测算法对预处理后的数据进行分析,具体的可以通过拉曼神经网络匹配算法,以标定的拉曼光谱数据库为基础,对预处理后的拉曼光谱数据进行匹配并获取分析结果。In addition, in the process of performing substance detection on the substance to be detected and acquiring the detection result, specifically, Raman detection is taken as an example, and the terminal device calls a laser emitting device in the detection domain to collect Raman spectrum data of the substance to be detected. Then, the Raman preprocessing algorithm is called to perform background subtraction, filter denoising, deduction substrate and normalization on the collected Raman spectral data. The Raman detection algorithm is used to analyze the pre-processed data. The Raman neural network matching algorithm can be used to match and obtain the pre-processed Raman spectral data based on the calibrated Raman spectroscopy database. result.
考虑到对采集到的检测数据利用相关算法进行处理的过程中可能涉及机密数据,例如上述实例中,对采集数据进行拉曼预处理算法、检测算法、拉曼光谱数据库、以及检测的物质光谱和名称都可能是需要保密的内容。在本申请提供的另一种实施例中,步骤S105具体包括:Considering that the collected detection data may be processed by using a correlation algorithm, for example, in the above example, a Raman preprocessing algorithm, a detection algorithm, a Raman spectrum database, and a detected substance spectrum are performed on the collected data. Names may be content that needs to be kept secret. In another embodiment provided by the present application, step S105 specifically includes:
S105a、采集待检测物质的检测数据。S105a, collecting detection data of the substance to be detected.
例如,在拉曼检测过程中,采集拉曼光谱数据。For example, Raman spectroscopy data is acquired during Raman detection.
S105b、将检测数据发送至数据处理设备,以便数据处理设备根据检测数据获取检测结果。S105b: Send the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data.
例如,将采集到的拉曼光谱数据通过互联网发送至用于进行数据处理的服务器或者其他云端设备中。然后在该服务器中调用拉曼预处理算法、拉曼神经网络匹配算法以及拉曼光谱数据库,来对采集到的拉曼光谱数据进行处理分析并得到检测结果。最后,将得到的检测结果反馈给终端设备。For example, the collected Raman spectral data is sent over the Internet to a server or other cloud device for data processing. Then, the Raman preprocessing algorithm, the Raman neural network matching algorithm and the Raman spectroscopy database are called in the server to process and analyze the collected Raman spectroscopy data and obtain the detection result. Finally, the obtained detection result is fed back to the terminal device.
S105c、接收数据处理设备发送的检测结果。S105c: Receive a detection result sent by the data processing device.
上述实施例中,通过终端设备在采集到检测数据后,将检测数据发送至数据处理设备,由数据处理设备来进行具体的数据处理,避免了将用于数据处理的算法及数据库等信息存储在终端设备中可能带来的信息泄露的风险。In the above embodiment, after the detection data is collected by the terminal device, the detection data is sent to the data processing device, and the data processing device performs specific data processing, thereby avoiding storing information such as an algorithm and a database for data processing in the data processing device. The risk of information leakage in the terminal device.
进一步的,为了保证数据在终端设备与数据处理设备之间传输时的数据安全,在一种实施例中,该方法还包括:Further, in order to ensure data security when data is transmitted between the terminal device and the data processing device, in an embodiment, the method further includes:
当终端设备进入检测域时,将检测域对应的SIM卡切换为终端设备的主卡,以便利用检测域对应的SIM卡将检测数据发送至数据处理设备。When the terminal device enters the detection domain, the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is sent to the data processing device by using the SIM card corresponding to the detection domain.
例如,在终端设备的设置中增加一项“切域是否切卡”的功能选项。当打开该选项时,则当终端设备检测到进入检测域时,则将指定SIM卡切换为终端设备的主卡。之后利用该SIM卡将检测数据发送至数据处理设备。For example, in the setting of the terminal device, a function option of "cutting the domain whether to cut the card" is added. When the option is turned on, when the terminal device detects the entry into the detection domain, the designated SIM card is switched to the primary card of the terminal device. The test data is then transmitted to the data processing device using the SIM card.
在另一种实施例中,该方法还包括:In another embodiment, the method further includes:
在检测域中,接收连接指令;连接指令用于指示终端设备连接无线局域网。判断无线局域网是否为网络白名单内的网络,若是,则根据连接指令将终端设备连接至无线局域网,以便利用该无线局域网将检测数据发送至数据处理设备。In the detection domain, a connection instruction is received; the connection instruction is used to instruct the terminal device to connect to the wireless local area network. Determining whether the wireless local area network is a network in the network white list, and if so, connecting the terminal device to the wireless local area network according to the connection instruction, so as to send the detection data to the data processing device by using the wireless local area network.
S106、在检测域中,接收通知消息。根据通知消息,向操作者显示提示信息。当接收到打开指令时,从检测域切换至通知消息对应的其他工作域并打开所述通知消息。S106. Receive a notification message in the detection domain. A prompt message is displayed to the operator based on the notification message. When receiving the open command, the detection domain switches to the other work domain corresponding to the notification message and opens the notification message.
其中,打开指令包括操作者根据提示信息触发的打开通知消息的指令。The open command includes an instruction to open a notification message triggered by the operator according to the prompt information.
例如,当终端设备处于检测域中时,若此时有来电、短信或者其他通知信息时。则终端设备向操作者显示关于该通信信息的提示信息,例如在 终端设备的状态栏中显示有未读信息的标志或者在屏幕的上方显示来电等。当接收到操作者触发的打开指令后,则从检测域切换至其他工作域中,并打开该通知消息,例如当接收到一条微信消息时向操作者显示提示消息,在接收到打开指令后,则将终端设备切换至安装有微信应用的工作域中。另外,若操作者没有触发打开指令,例如当接收到来电通知时操作者挂断该来电,则保留在检测域中。For example, when the terminal device is in the detection domain, if there is an incoming call, a short message or other notification information at this time. Then, the terminal device displays the prompt information about the communication information to the operator, for example, displaying a flag of unread information in the status bar of the terminal device or displaying an incoming call at the top of the screen. After receiving an open command triggered by the operator, switching from the detection domain to another working domain, and opening the notification message, for example, when receiving a WeChat message, displaying a prompt message to the operator, after receiving the open command, Then switch the terminal device to the working domain where the WeChat application is installed. In addition, if the operator does not trigger an open command, such as when the operator hangs up the incoming call when receiving the incoming call notification, it remains in the detection domain.
本实施例中,考虑到在保证检测域的安全性的同时,还要兼顾操作者在使用终端设备的其他功能时的便捷性。进而当终端设备在检测域中接收到通知消息时,能够向操作者显示相关信息。当操作者确定要打开该通知消息时,则将终端设备自动切换至其他工作域中并打开该通知消息。从而使操作者在检测域中也能够知道有新的通知消息需要查看,又能避免操作者直接在检测域中查看通知消息可能导致数据泄露的问题。In this embodiment, it is considered that while ensuring the security of the detection domain, it is also necessary to take into consideration the convenience of the operator when using other functions of the terminal device. Further, when the terminal device receives the notification message in the detection domain, the related information can be displayed to the operator. When the operator determines that the notification message is to be opened, the terminal device is automatically switched to another working domain and the notification message is opened. Therefore, the operator can also know that a new notification message needs to be viewed in the detection domain, and can prevent the operator from directly viewing the notification message in the detection domain, which may cause data leakage.
需要说明的是,步骤S106与之前的S105等步骤并没有必然的前后联系。只要满足终端设备处于检测域中,即可根据具体需要来执行步骤S106的内容从而实现上述技术效果。It should be noted that the steps S106 and the previous steps S105 are not necessarily related to each other. As long as the terminal device is satisfied in the detection domain, the content of step S106 can be performed according to specific needs to achieve the above technical effects.
可选的,本申请提供的终端设备的控制方法中包括,终端设备通过OTA(Over-the-Air Technology,空中下载技术)技术进行系统升级。Optionally, the method for controlling the terminal device provided by the application includes: the terminal device performs system upgrade by using an Over-the-Air Technology (OTA) technology.
可选的,本申请提供的方法中还包括,终端设备向管控平台发送当前状态和检测结果。以便管控平台能够了解到终端设备的使用情况。Optionally, the method provided by the application further includes: the terminal device sends the current state and the detection result to the management platform. So that the control platform can understand the use of the terminal equipment.
示例性的,图2为本申请上述实施例的一种具体实现过程的示例图。具体的,在终端设备的检测域中对待检测物质进行拉曼检测,并将检测到的检测数据通过通信网络发送至云平台中,其中具体的可以通过终端设备的移动通信功能利用通信基站发送数据,进一步的为了保证数据的安全快速的传输,可以利用VPN隧道来传输数据。之后,云平台中的拉曼云服务设备在接收到检测数据后利用云平台中的拉曼预处理算法、拉曼检测算法以及拉曼数据库对检测数据进行处理并得到检测结果,并将检测结果反馈至终端设备。另外,具体的OTA服务器和管控平台也可设置在云平台中,终端设备通过OTA服务器利用OTA技术进行系统升级,以及向管控平台发送当前状态和检测结果。以便管控平台能够了解到终端设备的使用情况。Exemplarily, FIG. 2 is an exemplary diagram of a specific implementation process of the foregoing embodiment of the present application. Specifically, Raman detection is performed on the detected substance in the detection domain of the terminal device, and the detected detection data is sent to the cloud platform through the communication network, where the data can be transmitted by using the communication base station by using the mobile communication function of the terminal device. Further, in order to ensure secure and fast transmission of data, a VPN tunnel can be used to transmit data. After that, the Raman cloud service device in the cloud platform uses the Raman preprocessing algorithm, the Raman detection algorithm and the Raman database in the cloud platform to process the detection data and obtain the detection result, and the detection result is obtained after receiving the detection data. Feedback to the terminal device. In addition, the specific OTA server and the control platform can also be set in the cloud platform. The terminal device uses the OTA technology to perform system upgrade through the OTA server, and sends the current state and detection result to the management platform. So that the control platform can understand the use of the terminal equipment.
本申请中将终端设备划分为多个工作域,并在多个工作域中为物质检测设置一个与其他工作域的数据相互隔离的检测域。其中,由于检测域中产生的数据与其他工作域中产生的数据相互隔离,即物质检测过程中获取 的检测数据以及对检测数据进行处理过程中产生的数据与其他工作域中产生的数据进行隔离,从而能够避免其他工作域中的应用访问检测数据,进而当其他工作域中的应用存在后门或者在其他工作域中受到病毒、木马攻击时不会泄漏检测数据。并且由于本申请中终端设备是在检测域中进行物质检测,因此其他工作域中的应用无法调用检测物质时所用的激光发射镜头等装置,进而当其他工作域中的应用被破解或者受到攻击时也不会开启激光发射镜头等装置。同时,由于本申请中终端设备需要在获取进入指令后,才能根据进入指令进入检测域,因此也降低了操作者误进入检测域对检测域内的检测功能进行误操作的可能性,从而进一步提高了终端设备在使用时的安全性。In the present application, the terminal device is divided into multiple working domains, and a detection domain that is isolated from the data of other working domains is set for substance detection in multiple working domains. The data generated in the detection domain is isolated from the data generated in other working domains, that is, the detection data acquired during the substance detection process and the data generated during the processing of the detection data are isolated from the data generated in other working domains. Therefore, it is possible to prevent applications in other working domains from accessing the detection data, and then the detection data is not leaked when the application in other working domains exists in the backdoor or in other working domains by viruses or Trojans. Moreover, since the terminal device in the present application performs substance detection in the detection domain, applications in other working fields cannot call a device such as a laser emitting lens used for detecting a substance, and when an application in another working domain is cracked or attacked, Devices such as laser emitting lenses are also not turned on. At the same time, since the terminal device in the present application needs to enter the detection domain according to the entry command after obtaining the entry instruction, the possibility that the operator mistakenly enters the detection domain to perform the misoperation of the detection function in the detection domain is further reduced, thereby further improving the possibility. The security of the terminal device when it is used.
本申请实施例还提供另一种终端设备的控制方法,如图3所示,该方法包括以下步骤:The embodiment of the present application further provides another method for controlling a terminal device. As shown in FIG. 3, the method includes the following steps:
S201、终端设备获取进入指令。S201. The terminal device acquires an entry instruction.
具体的,终端设备在检测域之前的其他工作域中获取进入指令。示例性的,终端设备在其他工作域接收操作者触发的进入指令。Specifically, the terminal device acquires an entry instruction in another working domain before the detection domain. Illustratively, the terminal device receives an operator-initiated entry command in other work areas.
S202、根据进入指令,进入检测域。S202. Enter the detection domain according to the entry instruction.
具体的,终端设备根据进入指令,将终端设备从其他工作域切换至检测域中。Specifically, the terminal device switches the terminal device from another working domain to the detection domain according to the entry instruction.
S203、在检测域中对待检测物质进行物质检测并获取检测结果。S203. Perform substance detection on the substance to be detected in the detection domain and obtain a detection result.
其中,终端设备在检测域中产生的数据与终端设备的其他工作域中产生的数据相互隔离。The data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
上述步骤S201-S203的具体实现方式和效果可能参见上述步骤S103-S105的内容,重复之处不再赘述。For the specific implementation manners and effects of the foregoing steps S201-S203, refer to the content of the above steps S103-S105, and the repeated description is not repeated.
S204、将终端设备切换至其他工作域。S204. Switch the terminal device to another working domain.
本申请实施例中,考虑到当终端设备长时间处于检测域时,可能受到网络攻击或者误操作的概率就相对增大。进而本实施例中当处于其他工作域的终端设备获取进入指令后,则将该终端设备切换至检测域,进而在检测域中进行物质检测等任务。当终端设备检测完毕后,则将终端设备再切换回之前的工作域中。从而能够降低了检测域受到攻击或进行误操作的 可能性。另外,通过上述方法使终端设备在不执行检测任务时处于更加方便使用的其他工作域也能更加符合操作者的操作习惯,提高用户体验。In the embodiment of the present application, it is considered that when the terminal device is in the detection domain for a long time, the probability of being attacked by a network or erroneously operated is relatively increased. In this embodiment, after the terminal device in another working domain acquires the entry instruction, the terminal device is switched to the detection domain, and then the task of substance detection and the like is performed in the detection domain. After the terminal device detects the terminal device, the terminal device is switched back to the previous working domain. This reduces the likelihood that the detection domain will be attacked or mishandled. In addition, by the above method, the terminal device can be more conformed to the operating habits of the operator and improve the user experience when the other device is in a more convenient use field when the detection task is not performed.
基于上述终端设备的控制方法,本申请提供一种终端设备。图4示出本申请所涉及终端设备的一种可能的结构示意图。具体的,该终端设备30包括:获取单元301、控制单元302、检测单元303,其中:Based on the foregoing control method of the terminal device, the present application provides a terminal device. FIG. 4 shows a possible structural diagram of a terminal device related to the present application. Specifically, the terminal device 30 includes: an obtaining unit 301, a control unit 302, and a detecting unit 303, where:
获取单元301,用于获取进入指令;An obtaining unit 301, configured to acquire an entry instruction;
控制单元302,用于在获取单元301获取进入指令后,根据进入指令,控制终端设备进入检测域;The control unit 302 is configured to control the terminal device to enter the detection domain according to the entry instruction after the acquisition unit 301 acquires the entry instruction;
检测单元303,用于在控制单元302控制终端设备进入检测域后,在检测域中,对待检测物质进行物质检测获取检测结果,终端设备在检测域下产生的数据与终端设备的其他工作域下产生的数据相互隔离。The detecting unit 303 is configured to: after the control unit 302 controls the terminal device to enter the detection domain, perform a substance detection to obtain a detection result in the detection domain, and the terminal device generates data under the detection domain and other working areas of the terminal device. The resulting data is isolated from each other.
可选的,终端设备30还包括认证单元304;Optionally, the terminal device 30 further includes an authentication unit 304;
获取单元301,还用于在锁定状态获取解锁信息,其中解锁信息包含操作者的身份认证信息;The obtaining unit 301 is further configured to acquire unlocking information in a locked state, where the unlocking information includes identity authentication information of the operator;
认证单元304,用于在获取单元301获取解锁信息后,根据解锁信息对操作者的身份进行认证;The authentication unit 304 is configured to authenticate the identity of the operator according to the unlocking information after the acquiring unit 301 acquires the unlocking information.
控制单元302,还用于在认证单元304对操作者进行身份认证通过后,解锁终端设备;并在解锁终端设备后,生成进入指令。The control unit 302 is further configured to: after the authentication unit 304 performs identity authentication on the operator, unlock the terminal device; and after unlocking the terminal device, generate an entry instruction.
可选的,Optional,
获取单元301,具体用于在其他工作域时获取进入指令;The obtaining unit 301 is specifically configured to acquire an entry instruction in another working domain;
控制单元302,还用于在检测域中对待检测物质进行物质检测获取检测结果后,将终端设备切换至其他工作域。The control unit 302 is further configured to switch the terminal device to another working domain after performing the substance detection to obtain the detection result in the detection domain.
可选的,Optional,
控制单元301,还用于在进入检测域后,自动打开检测应用;The control unit 301 is further configured to automatically open the detection application after entering the detection domain;
检测单元302,具体用于通过检测应用,对待检测物质进行物质检测。The detecting unit 302 is specifically configured to perform substance detection on the substance to be detected by the detecting application.
可选的,Optional,
获取单元301,还用于获取管控平台的推荐信息;The obtaining unit 301 is further configured to obtain recommendation information of the management platform;
控制单元302,用于在获取单元301获取管控平台的推荐信息,根据 推荐信息获取检测应用的安装包并根据安装包安装检测应用。The control unit 302 is configured to obtain the recommendation information of the management platform in the obtaining unit 301, acquire an installation package of the detection application according to the recommendation information, and install the detection application according to the installation package.
可选的,Optional,
检测单元303,具体用于在控制单元302控制终端设备进入检测域后,采集待检测物质的检测数据;将检测数据发送至数据处理设备,以便数据处理设备根据检测数据获取检测结果;接收数据处理设备发送的检测结果The detecting unit 303 is specifically configured to: after the control unit 302 controls the terminal device to enter the detection domain, collect detection data of the substance to be detected; send the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data; and receives the data processing. Test result sent by the device
可选的,Optional,
控制单元302,还用于当终端设备进入工作域时,当终端设备进入检测域时,将检测域对应的SIM卡切换为终端设备的主卡,以便利用检测域对应的SIM卡,将检测数据发送至数据处理设备。The control unit 302 is further configured to: when the terminal device enters the working domain, when the terminal device enters the detection domain, the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is detected by using the SIM card corresponding to the detection domain. Send to the data processing device.
可选的,Optional,
获取单元301,还用于在检测域中,接收通知消息;The obtaining unit 301 is further configured to receive a notification message in the detection domain.
控制单元302,还用于在获取单元301接收通知消息后,根据通知消息向操作者显示提示信息;当接收到打开指令时,从检测域切换至通知消息对应的其他工作域并打开通知消息,打开指令包括操作者根据提示信息触发的打开通知消息的指令。The control unit 302 is further configured to: after the receiving unit 301 receives the notification message, display the prompt information to the operator according to the notification message; when receiving the open instruction, switch from the detection domain to another working domain corresponding to the notification message and open the notification message, The open command includes an instruction to open a notification message triggered by the operator according to the prompt information.
由于本申请实施例中的终端设备可以应用于实施上述方法实施例,因此,其所能获得的技术效果也可参考上述方法实施例,本申请实施例在此不再赘述。The terminal device in the embodiment of the present application can be applied to implement the foregoing method embodiments. Therefore, the technical solutions that can be obtained are also referred to the foregoing method embodiments.
在采用集成的单元的情况下,附图5示出了上述实施例中所涉及的终端设备的一种可能的结构示意图。终端设备40包括:处理模块401和通信模块402。处理模块401用于对终端设备的动作进行控制管理,例如,处理模块401用于控制通信模块402支持终端设备执行图1中的步骤S101、S103、图3中的步骤S201和/或用于本文所描述的技术的其它过程,处理模块601用于支持终端设备执行图1中的步骤S102、S104-S106、图3中的步骤S202-S204和/或用于本文所描述的技术的其它过程。通信模块402用于支持终端设备与其他实体设备的通信,终端设备40还可以包括存储模块403,用于存储终端设备40的程序代码和数据。In the case of employing an integrated unit, FIG. 5 shows a possible structural diagram of the terminal device involved in the above embodiment. The terminal device 40 includes a processing module 401 and a communication module 402. The processing module 401 is configured to perform control management on the actions of the terminal device. For example, the processing module 401 is configured to control the communication module 402 to support the terminal device to perform steps S101 and S103 in FIG. 1 , step S201 in FIG. 3 , and/or Other processes of the described techniques are used by the processing module 601 to support the terminal device in performing steps S102, S104-S106 in FIG. 1, steps S202-S204 in FIG. 3, and/or other processes for the techniques described herein. The communication module 402 is configured to support communication between the terminal device and other physical devices, and the terminal device 40 may further include a storage module 403 for storing program codes and data of the terminal device 40.
其中,处理模块401可以是处理器或控制器,例如可以是中央处理 器(Central Processing Unit,CPU),通用处理器,数字信号处理器(Digital Signal Processor,DSP),专用集成电路(Application-Specific Integrated Circuit,ASIC),现场可编程门阵列(Field Programmable Gate Array,FPGA)或者其他可编程逻辑器件、晶体管逻辑器件、硬件部件或者其任意组合。其可以实现或执行结合本发明公开内容所描述的各种示例性的逻辑方框,模块和电路。所述处理器也可以是实现计算功能的组合,例如包含一个或多个微处理器组合,DSP和微处理器的组合等等。通信模块402可以是收发器、收发电路或通信接口等。存储模块6403可以是存储器。The processing module 401 can be a processor or a controller, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure. The processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like. The communication module 402 can be a transceiver, a transceiver circuit, a communication interface, or the like. The storage module 6403 can be a memory.
当处理模块401为处理器,通信模块402为通信接口,存储模块403为存储器时,本发明实施例所涉及的终端设备可以为附图6所示的终端设备。When the processing module 401 is a processor, the communication module 402 is a communication interface, and the storage module 403 is a memory, the terminal device according to the embodiment of the present invention may be the terminal device shown in FIG. 6.
参阅附图6所示,该终端设备50包括:处理器501、通信接口502、存储器503以及总线504。其中,通信接口502、处理器501以及存储器503通过总线504相互连接;总线504可以是外设部件互连标准(Peripheral Component Interconnect,PCI)总线或扩展工业标准结构(Extended Industry Standard Architecture,EISA)总线等。所述总线可以分为地址总线、数据总线、控制总线等。为便于表示,附图6中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。Referring to FIG. 6, the terminal device 50 includes a processor 501, a communication interface 502, a memory 503, and a bus 504. The communication interface 502, the processor 501, and the memory 503 are connected to each other through a bus 504. The bus 504 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. Wait. The bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 6, but it does not mean that there is only one bus or one type of bus.
结合本发明公开内容所描述的方法或者算法的步骤可以硬件的方式来实现,也可以是由处理器执行软件指令的方式来实现。本发明实施例还提供一种存储介质,该存储介质可以包括存储器503,用于储存终端设备所用的计算机软件指令,其包含执行上述实施例中提供的终端设备的控制方法所设计的程序代码。具体的,软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(Random Access Memory,RAM)、闪存、只读存储器(Read Only Memory,ROM)、可擦除可编程只读存储器(Erasable Programmable ROM,EPROM)、电可擦可编程只读存储器(Electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、只读光盘(CD-ROM)或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且 可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。The steps of a method or algorithm described in connection with the present disclosure may be implemented in a hardware, or may be implemented by a processor executing software instructions. The embodiment of the present invention further provides a storage medium, which may include a memory 503 for storing computer software instructions used by the terminal device, and includes program code designed to execute the control method of the terminal device provided in the foregoing embodiment. Specifically, the software instructions may be composed of corresponding software modules, and the software modules may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), and an erasable programmable only. Erasable Programmable ROM (EPROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Register, Hard Disk, Mobile Hard Disk, CD-ROM, or any other form of storage well known in the art. In the medium. An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium. Of course, the storage medium can also be an integral part of the processor.
本发明实施例还提供一种计算机程序,该计算机程序可直接加载到存储器503中,并含有软件代码,该计算机程序经由计算机载入并执行后能够实现上述实施例所提供的终端设备的控制方法。The embodiment of the present invention further provides a computer program, which can be directly loaded into the memory 503 and contains software code, and the computer program can be loaded and executed by the computer to implement the control method of the terminal device provided by the foregoing embodiment. .
本领域技术人员应该可以意识到,在上述一个或多个示例中,本发明所描述的功能可以用硬件、软件、固件或它们的任意组合来实现。当使用软件实现时,可以将这些功能存储在计算机可读介质中或者作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是通用或专用计算机能够存取的任何可用介质。Those skilled in the art will appreciate that in one or more examples described above, the functions described herein can be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored in a computer readable medium or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another. A storage medium may be any available media that can be accessed by a general purpose or special purpose computer.
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的技术方案的基础之上,所做的任何修改、等同替换、改进等,均应包括在本发明的保护范围之内。The specific embodiments of the present invention have been described in detail with reference to the preferred embodiments of the present invention. The scope of the protection, any modifications, equivalent substitutions, improvements, etc., which are made on the basis of the technical solutions of the present invention, are included in the scope of the present invention.

Claims (19)

  1. 一种终端设备的控制方法,其特征在于,所述方法包括:A method for controlling a terminal device, the method comprising:
    终端设备获取进入指令;The terminal device acquires an entry instruction;
    根据所述进入指令,进入检测域;Entering the detection domain according to the entry instruction;
    在所述检测域中对待检测物质进行物质检测并获取检测结果,所述终端设备在检测域中产生的数据与所述终端设备的其他工作域中产生的数据相互隔离。The substance to be detected is detected in the detection domain and the detection result is obtained, and the data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
  2. 根据权利要求1所述方法,其特征在于,所述方法还包括:The method of claim 1 wherein the method further comprises:
    在锁定状态获取解锁信息,其中所述解锁信息包含操作者的身份认证信息;Acquiring unlocking information in a locked state, where the unlocking information includes identity authentication information of the operator;
    根据所述解锁信息,对所述操作者的身份进行认证;And authenticating the identity of the operator according to the unlocking information;
    在所述操作者的身份被认证通过后,解锁所述终端设备;并在解锁所述终端设备后,生成所述进入指令。After the identity of the operator is authenticated, the terminal device is unlocked; and after the terminal device is unlocked, the entry instruction is generated.
  3. 根据权利要求1所述方法,其特征在于,所述终端设备获取进入指令,包括:所述终端设备在其他工作域时获取所述进入指令;The method according to claim 1, wherein the acquiring, by the terminal device, an entry instruction comprises: acquiring, by the terminal device, the entry instruction in another working domain;
    在获取检测结果后,将所述终端设备切换至所述其他工作域。After obtaining the detection result, the terminal device is switched to the other working domain.
  4. 根据权利要求1所述方法,其特征在于,所述方法还包括:在进入所述检测域后,打开检测应用;The method according to claim 1, wherein the method further comprises: after entering the detection domain, opening the detection application;
    所述在所述检测域中,对待检测物质进行物质检测,包括:In the detection domain, the substance detection of the substance to be detected includes:
    通过所述检测应用,对待检测物质进行物质检测。The substance to be detected is subjected to substance detection by the detection application.
  5. 根据权利要求3所述方法,其特征在于,所述打开检测应用之前,所述方法还包括:The method of claim 3, wherein before the opening the detection application, the method further comprises:
    获取管控平台的推荐信息,根据所述推荐信息获取所述检测应用的安装包并根据所述安装包安装所述检测应用。Obtaining recommendation information of the management platform, obtaining an installation package of the detection application according to the recommendation information, and installing the detection application according to the installation package.
  6. 根据权利要求1-5中任一项所述方法,其特征在于,所述在所述检测域中,对待检测物质进行物质检测获取检测结果,包括:The method according to any one of claims 1 to 5, wherein in the detecting domain, the substance to be detected is subjected to substance detection to obtain a detection result, comprising:
    采集待检测物质的检测数据;Collecting detection data of the substance to be detected;
    将检测数据发送至数据处理设备,以便所述数据处理设备根据所述检测数据获取检测结果;Sending the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data;
    接收所述数据处理设备发送的所述检测结果。Receiving the detection result sent by the data processing device.
  7. 根据权利要求6所述方法,其特征在于,所述方法还包括:The method of claim 6 wherein the method further comprises:
    当所述终端设备进入检测域时,将所述检测域对应的SIM卡切换为所 述终端设备的主卡,以便利用所述检测域对应的SIM卡,将所述检测数据发送至所述数据处理设备。When the terminal device enters the detection domain, the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is sent to the data by using the SIM card corresponding to the detection domain. Processing equipment.
  8. 根据权利要求1-7中任一项所述方法,其特征在于,所述方法还包括:The method of any of claims 1-7, wherein the method further comprises:
    在所述检测域中,接收通知消息;Receiving a notification message in the detection domain;
    根据所述通知消息向操作者显示提示信息;Displaying prompt information to the operator according to the notification message;
    接收打开指令,从所述检测域切换至所述通知消息对应的其他工作域并打开所述通知消息;所述打开指令包括操作者根据所述提示信息触发的打开所述通知消息的指令。Receiving an open instruction, switching from the detection domain to another working domain corresponding to the notification message, and opening the notification message; the open instruction includes an instruction that is opened by the operator according to the prompt information to open the notification message.
  9. 一种终端设备,其特征在于,包括:A terminal device, comprising:
    获取单元,用于获取进入指令;An obtaining unit, configured to acquire an entry instruction;
    控制单元,用于在所述获取单元获取进入指令后,根据所述进入指令,控制所述终端设备进入检测域;a control unit, configured to control, after the obtaining unit acquires an entry instruction, the terminal device to enter a detection domain according to the entering instruction;
    检测单元,用于在所述控制单元控制所述终端设备进入检测域后,在所述检测域中,对待检测物质进行物质检测获取检测结果,所述终端设备在检测域下产生的数据与所述终端设备的其他工作域下产生的数据相互隔离。a detecting unit, configured to: after the control unit controls the terminal device to enter the detection domain, perform a substance detection to obtain a detection result in the detection domain, and the data and the data generated by the terminal device in the detection domain The data generated under other working areas of the terminal device are isolated from each other.
  10. 根据权利要求9所述终端设备,其特征在于,包括:The terminal device according to claim 9, comprising:
    所述获取单元,还用于在锁定状态获取解锁信息,其中所述解锁信息包含操作者的身份认证信息;The acquiring unit is further configured to acquire unlocking information in a locked state, where the unlocking information includes identity authentication information of the operator;
    认证单元,用于在所述获取单元获取所述解锁信息后,根据所述解锁信息对所述操作者的身份进行认证;An authentication unit, configured to authenticate the identity of the operator according to the unlocking information after the acquiring unit acquires the unlocking information;
    所述控制单元,还用于在所述认证单元对操作者进行身份认证通过后,解锁所述终端设备;并在解锁所述终端设备后,生成所述进入指令。The control unit is further configured to: after the authentication unit passes the identity authentication of the operator, unlock the terminal device; and after unlocking the terminal device, generate the entry instruction.
  11. 根据权利要求9所述终端设备,其特征在于,包括:The terminal device according to claim 9, comprising:
    所述获取单元,具体用于在其他工作域时获取所述进入指令;The obtaining unit is specifically configured to acquire the entry instruction in another working domain;
    所述控制单元,还用于在所述检测域中对待检测物质进行物质检测获取检测结果后,将所述终端设备切换至所述其他工作域。The control unit is further configured to switch the terminal device to the other working domain after performing a substance detection acquisition detection result on the substance to be detected in the detection domain.
  12. 根据权利要求9所述终端设备,其特征在于,包括:The terminal device according to claim 9, comprising:
    所述控制单元,还用于在进入所述检测域后,自动打开检测应用;The control unit is further configured to automatically open the detection application after entering the detection domain;
    所述检测单元,具体用于通过所述检测应用,对待检测物质进行物质检测。The detecting unit is specifically configured to perform substance detection on the substance to be detected by the detecting application.
  13. 根据权利要求12所述终端设备,其特征在于,包括:The terminal device according to claim 12, comprising:
    所述获取单元,还用于获取管控平台的推荐信息;The obtaining unit is further configured to obtain recommendation information of the management platform;
    所述控制单元,用于在所述获取单元获取管控平台的推荐信息,根据所述推荐信息获取所述检测应用的安装包并根据所述安装包安装所述检测应用。The control unit is configured to obtain, in the obtaining unit, recommendation information of the management platform, obtain an installation package of the detection application according to the recommendation information, and install the detection application according to the installation package.
  14. 根据权利要求9-13任一项所述终端设备,其特征在于,包括:The terminal device according to any one of claims 9 to 13, characterized in that it comprises:
    所述检测单元,具体用于在所述控制单元控制所述终端设备进入检测域后,采集待检测物质的检测数据;将检测数据发送至数据处理设备,以便所述数据处理设备根据所述检测数据获取检测结果;接收所述数据处理设备发送的所述检测结果。The detecting unit is configured to: after the control unit controls the terminal device to enter the detection domain, collect detection data of the substance to be detected; and send the detection data to the data processing device, so that the data processing device is configured according to the detection The data acquisition detection result is received; and the detection result sent by the data processing device is received.
  15. 根据权利要求14所述终端设备,其特征在于,包括:The terminal device according to claim 14, comprising:
    所述控制单元,还用于当所述终端设备进入工作域时,当所述终端设备进入检测域时,将所述检测域对应的SIM卡切换为所述终端设备的主卡,以便利用所述检测域对应的SIM卡,将检测数据发送至数据处理设备。The control unit is further configured to: when the terminal device enters the working domain, when the terminal device enters the detection domain, switch the SIM card corresponding to the detection domain to the primary card of the terminal device, so as to utilize the The SIM card corresponding to the detection domain is sent to the data processing device.
  16. 根据权利要求9-15任一项所述终端设备,其特征在于,包括:The terminal device according to any one of claims 9-15, comprising:
    所述获取单元,还用于在所述检测域中,接收通知消息;The obtaining unit is further configured to receive a notification message in the detection domain;
    所述控制单元,还用于在所述获取单元接收通知消息后,根据所述通知消息向操作者显示提示信息;当接收到打开指令时,从所述检测域切换至所述通知消息对应的其他工作域并打开所述通知消息,所述打开指令包括操作者根据所述提示信息触发的打开所述通知消息的指令。The control unit is further configured to: after the obtaining unit receives the notification message, display prompt information to the operator according to the notification message; when receiving the open instruction, switch from the detection domain to the corresponding corresponding to the notification message The other work area opens the notification message, and the open instruction includes an instruction to open the notification message triggered by the operator according to the prompt information.
  17. 一种终端设备,其特征在于,包括:存储器、通信接口和处理器,所述存储器和所述通信接口耦合至所述处理器,所述存储器用于存储计算机执行代码,所述处理器用于执行所述计算机执行代码控制执行权利要求1至8任一项所述的终端设备的控制方法,所述通信接口用于所述终端设备与外部设备的数据传输。A terminal device, comprising: a memory, a communication interface, and a processor, the memory and the communication interface being coupled to the processor, the memory for storing computer execution code, the processor for executing The computer executes code control to execute the control method of the terminal device according to any one of claims 1 to 8, the communication interface being used for data transmission of the terminal device and an external device.
  18. 一种计算机存储介质,其特征在于,用于储存为终端设备所用的计算机软件指令,其包含执行权利要求1至8任一项所述的终端设备的控制方法所设计的程序代码。A computer storage medium, characterized by computer software instructions for storing a terminal device, comprising program code designed to execute the control method of the terminal device according to any one of claims 1 to 8.
  19. 一种计算机程序产品,其特征在于,可直接加载到计算机的内部存储器中,并含有软件代码,所述计算机程序经由计算机载入并执行后能够实现权利要求1至8任一项所述的终端设备的控制方法。A computer program product, characterized in that it can be directly loaded into an internal memory of a computer and contains software code, and the computer program can be loaded and executed by a computer to implement the terminal according to any one of claims 1 to 8. The method of control of the device.
PCT/CN2017/118740 2017-12-26 2017-12-26 Terminal device control method and terminal device WO2019127043A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780002579.7A CN108235766B (en) 2017-12-26 2017-12-26 Terminal device control method and terminal device
PCT/CN2017/118740 WO2019127043A1 (en) 2017-12-26 2017-12-26 Terminal device control method and terminal device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/118740 WO2019127043A1 (en) 2017-12-26 2017-12-26 Terminal device control method and terminal device

Publications (1)

Publication Number Publication Date
WO2019127043A1 true WO2019127043A1 (en) 2019-07-04

Family

ID=62645502

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/118740 WO2019127043A1 (en) 2017-12-26 2017-12-26 Terminal device control method and terminal device

Country Status (2)

Country Link
CN (1) CN108235766B (en)
WO (1) WO2019127043A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112033950A (en) * 2020-09-10 2020-12-04 青海省农林科学院 Pesticide residue detection method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540892B (en) * 2020-12-08 2023-01-20 公安部第三研究所 Mobile phone isolation detection system and method
CN113092376A (en) * 2021-04-13 2021-07-09 威海诚悦光电科技有限公司 Handheld white spirit authenticity detection device and method based on laser spectrum technology

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103582184A (en) * 2013-10-31 2014-02-12 中晟国计科技有限公司 Double-card smart phone high in safety performance
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof
CN105162951A (en) * 2015-07-28 2015-12-16 努比亚技术有限公司 Mobile terminal, and portable pesticide residues detection system and method
CN205385008U (en) * 2016-03-17 2016-07-13 杨金凤 Organic remaining material of food sets to music check out test set

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314166A (en) * 2010-07-07 2012-01-11 柳平增 Intelligent crop production measurement and control system based on Internet of Things
CN101915742B (en) * 2010-08-10 2012-06-27 北京路源光科技有限公司 Raman technology based biodiesel on-line detector
US9151709B2 (en) * 2010-09-10 2015-10-06 The Curators Of The University Of Missouri Multiple phase flow system for detecting and isolating substances
WO2015101992A2 (en) * 2014-01-03 2015-07-09 Verifood, Ltd. Spectrometry systems, methods, and applications
CN104182251A (en) * 2014-08-12 2014-12-03 小米科技有限责任公司 Crop characteristic detecting method, device and terminal
US10024717B2 (en) * 2015-11-24 2018-07-17 Trutag Technologies, Inc. Tag reading using targeted spatial spectral detection
CN106203035B (en) * 2016-06-28 2019-04-02 Oppo广东移动通信有限公司 A kind of data access control method and mobile terminal
CN106485589A (en) * 2016-10-20 2017-03-08 河南省农业科学院 A kind of Agriculture enterprise group KXG based on Internet of Things

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103582184A (en) * 2013-10-31 2014-02-12 中晟国计科技有限公司 Double-card smart phone high in safety performance
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof
CN105162951A (en) * 2015-07-28 2015-12-16 努比亚技术有限公司 Mobile terminal, and portable pesticide residues detection system and method
CN205385008U (en) * 2016-03-17 2016-07-13 杨金凤 Organic remaining material of food sets to music check out test set

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112033950A (en) * 2020-09-10 2020-12-04 青海省农林科学院 Pesticide residue detection method

Also Published As

Publication number Publication date
CN108235766A (en) 2018-06-29
CN108235766B (en) 2022-03-04

Similar Documents

Publication Publication Date Title
US9426661B2 (en) Secure lock for mobile device
US9525684B1 (en) Device-specific tokens for authentication
EP3370449B1 (en) Method and device for configuring security indication information
US8935746B2 (en) System with a trusted execution environment component executed on a secure element
US9213829B2 (en) Computing device including a port and a guest domain
US11409884B2 (en) Security profiling of system firmware and applications from an OOB appliance at a differentiated trust boundary
EP2973171B1 (en) Context based switching to a secure operating system environment
CN107431694B (en) Encryption key retrieval
US9607156B2 (en) System and method for patching a device through exploitation
JP5981035B2 (en) Hardware access protection
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
US10389710B2 (en) Method and system for extracting characteristic information
WO2019127043A1 (en) Terminal device control method and terminal device
EP2437198A1 (en) Secure pin reset process
US9858400B2 (en) Information processing system, terminal, and authentication method
US20220046030A1 (en) Simulating user interactions for malware analysis
JP2019518285A (en) Method and terminal for enhancing information security
US10019577B2 (en) Hardware hardened advanced threat protection
CN106919812B (en) Application process authority management method and device
US11228910B2 (en) Mobile communication device and method of determining security status thereof
US20210326455A1 (en) System for analysis and authorization for use of executable environment data in a computing system using hash outputs
CN109933990B (en) Multi-mode matching-based security vulnerability discovery method and device and electronic equipment
EP3687120A1 (en) Mobile communication device and method of determining security status thereof
CN115348261A (en) 5G-based cloud trusted data processing method and device, terminal and storage medium
CN113961887A (en) System permission unlocking method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17935963

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10/11/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17935963

Country of ref document: EP

Kind code of ref document: A1