CN104102610A - Method for using electronic device with two systems - Google Patents

Method for using electronic device with two systems Download PDF

Info

Publication number
CN104102610A
CN104102610A CN201310115313.7A CN201310115313A CN104102610A CN 104102610 A CN104102610 A CN 104102610A CN 201310115313 A CN201310115313 A CN 201310115313A CN 104102610 A CN104102610 A CN 104102610A
Authority
CN
China
Prior art keywords
memory
peripheral interface
electronic installation
operating system
central processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310115313.7A
Other languages
Chinese (zh)
Inventor
夏志祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SKYNET TECHNOLOGIES (SHENZHEN) Ltd
Original Assignee
SKYNET TECHNOLOGIES (SHENZHEN) Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SKYNET TECHNOLOGIES (SHENZHEN) Ltd filed Critical SKYNET TECHNOLOGIES (SHENZHEN) Ltd
Priority to CN201310115313.7A priority Critical patent/CN104102610A/en
Publication of CN104102610A publication Critical patent/CN104102610A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for using an electronic device with two systems. The method comprises the steps of switching on a gear position, which corresponds to a first memory, on a gear position switch or switching on a gear position, which corresponds to a second memory, on the gear position switch through a gear position controller; when the gear position, which corresponds to the first memory, on the gear position switch is switched on, enabling a central processor to communicate with the first memory to start one operating system on the first memory, sending an instruction to an peripheral-interface controller to shield an peripheral interface, and sending an instruction to a wireless communication module to enable the first operating system to log into an appointed server through a specific network of the wireless communication module; when the gear position, which corresponds to the second memory, on the gear position switch is switched on, enabling the central processor to communicate with the second memory to start the other operating system on the second memory so as to recover the peripheral interface.

Description

A kind of use has the method for the electronic installation of dual system
Technical field
The present invention relates to electronic product field, be specifically related to a kind of method that use has the electronic installation of dual system.
Background technology
Generally, during employee's registration, corporate member's work is equipped with the use that corresponding electronic equipment (computer, mobile phone, digital camera etc.) is usingd as office, and for example, financial company is equipped with the computer that is connected to this financial company's built-in system is installed to employee.Along with popularizing of electronic equipment, employee oneself also can buy corresponding electronic equipment conventionally, for example, buys online computing, shopping, amusement etc.If office electronic apparatus and the private electronic equipment using can be integrated into an electronic equipment, can save a large number of expense for enterprise.
Summary of the invention
In view of above content, be necessary to provide a kind of use to there is the method for the electronic installation of dual system, non-interfering two kinds of operating systems can be set on same electronic installation, and separate during two kinds of operating systems, be independent of each other, make employee on same electronic equipment, can handle official business and can be used as the private use of employee, facilitated user, for enterprise has saved a large sum of expense.
Use has a method for the electronic installation of dual system, and the method comprises; By gear controller, connect gear corresponding with first memory on driving switch or connect the gear corresponding with second memory on driving switch; On connecting driving switch during the gear corresponding with first memory, central processing unit communicates and is connected with first memory, start the operating system on first memory, send instruction to Peripheral Interface controller with shielding Peripheral Interface, and send instruction to wireless communication module, make the first operating system login given server by the particular network of wireless communication module; On connecting driving switch, during the gear corresponding with second memory, central processing unit communicates and is connected with second memory, starts the operating system on second memory, recovery Peripheral Interface.
Compared to prior art, described use has the method for the electronic installation of dual system, non-interfering two kinds of operating systems can be set on same electronic installation, and separate during two kinds of operating systems, be independent of each other, make employee on same electronic equipment, can handle official business and can be used as the private use of employee, facilitated user, for enterprise has saved a large sum of expense.
Accompanying drawing explanation
Fig. 1 is the running environment figure of electronic installation preferred embodiment of the present invention;
Fig. 2 is the structural representation of the electronic installation preferred embodiment in Fig. 1 of the present invention;
Fig. 3 is the process flow diagram of the preferred embodiment of the electronic installation of the present invention method that starts the first operating system;
Fig. 4 is the process flow diagram of the preferred embodiment of the electronic installation of the present invention method that starts the second operating system;
Fig. 5 is the RFID reader reading information process flow diagram of the preferred embodiment of normal method whether of checking electronic installation;
Fig. 6 is the process flow diagram of revising the label data in the RFID label of electronic installation;
Fig. 7 is the structural representation of the RFID reader of electronic installation;
Fig. 8 is the RFID reader of electronic installation and the structural representation of RFID label common antenna;
Embodiment
Shown in Fig. 1, be the running environment figure of electronic installation preferred embodiment of the present invention.Described electronic installation 1 refers to mobile phone, personal digital assistant (Personal Digital Assistant, PDA), panel computer, personal computer and comprise arbitrarily two above storeies, and on each storer, operation has the independently device of operating system.In the present embodiment, described electronic installation 1 is for being provided with the panel computer of two operating systems.This electronic installation 1 is connected with given server 3 or common server 4 by network 2.
Wherein, described network 2 can be internet or LAN (Local Area Network).
Described given server 3 refers to the server of enterprise or public institution's appointment, and electronic installation 1 need to carry out corresponding network settings, for example, and by the network settings of VPN mode, to be connected with given server 3.Described given server 3 can be one, also can be many, the built-in system that enterprise or public institution are built by given server 3 by enterprise or public institution (for example, the mailing system of enterprise, attendance checking system, office system etc.), user is connected to given server 3 by electronic installation 1, to log in described built-in system, thereby realize telecommuting.It should be noted that, for information security, prevent that user from leaking the data in built-in system, when electronic installation 1 is connected to given server 3, the data storage function of electronic installation 1 and Peripheral Interface will conductively-closed or inefficacies.Specific implementation, will be described in detail in the back.
The server of accessing when described common server 4 refers to the private use of employee electronic installation 1, typically refers to the server that can openly access, for example, and the server of the server of portal website, disclosed official website of enterprise etc.When electronic installation 1 is connected to common server 4, the memory function on electronic installation 1 or Peripheral Interface be normally operation all.
In other words, user is when using electronic installation 1, and when being connected to given server 3, this electronic installation 1 will use as office computer, and some functions on this electronic installation 1 are understood conductively-closeds or forbid, to meet the requirement of enterprise to security.When being connected to common server 4, this electronic installation 1 uses as user's personal computer, and all functions on this electronic installation 1 can both be used, to meet the private demand of using electronic installation 1 of user.
Shown in Fig. 2, it is the cut-away view of electronic installation preferred embodiment of the present invention.
Described electronic installation 1 comprises first memory 201, second memory 202, wireless communication module 20, change-over circuit 30, driving switch 40, central processing unit (Central processing unit, CPU) 50, gear controller 60, radio-frequency (RF) identification (Radio Frequency Identification, RFID) reader 72, RFID label 74, Peripheral Interface controller 80 and Peripheral Interface 90.Wherein, wireless communication module 20, change-over circuit 30, gear controller 60, RFID reader 72, RFID label 74, Peripheral Interface controller 80 and Peripheral Interface 90 are all connected with CPU50.
An operating system is installed on first memory 201, another one operating system is installed on second memory 202.It should be noted that, the operating system of the installation on first memory 201 can be identical with the operating system of installing on second memory 202, also can be different.Described operating system, can be desktop operating system, can be also the operating system of mobile device.If electronic installation 1 is personal computer, operating system is desktop operating system, for example, the Windows of Microsoft (as, WINDOWS8 operating system), or LINUX operating system.If electronic installation 1 is mobile device (as, equipment such as mobile phone, panel computer), operating system is Mobile operating system (as, Android operating system of Google etc.).For convenience of description, in below describing, the operating system of installing on first memory 201 is called to the first operating system, the operating system of installing on second memory 202 is called to the second operating system.
In two operating systems of electronic installation 1 upper set, can so that user have two separate, the operating space being independent of each other, for example, operating system on first memory 201 is just used for handling official business, by arranging in the operating system on first memory 201 (as, VPN arranges), and the enterprise of being built by given server 3 by network 2 connections or the built-in system of public institution, realize the built-in system of access enterprise or public institution, for example, (to handle official business, use the mailing system of installing on built-in system to carry out mail transmission etc.), and operating system on second memory 202 can be used as the operating system that user oneself uses, user can be by the network settings of the operating system on second memory 202, be connected to network 2, and (for example access common server 4, the server of large-scale news website).
In order to protect user's information security, user can arrange the mode of demonstrate,proving information by identity verification and start first memory 201 or second memory 202.First memory 201 is separate with second memory 202, is independent of each other.In the present invention, unless otherwise specifically indicated for describing the sequence adjective " first " of common components, the usage of " second " etc., otherwise, " first " and " second " is only used to distinguish similar elements, and the element that does not mean that such description must be according to given order, or time, space, grade or other mode.
Described wireless communication module 20 is for being communicated and be connected with given server 3 and common server 4 by network 2.
Change-over circuit 30 is connected with first memory 201 and second memory 202.
Driving switch 40 is connected with change-over circuit 30 and gear controller 60, driving switch 40 comprises three gears, shelves A, shelves B and shelves C, wherein, when shelves C is connected with shelves A, central processing unit 50 is communicated and is connected with first memory 201 by change-over circuit 60, to start the first operating system of first memory 201, when shelves C is connected with shelves B, central processing unit 50 is communicated and is connected with second memory 202 by change-over circuit 60, to start the second operating system on second memory 202.
Described RFID reader 72 for example, for (reading rfid card sheet, I.D. or employee's work card) on authorization information, but the identity information on described authorization information I.D. (as, the information such as ID (identity number) card No., sex, name, date of birth, address, photo), also employee information that can employee's work card (for example, the information such as employee's name, job number, the department name of holding a post, registration date), be I.D. or employee's work card during near RFID reader 72, this RFID reader 72 can reading identity card or employee's work card on authorization information.RFID reader 72 comprises a process chip 720, one receiver 722, one sends link 724 and one or more antenna 700, wherein process chip 720 is connected with receiver 722 and transmission link 724, receiver 720 and transmission link 724 are also connected with antenna 700, for passing through antenna reception or sending data.The signal of described receiver 720 for sending over from rfid card sheet by antenna 700 receptions, and convert the signal of reception to data, and send process chip 720 to.Described transmission link 724 is for obtain the instruction that will send from process chip 720, and instruction transformation is become to suitable signal (for example, interrogating signal) thus by antenna 700, send to the I.D. card near RFID reader 72.Described receiver 720 and transmission link 724 can be used various types of circuit, for example, when being not limited to, state machine or digital signal processor (DSP).By adding receiver 720 and send the processing latency that link 724 can reduce RFID reader 72 in RFID reader 72, obtain faster the ID (identity number) card information on I.D. card.
Whether described RFID reader 72 can also communicate and be connected with RFID label 74, before RFID reader 72 and rfid card sheet communicate, normal with checking RFID reader 72 reading informations by RFID label 74.The mode of checking will be described in detail in Fig. 5.
Described RFID label 74 can be passive RFID label (that is: without connecting power supply, just just can activate this RFID label by electromagnetic response), can be also active RFID label (that is: own self-powered or connect extraneous power supply).When electronic installation 1 switches on power, this RFID label can be connected with the power supply in electronic installation 1, thereby becomes an active RFID label, and when electronic installation 1 shutdown, this RFID label becomes a passive RFID label.
Described RFID reader 72 and RFID label 74 can also share identical antenna 700, and the structure of its shared identical antenna 700 as shown in Figure 8.Described antenna 700 also scribbles fluorescent material, to strengthen the receiving ability of signal.
This RFID reader 72 can also be logined the first operating system of first memory 201 or the second operating system of second memory 202 in conjunction with gear controller 60.
Particularly, when gear controller 60 is connected shelves C with shelves A, start the first operating system on first memory 201, in order to improve data security, after the first os starting, user can't login the first operating system, but enter the release interface of the first operating system, now, need to carry out authentication by RFID reader 72, when user is by employee's work card during near RFID reader 72, this RFID reader 72 can read the employee information in employee's work card, when if the employee information reading is consistent with employee information pre-stored in RFID reader 72, the release interface unlocking of the first operating system, user just can login the first operating system.And shelves C is connected with shelves B by gear controller 60 as user, after starting the second operating system on second memory 202, in order to improve data security, after the second os starting, user can't login the second operating system, but enter the release interface of the second operating system, now, need to carry out authentication by RFID reader 72, when user is by I.D. during near RFID reader 72, the identity information of this RFID reader 72 in can reading identity card, when if the identity information reading is consistent with identity information pre-stored in RFID reader 72, the release interface unlocking of the second operating system, user just can login the second operating system.
Described gear controller 60 can operate by manual mode, particularly, on this gear controller 60, comprise two buttons, be respectively button a1 and button b1, when pressing the button a1, and when button b1 upsprings, shelves C is connected with a shelves A, when button a1 upsprings and when button b1 presses, grade C is connected with a grade B, when two buttons are pressed simultaneously or upspring, shelves C is in neutral.
In other embodiments, electronic installation 1 also can not comprise RFID reader 72 and RFID label 74, that is to say, do not need to start the first operating system of first memory 201 or the second operating system of second memory 202 by RFID reader 72 and RFID label 74.Electronic installation 1 can also be installed other devices so that user identity is verified, and then indirectly control gear and control 60, for example, on electronic installation 1, Fingerprint Identification Unit is installed, the mode by fingerprint recognition starts the first operating system of first memory 201 or the second operating system of second memory 202).Described electronic installation 1 can also be installed near-field communication (Near Field Communication, NFC) device, to realize, user identity is verified.By NFC device, gear 60 be can indirectly control, thereby the first operating system of first memory 201 or the second operating system of second memory 202 started.
In addition, the status information that gear controller 60 also records grade C (for example, by numeral or alphabetical mode, represent), when shelves C connects shelves A, in gear controller 60, the status information of record shelves C is numeral " 1 ", and when shelves C connects shelves B, in gear controller 60, the status information of record shelves C is " 2 ", when shelves C is neutral gear, in gear controller 60, the status information of record shelves C is " 0 ".When employee uses work card near RFID reader 72 and is verified, central processing unit 50 sends instruction to gear controller 60, and the status information of gear controller 60 middle-grade C is set to " 1 ", and now, gear controller 60 is controlled shelves C and is connected with shelves A.When employee uses I.D. near RFID reader 72 and is verified, central processing unit 50 sends instruction to gear controller 60, and the status information of gear controller 60 middle-grade C is set to " 2 ", and now, gear controller 60 is controlled shelves C and is connected with shelves B.
Described central processing unit 50 is for controlling connected electronic component, for example, central processing unit 50 is controlled wireless communication module 20, change-over circuit 30, gear controller 60, RFID reader 72, RFID label 74 and Peripheral Interface controller 80, it should be noted that, if RFID reader 72 is replaced by NFC device with RFID label 74 in electronic installation 1, central processing unit 50 is also controlled NFC device.The mode of central processing unit 50 by periodic scanning to connected said elements process (as, send instruction).Conventionally, electronic component all can produce noise in operational process.The noise that each electronic component produces in some frequency has a peak value (noise peak), and can periodically occur, if stack appears in the noise peak of each electronic component in operational process, can cause the work of electronic installation 1 to occur extremely, affecting user's use.Central processing unit 50 calculates according to the time point of the noise peak of the appearance of each electronic component, with the noise peak of each electronic component that staggers, the noise peak of electronic component in operational process can not superposeed.Particularly, in one-period, above-mentioned electronic component (only take RFID reader 72, RFID label 74 and Peripheral Interface controller 80 are example) is scanned, wherein, 50 every ten milliseconds of central processing units scan peripheral hardware interface controller 80, if the noise peak of Peripheral Interface controller 80 is between the 3rd millisecond and the 5th millisecond, central processing unit is in to other electron component scanning, avoid the 3rd millisecond and with the 5th millisecond, other electron component is scanned, with the noise peak of the Peripheral Interface controller 80 that staggers.
Described Peripheral Interface controller 80 is for controlling Peripheral Interface 90, particularly, when gear controller 60 is connected neutral C with shelves A, start the first operating system on first memory 201, CPU50 sends instruction to Peripheral Interface controller 80 simultaneously, shielding Peripheral Interface 90, Peripheral Interface 90 cannot be worked, user cannot be by Peripheral Interface 90 transmission data, now, first memory 201 also will convert read-only function to, central processing unit 50 is connected with a microswitch (miniature metal-oxide-semiconductor switch), being connected of the access hole control line of this miniature metal-oxide-semiconductor switch and first memory 201 (being the stitch that the data in the circuit diagram of first memory 201 write), when first memory 201 starts, central processing unit 50 is controlled the power supply of this miniature metal-oxide-semiconductor switch cut-out and access hole control line, make first memory 201 lose data storage function, thus, user cannot store the data in specific memory 3 in electronic installation 1 into by electronic equipment 1.In addition, also the memory capacity of first memory 201 can be customized to the capacity that just only enough meets the normal operation of the first operating system and additional storage space cannot be provided, thus, even if electronic installation 1 has been carried out data long pass to the instruction in the first memory 201 of electronic installation 1, can not return to miscue instruction and (eject dialog box because of having first memory 201 there is no storage space yet, prompting does not have storage space, cannot carry out storage action).Further, in some cases, the capacity that the first operating system is used be one dynamic, for example, in the situation of the maximum utilization rate of the first operating system, (suppose that the first operating system has 100 functions, in the situation that these functions are all opened), the capacity of the first memory 201 that the first operating system is shared is 1.5G, and in the situation of the minimum utilization rate of the first operating system (except the function that must start is normal to guarantee the first operating system), the capacity of the first memory 201 that the first operating system is shared is 1.2G, now, in order to guarantee that user can also move the first operating system the maximum utilization rate in the situation that, first memory 201 is equipped with to the capacity of 1.5G, can cover so all service conditions that user uses the first operating system.Yet, using under the process of the first operating system, most of the time can not reach the situation of the maximum utilization rate of the first operating system, thus, during the first operating system, also have remaining memory capacity, for example, the capacity of the first memory 201 that the first operating system is shared is 1.2G, also have the residual capacity of 0.3G, for fear of store data in residual capacity, can in the task manager of operating system for the first time, monitor started function, to obtain the first operating system shared memory capacity of current when operation, thereby calculate remaining memory capacity, afterwards remaining memory capacity is managed, (for example in remaining memory capacity, fill up a certain or polytype data, configuration file), make the first operating system when operation, even if user wants to store the data of given server 3, can cannot not store because first memory 201 will there is no other storage area yet.Because remaining memory capacity is dynamic change, when some functions of the first operating system are opened, calculate the needed memory capacity of this function, and in remaining memory capacity, delete some data, with vacating space in remaining memory capacity to the function of this unlatching.
Given server 3 also can carry out tag control to the data that transfer out, by data packet transmission during to electronic installation 1, the sequence numbered tag of additional some encryptions (for example, also have Business Name and transmit the date and sequence number that the time forms), this sequence numbered tag is hidden in packet, electronic installation 1 is when receiving the packet sending from given server 3, packet all can be with this sequence numbered tag, further, when 1 pair of packet sending of electronic installation is processed, the label substance of this sequence number will expand automatically, be that sequence numbered tag will comprise user profile and (licenses the information that this electronic installation 1 is connected to the user of given server 3, comprise user name and running time etc.), that is to say, to process being attached with the packet of sequence numbered tag, the user name of electronic installation 1 and running time must be added in the sequence numbered tag of encryption, otherwise, cannot process this packet, thus, even if user has obtained data by electronic installation 1, also can obtain by the mode of deciphering whom data processed by, facilitate checking of data, traceability and the security of data have been guaranteed.
Described Peripheral Interface 90 may be, but not limited to,, and Bluetooth transmission interface, live wire, USB interface, infrared interface or NFC interface etc. can pass through electronic installation 1 to the interface of extraneous equipment transmission data.
The mode that Peripheral Interface 90 cannot be worked has multiple, in a certain embodiment, the driver of Peripheral Interface 90 is embedded in Peripheral Interface controller 80, described driver can be set to upstate and down state, during the first operating system on starting first memory 201, the driver of Peripheral Interface 90 is set to down state, now, Peripheral Interface 90 cannot be worked, and Peripheral Interface cannot transmit data.During the second operating system on starting second memory 202, the driver of Peripheral Interface 90 is set to upstate, and now, Peripheral Interface 90 can be worked, and Peripheral Interface 90 can transmit data.It should be noted that, when same Peripheral Interface 90 comprises several functions, just the data-transformation facility in the driver of Peripheral Interface 90 is set to down state, that is to say the data-transformation facility shielding of this Peripheral Interface 90, and other function still can remain valid.For example, if Peripheral Interface 90 is USB interface, the function that this USB interface possesses data-transformation facility simultaneously and electronic installation 1 is charged, the data-transformation facility of USB interface is set to down state, this USB interface cannot be carried out data transmission, and the charge function of this USB interface remains valid, still can to electronic installation 1, charge by this USB interface.
In an other embodiment, between described Peripheral Interface controller 80 and Peripheral Interface 90, be provided with a microswitch (not shown), this microswitch is for controlling the power supply supply of this Peripheral Interface 90, during the first operating system on starting first memory 201, microswitch between 80 disconnections of Peripheral Interface controller and Peripheral Interface 90, to cut off the power supply of Peripheral Interface 90, now, Peripheral Interface 90 cannot be worked, and Peripheral Interface cannot transmit data.During the second operating system on starting second memory 202, the microswitch between the closed and Peripheral Interface 90 of Peripheral Interface controller 80, to connect the power supply of Peripheral Interface 90, now, Peripheral Interface 90 is by work, and Peripheral Interface 90 can transmit data.
And the instruction set in CPU50 is carried out to a kind of mode that rights management also can be used as shielding Peripheral Interface 90, particularly, CPU50 can pass through the attribute information (version number of operating system of read operation system, the title of operating system, the copyright information of operating system, the information such as needed hardware parameter during operating system) what judge current operation is the first operating system or the second operating system, if current operation is the first operating system, the instruction set that CPU50 automatic shield is supported Peripheral Interface 90, make the CPU50 cannot compliant peripheral interface 90, thereby indirectly shield Peripheral Interface 90.If current operation is the second operating system, CPU50 recovers the instruction set that Peripheral Interface 90 is supported, makes CPU50 compatibility to Peripheral Interface 90, thereby makes Peripheral Interface 90 can transmit data.
In addition, this electronic installation 1 can also comprise plural storer, corresponding driving switch 40 also comprises a plurality of gears, for example, as electronic installation 1 comprises four storeies, corresponding driving switch 40 has five gears, the i.e. gear of neutral and corresponding each storer, when gear controller 60 is controlled neutrals and is connected to gear corresponding to some storeies, central processing unit 50 is connected with this memory communication, to start the operating system on this storer.
By operation gear controller 60,, by switching between shelves C and shelves A, shelves B, activate change-over circuit 30 and control first memory 201 and second memory 201 thus, realize the isolation and protection of two reservoirs.
For example, while using this electronic installation 1 in financial field, user is when starting the first operating system of first memory 201, the dedicated network line of this first operating system by arranging (as, VPN) financial sector forming with given server 3 is connected, thereby make financial clerical workforce's remote access financial sector, (for example realize telecommuting, stock exchange, financial information inquiry etc.), while is due to Peripheral Interface 90 conductively-closeds of electronic installation, the information of financial sector can not leaked, and has guaranteed the security of data.And user is when starting the second operating system of second memory 202, open Peripheral Interface 90, do not affect private this electronic installation 1 that uses of user.
As shown in Figure 3, be the process flow diagram of the preferred embodiment of the electronic installation of the present invention method that starts the first operating system.
Step S10, electronic installation 1 switches on power.
Step S11, gear controller 60 is connected the gear corresponding with first memory 201 on driving switch 40.Particularly, gear controller 60 is connected shelves C with shelves A.User can control gear controller by manual mode shelves C is connected with shelves A.User also can control gear controller 60 by RFID reader 72, and then gear controller 60 control gear C are connected with a shelves A, for example, by by employee's work card near RFID reader 72, if the employee information on this employee's work card is consistent with the pre-stored employee information on this RFID reader 72, CPU50 sends instruction to gear controller 60, makes gear controller 60 control shelves C and is connected with shelves A.
Step S12, CPU50 communicates and is connected with first memory 201, starts the first operating system on first memory 201.
Step S13, the memory function of shielding Peripheral Interface 90 and first memory 201.
The mode that shielding Peripheral Interface 90 cannot be worked Peripheral Interface 90 has multiple, in a certain embodiment, the driver of Peripheral Interface 90 is embedded in Peripheral Interface controller 80, described driver can be set to upstate and down state, during the first operating system on starting first memory 201, the driver of Peripheral Interface 90 is set to down state, now, Peripheral Interface 90 cannot be worked, and Peripheral Interface cannot transmit data.During the second operating system on starting second memory 202, the driver of Peripheral Interface 90 is set to upstate, and now, Peripheral Interface 90 can be worked, and Peripheral Interface 90 can transmit data.It should be noted that, when same Peripheral Interface 90 comprises several functions, just the data-transformation facility in the driver of Peripheral Interface 90 is set to down state, that is to say the data-transformation facility shielding of this Peripheral Interface 90, and other function still can remain valid.For example, if Peripheral Interface 90 is USB interface, the function that this USB interface possesses data-transformation facility simultaneously and electronic installation 1 is charged, the data-transformation facility of USB interface is set to down state, this USB interface cannot be carried out data transmission, and the charge function of this USB interface remains valid, still can to electronic installation 1, charge by this USB interface.
In an other embodiment, between described Peripheral Interface controller 80 and Peripheral Interface 90, be provided with a microswitch (not shown), this microswitch is for controlling the power supply supply of this Peripheral Interface 90, during the first operating system on starting first memory 201, microswitch between 80 disconnections of Peripheral Interface controller and Peripheral Interface 90, to cut off the power supply of Peripheral Interface 90, now, Peripheral Interface 90 cannot be worked, and Peripheral Interface cannot transmit data.During the second operating system on starting second memory 202, the microswitch between the closed and Peripheral Interface 90 of Peripheral Interface controller 80, to connect the power supply of Peripheral Interface 90, now, Peripheral Interface 90 is by work, and Peripheral Interface 90 can transmit data.
And instruction set in CPU50 also can be used as a kind of mode of shielding Peripheral Interface 90, particularly, can pass through the attribute information (version number of operating system of read operation system, the title of operating system, the copyright information of operating system, the information such as needed hardware parameter during operating system) what judge current operation is the first operating system or the second operating system, if current operation is the first operating system, the instruction set that CPU50 automatic shield is supported Peripheral Interface 90, make the CPU50 cannot compliant peripheral interface 90, thereby indirectly shield Peripheral Interface 90.If current operation is the second operating system, CPU50 recovers the instruction set that Peripheral Interface 90 is supported, makes CPU50 compatibility to Peripheral Interface 90, thereby makes Peripheral Interface 90 can transmit data.
The memory function of shielding first memory 201, make its convert to can only function mode have multiple.In a certain embodiment, central processing unit 50 is connected with a microswitch (miniature metal-oxide-semiconductor switch), being connected of the access hole control line of this miniature metal-oxide-semiconductor switch and first memory 201 (being the stitch that the data in the circuit diagram of first memory 201 write), when first memory 201 starts, central processing unit 50 is controlled the power supply of this miniature metal-oxide-semiconductor switch cut-out and access hole control line, make first memory 201 lose data storage function, thus, user cannot store the data in specific memory 3 in electronic installation 1 into by electronic equipment 1.
In addition, also the memory capacity of first memory 201 can be customized to the capacity that just only enough meets the normal operation of the first operating system and additional storage space cannot be provided, thus, even if electronic installation 1 has been carried out data long pass to the instruction in the first memory 201 of electronic installation 1, can not return to miscue instruction and (eject dialog box because of having first memory 201 there is no storage space yet, prompting does not have storage space, cannot carry out storage action).Further, in some cases, the capacity that the first operating system is used be one dynamic, for example, in the situation of the maximum utilization rate of the first operating system, (suppose that the first operating system has 100 functions, in the situation that these functions are all opened), the capacity of the first memory 201 that the first operating system is shared is 1.5G, and in the situation of the minimum utilization rate of the first operating system (except the function that must start is normal to guarantee the first operating system), the capacity of the first memory 201 that the first operating system is shared is 1.2G, now, in order to guarantee that user can also move the first operating system the maximum utilization rate in the situation that, first memory 201 is equipped with to the capacity of 1.5G, can cover so all service conditions that user uses the first operating system.Yet, using under the process of the first operating system, most of the time can not reach the situation of the maximum utilization rate of the first operating system, thus, during the first operating system, also have remaining memory capacity, for example, the capacity of the first memory 201 that the first operating system is shared is 1.2G, also have the residual capacity of 0.3G, for fear of store data in residual capacity, can in the task manager of operating system for the first time, monitor started function, to obtain the first operating system shared memory capacity of current when operation, thereby calculate remaining memory capacity, afterwards remaining memory capacity is managed, (for example in remaining memory capacity, fill up a certain or polytype data, configuration file), make the first operating system when operation, even if user wants to store the data of given server 3, can cannot not store because first memory 201 will there is no other storage area yet.Because remaining memory capacity is dynamic change, when some functions of the first operating system are opened, calculate the needed memory capacity of this function, and in remaining memory capacity, delete some data, with vacating space in remaining memory capacity to the function of this unlatching.
Step S14, central processing unit 50 sending controling instructions, to wireless communication module 20, make the character network configuration that the first operating system is set by wireless communication module be connected with given server 3.Given server 3 also can carry out tag control to the data that transfer out, by data packet transmission during to electronic installation 1, the sequence numbered tag of additional some encryptions (for example, also have Business Name and transmit the date and sequence number that the time forms), this sequence numbered tag is hidden in packet, electronic installation 1 is when receiving the packet sending from given server 3, packet all can be with this sequence numbered tag, further, when 1 pair of packet sending of electronic installation is processed, the label substance of this sequence number will expand automatically, be that sequence numbered tag will comprise user profile and (licenses the information that this electronic installation 1 is connected to the user of given server 3, comprise user name and running time etc.), that is to say, to process being attached with the packet of sequence numbered tag, the user name of electronic installation 1 and running time must be added in the sequence numbered tag of encryption, otherwise, cannot process this packet, thus, even if user has obtained data by electronic installation 1, also can obtain by the mode of deciphering whom data processed by, facilitate checking of data, traceability and the security of data have been guaranteed.
As shown in Figure 4, be the process flow diagram of the preferred embodiment of the electronic installation of the present invention method that starts the second operating system.
Step S20, electronic installation 1 switches on power.
Step S21, gear controller 60 is connected the gear corresponding with second memory 202 on driving switch 40.Particularly, gear controller 60 is connected shelves C with shelves B.User can control gear controller by manual mode shelves C is connected with shelves B.User also can control gear controller 60 by RFID reader 72, and then gear controller 60 control gear C are connected with a shelves B, for example, by by I.D. near RFID reader 72, if the identity information on this I.D. is consistent with the pre-stored identity information on this RFID reader 72, CPU50 sends instruction to gear controller 60, makes gear controller 60 control shelves C and is connected with shelves B.
Step S22, CPU50 communicates and is connected with second memory 202, starts the second operating system on first memory 202.
Step S23, recovers Peripheral Interface 90.Particularly, the driver of Peripheral Interface in Peripheral Interface controller 80 can be set to upstate.The microswitch arranging between Peripheral Interface controller 80 and Peripheral Interface 90 is connected, Peripheral Interface 90 is switched on power.Discharge the instruction set of relevant Peripheral Interface 90 in CPU50, make the CPU50 can compliant peripheral interface, and support the data-transformation facility of Peripheral Interface 90.
As shown in Figure 5, be the RFID reader reading information process flow diagram of the preferred embodiment of normal method whether of checking electronic installation.
Step S201, RFID reader 201 is sending interrogating signal to RFID label 74.RFID reader 201 sends interrogating signal to after RFID label 74, will receive the return signal transmitting from RFID label 74.
Step S202, determines that whether return signal is from RFID label 74.Particularly, RFID reader 72 compares the information in return signal and the information that is stored in RFID reader 72, if result is relatively that the information in return signal is identical with the information that is stored in RFID reader 72, this return signal is from RFID label 74, if result is relatively that the information in return signal is not identical with the information that is stored in RFID reader 72, this return signal is from other RFID labels.Generally speaking, if RFID reader 72 only has RFID label 74 around, the signal returning is from RFID label 74, if electronic installation 1 has a plurality of RFID labels around, the signal returning is not necessarily from RFID label 74.
Step S203, RFID reader 72 statistics are from the return signal quantity of RFID label 74.
Step S204, judges whether poll (polling) finishes.Judge that the mode whether poll finishes is to judge whether the number of times that sends interrogating signal reaches the number of times that user sets.For example, suppose that the number of times that user sets is 10 times, if send this time arriving 10 times of interrogating signal, end of polling(EOP), RFID reader 72 no longer sends interrogating signal, and flow process enters step S205.
Step S205, according to statistics return signal quantity to determine whether RFID reader 72 has received the correct response of RFID label 74.Generally speaking, if the quantity of return signal is consistent with the number of times that sends interrogating signal, to have received the response of RFID label 74 correct for RFID reader 72.In addition, in some cases, because signal transmits the error occurring, the quantity of the return signal receiving can be not consistent with the number of times that sends interrogating signal, now, for example, if the quantity (, between 8 to 10 times) within certain scope of the return signal of statistics, also can be considered the correct response that RFID reader 72 has received RFID label.Generally speaking, when RFID reader 72 has received the correct response of RFID label 74, RFID reader 72 reading informations are normal, for example, the information on other RFID label (, I.D. card) that reads that this RFID reader 72 can be correct.In some cases, if RFID reader 72 is very approaching with RFID label 74, and direct and RFID, may there is erroneous judgement, can be by an analog chip (not shown) be set between RFID reader 72 and RFID label 74, this analog chip return signal that can decay, with the different distance between change modeling RFID reader 72 and RFID label 74, to obtain RFID reader 72 by the attenuation amplitude of this analog chip decay return signal.The mode of decay is by the distance between change modeling RFID reader 72 and RFID label 74, until RFID reader 72 can not receive the return signal of RFID label, in the process of decay, obtains the attenuation amplitude of return signal.
Step S206, relatively the attenuation amplitude of return signal and the attenuation amplitude of setting, judge whether the attenuation amplitude of return signal is equal to or greater than the attenuation amplitude of setting.If the attenuation amplitude that is less than setting of return signal, shows that this RFID reader 72 does not receive the insufficient sensitivity of enough strong signal or these RFID reader 72 read signals from RFID label 74.
Step S207, according to the result of above-mentioned checking, whether prompting user RFID reader 72 reading informations are normal.When the attenuation amplitude of return signal is less than the attenuation amplitude of setting, these RFID reader 72 reading informations of prompting user are undesired.The mode of prompting is for to show that on touch-screen 90 these RFID reader 72 reading informations are undesired.When the attenuation amplitude of return signal is more than or equal to the attenuation amplitude of setting, these RFID reader 72 reading informations of prompting user are normal.The mode of prompting is for to show that on touch-screen 90 these RFID reader 72 reading informations are normal.In addition, when result verification show that RFID reader 72 reading out datas are when normal, for avoiding RFID reader 72 to be subject to the interference of RFID label 74 when obtaining I.D. card information, central processing unit 50 (for example cuts out RFID label 74, disconnect the antenna of RFID label 74 inside), this RFID label 74 is quit work.The mode of prompting can also be to send SMS notification user by wireless sending module 20.In addition, electronic installation 1 can also be installed warning lamp or hummer (for example, red light), if when the attenuation amplitude of return signal is less than the attenuation amplitude of setting, bright or the hummer of warning lamp is sounded, to point out user these RFID reader 72 cisco unity malfunctions.
As shown in Figure 6, be the process flow diagram of revising the label data in the RFID label of electronic installation.
Step S301, activates RFID label 74.The mode that activates RFID label 74 is by outside RFID reader (not being mounted in the RFID reader 72 on electronic installation) during near RFID label 74, and RFID label 74 receives interrogating signal, and produces response, and now RFID label 74 is activated.Interference for fear of the RFID reader 72 on electronic installation 1, when the label data on RFID label 74 is modified, central processing unit 50 (for example cuts out RFID reader 72, cut off the power supply of RFID reader 72, or cut off being connected between RFID reader 72 and antenna 700, make this RFID read 72 abilities that lose transmitted signal).
Step S302, central processing unit sending controling instruction, to RFID label 74, is forbidden the data-transformation facility on RFID label 74.Particularly, on described RFID label 74, store a data modification sign, this data modification sign represents with a character, for example, Y or N, when data modification is masked as Y, the data-transformation facility on RFID label 74 is normal, that is to say, outside RFID reader can obtain the information on RFID label 74, when data modification is masked as N, the data-transformation facility on RFID label 74 is closed, and outside RFID reader can not obtain the information on RFID label 74.
Step S303, central processing unit 50 requests send its only identifier (unique identifier, UID) near the RFID reader (being outside RFID reader) of electronic installation 1.Described UID has uniqueness, for distinguishing different RFID readers.
Step S304, when central processing unit 50 is determined the UID of the RFID reader that has received close electronic installation 1, judges whether to exist the RFID label data corresponding with the UID receiving.Particularly, storage medium in electronic installation 1 (for example, storage space on first memory 201, second memory 202) on, preserve the list of a RFID label data, the corresponding RFID label data of UID of a plurality of RFID readers is preserved in the list of described RFID label data, the corresponding RFID label data of each UID.If there is the UID receiving in the list of RFID label data, show that this UID has corresponding RFID label data, otherwise, if there is not the UID receiving in the list of RFID label data, show that this UID does not have corresponding RFID label data.
Step S305, is saved in the RFID label data corresponding with UID in RFID label 74, to replace label data original in RFID label 74.
Step S306, central processing unit 50 is opened the data-transformation facility of RFID label 74.Particularly, central processing unit 50 is revised as Y by the data modification sign in RFID label 74 by N, and RFID label 74 can carry out data transmission afterwards.
Finally it should be noted that, above embodiment is only unrestricted in order to technical scheme of the present invention to be described, although this aspect is had been described in detail with reference to preferred embodiment, those skilled in the art are to be understood that, can modify or be equal to replacement technical scheme of the present invention, and not depart from the scope of technical solution of the present invention.

Claims (10)

1. use has a method for the electronic installation of dual system, it is characterized in that, the method comprises;
By gear controller, connect gear corresponding with first memory on driving switch or connect the gear corresponding with second memory on driving switch;
On connecting driving switch during the gear corresponding with first memory, central processing unit communicates and is connected with first memory, start the operating system on first memory, send instruction to Peripheral Interface controller with shielding Peripheral Interface, and send instruction to wireless communication module, make the first operating system login given server by the particular network of wireless communication module;
On connecting driving switch, during the gear corresponding with second memory, central processing unit communicates and is connected with second memory, starts the operating system on second memory, recovery Peripheral Interface.
2. a kind of use as claimed in claim 1 has the method for the electronic installation of dual system, it is characterized in that, when the first os starting, the driver of the Peripheral Interface of installing in described Peripheral Interface controller is set to down state, to shield Peripheral Interface.
3. a kind of use as claimed in claim 1 has the method for the electronic installation of dual system, between described Peripheral Interface controller and described Peripheral Interface, a microswitch is also installed, this microswitch connects the power supply of Peripheral Interface, when the first operating system, this Peripheral Interface controller disconnects this microswitch, cut off the power supply of Peripheral Interface, to shield Peripheral Interface.
4. a kind of use as claimed in claim 1 has the method for the electronic installation of dual system, it is characterized in that, when the first operating system, described central processing unit is by the instruction set of relevant Peripheral Interface on shielding central processing unit, thus shielding shielding Peripheral Interface.
5. a kind of use as claimed in claim 1 has the method for the electronic installation of dual system, it is characterized in that, between described central processing unit and first memory, be connected with a miniature metal-oxide-semiconductor switch, this miniature metal-oxide-semiconductor switch is connected with the power supply of the access hole control line of first memory, when first memory starts, central processing unit is controlled the power supply of this miniature metal-oxide-semiconductor switch cut-out and access hole control line, makes first memory lose data storage function.
6. a kind of use as claimed in claim 1 has the method for the electronic installation of dual system, it is characterized in that, when the first operating system, when described electronic installation is processed the data that send from given server, in data, add the user profile of using this electronic installation.
7. a kind of use as claimed in claim 1 has the method for the electronic installation of dual system, it is characterized in that, this electronic installation also comprises a RFID reader or NFC device, and this RFID reader or NFC device are connected with central processing unit.
8. a kind of use as claimed in claim 7 has the method for the electronic installation of dual system, it is characterized in that, described driving switch controller is connected gear corresponding with first memory on driving switch or is connected the gear corresponding with second memory on driving switch in conjunction with RFID reader.
9. a kind of use as claimed in claim 7 has the method for the electronic installation of dual system, it is characterized in that, described driving switch controller is connected gear corresponding with first memory on driving switch or is connected the gear corresponding with second memory on driving switch in conjunction with NFC device.
10. a kind of use as described in claim 1 or 5 or 7 has the method for the electronic installation of dual system, it is characterized in that, described central processing unit is processed connected electronic component by the mode of periodic scanning, and calculate according to the time point of the noise peak of the appearance of each electronic component, with the noise peak of each electronic component that staggers, the noise peak of each electronic component in operational process can not superposeed.
CN201310115313.7A 2013-04-01 2013-04-01 Method for using electronic device with two systems Pending CN104102610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310115313.7A CN104102610A (en) 2013-04-01 2013-04-01 Method for using electronic device with two systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310115313.7A CN104102610A (en) 2013-04-01 2013-04-01 Method for using electronic device with two systems

Publications (1)

Publication Number Publication Date
CN104102610A true CN104102610A (en) 2014-10-15

Family

ID=51670777

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310115313.7A Pending CN104102610A (en) 2013-04-01 2013-04-01 Method for using electronic device with two systems

Country Status (1)

Country Link
CN (1) CN104102610A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104656515A (en) * 2015-01-21 2015-05-27 广州视睿电子科技有限公司 Remote control method and system of double-system intelligent equipment
CN111722894A (en) * 2019-03-21 2020-09-29 成都鼎桥通信技术有限公司 Application processing method and device and electronic equipment
CN111741161A (en) * 2019-03-25 2020-10-02 质子世界国际公司 Electronic system
US11303745B2 (en) 2019-03-25 2022-04-12 Proton World International N.V. Electronic system
US11561921B2 (en) 2019-03-25 2023-01-24 Proton World International N.V. Electronic system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6145739A (en) * 1993-10-26 2000-11-14 Intellect Australia Pty Ltd. System and method for performing transactions and an intelligent device therefor
CN202306531U (en) * 2011-09-20 2012-07-04 深圳市顶星数码网络技术有限公司 Multi-system changeover device and computer
CN102929731A (en) * 2011-08-09 2013-02-13 鸿富锦精密工业(深圳)有限公司 Multi-system electronic device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6145739A (en) * 1993-10-26 2000-11-14 Intellect Australia Pty Ltd. System and method for performing transactions and an intelligent device therefor
CN102929731A (en) * 2011-08-09 2013-02-13 鸿富锦精密工业(深圳)有限公司 Multi-system electronic device
CN202306531U (en) * 2011-09-20 2012-07-04 深圳市顶星数码网络技术有限公司 Multi-system changeover device and computer

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104656515A (en) * 2015-01-21 2015-05-27 广州视睿电子科技有限公司 Remote control method and system of double-system intelligent equipment
CN104656515B (en) * 2015-01-21 2017-09-29 广州视睿电子科技有限公司 The long-range control method and system of dual system smart machine
CN111722894A (en) * 2019-03-21 2020-09-29 成都鼎桥通信技术有限公司 Application processing method and device and electronic equipment
CN111722894B (en) * 2019-03-21 2023-04-18 成都鼎桥通信技术有限公司 Application processing method and device and electronic equipment
CN111741161A (en) * 2019-03-25 2020-10-02 质子世界国际公司 Electronic system
US11303745B2 (en) 2019-03-25 2022-04-12 Proton World International N.V. Electronic system
US11561921B2 (en) 2019-03-25 2023-01-24 Proton World International N.V. Electronic system
US11593905B2 (en) 2019-03-25 2023-02-28 Proton World International N.V. Electronic system

Similar Documents

Publication Publication Date Title
CN203191973U (en) Electronic device with dual systems
US20130125231A1 (en) Method and system for managing a multiplicity of credentials
US20140250183A1 (en) Home appliance information management apparatus, home appliance information sharing method, and home appliance information sharing system
US10244347B2 (en) System and method for location-based security
CN103839313A (en) Access control system
CN105227516A (en) The access method of Smart Home, control centre's equipment and dress terminal
KR101895220B1 (en) Apparatus and method for selecting a secure element in a near field communication device
CN104134253A (en) Entrance guard system and entrance guard opening method
CN102136085B (en) Telecom smart card and telecom smart card-based non-contact application management method
CN105590201A (en) Mobile payment device and mobile payment system
CN104102610A (en) Method for using electronic device with two systems
CN106470049A (en) There is the NFC device of multiple safety elements
CN103609136A (en) Method for in-situ upgrading RFID readers
US20090141896A1 (en) Processing module operating methods, processing modules, and communications systems
EP2095297B1 (en) Apparatus and method for action control of rfid system
EP1783658B1 (en) Apparatus and method for modifying RFID tag data in portable terminal
US10832020B2 (en) Information processing system and method for secure exchange of information
CN104102611A (en) Electronic device with dual systems
CN101009555B (en) An intelligent secret key device and the method for information interaction with the host
CN103425603A (en) Electronic device with RFID (radio frequency identification) function
CN102368852A (en) Information processing apparatus, information processing method and program
US9477917B1 (en) System and method of context specific identity in a radio frequency identity (RFID) chip
KR20140082949A (en) Access control system using NFC communication and data exchange methods
US8947213B2 (en) Method and system for confirming location of product within shelf using RFID
CN104700020A (en) Equipment unlocking method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
DD01 Delivery of document by public notice

Addressee: SkyNet Technologies (Shenzhen) Ltd.

Document name: the First Notification of an Office Action

DD01 Delivery of document by public notice

Addressee: SkyNet Technologies (Shenzhen) Ltd.

Document name: Notification that Application Deemed to be Withdrawn

DD01 Delivery of document by public notice
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20141015

WD01 Invention patent application deemed withdrawn after publication