CN104156657A - Information input method and information input device of terminal and terminal - Google Patents

Information input method and information input device of terminal and terminal Download PDF

Info

Publication number
CN104156657A
CN104156657A CN201410440696.XA CN201410440696A CN104156657A CN 104156657 A CN104156657 A CN 104156657A CN 201410440696 A CN201410440696 A CN 201410440696A CN 104156657 A CN104156657 A CN 104156657A
Authority
CN
China
Prior art keywords
operating system
security
operation system
terminal
assigned operation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410440696.XA
Other languages
Chinese (zh)
Other versions
CN104156657B (en
Inventor
岳蓬星
王振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410440696.XA priority Critical patent/CN104156657B/en
Publication of CN104156657A publication Critical patent/CN104156657A/en
Application granted granted Critical
Publication of CN104156657B publication Critical patent/CN104156657B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Abstract

The invention provides an information input method and information input device of a terminal and the terminal. The terminal comprises a plurality of operating systems, and the information input method comprises the steps that when the fact that any application program in any operating system receives an information input request is detected, a designated operating system is selected from at least one other operating system in the operating systems except for the any operating system; the designated operating system is controlled to acquire information required by the information input request to be input; the designated operating system is controlled to send the acquired information to the any application program of the any operating system. According to the technical scheme, the problem that the information input into the terminal is captured by malicious software, viruses and the like is solved, the information safety of the terminal is effectively protected, the privacy safety of a user is improved, and user experience is enhanced.

Description

The data inputting method of terminal, the message input device of terminal and terminal
Technical field
The present invention relates to terminal technology field, in particular to a kind of data inputting method of terminal, a kind of message input device of terminal and a kind of terminal.
Background technology
At present; in existing dual system termi-nal; in the application program of the general direct operating system to terminal of user, input the important informations such as password; by this operating system itself, receive this important information and process; in aforesaid operations system, receive in the information of inputting the process of processing, especially, in the process of information that receives input, the important information of input is easy to be obtained by Malware or virus etc.; confidentiality is poor, is unfavorable for user's privacy to protect.
Therefore, need a kind of new data inputting method, can, user to utilizing the information security of the other system protection terminal in terminal in the application program of operating system during input message, become current problem demanding prompt solution.
Summary of the invention
The present invention, just based on above-mentioned technical matters, has proposed a kind of new technical scheme, can, user to utilizing the information security of the other system protection terminal in terminal in the application program of operating system during input message, avoid user's information leakage.
In view of this, an aspect of of the present present invention has proposed a kind of data inputting method of terminal, described terminal comprises a plurality of operating system, comprise: when the arbitrary application program in arbitrary operating system being detected receives input information request, according to described input information request, at least one other operating system beyond the described arbitrary operating system from described a plurality of operating system, select assigned operation system; The information of input is asked in the input information request described in described assigned operation system acquisition controlled; Control described assigned operation system and the described information getting is sent to described arbitrary application program of described arbitrary operating system.
In this technical scheme, when the application program of arbitrary operating system receives input information request, use assigned operation system to receive the information of input, such as, when user opens the Alipay release interface of operating system A in mobile phone, can be considered and receive unlocking pin input request, now, current operation system A is switched to assigned operation system B, by assigned operation system B, received the unlocking pin of user's input, thereby avoid user's password to be leaked by current operation system A, and the information of input is sent in the Alipay program of current operation system A by assigned operation system B, further, can only can communicate with current operation system A by setting operation system B, or setting operation system B is receiving from the information of current operation system A and this information only can communicated with current operation system A in the process of the Alipay program transmission of current operation system A, to protect as much as possible the safety of this input message, user's personal secrets have been promoted.
In technique scheme, preferably, described according to described input information request, in at least one other operating system beyond described arbitrary operating system from described a plurality of operating system, select assigned operation system, specifically comprise: according to described input information request, determine the operating system to be selected in described at least one other operating system with the authority of obtaining described information; And according to the select command receiving, from described operating system to be selected, select described assigned operation system, or according to the level of security of described operating system to be selected, select to have the operating system of the highest described level of security as described assigned operation system.
In this technical scheme, the information of input can only be in a plurality of operating system current operation system beyond the part operation system with the authority that receives this information grasp, and by the direct selected assigned operation system in described part operation system of user, or in described part operation system, select system that level of security is the highest as assigned operation system.By technique scheme, can from other operating systems, select suitable assigned operation system according to the input information request receiving, to strengthen the security of input information.
In technique scheme, preferably, described according to described input information request, in at least one other operating system beyond described arbitrary operating system from described a plurality of operating system, select assigned operation system, comprise: according to the select command receiving, from described at least one other operating system, select described assigned operation system; Or according to the level of security of described at least one other operating system, select to have the operating system of the highest described level of security as described assigned operation system.
In this technical scheme, direct selected assigned operation system in other operating systems beyond the current operation system in a plurality of operating system also can select system that level of security is the highest as assigned operation system in other operating systems.By technique scheme, can select most suitable or safest assigned operation system according to user's demand or according to level of security, to strengthen the security of input information.
In technique scheme, preferably, also comprise: control described assigned operation system and preserve described information.
In this technical scheme, the input message receiving can be saved, to facilitate call next time.
In technique scheme, preferably, the information of input is asked in input information request described in the described assigned operation system acquisition of described control, specifically comprise: judge in described assigned operation system whether preserve described information, wherein, when judgment result is that while being, obtain the described information of preservation; When the determination result is NO, obtain the described information of input.
In this technical scheme; owing to controlling assigned operation system, preserve the information of inputting; can be when receive identical input information request next time; this information need not be again inputted and just identical result can be obtained; in the safety of protection input message, promoted the convenience of user's operation.
In technique scheme, preferably, also comprise: according to the networking authority of each operating system in described a plurality of operating system and/or networking type, for described each operating system arranges level of security.
In this technical scheme, can for each operating system, level of security be set respectively according to the networking authority of each operating system and/or networking type, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, operating system A is the security system of forbidding networking, can only communicate by letter with C with operating system B, operating system B is for connecting the conventional system of 2G network, operating system C is for can connect 3G network, 4G network and the multifunction system that can use Bluetooth function, hence one can see that, the security of operating system A is the highest, and that operating system C is subject to the possibility of wooden horse or malware attacks is the highest, level of security that can setting operation system A is senior, the level of security of operating system B is middle rank, the level of security of operating system C is rudimentary, when the Alipay program in operating system B receives Password Input request, the preferential operating system A that selects receives the password of input as assigned operation system, and the password receiving is sent to the Alipay program in operating system B.
In technique scheme, preferably, also comprise: verification mode during each operating system according to access in described a plurality of operating system, for described each operating system arranges level of security.
In this technical scheme, verification mode in the time of can also accessing each operating system according to user is respectively each operating system level of security is set, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, user is accessing operation system A and without any need for checking directly, user need to input password when accessing operation system B, and need to first inputting password when accessing operation system C, user carries out again fingerprint authentication, level of security that can setting operation system A is rudimentary, the level of security of operating system B is middle rank, the level of security of operating system C is senior.When the Alipay program in operating system B receives Password Input request, preferentially select operating system C as assigned operation system, to receive the password of input, and the password receiving is sent to the Alipay program in operating system B.
Another aspect of the present invention has proposed a kind of message input device of terminal, described terminal comprises a plurality of operating system, comprise: selected cell, when the arbitrary application program in arbitrary operating system being detected receives input information request, according to described input information request, at least one other operating system beyond the described arbitrary operating system from described a plurality of operating system, select assigned operation system; Control module, the information of input is asked in the input information request described in described assigned operation system acquisition of controlling, and controls described assigned operation system and the described information getting is sent to described arbitrary application program of described arbitrary operating system.
In this technical scheme, when arbitrary operating system receives input information request, use assigned operation system to receive the information of input, such as, when user opens the Alipay release interface of operating system A in mobile phone, can be considered and receive unlocking pin input request, now, current operation system A is switched to assigned operation system B, by assigned operation system B, received the unlocking pin of user's input, thereby avoid user's password to be leaked by current operation system A, and the information of input is sent in the Alipay program of current operation system A by assigned operation system B, further, can only can communicate with current operation system A by setting operation system B, or setting operation system B is receiving from the information of current operation system A and this information only can communicated with current operation system A in the process of the Alipay program transmission of current operation system A, to protect as much as possible the safety of this input message, user's personal secrets have been promoted.
In technique scheme, preferably, described selected cell comprises: determining unit, according to described input information request, determine the operating system to be selected in described at least one other operating system with the authority of obtaining described information; The first selected cell, according to the select command receiving, from described operating system to be selected, select described assigned operation system, or according to the level of security of described operating system to be selected, select to have the operating system of the highest described level of security as described assigned operation system; The second selected cell according to the select command receiving, is selected described assigned operation system from described at least one other operating system; Or according to the level of security of described at least one other operating system, select to have the operating system of the highest described level of security as described assigned operation system.
In this technical scheme, the part operation system with the authority that receives this information that can arrange beyond the current operation system that the information of input can only be in a plurality of operating system is grasped, and by the direct selected assigned operation system in described part operation system of user, or in described part operation system, select system that level of security is the highest as assigned operation system.By technique scheme, can from other operating systems, select suitable assigned operation system according to the input information request receiving, to strengthen the security of input information.
In this technical scheme, also can select selected assigned operation system in other operating systems beyond the direct current operation system in a plurality of operating system, or in other operating systems, select system that level of security is the highest as assigned operation system.By technique scheme, can select most suitable or safest assigned operation system according to user's demand or according to level of security, to strengthen the security of input information.
In technique scheme, preferably, described control module also for: control described assigned operation system and preserve described information.
In this technical scheme, the input message receiving can be saved, to facilitate call next time.
In technique scheme, preferably, also comprise: judging unit, judges in described assigned operation system whether preserve described information; And described control module also for: when judgment result is that while being, control the described information that described assigned operation system acquisition is preserved; When the determination result is NO, control the described information of described assigned operation system acquisition input.
In this technical scheme; owing to controlling assigned operation system, preserve the information of inputting; can be when receive identical input information request next time; this information need not be again inputted and just identical result can be obtained; in the safety of protection input message, promoted the convenience of user's operation.
In technique scheme, preferably, also comprise: the first setting unit, according to the networking authority of each operating system in described a plurality of operating system and/or networking type, for described each operating system arranges level of security.
In this technical scheme, can for each operating system, level of security be set respectively according to the networking authority of each operating system and/or networking type, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, operating system A is the security system of forbidding networking, can only communicate by letter with C with operating system B, operating system B is for connecting the conventional system of 2G network, operating system C is for can connect 3G network, 4G network and the multifunction system that can use Bluetooth function, hence one can see that, the security of operating system A is the highest, and that operating system C is subject to the possibility of wooden horse or malware attacks is the highest, level of security that can setting operation system A is senior, the level of security of operating system B is middle rank, the level of security of operating system C is rudimentary, when the Alipay program in operating system B receives Password Input request, the preferential operating system A that selects receives the password of input as assigned operation system, and the password receiving is sent to the Alipay program in operating system B.
In technique scheme, preferably, also comprise: the second setting unit, verification mode during each operating system according to access in described a plurality of operating system, for described each operating system arranges level of security.
In this technical scheme, verification mode in the time of can also accessing each operating system according to user is respectively each operating system level of security is set, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, user is accessing operation system A and without any need for checking directly, user need to input password when accessing operation system B, and need to first inputting password when accessing operation system C, user carries out again fingerprint authentication, level of security that can setting operation system A is rudimentary, the level of security of operating system B is middle rank, the level of security of operating system C is senior.When the Alipay program in operating system B receives Password Input request, preferentially select operating system C as assigned operation system, to receive the password of input, and the password receiving is sent to the Alipay program in operating system B.
One side more of the present invention has proposed a kind of terminal, includes the message input device of the terminal described in a plurality of operating system and technique scheme.Therefore, this terminal has whole beneficial effects of the message input device of the terminal that technique scheme provides, and does not repeat them here.
By above technical scheme; can make the information of input be received by assigned operation system; reduced the chance of leakage of information; promoted the convenience of user's operation; thereby avoided the dangerous privacy causing of application program that receives input information request because receiving in the operating system of input information request and/or operating system to reveal; effectively protect the information security of terminal, promoted user's personal secrets.
Accompanying drawing explanation
Fig. 1 shows the schematic flow diagram of the data inputting method of terminal according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of the data inputting method of terminal according to still another embodiment of the invention;
Fig. 3 shows the schematic block diagram of the message input device of terminal according to an embodiment of the invention;
Fig. 4 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 5 shows the schematic block diagram of terminal according to still another embodiment of the invention.
Embodiment
In order more clearly to understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, in the situation that not conflicting, the application's embodiment and the feature in embodiment can combine mutually.
A lot of details have been set forth in the following description so that fully understand the present invention, but, the present invention can also adopt other to be different from other modes described here and implement, and therefore, input range of the present invention is not subject to the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow diagram of the data inputting method of terminal according to an embodiment of the invention.
As shown in Figure 1, the data inputting method of the terminal of one embodiment of the present of invention, for having the terminal of a plurality of operating systems, comprising:
Step 102, when the arbitrary application program in arbitrary operating system being detected receives input information request, according to input information request, selects assigned operation system at least one other operating system beyond the arbitrary operating system from a plurality of operating system.
Step 104, controls the information that input is asked in the request of assigned operation system acquisition input information.
Step 106, controls assigned operation system and the information getting is sent to described arbitrary application program of described arbitrary operating system.
In this technical scheme, when arbitrary operating system receives input information request, use assigned operation system to receive the information of input, such as, when user opens the Alipay release interface of operating system A in mobile phone, can be considered and receive unlocking pin input request, now, current operation system A is switched to assigned operation system B, by assigned operation system B, received the unlocking pin of user's input, thereby avoid user's password to be leaked by current operation system A, and the information of input is sent in the Alipay program of current operation system A by assigned operation system B, further, can only can communicate with current operation system A by setting operation system B, or setting operation system B is receiving from the information of current operation system A and this information only can communicated with current operation system A in the process of the Alipay program transmission of current operation system A, to protect as much as possible the safety of this input message, user's personal secrets have been promoted.
In technique scheme, preferably, in step 102, specifically comprise: according to input information request, determine the operating system to be selected at least one other operating system with the authority of obtaining information; And according to the select command receiving, from operating system to be selected, select assigned operation system, or according to the level of security of operating system to be selected, select to have the operating system of the highest level of security as assigned operation system.
In this technical scheme, the information of input can only be in a plurality of operating system current operation system beyond the part operation system with the authority that receives this information grasp, and by the direct selected assigned operation system in part operation system of user, or in part operation system, select system that level of security is the highest as assigned operation system.By technique scheme, can from other operating systems, select suitable assigned operation system according to the input information request receiving, to strengthen the security of input information.
In technique scheme, preferably, in step 102, comprising: according to the select command receiving, from least one other operating system, select assigned operation system; Or according to the level of security of at least one other operating system, select to have the operating system of the highest level of security as assigned operation system.
In this technical scheme, direct selected assigned operation system in other operating systems beyond the current operation system in a plurality of operating system also can select system that level of security is the highest as assigned operation system in other operating systems.By technique scheme, can select most suitable or safest assigned operation system according to user's demand or according to level of security, to strengthen the security of input information.
In technique scheme, preferably, also comprise: control assigned operation system and preserve information.
In this technical scheme, the input message receiving can be saved, to facilitate call next time.
In technique scheme, preferably, step 104 specifically comprises: judge in assigned operation system whether preserve information, wherein, when judgment result is that while being, obtain the information of preservation; When the determination result is NO, obtain the information of input.
In this technical scheme; owing to controlling assigned operation system, preserve the information of inputting; can be when receive identical input information request next time; this information need not be again inputted and just identical result can be obtained; in the safety of protection input message, promoted the convenience of user's operation.
In technique scheme, preferably, also comprise: according to the networking authority of each operating system in a plurality of operating system and/or networking type, for each operating system arranges level of security.
In this technical scheme, can for each operating system, level of security be set respectively according to the networking authority of each operating system and/or networking type, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, operating system A is the security system of forbidding networking, can only communicate by letter with C with operating system B, operating system B is for connecting the conventional system of 2G network, operating system C is for can connect 3G network, 4G network and the multifunction system that can use Bluetooth function, hence one can see that, the security of operating system A is the highest, and that operating system C is subject to the possibility of wooden horse or malware attacks is the highest, level of security that can setting operation system A is senior, the level of security of operating system B is middle rank, the level of security of operating system C is rudimentary, when the Alipay program in operating system B receives Password Input request, the preferential operating system A that selects receives the password of input as assigned operation system, and the password receiving is sent to the Alipay program in operating system B.
In technique scheme, preferably, also comprise: verification mode during each operating system according to access in a plurality of operating system, for each operating system arranges level of security.
In this technical scheme, verification mode in the time of can also accessing each operating system according to user is respectively each operating system level of security is set, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, user is accessing operation system A and without any need for checking directly, user need to input password when accessing operation system B, and need to first inputting password when accessing operation system C, user carries out again fingerprint authentication, level of security that can setting operation system A is rudimentary, the level of security of operating system B is middle rank, the level of security of operating system C is senior.When the Alipay program in operating system B receives Password Input request, preferentially select operating system C as assigned operation system, to receive the password of input, and the password receiving is sent to the Alipay program in operating system B.
Fig. 2 shows the schematic flow diagram of the data inputting method of terminal according to still another embodiment of the invention.
As shown in Figure 2, the data inputting method of the terminal of another embodiment of the present invention, for having the terminal of system A and system B, comprising:
Step 202, system A receives password collection request.
Step 204, judges whether to allow password collection, when judgment result is that while being, enters step 206, when the determination result is NO, returns to step 202, waits for the request of password collection next time.
Step 206, system B carries out password collection, and system B receives the password of input.By the password of input system A can only be received by system B, reduced the chance of leakage of information, thereby avoided causing password to be revealed in input process because system A is dangerous, can effectively protect the information security of terminal.
Step 208, has judged whether password collection, when judgment result is that while being, enters step 210, when the determination result is NO, returns to step 206, continues to carry out password collection by system B.
Step 210, is sent to system A by collection result.
Fig. 3 shows the schematic block diagram of the message input device of terminal according to an embodiment of the invention.
As shown in Figure 3, the message input device 300 of the terminal of one embodiment of the present of invention is for having the terminal of a plurality of operating systems, comprise: selected cell 302, when the arbitrary application program in arbitrary operating system being detected receives input information request, according to input information request, at least one other operating system beyond the arbitrary operating system from a plurality of operating system, select assigned operation system; Control module 304, controls the information that input is asked in the request of assigned operation system acquisition input information, and control assigned operation system is sent to the information getting described arbitrary application program of described arbitrary operating system.
In this technical scheme, when arbitrary operating system receives input information request, use assigned operation system to receive the information of input, such as, when user opens the Alipay release interface of operating system A in mobile phone, can be considered and receive unlocking pin input request, now, current operation system A is switched to assigned operation system B, by assigned operation system B, received the unlocking pin of user's input, thereby avoid user's password to be leaked by current operation system A, and the information of input is sent in the Alipay program of current operation system A by assigned operation system B, further, can only can communicate with current operation system A by setting operation system B, or setting operation system B is receiving from the information of current operation system A and this information only can communicated with current operation system A in the process of the Alipay program transmission of current operation system A, to protect as much as possible the safety of this input message, user's personal secrets have been promoted.
In technique scheme, preferably, selected cell 302 comprises: determining unit 3022, according to input information request, determine the operating system to be selected at least one other operating system with the authority of obtaining information; The first selected cell 3024 according to the select command receiving, is selected assigned operation system from operating system to be selected, or according to the level of security of operating system to be selected, selects to have the operating system of the highest level of security as assigned operation system; The second selected cell 3026 according to the select command receiving, is selected assigned operation system from least one other operating system; Or according to the level of security of at least one other operating system, select to have the operating system of the highest level of security as assigned operation system.
In this technical scheme, the part operation system with the authority that receives this information that can arrange beyond the current operation system that the information of input can only be in a plurality of operating system is grasped, and by the direct selected assigned operation system in part operation system of user, or in part operation system, select system that level of security is the highest as assigned operation system.By technique scheme, can from other operating systems, select suitable assigned operation system according to the input information request receiving, to strengthen the security of input information.
In this technical scheme, also can select selected assigned operation system in other operating systems beyond the direct current operation system in a plurality of operating system, or in other operating systems, select system that level of security is the highest as assigned operation system.By technique scheme, can select most suitable or safest assigned operation system according to user's demand or according to level of security, to strengthen the security of input information.
In technique scheme, preferably, control module 304 also for: control assigned operation system and preserve information.
In this technical scheme, the input message receiving can be saved, to facilitate call next time.
In technique scheme, preferably, also comprise: judging unit 306, judges in assigned operation system, whether to preserve information; And control module 304 also for: when judgment result is that while being, control the information that assigned operation system acquisition is preserved; When the determination result is NO, control the information of assigned operation system acquisition input.
In this technical scheme; owing to controlling assigned operation system, preserve the information of inputting; can be when receive identical input information request next time; this information need not be again inputted and just identical result can be obtained; in the safety of protection input message, promoted the convenience of user's operation.
In technique scheme, preferably, also comprise: the first setting unit 308, according to the networking authority of each operating system in a plurality of operating system and/or networking type, for each operating system arranges level of security.
In this technical scheme, can for each operating system, level of security be set respectively according to the networking authority of each operating system and/or networking type, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, operating system A is the security system of forbidding networking, can only communicate by letter with C with operating system B, operating system B is for connecting the conventional system of 2G network, operating system C is for can connect 3G network, 4G network and the multifunction system that can use Bluetooth function, hence one can see that, the security of operating system A is the highest, and that operating system C is subject to the possibility of wooden horse or malware attacks is the highest, level of security that can setting operation system A is senior, the level of security of operating system B is middle rank, the level of security of operating system C is rudimentary, when the Alipay program in operating system B receives Password Input request, the preferential operating system A that selects receives the password of input as assigned operation system, and the password receiving is sent to the Alipay program in operating system B.
In technique scheme, preferably, also comprise: the second setting unit 310, verification mode during each operating system according to access in a plurality of operating system, for each operating system arranges level of security.
In this technical scheme, verification mode in the time of can also accessing each operating system according to user is respectively each operating system level of security is set, such as, in mobile phone, there is A, B, tri-operating systems of C, wherein, user is accessing operation system A and without any need for checking directly, user need to input password when accessing operation system B, and need to first inputting password when accessing operation system C, user carries out again fingerprint authentication, level of security that can setting operation system A is rudimentary, the level of security of operating system B is middle rank, the level of security of operating system C is senior.When the Alipay program in operating system B receives Password Input request, preferentially select operating system C as assigned operation system, to receive the password of input, and the password receiving is sent to the Alipay program in operating system B.
Fig. 4 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in Figure 4, the terminal 400 of one embodiment of the present of invention comprises: a plurality of operating system 402 and message input device 404 (message input device 300 that is equivalent to the terminal in the embodiment shown in Fig. 3).
Wherein, when message input device 404 receives input information request for the application program in arbitrary operating system, control the information that assigned operation system receives input, and will the result of the information of input be sent to the described application program in described arbitrary operating system.Such as, when user opens the precious release of mobile-phone payment interface, can be considered and receive unlocking pin input request, now, message input device 404 switches to assigned operation system by current described arbitrary operating system, by assigned operation system, received the unlocking pin of user's input, and unlocking pin is sent to the described application program in described arbitrary operating system, thereby avoid user's password to be leaked by current operation system.
Pass through technique scheme; the information of input can only be received by assigned operation system; reduced the chance of leakage of information; thereby avoided the dangerous privacy causing of application program that receives input information request because receiving in the operating system of input information request and/or operating system to reveal; can effectively protect the information security of terminal, promote user's personal secrets.
Fig. 5 shows the schematic block diagram of terminal according to still another embodiment of the invention.
As shown in Figure 5, terminal 500 is according to still another embodiment of the invention that system A and system B form by two systems.Wherein, system A is general operating system, and system B is the system with input message defencive function, and the Password Input request receiving for the treatment of system A receive the password of inputting, and the password that can receive is sent to system A.
Therefore; password can only be inputted in system B, and not can because of in system A, install by mistake Malware bring into virus etc. reason cause input cryptographic processes in password by other people, intercepted, like this; reduce the chance of password leakage, effectively protected the information security of terminal.
In the present invention, term " first ", " second " be the object for describing only, and can not be interpreted as indication or hint relative importance.For the ordinary skill in the art, can understand as the case may be above-mentioned term concrete meaning in the present invention.
More than be described with reference to the accompanying drawings technical scheme of the present invention; by technical scheme of the present invention; can make the information of input be received by assigned operation system; reduced the chance of leakage of information; promoted the convenience of user's operation; thereby avoided the dangerous privacy causing of application program that receives input information request because receiving in the operating system of input information request and/or operating system to reveal, effectively protected the information security of terminal, promoted user's personal secrets.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any modification of doing, be equal to replacement, improvement etc., within all should being included in input range of the present invention.

Claims (10)

1. a data inputting method for terminal, described terminal comprises a plurality of operating system, it is characterized in that, comprising:
When the arbitrary application program in arbitrary operating system being detected receives input information request, according to described input information request, at least one other operating system beyond the described arbitrary operating system from described a plurality of operating system, select assigned operation system;
The information of input is asked in the input information request described in described assigned operation system acquisition controlled;
Control described assigned operation system and the described information getting is sent to described arbitrary application program of described arbitrary operating system.
2. the data inputting method of terminal according to claim 1, it is characterized in that, described according to described input information request, at least one other operating system beyond the described arbitrary operating system from described a plurality of operating system, select assigned operation system, specifically comprise:
According to described input information request, determine the operating system to be selected in described at least one other operating system with the authority of obtaining described information; And
According to the select command receiving, from described operating system to be selected, select described assigned operation system, or according to the level of security of described operating system to be selected, select to have the operating system of the highest described level of security as described assigned operation system.
3. the data inputting method of terminal according to claim 1, it is characterized in that, described according to described input information request, at least one other operating system beyond the described arbitrary operating system from described a plurality of operating system, select assigned operation system, comprising:
According to the select command receiving, from described at least one other operating system, select described assigned operation system; Or
According to the level of security of described at least one other operating system, select to have the operating system of the highest described level of security as described assigned operation system.
4. according to the data inputting method of the terminal described in claim 2 or 3, it is characterized in that, also comprise:
According to the networking authority of each operating system in described a plurality of operating system and/or networking type, for described each operating system arranges level of security.
5. according to the data inputting method of the terminal described in claim 2 or 3, it is characterized in that, also comprise:
Verification mode during each operating system according to access in described a plurality of operating system, for described each operating system arranges level of security.
6. a message input device for terminal, described terminal comprises a plurality of operating system, it is characterized in that, comprising:
Selected cell, when the arbitrary application program in arbitrary operating system being detected receives input information request, according to described input information request, at least one other operating system beyond the described arbitrary operating system from described a plurality of operating system, select assigned operation system;
Control module, the information of input is asked in the input information request described in described assigned operation system acquisition of controlling, and controls described assigned operation system and the described information getting is sent to described arbitrary application program of described arbitrary operating system.
7. the message input device of terminal according to claim 6, is characterized in that, described selected cell comprises:
Determining unit, according to described input information request, determines the operating system to be selected in described at least one other operating system with the authority of obtaining described information;
The first selected cell, according to the select command receiving, from described operating system to be selected, select described assigned operation system, or according to the level of security of described operating system to be selected, select to have the operating system of the highest described level of security as described assigned operation system;
The second selected cell according to the select command receiving, is selected described assigned operation system from described at least one other operating system; Or according to the level of security of described at least one other operating system, select to have the operating system of the highest described level of security as described assigned operation system.
8. according to the message input device of the terminal described in claim 6 or 7, it is characterized in that, also comprise:
The first setting unit, according to the networking authority of each operating system in described a plurality of operating system and/or networking type, for described each operating system arranges level of security.
9. according to the message input device of the terminal described in claim 6 or 7, it is characterized in that, also comprise:
The second setting unit, verification mode during each operating system according to access in described a plurality of operating system, for described each operating system arranges level of security.
10. a terminal, is characterized in that, comprising:
A plurality of operating system; And
The message input device of the terminal as described in any one in claim 6 to 9.
CN201410440696.XA 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal Active CN104156657B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410440696.XA CN104156657B (en) 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410440696.XA CN104156657B (en) 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal

Publications (2)

Publication Number Publication Date
CN104156657A true CN104156657A (en) 2014-11-19
CN104156657B CN104156657B (en) 2018-04-10

Family

ID=51882154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410440696.XA Active CN104156657B (en) 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal

Country Status (1)

Country Link
CN (1) CN104156657B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462935A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Method and terminal for performing safety verification on application program in multi-operation system
CN104484596A (en) * 2015-01-07 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and terminal for creating password in multi-operation system
CN105292020A (en) * 2015-10-29 2016-02-03 东莞酷派软件技术有限公司 Vehicle control method, vehicle control device and terminal
CN105608355A (en) * 2015-07-08 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system and terminal
CN105635391A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Control method and control system for dial-up communication services, and terminal
WO2016082125A1 (en) * 2014-11-26 2016-06-02 宇龙计算机通信科技(深圳)有限公司 Multimedia file processing method, multimedia file processing apparatus and terminal
WO2016101323A1 (en) * 2014-12-25 2016-06-30 宇龙计算机通信科技(深圳)有限公司 Method, device and terminal for processing communication event of terminal
WO2016112602A1 (en) * 2015-01-16 2016-07-21 宇龙计算机通信科技(深圳)有限公司 Shortcut operation method, shortcut operation device and terminal
WO2017016033A1 (en) * 2015-07-30 2017-02-02 宇龙计算机通信科技(深圳)有限公司 Password information authentication method, password information authentication system, and terminal
WO2017028711A1 (en) * 2015-08-14 2017-02-23 华为技术有限公司 Method for processing data, wearable electronic equipment and system
CN106778110A (en) * 2016-11-29 2017-05-31 北京元心科技有限公司 Method and device for authenticating application program in multiple systems
CN107615816A (en) * 2015-04-30 2018-01-19 宇龙计算机通信科技(深圳)有限公司 Switching method, switching system and terminal between CS domains and ps domain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090167773A1 (en) * 2008-01-02 2009-07-02 Beijing Lenovo Software Ltd. CONTROL METHOD AND COMPUTER SYSTEM FOR SWITCHING DISPLAY BETWEEN OSs
CN101751519A (en) * 2008-12-09 2010-06-23 纬创资通股份有限公司 Method for improving information security of computer system and relative computer system thereof
CN102402820A (en) * 2010-09-13 2012-04-04 中国移动通信有限公司 Electronic transaction method and terminal equipment
CN103136052A (en) * 2011-11-25 2013-06-05 展讯通信(上海)有限公司 Mobile terminal and control method of mobile terminal provided with multiple operating systems

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090167773A1 (en) * 2008-01-02 2009-07-02 Beijing Lenovo Software Ltd. CONTROL METHOD AND COMPUTER SYSTEM FOR SWITCHING DISPLAY BETWEEN OSs
CN101751519A (en) * 2008-12-09 2010-06-23 纬创资通股份有限公司 Method for improving information security of computer system and relative computer system thereof
CN102402820A (en) * 2010-09-13 2012-04-04 中国移动通信有限公司 Electronic transaction method and terminal equipment
CN103136052A (en) * 2011-11-25 2013-06-05 展讯通信(上海)有限公司 Mobile terminal and control method of mobile terminal provided with multiple operating systems

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106537405A (en) * 2014-11-26 2017-03-22 宇龙计算机通信科技(深圳)有限公司 Multimedia file processing method, multimedia file processing apparatus and terminal
US10740472B2 (en) 2014-11-26 2020-08-11 Yulong Computer Telecommunication Scientific (Shenzhen) Co., Ltd. Multimedia file processing method, multimedia file processing apparatus, and computer readable storage medium
WO2016082125A1 (en) * 2014-11-26 2016-06-02 宇龙计算机通信科技(深圳)有限公司 Multimedia file processing method, multimedia file processing apparatus and terminal
CN104462935A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Method and terminal for performing safety verification on application program in multi-operation system
WO2016101323A1 (en) * 2014-12-25 2016-06-30 宇龙计算机通信科技(深圳)有限公司 Method, device and terminal for processing communication event of terminal
CN104484596A (en) * 2015-01-07 2015-04-01 宇龙计算机通信科技(深圳)有限公司 Method and terminal for creating password in multi-operation system
CN104484596B (en) * 2015-01-07 2018-02-13 宇龙计算机通信科技(深圳)有限公司 The method and terminal of password are created in multiple operating system
WO2016112602A1 (en) * 2015-01-16 2016-07-21 宇龙计算机通信科技(深圳)有限公司 Shortcut operation method, shortcut operation device and terminal
CN105635391A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Control method and control system for dial-up communication services, and terminal
CN107615816A (en) * 2015-04-30 2018-01-19 宇龙计算机通信科技(深圳)有限公司 Switching method, switching system and terminal between CS domains and ps domain
CN105608355A (en) * 2015-07-08 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system and terminal
WO2017016033A1 (en) * 2015-07-30 2017-02-02 宇龙计算机通信科技(深圳)有限公司 Password information authentication method, password information authentication system, and terminal
WO2017028711A1 (en) * 2015-08-14 2017-02-23 华为技术有限公司 Method for processing data, wearable electronic equipment and system
CN105292020A (en) * 2015-10-29 2016-02-03 东莞酷派软件技术有限公司 Vehicle control method, vehicle control device and terminal
CN106778110A (en) * 2016-11-29 2017-05-31 北京元心科技有限公司 Method and device for authenticating application program in multiple systems

Also Published As

Publication number Publication date
CN104156657B (en) 2018-04-10

Similar Documents

Publication Publication Date Title
CN104156657A (en) Information input method and information input device of terminal and terminal
KR101904338B1 (en) Method and apparatus for user authentication and human intention verification in a mobile device
EP3528160B1 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
KR20160021763A (en) User identity authenticating method, terminal, and server
CN104184738A (en) Information sharing method and information sharing device of terminal and terminal
CN104506561A (en) Terminal data access control method and device
CN106797561A (en) A kind of identity identifying method and wearable device
CN108322507B (en) Method and system for executing security operation by using security device
CN101964978B (en) Reinforcement method for strengthening safety of mobile terminal system on basis of safe TF card
CN108200037B (en) Method and system for executing security operation by using security device
CN103283268A (en) Wireless terminal and method for managing connection of network using same
CN104144411B (en) Encryption, decryption terminal and the encryption and decryption approaches applied to terminal
CN108337235B (en) Method and system for executing security operation by using security device
CN105577619B (en) Client login method, client and system
CN105592072A (en) Method for obtaining login certification in intelligent terminal, intelligent terminal and operation system thereof
CN105722084A (en) Authentication method based on embedded subscriber identity module, and terminal
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
CN105933890A (en) Embedded SIM card realizing method and system, user terminal and server
CN102402651B (en) Information protection device and method and portable terminal
CN107710673B (en) User identity authentication method and device
CN106982214A (en) A kind of cloud desktop security of use NFC technique logs in ID card and cloud desktop security login method
CN103702323A (en) Wireless information security equipment system and method
EP3422798A1 (en) Communication method and device
EP1737201A1 (en) A method for the safe protecting of the user card
CN105812338A (en) Data access management and control method and network management equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant