CN104156657B - The data inputting method of terminal, the message input device of terminal and terminal - Google Patents

The data inputting method of terminal, the message input device of terminal and terminal Download PDF

Info

Publication number
CN104156657B
CN104156657B CN201410440696.XA CN201410440696A CN104156657B CN 104156657 B CN104156657 B CN 104156657B CN 201410440696 A CN201410440696 A CN 201410440696A CN 104156657 B CN104156657 B CN 104156657B
Authority
CN
China
Prior art keywords
operating system
operation system
information
security
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410440696.XA
Other languages
Chinese (zh)
Other versions
CN104156657A (en
Inventor
岳蓬星
王振华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410440696.XA priority Critical patent/CN104156657B/en
Publication of CN104156657A publication Critical patent/CN104156657A/en
Application granted granted Critical
Publication of CN104156657B publication Critical patent/CN104156657B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The present invention proposes a kind of data inputting method of terminal, a kind of message input device of terminal and a kind of terminal, and the terminal includes multiple operating systems, wherein, described information input method includes:When detecting that any application program in any operation system receives information input request, inputted and asked according to described information, assigned operation system is selected at least one other operating system beyond any operation system in the multiple operating system;The assigned operation system is controlled to obtain the information that input is asked in described information input;The assigned operation system is controlled to send the described information got to any application program of any operation system.By technical scheme, the problem of information inputted in terminal can be intercepted by Malware, virus etc. is avoided, the information security of terminal is effectively protected, improves the personal secrets of user, enhance Consumer's Experience.

Description

The data inputting method of terminal, the message input device of terminal and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of data inputting method of terminal, a kind of terminal Message input device and a kind of terminal.
Background technology
At present, in existing dual system termi-nal, user typically directly to terminal an operating system application program The important informations such as middle input password, are received the important information by the operating system and are handled, in aforesaid operations system in itself During receiving the information of input and being handled, especially during the information of input is received, the important information of input It is easy to be obtained by Malware or virus etc., confidentiality is poor, is unfavorable for protecting the privacy of user.
Therefore, it is necessary to which a kind of new data inputting method, can input letter in application program of the user to operating system The information security of terminal is protected during breath using the other systems in terminal, turns into current urgent problem to be solved.
The content of the invention
The present invention is based on above-mentioned technical problem, it is proposed that a kind of new technical scheme, can be to operation in user The information security of terminal is protected when information is inputted in the application program of system using the other systems in terminal, avoids the information of user Leakage.
In view of this, an aspect of of the present present invention proposes a kind of data inputting method of terminal, and the terminal includes multiple Operating system, including:When detecting that any application program in any operation system receives information input request, according to institute State information input request, at least one other operation system beyond any operation system in the multiple operating system Assigned operation system is selected in system;The assigned operation system is controlled to obtain the letter that input is asked in described information input Breath;The assigned operation system is controlled to send the described information got to any application of any operation system Program.
In the technical scheme, when any operation systematic difference program receives information input request, using specified Operating system receives the information of input, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can It is considered as and receives unlocking pin input request, now, current operation system A is switched into assigned operation system B, by assigned operation System B receives the unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and by specifying behaviour Make system B to send the information of input into current operation system A Alipay program, it is possible to further set operation to be System B is only capable of being communicated with current operation system A, or sets operating system B receiving the information from current operation system A And be only capable of being communicated with current operation system A during the information is sent to current operation system A Alipay program, To protect the safety of the input information as much as possible, the personal secrets of user are improved.
In the above-mentioned technical solutions, it is preferable that described inputted according to described information is asked, from the multiple operating system Any operation system beyond at least one other operating system in select assigned operation system, specifically include:According to Described information input request, determines there is the behaviour to be selected for the authority for obtaining described information at least one other operating system Make system;And according to the select command received, the assigned operation system, or root are selected from the operating system to be selected According to the level of security of the operating system to be selected, operating system of the selection with level of security described in highest is as the specified behaviour Make system.
In the technical scheme, the information of input can only be by having beyond the current operation system in multiple operating systems The part operation system for receiving the authority of the information is grasped, and is selected by user directly in the part operation system and specified behaviour Make system, or level of security highest system is selected as assigned operation system in the part operation system.By above-mentioned Technical scheme, request can be inputted according to the information received, suitable assigned operation system is selected from other operating systems System, the security inputted with enhancement information.
In the above-mentioned technical solutions, it is preferable that described inputted according to described information is asked, from the multiple operating system Any operation system beyond at least one other operating system in select assigned operation system, including:According to reception The select command arrived, the assigned operation system is selected from least one other operating system;Or according to it is described at least The level of security of one other operating system, operating system of the selection with level of security described in highest is as the assigned operation System.
In the technical scheme, other operation systems that can be beyond the current operation system directly in multiple operating systems Assigned operation system is selected in system, level of security highest system can also be selected in other operating systems as assigned operation System.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or safest Assigned operation system, the security inputted with enhancement information.
In the above-mentioned technical solutions, it is preferable that also include:The assigned operation system is controlled to preserve described information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that the control assigned operation system obtains described information input request The information of input is asked, is specifically included:Judge whether preserve described information in the assigned operation system, wherein, when sentencing Disconnected result is that the described information of preservation is obtained when being;When judged result is no, the described information of input is obtained.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:Each operating system in the multiple operating system Authority of networking and/or networking type, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:According to each operation system accessed in the multiple operating system Verification mode during system, level of security is set for each operating system.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received Code is sent to the Alipay program in operating system B.
Another aspect of the present invention proposes a kind of message input device of terminal, and the terminal includes multiple operations and is System, including:Selecting unit, when detecting that any application program in any operation system receives information input request, root Input and ask according to described information, at least one other behaviour beyond any operation system in the multiple operating system Make to select assigned operation system in system;Control unit, the assigned operation system is controlled to obtain described information input request institute The information of input, and the control assigned operation system is asked to send the described information got to any operation system Any application program of system.
In the technical scheme, when any operation system receives information input request, connect using assigned operation system The information of input is received, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can be considered as and receive Unlocking pin input request, now, assigned operation system B is switched to by current operation system A, is received by assigned operation system B The unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and will by assigned operation system B The information of input is sent into current operation system A Alipay program, it is possible to further set operating system B be only capable of with Current operation system A is communicated, or sets operating system B receiving the information from current operation system A and believing this Cease and be only capable of being communicated with current operation system A during sending to current operation system A Alipay program, with as far as possible The safety of the input information is protected on ground, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that the selecting unit includes:Determining unit, please according to described information input Ask, determine that there is the operating system to be selected for the authority for obtaining described information at least one other operating system;First choosing Unit is selected, according to the select command received, the assigned operation system is selected from the operating system to be selected, or according to institute The level of security of operating system to be selected is stated, operating system of the selection with level of security described in highest is as the assigned operation system System;Second selecting unit, according to the select command received, described specify is selected from least one other operating system Operating system;Or the level of security according at least one other operating system, selection have level of security described in highest Operating system is as the assigned operation system.
In the technical scheme, can set input information can only by the current operation system in multiple operating systems with The outer part operation system with the authority for receiving the information is grasped, and is directly selected by user in the part operation system Determine assigned operation system, or level of security highest system is selected as assigned operation system in the part operation system. Pass through above-mentioned technical proposal, request can be inputted according to the information received, suitable finger is selected from other operating systems Determine operating system, the security inputted with enhancement information.
In the technical scheme, other beyond the current operation system directly in multiple operating systems can also be selected Assigned operation system is selected in operating system, or level of security highest system is selected as specified behaviour in other operating systems Make system.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or most safe Assigned operation system, with enhancement information input security.
In the above-mentioned technical solutions, it is preferable that described control unit is additionally operable to:The assigned operation system is controlled to preserve institute State information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that also include:Judging unit, judge whether protected in the assigned operation system There is described information;And described control unit is additionally operable to:When judged result is to be, the assigned operation system is controlled to obtain The described information of preservation;When judged result is no, the assigned operation system is controlled to obtain the described information of input.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:First setting unit, according in the multiple operating system The networking authority and/or networking type of each operating system, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:Second setting unit, according to the multiple operating system of access In each operating system when verification mode, for each operating system, level of security is set.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received Code is sent to the Alipay program in operating system B.
Another aspect of the invention proposes a kind of terminal, includes described in multiple operating systems and above-mentioned technical proposal Terminal message input device.Therefore, the terminal has the complete of the message input device of the terminal of above-mentioned technical proposal offer Portion's beneficial effect, will not be repeated here.
By above technical scheme, the information of input can be made can only be received by assigned operation system, reduce information and let out The chance of leakage, the convenience of user's operation is improved, so as to avoid operating system and/or the behaviour because of receive information input request The application program for making the input request of receive information in system it is dangerous and caused by privacy leakage, effectively protect the information of terminal Safety, improve the personal secrets of user.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of the data inputting method of terminal according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of the data inputting method of terminal according to still another embodiment of the invention;
Fig. 3 shows the schematic block diagram of the message input device of terminal according to an embodiment of the invention;
Fig. 4 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 5 shows the schematic block diagram of terminal according to still another embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of the application Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also To be different from other modes described here using other to implement, therefore, input range of the invention is not by described below Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the data inputting method of terminal according to an embodiment of the invention.
As shown in figure 1, the data inputting method of the terminal of one embodiment of the present of invention is used for having multiple operating systems Terminal, including:
Step 102, when detecting that any application program in any operation system receives information input request, according to Information input is asked, and selects to refer at least one other operating system beyond any operation system in multiple operating systems Determine operating system.
Step 104, the input of assigned operation system acquisition information is controlled to ask the information of input.
Step 106, control assigned operation system to send the information got to described in any operation system to appoint One application program.
In the technical scheme, when any operation system receives information input request, connect using assigned operation system The information of input is received, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can be considered as and receive Unlocking pin input request, now, assigned operation system B is switched to by current operation system A, is received by assigned operation system B The unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and will by assigned operation system B The information of input is sent into current operation system A Alipay program, it is possible to further set operating system B be only capable of with Current operation system A is communicated, or sets operating system B receiving the information from current operation system A and believing this Cease and be only capable of being communicated with current operation system A during sending to current operation system A Alipay program, with as far as possible The safety of the input information is protected on ground, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that in a step 102, specifically include:Inputted and asked according to information, it is determined that extremely There is the operating system to be selected for the authority for obtaining information in few other operating systems;And ordered according to the selection received Order, selects assigned operation system, or the level of security according to operating system to be selected from operating system to be selected, and selection has highest The operating system of level of security is as assigned operation system.
In the technical scheme, the information of input can only be by having beyond the current operation system in multiple operating systems The part operation system for receiving the authority of the information is grasped, and assigned operation system is selected directly in part operation system by user System, or level of security highest system is selected as assigned operation system in part operation system.Pass through above-mentioned technical proposal, Request can be inputted according to the information received, suitable assigned operation system be selected from other operating systems, with enhancing The security of information input.
In the above-mentioned technical solutions, it is preferable that in a step 102, including:According to the select command received, from least Assigned operation system is selected in one other operating system;Or the level of security according at least one other operating system, selection Operating system with highest level of security is as assigned operation system.
In the technical scheme, other operation systems that can be beyond the current operation system directly in multiple operating systems Assigned operation system is selected in system, level of security highest system can also be selected in other operating systems as assigned operation System.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or safest Assigned operation system, the security inputted with enhancement information.
In the above-mentioned technical solutions, it is preferable that also include:Assigned operation system is controlled to preserve information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that step 104 specifically includes:Judge whether preserved in assigned operation system Information, wherein, when judged result is to be, obtain the information of preservation;When judged result is no, the information of input is obtained.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:The networking of each operating system in multiple operating systems Authority and/or networking type, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:During according to accessing each operating system in multiple operating systems Verification mode, for each operating system set level of security.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received Code is sent to the Alipay program in operating system B.
Fig. 2 shows the schematic flow diagram of the data inputting method of terminal according to still another embodiment of the invention.
As shown in Fig. 2 the data inputting method of the terminal of another embodiment of the present invention is used for having system A and system B Terminal, including:
Step 202, system A receives password collection request.
Step 204, determine whether that password gathers, when judged result is to be, into step 206, work as judged result For it is no when, return to step 202, wait next time password collection request.
Step 206, system B carries out password collection, i.e. system B receives the password of input.By the password for making input system A Can only be received by system B, reduce the chance of leakage of information, so as to avoid because system A is dangerous and caused by password inputting During it is compromised, can effectively protect the information security of terminal.
Step 208, judge whether to complete password collection, when judged result is to be, into step 210, work as judged result For it is no when, return to step 206, continue by system B carry out password collection.
Step 210, collection result is sent to system A.
Fig. 3 shows the schematic block diagram of the message input device of terminal according to an embodiment of the invention.
As shown in figure 3, the message input device 300 of the terminal of one embodiment of the present of invention is used for having multiple operation systems The terminal of system, including:Selecting unit 302, when detect any application program in any operation system receive information input During request, inputted and asked according to information, at least one other operation beyond any operation system in multiple operating systems Assigned operation system is selected in system;Input is asked in control unit 304, the system acquisition information input of control assigned operation Information, and control assigned operation system the information got is sent to any application of any operation system Program.
In the technical scheme, when any operation system receives information input request, connect using assigned operation system The information of input is received, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can be considered as and receive Unlocking pin input request, now, assigned operation system B is switched to by current operation system A, is received by assigned operation system B The unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and will by assigned operation system B The information of input is sent into current operation system A Alipay program, it is possible to further set operating system B be only capable of with Current operation system A is communicated, or sets operating system B receiving the information from current operation system A and believing this Cease and be only capable of being communicated with current operation system A during sending to current operation system A Alipay program, with as far as possible The safety of the input information is protected on ground, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that selecting unit 302 includes:Determining unit 3022, please according to information input Ask, determine that there is the operating system to be selected for the authority for obtaining information at least one other operating system;First choice unit 3024, according to the select command received, assigned operation system is selected from operating system to be selected, or according to operating system to be selected Level of security, selection with highest level of security operating system as assigned operation system;Second selecting unit 3026, root According to the select command received, assigned operation system is selected from least one other operating system;Or according to it is at least one its The level of security of his operating system, operating system of the selection with highest level of security is as assigned operation system.
In the technical scheme, can set input information can only by the current operation system in multiple operating systems with The outer part operation system with the authority for receiving the information is grasped, and is selected and referred to directly in part operation system by user Determine operating system, or level of security highest system is selected as assigned operation system in part operation system.By above-mentioned Technical scheme, request can be inputted according to the information received, suitable assigned operation system is selected from other operating systems System, the security inputted with enhancement information.
In the technical scheme, other beyond the current operation system directly in multiple operating systems can also be selected Assigned operation system is selected in operating system, or level of security highest system is selected as specified behaviour in other operating systems Make system.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or most safe Assigned operation system, with enhancement information input security.
In the above-mentioned technical solutions, it is preferable that control unit 304 is additionally operable to:Assigned operation system is controlled to preserve information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that also include:Judging unit 306, judge whether preserved in assigned operation system There is information;And control unit 304 is additionally operable to:When judged result for when being, control assigned operation system obtains the information preserved; When judged result is no, control assigned operation system obtains the information of input.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:First setting unit 308, it is every in multiple operating systems The networking authority and/or networking type of individual operating system, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:Second setting unit 310, according in the multiple operating systems of access Each operating system when verification mode, for each operating system set level of security.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received Code is sent to the Alipay program in operating system B.
Fig. 4 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in figure 4, the terminal 400 of one embodiment of the present of invention includes:Multiple operating system 402 and information input dresses Put 404 (equivalent to the message input devices 300 of the terminal in the embodiment shown in Fig. 3).
Wherein, the application program that message input device 404 is used in any operating system receives information input request When, control assigned operation system receives the information of input, and any behaviour will be sent to the result of the information of input Make the application program in system.Such as when user opens mobile-phone payment treasured unlock interface, you can be considered as and receive unblock Password Input is asked, and now, the current any operation system is switched to assigned operation system by message input device 404, The unlocking pin of user's input is received by assigned operation system, and unlocking pin is sent to the institute in any operation system Application program is stated, so as to avoid the password of user from being leaked by current operation system.
Pass through above-mentioned technical proposal, makes the information of input can only be received by assigned operation system, reduces leakage of information Chance, so as to avoid receive information input request in operating system and/or operating system because of receive information input request Application program it is dangerous and caused by privacy leakage, can effectively protect the information security of terminal, improve the privacy of user Safety.
Fig. 5 shows the schematic block diagram of terminal according to still another embodiment of the invention.
As shown in figure 5, terminal 500 according to still another embodiment of the invention is system A and system B structures by two systems Into.Wherein, system A is in general operating system, and system B is the system with input information protection function, for processing system A The Password Input request received, the password of input is received, and the password that can be received is sent to system A.
Therefore, password can only input in systemb, without bringing virus etc. into because installing Malware by mistake in system A Reason causes the password in cryptographic processes are inputted to be intercepted by other people, so, reduces the chance of password leakage, is effectively protected The information security of terminal.
In the present invention, term " first ", " second " are only used for the purpose described, and it is not intended that instruction or hint phase To importance.For the ordinary skill in the art, above-mentioned term can be understood as the case may be in the present invention Concrete meaning.
Technical scheme is described in detail above in association with accompanying drawing, by technical scheme, can make defeated The information entered can only be received by assigned operation system, reduce the chance of leakage of information, improve the convenience of user's operation, from And avoid the application program of receive information input request in operating system and/or operating system because of receive information input request It is dangerous and caused by privacy leakage, effectively protect the information security of terminal, improve the personal secrets of user.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should be included within the input range of the present invention.

Claims (7)

1. a kind of data inputting method of terminal, the terminal includes multiple operating systems, it is characterised in that including:
When detecting that any application program in any operation system receives information input request, inputted according to described information Ask, select to refer at least one other operating system beyond any operation system in the multiple operating system Determine operating system;
The assigned operation system is controlled to obtain the information that input is asked in described information input;
Control the assigned operation system by the described information got send to any operation system it is described it is any should Use program;
Described inputted according to described information is asked, beyond any operation system in the multiple operating system at least Assigned operation system is selected in one other operating system, specifically includes first way and the second way:
First way:Inputted and asked according to described information, determine that there is acquisition institute at least one other operating system State the operating system to be selected of the authority of information;And
According to the select command received, the assigned operation system is selected from the operating system to be selected, or according to described The level of security of operating system to be selected, operating system of the selection with level of security described in highest is as the assigned operation system System;
The second way:According to the select command received, described specify is selected from least one other operating system Operating system;Or
According to the level of security of at least one other operating system, operating system of the selection with level of security described in highest As the assigned operation system.
2. the data inputting method of terminal according to claim 1, it is characterised in that also include:
The networking authority and/or networking type of each operating system in the multiple operating system, for each behaviour Make system and level of security is set.
3. the data inputting method of terminal according to claim 1, it is characterised in that also include:
According to verification mode when accessing each operating system in the multiple operating system, set for each operating system Put level of security.
4. a kind of message input device of terminal, the terminal includes multiple operating systems, it is characterised in that including:
Selecting unit, when detecting that any application program in any operation system receives information input request, according to institute State information input request, at least one other operation system beyond any operation system in the multiple operating system Assigned operation system is selected in system;
Control unit, the assigned operation system is controlled to obtain the information that input is asked in described information input, and control The assigned operation system is made to send the described information got to any application program of any operation system;
The selecting unit includes:
Determining unit, inputted and asked according to described information, determine have at least one other operating system described in acquisition The operating system to be selected of the authority of information;
First choice unit, according to the select command received, the assigned operation system is selected from the operating system to be selected System, or the level of security according to the operating system to be selected, operating system of the selection with level of security described in highest is as institute State assigned operation system;
Second selecting unit, according to the select command received, the finger is selected from least one other operating system Determine operating system;Or the level of security according at least one other operating system, selection have level of security described in highest Operating system as the assigned operation system.
5. the message input device of terminal according to claim 4, it is characterised in that also include:
First setting unit, the networking authority and/or networking type of each operating system in the multiple operating system, For each operating system, level of security is set.
6. the message input device of terminal according to claim 4, it is characterised in that also include:
Second setting unit, it is described according to verification mode when accessing each operating system in the multiple operating system Each operating system sets level of security.
A kind of 7. terminal, it is characterised in that including:
Multiple operating systems;And
The message input device of terminal as any one of claim 4 to 6.
CN201410440696.XA 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal Active CN104156657B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410440696.XA CN104156657B (en) 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410440696.XA CN104156657B (en) 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal

Publications (2)

Publication Number Publication Date
CN104156657A CN104156657A (en) 2014-11-19
CN104156657B true CN104156657B (en) 2018-04-10

Family

ID=51882154

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410440696.XA Active CN104156657B (en) 2014-09-01 2014-09-01 The data inputting method of terminal, the message input device of terminal and terminal

Country Status (1)

Country Link
CN (1) CN104156657B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016082125A1 (en) 2014-11-26 2016-06-02 宇龙计算机通信科技(深圳)有限公司 Multimedia file processing method, multimedia file processing apparatus and terminal
CN104462935B (en) * 2014-12-24 2018-01-09 宇龙计算机通信科技(深圳)有限公司 The safe verification method and terminal of application program in multiple operating system
CN104506726B (en) * 2014-12-25 2017-07-14 宇龙计算机通信科技(深圳)有限公司 Processing method, processing unit and terminal for the communication event of terminal
CN104484596B (en) * 2015-01-07 2018-02-13 宇龙计算机通信科技(深圳)有限公司 The method and terminal of password are created in multiple operating system
CN104536823B (en) * 2015-01-16 2018-08-24 宇龙计算机通信科技(深圳)有限公司 Shortcut operation method, prompt operation device and terminal
CN105635391A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Control method and control system for dial-up communication services, and terminal
CN107615816B (en) * 2015-04-30 2020-12-22 宇龙计算机通信科技(深圳)有限公司 Switching method, switching system and terminal between CS domain and PS domain
CN105608355A (en) * 2015-07-08 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Biological information verification method, biological information verification system and terminal
CN105608358A (en) * 2015-07-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Password information verification method, password information verification system and terminal
CN106611310B (en) * 2015-08-14 2020-12-08 华为终端有限公司 Data processing method, wearable electronic device and system
CN105292020B (en) * 2015-10-29 2018-02-13 东莞酷派软件技术有限公司 Control method for vehicle, controller of vehicle and terminal
CN106778110A (en) * 2016-11-29 2017-05-31 北京元心科技有限公司 Method and device for authenticating application program in multiple systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751519A (en) * 2008-12-09 2010-06-23 纬创资通股份有限公司 Method for improving information security of computer system and relative computer system thereof
CN102402820A (en) * 2010-09-13 2012-04-04 中国移动通信有限公司 Electronic transaction method and terminal equipment
CN103136052A (en) * 2011-11-25 2013-06-05 展讯通信(上海)有限公司 Mobile terminal and control method of mobile terminal provided with multiple operating systems

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101477476B (en) * 2008-01-02 2012-02-29 联想(北京)有限公司 Control method and computer system for switching display between multi-operating system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751519A (en) * 2008-12-09 2010-06-23 纬创资通股份有限公司 Method for improving information security of computer system and relative computer system thereof
CN102402820A (en) * 2010-09-13 2012-04-04 中国移动通信有限公司 Electronic transaction method and terminal equipment
CN103136052A (en) * 2011-11-25 2013-06-05 展讯通信(上海)有限公司 Mobile terminal and control method of mobile terminal provided with multiple operating systems

Also Published As

Publication number Publication date
CN104156657A (en) 2014-11-19

Similar Documents

Publication Publication Date Title
CN104156657B (en) The data inputting method of terminal, the message input device of terminal and terminal
EP2562673B1 (en) Apparatus and method for securing mobile terminal
US11100202B2 (en) Fingerprint recognition method and device for touch screen, and touch screen
CN104794402B (en) system switching method, system switching device and terminal
WO2016015448A1 (en) Multi-system entering method, apparatus and terminal
CN103813334A (en) Right control method and right control device
KR20140128462A (en) Login method and device, terminal and network server
CN104797003B (en) A kind of method and device for switching intelligent terminal user
US20150235164A1 (en) Role-Based Control of Incident Response in a Secure Collaborative Environment
KR20160021763A (en) User identity authenticating method, terminal, and server
KR101101797B1 (en) Wireless terminal and method for managing network connection using the same
EP3422798B1 (en) Communication methods and devices for direct communication
EP3352528A1 (en) Remote control method and apparatus and mobile terminal
EP2492819A1 (en) Method and apparatus for protecting information based on data card
CN105549786A (en) System switching method and device based on pressure touch control and terminal
CN106211164A (en) Terminal network changing method, terminal network switching device and terminal
CN105046135A (en) Information display method, information display apparatus and terminal
CN106204003B (en) Method, device and system for safely transferring virtual resources
CN106231534A (en) Mobile terminal and the number of writing thereof and method of disannuling a call, device
CN106097500B (en) A kind of method and system for responding user and entering
KR20070037541A (en) Mobile communication terminal, control method thereof, and method for controlling a mobile communication service
CN105025548B (en) A kind of the connection control method and device of SIM card
CN105635090B (en) System access method, system access mechanism and terminal
CN104902480A (en) Smartphone WIFI grading management method
CN104486506B (en) System loads method, system loads device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant