CN104156657B - The data inputting method of terminal, the message input device of terminal and terminal - Google Patents
The data inputting method of terminal, the message input device of terminal and terminal Download PDFInfo
- Publication number
- CN104156657B CN104156657B CN201410440696.XA CN201410440696A CN104156657B CN 104156657 B CN104156657 B CN 104156657B CN 201410440696 A CN201410440696 A CN 201410440696A CN 104156657 B CN104156657 B CN 104156657B
- Authority
- CN
- China
- Prior art keywords
- operating system
- operation system
- information
- security
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Telephonic Communication Services (AREA)
- Selective Calling Equipment (AREA)
Abstract
The present invention proposes a kind of data inputting method of terminal, a kind of message input device of terminal and a kind of terminal, and the terminal includes multiple operating systems, wherein, described information input method includes:When detecting that any application program in any operation system receives information input request, inputted and asked according to described information, assigned operation system is selected at least one other operating system beyond any operation system in the multiple operating system;The assigned operation system is controlled to obtain the information that input is asked in described information input;The assigned operation system is controlled to send the described information got to any application program of any operation system.By technical scheme, the problem of information inputted in terminal can be intercepted by Malware, virus etc. is avoided, the information security of terminal is effectively protected, improves the personal secrets of user, enhance Consumer's Experience.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of data inputting method of terminal, a kind of terminal
Message input device and a kind of terminal.
Background technology
At present, in existing dual system termi-nal, user typically directly to terminal an operating system application program
The important informations such as middle input password, are received the important information by the operating system and are handled, in aforesaid operations system in itself
During receiving the information of input and being handled, especially during the information of input is received, the important information of input
It is easy to be obtained by Malware or virus etc., confidentiality is poor, is unfavorable for protecting the privacy of user.
Therefore, it is necessary to which a kind of new data inputting method, can input letter in application program of the user to operating system
The information security of terminal is protected during breath using the other systems in terminal, turns into current urgent problem to be solved.
The content of the invention
The present invention is based on above-mentioned technical problem, it is proposed that a kind of new technical scheme, can be to operation in user
The information security of terminal is protected when information is inputted in the application program of system using the other systems in terminal, avoids the information of user
Leakage.
In view of this, an aspect of of the present present invention proposes a kind of data inputting method of terminal, and the terminal includes multiple
Operating system, including:When detecting that any application program in any operation system receives information input request, according to institute
State information input request, at least one other operation system beyond any operation system in the multiple operating system
Assigned operation system is selected in system;The assigned operation system is controlled to obtain the letter that input is asked in described information input
Breath;The assigned operation system is controlled to send the described information got to any application of any operation system
Program.
In the technical scheme, when any operation systematic difference program receives information input request, using specified
Operating system receives the information of input, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can
It is considered as and receives unlocking pin input request, now, current operation system A is switched into assigned operation system B, by assigned operation
System B receives the unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and by specifying behaviour
Make system B to send the information of input into current operation system A Alipay program, it is possible to further set operation to be
System B is only capable of being communicated with current operation system A, or sets operating system B receiving the information from current operation system A
And be only capable of being communicated with current operation system A during the information is sent to current operation system A Alipay program,
To protect the safety of the input information as much as possible, the personal secrets of user are improved.
In the above-mentioned technical solutions, it is preferable that described inputted according to described information is asked, from the multiple operating system
Any operation system beyond at least one other operating system in select assigned operation system, specifically include:According to
Described information input request, determines there is the behaviour to be selected for the authority for obtaining described information at least one other operating system
Make system;And according to the select command received, the assigned operation system, or root are selected from the operating system to be selected
According to the level of security of the operating system to be selected, operating system of the selection with level of security described in highest is as the specified behaviour
Make system.
In the technical scheme, the information of input can only be by having beyond the current operation system in multiple operating systems
The part operation system for receiving the authority of the information is grasped, and is selected by user directly in the part operation system and specified behaviour
Make system, or level of security highest system is selected as assigned operation system in the part operation system.By above-mentioned
Technical scheme, request can be inputted according to the information received, suitable assigned operation system is selected from other operating systems
System, the security inputted with enhancement information.
In the above-mentioned technical solutions, it is preferable that described inputted according to described information is asked, from the multiple operating system
Any operation system beyond at least one other operating system in select assigned operation system, including:According to reception
The select command arrived, the assigned operation system is selected from least one other operating system;Or according to it is described at least
The level of security of one other operating system, operating system of the selection with level of security described in highest is as the assigned operation
System.
In the technical scheme, other operation systems that can be beyond the current operation system directly in multiple operating systems
Assigned operation system is selected in system, level of security highest system can also be selected in other operating systems as assigned operation
System.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or safest
Assigned operation system, the security inputted with enhancement information.
In the above-mentioned technical solutions, it is preferable that also include:The assigned operation system is controlled to preserve described information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that the control assigned operation system obtains described information input request
The information of input is asked, is specifically included:Judge whether preserve described information in the assigned operation system, wherein, when sentencing
Disconnected result is that the described information of preservation is obtained when being;When judged result is no, the described information of input is obtained.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time
When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection
Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:Each operating system in the multiple operating system
Authority of networking and/or networking type, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme
System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining
The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated
System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system
System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks
For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when
When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system
To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:According to each operation system accessed in the multiple operating system
Verification mode during system, level of security is set for each operating system.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour
Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation
System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C
When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B
Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close
During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received
Code is sent to the Alipay program in operating system B.
Another aspect of the present invention proposes a kind of message input device of terminal, and the terminal includes multiple operations and is
System, including:Selecting unit, when detecting that any application program in any operation system receives information input request, root
Input and ask according to described information, at least one other behaviour beyond any operation system in the multiple operating system
Make to select assigned operation system in system;Control unit, the assigned operation system is controlled to obtain described information input request institute
The information of input, and the control assigned operation system is asked to send the described information got to any operation system
Any application program of system.
In the technical scheme, when any operation system receives information input request, connect using assigned operation system
The information of input is received, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can be considered as and receive
Unlocking pin input request, now, assigned operation system B is switched to by current operation system A, is received by assigned operation system B
The unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and will by assigned operation system B
The information of input is sent into current operation system A Alipay program, it is possible to further set operating system B be only capable of with
Current operation system A is communicated, or sets operating system B receiving the information from current operation system A and believing this
Cease and be only capable of being communicated with current operation system A during sending to current operation system A Alipay program, with as far as possible
The safety of the input information is protected on ground, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that the selecting unit includes:Determining unit, please according to described information input
Ask, determine that there is the operating system to be selected for the authority for obtaining described information at least one other operating system;First choosing
Unit is selected, according to the select command received, the assigned operation system is selected from the operating system to be selected, or according to institute
The level of security of operating system to be selected is stated, operating system of the selection with level of security described in highest is as the assigned operation system
System;Second selecting unit, according to the select command received, described specify is selected from least one other operating system
Operating system;Or the level of security according at least one other operating system, selection have level of security described in highest
Operating system is as the assigned operation system.
In the technical scheme, can set input information can only by the current operation system in multiple operating systems with
The outer part operation system with the authority for receiving the information is grasped, and is directly selected by user in the part operation system
Determine assigned operation system, or level of security highest system is selected as assigned operation system in the part operation system.
Pass through above-mentioned technical proposal, request can be inputted according to the information received, suitable finger is selected from other operating systems
Determine operating system, the security inputted with enhancement information.
In the technical scheme, other beyond the current operation system directly in multiple operating systems can also be selected
Assigned operation system is selected in operating system, or level of security highest system is selected as specified behaviour in other operating systems
Make system.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or most safe
Assigned operation system, with enhancement information input security.
In the above-mentioned technical solutions, it is preferable that described control unit is additionally operable to:The assigned operation system is controlled to preserve institute
State information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that also include:Judging unit, judge whether protected in the assigned operation system
There is described information;And described control unit is additionally operable to:When judged result is to be, the assigned operation system is controlled to obtain
The described information of preservation;When judged result is no, the assigned operation system is controlled to obtain the described information of input.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time
When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection
Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:First setting unit, according in the multiple operating system
The networking authority and/or networking type of each operating system, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme
System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining
The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated
System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system
System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks
For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when
When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system
To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:Second setting unit, according to the multiple operating system of access
In each operating system when verification mode, for each operating system, level of security is set.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour
Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation
System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C
When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B
Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close
During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received
Code is sent to the Alipay program in operating system B.
Another aspect of the invention proposes a kind of terminal, includes described in multiple operating systems and above-mentioned technical proposal
Terminal message input device.Therefore, the terminal has the complete of the message input device of the terminal of above-mentioned technical proposal offer
Portion's beneficial effect, will not be repeated here.
By above technical scheme, the information of input can be made can only be received by assigned operation system, reduce information and let out
The chance of leakage, the convenience of user's operation is improved, so as to avoid operating system and/or the behaviour because of receive information input request
The application program for making the input request of receive information in system it is dangerous and caused by privacy leakage, effectively protect the information of terminal
Safety, improve the personal secrets of user.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of the data inputting method of terminal according to an embodiment of the invention;
Fig. 2 shows the schematic flow diagram of the data inputting method of terminal according to still another embodiment of the invention;
Fig. 3 shows the schematic block diagram of the message input device of terminal according to an embodiment of the invention;
Fig. 4 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 5 shows the schematic block diagram of terminal according to still another embodiment of the invention.
Embodiment
It is below in conjunction with the accompanying drawings and specific real in order to be more clearly understood that the above objects, features and advantages of the present invention
Mode is applied the present invention is further described in detail.It should be noted that in the case where not conflicting, the implementation of the application
Feature in example and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, the present invention may be used also
To be different from other modes described here using other to implement, therefore, input range of the invention is not by described below
Specific embodiment limitation.
Fig. 1 shows the schematic flow diagram of the data inputting method of terminal according to an embodiment of the invention.
As shown in figure 1, the data inputting method of the terminal of one embodiment of the present of invention is used for having multiple operating systems
Terminal, including:
Step 102, when detecting that any application program in any operation system receives information input request, according to
Information input is asked, and selects to refer at least one other operating system beyond any operation system in multiple operating systems
Determine operating system.
Step 104, the input of assigned operation system acquisition information is controlled to ask the information of input.
Step 106, control assigned operation system to send the information got to described in any operation system to appoint
One application program.
In the technical scheme, when any operation system receives information input request, connect using assigned operation system
The information of input is received, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can be considered as and receive
Unlocking pin input request, now, assigned operation system B is switched to by current operation system A, is received by assigned operation system B
The unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and will by assigned operation system B
The information of input is sent into current operation system A Alipay program, it is possible to further set operating system B be only capable of with
Current operation system A is communicated, or sets operating system B receiving the information from current operation system A and believing this
Cease and be only capable of being communicated with current operation system A during sending to current operation system A Alipay program, with as far as possible
The safety of the input information is protected on ground, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that in a step 102, specifically include:Inputted and asked according to information, it is determined that extremely
There is the operating system to be selected for the authority for obtaining information in few other operating systems;And ordered according to the selection received
Order, selects assigned operation system, or the level of security according to operating system to be selected from operating system to be selected, and selection has highest
The operating system of level of security is as assigned operation system.
In the technical scheme, the information of input can only be by having beyond the current operation system in multiple operating systems
The part operation system for receiving the authority of the information is grasped, and assigned operation system is selected directly in part operation system by user
System, or level of security highest system is selected as assigned operation system in part operation system.Pass through above-mentioned technical proposal,
Request can be inputted according to the information received, suitable assigned operation system be selected from other operating systems, with enhancing
The security of information input.
In the above-mentioned technical solutions, it is preferable that in a step 102, including:According to the select command received, from least
Assigned operation system is selected in one other operating system;Or the level of security according at least one other operating system, selection
Operating system with highest level of security is as assigned operation system.
In the technical scheme, other operation systems that can be beyond the current operation system directly in multiple operating systems
Assigned operation system is selected in system, level of security highest system can also be selected in other operating systems as assigned operation
System.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or safest
Assigned operation system, the security inputted with enhancement information.
In the above-mentioned technical solutions, it is preferable that also include:Assigned operation system is controlled to preserve information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that step 104 specifically includes:Judge whether preserved in assigned operation system
Information, wherein, when judged result is to be, obtain the information of preservation;When judged result is no, the information of input is obtained.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time
When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection
Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:The networking of each operating system in multiple operating systems
Authority and/or networking type, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme
System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining
The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated
System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system
System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks
For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when
When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system
To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:During according to accessing each operating system in multiple operating systems
Verification mode, for each operating system set level of security.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour
Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation
System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C
When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B
Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close
During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received
Code is sent to the Alipay program in operating system B.
Fig. 2 shows the schematic flow diagram of the data inputting method of terminal according to still another embodiment of the invention.
As shown in Fig. 2 the data inputting method of the terminal of another embodiment of the present invention is used for having system A and system B
Terminal, including:
Step 202, system A receives password collection request.
Step 204, determine whether that password gathers, when judged result is to be, into step 206, work as judged result
For it is no when, return to step 202, wait next time password collection request.
Step 206, system B carries out password collection, i.e. system B receives the password of input.By the password for making input system A
Can only be received by system B, reduce the chance of leakage of information, so as to avoid because system A is dangerous and caused by password inputting
During it is compromised, can effectively protect the information security of terminal.
Step 208, judge whether to complete password collection, when judged result is to be, into step 210, work as judged result
For it is no when, return to step 206, continue by system B carry out password collection.
Step 210, collection result is sent to system A.
Fig. 3 shows the schematic block diagram of the message input device of terminal according to an embodiment of the invention.
As shown in figure 3, the message input device 300 of the terminal of one embodiment of the present of invention is used for having multiple operation systems
The terminal of system, including:Selecting unit 302, when detect any application program in any operation system receive information input
During request, inputted and asked according to information, at least one other operation beyond any operation system in multiple operating systems
Assigned operation system is selected in system;Input is asked in control unit 304, the system acquisition information input of control assigned operation
Information, and control assigned operation system the information got is sent to any application of any operation system
Program.
In the technical scheme, when any operation system receives information input request, connect using assigned operation system
The information of input is received, such as, when user opens operating system A Alipay unlock interface in mobile phone, you can be considered as and receive
Unlocking pin input request, now, assigned operation system B is switched to by current operation system A, is received by assigned operation system B
The unlocking pin of user's input, so as to avoid the password of user from being leaked by current operation system A, and will by assigned operation system B
The information of input is sent into current operation system A Alipay program, it is possible to further set operating system B be only capable of with
Current operation system A is communicated, or sets operating system B receiving the information from current operation system A and believing this
Cease and be only capable of being communicated with current operation system A during sending to current operation system A Alipay program, with as far as possible
The safety of the input information is protected on ground, improves the personal secrets of user.
In the above-mentioned technical solutions, it is preferable that selecting unit 302 includes:Determining unit 3022, please according to information input
Ask, determine that there is the operating system to be selected for the authority for obtaining information at least one other operating system;First choice unit
3024, according to the select command received, assigned operation system is selected from operating system to be selected, or according to operating system to be selected
Level of security, selection with highest level of security operating system as assigned operation system;Second selecting unit 3026, root
According to the select command received, assigned operation system is selected from least one other operating system;Or according to it is at least one its
The level of security of his operating system, operating system of the selection with highest level of security is as assigned operation system.
In the technical scheme, can set input information can only by the current operation system in multiple operating systems with
The outer part operation system with the authority for receiving the information is grasped, and is selected and referred to directly in part operation system by user
Determine operating system, or level of security highest system is selected as assigned operation system in part operation system.By above-mentioned
Technical scheme, request can be inputted according to the information received, suitable assigned operation system is selected from other operating systems
System, the security inputted with enhancement information.
In the technical scheme, other beyond the current operation system directly in multiple operating systems can also be selected
Assigned operation system is selected in operating system, or level of security highest system is selected as specified behaviour in other operating systems
Make system.Pass through above-mentioned technical proposal, it can be selected according to the demand of user or according to level of security most suitable or most safe
Assigned operation system, with enhancement information input security.
In the above-mentioned technical solutions, it is preferable that control unit 304 is additionally operable to:Assigned operation system is controlled to preserve information.
In the technical scheme, the input information received can be saved, to facilitate next calling.
In the above-mentioned technical solutions, it is preferable that also include:Judging unit 306, judge whether preserved in assigned operation system
There is information;And control unit 304 is additionally operable to:When judged result for when being, control assigned operation system obtains the information preserved;
When judged result is no, control assigned operation system obtains the information of input.
In the technical scheme, due to having controlled assigned operation system to preserve the information inputted, it can be received in next time
When inputting request to identical information, identical result is can be obtained by without inputting the information again, is inputted in protection
Information it is safe while, improve user operation convenience.
In the above-mentioned technical solutions, it is preferable that also include:First setting unit 308, it is every in multiple operating systems
The networking authority and/or networking type of individual operating system, level of security is set for each operating system.
Can be each operation according to the networking authority and/or networking type of each operating system in the technical scheme
System sets level of security respectively, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, operating system A is to forbid joining
The security system of net, it can only be communicated with operating system B and C, operating system B is the conventional system that can only connect 2G networks, is operated
System C is that can connect 3G network, 4G networks and the multifunction system that can use Bluetooth function, it follows that operation system
System A security highest, and operating system C can then be set operation by wooden horse or the possibility highest of malware attacks
For system A level of security to be advanced, operating system B level of security is middle rank, operating system C level of security be it is rudimentary, when
When Alipay program in operating system B receives Password Input request, prioritizing selection operating system A is as assigned operation system
To receive the password of input, and the password received is sent to the Alipay program in operating system B.
In the above-mentioned technical solutions, it is preferable that also include:Second setting unit 310, according in the multiple operating systems of access
Each operating system when verification mode, for each operating system set level of security.
In the technical scheme, verification mode when each operating system can also be accessed according to user is respectively each behaviour
Make system and level of security is set, such as, there are tri- operating systems of A, B, C in mobile phone, wherein, user can directly access operation
System A is without any checking, and user needs to input password when accessing operating system B, and user is accessing operating system C
When need first to input password and carry out fingerprint authentication again, then the level of security that can set operating system A is rudimentary, operating system B
Level of security be middle rank, operating system C level of security is advanced.When the Alipay program in operating system B receive it is close
During code input request, prioritizing selection operating system C receives the password of input as assigned operation system, and close by what is received
Code is sent to the Alipay program in operating system B.
Fig. 4 shows the schematic block diagram of terminal according to an embodiment of the invention.
As shown in figure 4, the terminal 400 of one embodiment of the present of invention includes:Multiple operating system 402 and information input dresses
Put 404 (equivalent to the message input devices 300 of the terminal in the embodiment shown in Fig. 3).
Wherein, the application program that message input device 404 is used in any operating system receives information input request
When, control assigned operation system receives the information of input, and any behaviour will be sent to the result of the information of input
Make the application program in system.Such as when user opens mobile-phone payment treasured unlock interface, you can be considered as and receive unblock
Password Input is asked, and now, the current any operation system is switched to assigned operation system by message input device 404,
The unlocking pin of user's input is received by assigned operation system, and unlocking pin is sent to the institute in any operation system
Application program is stated, so as to avoid the password of user from being leaked by current operation system.
Pass through above-mentioned technical proposal, makes the information of input can only be received by assigned operation system, reduces leakage of information
Chance, so as to avoid receive information input request in operating system and/or operating system because of receive information input request
Application program it is dangerous and caused by privacy leakage, can effectively protect the information security of terminal, improve the privacy of user
Safety.
Fig. 5 shows the schematic block diagram of terminal according to still another embodiment of the invention.
As shown in figure 5, terminal 500 according to still another embodiment of the invention is system A and system B structures by two systems
Into.Wherein, system A is in general operating system, and system B is the system with input information protection function, for processing system A
The Password Input request received, the password of input is received, and the password that can be received is sent to system A.
Therefore, password can only input in systemb, without bringing virus etc. into because installing Malware by mistake in system A
Reason causes the password in cryptographic processes are inputted to be intercepted by other people, so, reduces the chance of password leakage, is effectively protected
The information security of terminal.
In the present invention, term " first ", " second " are only used for the purpose described, and it is not intended that instruction or hint phase
To importance.For the ordinary skill in the art, above-mentioned term can be understood as the case may be in the present invention
Concrete meaning.
Technical scheme is described in detail above in association with accompanying drawing, by technical scheme, can make defeated
The information entered can only be received by assigned operation system, reduce the chance of leakage of information, improve the convenience of user's operation, from
And avoid the application program of receive information input request in operating system and/or operating system because of receive information input request
It is dangerous and caused by privacy leakage, effectively protect the information security of terminal, improve the personal secrets of user.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.Within the spirit and principles of the invention, that is made any repaiies
Change, equivalent substitution, improvement etc., should be included within the input range of the present invention.
Claims (7)
1. a kind of data inputting method of terminal, the terminal includes multiple operating systems, it is characterised in that including:
When detecting that any application program in any operation system receives information input request, inputted according to described information
Ask, select to refer at least one other operating system beyond any operation system in the multiple operating system
Determine operating system;
The assigned operation system is controlled to obtain the information that input is asked in described information input;
Control the assigned operation system by the described information got send to any operation system it is described it is any should
Use program;
Described inputted according to described information is asked, beyond any operation system in the multiple operating system at least
Assigned operation system is selected in one other operating system, specifically includes first way and the second way:
First way:Inputted and asked according to described information, determine that there is acquisition institute at least one other operating system
State the operating system to be selected of the authority of information;And
According to the select command received, the assigned operation system is selected from the operating system to be selected, or according to described
The level of security of operating system to be selected, operating system of the selection with level of security described in highest is as the assigned operation system
System;
The second way:According to the select command received, described specify is selected from least one other operating system
Operating system;Or
According to the level of security of at least one other operating system, operating system of the selection with level of security described in highest
As the assigned operation system.
2. the data inputting method of terminal according to claim 1, it is characterised in that also include:
The networking authority and/or networking type of each operating system in the multiple operating system, for each behaviour
Make system and level of security is set.
3. the data inputting method of terminal according to claim 1, it is characterised in that also include:
According to verification mode when accessing each operating system in the multiple operating system, set for each operating system
Put level of security.
4. a kind of message input device of terminal, the terminal includes multiple operating systems, it is characterised in that including:
Selecting unit, when detecting that any application program in any operation system receives information input request, according to institute
State information input request, at least one other operation system beyond any operation system in the multiple operating system
Assigned operation system is selected in system;
Control unit, the assigned operation system is controlled to obtain the information that input is asked in described information input, and control
The assigned operation system is made to send the described information got to any application program of any operation system;
The selecting unit includes:
Determining unit, inputted and asked according to described information, determine have at least one other operating system described in acquisition
The operating system to be selected of the authority of information;
First choice unit, according to the select command received, the assigned operation system is selected from the operating system to be selected
System, or the level of security according to the operating system to be selected, operating system of the selection with level of security described in highest is as institute
State assigned operation system;
Second selecting unit, according to the select command received, the finger is selected from least one other operating system
Determine operating system;Or the level of security according at least one other operating system, selection have level of security described in highest
Operating system as the assigned operation system.
5. the message input device of terminal according to claim 4, it is characterised in that also include:
First setting unit, the networking authority and/or networking type of each operating system in the multiple operating system,
For each operating system, level of security is set.
6. the message input device of terminal according to claim 4, it is characterised in that also include:
Second setting unit, it is described according to verification mode when accessing each operating system in the multiple operating system
Each operating system sets level of security.
A kind of 7. terminal, it is characterised in that including:
Multiple operating systems;And
The message input device of terminal as any one of claim 4 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410440696.XA CN104156657B (en) | 2014-09-01 | 2014-09-01 | The data inputting method of terminal, the message input device of terminal and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410440696.XA CN104156657B (en) | 2014-09-01 | 2014-09-01 | The data inputting method of terminal, the message input device of terminal and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104156657A CN104156657A (en) | 2014-11-19 |
CN104156657B true CN104156657B (en) | 2018-04-10 |
Family
ID=51882154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410440696.XA Active CN104156657B (en) | 2014-09-01 | 2014-09-01 | The data inputting method of terminal, the message input device of terminal and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104156657B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016082125A1 (en) | 2014-11-26 | 2016-06-02 | 宇龙计算机通信科技(深圳)有限公司 | Multimedia file processing method, multimedia file processing apparatus and terminal |
CN104462935B (en) * | 2014-12-24 | 2018-01-09 | 宇龙计算机通信科技(深圳)有限公司 | The safe verification method and terminal of application program in multiple operating system |
CN104506726B (en) * | 2014-12-25 | 2017-07-14 | 宇龙计算机通信科技(深圳)有限公司 | Processing method, processing unit and terminal for the communication event of terminal |
CN104484596B (en) * | 2015-01-07 | 2018-02-13 | 宇龙计算机通信科技(深圳)有限公司 | The method and terminal of password are created in multiple operating system |
CN104536823B (en) * | 2015-01-16 | 2018-08-24 | 宇龙计算机通信科技(深圳)有限公司 | Shortcut operation method, prompt operation device and terminal |
CN105635391A (en) * | 2015-04-24 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Control method and control system for dial-up communication services, and terminal |
CN107615816B (en) * | 2015-04-30 | 2020-12-22 | 宇龙计算机通信科技(深圳)有限公司 | Switching method, switching system and terminal between CS domain and PS domain |
CN105608355A (en) * | 2015-07-08 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Biological information verification method, biological information verification system and terminal |
CN105608358A (en) * | 2015-07-30 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Password information verification method, password information verification system and terminal |
CN106611310B (en) * | 2015-08-14 | 2020-12-08 | 华为终端有限公司 | Data processing method, wearable electronic device and system |
CN105292020B (en) * | 2015-10-29 | 2018-02-13 | 东莞酷派软件技术有限公司 | Control method for vehicle, controller of vehicle and terminal |
CN106778110A (en) * | 2016-11-29 | 2017-05-31 | 北京元心科技有限公司 | Method and device for authenticating application program in multiple systems |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101751519A (en) * | 2008-12-09 | 2010-06-23 | 纬创资通股份有限公司 | Method for improving information security of computer system and relative computer system thereof |
CN102402820A (en) * | 2010-09-13 | 2012-04-04 | 中国移动通信有限公司 | Electronic transaction method and terminal equipment |
CN103136052A (en) * | 2011-11-25 | 2013-06-05 | 展讯通信(上海)有限公司 | Mobile terminal and control method of mobile terminal provided with multiple operating systems |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477476B (en) * | 2008-01-02 | 2012-02-29 | 联想(北京)有限公司 | Control method and computer system for switching display between multi-operating system |
-
2014
- 2014-09-01 CN CN201410440696.XA patent/CN104156657B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101751519A (en) * | 2008-12-09 | 2010-06-23 | 纬创资通股份有限公司 | Method for improving information security of computer system and relative computer system thereof |
CN102402820A (en) * | 2010-09-13 | 2012-04-04 | 中国移动通信有限公司 | Electronic transaction method and terminal equipment |
CN103136052A (en) * | 2011-11-25 | 2013-06-05 | 展讯通信(上海)有限公司 | Mobile terminal and control method of mobile terminal provided with multiple operating systems |
Also Published As
Publication number | Publication date |
---|---|
CN104156657A (en) | 2014-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104156657B (en) | The data inputting method of terminal, the message input device of terminal and terminal | |
EP2562673B1 (en) | Apparatus and method for securing mobile terminal | |
US11100202B2 (en) | Fingerprint recognition method and device for touch screen, and touch screen | |
CN104794402B (en) | system switching method, system switching device and terminal | |
WO2016015448A1 (en) | Multi-system entering method, apparatus and terminal | |
CN103813334A (en) | Right control method and right control device | |
KR20140128462A (en) | Login method and device, terminal and network server | |
CN104797003B (en) | A kind of method and device for switching intelligent terminal user | |
US20150235164A1 (en) | Role-Based Control of Incident Response in a Secure Collaborative Environment | |
KR20160021763A (en) | User identity authenticating method, terminal, and server | |
KR101101797B1 (en) | Wireless terminal and method for managing network connection using the same | |
EP3422798B1 (en) | Communication methods and devices for direct communication | |
EP3352528A1 (en) | Remote control method and apparatus and mobile terminal | |
EP2492819A1 (en) | Method and apparatus for protecting information based on data card | |
CN105549786A (en) | System switching method and device based on pressure touch control and terminal | |
CN106211164A (en) | Terminal network changing method, terminal network switching device and terminal | |
CN105046135A (en) | Information display method, information display apparatus and terminal | |
CN106204003B (en) | Method, device and system for safely transferring virtual resources | |
CN106231534A (en) | Mobile terminal and the number of writing thereof and method of disannuling a call, device | |
CN106097500B (en) | A kind of method and system for responding user and entering | |
KR20070037541A (en) | Mobile communication terminal, control method thereof, and method for controlling a mobile communication service | |
CN105025548B (en) | A kind of the connection control method and device of SIM card | |
CN105635090B (en) | System access method, system access mechanism and terminal | |
CN104902480A (en) | Smartphone WIFI grading management method | |
CN104486506B (en) | System loads method, system loads device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |