CN105530360A - Dual system switching method and terminal - Google Patents

Dual system switching method and terminal Download PDF

Info

Publication number
CN105530360A
CN105530360A CN201410507823.3A CN201410507823A CN105530360A CN 105530360 A CN105530360 A CN 105530360A CN 201410507823 A CN201410507823 A CN 201410507823A CN 105530360 A CN105530360 A CN 105530360A
Authority
CN
China
Prior art keywords
terminal
check information
server
binding
security control
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410507823.3A
Other languages
Chinese (zh)
Other versions
CN105530360B (en
Inventor
朱海锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410507823.3A priority Critical patent/CN105530360B/en
Publication of CN105530360A publication Critical patent/CN105530360A/en
Application granted granted Critical
Publication of CN105530360B publication Critical patent/CN105530360B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a dual system switching method and a terminal. The dual system switching method comprises steps: a first terminal and a second terminal are bound; and system switching is carried out when the first terminal detects a signal of the second terminal or does not detect the signal of the second terminal. Through binding the first terminal and the second terminal, if system switching is carried out when the first terminal detects the signal of the second terminal, the possibility that the system password of the first terminal is cracked can be effectively avoided in a mode of binding the second terminal; the security of the system is improved; and if system switching is carried out when the first terminal does not detect the signal of the second terminal, forbidding of system switching at a specific position is further realized through setting the position of the second terminal.

Description

Dual system changing method and terminal
Technical field
The present invention relates to technical field of data security, particularly relate to a kind of dual system changing method and terminal.
Background technology
At present, intelligent terminal role in people's life, study, work is more and more important, and such as, mobile phone has become people's life, the requisite equipment of amusement.Along with the intellectuality of mobile phone, also from strength to strength, make it play a role at work becomes possibility to the function of mobile phone.
More existing terminals comprise two systems, and one is conventional system, normally using at ordinary times for user, and one is safety system, for user job.Like this, may preserve some extremely important data in safety system, data security just becomes the problem of important solution.
The technical scheme of existing switch dual system is all unlocked by figure, button, or enters into another one system when restarting system.When carrying out conventional system and changing to safety system, need to carry out pattern number password or fingerprint recognition etc. and confirm user identity.
The defect of existing scheme:
(1) in handoff procedure, verification mode is single, and can only carry out by numeral or the mode of graphical passwords the people that switching can cause being familiar with user by the mode Brute Force password of conjecture, can cannot ensure the fail safe of safety system.
(2) handoff procedure trouble, input validation password that must be artificial when switching.
(3) existing scheme cannot limit the place of forbidding systematic evaluation.
(4) existing scheme can not locking terminal or clear data after lost terminal, there is incipient fault for data security.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of dual system changing method and terminal, there is unsafe problem in order to solve in prior art in dual system handoff procedure.
For solving the problems of the technologies described above, on the one hand, the invention provides a kind of dual system changing method, comprising:
First terminal and the second terminal are bound;
First terminal carries out systematic evaluation when the second terminal signaling being detected or when can't detect the second terminal signaling.
Further, described first terminal carries out systematic evaluation automatically when the second terminal signaling being detected, or prompting user carries out systematic evaluation.
Further, described first terminal carries out systematic evaluation automatically when can't detect the second terminal signaling, or prompting user carries out systematic evaluation.
Further, first terminal and the second terminal are bound, and specifically comprise:
First terminal and the second terminal carry out password pairing, and preserve check information separately, and wherein, the check information preserved in each terminal comprises the exclusive identification code of both sides;
The check information preserved separately is sent to server by first terminal and the second terminal respectively, when the check information that both sides send is identical, then and the two binding success.
Further, after first terminal and the second terminal carry out binding success, also comprise:
The first security control password that first terminal is arranged sends to server, and the second security control password that the second terminal is also arranged sends to server, when the first security control password is identical with the second security control password, then arranges successfully.
Further, when the data existence on judgement first terminal leaks possibility, described second security control password is sent by the second terminal to server;
During first terminal connection server, server issues control command to first terminal, carries out security control to first terminal.
Further, described security control comprises:
The system of first terminal is locked; Or,
The data of first terminal are destroyed; Or,
After the system lock of first terminal, judge whether receive unlock command in the time threshold of setting, if so, then remove the locking to first terminal system, if not, then the data of first terminal are destroyed.
On the other hand, the invention provides a kind of dual system termi-nal, comprising:
First binding module, for binding with the second terminal;
Handover module, for carrying out systematic evaluation when the second terminal signaling being detected or when can't detect the second terminal signaling.
Further, described handover module carries out systematic evaluation automatically when the second terminal signaling being detected, or prompting user carries out systematic evaluation.
Further, described handover module carries out systematic evaluation automatically when can't detect the second terminal signaling, or prompting user carries out systematic evaluation.
Further, described first binding module also for:
Carry out password pairing with the second terminal, and preserve check information, wherein, check information comprises the exclusive identification code of both sides;
The check information preserved sends to server, the binding success when the check information that it is uploaded is identical with the check information that the second terminal is uploaded.
Further, described dual system termi-nal also comprises:
Safety control module, sends to server for the first security control password arranged by first terminal; And when first terminal connection server, the control command that reception server issues to first terminal, carries out security control to first terminal.
Further, described security control comprises:
The system of first terminal is locked; Or,
The data of first terminal are destroyed; Or,
After the system lock of first terminal, judge whether receive unlock command in setting-up time threshold value, if so, then remove the locking to first terminal system, if not, then the data of first terminal are destroyed.
Again on the one hand, the invention provides a kind of terminal, comprising:
Second binding module, for matching with first terminal, and preserves check information, and wherein, check information comprises the exclusive identification code of both sides; The check information preserved sends to server, the binding success when the check information that the check information that it is uploaded and first terminal are uploaded is identical;
Security control password sending module, when leaking possibility for existing when the data on judgement first terminal, sends the second security control password to server.
Again on the one hand, the invention provides a kind of dual system switched system, it is characterized in that, described dual system switched system adopts above-mentioned dual system termi-nal as first terminal; Adopt above-mentioned terminal as the second terminal.
Beneficial effect of the present invention is as follows:
The present invention is by first terminal and the second terminal binding, if first terminal carries out systematic evaluation when the second terminal signaling being detected, then by the mode of binding second terminal effectively avoid first terminal be cracked system password may; The fail safe of raising system; If first terminal carries out systematic evaluation when can't detect the second terminal signaling, then can by arranging the position of the second terminal, and then realize forbidding systematic evaluation at ad-hoc location.
Accompanying drawing explanation
Fig. 1 is the flow chart of dual system changing method in the embodiment of the present invention;
Fig. 2 is the structural representation of dual system switched system in the embodiment of the present invention;
Fig. 3 is that in the embodiment of the present invention, mobile phone carries out the flow chart bound by bluetooth and Intelligent worn device.
Embodiment
Below in conjunction with accompanying drawing and embodiment, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, do not limit the present invention.
As shown in Figure 1, the embodiment of the present invention relates to a kind of dual system changing method, comprising:
Step S101, first terminal and the second terminal are bound;
In this step, first terminal has two systems, such as, a system is Android (Android, Android mobile phone operating system) system, and one is WP (WindowsPhone, Microsoft's mobile phone operating system) system also can be two versions of Android system.
First terminal and the second terminal binding, refer to that the two establishes a communications link, and can identify the other side each other.Communication connection can adopt wired or wireless mode, and such as, adopt bluetooth, infrared, the agreements such as ZigBee (ZigBee protocol) connect.Concrete binding method comprises:
First terminal and the second terminal carry out password pairing, and preserve check information separately, and wherein, the check information that first terminal and the second terminal are preserved all comprises the exclusive identification code of both sides; The hardware of usual smart machine all can have a unique hardware encoding, this identification code can be verified, after two equipment are by verification, ensure that ground floor fail safe identification.Exclusive identification code can be the IMEI (InternationalMobileEquipmentIdentity of terminal, mobile device international identity code), MEID (MobileEquipmentIdentifier, mobile device identification code), ESN (ElectronicSerialNumber, Electronic Serial Number) or MAC (Medium/MediaAccessControl, medium access control) address etc.These identification codes are all unique, and then can identification terminal.
The check information preserved separately is sent to server by first terminal and the second terminal respectively, when the check information that both sides send is identical, then and the two binding success.
In addition, first terminal and the second terminal binding success after, security control password can also be set, specific as follows:
The first security control password that first terminal is arranged sends to server, and the second security control password that the second terminal is also arranged sends to server, when the first security control password is identical with the second security control password, then arranges successfully.
Step S102, first terminal carries out systematic evaluation when the second terminal signaling being detected or when can't detect the second terminal signaling.
In this step, first terminal carries out systematic evaluation and refers to that first terminal is switched in safety system (for working or preserving the system of significant data) by the system (conventional system) of current use.
First terminal carries out systematic evaluation when the second terminal signaling being detected, and can realize controlling first terminal can only carry out systematic evaluation in specific region (in the second terminal signaling coverage).When clicking switch dual system, whether the terminal first detecting two bindings is in certain scope.Namely can first terminal detect the signal that the second terminal sends, and when only having first terminal the signal of the second terminal can be detected, can judge whether the switching carrying out dual system, at this moment points out user whether to carry out systematic evaluation, and carry out password authentification.In addition, also can automatically switch, first first terminal detects the signal that can receive, and judges whether the signal of bound device (the second terminal), if have the signal of bound device, force the switching carrying out system, without the need to the checking of user.
First terminal carries out systematic evaluation when can't detect the second terminal signaling, then can realize forbidding that first terminal carries out systematic evaluation in specific region (in the second terminal signaling coverage).When clicking switch dual system, whether the terminal first detecting two bindings is in certain scope.Namely can first terminal detect the signal that the second terminal sends, as long as first terminal can detect the signal of the second terminal, then forbid that first terminal carries out systematic evaluation, when only having first terminal to can't detect the signal of the second terminal, just point out user whether to carry out systematic evaluation, and carry out password authentification.In addition, also can automatically switch, first first terminal detects the signal that can receive, judge whether the signal of bound device (the second terminal), if had, then forbid that first terminal carries out systematic evaluation, if not, then the switching carrying out system is forced, without the need to the checking of user.
In addition, there is the possibility that leaks in the data on first terminal, and such as, first terminal is lost, or first terminal is taken away in labor turnover, like this, needs to carry out safe handling to the data of first terminal, leaks to prevent data.Specific as follows:
When the data existence on judgement first terminal leaks possibility, send the second security control password by the second terminal to server.Owing to preserving the check information of first terminal and the second terminal before server, therefore, when receiving the second control password that the second terminal sends, just can determine that the second terminal is bound with first terminal according to the unique identifier of the second terminal, then judge that whether the second security control password is identical with the first security control password that first terminal sends further, if so, then control command is issued when first terminal is networked to first terminal according to the safe handling rule pre-set; If not, then terminate, do not deal with.
If first terminal is networking never, then when first terminal initiatively carries out systematic evaluation, (backstage) be connection server automatically, and server issues control command to first terminal, carries out security control to first terminal.Security control comprises:
The system of first terminal is locked; Or,
The data of first terminal are destroyed; Or,
After the system lock of first terminal, judge whether receive unlock command in the time threshold of setting, if so, then remove the locking to first terminal system, if not, then the data of first terminal are destroyed.
As shown in Figure 2, the embodiment of the present invention relates to a kind of dual system switched system, comprises dual system termi-nal (first terminal) and the second terminal,
Dual system termi-nal comprises:
First binding module, for binding with the second terminal;
Handover module, for carrying out systematic evaluation when the second terminal signaling being detected or when can't detect the second terminal signaling.
Handover module carries out systematic evaluation automatically when the second terminal signaling being detected, or prompting user carries out systematic evaluation.And handover module carries out systematic evaluation automatically when can't detect the second terminal signaling, or prompting user carries out systematic evaluation.
First binding module also for:
Carry out password pairing with the second terminal, and preserve check information, wherein, check information comprises the exclusive identification code of both sides; The check information preserved sends to server, the binding success when the check information that it is uploaded is identical with the check information that the second terminal is uploaded.
Described dual system termi-nal also comprises:
Safety control module, sends to server for the security control password arranged by first terminal; And when first terminal carries out systematic evaluation, the control command that reception server issues to first terminal, carries out security control to first terminal.Security control comprises:
The system of first terminal is locked; Or,
The data of first terminal are destroyed; Or,
After the system lock of first terminal, judge whether receive unlock command in setting-up time threshold value, if so, then remove the locking to first terminal system, if not, then the data of first terminal are destroyed.
Second terminal comprises:
Second binding module, for matching with first terminal, and preserves check information, and wherein, check information comprises the exclusive identification code of both sides; The check information preserved sends to server, the binding success when the check information that the check information that it is uploaded and first terminal are uploaded is identical;
Security control password sending module, when leaking possibility for existing when the data on judgement first terminal, sends the second security control password to server.
In the present embodiment, first terminal can be mobile phone, panel computer or notebook computer energy smart machine, and the second terminal can be handset, mobile phone, Intelligent worn device, server, the computer of first terminal, can be even the intelligent appliance etc. in Smart Home.
Below, take first terminal as mobile phone, the two is connected for example by bluetooth the second terminal for intelligent watch (Intelligent worn device), be described in detail.
Step S301, mobile phone and intelligent watch carry out Bluetooth pairing, send the pairing password appointed each other, carry out matching and identifying, and two equipment all preserves the binding check information (unpaired message) of both sides.
Step S302, judges whether successful matching, if so, then goes to step S303, if not, then goes to step S309 and terminates.The words continuing binding need start flow again, again match.The pairing process of bluetooth belongs to prior art, and the present invention is not described in detail.
Step S303, to passing server on the unpaired message that mobile phone and intelligent watch are preserved respectively.
Step S304, whether the unpaired message uploaded both server judges is identical, if so, then goes to step S305, if not, then goes to step S309, terminates.
Step S305, mobile phone and intelligent watch arrange security control password respectively, and upload server.
Step S306, whether the security control password uploaded both server judges is identical, if so, then goes to step S307, if not, then goes to step S305.
Step S307, arranges binding mode, and the relation between setting mobile phone and intelligent watch is that forward is bound or reverse bounding.Forward binding refers to, mobile phone leaves the switching that intelligent watch signal cover then cannot carry out dual system, and that is mobile phone can only carry out systematic evaluation in intelligent watch signal cover.Reverse bounding, just can carry out the switching of dual system after mobile phone leaves smart machine signal cover, and namely mobile phone cannot carry out systematic evaluation in intelligent watch signal cover.
Step S308, binding success.
Step S309, terminates.
After handset binding success, then carry out systematic evaluation according to the rule that binding mode is corresponding.
When the data in mobile phone exist potential safety hazard, and cannot directly process mobile phone, such as, mobile phone is lost.Then send security control password (the second security control password) by intelligent watch to server.After server receives security control password, judge whether identical with the security control password sent before mobile phone (the first security control password), if not, then do not process, if so, then when first terminal connection server to first terminal sending controling instruction, instruction first terminal carry out system lock, or destruction data, or, first carry out system lock, in setting-up time, if do not receive unlock command, then the data of first terminal are destroyed; If received, then remove the locking to first terminal system.
As can be seen from the above-described embodiment, the present invention controls dual system termi-nal by the mode of binding other smart machines and carries out systematic evaluation, which can control in region can switch, those regions forbid switching, considerably increase Information Security, and, even if device losses, also can effectively reduce terminal causes data external coordination danger because being cracked system password, but also can be guaranteed data security by locking device or destruction data.Terminal can also carry out systematic evaluation automatically, reduces operation, improves Consumer's Experience.
Although be example object, disclose the preferred embodiments of the present invention, it is also possible for those skilled in the art will recognize various improvement, increase and replacement, and therefore, scope of the present invention should be not limited to above-described embodiment.

Claims (10)

1. a dual system changing method, is characterized in that, comprising:
First terminal and the second terminal are bound;
First terminal carries out systematic evaluation when the second terminal signaling being detected or when can't detect the second terminal signaling.
2. dual system changing method as claimed in claim 1, is characterized in that, it is that forward is bound or reverse bounding that first terminal arranges with the binding relationship of the second terminal; Wherein, forward binding refers to that described first terminal carries out systematic evaluation automatically when the second terminal signaling being detected, or prompting user carries out systematic evaluation; Reverse bounding refers to that described first terminal carries out systematic evaluation automatically when can't detect the second terminal signaling, or prompting user carries out systematic evaluation.
3. dual system changing method as claimed in claim 1 or 2, it is characterized in that, first terminal and the second terminal are bound, and specifically comprise:
First terminal and the second terminal carry out password pairing, and preserve check information separately, and wherein, the check information preserved in each terminal comprises the exclusive identification code of both sides;
The check information preserved separately is sent to server by first terminal and the second terminal respectively, when the check information that both sides send is identical, then and the two binding success.
4. dual system changing method as claimed in claim 1, is characterized in that, after first terminal and the second terminal binding, also comprise:
The first security control password that first terminal is arranged sends to server, and the second security control password that the second terminal is also arranged sends to server, when described first security control password is identical with the second security control password, then arranges successfully.
5. dual system changing method as claimed in claim 4, is characterized in that,
When the data existence on judgement first terminal leaks possibility, send described second security control password by the second terminal to server;
During first terminal connection server, server issues control command to first terminal, carries out security control to first terminal.
6. dual system changing method as claimed in claim 5, it is characterized in that, described security control comprises:
The system of first terminal is locked; Or,
The data of first terminal are destroyed; Or,
After the system lock of first terminal, judge whether receive unlock command in the time threshold of setting, if so, then remove the locking to first terminal system, if not, then the data of first terminal are destroyed.
7. a dual system termi-nal, is characterized in that, comprising:
First binding module, for binding with the second terminal;
Handover module, for carrying out systematic evaluation when the second terminal signaling being detected or when can't detect the second terminal signaling.
8. dual system termi-nal as claimed in claim 7, is characterized in that, described first binding module also for:
Carry out password pairing with the second terminal, and preserve check information, wherein, check information comprises the exclusive identification code of both sides; The check information preserved sends to server, the binding success when the check information that it is uploaded is identical with the check information that the second terminal is uploaded; It is that forward is bound or reverse bounding that described first binding module arranges with the binding relationship of the second terminal; Wherein, forward binding refers to that described handover module carries out systematic evaluation automatically when the second terminal signaling being detected, or prompting user carries out systematic evaluation; Reverse bounding refers to that described handover module carries out systematic evaluation automatically when can't detect the second terminal signaling, or prompting user carries out systematic evaluation.
9. dual system termi-nal as claimed in claim 8, it is characterized in that, described dual system termi-nal also comprises:
Safety control module, sends to server for the first security control password arranged by first terminal; And when first terminal connection server, the control command that reception server issues to first terminal, carries out security control to first terminal; Wherein, described security control comprises:
The system of first terminal is locked; Or,
The data of first terminal are destroyed; Or,
After the system lock of first terminal, judge whether receive unlock command in setting-up time threshold value, if so, then remove the locking to first terminal system, if not, then the data of first terminal are destroyed.
10. a terminal, is characterized in that, comprising:
Second binding module, for matching with first terminal, and preserves check information, and wherein, check information comprises the exclusive identification code of both sides; The check information preserved sends to server, the binding success when the check information that the check information that it is uploaded and first terminal are uploaded is identical;
Security control password sending module, when leaking possibility for existing when the data on judgement first terminal, sends the second security control password to server.
CN201410507823.3A 2014-09-28 2014-09-28 Dual-system switching method and terminal Active CN105530360B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410507823.3A CN105530360B (en) 2014-09-28 2014-09-28 Dual-system switching method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410507823.3A CN105530360B (en) 2014-09-28 2014-09-28 Dual-system switching method and terminal

Publications (2)

Publication Number Publication Date
CN105530360A true CN105530360A (en) 2016-04-27
CN105530360B CN105530360B (en) 2020-04-07

Family

ID=55772330

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410507823.3A Active CN105530360B (en) 2014-09-28 2014-09-28 Dual-system switching method and terminal

Country Status (1)

Country Link
CN (1) CN105530360B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992336A (en) * 2017-11-28 2018-05-04 深圳市筑泰防务智能科技有限公司 A kind of dual system switching method of enterprises mobile terminal
CN109190355A (en) * 2018-07-02 2019-01-11 北京奇艺世纪科技有限公司 A kind of user login method, device and equipment
CN114691219A (en) * 2020-12-31 2022-07-01 成都鼎桥通信技术有限公司 System switching method and device, wearable device and user terminal

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08129498A (en) * 1994-10-31 1996-05-21 Toshiba Corp Information storage device
CN101399825A (en) * 2007-09-29 2009-04-01 华为技术有限公司 Method, device and system for sharing matched pair information between equipments
CN102411692A (en) * 2010-09-25 2012-04-11 中国移动通信有限公司 Method, system and equipment for running terminal
US20120294241A1 (en) * 2005-11-14 2012-11-22 Broadcom Corporation System for transmitting high throughput data between multiple devices
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN103200566A (en) * 2013-02-26 2013-07-10 深圳市中兴移动通信有限公司 Implementation method and calibration method of partner mode between main device and partner device
CN103237064A (en) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 Terminals, and method, system and cloud server for remote locking of terminals
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN103714285A (en) * 2013-12-20 2014-04-09 上海卓悠网络科技有限公司 NFC-based method and device for achieving mobile terminal access right control

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08129498A (en) * 1994-10-31 1996-05-21 Toshiba Corp Information storage device
US20120294241A1 (en) * 2005-11-14 2012-11-22 Broadcom Corporation System for transmitting high throughput data between multiple devices
CN101399825A (en) * 2007-09-29 2009-04-01 华为技术有限公司 Method, device and system for sharing matched pair information between equipments
CN102411692A (en) * 2010-09-25 2012-04-11 中国移动通信有限公司 Method, system and equipment for running terminal
CN102833712A (en) * 2012-08-31 2012-12-19 北京小米科技有限责任公司 Method, device, server and system for preventing information leakage and equipment
CN103200566A (en) * 2013-02-26 2013-07-10 深圳市中兴移动通信有限公司 Implementation method and calibration method of partner mode between main device and partner device
CN103237064A (en) * 2013-04-11 2013-08-07 百度在线网络技术(北京)有限公司 Terminals, and method, system and cloud server for remote locking of terminals
CN103488932A (en) * 2013-10-16 2014-01-01 重庆邮电大学 Desktop security intercommunication system for mobile device and personal computer and implementation method thereof
CN103714285A (en) * 2013-12-20 2014-04-09 上海卓悠网络科技有限公司 NFC-based method and device for achieving mobile terminal access right control

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107992336A (en) * 2017-11-28 2018-05-04 深圳市筑泰防务智能科技有限公司 A kind of dual system switching method of enterprises mobile terminal
CN109190355A (en) * 2018-07-02 2019-01-11 北京奇艺世纪科技有限公司 A kind of user login method, device and equipment
CN109190355B (en) * 2018-07-02 2021-02-12 北京奇艺世纪科技有限公司 User login method, device and equipment
CN114691219A (en) * 2020-12-31 2022-07-01 成都鼎桥通信技术有限公司 System switching method and device, wearable device and user terminal

Also Published As

Publication number Publication date
CN105530360B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN108271125B (en) Data transmitting method, data receiving method and device
CN101594695B (en) Wireless communication system, wireless communication apparatus, method for disconnection process thereof, and storage medium
CN103886661B (en) Access control management method and system
CN101521886B (en) Method and device for authenticating terminal and telecommunication smart card
CN104270758A (en) Method for safely establishing connection with server and conducting authorization through WIFI
US20120149331A1 (en) Method and system for remote control of smart card
CN106652117A (en) Method and system for enabling dynamic passwords to realize offline unlocking, mobile terminal and server
EP3225054B1 (en) Method and apparatus for wlan device pairing
CN104168387B (en) Mobile phone users identification card changing method and system
CN105321330A (en) Smart home equipment, binding method, device and system thereof and mobile terminal
CN105992306A (en) Binding method of terminal and home gateway
CN104539806A (en) Mobile terminals and emergency unlocking method thereof
CN105491511A (en) Bluetooth device matching method, Bluetooth device and Bluetooth device matching system
CN103763757A (en) Method for rapid networking based on internet-of-thing embedded type Wi-Fi module
CN104105170A (en) Connection method and connection system for WiFi protected setup scanning of dual-band router
CN104539320A (en) Pairing method for Bluetooth devices
CN105763400A (en) Method and system for binding home gateway and home gateway management platform
CN105530360A (en) Dual system switching method and terminal
CN102076124A (en) System, method and equipment for changing signature data
CN107148021A (en) A kind of wireless access authentication method and a kind of radio reception device
CN102970680A (en) Method and device for network switching
CN105787344A (en) Slave device and method for establishing connection between same and master device
CN109561413B (en) Bluetooth authentication and authorization method and system of BLE equipment
CN104883682A (en) WIFI hotspot connecting and selecting method, communication terminal and system
US20150067795A1 (en) Control method and device for mobile terminal, and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant