CN106096344A - Business performs method, business performs device and terminal - Google Patents
Business performs method, business performs device and terminal Download PDFInfo
- Publication number
- CN106096344A CN106096344A CN201610365157.3A CN201610365157A CN106096344A CN 106096344 A CN106096344 A CN 106096344A CN 201610365157 A CN201610365157 A CN 201610365157A CN 106096344 A CN106096344 A CN 106096344A
- Authority
- CN
- China
- Prior art keywords
- business
- operating system
- target service
- performs
- attribute information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention provides a kind of business and perform method, business execution device and terminal, wherein, business performs method and includes: during the first operating system, obtains the request instruction of performance objective business;Judge that target service service agreement based on the embedded user identification module specified performs;When judging that target service service agreement based on the embedded user identification module specified performs, according to the embedded user identification module specified and the corresponding relation of the second operating system, switch to the second operating system performs from the first operating system by target service.By technical solution of the present invention, improve the safety of process of service execution, reduce the menace of Loopholes of OS, improve the experience of user.
Description
Technical field
The present invention relates to field of terminal technology, perform method, a kind of business execution device in particular to a kind of business
With a kind of terminal.
Background technology
In the related, embedded user identification module (hereinafter eSIM card, embed-Subscriber
Identity Module) concept be by tradition SIM (Subscriber Identity Module) card be directly embedded into terminal
Being located in terminal in equipment rather than as independent removable parts, the application of eSIM card can provide terminal use more
Many service selection and set meal service.
But, for the terminal of multiple operating system, multiple operating system may for the General Open characteristic of eSIM card
Cause the leakage of terminal data, even the property of terminal use is threatened.
Therefore, how to design a kind of new business and carry into execution a plan, become safely urgently to be resolved hurrily improving the data of terminal
Technical problem.
Summary of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new business carries into execution a plan, by
When obtaining the request instruction of performance objective business, determine the eSIM card that target service is corresponding, and the behaviour that above-mentioned eSIM card is corresponding
Make system (user domain), therefore, access rights based on eSIM card Yu operating system, target service is switched to the operation of correspondence
System performs, and then truly improves the safety of target service and the data safety of user, improve user's
Experience.
In view of this, according to the first aspect of the invention, it is proposed that a kind of business performs method, including: in the first operation
In system operation, obtain the request instruction of performance objective business;Judge that whether target service is based on the embedded use specified
The service agreement of family identification module performs;Judging that target service is based on the embedded user identification module specified
When service agreement performs, according to the embedded user identification module specified and the corresponding relation of the second operating system, by mesh
Mark business switches to perform the second operating system from the first operating system.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding
ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system
Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service
With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities,
Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal
Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour
Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature,
Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with
When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that obtain the request instruction of performance objective business, specifically include following
Step: when obtaining the request instruction for arbitrary business, determine the attribute information of arbitrary business;Judge attribute information whether with
Preset attribute information matches;When judging attribute information and preset attribute information matches, determine that the business that attribute information is corresponding is
Target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then
Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein,
Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that before the request instruction obtaining performance objective business, also include:
Preset the corresponding relation of embedded user identification module and the target service specified.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close
System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence
Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh
In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that also include: judge the target service performed in the second operating system
Whether terminate;At the end of judging the target service performed in the second operating system, prompt the user whether running environment from the
Two operating systems switch to the first operating system.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter
Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical
At least one in communication service.
According to the second aspect of the invention, it is also proposed that a kind of business performs device, including acquiring unit, for the
During one operating system, obtain the request instruction of performance objective business;Judging unit, is used for whether judging target service
Service agreement based on the embedded user identification module specified performs;Switch unit, for judging target service base
When the service agreement of the embedded user identification module specified performs, according to the embedded user identification mould specified
Block and the corresponding relation of the second operating system, switch to perform the second operating system from the first operating system by target service.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding
ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system
Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service
With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities,
Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal
Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour
Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature,
Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with
When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that also comprise determining that unit, for obtaining for arbitrary business
Request instruction time, determine the attribute information of arbitrary business;Judging unit is additionally operable to: judge attribute information whether with preset attribute
Information matches;Determine that unit is additionally operable to: when judging attribute information and preset attribute information matches, determine that attribute information is corresponding
Business is target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then
Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein,
Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that also include: preset unit, for presetting the embedded use specified
Family identification module and the corresponding relation of target service.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close
System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence
Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh
In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that judging unit is additionally operable to: judge execution in the second operating system
Whether target service terminates;Business performs device and also includes: Tip element, for the mesh performed in judging the second operating system
During mark service ending, prompt the user whether from the second operating system, running environment is switched to the first operating system.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter
Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical
At least one in communication service.
According to the third aspect of the invention we, it is also proposed that a kind of terminal, the business including the most above-mentioned any one performs device,
Therefore, this terminal has the technique effect identical with the business execution device any one of technique scheme, the most superfluous at this
State.
By above technical scheme, by when obtaining the request instruction of performance objective business, determine that target service is corresponding
ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access based on eSIM card Yu operating system
Authority, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service
Property and the data safety of user, improve the experience of user.
Accompanying drawing explanation
Fig. 1 shows that business according to an embodiment of the invention performs the schematic flow diagram of method;
Fig. 2 shows that business according to an embodiment of the invention performs the schematic block diagram of device;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows that business according to another embodiment of the invention performs the schematic block diagram of device;
Fig. 5 shows that business according to another embodiment of the invention performs the schematic flow diagram of method.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, real with concrete below in conjunction with the accompanying drawings
The present invention is further described in detail by mode of executing.It should be noted that in the case of not conflicting, the enforcement of the application
Feature in example and embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention, but, the present invention also may be used
Implementing to use third party to be different from third party's mode described here, therefore, protection scope of the present invention is not by following
The restriction of disclosed specific embodiment.
Fig. 1 shows that business according to an embodiment of the invention performs the schematic flow diagram of method.
As it is shown in figure 1, business according to an embodiment of the invention performs method, including: step 102, the first behaviour
Make in system operation, obtain the request instruction of performance objective business;Step 104, it is judged that whether target service is based on appointment
Embedded user identification module service agreement perform;Step 106, is judging that target service is embedded based on specify
When the service agreement of user identification module performs, according to the embedded user identification module specified and the second operation system
The corresponding relation of system, switches to perform the second operating system from the first operating system by target service.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding
ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system
Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service
With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities,
Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal
Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour
Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature,
Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with
When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that obtain the request instruction of performance objective business, specifically include following
Step: when obtaining the request instruction for arbitrary business, determine the attribute information of arbitrary business;Judge attribute information whether with
Preset attribute information matches;When judging attribute information and preset attribute information matches, determine that the business that attribute information is corresponding is
Target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then
Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein,
Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that before the request instruction obtaining performance objective business, also include:
Preset the corresponding relation of embedded user identification module and the target service specified.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close
System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence
Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh
In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that also include: judge the target service performed in the second operating system
Whether terminate;At the end of judging the target service performed in the second operating system, prompt the user whether running environment from the
Two operating systems switch to the first operating system.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter
Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical
At least one in communication service.
Below in conjunction with Fig. 2 to Fig. 5 business according to an embodiment of the invention carried into execution a plan and be specifically described.
Embodiment one:
Fig. 2 shows that business according to an embodiment of the invention performs the schematic block diagram of device.
As in figure 2 it is shown, business according to an embodiment of the invention performs device 200, including: acquiring unit 202, use
During the first operating system, obtain the request instruction of performance objective business;Judging unit 204, is used for judging mesh
Mark business service agreement based on the embedded user identification module specified performs;Switch unit 206, for sentencing
When the business that sets the goal service agreement based on the embedded user identification module specified performs, according to the embedded use specified
Family identification module and the corresponding relation of the second operating system, switch to the second operation by target service from the first operating system
System performs.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding
ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system
Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service
With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities,
Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal
Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour
Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature,
Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with
When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that also comprise determining that unit 208, for obtaining for arbitrary industry
During the request instruction being engaged in, determine the attribute information of arbitrary business;Judging unit 204 is additionally operable to: judge attribute information whether with in advance
If attribute information mates;Determine that unit 208 is additionally operable to: when judging attribute information and preset attribute information matches, determine attribute
Business corresponding to information is target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then
Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein,
Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that also include: preset unit 210, for preset specify embedded
User identification module and the corresponding relation of target service.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close
System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence
Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh
In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that judging unit 204 is additionally operable to: judge the second operating system is held
Whether the target service of row terminates;Business performs device 200 and also includes: Tip element 212, for judging the second operating system
At the end of the target service of middle execution, prompt the user whether from the second operating system, running environment is switched to the first operation system
System.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter
Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical
At least one in communication service.
Embodiment two:
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As it is shown on figure 3, terminal 300 according to an embodiment of the invention, the business including the most above-mentioned any one performs device
200, therefore, this terminal has the technique effect identical with the business execution device 200 any one of technique scheme, at this
Repeat no more.
Embodiment three:
Fig. 4 shows that business according to another embodiment of the invention performs the schematic block diagram of device.
As shown in Figure 4, business according to another embodiment of the invention performs device 400, including: execution can be asked
Target service includes that business 1, business 2, business 3 and business 4, business 1 perform corresponding to eSIM1 card, and eSIM1 card closes according to correspondence
System can access Secure user data 408 by the second operating system 404, and business 2 performs corresponding to eSIM2 card, and business 3 corresponds to
ESIM3 card performs, and business 4 performs corresponding to eSIM4 card, and eSIM2 card, eSIM3 card and eSIM4 card can pass through according to corresponding relation
First operating system 402 accesses Secure user data 406.
Specifically, when terminal currently runs the first operating system 402, user asks execution business 1, then switch eSIM1
Card networks and carries out authentication operations, after completing authentication confirmation, switches to the second operating system 404 from the first operating system 402,
The offer business 1 access rights to Secure user data 408.
Fig. 5 shows that business according to another embodiment of the invention performs the schematic flow diagram of method.
As it is shown in figure 5, business according to another embodiment of the invention performs method, including: step 502, arrange
ESIM card and the first mapping relations of operating system (user domain);Step 504, arranges the second mapping pass of eSIM card and business
System, namely eSIM card trigger condition based on operating system (user domain) execution business;Step 506, obtains user's request and carries out
The request instruction of arbitrary business;Step 508, determines business pair according to request instruction, the first mapping relations and the second mapping relations
The operating system (user domain) answered, and in aforesaid operations system, perform business;Step 510, it is judged that the operation of business is the completeest
Become, the most then perform step 512, if it is not, then perform step 514;Step 512, user confirms to exit aforesaid operations system, and
Terminate;Step 514, continues executing with business.
Technical scheme is described in detail, it is contemplated that how correlation technique improves terminal above in association with accompanying drawing
The technical problem of data safety, the present invention proposes a kind of new business and performs method, by obtaining performance objective business
During request instruction, determine the eSIM card that target service is corresponding, and the operating system (user domain) that above-mentioned eSIM card is corresponding, because of
This, access rights based on eSIM card Yu operating system, switch to target service the operating system of correspondence performs, Jin Erzhen
Improve the safety of target service and the data safety of user in positive meaning, improve the experience of user.
These are only the preferred embodiments of the present invention, be not limited to the present invention, for those skilled in the art
For Yuan, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of being made,
Equivalent, improvement etc., should be included within the scope of the present invention.
Claims (11)
1. a business performs method, it is characterised in that including:
During the first operating system, obtain the request instruction of performance objective business;
Judge that described target service service agreement based on the embedded user identification module specified performs;
When judging that described target service service agreement based on the described embedded user identification module specified performs, root
According to the described embedded user identification module specified and the corresponding relation of the second operating system, by described target service from institute
State the first operating system to switch to described second operating system performs.
Business the most according to claim 1 performs method, it is characterised in that the request of described acquisition performance objective business refers to
Order, specifically includes following steps:
When obtaining the request instruction for arbitrary business, determine the attribute information of described arbitrary business;
Judge described attribute information whether with preset attribute information matches;
When judging described attribute information and described preset attribute information matches, determine that the business that described attribute information is corresponding is institute
State target service.
Business the most according to claim 1 performs method, it is characterised in that in the request of described acquisition performance objective business
Before instruction, also include:
Preset the corresponding relation of the described embedded user identification module specified and described target service.
Business the most according to any one of claim 1 to 3 performs method, it is characterised in that also include:
Judge whether the target service performed in described second operating system terminates;
At the end of the target service performed in judging described second operating system, prompt the user whether running environment from described
Second operating system switches to described first operating system.
Business the most according to any one of claim 1 to 3 performs method, it is characterised in that described target service includes
At least one in speech business, short message service and multimedia communication service.
6. a business performs device, it is characterised in that including:
Acquiring unit, for during the first operating system, obtains the request instruction of performance objective business;
Judging unit, for judging that the service based on the embedded user identification module specified of described target service is assisted
View performs;
Switch unit, for judging the service based on the described embedded user identification module specified of described target service
When agreement performs, according to the described embedded user identification module specified and the corresponding relation of the second operating system, by institute
State target service to switch to described second operating system performs from described first operating system.
Business the most according to claim 6 performs device, it is characterised in that also include:
Determine unit, for when obtaining the request instruction for arbitrary business, determining the attribute information of described arbitrary business;
Described judging unit is additionally operable to: judge described attribute information whether with preset attribute information matches;
Described determine that unit is additionally operable to: when judging described attribute information and described preset attribute information matches, determine described genus
Business corresponding to property information is described target service.
Business the most according to claim 6 performs device, it is characterised in that also include:
Presetting unit, for presetting, the described embedded user identification module specified is corresponding with described target service to close
System.
9. perform device according to the business according to any one of claim 6 to 8, it is characterised in that
Described judging unit is additionally operable to: judge whether the target service performed in described second operating system terminates;
Described business performs device and also includes:
Tip element, at the end of judging the target service performed in described second operating system, prompt the user whether by
Running environment switches to described first operating system from described second operating system.
10. perform device according to the business according to any one of claim 6 to 8, it is characterised in that described target service includes
At least one in speech business, short message service and multimedia communication service.
11. 1 kinds of terminals, it is characterised in that including: the business as according to any one of claim 6 to 10 performs device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610365157.3A CN106096344A (en) | 2016-05-26 | 2016-05-26 | Business performs method, business performs device and terminal |
PCT/CN2016/087532 WO2017201805A1 (en) | 2016-05-26 | 2016-06-28 | Service execution method, service execution device, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610365157.3A CN106096344A (en) | 2016-05-26 | 2016-05-26 | Business performs method, business performs device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106096344A true CN106096344A (en) | 2016-11-09 |
Family
ID=57229399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610365157.3A Pending CN106096344A (en) | 2016-05-26 | 2016-05-26 | Business performs method, business performs device and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106096344A (en) |
WO (1) | WO2017201805A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107909330A (en) * | 2017-08-31 | 2018-04-13 | 平安科技(深圳)有限公司 | Work stream data processing method, device, storage medium and computer equipment |
WO2020024912A1 (en) * | 2018-07-30 | 2020-02-06 | 中兴通讯股份有限公司 | Operating system switching method, terminal, and computer storage medium |
CN116243996A (en) * | 2023-05-12 | 2023-06-09 | 苏州浪潮智能科技有限公司 | Service operation switching method and device, storage medium and electronic device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104159329A (en) * | 2014-09-03 | 2014-11-19 | 谭卫 | Mobile terminal and application method thereof |
CN104463025A (en) * | 2014-12-19 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | System switching method, system switching device and terminal |
CN104507181A (en) * | 2014-12-12 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Dual-card dual-standby conversation method, dual-card dual-standby conversation device and dual-card dual-standby conversation terminal |
CN105072257A (en) * | 2015-07-16 | 2015-11-18 | 深圳前海达闼科技有限公司 | Double-card double-system terminal and incoming call processing method and apparatus thereof |
CN105450828A (en) * | 2014-06-30 | 2016-03-30 | 展讯通信(深圳)有限公司 | Business execution method for multi-card mobile terminal |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8862178B2 (en) * | 2010-02-24 | 2014-10-14 | Qualcomm Incorporated | Methods and systems for managing participation in multiple wireless networks |
KR101954450B1 (en) * | 2011-09-05 | 2019-05-31 | 주식회사 케이티 | Method for Verification of Embedded UICC using eUICC Certificate, Method for Provisioning and MNO Switching, eUICC, MNO System and recording medium for the same |
US9510186B2 (en) * | 2014-04-04 | 2016-11-29 | Apple Inc. | Tamper prevention for electronic subscriber identity module (eSIM) type parameters |
US10075841B2 (en) * | 2014-09-17 | 2018-09-11 | Simless, Inc. | Apparatuses, methods and systems for implementing a trusted subscription management platform |
-
2016
- 2016-05-26 CN CN201610365157.3A patent/CN106096344A/en active Pending
- 2016-06-28 WO PCT/CN2016/087532 patent/WO2017201805A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450828A (en) * | 2014-06-30 | 2016-03-30 | 展讯通信(深圳)有限公司 | Business execution method for multi-card mobile terminal |
CN104159329A (en) * | 2014-09-03 | 2014-11-19 | 谭卫 | Mobile terminal and application method thereof |
CN104507181A (en) * | 2014-12-12 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Dual-card dual-standby conversation method, dual-card dual-standby conversation device and dual-card dual-standby conversation terminal |
CN104463025A (en) * | 2014-12-19 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | System switching method, system switching device and terminal |
CN105072257A (en) * | 2015-07-16 | 2015-11-18 | 深圳前海达闼科技有限公司 | Double-card double-system terminal and incoming call processing method and apparatus thereof |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107909330A (en) * | 2017-08-31 | 2018-04-13 | 平安科技(深圳)有限公司 | Work stream data processing method, device, storage medium and computer equipment |
WO2019041925A1 (en) * | 2017-08-31 | 2019-03-07 | 平安科技(深圳)有限公司 | Workflow data processing method and device, storage medium, and computer apparatus |
CN107909330B (en) * | 2017-08-31 | 2020-10-09 | 平安科技(深圳)有限公司 | Workflow data processing method and device, storage medium and computer equipment |
WO2020024912A1 (en) * | 2018-07-30 | 2020-02-06 | 中兴通讯股份有限公司 | Operating system switching method, terminal, and computer storage medium |
CN110780926A (en) * | 2018-07-30 | 2020-02-11 | 中兴通讯股份有限公司 | Switching method of operating system, terminal and computer storage medium |
CN116243996A (en) * | 2023-05-12 | 2023-06-09 | 苏州浪潮智能科技有限公司 | Service operation switching method and device, storage medium and electronic device |
CN116243996B (en) * | 2023-05-12 | 2023-08-08 | 苏州浪潮智能科技有限公司 | Service operation switching method and device, storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
WO2017201805A1 (en) | 2017-11-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI628944B (en) | Methods for enabling an esim on an euicc of a mobile device and related non-transitory computer readable storage medium | |
CN105631275B (en) | information display method, information display device and terminal | |
CN107944258A (en) | Start control method, device, storage medium and the terminal of application with method of service | |
CN105224838A (en) | A kind of user authority control method based on recognition of face and system | |
CN107944257A (en) | Start control method, device, storage medium and the terminal of application with method of service | |
CN104902074B (en) | A kind of mobile phone information safety management method based on more permission modes | |
CN106096344A (en) | Business performs method, business performs device and terminal | |
CN106126327B (en) | A kind of control method and control device of application program launching | |
CN106778208A (en) | The access processing method and device of application program | |
CN105160302A (en) | Multi-model biological recognition general platform and multi-model biological recognition identity authentication method | |
CN104573463A (en) | System switching method, system switching device and terminal | |
CN105404802A (en) | Authority configuration method and apparatus | |
CN107483398A (en) | A kind of silent verification method and device, electronic equipment | |
CN106790315A (en) | A kind of right management method and device | |
CN105722084A (en) | Authentication method based on embedded subscriber identity module, and terminal | |
CN104252352A (en) | Information processing method and electronic equipment | |
CN105722061A (en) | Business management method and business management system for multiple operating systems and terminal | |
CN105933890A (en) | Embedded SIM card realizing method and system, user terminal and server | |
CN107181851A (en) | Call control method and device | |
CN106714147A (en) | Privacy short message protection method | |
CN104080067A (en) | Automatic call transfer method based on NFC | |
CN105245526B (en) | Call the method and apparatus of SIM card application | |
CN105426720A (en) | Method and terminal for modifying registered fingerprints | |
CN107451456A (en) | Mode control method and related product | |
CN105373743B (en) | The calling control method of input method process, call control system and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161109 |