CN106096344A - Business performs method, business performs device and terminal - Google Patents

Business performs method, business performs device and terminal Download PDF

Info

Publication number
CN106096344A
CN106096344A CN201610365157.3A CN201610365157A CN106096344A CN 106096344 A CN106096344 A CN 106096344A CN 201610365157 A CN201610365157 A CN 201610365157A CN 106096344 A CN106096344 A CN 106096344A
Authority
CN
China
Prior art keywords
business
operating system
target service
performs
attribute information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610365157.3A
Other languages
Chinese (zh)
Inventor
邓海丰
左文豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Coolpad Software Technology Co Ltd
Original Assignee
Nanjing Coolpad Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Coolpad Software Technology Co Ltd filed Critical Nanjing Coolpad Software Technology Co Ltd
Priority to CN201610365157.3A priority Critical patent/CN106096344A/en
Priority to PCT/CN2016/087532 priority patent/WO2017201805A1/en
Publication of CN106096344A publication Critical patent/CN106096344A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/06Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a kind of business and perform method, business execution device and terminal, wherein, business performs method and includes: during the first operating system, obtains the request instruction of performance objective business;Judge that target service service agreement based on the embedded user identification module specified performs;When judging that target service service agreement based on the embedded user identification module specified performs, according to the embedded user identification module specified and the corresponding relation of the second operating system, switch to the second operating system performs from the first operating system by target service.By technical solution of the present invention, improve the safety of process of service execution, reduce the menace of Loopholes of OS, improve the experience of user.

Description

Business performs method, business performs device and terminal
Technical field
The present invention relates to field of terminal technology, perform method, a kind of business execution device in particular to a kind of business With a kind of terminal.
Background technology
In the related, embedded user identification module (hereinafter eSIM card, embed-Subscriber Identity Module) concept be by tradition SIM (Subscriber Identity Module) card be directly embedded into terminal Being located in terminal in equipment rather than as independent removable parts, the application of eSIM card can provide terminal use more Many service selection and set meal service.
But, for the terminal of multiple operating system, multiple operating system may for the General Open characteristic of eSIM card Cause the leakage of terminal data, even the property of terminal use is threatened.
Therefore, how to design a kind of new business and carry into execution a plan, become safely urgently to be resolved hurrily improving the data of terminal Technical problem.
Summary of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new business carries into execution a plan, by When obtaining the request instruction of performance objective business, determine the eSIM card that target service is corresponding, and the behaviour that above-mentioned eSIM card is corresponding Make system (user domain), therefore, access rights based on eSIM card Yu operating system, target service is switched to the operation of correspondence System performs, and then truly improves the safety of target service and the data safety of user, improve user's Experience.
In view of this, according to the first aspect of the invention, it is proposed that a kind of business performs method, including: in the first operation In system operation, obtain the request instruction of performance objective business;Judge that whether target service is based on the embedded use specified The service agreement of family identification module performs;Judging that target service is based on the embedded user identification module specified When service agreement performs, according to the embedded user identification module specified and the corresponding relation of the second operating system, by mesh Mark business switches to perform the second operating system from the first operating system.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities, Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature, Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that obtain the request instruction of performance objective business, specifically include following Step: when obtaining the request instruction for arbitrary business, determine the attribute information of arbitrary business;Judge attribute information whether with Preset attribute information matches;When judging attribute information and preset attribute information matches, determine that the business that attribute information is corresponding is Target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein, Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that before the request instruction obtaining performance objective business, also include: Preset the corresponding relation of embedded user identification module and the target service specified.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that also include: judge the target service performed in the second operating system Whether terminate;At the end of judging the target service performed in the second operating system, prompt the user whether running environment from the Two operating systems switch to the first operating system.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical At least one in communication service.
According to the second aspect of the invention, it is also proposed that a kind of business performs device, including acquiring unit, for the During one operating system, obtain the request instruction of performance objective business;Judging unit, is used for whether judging target service Service agreement based on the embedded user identification module specified performs;Switch unit, for judging target service base When the service agreement of the embedded user identification module specified performs, according to the embedded user identification mould specified Block and the corresponding relation of the second operating system, switch to perform the second operating system from the first operating system by target service.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities, Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature, Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that also comprise determining that unit, for obtaining for arbitrary business Request instruction time, determine the attribute information of arbitrary business;Judging unit is additionally operable to: judge attribute information whether with preset attribute Information matches;Determine that unit is additionally operable to: when judging attribute information and preset attribute information matches, determine that attribute information is corresponding Business is target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein, Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that also include: preset unit, for presetting the embedded use specified Family identification module and the corresponding relation of target service.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that judging unit is additionally operable to: judge execution in the second operating system Whether target service terminates;Business performs device and also includes: Tip element, for the mesh performed in judging the second operating system During mark service ending, prompt the user whether from the second operating system, running environment is switched to the first operating system.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical At least one in communication service.
According to the third aspect of the invention we, it is also proposed that a kind of terminal, the business including the most above-mentioned any one performs device, Therefore, this terminal has the technique effect identical with the business execution device any one of technique scheme, the most superfluous at this State.
By above technical scheme, by when obtaining the request instruction of performance objective business, determine that target service is corresponding ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access based on eSIM card Yu operating system Authority, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service Property and the data safety of user, improve the experience of user.
Accompanying drawing explanation
Fig. 1 shows that business according to an embodiment of the invention performs the schematic flow diagram of method;
Fig. 2 shows that business according to an embodiment of the invention performs the schematic block diagram of device;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows that business according to another embodiment of the invention performs the schematic block diagram of device;
Fig. 5 shows that business according to another embodiment of the invention performs the schematic flow diagram of method.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, real with concrete below in conjunction with the accompanying drawings The present invention is further described in detail by mode of executing.It should be noted that in the case of not conflicting, the enforcement of the application Feature in example and embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention, but, the present invention also may be used Implementing to use third party to be different from third party's mode described here, therefore, protection scope of the present invention is not by following The restriction of disclosed specific embodiment.
Fig. 1 shows that business according to an embodiment of the invention performs the schematic flow diagram of method.
As it is shown in figure 1, business according to an embodiment of the invention performs method, including: step 102, the first behaviour Make in system operation, obtain the request instruction of performance objective business;Step 104, it is judged that whether target service is based on appointment Embedded user identification module service agreement perform;Step 106, is judging that target service is embedded based on specify When the service agreement of user identification module performs, according to the embedded user identification module specified and the second operation system The corresponding relation of system, switches to perform the second operating system from the first operating system by target service.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities, Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature, Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that obtain the request instruction of performance objective business, specifically include following Step: when obtaining the request instruction for arbitrary business, determine the attribute information of arbitrary business;Judge attribute information whether with Preset attribute information matches;When judging attribute information and preset attribute information matches, determine that the business that attribute information is corresponding is Target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein, Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that before the request instruction obtaining performance objective business, also include: Preset the corresponding relation of embedded user identification module and the target service specified.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that also include: judge the target service performed in the second operating system Whether terminate;At the end of judging the target service performed in the second operating system, prompt the user whether running environment from the Two operating systems switch to the first operating system.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical At least one in communication service.
Below in conjunction with Fig. 2 to Fig. 5 business according to an embodiment of the invention carried into execution a plan and be specifically described.
Embodiment one:
Fig. 2 shows that business according to an embodiment of the invention performs the schematic block diagram of device.
As in figure 2 it is shown, business according to an embodiment of the invention performs device 200, including: acquiring unit 202, use During the first operating system, obtain the request instruction of performance objective business;Judging unit 204, is used for judging mesh Mark business service agreement based on the embedded user identification module specified performs;Switch unit 206, for sentencing When the business that sets the goal service agreement based on the embedded user identification module specified performs, according to the embedded use specified Family identification module and the corresponding relation of the second operating system, switch to the second operation by target service from the first operating system System performs.
In this technical scheme, by when obtaining the request instruction of performance objective business, determining that target service is corresponding ESIM card, and the operating system (user domain) that above-mentioned eSIM card is corresponding, therefore, access right based on eSIM card Yu operating system Limit, switches to target service perform in the operating system of correspondence, and then truly improves the safety of target service With the data safety of user, improve the experience of user.
Wherein, there is corresponding relation in target service and operating system, and operating system possesses different data access authorities, Namely by the switching of operating system, the data access authority of target service is limited, thus improve the data of terminal Safety.
Specifically, during carrying out operating system switching, if the level of security of the first operating system is less than the second behaviour Make the level of security of system, prompting user's typing authentication information, such as authentication information be the fingerprint characteristic of user, iris feature, Ear stricture of vagina feature and vocal print feature, or the character information of user's input, or the attitudes vibration information of terminal, judge authentication information with When presetting authentication information coupling, carry out the switching of operating system, and based on the second operating system performance objective business after switching.
In any of the above-described technical scheme, it is preferable that also comprise determining that unit 208, for obtaining for arbitrary industry During the request instruction being engaged in, determine the attribute information of arbitrary business;Judging unit 204 is additionally operable to: judge attribute information whether with in advance If attribute information mates;Determine that unit 208 is additionally operable to: when judging attribute information and preset attribute information matches, determine attribute Business corresponding to information is target service.
In this technical scheme, by when obtaining the request instruction of arbitrary business, determining the attribute information of business, and then Judge whether to trigger switching to operating system, while having saved power consumption of terminal, improve the data safety of terminal, wherein, Attribute information includes the level of security of business, the access rights of business and the application program etc. belonging to business.
In any of the above-described technical scheme, it is preferable that also include: preset unit 210, for preset specify embedded User identification module and the corresponding relation of target service.
In this technical scheme, by presetting, the embedded user identification module specified is corresponding with target service to close System, when target service is called, can quickly determine the embedded user identification module of correspondence, and then determine correspondence Operating system.When the business that request instruction is corresponding is non-targeted business, it is not necessary to carry out the switching of operating system, and at non-mesh In mark process of service execution, the private data of terminal all operations system is sightless to non-targeted business.
In any of the above-described technical scheme, it is preferable that judging unit 204 is additionally operable to: judge the second operating system is held Whether the target service of row terminates;Business performs device 200 and also includes: Tip element 212, for judging the second operating system At the end of the target service of middle execution, prompt the user whether from the second operating system, running environment is switched to the first operation system System.
In this technical scheme, by after target service terminates, prompt the user whether to switch with carrying out operating system, enter Improve to one step the safety of terminal data.
In any of the above-described technical scheme, it is preferable that target service includes that speech business, short message service and multimedia are logical At least one in communication service.
Embodiment two:
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As it is shown on figure 3, terminal 300 according to an embodiment of the invention, the business including the most above-mentioned any one performs device 200, therefore, this terminal has the technique effect identical with the business execution device 200 any one of technique scheme, at this Repeat no more.
Embodiment three:
Fig. 4 shows that business according to another embodiment of the invention performs the schematic block diagram of device.
As shown in Figure 4, business according to another embodiment of the invention performs device 400, including: execution can be asked Target service includes that business 1, business 2, business 3 and business 4, business 1 perform corresponding to eSIM1 card, and eSIM1 card closes according to correspondence System can access Secure user data 408 by the second operating system 404, and business 2 performs corresponding to eSIM2 card, and business 3 corresponds to ESIM3 card performs, and business 4 performs corresponding to eSIM4 card, and eSIM2 card, eSIM3 card and eSIM4 card can pass through according to corresponding relation First operating system 402 accesses Secure user data 406.
Specifically, when terminal currently runs the first operating system 402, user asks execution business 1, then switch eSIM1 Card networks and carries out authentication operations, after completing authentication confirmation, switches to the second operating system 404 from the first operating system 402, The offer business 1 access rights to Secure user data 408.
Fig. 5 shows that business according to another embodiment of the invention performs the schematic flow diagram of method.
As it is shown in figure 5, business according to another embodiment of the invention performs method, including: step 502, arrange ESIM card and the first mapping relations of operating system (user domain);Step 504, arranges the second mapping pass of eSIM card and business System, namely eSIM card trigger condition based on operating system (user domain) execution business;Step 506, obtains user's request and carries out The request instruction of arbitrary business;Step 508, determines business pair according to request instruction, the first mapping relations and the second mapping relations The operating system (user domain) answered, and in aforesaid operations system, perform business;Step 510, it is judged that the operation of business is the completeest Become, the most then perform step 512, if it is not, then perform step 514;Step 512, user confirms to exit aforesaid operations system, and Terminate;Step 514, continues executing with business.
Technical scheme is described in detail, it is contemplated that how correlation technique improves terminal above in association with accompanying drawing The technical problem of data safety, the present invention proposes a kind of new business and performs method, by obtaining performance objective business During request instruction, determine the eSIM card that target service is corresponding, and the operating system (user domain) that above-mentioned eSIM card is corresponding, because of This, access rights based on eSIM card Yu operating system, switch to target service the operating system of correspondence performs, Jin Erzhen Improve the safety of target service and the data safety of user in positive meaning, improve the experience of user.
These are only the preferred embodiments of the present invention, be not limited to the present invention, for those skilled in the art For Yuan, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of being made, Equivalent, improvement etc., should be included within the scope of the present invention.

Claims (11)

1. a business performs method, it is characterised in that including:
During the first operating system, obtain the request instruction of performance objective business;
Judge that described target service service agreement based on the embedded user identification module specified performs;
When judging that described target service service agreement based on the described embedded user identification module specified performs, root According to the described embedded user identification module specified and the corresponding relation of the second operating system, by described target service from institute State the first operating system to switch to described second operating system performs.
Business the most according to claim 1 performs method, it is characterised in that the request of described acquisition performance objective business refers to Order, specifically includes following steps:
When obtaining the request instruction for arbitrary business, determine the attribute information of described arbitrary business;
Judge described attribute information whether with preset attribute information matches;
When judging described attribute information and described preset attribute information matches, determine that the business that described attribute information is corresponding is institute State target service.
Business the most according to claim 1 performs method, it is characterised in that in the request of described acquisition performance objective business Before instruction, also include:
Preset the corresponding relation of the described embedded user identification module specified and described target service.
Business the most according to any one of claim 1 to 3 performs method, it is characterised in that also include:
Judge whether the target service performed in described second operating system terminates;
At the end of the target service performed in judging described second operating system, prompt the user whether running environment from described Second operating system switches to described first operating system.
Business the most according to any one of claim 1 to 3 performs method, it is characterised in that described target service includes At least one in speech business, short message service and multimedia communication service.
6. a business performs device, it is characterised in that including:
Acquiring unit, for during the first operating system, obtains the request instruction of performance objective business;
Judging unit, for judging that the service based on the embedded user identification module specified of described target service is assisted View performs;
Switch unit, for judging the service based on the described embedded user identification module specified of described target service When agreement performs, according to the described embedded user identification module specified and the corresponding relation of the second operating system, by institute State target service to switch to described second operating system performs from described first operating system.
Business the most according to claim 6 performs device, it is characterised in that also include:
Determine unit, for when obtaining the request instruction for arbitrary business, determining the attribute information of described arbitrary business;
Described judging unit is additionally operable to: judge described attribute information whether with preset attribute information matches;
Described determine that unit is additionally operable to: when judging described attribute information and described preset attribute information matches, determine described genus Business corresponding to property information is described target service.
Business the most according to claim 6 performs device, it is characterised in that also include:
Presetting unit, for presetting, the described embedded user identification module specified is corresponding with described target service to close System.
9. perform device according to the business according to any one of claim 6 to 8, it is characterised in that
Described judging unit is additionally operable to: judge whether the target service performed in described second operating system terminates;
Described business performs device and also includes:
Tip element, at the end of judging the target service performed in described second operating system, prompt the user whether by Running environment switches to described first operating system from described second operating system.
10. perform device according to the business according to any one of claim 6 to 8, it is characterised in that described target service includes At least one in speech business, short message service and multimedia communication service.
11. 1 kinds of terminals, it is characterised in that including: the business as according to any one of claim 6 to 10 performs device.
CN201610365157.3A 2016-05-26 2016-05-26 Business performs method, business performs device and terminal Pending CN106096344A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610365157.3A CN106096344A (en) 2016-05-26 2016-05-26 Business performs method, business performs device and terminal
PCT/CN2016/087532 WO2017201805A1 (en) 2016-05-26 2016-06-28 Service execution method, service execution device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610365157.3A CN106096344A (en) 2016-05-26 2016-05-26 Business performs method, business performs device and terminal

Publications (1)

Publication Number Publication Date
CN106096344A true CN106096344A (en) 2016-11-09

Family

ID=57229399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610365157.3A Pending CN106096344A (en) 2016-05-26 2016-05-26 Business performs method, business performs device and terminal

Country Status (2)

Country Link
CN (1) CN106096344A (en)
WO (1) WO2017201805A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909330A (en) * 2017-08-31 2018-04-13 平安科技(深圳)有限公司 Work stream data processing method, device, storage medium and computer equipment
WO2020024912A1 (en) * 2018-07-30 2020-02-06 中兴通讯股份有限公司 Operating system switching method, terminal, and computer storage medium
CN116243996A (en) * 2023-05-12 2023-06-09 苏州浪潮智能科技有限公司 Service operation switching method and device, storage medium and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof
CN104463025A (en) * 2014-12-19 2015-03-25 宇龙计算机通信科技(深圳)有限公司 System switching method, system switching device and terminal
CN104507181A (en) * 2014-12-12 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Dual-card dual-standby conversation method, dual-card dual-standby conversation device and dual-card dual-standby conversation terminal
CN105072257A (en) * 2015-07-16 2015-11-18 深圳前海达闼科技有限公司 Double-card double-system terminal and incoming call processing method and apparatus thereof
CN105450828A (en) * 2014-06-30 2016-03-30 展讯通信(深圳)有限公司 Business execution method for multi-card mobile terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8862178B2 (en) * 2010-02-24 2014-10-14 Qualcomm Incorporated Methods and systems for managing participation in multiple wireless networks
KR101954450B1 (en) * 2011-09-05 2019-05-31 주식회사 케이티 Method for Verification of Embedded UICC using eUICC Certificate, Method for Provisioning and MNO Switching, eUICC, MNO System and recording medium for the same
US9510186B2 (en) * 2014-04-04 2016-11-29 Apple Inc. Tamper prevention for electronic subscriber identity module (eSIM) type parameters
US10075841B2 (en) * 2014-09-17 2018-09-11 Simless, Inc. Apparatuses, methods and systems for implementing a trusted subscription management platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450828A (en) * 2014-06-30 2016-03-30 展讯通信(深圳)有限公司 Business execution method for multi-card mobile terminal
CN104159329A (en) * 2014-09-03 2014-11-19 谭卫 Mobile terminal and application method thereof
CN104507181A (en) * 2014-12-12 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Dual-card dual-standby conversation method, dual-card dual-standby conversation device and dual-card dual-standby conversation terminal
CN104463025A (en) * 2014-12-19 2015-03-25 宇龙计算机通信科技(深圳)有限公司 System switching method, system switching device and terminal
CN105072257A (en) * 2015-07-16 2015-11-18 深圳前海达闼科技有限公司 Double-card double-system terminal and incoming call processing method and apparatus thereof

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107909330A (en) * 2017-08-31 2018-04-13 平安科技(深圳)有限公司 Work stream data processing method, device, storage medium and computer equipment
WO2019041925A1 (en) * 2017-08-31 2019-03-07 平安科技(深圳)有限公司 Workflow data processing method and device, storage medium, and computer apparatus
CN107909330B (en) * 2017-08-31 2020-10-09 平安科技(深圳)有限公司 Workflow data processing method and device, storage medium and computer equipment
WO2020024912A1 (en) * 2018-07-30 2020-02-06 中兴通讯股份有限公司 Operating system switching method, terminal, and computer storage medium
CN110780926A (en) * 2018-07-30 2020-02-11 中兴通讯股份有限公司 Switching method of operating system, terminal and computer storage medium
CN116243996A (en) * 2023-05-12 2023-06-09 苏州浪潮智能科技有限公司 Service operation switching method and device, storage medium and electronic device
CN116243996B (en) * 2023-05-12 2023-08-08 苏州浪潮智能科技有限公司 Service operation switching method and device, storage medium and electronic device

Also Published As

Publication number Publication date
WO2017201805A1 (en) 2017-11-30

Similar Documents

Publication Publication Date Title
TWI628944B (en) Methods for enabling an esim on an euicc of a mobile device and related non-transitory computer readable storage medium
CN105631275B (en) information display method, information display device and terminal
CN107944258A (en) Start control method, device, storage medium and the terminal of application with method of service
CN105224838A (en) A kind of user authority control method based on recognition of face and system
CN107944257A (en) Start control method, device, storage medium and the terminal of application with method of service
CN104902074B (en) A kind of mobile phone information safety management method based on more permission modes
CN106096344A (en) Business performs method, business performs device and terminal
CN106126327B (en) A kind of control method and control device of application program launching
CN106778208A (en) The access processing method and device of application program
CN105160302A (en) Multi-model biological recognition general platform and multi-model biological recognition identity authentication method
CN104573463A (en) System switching method, system switching device and terminal
CN105404802A (en) Authority configuration method and apparatus
CN107483398A (en) A kind of silent verification method and device, electronic equipment
CN106790315A (en) A kind of right management method and device
CN105722084A (en) Authentication method based on embedded subscriber identity module, and terminal
CN104252352A (en) Information processing method and electronic equipment
CN105722061A (en) Business management method and business management system for multiple operating systems and terminal
CN105933890A (en) Embedded SIM card realizing method and system, user terminal and server
CN107181851A (en) Call control method and device
CN106714147A (en) Privacy short message protection method
CN104080067A (en) Automatic call transfer method based on NFC
CN105245526B (en) Call the method and apparatus of SIM card application
CN105426720A (en) Method and terminal for modifying registered fingerprints
CN107451456A (en) Mode control method and related product
CN105373743B (en) The calling control method of input method process, call control system and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161109