CN106412226A - Terminal control method and terminal - Google Patents

Terminal control method and terminal Download PDF

Info

Publication number
CN106412226A
CN106412226A CN201610363830.XA CN201610363830A CN106412226A CN 106412226 A CN106412226 A CN 106412226A CN 201610363830 A CN201610363830 A CN 201610363830A CN 106412226 A CN106412226 A CN 106412226A
Authority
CN
China
Prior art keywords
operating system
subscriber identity
identity module
terminal
state
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201610363830.XA
Other languages
Chinese (zh)
Inventor
刘序勤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201610363830.XA priority Critical patent/CN106412226A/en
Publication of CN106412226A publication Critical patent/CN106412226A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)

Abstract

Embodiments of the invention disclose a terminal control method and a terminal. The terminal is provided with a first operation system and a second operation system, wherein the security level of the second operation system is higher than the security level of the first operation system. The method comprises steps of monitoring the state of a user identification card in the terminal; and when the state of any user identification state is monitored invalid, switching a current operation system of the terminal into the second operation system. By switching the operation system of the terminal into the second operation system, the user is facilitated to operation data of a user identification card bound with the operation system in the second operation system, so that the data safety of the terminal is improved.

Description

A kind of control method of terminal and terminal
Technical field
The present invention relates to security technology area, more particularly, to a kind of control method of terminal and terminal.
Background technology
With the popularization of the terminals such as smart mobile phone, terminal plays more and more important in daily life Effect.Meanwhile, how to ensure that the safety of data in terminal becomes the focus of research.
At present, it is mounted with dual operating systems in some terminals, an operating system is for processing daily dialing Phone, the normal operating system receive calls, receive and dispatch note, browsing the operations such as webpage;Another operation system The SOS that system is provided with hardware encryption chip or implements Data Security.In safety operation The operation such as can carry out paying, transfer accounts in system, some are related to payment accounts, account of transferring accounts, individual privacy Deng secure data be saved in SOS binding Subscriber Identity Module in.When in lost terminal, Prior art cannot be effectively protected to the data in terminal.
Content of the invention
The embodiment of the invention discloses a kind of control method of terminal and terminal, it is possible to increase data in terminal Security.
Embodiment of the present invention first aspect provides a kind of control method of terminal, is provided with described terminal First operating system and the second operating system, wherein, the level of security of described second operating system is higher than first The level of security of operating system, methods described includes:
Monitor the state of Subscriber Identity Module in described terminal;
When the state monitoring arbitrary Subscriber Identity Module is disarmed state, by the current operation of described terminal System switches to described second operating system.
Second aspect present invention provides a kind of terminal, is provided with the first operating system and the second behaviour in described terminal Make system, wherein, the level of security of described second operating system is higher than the level of security of the first operating system, Described terminal includes:
Monitoring unit, for monitoring the state of Subscriber Identity Module in described terminal;
Switch unit, the state for monitoring arbitrary Subscriber Identity Module in described monitoring unit is invalid shape During state, the current operation system of described terminal is switched to described second operating system.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system Data in the Subscriber Identity Module of system binding is operated, thus being conducive to improving the security of data in terminal.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to institute in embodiment description Need use accompanying drawing be briefly described it should be apparent that, drawings in the following description are the one of the present invention A little embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, also Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the control method of terminal provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the control method of another kind terminal provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another kind terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another kind terminal provided in an embodiment of the present invention.
Specific embodiment
Embodiments provide a kind of control method of terminal and terminal, it is possible to increase data in terminal Security.
In order that those skilled in the art more fully understand the present invention program, implement below in conjunction with the present invention Accompanying drawing in example, is explicitly described it is clear that described to the technical scheme in the embodiment of the present invention Embodiment is the embodiment of a present invention part, rather than whole embodiments.Based on the enforcement in the present invention Example, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work Example, all should belong to the scope of protection of the invention.
Term " inclusion " in description and claims of this specification and above-mentioned accompanying drawing and they are any Deformation is it is intended that cover non-exclusive comprising.For example comprise process, the method for series of steps or unit Or system, product or equipment are not limited to step or the unit listed, but alternatively also include not having The step listed or unit, or alternatively also include intrinsic for these processes, method, product or equipment Other steps or unit.Additionally, term " first ", " second " and " the 3rd " etc. is for distinguishing difference Object, not for description particular order.
Refer to Fig. 1, Fig. 1 is a kind of schematic flow sheet of the control method of terminal, it should be noted that First operating system and the second operating system, wherein, the level of security of the second operating system are installed in terminal Higher than the level of security of the first operating system, as shown in figure 1, one kind that one embodiment of the present of invention provides The control method of terminal can include:
101st, in monitoring terminal Subscriber Identity Module state.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine Measure state etc..
102nd, when the state monitoring arbitrary Subscriber Identity Module is disarmed state, working as described terminal Front operating system switches to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state, Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid During state, then the current operation system of described terminal is switched to described second operating system.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.
Refer to Fig. 2, Fig. 2 is that the flow process of the control method of another kind terminal provided in an embodiment of the present invention is shown It is intended to, it should be noted that being provided with the first operating system and the second operating system in terminal, wherein, the The level of security of two operating systems is higher than the level of security of the first operating system, as shown in Fig. 2 the present invention A kind of control method of terminal that another embodiment provides can include:
201st, in monitoring terminal Subscriber Identity Module state.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine Measure state etc..
202nd, when the state monitoring arbitrary Subscriber Identity Module is disarmed state, working as described terminal Front operating system switches to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state, Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid During state, then the current operation system of described terminal is switched to described second operating system.
203rd, show the locking interface of described second operating system in the display interface of described terminal.
Optionally, in some possible embodiments in the present invention, if the unlocking pin of the second operating system is logical When crossing display interface input, locking interface can include Password Input region.If it is understood that second When the unlocking pin of operating system is the fingerprint being obtained by the fingerprint identification module at the terminal back side, locking screen interface In can not include Password Input region.
204th, obtain the unlocking pin of described second operating system of user input.
Optionally, in some possible embodiments in the present invention, if unlocking pin is the password at locking interface The word of input area input, character or pattern, then user is defeated in the locking interface of the second operating system Enter unlocking pin.If unlocking pin is fingerprint, and fingerprint identification module be located at terminal the back side when, Yong Huke To input fingerprint by pressing fingerprint identification module.
205th, pre- with described second operating system in the unlocking pin of described second operating system of user input If unlocking pin unmatched in the case of, by described second operating system binding Subscriber Identity Module in number According to being set to by guard mode.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding Data in card is set to by guard mode, can be the user's knowledge deleted with described second operating system binding Not Ka in data.Disabled user so can be avoided to obtain in the Subscriber Identity Module of the second operating system binding Data.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding Data in card is set to by guard mode, can be by the user's identification with described second operating system binding Data in card is locked.Data in Subscriber Identity Module is carried out locking can be specifically:Setting is right When data in Subscriber Identity Module carries out replicating, the operation such as pastes, changes, deleting, described operation is unavailable.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding Data in card is set to by guard mode, can be in the Subscriber Identity Module bound with the second operating system Data be encrypted.By being encrypted with the data in the Subscriber Identity Module of the second operating system binding, Disabled user can be avoided to obtain the data in the Subscriber Identity Module of the second operating system binding.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system;Then display the The locking interface of two operating systems, obtains the unlocking pin of the second operating system of user input;Defeated in user In the case of the unlocking pin of the second operating system entering is unmatched with default unlocking pin, second is operated Data in the Subscriber Identity Module of system binding is set to by guard mode.Therefore, using the embodiment of the present invention The technical scheme providing, by being set to the data in Subscriber Identity Module by guard mode, can avoid using Data in the identification card of family is obtained by disabled user, improves the security of data in terminal.
Refer to Fig. 3, Fig. 3 is a kind of structural representation of terminal, terminal 300 disclosed in the embodiment of the present invention In the first operating system and the second operating system are installed, wherein, the level of security of the second operating system is higher than The level of security of the first operating system, as shown in figure 3, described device includes:
Monitoring unit 310, for monitoring the state of Subscriber Identity Module in described terminal.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine Measure state etc..
Switch unit 320, for monitoring the state of arbitrary Subscriber Identity Module in described monitoring unit 310 During for disarmed state, the current operation system of described terminal is switched to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state, Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid During state, then the current operation system of described terminal is switched to described second operating system.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.
Refer to Fig. 4, Fig. 4 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention, terminal 400 In the first operating system and the second operating system are installed, wherein, the level of security of the second operating system is higher than The level of security of the first operating system, as shown in figure 4, described device includes:
Monitoring unit 410, for monitoring the state of Subscriber Identity Module in described terminal.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine Measure state etc..
Switch unit 420, for monitoring the state of arbitrary Subscriber Identity Module in described monitoring unit 410 During for disarmed state, the current operation system of described terminal is switched to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state, Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid During state, then the current operation system of described terminal is switched to described second operating system.
Display unit 430, for showing the lock of described second operating system in the display interface of described terminal Demarcation face.
Optionally, in some possible embodiments in the present invention, if the unlocking pin of the second operating system is logical When crossing display interface input, locking interface can include Password Input region.If it is understood that second When the unlocking pin of operating system is the fingerprint being obtained by the fingerprint identification module at the terminal back side, locking screen interface In can not include Password Input region.
Acquiring unit 440, for obtaining the unlocking pin of described second operating system of user input.
Optionally, in some possible embodiments in the present invention, if unlocking pin is the password at locking interface The word of input area input, character or pattern, then user is defeated in the locking interface of the second operating system Enter unlocking pin.If unlocking pin is fingerprint, and fingerprint identification module be located at terminal the back side when, Yong Huke To input fingerprint by pressing fingerprint identification module.
Processing unit 450, described second operating system of the user input for obtaining in described acquiring unit Unlocking pin unmatched with the default unlocking pin of described second operating system in the case of, by described second Data in the Subscriber Identity Module of operating system binding is set to by guard mode.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding Data in card is set to by guard mode, can be the user's knowledge deleted with described second operating system binding Not Ka in data.Disabled user so can be avoided to obtain in the Subscriber Identity Module of the second operating system binding Data.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding Data in card is set to by guard mode, can be by the user's identification with described second operating system binding Data in card is locked.Data in Subscriber Identity Module is carried out locking can be specifically:Setting is right When data in Subscriber Identity Module carries out replicating, the operation such as pastes, changes, deleting, described operation is unavailable.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding Data in card is set to by guard mode, can be in the Subscriber Identity Module bound with the second operating system Data be encrypted.By being encrypted with the data in the Subscriber Identity Module of the second operating system binding, Disabled user can be avoided to obtain the data in the Subscriber Identity Module of the second operating system binding.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system;Then display the The locking interface of two operating systems, obtains the unlocking pin of the second operating system of user input;Defeated in user In the case of the unlocking pin of the second operating system entering is unmatched with default unlocking pin, second is operated Data in the Subscriber Identity Module of system binding is set to by guard mode.Therefore, using the embodiment of the present invention The technical scheme providing, by being set to the data in Subscriber Identity Module by guard mode, can avoid using Data in the identification card of family is obtained by disabled user, improves the security of data in terminal.
Refer to Fig. 5, Fig. 5 is a kind of structural representation of terminal disclosed in the embodiment of the present invention.Wherein, eventually End 500 may include:At least one processor 510, memory 520, user interface 530 and at least one communication are total Line 540.Wherein, communication bus 540 is used for realizing the connection communication between these assemblies.
Wherein, user interface 530 can include the devices such as touch-screen or fingerprint identification module, can be used for The unlocking pin of receiving user's input.
Memory 520 can include read-only storage and random access memory, can be used for storing default Unlocking pin, and for store program codes and to processor 510 provide instruction and data.
In an embodiment of the present invention, by calling program code or the instruction of memory 520 storage, process Device 510 is used for monitoring the state of Subscriber Identity Module in described terminal 500;Monitoring arbitrary user's identification When the state of card is disarmed state, the current operation system of described terminal is switched to described second operating system.
Optionally, in some possible embodiments in the present invention, the display interface of described terminal shows institute State the locking interface of the second operating system;Obtain the unlocking pin of described second operating system of user input; Unlocking pin default unblock with described second operating system in described second operating system of user input In the case of password is unmatched, the data in the Subscriber Identity Module of described second operating system binding is set to By guard mode.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state, Or it is not detected by state etc..Such as, when user does not find terminal, during lost terminal, user can arrive At least one Subscriber Identity Module in terminal is reported the loss by business hall or login carrier web site, Subscriber Identity Module After being reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is the use being reported the loss The state of family identification card is:It is reported the loss.If lost terminal, at least one user in terminal is known by disabled user When Ka not pull, the state of the Subscriber Identity Module being unplugged is disarmed state, that is, in user's identification draw-in groove It is not detected by the presence of Subscriber Identity Module.
Optionally, in some possible embodiments in the present invention, described by described second operating system binding Data in Subscriber Identity Module is set to by guard mode, including:Delete and described second operating system binding Subscriber Identity Module in data.
Optionally, in some possible embodiments in the present invention, described by described second operating system binding Data in Subscriber Identity Module is set to by guard mode, including:Locking and described second operating system binding Subscriber Identity Module in data or to described second operating system binding Subscriber Identity Module in number According to being encrypted.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.Enter One step ground, can also show the locking interface of the second operating system, obtain the second operating system of user input Unlocking pin;Mismatch with default unlocking pin in the unlocking pin of the second operating system of user input In the case of, the data in the Subscriber Identity Module of the second operating system binding is set to by guard mode.Logical Cross and the data in Subscriber Identity Module is set to by guard mode, the data quilt in Subscriber Identity Module can be avoided Disabled user obtains, and can further improve the security of data in terminal.
The embodiment of the present invention also provides a kind of computer-readable storage medium, and wherein, this computer-readable storage medium can be deposited Contain program, during this program performing, include the controlling party of any terminal described in said method embodiment The part or all of step of method.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all stated For a series of combination of actions, but those skilled in the art should know, the present invention is not subject to described The restriction of sequence of movement, because according to the present invention, some steps can be carried out using other orders or simultaneously. Secondly, those skilled in the art also should know, embodiment described in this description belongs to be preferable to carry out , necessary to involved action and the module not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, in certain embodiment not in detail The part stated, may refer to the associated description of other embodiment.
It should be understood that disclosed device in several embodiments provided herein, can be passed through it Its mode is realized.For example, device embodiment described above is only illustrative, for example described unit Division, only a kind of division of logic function, actual can have other dividing mode, for example when realizing Multiple units or assembly can in conjunction with or be desirably integrated into another system, or some features can be ignored, Or do not execute.Another, shown or discussed coupling each other or direct-coupling or communication connection can To be by some interfaces, the INDIRECT COUPLING of device or unit or communication connection, can be electrical or other Form.
The described unit illustrating as separating component can be or may not be physically separate, as The part that unit shows can be or may not be physical location, you can with positioned at a place, or Can also be distributed on multiple NEs.Can select therein some or all of according to the actual needs Unit is realizing the purpose of this embodiment scheme.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing unit, Can also be that unit is individually physically present it is also possible to two or more units are integrated in a unit In.Above-mentioned integrated unit both can be to be realized in the form of hardware, it would however also be possible to employ SFU software functional unit Form is realized.
If described integrated unit is realized and as independent production marketing using in the form of SFU software functional unit Or when using, can be stored in a computer read/write memory medium.Based on such understanding, this Part that bright technical scheme substantially contributes to prior art in other words or this technical scheme complete Portion or partly can be embodied in the form of software product, this computer software product is stored in a storage In medium, including some instructions with so that computer equipment (can for personal computer, server or Person's network equipment etc.) execution each embodiment methods described of the present invention all or part of step.And it is aforesaid Storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various permissible The medium of store program codes.
The above, above example only in order to technical scheme to be described, is not intended to limit;To the greatest extent Pipe has been described in detail to the present invention with reference to the foregoing embodiments, and those of ordinary skill in the art should manage Solution:It still can be modified to the technical scheme described in foregoing embodiments, or to wherein part Technical characteristic carries out equivalent;And these modifications or replacement, so that the essence of appropriate technical solution is taken off Scope from various embodiments of the present invention technical scheme.

Claims (10)

1. a kind of control method of terminal is it is characterised in that be provided with the first operating system in described terminal With the second operating system, wherein, the level of security of described second operating system is higher than the peace of the first operating system Full rank, methods described includes:
Monitor the state of Subscriber Identity Module in described terminal;
When the state monitoring arbitrary Subscriber Identity Module is disarmed state, by the current operation of described terminal System switches to described second operating system.
2. method according to claim 1 is it is characterised in that described current by described terminal After operating system switches to described second operating system, methods described also includes:
The locking interface of described second operating system is shown in the display interface of described terminal;
Obtain the unlocking pin of described second operating system of user input;
Default with described second operating system in the unlocking pin of described second operating system of user input In the case of unlocking pin is unmatched, the data in the Subscriber Identity Module of described second operating system binding is set It is set to by guard mode.
3. method according to claim 2 it is characterised in that described by described second operating system Data in the Subscriber Identity Module of binding is set to by guard mode, including:
Delete and the data in the Subscriber Identity Module of described second operating system binding.
4. method according to claim 2 it is characterised in that described by described second operating system Data in the Subscriber Identity Module of binding is set to by guard mode, including:
Locking with described second operating system binding Subscriber Identity Module in data or
It is encrypted to the data in the Subscriber Identity Module of described second operating system binding.
5. the method according to any one of claim 1 to 5 is it is characterised in that described user's identification The state of card is disarmed state, including:
Subscriber Identity Module is reported the loss or is not detected by Subscriber Identity Module.
6. a kind of terminal is it is characterised in that be provided with the first operating system and the second operation in described terminal System, wherein, the level of security of described second operating system is higher than the level of security of the first operating system, institute State device to include:
Monitoring unit, for monitoring the state of Subscriber Identity Module in described terminal;
Switch unit, the state for monitoring arbitrary Subscriber Identity Module in described monitoring unit is invalid shape During state, the current operation system of described terminal is switched to described second operating system.
7. terminal according to claim 6 is it is characterised in that described terminal also includes:
Display unit, for showing locking circle of described second operating system in the display interface of described terminal Face;
Acquiring unit, for obtaining the unlocking pin of described second operating system of user input;
Processing unit, the solution of described second operating system of user input for obtaining in described acquiring unit In the case of lock cipher is unmatched with the default unlocking pin of described second operating system, described second is operated Data in the Subscriber Identity Module of system binding is set to by guard mode.
8. terminal according to claim 7 is it is characterised in that tying up described second operating system Data in fixed Subscriber Identity Module is set to by guard mode aspect, described processing unit specifically for:
Delete and the data in the Subscriber Identity Module of described second operating system binding.
9. terminal according to claim 7 is it is characterised in that tying up described second operating system Data in fixed Subscriber Identity Module is set to by guard mode aspect, described processing unit specifically for:
Locking with described second operating system binding Subscriber Identity Module in data or
It is encrypted to the data in the Subscriber Identity Module of described second operating system binding.
10. the terminal according to any one of claim 6 to 9 is it is characterised in that described user's identification The state of card is disarmed state, including:
Subscriber Identity Module is reported the loss or is not detected by Subscriber Identity Module.
CN201610363830.XA 2016-05-26 2016-05-26 Terminal control method and terminal Withdrawn CN106412226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610363830.XA CN106412226A (en) 2016-05-26 2016-05-26 Terminal control method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610363830.XA CN106412226A (en) 2016-05-26 2016-05-26 Terminal control method and terminal

Publications (1)

Publication Number Publication Date
CN106412226A true CN106412226A (en) 2017-02-15

Family

ID=58005419

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610363830.XA Withdrawn CN106412226A (en) 2016-05-26 2016-05-26 Terminal control method and terminal

Country Status (1)

Country Link
CN (1) CN106412226A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020024912A1 (en) * 2018-07-30 2020-02-06 中兴通讯股份有限公司 Operating system switching method, terminal, and computer storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130227270A1 (en) * 2012-02-23 2013-08-29 Wistron Corp. Electronic devices and methods for switching between dual operating systems
CN104239140A (en) * 2014-09-01 2014-12-24 深圳市中兴移动通信有限公司 Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
CN104468611A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Data security processing method and device based on dual-system switching
CN105260667A (en) * 2015-10-08 2016-01-20 青岛海信移动通信技术股份有限公司 Mobile terminal information confidential method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130227270A1 (en) * 2012-02-23 2013-08-29 Wistron Corp. Electronic devices and methods for switching between dual operating systems
CN104239140A (en) * 2014-09-01 2014-12-24 深圳市中兴移动通信有限公司 Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal
CN104468611A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Data security processing method and device based on dual-system switching
CN105260667A (en) * 2015-10-08 2016-01-20 青岛海信移动通信技术股份有限公司 Mobile terminal information confidential method and mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020024912A1 (en) * 2018-07-30 2020-02-06 中兴通讯股份有限公司 Operating system switching method, terminal, and computer storage medium
CN110780926A (en) * 2018-07-30 2020-02-11 中兴通讯股份有限公司 Switching method of operating system, terminal and computer storage medium

Similar Documents

Publication Publication Date Title
CN103620606B (en) Store detection means, system and storage detection method
EP2472926B1 (en) Method and system for controlling an intelligent card remotely
CN101511083B (en) Authentication method and terminal for telecom smart card
CN106850209A (en) A kind of identity identifying method and device
CN103336924A (en) Starting lock for mobile terminal application program
CN105187599B (en) A kind of method for managing contact person information and terminal
CN102497465A (en) High-secrecy mobile information safety system and safety method for distributed secret keys
CN101997960A (en) High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking
CN106096450A (en) A kind of application program freezing method and mobile terminal
CN102843472A (en) Mobile terminal and incoming call screen locking method used therefor
CN103269402A (en) System and method for protecting mobile phone privacy
CN104376467A (en) Method and device for controlling non-contact card swiping of intelligent cards on basis of NFC (near field communication) technologies
CN106648384A (en) Method and device for service calling
CN107622232A (en) Solve lock control method and Related product
CN105224194A (en) A kind of data processing method and terminal
CN104732165B (en) A kind of management method and terminal of application
CN105225113A (en) A kind of information processing method and electronic equipment
CN106412226A (en) Terminal control method and terminal
CN106569918A (en) Data backup method and mobile terminal
CN105516500A (en) Method and system for selecting device mode
CN103002430A (en) Method, device and system for binding terminal applications to terminal numbers
CN108540591A (en) Book management method, address book management device and electronic equipment
CN105678149A (en) Unlocking method and terminal
CN115511024A (en) Multi-card-type instant card making method, system, equipment and medium
CN109347791A (en) Double I/O bus SIM cards

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20170215

WW01 Invention patent application withdrawn after publication