CN106412226A - Terminal control method and terminal - Google Patents
Terminal control method and terminal Download PDFInfo
- Publication number
- CN106412226A CN106412226A CN201610363830.XA CN201610363830A CN106412226A CN 106412226 A CN106412226 A CN 106412226A CN 201610363830 A CN201610363830 A CN 201610363830A CN 106412226 A CN106412226 A CN 106412226A
- Authority
- CN
- China
- Prior art keywords
- operating system
- subscriber identity
- identity module
- terminal
- state
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
Embodiments of the invention disclose a terminal control method and a terminal. The terminal is provided with a first operation system and a second operation system, wherein the security level of the second operation system is higher than the security level of the first operation system. The method comprises steps of monitoring the state of a user identification card in the terminal; and when the state of any user identification state is monitored invalid, switching a current operation system of the terminal into the second operation system. By switching the operation system of the terminal into the second operation system, the user is facilitated to operation data of a user identification card bound with the operation system in the second operation system, so that the data safety of the terminal is improved.
Description
Technical field
The present invention relates to security technology area, more particularly, to a kind of control method of terminal and terminal.
Background technology
With the popularization of the terminals such as smart mobile phone, terminal plays more and more important in daily life
Effect.Meanwhile, how to ensure that the safety of data in terminal becomes the focus of research.
At present, it is mounted with dual operating systems in some terminals, an operating system is for processing daily dialing
Phone, the normal operating system receive calls, receive and dispatch note, browsing the operations such as webpage;Another operation system
The SOS that system is provided with hardware encryption chip or implements Data Security.In safety operation
The operation such as can carry out paying, transfer accounts in system, some are related to payment accounts, account of transferring accounts, individual privacy
Deng secure data be saved in SOS binding Subscriber Identity Module in.When in lost terminal,
Prior art cannot be effectively protected to the data in terminal.
Content of the invention
The embodiment of the invention discloses a kind of control method of terminal and terminal, it is possible to increase data in terminal
Security.
Embodiment of the present invention first aspect provides a kind of control method of terminal, is provided with described terminal
First operating system and the second operating system, wherein, the level of security of described second operating system is higher than first
The level of security of operating system, methods described includes:
Monitor the state of Subscriber Identity Module in described terminal;
When the state monitoring arbitrary Subscriber Identity Module is disarmed state, by the current operation of described terminal
System switches to described second operating system.
Second aspect present invention provides a kind of terminal, is provided with the first operating system and the second behaviour in described terminal
Make system, wherein, the level of security of described second operating system is higher than the level of security of the first operating system,
Described terminal includes:
Monitoring unit, for monitoring the state of Subscriber Identity Module in described terminal;
Switch unit, the state for monitoring arbitrary Subscriber Identity Module in described monitoring unit is invalid shape
During state, the current operation system of described terminal is switched to described second operating system.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal
Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system
Data in the Subscriber Identity Module of system binding is operated, thus being conducive to improving the security of data in terminal.
Brief description
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, below will be to institute in embodiment description
Need use accompanying drawing be briefly described it should be apparent that, drawings in the following description are the one of the present invention
A little embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, also
Other accompanying drawings can be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow sheet of the control method of terminal provided in an embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the control method of another kind terminal provided in an embodiment of the present invention;
Fig. 3 is a kind of structural representation of terminal provided in an embodiment of the present invention;
Fig. 4 is the structural representation of another kind terminal provided in an embodiment of the present invention;
Fig. 5 is the structural representation of another kind terminal provided in an embodiment of the present invention.
Specific embodiment
Embodiments provide a kind of control method of terminal and terminal, it is possible to increase data in terminal
Security.
In order that those skilled in the art more fully understand the present invention program, implement below in conjunction with the present invention
Accompanying drawing in example, is explicitly described it is clear that described to the technical scheme in the embodiment of the present invention
Embodiment is the embodiment of a present invention part, rather than whole embodiments.Based on the enforcement in the present invention
Example, the every other enforcement that those of ordinary skill in the art are obtained under the premise of not making creative work
Example, all should belong to the scope of protection of the invention.
Term " inclusion " in description and claims of this specification and above-mentioned accompanying drawing and they are any
Deformation is it is intended that cover non-exclusive comprising.For example comprise process, the method for series of steps or unit
Or system, product or equipment are not limited to step or the unit listed, but alternatively also include not having
The step listed or unit, or alternatively also include intrinsic for these processes, method, product or equipment
Other steps or unit.Additionally, term " first ", " second " and " the 3rd " etc. is for distinguishing difference
Object, not for description particular order.
Refer to Fig. 1, Fig. 1 is a kind of schematic flow sheet of the control method of terminal, it should be noted that
First operating system and the second operating system, wherein, the level of security of the second operating system are installed in terminal
Higher than the level of security of the first operating system, as shown in figure 1, one kind that one embodiment of the present of invention provides
The control method of terminal can include:
101st, in monitoring terminal Subscriber Identity Module state.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one
Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module
System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system
The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal
Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine
Measure state etc..
102nd, when the state monitoring arbitrary Subscriber Identity Module is disarmed state, working as described terminal
Front operating system switches to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state,
Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use
At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user
After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung
The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal
When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module
It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid
During state, then the current operation system of described terminal is switched to described second operating system.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal
Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system
Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.
Refer to Fig. 2, Fig. 2 is that the flow process of the control method of another kind terminal provided in an embodiment of the present invention is shown
It is intended to, it should be noted that being provided with the first operating system and the second operating system in terminal, wherein, the
The level of security of two operating systems is higher than the level of security of the first operating system, as shown in Fig. 2 the present invention
A kind of control method of terminal that another embodiment provides can include:
201st, in monitoring terminal Subscriber Identity Module state.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one
Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module
System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system
The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal
Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine
Measure state etc..
202nd, when the state monitoring arbitrary Subscriber Identity Module is disarmed state, working as described terminal
Front operating system switches to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state,
Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use
At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user
After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung
The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal
When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module
It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid
During state, then the current operation system of described terminal is switched to described second operating system.
203rd, show the locking interface of described second operating system in the display interface of described terminal.
Optionally, in some possible embodiments in the present invention, if the unlocking pin of the second operating system is logical
When crossing display interface input, locking interface can include Password Input region.If it is understood that second
When the unlocking pin of operating system is the fingerprint being obtained by the fingerprint identification module at the terminal back side, locking screen interface
In can not include Password Input region.
204th, obtain the unlocking pin of described second operating system of user input.
Optionally, in some possible embodiments in the present invention, if unlocking pin is the password at locking interface
The word of input area input, character or pattern, then user is defeated in the locking interface of the second operating system
Enter unlocking pin.If unlocking pin is fingerprint, and fingerprint identification module be located at terminal the back side when, Yong Huke
To input fingerprint by pressing fingerprint identification module.
205th, pre- with described second operating system in the unlocking pin of described second operating system of user input
If unlocking pin unmatched in the case of, by described second operating system binding Subscriber Identity Module in number
According to being set to by guard mode.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding
Data in card is set to by guard mode, can be the user's knowledge deleted with described second operating system binding
Not Ka in data.Disabled user so can be avoided to obtain in the Subscriber Identity Module of the second operating system binding
Data.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding
Data in card is set to by guard mode, can be by the user's identification with described second operating system binding
Data in card is locked.Data in Subscriber Identity Module is carried out locking can be specifically:Setting is right
When data in Subscriber Identity Module carries out replicating, the operation such as pastes, changes, deleting, described operation is unavailable.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding
Data in card is set to by guard mode, can be in the Subscriber Identity Module bound with the second operating system
Data be encrypted.By being encrypted with the data in the Subscriber Identity Module of the second operating system binding,
Disabled user can be avoided to obtain the data in the Subscriber Identity Module of the second operating system binding.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal
Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system
Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system;Then display the
The locking interface of two operating systems, obtains the unlocking pin of the second operating system of user input;Defeated in user
In the case of the unlocking pin of the second operating system entering is unmatched with default unlocking pin, second is operated
Data in the Subscriber Identity Module of system binding is set to by guard mode.Therefore, using the embodiment of the present invention
The technical scheme providing, by being set to the data in Subscriber Identity Module by guard mode, can avoid using
Data in the identification card of family is obtained by disabled user, improves the security of data in terminal.
Refer to Fig. 3, Fig. 3 is a kind of structural representation of terminal, terminal 300 disclosed in the embodiment of the present invention
In the first operating system and the second operating system are installed, wherein, the level of security of the second operating system is higher than
The level of security of the first operating system, as shown in figure 3, described device includes:
Monitoring unit 310, for monitoring the state of Subscriber Identity Module in described terminal.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one
Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module
System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system
The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal
Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine
Measure state etc..
Switch unit 320, for monitoring the state of arbitrary Subscriber Identity Module in described monitoring unit 310
During for disarmed state, the current operation system of described terminal is switched to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state,
Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use
At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user
After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung
The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal
When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module
It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid
During state, then the current operation system of described terminal is switched to described second operating system.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal
Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system
Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.
Refer to Fig. 4, Fig. 4 is the structural representation of another kind of terminal disclosed in the embodiment of the present invention, terminal 400
In the first operating system and the second operating system are installed, wherein, the level of security of the second operating system is higher than
The level of security of the first operating system, as shown in figure 4, described device includes:
Monitoring unit 410, for monitoring the state of Subscriber Identity Module in described terminal.
Optionally, in some possible embodiments in the present invention, each operating system can respectively bind one
Subscriber Identity Module, can also an operation system it is also possible to two operating systems bind same Subscriber Identity Module
System binds multiple Subscriber Identity Modules.
Monitoring is tied up with the state of each Subscriber Identity Module of the first operating system binding and with the second operating system
The state of fixed each Subscriber Identity Module, the wherein first operating system and the second operating system are to install in the terminal
Operating system, specifically, can be the same or different.
The state of wherein Subscriber Identity Module potentially includes:Normal operating conditions, it is reported the loss state or does not examine
Measure state etc..
Switch unit 420, for monitoring the state of arbitrary Subscriber Identity Module in described monitoring unit 410
During for disarmed state, the current operation system of described terminal is switched to described second operating system.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state,
Or it is not detected by state etc..Such as, when user does not find terminal or confirms lost terminal, use
At least one Subscriber Identity Module in terminal can be reported the loss by family to business hall or login carrier web site, user
After identification card is reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is to be hung
The state of the Subscriber Identity Module losing is to be reported the loss.If lost terminal, disabled user is by least one use in terminal
When family identification card pulls, the state of the Subscriber Identity Module being unplugged is disarmed state, i.e. Subscriber Identity Module
It is not detected by the presence of Subscriber Identity Module in groove.If monitoring, the state of arbitrary Subscriber Identity Module is invalid
During state, then the current operation system of described terminal is switched to described second operating system.
Display unit 430, for showing the lock of described second operating system in the display interface of described terminal
Demarcation face.
Optionally, in some possible embodiments in the present invention, if the unlocking pin of the second operating system is logical
When crossing display interface input, locking interface can include Password Input region.If it is understood that second
When the unlocking pin of operating system is the fingerprint being obtained by the fingerprint identification module at the terminal back side, locking screen interface
In can not include Password Input region.
Acquiring unit 440, for obtaining the unlocking pin of described second operating system of user input.
Optionally, in some possible embodiments in the present invention, if unlocking pin is the password at locking interface
The word of input area input, character or pattern, then user is defeated in the locking interface of the second operating system
Enter unlocking pin.If unlocking pin is fingerprint, and fingerprint identification module be located at terminal the back side when, Yong Huke
To input fingerprint by pressing fingerprint identification module.
Processing unit 450, described second operating system of the user input for obtaining in described acquiring unit
Unlocking pin unmatched with the default unlocking pin of described second operating system in the case of, by described second
Data in the Subscriber Identity Module of operating system binding is set to by guard mode.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding
Data in card is set to by guard mode, can be the user's knowledge deleted with described second operating system binding
Not Ka in data.Disabled user so can be avoided to obtain in the Subscriber Identity Module of the second operating system binding
Data.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding
Data in card is set to by guard mode, can be by the user's identification with described second operating system binding
Data in card is locked.Data in Subscriber Identity Module is carried out locking can be specifically:Setting is right
When data in Subscriber Identity Module carries out replicating, the operation such as pastes, changes, deleting, described operation is unavailable.
Optionally, in some possible embodiments in the present invention, by the user's identification of the second operating system binding
Data in card is set to by guard mode, can be in the Subscriber Identity Module bound with the second operating system
Data be encrypted.By being encrypted with the data in the Subscriber Identity Module of the second operating system binding,
Disabled user can be avoided to obtain the data in the Subscriber Identity Module of the second operating system binding.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system;Then display the
The locking interface of two operating systems, obtains the unlocking pin of the second operating system of user input;Defeated in user
In the case of the unlocking pin of the second operating system entering is unmatched with default unlocking pin, second is operated
Data in the Subscriber Identity Module of system binding is set to by guard mode.Therefore, using the embodiment of the present invention
The technical scheme providing, by being set to the data in Subscriber Identity Module by guard mode, can avoid using
Data in the identification card of family is obtained by disabled user, improves the security of data in terminal.
Refer to Fig. 5, Fig. 5 is a kind of structural representation of terminal disclosed in the embodiment of the present invention.Wherein, eventually
End 500 may include:At least one processor 510, memory 520, user interface 530 and at least one communication are total
Line 540.Wherein, communication bus 540 is used for realizing the connection communication between these assemblies.
Wherein, user interface 530 can include the devices such as touch-screen or fingerprint identification module, can be used for
The unlocking pin of receiving user's input.
Memory 520 can include read-only storage and random access memory, can be used for storing default
Unlocking pin, and for store program codes and to processor 510 provide instruction and data.
In an embodiment of the present invention, by calling program code or the instruction of memory 520 storage, process
Device 510 is used for monitoring the state of Subscriber Identity Module in described terminal 500;Monitoring arbitrary user's identification
When the state of card is disarmed state, the current operation system of described terminal is switched to described second operating system.
Optionally, in some possible embodiments in the present invention, the display interface of described terminal shows institute
State the locking interface of the second operating system;Obtain the unlocking pin of described second operating system of user input;
Unlocking pin default unblock with described second operating system in described second operating system of user input
In the case of password is unmatched, the data in the Subscriber Identity Module of described second operating system binding is set to
By guard mode.
Optionally, in some possible embodiments in the present invention, disarmed state can include:Be reported the loss state,
Or it is not detected by state etc..Such as, when user does not find terminal, during lost terminal, user can arrive
At least one Subscriber Identity Module in terminal is reported the loss by business hall or login carrier web site, Subscriber Identity Module
After being reported the loss, during the state of the Subscriber Identity Module that terminal monitoring is reported the loss, the result of monitoring is the use being reported the loss
The state of family identification card is:It is reported the loss.If lost terminal, at least one user in terminal is known by disabled user
When Ka not pull, the state of the Subscriber Identity Module being unplugged is disarmed state, that is, in user's identification draw-in groove
It is not detected by the presence of Subscriber Identity Module.
Optionally, in some possible embodiments in the present invention, described by described second operating system binding
Data in Subscriber Identity Module is set to by guard mode, including:Delete and described second operating system binding
Subscriber Identity Module in data.
Optionally, in some possible embodiments in the present invention, described by described second operating system binding
Data in Subscriber Identity Module is set to by guard mode, including:Locking and described second operating system binding
Subscriber Identity Module in data or to described second operating system binding Subscriber Identity Module in number
According to being encrypted.
As can be seen that adopting technical scheme provided in an embodiment of the present invention, monitoring arbitrary user's identification
When the state of card is disarmed state, the operating system of terminal is switched to the second operating system.By by terminal
Operating system switch to the second operating system, be conducive to user under the second operating system to this operation system
Data in the Subscriber Identity Module of system binding is operated, thus improve the security of data in terminal.Enter
One step ground, can also show the locking interface of the second operating system, obtain the second operating system of user input
Unlocking pin;Mismatch with default unlocking pin in the unlocking pin of the second operating system of user input
In the case of, the data in the Subscriber Identity Module of the second operating system binding is set to by guard mode.Logical
Cross and the data in Subscriber Identity Module is set to by guard mode, the data quilt in Subscriber Identity Module can be avoided
Disabled user obtains, and can further improve the security of data in terminal.
The embodiment of the present invention also provides a kind of computer-readable storage medium, and wherein, this computer-readable storage medium can be deposited
Contain program, during this program performing, include the controlling party of any terminal described in said method embodiment
The part or all of step of method.
It should be noted that for aforesaid each method embodiment, in order to be briefly described, therefore it is all stated
For a series of combination of actions, but those skilled in the art should know, the present invention is not subject to described
The restriction of sequence of movement, because according to the present invention, some steps can be carried out using other orders or simultaneously.
Secondly, those skilled in the art also should know, embodiment described in this description belongs to be preferable to carry out
, necessary to involved action and the module not necessarily present invention.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, in certain embodiment not in detail
The part stated, may refer to the associated description of other embodiment.
It should be understood that disclosed device in several embodiments provided herein, can be passed through it
Its mode is realized.For example, device embodiment described above is only illustrative, for example described unit
Division, only a kind of division of logic function, actual can have other dividing mode, for example when realizing
Multiple units or assembly can in conjunction with or be desirably integrated into another system, or some features can be ignored,
Or do not execute.Another, shown or discussed coupling each other or direct-coupling or communication connection can
To be by some interfaces, the INDIRECT COUPLING of device or unit or communication connection, can be electrical or other
Form.
The described unit illustrating as separating component can be or may not be physically separate, as
The part that unit shows can be or may not be physical location, you can with positioned at a place, or
Can also be distributed on multiple NEs.Can select therein some or all of according to the actual needs
Unit is realizing the purpose of this embodiment scheme.
In addition, each functional unit in various embodiments of the present invention can be integrated in a processing unit,
Can also be that unit is individually physically present it is also possible to two or more units are integrated in a unit
In.Above-mentioned integrated unit both can be to be realized in the form of hardware, it would however also be possible to employ SFU software functional unit
Form is realized.
If described integrated unit is realized and as independent production marketing using in the form of SFU software functional unit
Or when using, can be stored in a computer read/write memory medium.Based on such understanding, this
Part that bright technical scheme substantially contributes to prior art in other words or this technical scheme complete
Portion or partly can be embodied in the form of software product, this computer software product is stored in a storage
In medium, including some instructions with so that computer equipment (can for personal computer, server or
Person's network equipment etc.) execution each embodiment methods described of the present invention all or part of step.And it is aforesaid
Storage medium includes:USB flash disk, read-only storage (ROM, Read-Only Memory), arbitrary access are deposited
Reservoir (RAM, Random Access Memory), portable hard drive, magnetic disc or CD etc. are various permissible
The medium of store program codes.
The above, above example only in order to technical scheme to be described, is not intended to limit;To the greatest extent
Pipe has been described in detail to the present invention with reference to the foregoing embodiments, and those of ordinary skill in the art should manage
Solution:It still can be modified to the technical scheme described in foregoing embodiments, or to wherein part
Technical characteristic carries out equivalent;And these modifications or replacement, so that the essence of appropriate technical solution is taken off
Scope from various embodiments of the present invention technical scheme.
Claims (10)
1. a kind of control method of terminal is it is characterised in that be provided with the first operating system in described terminal
With the second operating system, wherein, the level of security of described second operating system is higher than the peace of the first operating system
Full rank, methods described includes:
Monitor the state of Subscriber Identity Module in described terminal;
When the state monitoring arbitrary Subscriber Identity Module is disarmed state, by the current operation of described terminal
System switches to described second operating system.
2. method according to claim 1 is it is characterised in that described current by described terminal
After operating system switches to described second operating system, methods described also includes:
The locking interface of described second operating system is shown in the display interface of described terminal;
Obtain the unlocking pin of described second operating system of user input;
Default with described second operating system in the unlocking pin of described second operating system of user input
In the case of unlocking pin is unmatched, the data in the Subscriber Identity Module of described second operating system binding is set
It is set to by guard mode.
3. method according to claim 2 it is characterised in that described by described second operating system
Data in the Subscriber Identity Module of binding is set to by guard mode, including:
Delete and the data in the Subscriber Identity Module of described second operating system binding.
4. method according to claim 2 it is characterised in that described by described second operating system
Data in the Subscriber Identity Module of binding is set to by guard mode, including:
Locking with described second operating system binding Subscriber Identity Module in data or
It is encrypted to the data in the Subscriber Identity Module of described second operating system binding.
5. the method according to any one of claim 1 to 5 is it is characterised in that described user's identification
The state of card is disarmed state, including:
Subscriber Identity Module is reported the loss or is not detected by Subscriber Identity Module.
6. a kind of terminal is it is characterised in that be provided with the first operating system and the second operation in described terminal
System, wherein, the level of security of described second operating system is higher than the level of security of the first operating system, institute
State device to include:
Monitoring unit, for monitoring the state of Subscriber Identity Module in described terminal;
Switch unit, the state for monitoring arbitrary Subscriber Identity Module in described monitoring unit is invalid shape
During state, the current operation system of described terminal is switched to described second operating system.
7. terminal according to claim 6 is it is characterised in that described terminal also includes:
Display unit, for showing locking circle of described second operating system in the display interface of described terminal
Face;
Acquiring unit, for obtaining the unlocking pin of described second operating system of user input;
Processing unit, the solution of described second operating system of user input for obtaining in described acquiring unit
In the case of lock cipher is unmatched with the default unlocking pin of described second operating system, described second is operated
Data in the Subscriber Identity Module of system binding is set to by guard mode.
8. terminal according to claim 7 is it is characterised in that tying up described second operating system
Data in fixed Subscriber Identity Module is set to by guard mode aspect, described processing unit specifically for:
Delete and the data in the Subscriber Identity Module of described second operating system binding.
9. terminal according to claim 7 is it is characterised in that tying up described second operating system
Data in fixed Subscriber Identity Module is set to by guard mode aspect, described processing unit specifically for:
Locking with described second operating system binding Subscriber Identity Module in data or
It is encrypted to the data in the Subscriber Identity Module of described second operating system binding.
10. the terminal according to any one of claim 6 to 9 is it is characterised in that described user's identification
The state of card is disarmed state, including:
Subscriber Identity Module is reported the loss or is not detected by Subscriber Identity Module.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610363830.XA CN106412226A (en) | 2016-05-26 | 2016-05-26 | Terminal control method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610363830.XA CN106412226A (en) | 2016-05-26 | 2016-05-26 | Terminal control method and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106412226A true CN106412226A (en) | 2017-02-15 |
Family
ID=58005419
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610363830.XA Withdrawn CN106412226A (en) | 2016-05-26 | 2016-05-26 | Terminal control method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106412226A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020024912A1 (en) * | 2018-07-30 | 2020-02-06 | 中兴通讯股份有限公司 | Operating system switching method, terminal, and computer storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130227270A1 (en) * | 2012-02-23 | 2013-08-29 | Wistron Corp. | Electronic devices and methods for switching between dual operating systems |
CN104239140A (en) * | 2014-09-01 | 2014-12-24 | 深圳市中兴移动通信有限公司 | Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal |
CN104468611A (en) * | 2014-12-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Data security processing method and device based on dual-system switching |
CN105260667A (en) * | 2015-10-08 | 2016-01-20 | 青岛海信移动通信技术股份有限公司 | Mobile terminal information confidential method and mobile terminal |
-
2016
- 2016-05-26 CN CN201610363830.XA patent/CN106412226A/en not_active Withdrawn
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130227270A1 (en) * | 2012-02-23 | 2013-08-29 | Wistron Corp. | Electronic devices and methods for switching between dual operating systems |
CN104239140A (en) * | 2014-09-01 | 2014-12-24 | 深圳市中兴移动通信有限公司 | Mobile terminal as well as method and device for controlling switching of operation systems of mobile terminal |
CN104468611A (en) * | 2014-12-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Data security processing method and device based on dual-system switching |
CN105260667A (en) * | 2015-10-08 | 2016-01-20 | 青岛海信移动通信技术股份有限公司 | Mobile terminal information confidential method and mobile terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020024912A1 (en) * | 2018-07-30 | 2020-02-06 | 中兴通讯股份有限公司 | Operating system switching method, terminal, and computer storage medium |
CN110780926A (en) * | 2018-07-30 | 2020-02-11 | 中兴通讯股份有限公司 | Switching method of operating system, terminal and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103620606B (en) | Store detection means, system and storage detection method | |
EP2472926B1 (en) | Method and system for controlling an intelligent card remotely | |
CN101511083B (en) | Authentication method and terminal for telecom smart card | |
CN106850209A (en) | A kind of identity identifying method and device | |
CN103336924A (en) | Starting lock for mobile terminal application program | |
CN105187599B (en) | A kind of method for managing contact person information and terminal | |
CN102497465A (en) | High-secrecy mobile information safety system and safety method for distributed secret keys | |
CN101997960A (en) | High-safety two-operating system mobile phone capable of resisting hackers and being used for Internet banking | |
CN106096450A (en) | A kind of application program freezing method and mobile terminal | |
CN102843472A (en) | Mobile terminal and incoming call screen locking method used therefor | |
CN103269402A (en) | System and method for protecting mobile phone privacy | |
CN104376467A (en) | Method and device for controlling non-contact card swiping of intelligent cards on basis of NFC (near field communication) technologies | |
CN106648384A (en) | Method and device for service calling | |
CN107622232A (en) | Solve lock control method and Related product | |
CN105224194A (en) | A kind of data processing method and terminal | |
CN104732165B (en) | A kind of management method and terminal of application | |
CN105225113A (en) | A kind of information processing method and electronic equipment | |
CN106412226A (en) | Terminal control method and terminal | |
CN106569918A (en) | Data backup method and mobile terminal | |
CN105516500A (en) | Method and system for selecting device mode | |
CN103002430A (en) | Method, device and system for binding terminal applications to terminal numbers | |
CN108540591A (en) | Book management method, address book management device and electronic equipment | |
CN105678149A (en) | Unlocking method and terminal | |
CN115511024A (en) | Multi-card-type instant card making method, system, equipment and medium | |
CN109347791A (en) | Double I/O bus SIM cards |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20170215 |
|
WW01 | Invention patent application withdrawn after publication |