CN111726453A - System switching method, device and terminal - Google Patents
System switching method, device and terminal Download PDFInfo
- Publication number
- CN111726453A CN111726453A CN201910216572.6A CN201910216572A CN111726453A CN 111726453 A CN111726453 A CN 111726453A CN 201910216572 A CN201910216572 A CN 201910216572A CN 111726453 A CN111726453 A CN 111726453A
- Authority
- CN
- China
- Prior art keywords
- communication request
- target system
- identifier
- target
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/725—Cordless telephones
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention provides a method, a device and a terminal for system switching, relates to the field of computers, and aims to solve the problem of poor communication security caused by the fact that the terminal processes a communication request aiming at another system under one system. The method may comprise: receiving a first communication request; acquiring an identifier corresponding to the communication request; determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of the first system and the second system; processing the communication request in the context of the target system. The invention is used for system switching.
Description
Technical Field
The present invention relates to the field of computers, and in particular, to a method, an apparatus, and a terminal for system switching.
Background
With the popularization of smart phones and the increasingly powerful functions of application programs, the security problem of the mobile phones is increasingly highlighted, and particularly for mobile office work which develops rapidly, personal information and business information coexist in one terminal, so that more security risks are brought.
To ensure security, dual systems, for example, an office system and a living system, are currently used in terminals. The life system can normally use all functions of the terminal, and the office system can only use some appointed functions of the terminal.
However, when the terminal operates in the living system and receives a communication request for the office system, the terminal still processes the communication request in the living system, which results in poor communication security.
Disclosure of Invention
The embodiment of the application provides a system switching method, a system switching device and a terminal, and aims to solve the problem that communication security is poor as the terminal processes a communication request aiming at another system under one system.
In a first aspect, an embodiment of the present application provides a system switching method, which is applied to a terminal, where the terminal is provided with a first system and a second system, and the method includes:
receiving a first communication request;
acquiring an identifier corresponding to the first communication request;
determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of the first system and the second system;
processing the first communication request in the context of the target system.
In a second aspect, an embodiment of the present application provides an apparatus for system handover, including:
a receiving module, configured to receive a first communication request;
the processing module is used for acquiring an identifier corresponding to the first communication request, and determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
In a third aspect, an embodiment of the present application provides a terminal, including: a memory on which is stored a computer program that, when executed, performs the steps in the method of loading a plug-in for an application of the first aspect.
In a fourth aspect, the present application provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed, the steps in the method for loading a plug-in of an application according to the first aspect are implemented.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
in the embodiment of the application, after the first communication request is received, the identifier corresponding to the first communication request is obtained, and then the target system corresponding to the obtained identifier is determined according to the obtained identifier and the preset matching rule between the identifier and the system, and the first communication request is processed under the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a method for system handover according to an embodiment of the present invention;
fig. 2 is a communication principle composition diagram of a terminal based on dual system handover according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for artificial intelligence-based autonomous learning of a dual-system terminal according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for secure communication of a dual-system terminal according to an embodiment of the present invention;
fig. 5 is a block diagram of a system switching apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, it should be understood that the application represents an application program.
It should be understood that, in the following description, if the android system is mentioned as an example, the android system is only shown as an example, and is not limited, the method for system switching provided by the embodiment of the present invention may also be applied to other operating systems, such as an apple operating system (iOS).
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
The method for system handover provided by the embodiment of the present invention will be described below from the perspective of a terminal. The terminal can be a mobile phone, a tablet personal computer and the like, and a first system and a second system can be arranged in the terminal. The first system and the second system may be isolated systems, and the first system and the second system may belong to an android operating system, but functions of the terminal implemented when the terminal runs under the first system and the second system may be different, for example, each function of the terminal may be implemented normally under the first system, and only some specified functions of the terminal may be implemented under the second system.
The terminal of the dual-system operation provides light-weight virtualization through a terminal kernel virtualization technology, and can isolate processes and resources. The scheme is the isolation of an application framework layer, and can support two user systems to run simultaneously, wherein each system comprises a working system and a living system, and each system supports independent application, system setting, address lists, short messages and the like. The two systems are isolated from each other so that safety can be guaranteed.
Fig. 1 is a flowchart of a system handover method according to an embodiment of the present invention. Referring to fig. 1, a method for system handover provided by an embodiment of the present invention may be executed by a terminal, and may include:
at step 110, a first communication request is received.
In the embodiment of the present invention, the first communication request may be any kind of communication request, including but not limited to a video chat request, a voice chat request, a request related to a telephone call, a request related to a short message, and the like. The request related to the telephone can cover the incoming call request, and the request related to the short message can cover the common short message request, the multimedia message request and the like. The first communication request may be from another device separate from the terminal.
And step 120, acquiring an identifier corresponding to the first communication request.
In the embodiment of the present invention, the identifier corresponding to the first communication request may be a unique identifier of the first communication request. For example, if the first communication request is a request related to a phone call or a short message, the identifier corresponding to the first communication request may be a phone number. For another example, if the first communication request is a video chat request, the identifier corresponding to the first communication request may be a unique identifier of the chat software, such as a name, a session ID, or a serial number of the chat software.
In the embodiment of the invention, the matching rule between the identifier and the system can be preset. Wherein, the matching rule can be set according to requirements. For example, in the case of a pre-set white list of identities, the matching rules may include that the identities appearing in the pre-set white list correspond to the target system. For another example, in the case of a pre-set black list of identifiers, the matching rule may include that identifiers that do not appear in the pre-set black list correspond to the target system, and so on. Of course, other matching rules can be set as required.
Taking a white list of telephone numbers of government-enterprise customers as an example, the white list of telephone numbers can include group short numbers of enterprise users or enterprise fixed telephones, and the like, and the white list only needs to configure the ranges of the short numbers and the fixed telephones of the enterprise. For example, the group short number of a company is the first 5 numbers of 61, as long as the white list is configured to be 61 x, and the enterprise fixed telephone is 021 + 8534 x.
In an embodiment of the present invention, the target system may be a system with a controlled authority. In other words, the target system may be a system with high requirements on security or privacy.
In this embodiment of the present invention, optionally, after determining the target system corresponding to the obtained identifier, the method for system switching provided in this embodiment of the present invention may further include: judging whether the current operating system of the terminal is the target system or not; if the current operating system is not the target system, switching to the target system to operate; and if the current operating system is the target system, keeping the current operating system to continuously operate. The embodiment of the invention can ensure that the terminal finally moves under the target system through the process, and can reduce the workload of switching without switching the system under the condition that the current operating system of the terminal is the target system.
For example, if the currently operating system of the terminal is a first system (e.g., a living system) and the target system is a second system (e.g., a working system), the terminal may switch from the first system (e.g., the living system) to the second system (e.g., the working system); on the contrary, if the currently operating system of the terminal is the second system (e.g., working system) and the target system is also the second system (e.g., working system), the terminal will continue to operate under the currently operating system (i.e., second system).
For example, if the first communication request is an incoming call request, the processing of the first communication request may specifically be: for example, the incoming call request is answered by a touch operation or a key operation, and the incoming call request is rejected by a touch operation or a key operation, for example. If the first communication request is a normal short message request, the processing of the first communication request may specifically be: for example, the short message is viewed through touch operation or key operation, and the short message is replied through touch operation or key operation, for example.
In an embodiment of the invention, the target system may be a first system, such as a living system. Alternatively, the target system may be a second system, such as a work system. When the target system is determined to be in the living system, the first communication request can be processed in the environment of the living system, and when the target system is determined to be in the working system, the first communication request can be processed in the environment of the working system. In the process of processing the first communication request, when the first communication request is an incoming call, for example, the user can be prompted to ring to answer the call.
In the embodiment of the application, after the first communication request is received, the identifier corresponding to the first communication request is obtained, and then the target system corresponding to the obtained identifier is determined according to the obtained identifier and the preset matching rule between the identifier and the system, and the first communication request is processed under the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
It should be noted that, in the embodiment of the present invention, after the terminal is in the target system (e.g., working system) whose authority is controlled, the user may perform further operation with the terminal under the target system (e.g., working system), for example, perform touch or key operation on the terminal to trigger the second communication request. Optionally, in an embodiment of the present invention, the method for system switching provided in the embodiment of the present invention may further include: receiving an operation of triggering a second communication request; when the second communication request is triggered, determining an implementation system for executing the second communication request; when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list; issuing the second communication request in an environment of the enforcement system when the enforcement system is not the target system. Wherein the second communication request may include a request related to a phone call or a short message. Therefore, self-learning of the terminal when the terminal is in the target system can be achieved, user operation is reduced, system switching can be carried out subsequently based on self-learning results, and therefore not only can communication safety be guaranteed, but also accuracy and application range of system switching can be improved.
In an embodiment of the invention, the self-learning list may be associated with matching rules between the identity and the system. That is, in one embodiment, matching rules between the identification and the system may include that the identification appearing in the recorded self-learning list corresponds to the target system for which the permissions are governed. In this case, the determining, in step 13, a target system corresponding to the acquired identifier based on the acquired identifier and a matching rule between a preset identifier and a system may include: searching the obtained identification in the self-learning list; and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system. The method for determining the target system based on the self-learning list not only can ensure the accuracy of determining the target system, but also can ensure subsequent compatibility through continuous updating of the self-learning list, and can enlarge the application range.
In this case, for example, telephone or text message operations initiated by the user under the target system whose authority is controlled may be recorded in the self-learning list. Furthermore, when a subsequent request, for example a telephone call or a short message, is received from another device, the terminal can look up the recorded self-learning list. If a phone number corresponding to a received, e.g., phone call or short message, is found in the self-learning list, it may be determined that the received phone call or short message corresponds to the target system, and the received phone call or short message may be processed in the context of the target system.
In the embodiment of the present invention, the implementation system may be a system in which the terminal is currently operating. Accordingly, in the case where the determined implementation system (e.g., living system) is not the target system (office system) when the second communication request is triggered, the second communication request may be issued directly at the implementation system (e.g., living system). For example, in the embodiment of the present invention, if the terminal is not in a target system (e.g., a working system) whose authority is controlled when the second communication request is issued, the terminal is in a living system, for example. Then at this point, a second communication request may be issued directly under the living system.
Fig. 2 is a communication principle composition diagram of a terminal based on dual system handover according to an embodiment of the present invention. Referring to fig. 2, a terminal provided in an embodiment of the present invention may include: a Host (Host) system, a Home (Home) system, a Work (Work) system and a Modem (Modem) module. Wherein:
host (Host) system: the virtualization system provides light-weight virtualization, supports isolation of processes and resources, does not need mechanisms such as instruction interpretation required by full virtualization, and is low in performance loss.
Living (Home) system: and the user system is simultaneously operated with the working system, and is mainly provided with applications used by the user daily.
The working system comprises: the working system and the living system run simultaneously, and the system is mainly provided with an application which is required by a user to process a working transaction.
In the embodiment of the invention, a living (Home) system can be a standard intelligent operating system, and a user can perform normal mobile phone function operation; the Work (Work) system can safely control the sensitive authority, such as limiting internet surfing, limiting Bluetooth, being incapable of installing third-party application and the like, and is mainly used for developing Work business.
Telephone (Phone) module: communication module of Android (Android) system.
The ri (radio Interface layer) is a radio Interface adaptation layer module, which includes two parts, one part is a Java layer Rilj and the other part is an underlying Rild module.
Rilj: is part of Ril, Rilj provides a generic API (application program interface) interface for the upper layers, is responsible for maintaining communication with Rild, and sends requests from the upper layers to the Rild module.
A Rild module: is part of Ril and Rild is the system's daemon. The function of Rild is to continuously transmit the request sent by Rilj to a lower Modem module, and to send the request of Modem to Rilj in time.
AI (artificial intelligence) module: a white list of identities may be configured, as well as identities derived through self-learning, such as telephone numbers.
A system switching module: and responding to system switching commands of the two user systems to carry out system switching, or carrying out automatic system switching under the condition of meeting a certain condition.
Fig. 3 is a flowchart of a method for artificial intelligence-based autonomous learning of a dual-system terminal according to an embodiment of the present invention. Fig. 3 is illustrated with labels as telephone numbers and is not meant to be limiting. Referring to fig. 3, a flowchart of a method for artificial intelligence-based autonomous learning of a dual-system terminal according to an embodiment of the present invention may include:
In step 303, the Rild module in the Host system determines whether the communication request is from the Work system.
In step 305, if the communication request is not from the Work (Work) system, the Rild module transmits the communication data to the Modem module for communication processing, such as sending out a communication request.
Through this process, the AI module process stores a working system-related telephone number. Through the continuous learning processing for a period of time, the AI module learns more and more telephone numbers related to the work stored, and then when receiving the telephone number or short message from the related number, the AI module is distributed to the work system to be processed more and more accurately.
Fig. 4 is a flowchart of a method for secure call of a dual-system terminal according to an embodiment of the present invention. Fig. 3 is illustrated with labels as telephone numbers and is not meant to be limiting. Referring to fig. 4, a method for secure call of a dual-system terminal according to an embodiment of the present invention may include:
In step 402, the modulator-demodulator (Modem) module reports the incoming call request to the Rild module of the Host (Host) system, and the Rild module is transmitted to the AI module.
Wherein the AI module in the Host system has configured a phone white list or learns the phone number associated with the job through the self-learning process of fig. 3, supra.
If the incoming call number is a white list number stored in the AI module or a phone number that the AI module learns from itself, steps 404 to 406 are performed.
In step 405, the Rild module of the Host (Host) system reports data to the RilJ of the Phone (Phone) module of the Work (Work) system.
Step 406, the telephone module of the Work (Work) system rings to wait for the user to answer.
If the incoming call number is not the white list number stored in the AI module or the phone number self-learned by the AI module, step 407 to step 408 are performed.
In step 407, the Rild module in the Host (Host) system reports the data to the RilJ of the Phone (Phone) module of the Home (Home) system.
In step 408, the Phone module of the living (Home) system rings to wait for the user to answer.
The embodiment of the invention is additionally provided with an AI module on the basis of the traditional double-system scheme, wherein the AI module is arranged in a main (Host) system, and the AI module can be configured with a white list of telephone numbers of government and enterprise clients, including group short numbers of enterprise users or enterprise fixed telephones and the like; if the number on the white list is incoming call and short message, the terminal system will automatically distribute to Work (Work) system to process the communication request. In addition, the AI module can self-learn and store the number information of outgoing calls and short messages sent by the user from a Work (Work) system; after continuous learning, when the dual-system terminal receives a communication request of an incoming call or a short message, the number is automatically judged to determine whether the number needs to be distributed to a Work (Work) system to process the communication request. Therefore, the communication request sent by the number related to Work can be ensured to be automatically distributed to a Work (Work) system for processing. Therefore, the safety of the communication data is ensured.
Fig. 5 is a block diagram of a system switching apparatus according to an embodiment of the present invention. Referring to fig. 5, an apparatus 500 for system switching according to an embodiment of the present invention may include: a receiving module 510 and a processing module 520. It is to be understood that both the system switch module and the AI module mentioned above may be part of the processing module. Wherein:
a receiving module 510, configured to receive a first communication request;
a processing module 520, configured to obtain an identifier corresponding to the first communication request received by the receiving module 510, and determine, based on the obtained identifier and a matching rule between a preset identifier and a system, a target system corresponding to the obtained identifier, where the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
In the embodiment of the application, after the first communication request is received, the identifier corresponding to the first communication request is obtained, and then the target system corresponding to the obtained identifier is determined according to the obtained identifier and the preset matching rule between the identifier and the system, and the first communication request is processed under the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
Optionally, in an embodiment of the present invention, the first communication request includes a request related to a phone call or a short message, and the identifier is a phone number.
Optionally, in an embodiment of the present invention, the target system is a system with a controlled authority.
Optionally, in an embodiment of the present invention, the receiving module 510 is further configured to receive an operation of triggering a second communication request; the processing module 520 is further configured to determine an implementation system for executing the second communication request when the second communication request is triggered; and when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list. Wherein the second communication request may comprise a request related to a phone call or a short message
Correspondingly, the apparatus 500 further includes a sending module, configured to issue the second communication request in the environment of the implementation system when the implementation system is not the target system.
Optionally, in an embodiment of the present invention, the matching rule includes: the identity appearing in the self-learning list corresponds to the target system;
in the process of determining the target system corresponding to the acquired identifier based on the acquired identifier and the matching rule between the preset identifier and the system, the processing module 520 may be specifically configured to:
searching the obtained identification in the self-learning list; and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
Optionally, in an embodiment of the present invention, after determining the target system corresponding to the obtained identifier, the processing module 520 is further configured to:
judging whether the current operating system of the terminal is the target system or not; if the current operating system is not the target system, switching to the target system to operate; and if the current operating system is the target system, keeping the current operating system to continuously operate.
Optionally, in an embodiment of the present invention, the matching rule includes: the identifiers appearing in the pre-set white list correspond to the target system and/or the identifiers appearing in the recorded self-learning list correspond to the target system.
An embodiment of the present application further provides a terminal, and fig. 6 is a schematic structural diagram of the terminal provided in the embodiment of the present application. As shown in fig. 6, the terminal may have a large difference due to different configurations or performances, and may include one or more processors 601 and a memory 602, where one or more stored applications or data may be stored in the memory 602. Wherein the memory 602 may be transient or persistent storage. The application program stored in the memory 602 may include one or more modules (not shown), each of which may include a series of computer programs for the terminal. Further, the processor 601 may be arranged in communication with the memory 602 to execute a series of computer programs in the memory 602 on the terminal. The terminal may also include one or more power supplies 603, one or more wired or wireless network interfaces 604, one or more input-output interfaces 605, one or more keyboards 606, etc.
In a specific embodiment, the terminal includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when executed by the processor, the computer program implements the following procedures:
receiving a first communication request;
acquiring an identifier corresponding to the first communication request;
determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system;
processing the first communication request in the context of the target system.
The terminal provided by the embodiment of the application acquires the identifier corresponding to the first communication request after receiving the first communication request, and then determines the target system corresponding to the acquired identifier according to the acquired identifier and the preset matching rule between the identifier and the system, and processes the first communication request in the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
Optionally, the first communication request includes a request related to a phone call or a short message, the identifier is a phone number, and the target system is a system with a controlled authority.
Optionally, the matching rule includes: the identifiers appearing in the pre-set white list correspond to the target system and/or the identifiers appearing in the recorded self-learning list correspond to the target system.
Optionally, the computer program, when executed by the processor, may further perform the following: receiving an operation of triggering a second communication request; when the second communication request is triggered, determining an implementation system for executing the second communication request; when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list; issuing the second communication request in an environment of the enforcement system when the enforcement system is not the target system. Wherein the second communication request may include a request related to a phone call or a short message.
Optionally, the matching rule includes: the identification appearing in the self-learning list corresponds to the target system. The computer program, when executed by the processor, may further perform the following: searching the obtained identification in the self-learning list; and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
Optionally, the computer program, when executed by the processor, may further perform the following: after determining the target system corresponding to the obtained identifier, judging whether the current operating system of the terminal is the target system; if the current operating system is not the target system, switching to the target system to operate; and if the current operating system is the target system, keeping the current operating system to continuously operate.
In addition, a non-transitory computer-readable storage medium is provided in an embodiment of the present application, where the storage medium is used to store a computer program, and the computer program, when executed by a processor, implements the steps in any method for system handover provided in the embodiment of the present invention. For example, the computer program when executed by a processor implements the following: receiving a first communication request; acquiring an identifier corresponding to the first communication request; determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
The computer-readable storage medium provided by the embodiment of the application, after receiving the first communication request, first obtains an identifier corresponding to the first communication request, and then determines a target system corresponding to the obtained identifier according to the obtained identifier and a matching rule between a preset identifier and the system, and processes the first communication request in an environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
The computer-readable storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (12)
1. A system switching method is applied to a terminal, and is characterized in that a first system and a second system are arranged in the terminal, and the method comprises the following steps:
receiving a first communication request;
acquiring an identifier corresponding to the first communication request;
determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of the first system and the second system;
processing the first communication request in the context of the target system.
2. The method of claim 1, further comprising:
receiving an operation of triggering a second communication request;
when the second communication request is triggered, determining an implementation system for executing the second communication request;
when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list;
issuing the second communication request in an environment of the enforcement system when the enforcement system is not the target system.
3. The method of claim 2, wherein the matching rule comprises: the identity appearing in the self-learning list corresponds to the target system;
the determining the target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system comprises:
searching the obtained identification in the self-learning list;
and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
4. The method of claim 1, wherein after the determining the target system to which the obtained identity corresponds, the method further comprises:
judging whether the current operating system of the terminal is the target system or not;
if the current operating system is not the target system, switching to the target system to operate;
and if the current operating system is the target system, keeping the current operating system to continuously operate.
5. The method of claim 1, wherein the matching rule comprises: the identifiers appearing in the pre-set white list correspond to the target system and/or the identifiers appearing in the recorded self-learning list correspond to the target system.
6. The method of claim 2 or 3, wherein the first communication request comprises a request related to a phone call or a short message, the identifier is a phone number, the target system is a system with a controlled authority, and the second communication request comprises a request related to a phone call or a short message.
7. An apparatus for system switching, comprising:
a receiving module, configured to receive a first communication request;
the processing module is used for acquiring an identifier corresponding to the first communication request received by the receiving module, and determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
8. The apparatus of claim 7,
the receiving module is further configured to receive an operation of triggering a second communication request;
the processing module is further configured to determine an implementation system for executing the second communication request when the second communication request is triggered; when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list;
the apparatus further includes a sending module configured to send the second communication request in an environment of the implementation system when the implementation system is not the target system.
9. The apparatus of claim 8, wherein the matching rule comprises: the identity appearing in the self-learning list corresponds to the target system;
in the process of determining a target system corresponding to the acquired identifier based on the acquired identifier and a matching rule between a preset identifier and a system, the processing module is specifically configured to:
searching the obtained identification in the self-learning list;
and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
10. The apparatus of claim 8 or 9, wherein the first communication request comprises a request related to a phone call or a short message, the identifier is a phone number, the target system is a system with a controlled authority, and the second communication request comprises a request related to a phone call or a short message.
11. A terminal, comprising a memory and a processor, the memory having stored thereon a computer program that, when executed, performs the steps of the method according to any one of claims 1 to 6.
12. A non-transitory computer readable storage medium, wherein a computer program is stored on the storage medium, which when executed, performs the steps of the method according to any one of claims 1 to 6.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910216572.6A CN111726453B (en) | 2019-03-21 | 2019-03-21 | System switching method, device, terminal and readable storage medium |
PCT/CN2020/071988 WO2020186918A1 (en) | 2019-03-21 | 2020-01-14 | System switching method and apparatus, and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910216572.6A CN111726453B (en) | 2019-03-21 | 2019-03-21 | System switching method, device, terminal and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111726453A true CN111726453A (en) | 2020-09-29 |
CN111726453B CN111726453B (en) | 2022-06-03 |
Family
ID=72518961
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910216572.6A Active CN111726453B (en) | 2019-03-21 | 2019-03-21 | System switching method, device, terminal and readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111726453B (en) |
WO (1) | WO2020186918A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114640738A (en) * | 2020-12-15 | 2022-06-17 | 鼎桥通信技术有限公司 | Communication method, communication device, mobile terminal and readable storage medium |
CN113656077A (en) * | 2021-07-23 | 2021-11-16 | 北京鸿合爱学教育科技有限公司 | Function setting method and related equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468611A (en) * | 2014-12-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Data security processing method and device based on dual-system switching |
CN105635428A (en) * | 2015-03-23 | 2016-06-01 | 西安酷派软件科技有限公司 | Notice processing method, notice processing device and terminal |
CN105847524A (en) * | 2015-01-15 | 2016-08-10 | 宇龙计算机通信科技(深圳)有限公司 | Dual-system-based communication method and terminal |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8077845B2 (en) * | 2007-06-27 | 2011-12-13 | Honeywell International Inc. | Remote control of a security system using telephone device |
CN104243716B (en) * | 2014-09-28 | 2017-02-08 | 酷派软件技术(深圳)有限公司 | Information acquiring method and device |
CN105049630B (en) * | 2015-08-07 | 2018-06-19 | 北京元心科技有限公司 | The telephone receiving method of intelligent terminal and its multisystem |
CN105554259B (en) * | 2015-12-11 | 2019-07-19 | 北京元心科技有限公司 | Multi-system-based method for preventing telephone conflict and intelligent terminal |
-
2019
- 2019-03-21 CN CN201910216572.6A patent/CN111726453B/en active Active
-
2020
- 2020-01-14 WO PCT/CN2020/071988 patent/WO2020186918A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104468611A (en) * | 2014-12-24 | 2015-03-25 | 宇龙计算机通信科技(深圳)有限公司 | Data security processing method and device based on dual-system switching |
CN105847524A (en) * | 2015-01-15 | 2016-08-10 | 宇龙计算机通信科技(深圳)有限公司 | Dual-system-based communication method and terminal |
CN105635428A (en) * | 2015-03-23 | 2016-06-01 | 西安酷派软件科技有限公司 | Notice processing method, notice processing device and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN111726453B (en) | 2022-06-03 |
WO2020186918A1 (en) | 2020-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9747120B2 (en) | Mobile device with virtual interfaces | |
RU2595890C2 (en) | Method and device for execution of user activity commands | |
CN102883449B (en) | A kind of realize the method for data sharing, associated terminal and system | |
KR102226782B1 (en) | Seamless call transitions | |
WO2016090702A1 (en) | Dual-card dual-standby call method, device and terminal | |
US20170102957A1 (en) | System and Method for Trusted Operability When Moving Between Network Functions Virtualization States | |
US20160066253A1 (en) | Systems and Methods of Controlling Communication with Multiple Subscriptions and Radio Protocol Stacks | |
US20210297846A1 (en) | Network slicing using dedicated network node | |
CN111726453B (en) | System switching method, device, terminal and readable storage medium | |
CN105376426A (en) | Information management method based on address book and mobile terminal | |
CN104601818A (en) | Method and device for switching operating systems in communication process | |
CN101339508B (en) | Java2 miniature edition application operation method and device | |
US20140297817A1 (en) | Managing Software Operations Based Upon User Status In A Unified Communications Environment | |
CA2892715C (en) | System and method for unifying the listing and launching of applications and packages spread across multiple domains | |
US11271975B2 (en) | Enriched calling based call type notification | |
US11563782B2 (en) | Enriched calling based call routing | |
CN117354358A (en) | SMF network element selection method and device, electronic equipment and storage medium | |
CN111447692B (en) | Call method and device for multi-system terminal, electronic equipment and storage medium | |
KR102638733B1 (en) | Communication system based on cloud phone and method thereof | |
CN103974215A (en) | Electronic device control method and electronic devices | |
CN113365346A (en) | Paging method, paging device, electronic equipment and storage medium | |
CN113852962A (en) | Network connection control method, device, storage medium and software program product | |
CN113259305A (en) | Intranet and extranet communication method and device | |
KR102399456B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon | |
KR102402412B1 (en) | System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |