WO2017024633A1 - Procédé et dispositif de commutation d'espace à base d'authentification d'identité, et terminal - Google Patents

Procédé et dispositif de commutation d'espace à base d'authentification d'identité, et terminal Download PDF

Info

Publication number
WO2017024633A1
WO2017024633A1 PCT/CN2015/088506 CN2015088506W WO2017024633A1 WO 2017024633 A1 WO2017024633 A1 WO 2017024633A1 CN 2015088506 W CN2015088506 W CN 2015088506W WO 2017024633 A1 WO2017024633 A1 WO 2017024633A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
space
user
preset key
user space
Prior art date
Application number
PCT/CN2015/088506
Other languages
English (en)
Chinese (zh)
Inventor
李小辉
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Publication of WO2017024633A1 publication Critical patent/WO2017024633A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to an identity-based space switching method, an identity-based space switching device, and a terminal.
  • system terminals of multiple operating systems have entered daily life, but multiple operating systems occupy resources of mobile terminals, such as CPU (Central Processing Unit) or large memory.
  • mobile terminals such as CPU (Central Processing Unit) or large memory.
  • CPU Central Processing Unit
  • multi-domain operation on mobile terminals is a good solution, which provides a lightweight system virtualization solution. Allow multiple users to run on one operating system, so each user can have their own user space, and the resources of each user space are isolated from each other.
  • the above switching mode needs to sequentially light up the screen, unlock the screen, and click the switch to switch to the specified user space after the identity authentication succeeds, so that User space switching operations are cumbersome and inconvenient for users.
  • the invention is based on the above problems, and proposes a new technical solution, which can simplify the user.
  • the operation of switching the space improves the security of each user space.
  • an aspect of the present invention provides an identity-based space switching method for a terminal having multiple user spaces, including: receiving an identity verification key in a current user space; and verifying a key according to the identity Retrieving, in the preset key database, whether there is a preset key consistent with the identity verification key; determining, according to the retrieval result, whether to perform space switching according to the identity verification key.
  • multiple user spaces in the terminal share an operating system, which can reduce the requirements on the performance of the terminal.
  • Resources sharing can be performed between multiple user spaces, and resource isolation can also be performed by using Namespace (namespace) technology.
  • namespace Namespace
  • the technical solution of the present invention can be used to verify whether space switching can be performed directly according to the received identity verification key in the unlocked state of the terminal, or by receiving the identity authentication secret in the lock screen state of the terminal.
  • the key performs the dual functions of identity authentication and user space switching at the same time, so that the authentication is provided for the space switching, and the user does not need to open the specific space switching interface or the space switching verification interface every time the space switch is performed, for example,
  • the dual function of identity authentication and user space switching is directly completed in the lock screen state of the terminal, which not only simplifies the user operation, but also improves the security of each user space and improves the user experience.
  • determining, according to the retrieval result, whether to perform spatial switching according to the identity verification key specifically: when determining that the preset key database has the identity verification key
  • the preset key is used, the current user space is switched to the target user space corresponding to the preset key. Otherwise, space switching is prohibited.
  • the preset key database of the terminal has a preset key corresponding to each user space, and only the received identity verification key is consistent with a preset key stored in the preset key database.
  • the user can switch to the user space corresponding to the preset key.
  • the method before the receiving the identity verification key in the current user space, the method further includes: setting, according to the received setting command, at least one pre-preparation for each user space in the multiple user spaces. Set the key.
  • a preset preset key may be set for each user space in advance, and the preset key corresponding to each user space setting may be one or more, and the user space with multiple preset keys has Higher security.
  • the user can set a password type preset key for the user space for work, and set the iris and password preset keys for the user space for storing the private contact.
  • the method before the receiving the identity verification key in the current user space, the method further includes: saving the at least one preset key corresponding to each of the set user spaces to the pre And setting a key database for retrieving whether the preset key database has the preset key that is consistent with the identity verification key received in the current user space.
  • each user space and at least one preset key set for it are required to be stored in a preset key database, thereby facilitating identity verification and space switching according to the association relationship thereof.
  • the implementation of the identity authentication keystore can be various, and can be a database or a file.
  • the data organization mode of the identity authentication keystore can also be various, as long as each user can be guaranteed.
  • the space may be associated with at least one of its corresponding preset keys.
  • the at least one preset key comprises at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference object information, color information .
  • the at least one preset key corresponding to each user space includes but is not limited to at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference objects Information, color information.
  • fingerprint information iris image information
  • face image information text information
  • audio information reference objects Information
  • color information color information.
  • a plurality of preset keys may be used separately or in combination.
  • the user may set a password type preset key for the user space used for work.
  • the user space for storing private contacts sets two preset keys, iris and password.
  • Another aspect of the present invention provides an identity-based space switching apparatus for a terminal having a plurality of user spaces, including: a receiving unit that receives an identity verification key in a current user space; and a retrieval unit according to the identity Verifying the key, retrieving in the preset key database whether there is a preset key consistent with the identity verification key; determining unit, according to the retrieval result, Whether to perform space switching according to the authentication key.
  • multiple user spaces in the terminal share an operating system, which can reduce the performance requirements of the terminal.
  • Resources can be shared between multiple user spaces, and resource isolation can be performed through Namespace technology to ensure each user. Space privacy and security.
  • the technical solution of the present invention can be used to verify whether space switching can be performed directly according to the received identity verification key in the unlocked state of the terminal, or by receiving the identity authentication secret in the lock screen state of the terminal.
  • the key performs the dual functions of identity authentication and user space switching at the same time, so that the authentication is provided for the space switching, and the user does not need to open the specific space switching interface or the space switching verification interface every time the space switch is performed, for example,
  • the dual function of identity authentication and user space switching is directly completed in the lock screen state of the terminal, which not only simplifies the user operation, but also improves the security of each user space and improves the user experience.
  • the determining unit is specifically configured to: when determining, in the preset key database, the preset key that is consistent with the identity verification key, from the current user The space is switched to the target user space corresponding to the preset key. Otherwise, space switching is prohibited.
  • the preset key database of the terminal has a preset key corresponding to each user space, and only the received identity verification key is consistent with a preset key stored in the preset key database.
  • the user can switch to the user space corresponding to the preset key.
  • the method further includes: setting, before the receiving the identity verification key in the current user space, setting, for each user space in the multiple user spaces, according to the received setting command At least one default key.
  • a preset preset key may be set for each user space in advance, and the preset key corresponding to each user space setting may be one or more, and the user space with multiple preset keys has Higher security.
  • the user can set a password type preset key for the user space for work, and set the iris and password preset keys for the user space for storing the private contact.
  • the method further includes: a storage unit, in the current user Before receiving the authentication key, the at least one preset key corresponding to each user space is saved in the preset key database for searching whether the preset key database is used Having the preset key that is consistent with the identity verification key received in the current user space.
  • each user space and at least one preset key set for it are required to be stored in a preset key database, thereby facilitating identity verification and space switching according to the association relationship thereof.
  • the implementation of the identity authentication keystore can be various, and can be a database or a file.
  • the data organization mode of the identity authentication keystore can also be various, as long as each user can be guaranteed.
  • the space may be associated with at least one of its corresponding preset keys.
  • the at least one preset key comprises at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference object information, color information .
  • the at least one preset key corresponding to each user space includes but is not limited to at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference objects Information, color information.
  • fingerprint information iris image information
  • face image information text information
  • audio information reference objects Information
  • color information color information.
  • a plurality of preset keys may be used separately or in combination.
  • the user may set a password type preset key for the user space used for work.
  • the user space for storing private contacts sets two preset keys, iris and password.
  • a terminal includes a plurality of user spaces and the identity verification based space switching device according to any one of the foregoing technical solutions, and therefore, the terminal has any one of the foregoing technical solutions.
  • the same technical effects of the identity-based space switching device described in the section are not described herein.
  • the interface especially for the terminal in the lock screen state, can directly perform the dual functions of identity authentication and user space switching in the lock screen state of the terminal, which not only simplifies the user operation, but also improves the security of each user space and improves the security. user experience.
  • FIG. 1 shows a flow chart of an identity-based spatial switching method in accordance with one embodiment of the present invention
  • FIG. 2 shows a block diagram of an identity-based spatial switching device in accordance with one embodiment of the present invention
  • Figure 3 shows a block diagram of a terminal in accordance with one embodiment of the present invention
  • FIG. 4 is a schematic diagram showing correspondence between a user space and a keystore in a lock screen state according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram showing correspondence between a user space and a keystore in a screen unlock state according to an embodiment of the present invention
  • FIG. 6 shows a schematic diagram of a terminal in accordance with another embodiment of the present invention.
  • FIG. 1 shows a flow chart of an identity-based spatial switching method in accordance with one embodiment of the present invention
  • an identity-based space switching method is used for a terminal having multiple user spaces, including:
  • Step 102 Receive an authentication key in the current user space.
  • Step 104 retrieve, in the preset key database, whether there is a preset key that is consistent with the identity verification key according to the identity verification key.
  • Step 106 Determine, according to the retrieval result, whether to perform space switching according to the identity verification key.
  • the technical solution can be used to verify whether space switching can be performed directly according to the received identity verification key in the unlocked state of the terminal, or by receiving the identity authentication secret in the lock screen state of the terminal.
  • the key performs the dual functions of identity authentication and user space switching at the same time, so that the authentication is provided for the space switching, and the user does not need to open the specific space switching interface or the space switching verification interface every time the space switch is performed, for example,
  • the dual function of identity authentication and user space switching is directly completed in the lock screen state of the terminal, which not only simplifies the user operation, but also improves the security of each user space and improves the user experience.
  • the step 106 specifically includes: when determining that the preset key database has a preset key that is consistent with the identity verification key, switching from the current user space to the target user corresponding to the preset key Space, otherwise, space switching is prohibited.
  • the preset key database of the terminal has a preset key corresponding to each user space, and only the received identity verification key is consistent with a preset key stored in the preset key database.
  • the user can switch to the user space corresponding to the preset key.
  • the method further includes: setting, according to the received setting command, at least one preset key for each user space in the plurality of user spaces.
  • a preset preset key may be set for each user space in advance, and the preset key corresponding to each user space setting may be one or more, and the user space with multiple preset keys has Higher security.
  • the user can set a password type preset key for the user space for work, and set the iris and password preset keys for the user space for storing the private contact.
  • the method further includes: saving at least one preset key corresponding to each user space that is set to a preset key database for searching in a preset key database. Whether there is a preset key that is consistent with the authentication key received in the current user space.
  • each user space and at least one preset secret set for it are required.
  • the key associations are stored in a preset key database to facilitate authentication and space switching based on their associations.
  • the implementation of the identity authentication keystore can be various, and can be a database or a file.
  • the data organization mode of the identity authentication keystore can also be various, as long as each user can be guaranteed.
  • the space may be associated with at least one of its corresponding preset keys.
  • the at least one preset key comprises at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference object information, and color information.
  • the at least one preset key corresponding to each user space includes but is not limited to at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference objects Information, color information.
  • fingerprint information iris image information
  • face image information text information
  • audio information reference objects Information
  • color information color information.
  • a plurality of preset keys may be used separately or in combination.
  • the user may set a password type preset key for the user space used for work.
  • the user space for storing private contacts sets two preset keys, iris and password.
  • FIG. 2 shows a block diagram of an identity-based spatial switching device in accordance with one embodiment of the present invention.
  • an authentication-based spatial switching apparatus 200 is used for a terminal having a plurality of user spaces, including: a receiving unit 202, which receives an identity verification key in a current user space; The unit 204 retrieves, according to the identity verification key, whether the preset key is consistent with the identity verification key in the preset key database. The determining unit 206 determines whether to perform space switching according to the identity verification key according to the retrieval result.
  • multiple user spaces in the terminal share an operating system, which can reduce the performance requirements of the terminal.
  • Resources can be shared between multiple user spaces, and resource isolation can be performed through Namespace technology to ensure each user. Space privacy and security.
  • the technical solution of the present invention can be used to verify whether space switching can be performed directly according to the received identity verification key in the unlocked state of the terminal, or by receiving the identity authentication secret in the lock screen state of the terminal.
  • the key performs the dual functions of identity authentication and user space switching at the same time, so that the authentication is provided for the space switching, and the user does not need to open the specific space switching interface or the space switching verification interface every time the space switch is performed, for example, Terminal In the lock screen state, the dual functions of identity authentication and user space switching are directly completed, which not only simplifies user operations, but also improves the security of each user space and improves the user experience.
  • the determining unit 206 is specifically configured to: when determining that the preset key database has a preset key that is consistent with the identity verification key, switch from the current user space to the preset key corresponding to the preset key Target user space, otherwise, space switching is prohibited.
  • the preset key database of the terminal has a preset key corresponding to each user space, and only the received identity verification key is consistent with a preset key stored in the preset key database.
  • the user can switch to the user space corresponding to the preset key.
  • the method further includes: a setting unit 208, configured to set at least one preset for each user space in the plurality of user spaces according to the received setting command before receiving the identity verification key in the current user space. Key.
  • a preset preset key may be set for each user space in advance, and the preset key corresponding to each user space setting may be one or more, and the user space with multiple preset keys has Higher security.
  • the user can set a password type preset key for the user space for work, and set the iris and password preset keys for the user space for storing the private contact.
  • the storage unit 210 further saves the set at least one preset key corresponding to each user space to the preset key database before the current user space receives the identity verification key. For retrieving whether the preset key database has a preset key that is consistent with the authentication key received in the current user space.
  • each user space and at least one preset key set for it are required to be stored in a preset key database, thereby facilitating identity verification and space switching according to the association relationship thereof.
  • the implementation of the identity authentication keystore can be various, and can be a database or a file.
  • the data organization mode of the identity authentication keystore can also be various, as long as each user can be guaranteed.
  • the space may be associated with at least one of its corresponding preset keys.
  • the at least one preset key includes at least one of the following or The combination: fingerprint information, iris image information, face image information, text information, audio information, reference object information, color information.
  • the at least one preset key corresponding to each user space includes but is not limited to at least one of the following or a combination thereof: fingerprint information, iris image information, face image information, text information, audio information, reference objects Information, color information.
  • fingerprint information iris image information
  • face image information text information
  • audio information reference objects Information
  • color information color information.
  • a plurality of preset keys may be used separately or in combination.
  • the user may set a password type preset key for the user space used for work.
  • the user space for storing private contacts sets two preset keys, iris and password.
  • Figure 3 shows a block diagram of a terminal in accordance with one embodiment of the present invention.
  • a terminal 300 includes a plurality of user spaces 302 and an identity-based space switching device 200 shown in FIG. 2 according to an embodiment of the present invention. Therefore, the terminal 300 has FIG. 2 The same technical effects of the illustrated identity-based spatial switching device 200 are not described herein.
  • FIG. 4 and 5 illustrate corresponding diagrams of user space and keystores in accordance with one embodiment of the present invention.
  • n spaces share an Android OS (Android Operating System), each space corresponds to one user, and the n user spaces can use the isolation technology to implement data.
  • the isolation of each other allows each user to run in their own space. If the terminal resource is not isolated by using isolation technology, the resource is shared resources will be shared by all users. For example, the camera is a shared resource, and users in n spaces can call the camera to take photos.
  • the Namespace (namespace) is used to isolate the global resources of the system, so that each user space is isolated from each other.
  • the Namespace is a kind of isolation provided by the kernel of Linux (a free operating system on a personal computer) for isolation.
  • the system global resource mechanism is mainly used in the operating system-level virtualization solution based on container technology, which can isolate different containers that use global system resources.
  • the terminal includes: an identity authentication module, a user space switching module, and an identity authentication keystore, wherein the identity authentication keystore is used for identity authentication.
  • the identity authentication module, the user space switching module, and the identity authentication keystore are n.
  • User space is shared, that is, in any user space, the user can call the identity authentication module and the user space switching module to enter the identity authentication key pool.
  • the identity authentication module mainly performs the following functions: setting the user's identity authentication mode and binding with the corresponding user space; completing the user identity authentication when the screen is unlocked, specifically including:
  • User-set authentication methods are various, such as fingerprint recognition, pattern unlocking, and numeric passwords.
  • the unlocking key can be set for each user space.
  • the fingerprint authentication mode unlocking mode is set for the user space
  • the unlocking fingerprint of the user space 1 is set as the right thumb
  • the unlocking fingerprint of the user space 2 is set as the right index finger.
  • the unlocked fingerprint, pattern or password is collectively referred to as the identity authentication key K, and the K of each user space is different.
  • each user space corresponds to an identity authentication key.
  • K, user space i and K i are bound one by one (as shown in Figure 4).
  • any identity authentication key K K 1 , K 2 , . . . , K n
  • the user space i corresponds to n keys K(K 1 , K 2 , . . . , K n ).
  • the user space switching module is used to complete the function of user space switching, including switching of the user space in the screen unlocking state and switching of the user space in the screen lock screen state.
  • the user space switching in the unlock state of the screen means that the user has completed the screen unlocking, and is normally in the space i, and then switches to the space j; the user space switching in the screen lock screen state means that the current screen is in the locked state.
  • the identity authentication key K i provided by the user, the identity authentication is completed and the screen is unlocked, and directly enters the space i.
  • the identity authentication keystore is used to store the user identity authentication data.
  • the identity authentication key K for screen unlocking not only the identity authentication key K for screen unlocking but also the user space i corresponding to the identity authentication key K i is stored.
  • the implementation of the identity authentication key pool may be various, and may be a database or a file.
  • FIG. 6 shows a schematic diagram of a terminal in accordance with another embodiment of the present invention.
  • a terminal includes an Android OS (Android Operating System), apps (multiple applications), and data (data of user space).
  • Android OS Android Operating System
  • apps multiple applications
  • data data of user space
  • the Namespace technology is used to isolate the global resources of the system, and the permissions of the user processes in each user space are reasonably planned.
  • an app application
  • a function module that can be called are set, each of which The data of the user space is isolated from each other, and the shared resources of the system can be called by related applications in each user space.
  • the specific implementation manner of the inter-user handover in the multi-user space terminal may be as follows:
  • step 1 the user provides an identification key (verification fingerprint/pattern/password, etc.), and the user identity authentication module is invoked by the identity identification key.
  • identification key verification fingerprint/pattern/password, etc.
  • Step 2 retrieve the identity authentication keystore K(K 1 , K 2 , . . . , K n ) from the identity authentication keystore.
  • Step 1-3 If the identity key matches the K i in the identity authentication keystore K(K 1 , K 2 , . . . , K n ), the identity authentication succeeds, and the user space switching module is started, and step 4 is performed. And if the identification key does not match any of the authentication keystores K(K 1 , K 2 , . . . , K n ), step 5 is performed.
  • step 4 the screen is unlocked, and the user space switching module controls to enter the space i.
  • Step 5 The identity authentication fails and the screen is not unlocked.
  • step 1 the user switches the entry through the space provided by the system, and selects to switch to the space j to enable the identity authentication module.
  • step 2 the identity authentication keystore K(K 1 , K 2 , . . . , K n ) is retrieved.
  • Step 3 If the identity authentication key provided by the user matches one of the keys K j of the identity authentication keystore K(K 1 , K 2 , . . . , K n ), the identity authentication succeeds and the user space is enabled.
  • the switching module performs step 4; if the identification key does not match any of the authentication keystores K(K 1 , K 2 , . . . , K n ), step 5 is performed.
  • step 4 the user space switching module controls to enter the user space j.
  • step 5 the identity authentication fails, the space switch fails, and the user is still in the user space i.
  • the term "plurality” means two or more.
  • the specific meanings of the above terms in the present invention can be understood on a case-by-case basis.
  • the description of the terms “one embodiment”, “another embodiment” or the like means that a specific feature, structure, material or characteristic described in connection with the embodiment or example is included in at least one implementation of the present invention. In the example or example. In the present specification, the schematic representation of the above terms does not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in a suitable manner in any one or more embodiments or examples.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Collating Specific Patterns (AREA)

Abstract

L'invention concerne un procédé de commutation d'espace à base d'authentification d'identité, un dispositif de commutation d'authentification d'espace à base d'authentification d'identité et un terminal. Le procédé de commutation d'espace à base d'authentification d'identité consiste : à recevoir une clé d'authentification d'identité dans un espace d'utilisateur actuel (102); à rechercher, en fonction de la clé d'authentification d'identité, une base de données de clés prédéterminée pour une clé prédéterminée compatible avec la clé d'authentification d'identité (104); et à déterminer, selon le résultat de la recherche, s'il faut effectuer une commutation d'espace en fonction de la clé d'authentification d'identité (106). Grâce à ce procédé, si le fait qu'une commutation d'espace est autorisée est directement déterminé par une clé d'authentification d'identité reçue, de telle sorte qu'une authentification d'identité est effectuée pour le commutateur d'espace, et en outre, un utilisateur n'a pas à activer une interface de commutation d'espace spécifique ou une interface d'authentification de commutation d'espace à chaque fois que l'utilisateur effectue une commutation d'espace. En particulier, la présente invention réalise, pour un terminal ayant un écran verrouillé, un authentification directe d'identité et une commutation d'espace d'utilisateur alors que le terminal est dans l'état d'écran verrouillé.
PCT/CN2015/088506 2015-08-12 2015-08-30 Procédé et dispositif de commutation d'espace à base d'authentification d'identité, et terminal WO2017024633A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510494129.7 2015-08-12
CN201510494129.7A CN105630592A (zh) 2015-08-12 2015-08-12 基于身份验证的空间切换方法、装置及终端

Publications (1)

Publication Number Publication Date
WO2017024633A1 true WO2017024633A1 (fr) 2017-02-16

Family

ID=56045570

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/088506 WO2017024633A1 (fr) 2015-08-12 2015-08-30 Procédé et dispositif de commutation d'espace à base d'authentification d'identité, et terminal

Country Status (2)

Country Link
CN (1) CN105630592A (fr)
WO (1) WO2017024633A1 (fr)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106874751A (zh) * 2017-01-13 2017-06-20 北京奇虎科技有限公司 在系统保护模式下的输入方法、装置和移动终端
CN106778181A (zh) * 2017-01-13 2017-05-31 北京奇虎科技有限公司 移动终端切换到系统保护模式的方法、装置和移动终端
CN108304740B (zh) * 2017-06-02 2021-01-08 深圳三诺信息科技有限公司 一种烧录数字产品密钥的方法
CN109815668A (zh) * 2019-01-10 2019-05-28 北京珠穆朗玛移动通信有限公司 双系统移动终端控制方法、移动终端及存储介质
CN110276177B (zh) * 2019-05-24 2022-04-12 华为技术有限公司 智能终端的登录方法及电子设备
CN112051944B (zh) * 2019-06-06 2022-05-24 成都鼎桥通信技术有限公司 安卓设备上个人空间和工作空间相互切换的方法和装置
CN115242472A (zh) * 2022-07-08 2022-10-25 北京新唐思创教育科技有限公司 一种身份验证方法、装置、设备及介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880820A (zh) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 一种移动终端应用程序访问方法及移动终端
CN104350723A (zh) * 2014-05-22 2015-02-11 华为技术有限公司 账号登录的方法及装置
WO2015021548A1 (fr) * 2013-08-12 2015-02-19 Graphite Software Corporation Authentification sécurisée et basculement vers des domaines cryptés
CN104516777A (zh) * 2013-10-04 2015-04-15 三星电子株式会社 用户界面管理方法和系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102968343A (zh) * 2012-11-14 2013-03-13 广东欧珀移动通信有限公司 一种切换用户的方法及系统
CN104156644B (zh) * 2014-07-30 2017-04-19 宇龙计算机通信科技(深圳)有限公司 一种多系统进入方法、装置及终端
CN104468986A (zh) * 2014-11-20 2015-03-25 深圳市世纪安软信息技术有限公司 手机多用户操作模式管理方法及系统
CN104809378A (zh) * 2015-04-30 2015-07-29 山东超越数控电子有限公司 一种kvm本地管理系统用户身份验证设计方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102880820A (zh) * 2012-08-14 2013-01-16 东莞宇龙通信科技有限公司 一种移动终端应用程序访问方法及移动终端
WO2015021548A1 (fr) * 2013-08-12 2015-02-19 Graphite Software Corporation Authentification sécurisée et basculement vers des domaines cryptés
CN104516777A (zh) * 2013-10-04 2015-04-15 三星电子株式会社 用户界面管理方法和系统
CN104350723A (zh) * 2014-05-22 2015-02-11 华为技术有限公司 账号登录的方法及装置

Also Published As

Publication number Publication date
CN105630592A (zh) 2016-06-01

Similar Documents

Publication Publication Date Title
WO2017024633A1 (fr) Procédé et dispositif de commutation d'espace à base d'authentification d'identité, et terminal
US11914695B2 (en) Secure element as a digital pocket
US9275212B2 (en) Secure element biometric authentication system
US11003755B2 (en) Authentication using emoji-based passwords
US9519784B2 (en) Managing basic input/output system (BIOS) access
US9245131B2 (en) Multi-user universal serial bus (USB) key with customizable file sharing permissions
EP3885205A1 (fr) Procédé et appareil de commande de clé de voiture
CN103366797A (zh) 用无线认证终端授权认证及加解密的安全u盘设计方法
US10762225B2 (en) Note and file sharing with a locked device
CN110322599B (zh) 门锁管理方法、装置、电子设备及存储介质
JP2009528582A (ja) 無線認証
TWI753286B (zh) 自我加密裝置、管理伺服器、用於資料安全性之方法、及其非暫態機器可讀取儲存媒體
US9455985B2 (en) Method for secure key injection with biometric sensors
US20160285911A1 (en) Context sensitive multi-mode authentication
US9378371B2 (en) Systems and methods for account recovery using a platform attestation credential
WO2016187940A1 (fr) Procédé de protection d'informations, terminal mobile et support de stockage informatique
CN117378173A (zh) 经由安全处理器计算设备的所有权的转移
US20180137268A1 (en) Authentication screen
CN109977039A (zh) 硬盘加密密钥存储方法、装置、设备及可读存储介质
WO2015184894A2 (fr) Procédé et dispositif de mise en œuvre d'un mode de connexion multiutilisateur
KR20190128868A (ko) 블록체인 분산장부 및 암호화폐 오프라인 저장소의 인증 시스템 및 방법
US20130198836A1 (en) Facial Recognition Streamlined Login
KR20130082979A (ko) 지문인식 기반 사용자 맞춤형 추천 시스템
CN107154999B (zh) 终端及其基于环境信息的解锁方法、存储装置
US10678895B2 (en) Data input method, and electronic device and system for implementing the data input method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15900830

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15900830

Country of ref document: EP

Kind code of ref document: A1