WO2017197752A1 - 一种系统切换方法、系统切换装置及终端 - Google Patents
一种系统切换方法、系统切换装置及终端 Download PDFInfo
- Publication number
- WO2017197752A1 WO2017197752A1 PCT/CN2016/091078 CN2016091078W WO2017197752A1 WO 2017197752 A1 WO2017197752 A1 WO 2017197752A1 CN 2016091078 W CN2016091078 W CN 2016091078W WO 2017197752 A1 WO2017197752 A1 WO 2017197752A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- switching
- user
- identity verification
- terminal
- switching instruction
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
- G06F3/0482—Interaction with lists of selectable items, e.g. menus
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0484—Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
- G06F3/0486—Drag-and-drop
Definitions
- the present invention relates to the field of terminal technologies, and in particular, to a system switching method, a system switching device, and a terminal.
- Switch mode for system switching When using a dual-system terminal, the user often uses one of the systems as a normal user system for normal operations, and the other system as a private user system for private operation.
- the prior art When performing system switching, the prior art generally adopts the following two types. Switch mode for system switching:
- the ordinary user system when the ordinary user system is switched to the private user system, or the private user system is switched to the ordinary user system, authentication is required, such as: inputting a verification password;
- the above two switching modes have the following drawbacks: when the user switches in the mode 1, the user needs to perform identity authentication when switching from the private user system to the ordinary user system, and the ordinary user system often does not need to be kept secret, and the switching mode causes the switching. The process becomes cumbersome; when the user switches between the second mode, the user can switch to the private user system at will, and it is difficult to ensure the confidentiality of the private user system.
- the technical problem to be solved by the present invention is that the system switching method, the system switching device, and the terminal are provided for the system switching method of the prior art that cannot meet the needs of the user.
- a technical solution adopted by the present invention is to provide a system switching method for a terminal to perform system switching, where the first system and the second system are installed on the terminal, and the method includes:
- the authentication interface is displayed, the authentication information input by the user is received, and the authentication is passed to the second system after the authentication is passed;
- the specific method for determining whether the first switching instruction includes the identity verification information is:
- the input mode of the first switching instruction is that the user inputs a sliding switching gesture on the display interface, determining that the first switching instruction includes the identity verification information;
- the input mode of the first switching instruction is a touch system switching icon, determining that the first switching instruction does not include the identity verification information
- the method further includes the following steps:
- the second system is not switched
- the second system is not switched.
- the method further includes the following steps:
- the second system is not switched.
- a technical solution adopted by the present invention is to provide a system switching method for a terminal to perform system switching, where the first system and the second system are installed on the terminal, and the method includes:
- the authentication interface is displayed, the authentication information input by the user is received, and the authentication is passed to the second system after the authentication is passed;
- the specific method for determining whether the first switching instruction includes the identity verification information is:
- the input mode of the first switching instruction is that the user inputs a sliding switching gesture on the display interface, determining that the first switching instruction includes the identity verification information;
- the input mode of the first switching instruction input by the user is a touch system switching icon, it is determined that the first switching instruction does not include the identity verification information.
- the method further includes the following steps:
- the second system is not switched
- the second system is not switched.
- the method further includes the following steps:
- the second system is not switched.
- the present invention further provides a system switching apparatus, the apparatus comprising:
- a receiving module configured to receive a first switching instruction input by the user in the first system
- a first determining module configured to determine whether the first switching instruction includes identity verification information
- a second determining module configured to: when the first determining module determines that the first switching instruction includes the identity verification information, continue to determine whether the identity verification information is correct;
- a system switching module configured to switch to the second system when the second determining module determines that the identity verification information is correct
- a display module configured to display an identity verification interface when the first determining module determines that the first switching instruction does not include identity verification information
- the receiving module is further configured to receive identity verification information input by the user on the identity verification interface;
- a third determining module configured to determine whether the identity verification information input by the user on the identity verification interface is correct
- the system switching module is further configured to switch to the second system when the third determining module determines that the identity verification information input by the user on the identity verification interface is correct;
- the receiving module is further configured to receive a second switching instruction input by the user in the second system
- the system switching module is further configured to directly switch to the first system when the receiving module receives the second switching instruction input by the user in the second system.
- the device further includes:
- a detecting module configured to detect a user inputting a first switching instruction input manner
- the first determining module is further configured to: when the detecting module detects that the input mode of the first switching instruction by the user is to input a sliding switching gesture on the display interface, determine that the first switching instruction includes the identity verification information;
- the first determining module is further configured to: when the detecting module detects that the input mode of the first switching instruction by the user is a touch system switching icon, determine that the first switching instruction does not include the identity verification information.
- the receiving module is further configured to receive a sliding operation of the user sliding the shortcut menu
- the display module is further configured to display the shortcut menu page
- the receiving module is further configured to receive the sliding switching gesture input by a user in a blank area of the shortcut menu page.
- the device further includes:
- a geographic location detecting module configured to detect a geographic location where the terminal is currently located
- a fourth determining module configured to determine whether the current geographic location of the terminal is within a first preset geographic location
- a first execution module configured to: when the fourth determining module determines that the geographic location where the terminal is currently located is within the first preset geographic location range, continue to determine whether the first switching instruction includes the identity verification information step;
- the system switching module is further configured to: when the fourth determining module determines that the geographic location where the terminal is currently located is not within the first preset geographic location, does not switch to the second system;
- a geographic location detecting module configured to detect a geographic location where the terminal is currently located
- a fourth determining module configured to determine whether a geographic location where the terminal is currently located is within a second preset geographic location
- a first execution module configured to: when the fourth determining module determines that the geographic location where the terminal is currently located is not within the second preset geographic location, continue to determine whether the first switching instruction includes the identity verification information step;
- the system switching module is further configured to not switch to the second system when the fourth determining module determines that the geographic location where the terminal is currently located is within the second preset geographic location.
- the device further includes:
- a time detection module for detecting a current time
- a fifth determining module configured to determine whether the current time is within a first preset time range
- a second executing module configured to: when the fifth determining module determines that the current time is within the first preset time range, continue to perform the step of determining whether the first switching instruction includes identity verification information;
- the system switching module is further configured to not switch to the second system when the fifth determining module determines that the current time is not within the first preset time range;
- a time detection module for detecting a current time
- a fifth determining module configured to determine whether the current time is within a second preset time range
- a second execution module configured to: when the fifth determining module determines that the current time is not within the second preset time range, continue to perform the step of determining whether the first switching instruction includes identity verification information;
- the system switching module is further configured to not switch to the second system when the fifth determining module determines that the current time is within the second preset time range.
- the present invention also provides a mobile terminal, which includes the above system switching device, and the system switching device performs the above system switching method.
- the invention has the beneficial effects that the system switching method of the present invention is implemented, and the user needs to perform identity verification when switching from the first system to the second system, and can only switch from the first system to the second system after the identity verification is passed. Otherwise, no system switching is performed to protect the private software and private files in the second system.
- the user switches from the second system to the first system, only the second switching instruction needs to be input, and no identity verification is needed, thereby simplifying the operation process of the user entering the first system and improving the convenience of the user using the terminal.
- FIG. 1 is a flow chart of a first embodiment of a system switching method of the present invention
- FIG. 2 is a flow chart of a first embodiment of a second embodiment of the system switching method of the present invention.
- FIG. 3 is a flow chart of a second embodiment of the second embodiment of the system switching method of the present invention.
- FIG. 4 is a flow chart of a first embodiment of a third embodiment of the system switching method of the present invention.
- Figure 5 is a flowchart of a second embodiment of the third embodiment of the system switching method of the present invention.
- Figure 6 is a schematic view showing a first embodiment of the system switching device of the present invention.
- Figure 7 is a schematic view showing a second embodiment of the system switching device of the present invention.
- Figure 8 is a schematic illustration of a third embodiment of the system switching apparatus of the present invention.
- the terminal described in the present invention is a dual system terminal in which two systems are simultaneously mounted on a smart phone or a tablet computer.
- the system switching method described in the present invention is used for terminal switching, and the first system and the second system are installed on the terminal.
- FIG. 1 is a flowchart of a first embodiment of a system switching method according to the present invention.
- the method includes the following steps:
- Step S101 receiving a first switching instruction input by the user in the first system
- Step S102 determining whether the first switching instruction includes identity verification information
- Step S103 if yes, verifying whether the identity verification information is correct, and switching to the second system after the identity verification is passed;
- Step S104 if not included, displaying an identity verification interface, receiving identity verification information input by the user, and switching to the second system after the identity verification is passed;
- Step S105 receiving a second switching instruction input by the user in the second system
- step S106 the system is directly switched to the first system.
- step S105 and step S106 can also be located before step S101.
- the terminal When the terminal currently uses the first system, the terminal receives all instructions input by the user through a touch screen, a button or other input manner, and determines whether the received command belongs to the first switching instruction of the switching system, if the received command is not the first When a switching instruction is performed, the corresponding operation is performed according to the instruction input by the user. If the received instruction is the first switching instruction, it continues to determine whether the first switching instruction includes the authentication information.
- the first switching instruction includes the authentication information, verify whether the identity verification information included in the first switching instruction is correct, and when the verification identity verification information is correct, switch to the second system; conversely, when verifying the identity verification When the information is wrong, the second system is not switched, and the terminal continues to use the first system.
- the user displays the identity verification interface after inputting the first switching instruction, and receives the identity verification information input by the user on the identity verification interface, when the identity verification information input by the user is correct.
- Switching to the second system conversely, when the authentication information input by the user is wrong, the second system is not switched, and the terminal currently continues to use the first system.
- the terminal when the terminal system is switched to the second system, when the terminal currently uses the second system, the terminal receives all instructions input by the user through a touch screen, a button or other input manner, and determines whether the received command belongs to the switching system.
- the second switching instruction if the received instruction is not the second switching instruction, performs a corresponding operation according to the instruction input by the user. If the received instruction is the second switching instruction, the system directly switches to the second system, and the first system is switched back from the second system without performing any identity verification.
- the second switching instruction may be that the user touches the system switching icon in the second system, or the user inputs a sliding switching gesture or the like on the display interface.
- the first system is a common user system
- the second system is a private user system
- the common user system is used to install common application software and store user non-private files.
- the private user system is used to install private application software and store user private files.
- the first switching instruction may be a system switching icon that the user touches in the ordinary user system, or A predetermined sliding switching gesture or the like is input on the display interface of the ordinary user system.
- the terminal After receiving the first switching instruction, the terminal detects the input mode of the first switching instruction, and if the input mode of the first switching instruction is to input a sliding switching gesture on the display interface, determining that the first switching instruction includes Authenticating information, and obtaining a sliding track of the sliding switching gesture, when the sliding track is the same as the sliding track preset by the user, switching to the private user system; conversely, when the sliding track is different from the sliding track preset by the user At the same time, the terminal does not switch to the private user system, and the terminal continues to use the normal user system. That is to say, in the present embodiment, the sliding track in the sliding switching gesture is the identity verification information included in the first switching instruction.
- the preset sliding track may be a certain sliding track preset by the user or preset by the system, such as: “L”-shaped sliding track, “ ⁇ ”-shaped sliding track, and the like.
- the terminal displays an identity verification interface on the current display interface, and receives the identity verification information input by the user on the identity verification interface, when the user inputs
- the authentication information is correct, switch to the private user system; conversely, when the authentication information entered by the user is incorrect, the user does not switch to the private user system, and the terminal continues to use the ordinary user system; the user can also be prompted to enter the authentication.
- the information is incorrect and needs to be re-entered.
- the authentication interface can be a password input interface for receiving a password input by the user, and comparing the password input by the user with the preset password of the user, if the same, the authentication is passed, if not The same, authentication failed.
- the authentication interface can also be a fingerprint input interface for receiving fingerprint information input by the user, and comparing the fingerprint information input by the user with the pre-stored fingerprint information of the user, if the same, the identity verification is passed. If not the same, the authentication failed.
- the identity verification interface may also be a face recognition interface, configured to obtain facial information of the user by scanning the camera, and compare the facial information obtained by the scanning with the pre-stored facial information of the user. The authentication is passed, and if it is not the same, the authentication fails. It can be understood that the authentication interface can also be another verification interface for verifying the identity of the user, as long as it plays the role of verifying the identity of the user.
- the user needs to perform identity verification when switching from the ordinary user system to the private user system, and only after the identity verification is passed, the ordinary user system can be switched to the private user system, otherwise the system switching is not performed. In this way, the protection of private software and private files in the private user system is realized.
- the user switches from the private user system to the ordinary user system, only the switching instruction needs to be input, and the identity verification is not needed, thereby simplifying the operation process of the user entering the ordinary user system and improving the convenience of the user using the terminal.
- a hidden setting option for hiding the system switching icon is also provided in the private user system or the ordinary user system.
- the hidden setting option is set in the private user system.
- the user can directly input a sliding switching gesture on the current display interface of the ordinary user system.
- the specific method for the user to input the sliding switching gesture on the display interface is: receiving a sliding operation of the user sliding the shortcut menu, and displaying the shortcut menu page, and receiving the user The sliding switching gesture input by the shortcut menu page blank area. Specifically, if the user needs to input a sliding switching gesture, the user needs to slide up and drag the shortcut menu page from the bottom of the screen, or slide the shortcut menu page from the top of the screen, and then perform a sliding switching gesture in the blank area of the shortcut menu page. Input. The user can only input the sliding switching gesture in the specified area to perform system switching, and the sliding switching gesture cannot be performed in other areas, thereby increasing the privacy of the user input sliding switching gesture.
- the terminal determines whether the terminal is currently in the private user system or the ordinary user system, after receiving the lock screen command and locking the screen, the terminal is unlocked again, and the terminal enters the ordinary user system. Or when the device is turned on, the terminal enters the normal user system.
- FIG. 2 is a flowchart of a first embodiment of a second embodiment of a system switching method according to a second embodiment of the system switching method. The method includes the following steps:
- Step S201 receiving a first switching instruction input by the user in the first system
- Step S202 detecting a geographical location where the terminal is currently located
- step S203 it is determined whether the current geographic location of the terminal is within the first preset geographic location; if the geographic location where the terminal is currently located is not within the first preset geographic location, step S204 is performed; The geographic location is within the first preset geographic location, and then proceeds to step S205;
- Step S204 not switching to the second system
- Step S205 determining whether the first switching instruction includes identity verification information
- Step S206 if yes, verifying whether the identity verification information is correct, and switching to the second system after the identity verification is passed;
- Step S207 if not included, displaying an identity verification interface, receiving identity verification information input by the user, and switching to the second system after the identity verification is passed;
- Step S208 receiving a second switching instruction input by the user in the second system
- step S209 the system is directly switched to the first system.
- the user may set the geographical location of the company to the first preset geographic location, and after receiving the first switching instruction input by the user, the terminal may perform GPS positioning, wifi positioning, or base station positioning.
- the positioning method obtains the geographical location where the terminal is currently located, and compares the obtained geographical location of the terminal with the first preset geographic location set by the user. If the current geographic location of the terminal is within the first preset geographic location, the method further determines whether the first switching instruction includes the identity verification information, and switches or does not switch the system according to the determination result and the identity verification result. Conversely, if the current geographic location of the terminal is not within the first preset geographic location, the current operation is terminated, and the first switching instruction does not continue to determine whether the first switching instruction includes the authentication information, and does not switch to the second system.
- the terminal is allowed to perform the system switching operation only when it is detected that the terminal is currently in the first preset geographical location range set by the user.
- system switching operations are not allowed. That is to say, if the user sets the company address to the first preset geographical location, only the company can perform the system switching operation, and the system switching operation cannot be performed outside the company, thereby better protecting the hidden effect of the user.
- the system switching icon is hidden.
- FIG. 3 is a flowchart of a second embodiment of a second embodiment of a system switching method according to a second embodiment of the system switching method. The method includes the following steps:
- Step S301 receiving a first switching instruction input by the user in the first system
- Step S302 detecting a geographical location where the terminal is currently located
- step S303 it is determined whether the current geographic location of the terminal is within the second preset geographic location; if the geographic location where the terminal is currently located is within the second preset geographic location, step S304 is performed; If the geographic location is not within the second preset geographic location, proceed to step S305;
- Step S304 not switching to the second system
- Step S305 determining whether the first switching instruction includes identity verification information
- Step S306 if yes, verifying whether the identity verification information is correct, and switching to the second system after the identity verification is passed;
- Step S307 if not included, displaying an identity verification interface, receiving identity verification information input by the user, and switching to the second system after the identity verification is passed;
- Step S308 receiving a second switching instruction input by the user in the second system
- step S309 the system is directly switched to the first system.
- the user may set a geographic location such as a home as a second preset geographic location, and after receiving the first switching instruction input by the user, the terminal may perform GPS positioning, wifi positioning, or base station positioning.
- the location mode obtains the current geographic location of the terminal, and compares the obtained geographical location of the terminal with the second preset geographic location set by the user. If the current location of the terminal is not in the second preset geographic location, the method further determines whether the first handover instruction includes the identity verification information, and switches or does not switch the system according to the determination result and the identity verification result. Conversely, if the current geographic location of the terminal is within the second preset geographic location, the current operation is terminated, and it is not continued to determine whether the first switching instruction includes the authentication information, and does not switch to the second system.
- the terminal is allowed to perform the system switching operation only when it is detected that the terminal is not in the second preset geographical location range set by the user, and when detecting that the terminal is currently in the second preset geographical location range set by the user, , system switching operations are not allowed. That is to say, if the user sets the home address to the second preset geographic location, the user cannot perform system switching within the home range, and the system switching operation can be performed only outside the home range, thereby better protecting the hidden effect of the user.
- the system switching icon is hidden.
- the user can set the first preset geographic location and the second preset geographic location at the same time, so that the user can better confidentialize the privacy software and the privacy file located in the second system.
- FIG. 4 is a flowchart of a first embodiment of a system switching method according to a third embodiment of the present invention.
- the method includes the following steps:
- Step S401 receiving a first switching instruction input by the user in the first system
- Step S402 detecting a current time
- Step S403 determining whether the current time is within the first preset time range; if the current time is not within the first preset time range, executing step S404; if the current time is within the first preset time range, continuing the step S405;
- Step S404 not switching to the second system
- Step S405 determining whether the first switching instruction includes identity verification information
- Step S406 if yes, verifying whether the identity verification information is correct, and switching to the second system after the identity verification is passed;
- Step S407 if not included, displaying an identity verification interface, receiving identity verification information input by the user, and switching to the second system after the identity verification is passed;
- Step S408 receiving a second switching instruction input by the user in the second system
- step S409 the system is directly switched to the first system.
- the user may set any time period as the first preset time range, and after receiving the first switching instruction input by the user, the terminal acquires current time information, and obtains the obtained time information.
- the current time is compared with the first preset time range set by the user. If the current time is within the first preset time range, it is further determined whether the first switching instruction includes the identity verification information, and switches or does not switch the system according to the determination result and the identity verification result. Conversely, if the current time is not within the first preset time range, the current operation is terminated, and it is not continued to determine whether the first switching instruction includes the authentication information, and does not switch to the second system.
- the terminal is allowed to perform the system switching operation only when it is detected that the current time of the terminal is within the first preset time range set by the user, and when the current time of the terminal is not within the first preset time range set by the user. , system switching operations are not allowed. In other words, if the user sets 8:00-20:00 to the first preset time range, the user can only perform system switching operations within the time range of 8:00-20:00, outside of this time range. The system switching operation cannot be performed to better protect the hidden effect of the user.
- the system switching icon is hidden.
- FIG. 5 is a flowchart of a second embodiment of a system switching method according to a third embodiment of the present invention.
- the method includes the following steps:
- Step S501 receiving a first switching instruction input by the user in the first system
- Step S502 detecting a current time
- Step S503 determining whether the current time is within the second preset time range; if the current time is within the second preset time range, executing step S504; if the current time is not within the second preset time range, continuing the step S505;
- Step S504 not switching to the second system
- Step S505 determining whether the first switching instruction includes identity verification information
- Step S506 if yes, verifying whether the identity verification information is correct, and switching to the second system after the identity verification is passed;
- Step S507 if not included, displaying an identity verification interface, receiving identity verification information input by the user, and switching to the second system after the identity verification is passed;
- Step S508 receiving a second switching instruction input by the user in the second system
- step S509 the system is directly switched to the first system.
- the user may set any time period to a second preset time range, and after receiving the first switching instruction input by the user, the terminal acquires current time information, and obtains the obtained time information.
- the current time is compared with a second preset time range set by the user. If the current time is not within the second preset time range, proceed to determine whether the first switching instruction includes the identity verification information, and switch or not switch the system according to the determination result and the identity verification result. Conversely, if the current time is within the second preset time range, the current operation is terminated, and it is not continued to determine whether the first switching instruction includes the authentication information, and does not switch to the second system.
- the terminal is allowed to perform the system switching operation only when it is detected that the current time of the terminal is not within the second preset time range set by the user, and when the current time of the terminal is detected to be within the second preset time range set by the user , system switching operations are not allowed. That is to say, if the user sets 23:00-7:00 to the second preset time range, the user cannot perform the system switching operation within the time range of 23:00-7:00, and the time range outside the time range can be performed. The system switches operations to better protect the hidden effects of the user.
- the system switching icon is hidden.
- the user can set the first preset time range and the second preset time range at the same time, so that the user can better confidentialize the privacy software and the privacy file located in the second system.
- the user may also set the first preset geographic location, and/or the second preset geographic location, and/or the first preset time range, and/or the second preset time range.
- FIG. 6 is a schematic diagram of a first embodiment of a system switching apparatus according to the present invention
- the apparatus includes:
- the receiving module 100 is configured to receive a first switching instruction input by the user in the first system
- the first determining module 200 is configured to determine whether the first switching instruction includes identity verification information
- the second determining module 300 is configured to continue to determine whether the identity verification information is correct when the first determining module 200 determines that the first switching instruction includes the identity verification information.
- the system switching module 400 is configured to switch to the second system when the second determining module 300 determines that the identity verification information is correct.
- the display module 500 is configured to display an identity verification interface when the first determining module 200 determines that the first switching instruction does not include the identity verification information;
- the receiving module 100 is further configured to receive identity verification information input by the user on the identity verification interface;
- the third determining module 600 is configured to determine whether the identity verification information input by the user on the identity verification interface is correct.
- the system switching module 400 is further configured to switch to the second system when the third determining module 600 determines that the identity verification information input by the user on the identity verification interface is correct;
- the receiving module 100 is further configured to receive a second switching instruction input by the user in the second system
- the system switching module 400 is further configured to directly switch to the first system when the receiving module 100 receives the second switching instruction input by the user in the second system.
- the device further includes:
- a detecting module configured to detect a user inputting a first switching instruction input manner
- the first determining module 200 is further configured to: when the detecting module detects that the input mode of the first switching instruction by the user is to input a sliding switching gesture on the display interface, determine that the first switching instruction includes the identity verification information;
- the first determining module 200 is further configured to: when the detecting module detects that the input mode of the first switching instruction by the user is a touch system switching icon, determine that the first switching instruction does not include the identity verification information.
- the receiving module 100 is further configured to receive a sliding operation of the user sliding the shortcut menu
- the display module 500 is further configured to display the shortcut menu page
- the receiving module 100 is further configured to receive the sliding switching gesture input by the user in a blank area of the shortcut menu page.
- FIG. 7 is a schematic diagram of a second embodiment of a system switching apparatus according to the present invention.
- the apparatus further includes:
- the geographic location detecting module 700 is configured to detect a geographic location where the terminal is currently located;
- the fourth determining module 800 is configured to determine whether the geographic location where the terminal is currently located is within a first preset geographic location
- the first execution module is configured to: when the fourth determining module 800 determines that the geographic location where the terminal is currently located is within the first preset geographic location, perform the step of determining whether the first switching instruction includes the identity verification information;
- the system switching module 400 is further configured to not switch to the second system when the fourth determining module 800 determines that the geographic location where the terminal is currently located is not within the first preset geographic location range;
- the geographic location detecting module 700 is configured to detect a geographic location where the terminal is currently located;
- the fourth determining module 800 is configured to determine whether the geographic location where the terminal is currently located is within a second preset geographic location
- a first execution module configured to: when the fourth determining module 800 determines that the geographic location where the terminal is currently located is not within the second preset geographic location, proceed to determine whether the first switching instruction includes the identity verification information;
- the system switching module 400 is further configured to not switch to the second system when the fourth determining module 800 determines that the geographic location where the terminal is currently located is within the second preset geographic location.
- FIG. 8 is a schematic diagram of a third embodiment of a system switching apparatus according to the present invention.
- the apparatus further includes:
- a time detecting module 900 configured to detect a current time
- the fifth determining module 110 is configured to determine whether the current time is within a first preset time range
- a second execution module configured to continue, when the fifth determining module 110 determines that the current time is within the first preset time range, the step of determining whether the first switching instruction includes the identity verification information;
- the system switching module 400 is further configured to: when the fifth determining module 110 determines that the current time is not within the first preset time range, does not switch to the second system;
- a time detecting module 900 configured to detect a current time
- the fifth determining module 110 is configured to determine whether the current time is within a second preset time range
- a second execution module configured to continue, when the fifth determining module 110 determines that the current time is not within the second preset time range, the step of determining whether the first switching instruction includes the identity verification information
- the system switching module 400 is further configured to not switch to the second system when the fifth determining module 110 determines that the current time is within the second preset time range.
- the present invention also discloses a mobile terminal comprising the system switching device as described in the above embodiments, the system switching device performing the system switching method described in the above embodiments.
- the mobile terminal is further provided with a processor for controlling and coordinating the operation of each module in the mobile terminal, and a memory for storing preset information and the like.
- a processor for controlling and coordinating the operation of each module in the mobile terminal
- a memory for storing preset information and the like.
- the storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- Medical Informatics (AREA)
- Social Psychology (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
本发明公开了一种系统切换方法、系统切换装置及终端,其中,系统切换方法用于终端进行系统切换,该终端上安装有第一系统和第二系统,该方法包括:接收用户在第一系统内输入的第一切换指令;判断第一切换指令是否包含身份验证信息;若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;接收用户在第二系统内输入的第二切换指令;直接切换至第一系统。实施本发明的系统切换方法,用户在由第一系统切换至第二系统时,需要进行身份验证,而用户在由第二系统切换至第一系统时,不需要进行身份验证。
Description
【技术领域】
本发明涉及终端技术领域,特别是涉及一种系统切换方法、系统切换装置及终端。
【背景技术】
随着科学技术的发展,信息时代的到来,手机、平板电脑等移动终端逐渐走进人们生活并改变人们生活。伴随着用户使用终端需求的多元化,单系统终端已经很难满足用户的使用需求。随之,同时搭载两个系统的双系统终端逐渐走进人们生活。
在使用双系统终端时,用户往往将其中一个系统作为普通用户系统进行普通操作使用,而将另一个系统作为私密用户系统进行私密操作使用,在进行系统切换时,现有技术通常采用以下两种切换方式进行系统切换:
方式一,由普通用户系统切换至私密用户系统、或由私密用户系统切换至普通用户系统时均需要进行身份验证,如:输入验证密码等;
方式二,由普通用户系统切换至私密用户系统、或由私密用户系统切换至普通用户系统时均不需要进行身份验证,可随意进行切换,不需要确认用户身份信息。
而上述两种切换方式存在以下缺陷:用户在使用方式一进行切换时,在由私密用户系统切换至普通用户系统时也需要进行身份验证,而普通用户系统往往不需要保密,该切换方式导致切换过程变得繁琐;用户在使用方式二进行切换时,可随意切换至私密用户系统,如此,又很难保证私密用户系统的保密性。
【发明内容】
本发明要解决的技术问题在于,针对现有技术的系统切换方式不能满足用户需要的问题,提供一种系统切换方法、系统切换装置及终端。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种系统切换方法,用于终端进行系统切换,该终端上安装有第一系统和第二系统,所述方法包括:
接收用户在第一系统内输入的第一切换指令;
判断所述第一切换指令是否包含身份验证信息;
若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
接收用户在第二系统内输入的第二切换指令;
直接切换至第一系统;
其中,所述判断第一切换指令是否包含身份验证信息的具体方法为:
检测用户输入第一切换指令的输入方式;
若用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势,则判断所述第一切换指令包含身份验证信息;
若用户输入第一切换指令的输入方式为点触系统切换图标,则判断所述第一切换指令不包含身份验证信息;
其中,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:
检测所述终端当前所处的地理位置;
判断所述终端当前所处的地理位置是否在第一预设地理位置范围内;
若所述终端当前所处的地理位置在第一预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若所述终端当前所处的地理位置不在第一预设地理位置范围内,则不切换至第二系统;
和/或,
检测所述终端当前所处的地理位置;
判断所述终端当前所处的地理位置是否在第二预设地理位置范围内;
若所述终端当前所处的地理位置不在第二预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若所述终端当前所处的地理位置在第二预设地理位置范围内,则不切换至第二系统。
进一步的,所述在显示界面输入滑动切换手势的具体方法为:
接收用户滑动拖出快捷菜单的滑动操作,并显示所述快捷菜单页面;
接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。
进一步的,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:
检测当前时间;
判断当前时间是否处于第一预设时间范围内;
若当前时间处于第一预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若当前时间不处于第一预设时间范围内,则不切换至第二系统;
和/或,
检测当前时间;
判断当前时间是否处于第二预设时间范围内;
若当前时间不处于第二预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若当前时间处于第二预设时间范围内,则不切换至第二系统。
为解决上述技术问题,本发明采用的一个技术方案是:提供一种系统切换方法,用于终端进行系统切换,该终端上安装有第一系统和第二系统,所述方法包括:
接收用户在第一系统内输入的第一切换指令;
判断所述第一切换指令是否包含身份验证信息;
若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
接收用户在第二系统内输入的第二切换指令;
直接切换至第一系统。
进一步的,所述判断第一切换指令是否包含身份验证信息的具体方法为:
检测用户输入第一切换指令的输入方式;
若用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势,则判断所述第一切换指令包含身份验证信息;
若用户输入第一切换指令的输入方式为点触系统切换图标,则判断所述第一切换指令不包含身份验证信息。
进一步的,所述在显示界面输入滑动切换手势的具体方法为:
接收用户滑动拖出快捷菜单的滑动操作,并显示所述快捷菜单页面;
接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。
进一步的,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:
检测所述终端当前所处的地理位置;
判断所述终端当前所处的地理位置是否在第一预设地理位置范围内;
若所述终端当前所处的地理位置在第一预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若所述终端当前所处的地理位置不在第一预设地理位置范围内,则不切换至第二系统;
和/或,
检测所述终端当前所处的地理位置;
判断所述终端当前所处的地理位置是否在第二预设地理位置范围内;
若所述终端当前所处的地理位置不在第二预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若所述终端当前所处的地理位置在第二预设地理位置范围内,则不切换至第二系统。
进一步的,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:
检测当前时间;
判断当前时间是否处于第一预设时间范围内;
若当前时间处于第一预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若当前时间不处于第一预设时间范围内,则不切换至第二系统;
和/或,
检测当前时间;
判断当前时间是否处于第二预设时间范围内;
若当前时间不处于第二预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;
若当前时间处于第二预设时间范围内,则不切换至第二系统。
为解决上述技术问题,本发明还提供一种系统切换装置,所述装置包括:
接收模块,用于接收用户在第一系统内输入的第一切换指令;
第一判断模块,用于判断所述第一切换指令是否包含身份验证信息;
第二判断模块,用于在所述第一判断模块判断所述第一切换指令中包含身份验证信息时,继续判断该身份验证信息是否正确;
系统切换模块,用于在所述第二判断模块判断该身份验证信息正确时,切换至第二系统;
显示模块,用于在所述第一判断模块判断所述第一切换指令中不包含身份验证信息时,显示身份验证界面;
所述接收模块还用于接收用户在所述身份验证界面输入的身份验证信息;
第三判断模块,用于判断用户在所述身份验证界面输入的身份验证信息是否正确;
所述系统切换模块还用于在所述第三判断模块判断用户在所述身份验证界面输入的身份验证信息正确时,切换至第二系统;
所述接收模块还用于接收用户在第二系统内输入的第二切换指令;
所述系统切换模块还用于在所述接收模块接收到用户在第二系统内输入的第二切换指令时直接切换至第一系统。
进一步的,所述装置还包括:
检测模块,用于检测用户输入第一切换指令的输入方式;
所述第一判断模块还用于在所述检测模块检测用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势时,判断所述第一切换指令包含身份验证信息;
所述第一判断模块还用于在所述检测模块检测用户输入第一切换指令的输入方式为点触系统切换图标时,判断所述第一切换指令不包含身份验证信息。
进一步的,所述接收模块还用于接收用户滑动拖出快捷菜单的滑动操作;
所述显示模块还用于显示所述快捷菜单页面;
所述接收模块还用于接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。
进一步的,所述装置还包括:
地理位置检测模块,用于检测所述终端当前所处的地理位置;
第四判断模块,用于判断所述终端当前所处的地理位置是否在第一预设地理位置范围内;
第一执行模块,用于在所述第四判断模块判断所述终端当前所处的地理位置在第一预设地理位置范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;
所述系统切换模块还用于在所述第四判断模块判断所述终端当前所处的地理位置不在第一预设地理位置范围内时,不切换至第二系统;
和/或,
地理位置检测模块,用于检测所述终端当前所处的地理位置;
第四判断模块,用于判断所述终端当前所处的地理位置是否在第二预设地理位置范围内;
第一执行模块,用于在所述第四判断模块判断所述终端当前所处的地理位置不在第二预设地理位置范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;
所述系统切换模块还用于在所述第四判断模块判断所述终端当前所处的地理位置在第二预设地理位置范围内时,不切换至第二系统。
进一步的,所述装置还包括:
时间检测模块,用于检测当前时间;
第五判断模块,用于判断所述当前时间是否处于第一预设时间范围内;
第二执行模块,用于在所述第五判断模块判断当前时间处于第一预设时间范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;
所述系统切换模块还用于在所述第五判断模块判断当前时间不处于第一预设时间范围内时,不切换至第二系统;
和/或,
时间检测模块,用于检测当前时间;
第五判断模块,用于判断所述当前时间是否处于第二预设时间范围内;
第二执行模块,用于在所述第五判断模块判断当前时间不处于第二预设时间范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;
所述系统切换模块还用于在所述第五判断模块判断当前时间处于第二预设时间范围内时,不切换至第二系统。
为解决上述技术问题,本发明还提供一种移动终端,该移动终端包括上述系统切换装置,该系统切换装置执行上述系统切换方法。
本发明的有益效果是:实施本发明的系统切换方法,用户在由第一系统切换至第二系统时,需要进行身份验证,只有在身份验证通过之后,才能由第一系统切换至第二系统,否则不进行系统切换,以此来实现对第二系统内私密软件及私密文件的保护。而用户在由第二系统切换至第一系统时,只需要输入第二切换指令,不需要进行身份验证,以此简化用户进入第一系统的操作过程,提高用户使用终端的便捷性。
【附图说明】
图1是本发明系统切换方法的第一实施例的流程图;
图2是本发明系统切换方法的第二实施例中第一实施方式的流程图;
图3是本发明系统切换方法的第二实施例中第二实施方式的流程图;
图4是本发明系统切换方法的第三实施例中第一实施方式的流程图;
图5是本发明系统切换方法的第三实施例中第二实施方式的流程图;
图6是本发明系统切换装置的第一实施例的示意图;
图7是本发明系统切换装置的第二实施例的示意图;
图8是本发明系统切换装置的第三实施例的示意图。
【具体实施方式】
为更进一步阐述本发明为实现预定发明目的所采取的技术手段及功效,以下结合附图及较佳实施例,对依据本发明的具体实施方式、结构、特征及其功效,详细说明如后。
本发明中所描述的终端为智能手机、平板电脑等同时搭载两个系统的双系统终端。本发明中所描述的系统切换方法用于终端进行系统切换,该终端上安装有第一系统和第二系统。
请参阅图1,为本发明系统切换方法的第一实施例的流程图,在系统切换方法的第一实施例中,该方法包括以下步骤:
步骤S101,接收用户在第一系统内输入的第一切换指令;
步骤S102,判断该第一切换指令是否包含身份验证信息;
步骤S103,若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
步骤S104,若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
步骤S105,接收用户在第二系统内输入的第二切换指令;
步骤S106,直接切换至第一系统。
可以理解的,步骤S105和步骤S106也可以位于步骤S101之前。
在终端当前使用第一系统时,终端接收用户通过触控屏、按键或其他输入方式输入的所有指令,并判断所接收的指令是否属于切换系统的第一切换指令,若所接收的指令不是第一切换指令,则按照用户所输入的指令进行相应的操作。若所接收的指令是第一切换指令,则继续判断第一切换指令是否包含身份验证信息。
若该第一切换指令中包含身份验证信息,则验证该第一切换指令中所包含的身份验证信息是否正确,当验证身份验证信息正确时,切换至第二系统;相反的,当验证身份验证信息错误时,不切换至第二系统,终端当前继续保持使用第一系统。
若该第一切换指令中不包含身份验证信息,则在用户输入第一切换指令之后显示身份验证界面,并接收用户在该身份验证界面输入的身份验证信息,当用户输入的身份验证信息正确时,切换至第二系统;相反的,当用户输入的身份验证信息错误时,不切换至第二系统,终端当前继续保持使用第一系统。
进一步的,当终端系统被切换至第二系统,终端当前使用第二系统时,终端接收用户通过触控屏、按键或其他输入方式输入的所有指令,并判断所接收的指令是否属于切换系统的第二切换指令,若所接收的指令不是第二切换指令,则按照用户所输入的指令进行相应的操作。若所接收的指令是第二切换指令,则直接切换至第二系统,不需要进行任何身份验证即可实现从第二系统切回第一系统。优选的,该第二切换指令可以是用户在第二系统内点触系统切换图标、或用户在显示界面输入滑动切换手势等。
具体的,在本实施方式中,该第一系统为普通用户系统,该第二系统为私密用户系统。该普通用户系统用于安装常用应用软件、存储用户非私密文件,该私密用户系统用于安装私密应用软件、存储用户私密文件。用户在使用普通用户系统时,如果需要切换至私密用户系统,则需要在终端上输入第一切换指令,具体的,第一切换指令可以是用户点触位于普通用户系统内的系统切换图标、或在普通用户系统的显示界面上输入预定的滑动切换手势等。
终端在接收到该第一切换指令后,检测用户输入第一切换指令的输入方式,若用户输入第一切换指令的输入方式为在显示界面上输入滑动切换手势,则判定该第一切换指令包含身份验证信息,并获取该滑动切换手势的滑动轨迹,当该滑动轨迹与用户预设的滑动轨迹相同时,切换至私密用户系统;相反的,当该滑动轨迹与用户预设的滑动轨迹不相同时,不切换至私密用户系统,终端当前继续保持使用普通用户系统。也就是说,在本实施方式中,该滑动切换手势中的滑动轨迹就是第一切换指令中所包含的身份验证信息。具体的,该预设的滑动轨迹可以是用户预先设置或系统预先设置的某一滑动轨迹,如:“L”形滑动轨迹、“Δ”形滑动轨迹等。
若用户输入第一切换指令的输入方式为在普通用户系统点触系统切换图标,则判断该第一切换指令不包含身份验证信息。也就是说,终端在接收到用户在普通用户系统进行的点触系统切换图标的操作之后,在当前显示界面显示身份验证界面,并接收用户在该身份验证界面输入的身份验证信息,当用户输入的身份验证信息正确时,切换至私密用户系统;相反的,当用户输入的身份验证信息错误时,不切换至私密用户系统,终端当前继续保持使用普通用户系统;也可以提示用户输入的身份验证信息错误,需要重新输入,在用户输入预设次数的身份验证信息仍然错误时,不切换至私密用户系统,终端当前继续保持使用普通用户系统。可以理解的,该身份验证界面可以是密码输入界面,用于接收用户输入的密码,并将接收到用户输入的密码后与用户预设密码进行比对,若相同,则身份验证通过,若不相同,则身份验证失败。可以理解的,该身份验证界面还可以是指纹输入界面,用于接收用户输入的指纹信息,并将接收到用户输入的指纹信息后与用户预存指纹信息进行比对,若相同,则身份验证通过,若不相同,则身份验证失败。还可以理解的,该身份验证界面还可以是脸部识别界面,用于通过摄像头扫描获取用户的脸部信息,并将扫描获取的脸部信息与用户预存脸部信息进行比对,若相同,则身份验证通过,若不相同,则身份验证失败。可以理解的,该身份验证界面还可以是其他对用户身份进行验证的验证界面,只要起到验证用户身份的作用即可。
实施本发明的系统切换方法,用户在由普通用户系统切换至私密用户系统时,需要进行身份验证,只有在身份验证通过之后,才能由普通用户系统切换至私密用户系统,否则不进行系统切换,以此来实现对私密用户系统内私密软件及私密文件的保护。而用户在由私密用户系统切换至普通用户系统时,只需要输入切换指令,不需要进行身份验证,以此简化用户进入普通用户系统的操作过程,提高用户使用终端的便捷性。
进一步的,该私密用户系统或普通用户系统内还设有用于隐藏该系统切换图标的隐藏设置选项。优选的,该隐藏设置选项设置于私密用户系统内。
在本实施方式中,用户可直接在普通用户系统的当前显示界面输入滑动切换手势。在其他实施方式中,为了增加用户输入滑动切换手势的隐秘性,用户在显示界面输入滑动切换手势的具体方法为:接收用户滑动拖出快捷菜单的滑动操作,并显示快捷菜单页面,接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。具体的,用户如果需要输入滑动切换手势,需要从屏幕底端向上滑动拖出快捷菜单页面、或从屏幕顶端向下滑动拖出快捷菜单页面,然后在快捷菜单页面的空白区域内进行滑动切换手势输入。用户只能在指定区域内输入滑动切换手势,才能进行系统切换,而在其他区域无法进行滑动切换手势,起到增加用户输入滑动切换手势隐秘性的作用。
进一步的,在使用终端过程中,无论终端当前处于私密用户系统或普通用户系统,在接收到锁屏指令并锁屏之后,再次解锁,终端进入普通用户系统。或是在开机时,终端进入普通用户系统。
请参阅图2,为本发明系统切换方法的第二实施例中第一实施方式的流程图,在系统切换方法第二实施例的第一实施方式中,该方法包括以下步骤:
步骤S201,接收用户在第一系统内输入的第一切换指令;
步骤S202,检测终端当前所处的地理位置;
步骤S203,判断终端当前所处的地理位置是否在第一预设地理位置范围内;若终端当前所处的地理位置不在第一预设地理位置范围内,则执行步骤S204;若终端当前所处的地理位置在第一预设地理位置范围内,则继续执行步骤S205;
步骤S204,不切换至第二系统;
步骤S205,判断该第一切换指令是否包含身份验证信息;
步骤S206,若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
步骤S207,若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
步骤S208,接收用户在第二系统内输入的第二切换指令;
步骤S209,直接切换至第一系统。
具体的,用户在使用本终端的过程中,可将公司等地理位置设置为第一预设地理位置,终端在接收到用户输入的第一切换指令后,通过GPS定位、wifi定位、或基站定位等定位方式定位获取终端当前所处的地理位置,并将所获取的终端当前所述的地理位置与用户设置的第一预设地理位置进行比对。若终端当前所处的地理位置在第一预设地理位置范围内,则继续判断该第一切换指令是否包含身份验证信息,并根据判断结果及身份验证结果切换或不切换系统。相反的,若终端当前所处的地理位置不在第一预设地理位置范围内,则终止本次操作,不继续判断该第一切换指令是否包含身份验证信息,且不切换至第二系统。
本终端只有在检测到终端当前处于用户所设置的第一预设地理位置范围内时,才允许进行系统切换操作,当检测到终端当前不处于用户所设置的第一预设地理位置范围内时,不允许进行系统切换操作。也就是说,如果用户将公司地址设置为第一预设地理位置,就只有在公司才能进行系统切换操作,在公司以外的地方不能进行系统切换操作,起到更好保护用户隐藏的效果。
进一步的,当检测到终端当前所处的地理位置不在第一预设地理位置范围内时,隐藏系统切换图标。
请参阅图3,为本发明系统切换方法的第二实施例中第二实施方式的流程图,在系统切换方法第二实施例的第二实施方式中,该方法包括以下步骤:
步骤S301,接收用户在第一系统内输入的第一切换指令;
步骤S302,检测终端当前所处的地理位置;
步骤S303,判断终端当前所处的地理位置是否在第二预设地理位置范围内;若终端当前所处的地理位置在第二预设地理位置范围内,则执行步骤S304;若终端当前所处的地理位置不在第二预设地理位置范围内,则继续执行步骤S305;
步骤S304,不切换至第二系统;
步骤S305,判断该第一切换指令是否包含身份验证信息;
步骤S306,若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
步骤S307,若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
步骤S308,接收用户在第二系统内输入的第二切换指令;
步骤S309,直接切换至第一系统。
具体的,用户在使用本终端的过程中,可将家庭等地理位置设置为第二预设地理位置,终端在接收到用户输入的第一切换指令后,通过GPS定位、wifi定位、或基站定位等定位方式定位获取终端当前所处的地理位置,并将所获取的终端当前所述的地理位置与用户设置的第二预设地理位置进行比对。若终端当前所处的地理位置不在第二预设地理位置范围内,则继续判断该第一切换指令是否包含身份验证信息,并根据判断结果及身份验证结果切换或不切换系统。相反的,若终端当前所处的地理位置在第二预设地理位置范围内,则终止本次操作,不继续判断该第一切换指令是否包含身份验证信息,且不切换至第二系统。
本终端只有在检测到终端当前不处于用户所设置的第二预设地理位置范围内时,才允许进行系统切换操作,当检测到终端当前处于用户所设置的第二预设地理位置范围内时,不允许进行系统切换操作。也就是说,如果用户将家庭地址设置为第二预设地理位置,用户在家庭范围内不能进行系统切换,只有在家庭范围之外才能进行系统切换操作,起到更好保护用户隐藏的效果。
进一步的,当检测到终端当前所处的地理位置在第二预设地理位置范围内时,隐藏系统切换图标。
可以理解的,用户可同时设置第一预设地理位置和第二预设地理位置,便于用户更好的对位于第二系统内的隐私软件及隐私文件进行保密。
请参阅图4,为本发明系统切换方法的第三实施例中第一实施方式的流程图,在系统切换方法第三实施例的第一实施方式中,该方法包括以下步骤:
步骤S401,接收用户在第一系统内输入的第一切换指令;
步骤S402,检测当前时间;
步骤S403,判断当前时间是否处于第一预设时间范围内;若当前时间不处于第一预设时间范围内,则执行步骤S404;若当前时间处于第一预设时间范围内,则继续执行步骤S405;
步骤S404,不切换至第二系统;
步骤S405,判断该第一切换指令是否包含身份验证信息;
步骤S406,若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
步骤S407,若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
步骤S408,接收用户在第二系统内输入的第二切换指令;
步骤S409,直接切换至第一系统。
具体的,用户在使用本终端的过程中,可将任一时间段设置为第一预设时间范围,终端在接收到用户输入的第一切换指令后,获取当前时间信息,并将所获取的当前时间与用户设置的第一预设时间范围进行比对。若当前时间处于第一预设时间范围内,则继续判断该第一切换指令是否包含身份验证信息,并根据判断结果及身份验证结果切换或不切换系统。相反的,若当前时间不处于第一预设时间范围内,则终止本次操作,不继续判断该第一切换指令是否包含身份验证信息,且不切换至第二系统。
本终端只有在检测到终端当前时间处于用户所设置的第一预设时间范围内时,才允许进行系统切换操作,当检测到终端当前时间不处于用户所设置的第一预设时间范围内时,不允许进行系统切换操作。也就是说,如果用户将8:00-20:00设置为第一预设时间范围,用户就只能在8:00-20:00的时间范围内进行系统切换操作,在此时间范围之外则不能进行系统切换操作,起到更好保护用户隐藏的效果。
进一步的,当检测到终端当前时间不在第一预设时间范围内时,隐藏系统切换图标。
请参阅图5,为本发明系统切换方法的第三实施例中第二实施方式的流程图,在系统切换方法第三实施例的第二实施方式中,该方法包括以下步骤:
步骤S501,接收用户在第一系统内输入的第一切换指令;
步骤S502,检测当前时间;
步骤S503,判断当前时间是否处于第二预设时间范围内;若当前时间处于第二预设时间范围内,则执行步骤S504;若当前时间不处于第二预设时间范围内,则继续执行步骤S505;
步骤S504,不切换至第二系统;
步骤S505,判断该第一切换指令是否包含身份验证信息;
步骤S506,若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;
步骤S507,若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;
步骤S508,接收用户在第二系统内输入的第二切换指令;
步骤S509,直接切换至第一系统。
具体的,用户在使用本终端的过程中,可将任一时间段设置为第二预设时间范围,终端在接收到用户输入的第一切换指令后,获取当前时间信息,并将所获取的当前时间与用户设置的第二预设时间范围进行比对。若当前时间不处于第二预设时间范围内,则继续判断该第一切换指令是否包含身份验证信息,并根据判断结果及身份验证结果切换或不切换系统。相反的,若当前时间处于第二预设时间范围内,则终止本次操作,不继续判断该第一切换指令是否包含身份验证信息,且不切换至第二系统。
本终端只有在检测到终端当前时间不处于用户所设置的第二预设时间范围内时,才允许进行系统切换操作,当检测到终端当前时间处于用户所设置的第二预设时间范围内时,不允许进行系统切换操作。也就是说,如果用户将23:00-7:00设置为第二预设时间范围,用户在23:00-7:00的时间范围内不能进行系统切换操作,在此时间范围之外才能进行系统切换操作,起到更好保护用户隐藏的效果。
进一步的,当检测到终端当前时间在第二预设时间范围内时,隐藏系统切换图标。
可以理解的,用户可同时设置第一预设时间范围和第二预设时间范围,便于用户更好的对位于第二系统内的隐私软件及隐私文件进行保密。
进一步的,用户还可以同时设置第一预设地理位置、和/或第二预设地理位置、和/或第一预设时间范围、和/或第二预设时间范围。
请参阅图6,为本发明系统切换装置的第一实施例的示意图,在系统切换装置的第一实施例中,该装置包括:
接收模块100,用于接收用户在第一系统内输入的第一切换指令;
第一判断模块200,用于判断该第一切换指令是否包含身份验证信息;
第二判断模块300,用于在该第一判断模块200判断该第一切换指令中包含身份验证信息时,继续判断该身份验证信息是否正确;
系统切换模块400,用于在该第二判断模块300判断该身份验证信息正确时,切换至第二系统;
显示模块500,用于在该第一判断模块200判断该第一切换指令中不包含身份验证信息时,显示身份验证界面;
该接收模块100还用于接收用户在该身份验证界面输入的身份验证信息;
第三判断模块600,用于判断用户在该身份验证界面输入的身份验证信息是否正确;
该系统切换模块400还用于在该第三判断模块600判断用户在该身份验证界面输入的身份验证信息正确时,切换至第二系统;
该接收模块100还用于接收用户在第二系统内输入的第二切换指令;
该系统切换模块400还用于在该接收模块100接收到用户在第二系统内输入的第二切换指令时直接切换至第一系统。
进一步的,该装置还包括:
检测模块,用于检测用户输入第一切换指令的输入方式;
该第一判断模块200还用于在该检测模块检测用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势时,判断该第一切换指令包含身份验证信息;
该第一判断模块200还用于在该检测模块检测用户输入第一切换指令的输入方式为点触系统切换图标时,判断该第一切换指令不包含身份验证信息。
进一步的,该接收模块100还用于接收用户滑动拖出快捷菜单的滑动操作;
该显示模块500还用于显示该快捷菜单页面;
该接收模块100还用于接收用户在该快捷菜单页面空白区域输入的该滑动切换手势。
请参阅图7,为本发明系统切换装置的第二实施例的示意图,在系统切换装置的第二实施例中,该装置在第一实施例的基础上还包括:
地理位置检测模块700,用于检测该终端当前所处的地理位置;
第四判断模块800,用于判断该终端当前所处的地理位置是否在第一预设地理位置范围内;
第一执行模块,用于在该第四判断模块800判断该终端当前所处的地理位置在第一预设地理位置范围内时,继续执行判断该第一切换指令是否包含身份验证信息的步骤;
该系统切换模块400还用于在该第四判断模块800判断该终端当前所处的地理位置不在第一预设地理位置范围内时,不切换至第二系统;
和/或,
地理位置检测模块700,用于检测该终端当前所处的地理位置;
第四判断模块800,用于判断该终端当前所处的地理位置是否在第二预设地理位置范围内;
第一执行模块,用于在该第四判断模块800判断该终端当前所处的地理位置不在第二预设地理位置范围内时,继续执行判断该第一切换指令是否包含身份验证信息的步骤;
该系统切换模块400还用于在该第四判断模块800判断该终端当前所处的地理位置在第二预设地理位置范围内时,不切换至第二系统。
请参阅图8,为本发明系统切换装置的第三实施例的示意图,在系统切换装置的第三实施例中,该装置在第一实施例或第二实施例的基础上还包括:
时间检测模块900,用于检测当前时间;
第五判断模块110,用于判断该当前时间是否处于第一预设时间范围内;
第二执行模块,用于在该第五判断模块110判断当前时间处于第一预设时间范围内时,继续执行判断该第一切换指令是否包含身份验证信息的步骤;
该系统切换模块400还用于在该第五判断模块110判断当前时间不处于第一预设时间范围内时,不切换至第二系统;
和/或,
时间检测模块900,用于检测当前时间;
第五判断模块110,用于判断该当前时间是否处于第二预设时间范围内;
第二执行模块,用于在该第五判断模块110判断当前时间不处于第二预设时间范围内时,继续执行判断该第一切换指令是否包含身份验证信息的步骤;
该系统切换模块400还用于在该第五判断模块110判断当前时间处于第二预设时间范围内时,不切换至第二系统。
本发明还公开了一种移动终端,该移动终端包括如上述各实施例所描述的系统切换装置,该系统切换装置执行上述各实施例所描述的系统切换方法。
可以理解的,在本发明中,该移动终端内还设有用于控制和协调移动终端内各模块运行的处理器,以及用于存储预设信息等的存储器。另,关于上述移动终端中各模块实现技术方案的其他细节,可参见前文所述的系统切换方法中的描述,此处不再赘述。
需要说明的是,本说明书中的各个实施例均采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似的部分互相参见即可。对于装置类实施例而言,由于其与方法实施例基本相似,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括要素的过程、方法、物品或者装置中还存在另外的相同要素。
本领域技术人员可以理解实现上述实施例的全部或部分步骤可以通过硬件来完成,也可以通过程序来指令相关的硬件完成,该程序可以存储于一种计算机可读存储介质中,上述提到的存储介质可以是只读存储器,磁盘或光盘等。
以上,仅是本发明的较佳实施例而已,并非对本发明作任何形式上的限制,虽然本发明已以较佳实施例揭露如上,然而并非用以限定本发明,任何熟悉本专业的技术人员,在不脱离本发明技术方案范围内,当可利用上述揭示的技术内容做出些许更动或修饰为等同变化的等效实施例,但凡是未脱离本发明技术方案内容,依据本发明的技术实质对以上实施例所作的任何简单修改、等同变化与修饰,均仍属于本发明技术方案的范围内。
Claims (14)
- 一种系统切换方法,用于终端进行系统切换,该终端上安装有第一系统和第二系统,其中,所述方法包括:接收用户在第一系统内输入的第一切换指令;判断所述第一切换指令是否包含身份验证信息;若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;接收用户在第二系统内输入的第二切换指令;直接切换至第一系统;其中,所述判断第一切换指令是否包含身份验证信息的具体方法为:检测用户输入第一切换指令的输入方式;若用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势,则判断所述第一切换指令包含身份验证信息;若用户输入第一切换指令的输入方式为点触系统切换图标,则判断所述第一切换指令不包含身份验证信息;其中,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:检测所述终端当前所处的地理位置;判断所述终端当前所处的地理位置是否在第一预设地理位置范围内;若所述终端当前所处的地理位置在第一预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;若所述终端当前所处的地理位置不在第一预设地理位置范围内,则不切换至第二系统;和/或,检测所述终端当前所处的地理位置;判断所述终端当前所处的地理位置是否在第二预设地理位置范围内;若所述终端当前所处的地理位置不在第二预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;若所述终端当前所处的地理位置在第二预设地理位置范围内,则不切换至第二系统。
- 根据权利要求1所述的方法,其中,所述在显示界面输入滑动切换手势的具体方法为:接收用户滑动拖出快捷菜单的滑动操作,并显示所述快捷菜单页面;接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。
- 根据权利要求1所述的方法,其中,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:检测当前时间;判断当前时间是否处于第一预设时间范围内;若当前时间处于第一预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;若当前时间不处于第一预设时间范围内,则不切换至第二系统;和/或,检测当前时间;判断当前时间是否处于第二预设时间范围内;若当前时间不处于第二预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;若当前时间处于第二预设时间范围内,则不切换至第二系统。
- 一种系统切换方法,用于终端进行系统切换,该终端上安装有第一系统和第二系统,其中,所述方法包括:接收用户在第一系统内输入的第一切换指令;判断所述第一切换指令是否包含身份验证信息;若包含,则验证该身份验证信息是否正确,并在身份验证通过后切换至第二系统;若不包含,则显示身份验证界面,接收用户输入的身份验证信息,并在身份验证通过后切换至第二系统;接收用户在第二系统内输入的第二切换指令;直接切换至第一系统。
- 根据权利要求4所述的方法,其中,所述判断第一切换指令是否包含身份验证信息的具体方法为:检测用户输入第一切换指令的输入方式;若用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势,则判断所述第一切换指令包含身份验证信息;若用户输入第一切换指令的输入方式为点触系统切换图标,则判断所述第一切换指令不包含身份验证信息。
- 根据权利要求5所述的方法,其中,所述在显示界面输入滑动切换手势的具体方法为:接收用户滑动拖出快捷菜单的滑动操作,并显示所述快捷菜单页面;接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。
- 根据权利要求4所述的方法,其中,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:检测所述终端当前所处的地理位置;判断所述终端当前所处的地理位置是否在第一预设地理位置范围内;若所述终端当前所处的地理位置在第一预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;若所述终端当前所处的地理位置不在第一预设地理位置范围内,则不切换至第二系统;和/或,检测所述终端当前所处的地理位置;判断所述终端当前所处的地理位置是否在第二预设地理位置范围内;若所述终端当前所处的地理位置不在第二预设地理位置范围内,则继续判断所述第一切换指令是否包含身份验证信息;若所述终端当前所处的地理位置在第二预设地理位置范围内,则不切换至第二系统。
- 根据权利要求4所述的方法,其中,所述接收用户在第一系统内输入的第一切换指令之后,所述方法还包括以下步骤:检测当前时间;判断当前时间是否处于第一预设时间范围内;若当前时间处于第一预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;若当前时间不处于第一预设时间范围内,则不切换至第二系统;和/或,检测当前时间;判断当前时间是否处于第二预设时间范围内;若当前时间不处于第二预设时间范围内,则继续判断所述第一切换指令是否包含身份验证信息;若当前时间处于第二预设时间范围内,则不切换至第二系统。
- 一种系统切换装置,其中,所述装置包括:接收模块,用于接收用户在第一系统内输入的第一切换指令;第一判断模块,用于判断所述第一切换指令是否包含身份验证信息;第二判断模块,用于在所述第一判断模块判断所述第一切换指令中包含身份验证信息时,继续判断该身份验证信息是否正确;系统切换模块,用于在所述第二判断模块判断该身份验证信息正确时,切换至第二系统;显示模块,用于在所述第一判断模块判断所述第一切换指令中不包含身份验证信息时,显示身份验证界面;所述接收模块还用于接收用户在所述身份验证界面输入的身份验证信息;第三判断模块,用于判断用户在所述身份验证界面输入的身份验证信息是否正确;所述系统切换模块还用于在所述第三判断模块判断用户在所述身份验证界面输入的身份验证信息正确时,切换至第二系统;所述接收模块还用于接收用户在第二系统内输入的第二切换指令;所述系统切换模块还用于在所述接收模块接收到用户在第二系统内输入的第二切换指令时直接切换至第一系统。
- 根据权利要求9所述的装置,其中,所述装置还包括:检测模块,用于检测用户输入第一切换指令的输入方式;所述第一判断模块还用于在所述检测模块检测用户输入第一切换指令的输入方式为在显示界面输入滑动切换手势时,判断所述第一切换指令包含身份验证信息;所述第一判断模块还用于在所述检测模块检测用户输入第一切换指令的输入方式为点触系统切换图标时,判断所述第一切换指令不包含身份验证信息。
- 根据权利要求10所述的装置,其中,所述接收模块还用于接收用户滑动拖出快捷菜单的滑动操作;所述显示模块还用于显示所述快捷菜单页面;所述接收模块还用于接收用户在所述快捷菜单页面空白区域输入的所述滑动切换手势。
- 根据权利要求9所述的装置,其中,所述装置还包括:地理位置检测模块,用于检测所述终端当前所处的地理位置;第四判断模块,用于判断所述终端当前所处的地理位置是否在第一预设地理位置范围内;第一执行模块,用于在所述第四判断模块判断所述终端当前所处的地理位置在第一预设地理位置范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;所述系统切换模块还用于在所述第四判断模块判断所述终端当前所处的地理位置不在第一预设地理位置范围内时,不切换至第二系统;和/或,地理位置检测模块,用于检测所述终端当前所处的地理位置;第四判断模块,用于判断所述终端当前所处的地理位置是否在第二预设地理位置范围内;第一执行模块,用于在所述第四判断模块判断所述终端当前所处的地理位置不在第二预设地理位置范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;所述系统切换模块还用于在所述第四判断模块判断所述终端当前所处的地理位置在第二预设地理位置范围内时,不切换至第二系统。
- 根据权利要求9所述的装置,其中,所述装置还包括:时间检测模块,用于检测当前时间;第五判断模块,用于判断所述当前时间是否处于第一预设时间范围内;第二执行模块,用于在所述第五判断模块判断当前时间处于第一预设时间范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;所述系统切换模块还用于在所述第五判断模块判断当前时间不处于第一预设时间范围内时,不切换至第二系统;和/或,时间检测模块,用于检测当前时间;第五判断模块,用于判断所述当前时间是否处于第二预设时间范围内;第二执行模块,用于在所述第五判断模块判断当前时间不处于第二预设时间范围内时,继续执行判断所述第一切换指令是否包含身份验证信息的步骤;所述系统切换模块还用于在所述第五判断模块判断当前时间处于第二预设时间范围内时,不切换至第二系统。
- 一种移动终端,其中,所述移动终端包括如权利要求9所述的系统切换装置,所述系统切换装置执行如权利要求4所述的系统切换方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610324388.X | 2016-05-16 | ||
CN201610324388.XA CN105930701A (zh) | 2016-05-16 | 2016-05-16 | 一种系统切换方法、系统切换装置及终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2017197752A1 true WO2017197752A1 (zh) | 2017-11-23 |
Family
ID=56840597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2016/091078 WO2017197752A1 (zh) | 2016-05-16 | 2016-07-22 | 一种系统切换方法、系统切换装置及终端 |
Country Status (3)
Country | Link |
---|---|
CN (1) | CN105930701A (zh) |
TW (1) | TWI602123B (zh) |
WO (1) | WO2017197752A1 (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023000731A1 (zh) * | 2021-07-22 | 2023-01-26 | 荣耀终端有限公司 | 一种系统空间切换方法、装置和终端设备 |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108170472B (zh) * | 2016-12-05 | 2021-06-18 | 法法汽车(中国)有限公司 | 一种移动终端的皮肤切换方法和装备及移动终端 |
CN106844028B (zh) * | 2017-01-12 | 2020-08-21 | 北京珠穆朗玛移动通信有限公司 | 基于双系统的系统切换方法及移动终端 |
CN106896983A (zh) | 2017-02-10 | 2017-06-27 | 合网络技术(北京)有限公司 | 界面显示控制方法及装置 |
CN107623786A (zh) * | 2017-09-18 | 2018-01-23 | 广东小天才科技有限公司 | 用于智能终端的切换方法、装置、智能终端及存储介质 |
CN107861669B (zh) * | 2017-10-20 | 2020-06-30 | 维沃移动通信有限公司 | 一种用户系统的切换方法和移动终端 |
CN108338418A (zh) * | 2018-01-17 | 2018-07-31 | 深圳阿凡达智控有限公司 | 电子烟的管理方法、装置以及电子设备 |
CN110895612B (zh) * | 2018-09-13 | 2023-08-11 | 中兴通讯股份有限公司 | 一种解锁方法及装置、终端设备 |
CN109462813A (zh) * | 2018-09-26 | 2019-03-12 | 上海华章信息科技有限公司 | 基于环境变动的双系统切换方法 |
CN112527399A (zh) * | 2020-12-15 | 2021-03-19 | 中国联合网络通信集团有限公司 | 一种双系统移动终端及其系统切换方法 |
CN115758307A (zh) * | 2022-11-04 | 2023-03-07 | Oppo广东移动通信有限公司 | 一种终端设备的空间登录方法、装置、终端设备及存储介质 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239142A (zh) * | 2014-09-17 | 2014-12-24 | 宇龙计算机通信科技(深圳)有限公司 | 一种双系统的快捷切换方法、装置及终端 |
CN104239146A (zh) * | 2014-09-28 | 2014-12-24 | 东莞宇龙通信科技有限公司 | 系统和/或应用程序的切换方法、切换系统和终端 |
CN104408344A (zh) * | 2014-11-14 | 2015-03-11 | 南京酷派软件技术有限公司 | 系统切换方法、系统切换装置和终端 |
CN104702788A (zh) * | 2015-03-13 | 2015-06-10 | 酷派软件技术(深圳)有限公司 | 一种双系统切换方法及装置 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2011202832B2 (en) * | 2010-12-21 | 2013-01-24 | Lg Electronics Inc. | Mobile terminal and method of controlling a mode switching therein |
CN104680089B (zh) * | 2013-11-29 | 2019-02-05 | 联想(北京)有限公司 | 一种电子设备和系统切换方法 |
CN104318183A (zh) * | 2014-11-18 | 2015-01-28 | 南京酷派软件技术有限公司 | 用于终端的通信信息的处理方法及装置 |
CN105243341A (zh) * | 2015-06-05 | 2016-01-13 | 深圳金澜汉源科技有限公司 | 信息安全电子设备和应用架构 |
-
2016
- 2016-05-16 CN CN201610324388.XA patent/CN105930701A/zh active Pending
- 2016-07-22 WO PCT/CN2016/091078 patent/WO2017197752A1/zh active Application Filing
- 2016-08-12 TW TW105125852A patent/TWI602123B/zh not_active IP Right Cessation
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104239142A (zh) * | 2014-09-17 | 2014-12-24 | 宇龙计算机通信科技(深圳)有限公司 | 一种双系统的快捷切换方法、装置及终端 |
CN104239146A (zh) * | 2014-09-28 | 2014-12-24 | 东莞宇龙通信科技有限公司 | 系统和/或应用程序的切换方法、切换系统和终端 |
CN104408344A (zh) * | 2014-11-14 | 2015-03-11 | 南京酷派软件技术有限公司 | 系统切换方法、系统切换装置和终端 |
CN104702788A (zh) * | 2015-03-13 | 2015-06-10 | 酷派软件技术(深圳)有限公司 | 一种双系统切换方法及装置 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023000731A1 (zh) * | 2021-07-22 | 2023-01-26 | 荣耀终端有限公司 | 一种系统空间切换方法、装置和终端设备 |
Also Published As
Publication number | Publication date |
---|---|
CN105930701A (zh) | 2016-09-07 |
TWI602123B (zh) | 2017-10-11 |
TW201643711A (zh) | 2016-12-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2017197752A1 (zh) | 一种系统切换方法、系统切换装置及终端 | |
WO2018082482A1 (zh) | 一种网络共享方法、接入网络方法及系统 | |
WO2015137745A1 (en) | System and method of encrypting folder in device | |
WO2016104922A1 (ko) | 웨어러블 전자기기 | |
WO2014035054A1 (en) | Method and apparatus for controlling zoom function in an electronic device | |
WO2015037794A1 (en) | Mobile terminal and control method for the mobile terminal | |
WO2015170894A1 (en) | Wearable device and controlling method thereof | |
WO2017003018A1 (ko) | 이동 단말기 및 그 제어 방법 | |
WO2012043932A1 (ko) | 키보드 제어 장치 및 그 방법 | |
WO2012020868A1 (ko) | 이동단말기, 디스플레이 장치 및 그 제어 방법 | |
WO2012046890A1 (ko) | 이동단말기, 디스플레이 장치 및 그 제어 방법 | |
WO2012020866A1 (ko) | 이동단말기, 디스플레이 장치 및 그 제어 방법 | |
WO2017052043A1 (en) | Mobile terminal and method for controlling the same | |
WO2012020863A1 (ko) | 이동단말기, 디스플레이 장치 및 그 제어 방법 | |
WO2012020864A1 (ko) | 이동단말기, 디스플레이 장치 및 그 제어 방법 | |
WO2015122590A1 (en) | Electronic device and method for controlling the same | |
WO2015088166A1 (ko) | 이동 단말기 및 그의 후면 입력부 운용방법 | |
WO2012020865A1 (ko) | 이동단말기, 디스플레이 장치 및 그 제어 방법 | |
WO2013129799A1 (en) | Electronic device and method for controlling electronic device | |
EP3289755A1 (en) | Mobile terminal and control method therefor | |
WO2018128224A1 (en) | Mobile terminal and method for controlling the same | |
WO2015149588A1 (zh) | 手持设备上用户操作模式的识别方法及手持设备 | |
WO2016076546A1 (en) | Mobile terminal and controlling method thereof | |
WO2018105834A1 (en) | Terminal and method for controlling the same | |
WO2018034491A1 (en) | A primary device, an accessory device, and methods for processing operations on the primary device and the accessory device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16902132 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 16902132 Country of ref document: EP Kind code of ref document: A1 |