WO2019127043A1 - Procédé de commande de dispositif terminal et dispositif terminal - Google Patents

Procédé de commande de dispositif terminal et dispositif terminal Download PDF

Info

Publication number
WO2019127043A1
WO2019127043A1 PCT/CN2017/118740 CN2017118740W WO2019127043A1 WO 2019127043 A1 WO2019127043 A1 WO 2019127043A1 CN 2017118740 W CN2017118740 W CN 2017118740W WO 2019127043 A1 WO2019127043 A1 WO 2019127043A1
Authority
WO
WIPO (PCT)
Prior art keywords
detection
terminal device
domain
data
substance
Prior art date
Application number
PCT/CN2017/118740
Other languages
English (en)
Chinese (zh)
Inventor
骆磊
Original Assignee
深圳达闼科技控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳达闼科技控股有限公司 filed Critical 深圳达闼科技控股有限公司
Priority to CN201780002579.7A priority Critical patent/CN108235766B/zh
Priority to PCT/CN2017/118740 priority patent/WO2019127043A1/fr
Publication of WO2019127043A1 publication Critical patent/WO2019127043A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/62Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light
    • G01N21/63Systems in which the material investigated is excited whereby it emits light or causes a change in wavelength of the incident light optically excited
    • G01N21/65Raman scattering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Definitions

  • the present application relates to the field of information processing, and in particular, to a method and a terminal device for controlling a terminal device.
  • the detection module for detecting substances and other terminal devices can be integrated on one device, thereby enabling the operator to complete the detection work more conveniently.
  • the problem of data security In the process of material detection, it is usually necessary to perform special processing on the collected data to obtain the detection result, and the algorithms, databases, and detected substance information involved in the middle are all data that need to be kept secret. There is a risk of data leakage when placed in a mobile network terminal.
  • the problem of using security Since the detection is usually performed by means of a laser or the like during the detection process, when these operations are triggered by a malfunction or a network attack, the surrounding objects or personal injury may be damaged.
  • An embodiment of the present invention provides a method for controlling a terminal device and a terminal device, which are mainly used to solve the problem of preventing data leakage due to network attacks and operator misoperations when the substance detecting function is integrated on other terminal devices.
  • the problem of false triggering detection function is mainly used to solve the problem of preventing data leakage due to network attacks and operator misoperations when the substance detecting function is integrated on other terminal devices.
  • an embodiment of the present invention provides a method for controlling a terminal device, including: acquiring, by an end device, an entry instruction; entering an detection domain according to an entry instruction; performing substance detection on the detection substance in the detection domain, and acquiring the detection result,
  • the data generated by the terminal device in the detection domain is isolated from the data generated in other working areas of the terminal device.
  • an embodiment of the present invention provides a terminal device, where a terminal device includes at least two working domains, and at least two working domains include a detection domain.
  • the terminal device is configured according to a control platform.
  • the terminal device further includes: an obtaining unit, configured to acquire an entry instruction; and a control unit, configured to: after the obtaining unit acquires the entry instruction, control the terminal device to enter the detection domain according to the entry instruction; and the detecting unit is configured to be in the control After the unit controls the terminal device to enter the detection domain, the substance to be detected is detected in the detection domain.
  • an embodiment of the present invention provides a terminal device, including: a communication interface, a memory, and a processor, the memory is configured to store computer execution code, and the computer execution code is used to control the processor to execute the embodiment of the first aspect.
  • the method of controlling the terminal device provided.
  • an embodiment of the present invention provides a computer storage medium for storing computer software instructions for a terminal device, which is designed to perform the control method of the terminal device provided by the embodiment of the first aspect. code.
  • an embodiment of the present invention provides a computer program that can be directly loaded into an internal memory of a computer and includes software code, and the computer program can be loaded and executed by a computer to implement the embodiment of the first aspect.
  • the method of controlling the terminal device provided.
  • the terminal device is divided into multiple working domains, and a detection domain that is isolated from the data of other working domains is set for substance detection in multiple working domains.
  • the data generated in the detection domain is isolated from the data generated in other working domains, that is, the detection data acquired during the substance detection process and the data generated during the processing of the detection data are isolated from the data generated in other working domains. Therefore, it is possible to prevent applications in other working domains from accessing the detection data, and then the detection data is not leaked when the application in other working domains exists in the backdoor or in other working domains by viruses or Trojans.
  • the terminal device in the present application performs substance detection in the detection domain, applications in other working fields cannot call a device such as a laser emitting lens used for detecting a substance, and when an application in another working domain is cracked or attacked, Devices such as laser emitting lenses are also not turned on.
  • the terminal device in the present application needs to enter the detection domain according to the entry command after obtaining the entry instruction, the possibility that the operator mistakenly enters the detection domain to perform the misoperation of the detection function in the detection domain is further reduced, thereby further improving the possibility. The security of the terminal device when it is used.
  • FIG. 1 is a schematic flowchart of a method for controlling a terminal device according to an embodiment of the present invention
  • FIG. 2 is a diagram showing an example of a specific implementation process of a method for controlling a terminal device according to an embodiment of the present invention
  • FIG. 3 is a schematic flowchart diagram of a method for controlling a terminal device according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread in execution, a program, and/or a computer.
  • an application running on a computing device and the computing device can be a component.
  • One or more components can reside within a process and/or thread of execution, and a component can be located in a computer and/or distributed between two or more computers. Moreover, these components can execute from various computer readable media having various data structures thereon.
  • These components may be passed, for example, by having one or more data packets (eg, data from one component that interacts with the local system, another component of the distributed system, and/or signaled through, such as the Internet)
  • the network interacts with other systems to communicate in a local and/or remote process.
  • the application will present various aspects, embodiments, or features in a system that can include multiple devices, components, modules, and the like. It is to be understood and appreciated that the various systems may include additional devices, components, modules, etc. and/or may not include all of the devices, components, modules, etc. discussed in connection with the figures. In addition, a combination of these schemes can also be used.
  • the word "exemplary” is used to mean an example, an illustration, or a description. Any embodiment or design described as “example” in this application should not be construed as preferred or advantageous over other embodiments or designs. Rather, the term use examples is intended to present concepts in a concrete manner.
  • information, signal, message, and channel may sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the difference is not emphasized. “of”, “corresponding (relevant)” and “corresponding” can sometimes be mixed. It should be noted that the meaning to be expressed is consistent when the distinction is not emphasized.
  • Virtualization technology is a kind of resource management technology. It transparently transforms the underlying physical hardware by abstracting various physical resources of the computer, such as computing power and storage capacity, and presents it to users in the form of virtual machines.
  • virtualization technology can be used to isolate one terminal device into multiple separate operating environments, and the applications installed in each operating environment and the stored data are isolated from each other, that is, different in the terminal device. Domain. Specifically, the virtualization of terminal devices can be divided into three categories:
  • the first category the underlying virtualization. Full isolation from the operating system kernel to the runtime environment can be achieved in the underlying virtualization.
  • the virtual machine On the hardware, the virtual machine is provided to the upper layer based on the microkernel mechanism, and the virtual machine runs a complete operating system inside, and the virtual machines are independent and invisible.
  • the solution can be simply understood as: virtual machine + multi-operating system kernel + multi-operating system combination. The method is characterized by good isolation and difficulty in implementation.
  • System virtualization is based on the container mechanism to achieve multi-system isolation in the operating system kernel layer. Multiple operating systems are independent and invisible. The solution is simply understood as: operating system kernel + multiple operating system combinations. The method is characterized by medium isolation and low difficulty in implementation.
  • Framework virtualization is the isolation of the application environment based on the operating system multi-user mechanism in the system framework layer, in which multiple sets of application environments are isolated from each other.
  • the solution can be understood as: a combination of operating system kernel + operating system + multi-user environment.
  • the method is characterized by poor isolation and low difficulty in implementation.
  • the detection domain and other working domains in the present application are the different operating environments defined by the virtualization technology in the terminal device.
  • the method and the terminal device of the present application are applied to a scenario in which a terminal device is controlled when the substance detecting function is integrated on the terminal device.
  • the Raman substance detection function is integrated on the terminal device to enable Raman detection of the substance by the terminal device.
  • An embodiment of the present application provides a method for controlling a terminal device, where a detection domain that is isolated from data of other working domains is set in the terminal device, and then, when the device is detected by the terminal device, the detection domain is entered.
  • the method of performing the detection task in the detection domain realizes the effect of protecting the security of the detection data. As shown in Figure 1, the method includes the following steps:
  • the terminal device acquires unlocking information in a locked state.
  • the unlocking information includes the identity authentication information of the operator.
  • the unlocking information may include information about the operator's biological information such as a fingerprint, an iris, and the like, and the unlocking information may further include information such as an account password that can verify the identity of the operator.
  • the terminal device acquires an entry instruction.
  • the terminal device After the terminal device passes the identity authentication according to the unlocking information and unlocks the terminal device, the terminal device generates an entry instruction to enter the detection domain according to the entry instruction.
  • the operator accessing the detection domain is restricted by authenticating the operator identity authentication information before entering the detection domain. It avoids anyone's access to the detection domain, reduces the possibility of the operator accidentally entering the detection domain and mishandling the detection function in the detection domain, and improves the security of the detection domain.
  • the method before acquiring the unlocking information in the locked state of the terminal device, the method further includes: receiving the power-on command, starting the power according to the power-on command, and entering the locked state after the power-on.
  • the terminal device can directly enter the locked state after being powered on, and then enter the detection domain by performing the above steps S101-S103. In this way, after booting up and obtaining the correct unlocking information, the terminal device enters the detection domain, thereby facilitating the operator to directly start the substance detection task of the substance to be detected. Further, after the identity of the operator is authenticated once each time the device is turned on, the next time the user enters the detection domain, the identity of the operator may not be authenticated, and the entry instruction is directly entered into the detection domain according to the operation of the operator, thereby Avoid operator repeat operations.
  • S101-S102 is an optional step.
  • the steps of S101-S102 may not be performed.
  • the terminal device can acquire an incoming command by receiving an operator-initiated entry command.
  • the data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
  • the terminal device performs substance detection of the substance to be detected by a predetermined detection when the substance is detected. Further, in order to facilitate the operator to detect the detected substance, the method further comprises: after entering the detection domain, opening the detection application.
  • the detection application can set the Launcher of the detection domain so that the detection application directly serves as the desktop UI (User Interface) of the detection domain.
  • the detection application is directly opened by starting the desktop.
  • the operator does not need to input an operation instruction to open the detection application, and the terminal device can automatically open the detection application, so that the operator can directly perform substance detection through the detection application, thereby improving the operator's Use experience.
  • the method may further include: obtaining recommendation information of the management platform, acquiring an installation package of the detection application according to the recommendation information, and installing the detection application according to the installation package.
  • the manner of detecting the application is installed by acquiring the push information of the management platform to limit the application installation in the detection domain.
  • the problem that the detection domain is maliciously attacked due to installation of other unmanaged platform-authenticated applications in the detection domain is avoided.
  • basic applications such as settings, camera, gallery, clock, calendar, notepad, recorder, flashlight, and calculator can be included in the detection domain.
  • a new application needs to be added in the detection domain, it must pass the recommendation information of the management platform. To install the app. Therefore, in this way, it is possible to prevent applications such as a browser and a live chat tool from being installed in the detection domain, thereby ensuring the security of the application in the detection domain.
  • Raman detection is taken as an example, and the terminal device calls a laser emitting device in the detection domain to collect Raman spectrum data of the substance to be detected. Then, the Raman preprocessing algorithm is called to perform background subtraction, filter denoising, deduction substrate and normalization on the collected Raman spectral data.
  • the Raman detection algorithm is used to analyze the pre-processed data.
  • the Raman neural network matching algorithm can be used to match and obtain the pre-processed Raman spectral data based on the calibrated Raman spectroscopy database. result.
  • step S105 specifically includes:
  • Raman spectroscopy data is acquired during Raman detection.
  • S105b Send the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data.
  • the collected Raman spectral data is sent over the Internet to a server or other cloud device for data processing.
  • the Raman preprocessing algorithm, the Raman neural network matching algorithm and the Raman spectroscopy database are called in the server to process and analyze the collected Raman spectroscopy data and obtain the detection result.
  • the obtained detection result is fed back to the terminal device.
  • S105c Receive a detection result sent by the data processing device.
  • the detection data is sent to the data processing device, and the data processing device performs specific data processing, thereby avoiding storing information such as an algorithm and a database for data processing in the data processing device.
  • the risk of information leakage in the terminal device is a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, a simple operation, or a database for data processing in the data processing device. The risk of information leakage in the terminal device.
  • the method further includes:
  • the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is sent to the data processing device by using the SIM card corresponding to the detection domain.
  • a function option of "cutting the domain whether to cut the card" is added.
  • the option is turned on, when the terminal device detects the entry into the detection domain, the designated SIM card is switched to the primary card of the terminal device. The test data is then transmitted to the data processing device using the SIM card.
  • the method further includes:
  • connection instruction is received; the connection instruction is used to instruct the terminal device to connect to the wireless local area network. Determining whether the wireless local area network is a network in the network white list, and if so, connecting the terminal device to the wireless local area network according to the connection instruction, so as to send the detection data to the data processing device by using the wireless local area network.
  • S106 Receive a notification message in the detection domain.
  • a prompt message is displayed to the operator based on the notification message.
  • the detection domain switches to the other work domain corresponding to the notification message and opens the notification message.
  • the open command includes an instruction to open a notification message triggered by the operator according to the prompt information.
  • the terminal device when the terminal device is in the detection domain, if there is an incoming call, a short message or other notification information at this time. Then, the terminal device displays the prompt information about the communication information to the operator, for example, displaying a flag of unread information in the status bar of the terminal device or displaying an incoming call at the top of the screen.
  • the terminal device After receiving an open command triggered by the operator, switching from the detection domain to another working domain, and opening the notification message, for example, when receiving a WeChat message, displaying a prompt message to the operator, after receiving the open command, Then switch the terminal device to the working domain where the WeChat application is installed.
  • the operator does not trigger an open command, such as when the operator hangs up the incoming call when receiving the incoming call notification, it remains in the detection domain.
  • the terminal device receives the notification message in the detection domain, the related information can be displayed to the operator.
  • the terminal device is automatically switched to another working domain and the notification message is opened. Therefore, the operator can also know that a new notification message needs to be viewed in the detection domain, and can prevent the operator from directly viewing the notification message in the detection domain, which may cause data leakage.
  • steps S106 and the previous steps S105 are not necessarily related to each other. As long as the terminal device is satisfied in the detection domain, the content of step S106 can be performed according to specific needs to achieve the above technical effects.
  • the method for controlling the terminal device provided by the application includes: the terminal device performs system upgrade by using an Over-the-Air Technology (OTA) technology.
  • OTA Over-the-Air Technology
  • the method provided by the application further includes: the terminal device sends the current state and the detection result to the management platform. So that the control platform can understand the use of the terminal equipment.
  • FIG. 2 is an exemplary diagram of a specific implementation process of the foregoing embodiment of the present application.
  • Raman detection is performed on the detected substance in the detection domain of the terminal device, and the detected detection data is sent to the cloud platform through the communication network, where the data can be transmitted by using the communication base station by using the mobile communication function of the terminal device.
  • a VPN tunnel can be used to transmit data.
  • the Raman cloud service device in the cloud platform uses the Raman preprocessing algorithm, the Raman detection algorithm and the Raman database in the cloud platform to process the detection data and obtain the detection result, and the detection result is obtained after receiving the detection data. Feedback to the terminal device.
  • the specific OTA server and the control platform can also be set in the cloud platform.
  • the terminal device uses the OTA technology to perform system upgrade through the OTA server, and sends the current state and detection result to the management platform. So that the control platform can understand the use of the terminal equipment.
  • the terminal device is divided into multiple working domains, and a detection domain that is isolated from the data of other working domains is set for substance detection in multiple working domains.
  • the data generated in the detection domain is isolated from the data generated in other working domains, that is, the detection data acquired during the substance detection process and the data generated during the processing of the detection data are isolated from the data generated in other working domains. Therefore, it is possible to prevent applications in other working domains from accessing the detection data, and then the detection data is not leaked when the application in other working domains exists in the backdoor or in other working domains by viruses or Trojans.
  • the terminal device in the present application performs substance detection in the detection domain, applications in other working fields cannot call a device such as a laser emitting lens used for detecting a substance, and when an application in another working domain is cracked or attacked, Devices such as laser emitting lenses are also not turned on.
  • the terminal device in the present application needs to enter the detection domain according to the entry command after obtaining the entry instruction, the possibility that the operator mistakenly enters the detection domain to perform the misoperation of the detection function in the detection domain is further reduced, thereby further improving the possibility. The security of the terminal device when it is used.
  • the embodiment of the present application further provides another method for controlling a terminal device. As shown in FIG. 3, the method includes the following steps:
  • the terminal device acquires an entry instruction.
  • the terminal device acquires an entry instruction in another working domain before the detection domain.
  • the terminal device receives an operator-initiated entry command in other work areas.
  • the terminal device switches the terminal device from another working domain to the detection domain according to the entry instruction.
  • the data generated by the terminal device in the detection domain is isolated from the data generated in other working domains of the terminal device.
  • the terminal device when the terminal device is in the detection domain for a long time, the probability of being attacked by a network or erroneously operated is relatively increased.
  • the terminal device after the terminal device in another working domain acquires the entry instruction, the terminal device is switched to the detection domain, and then the task of substance detection and the like is performed in the detection domain. After the terminal device detects the terminal device, the terminal device is switched back to the previous working domain. This reduces the likelihood that the detection domain will be attacked or mishandled.
  • the terminal device can be more conformed to the operating habits of the operator and improve the user experience when the other device is in a more convenient use field when the detection task is not performed.
  • FIG. 4 shows a possible structural diagram of a terminal device related to the present application.
  • the terminal device 30 includes: an obtaining unit 301, a control unit 302, and a detecting unit 303, where:
  • An obtaining unit 301 configured to acquire an entry instruction
  • the control unit 302 is configured to control the terminal device to enter the detection domain according to the entry instruction after the acquisition unit 301 acquires the entry instruction;
  • the detecting unit 303 is configured to: after the control unit 302 controls the terminal device to enter the detection domain, perform a substance detection to obtain a detection result in the detection domain, and the terminal device generates data under the detection domain and other working areas of the terminal device. The resulting data is isolated from each other.
  • the terminal device 30 further includes an authentication unit 304;
  • the obtaining unit 301 is further configured to acquire unlocking information in a locked state, where the unlocking information includes identity authentication information of the operator;
  • the authentication unit 304 is configured to authenticate the identity of the operator according to the unlocking information after the acquiring unit 301 acquires the unlocking information.
  • the control unit 302 is further configured to: after the authentication unit 304 performs identity authentication on the operator, unlock the terminal device; and after unlocking the terminal device, generate an entry instruction.
  • the obtaining unit 301 is specifically configured to acquire an entry instruction in another working domain
  • the control unit 302 is further configured to switch the terminal device to another working domain after performing the substance detection to obtain the detection result in the detection domain.
  • the control unit 301 is further configured to automatically open the detection application after entering the detection domain;
  • the detecting unit 302 is specifically configured to perform substance detection on the substance to be detected by the detecting application.
  • the obtaining unit 301 is further configured to obtain recommendation information of the management platform
  • the control unit 302 is configured to obtain the recommendation information of the management platform in the obtaining unit 301, acquire an installation package of the detection application according to the recommendation information, and install the detection application according to the installation package.
  • the detecting unit 303 is specifically configured to: after the control unit 302 controls the terminal device to enter the detection domain, collect detection data of the substance to be detected; send the detection data to the data processing device, so that the data processing device acquires the detection result according to the detection data; and receives the data processing. Test result sent by the device
  • the control unit 302 is further configured to: when the terminal device enters the working domain, when the terminal device enters the detection domain, the SIM card corresponding to the detection domain is switched to the primary card of the terminal device, so that the detection data is detected by using the SIM card corresponding to the detection domain. Send to the data processing device.
  • the obtaining unit 301 is further configured to receive a notification message in the detection domain.
  • the control unit 302 is further configured to: after the receiving unit 301 receives the notification message, display the prompt information to the operator according to the notification message; when receiving the open instruction, switch from the detection domain to another working domain corresponding to the notification message and open the notification message,
  • the open command includes an instruction to open a notification message triggered by the operator according to the prompt information.
  • the terminal device in the embodiment of the present application can be applied to implement the foregoing method embodiments. Therefore, the technical solutions that can be obtained are also referred to the foregoing method embodiments.
  • FIG. 5 shows a possible structural diagram of the terminal device involved in the above embodiment.
  • the terminal device 40 includes a processing module 401 and a communication module 402.
  • the processing module 401 is configured to perform control management on the actions of the terminal device.
  • the processing module 401 is configured to control the communication module 402 to support the terminal device to perform steps S101 and S103 in FIG. 1 , step S201 in FIG. 3 , and/or Other processes of the described techniques are used by the processing module 601 to support the terminal device in performing steps S102, S104-S106 in FIG. 1, steps S202-S204 in FIG. 3, and/or other processes for the techniques described herein.
  • the communication module 402 is configured to support communication between the terminal device and other physical devices, and the terminal device 40 may further include a storage module 403 for storing program codes and data of the terminal device 40.
  • the processing module 401 can be a processor or a controller, for example, a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), and an application-specific integrated circuit (Application-Specific Integrated Circuit (ASIC), Field Programmable Gate Array (FPGA) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. It is possible to implement or carry out the various illustrative logical blocks, modules and circuits described in connection with the present disclosure.
  • the processor may also be a combination of computing functions, for example, including one or more microprocessor combinations, a combination of a DSP and a microprocessor, and the like.
  • the communication module 402 can be a transceiver, a transceiver circuit, a communication interface, or the like.
  • the storage module 6403 can be a memory.
  • the terminal device When the processing module 401 is a processor, the communication module 402 is a communication interface, and the storage module 403 is a memory, the terminal device according to the embodiment of the present invention may be the terminal device shown in FIG. 6.
  • the terminal device 50 includes a processor 501, a communication interface 502, a memory 503, and a bus 504.
  • the communication interface 502, the processor 501, and the memory 503 are connected to each other through a bus 504.
  • the bus 504 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. Wait.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is shown in Figure 6, but it does not mean that there is only one bus or one type of bus.
  • the steps of a method or algorithm described in connection with the present disclosure may be implemented in a hardware, or may be implemented by a processor executing software instructions.
  • the embodiment of the present invention further provides a storage medium, which may include a memory 503 for storing computer software instructions used by the terminal device, and includes program code designed to execute the control method of the terminal device provided in the foregoing embodiment.
  • the software instructions may be composed of corresponding software modules, and the software modules may be stored in a random access memory (RAM), a flash memory, a read only memory (ROM), and an erasable programmable only.
  • An exemplary storage medium is coupled to the processor to enable the processor to read information from, and write information to, the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the embodiment of the present invention further provides a computer program, which can be directly loaded into the memory 503 and contains software code, and the computer program can be loaded and executed by the computer to implement the control method of the terminal device provided by the foregoing embodiment. .
  • the functions described herein can be implemented in hardware, software, firmware, or any combination thereof.
  • the functions may be stored in a computer readable medium or transmitted as one or more instructions or code on a computer readable medium.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a general purpose or special purpose computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Pathology (AREA)
  • Immunology (AREA)
  • Bioethics (AREA)
  • Biochemistry (AREA)
  • Chemical & Material Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Nuclear Medicine, Radiotherapy & Molecular Imaging (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Computer And Data Communications (AREA)

Abstract

L'invention concerne un procédé de commande de dispositif terminal et un dispositif terminal, se rapportant au champ technique du traitement d'informations. Des modes de réalisation selon la présente invention peuvent assurer la sécurité de données et la sécurité d'utilisation d'un dispositif terminal lorsqu'une fonction de détection de substance est intégrée sur le dispositif terminal. Le procédé consiste : en ce qu'un dispositif terminal obtient une instruction d'entrée ; en ce qu'il entre un domaine de détection selon l'instruction d'entrée ; en ce qu'il procède à une détection de substance sur des substances à détecter dans le domaine de détection, et en ce qu'il obtient le résultat de détection, des données générées par le dispositif terminal dans le domaine de détection étant isolées de données générées dans d'autres domaines de fonctionnement du dispositif terminal. La présente invention est appliquée à la commande du dispositif terminal.
PCT/CN2017/118740 2017-12-26 2017-12-26 Procédé de commande de dispositif terminal et dispositif terminal WO2019127043A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780002579.7A CN108235766B (zh) 2017-12-26 2017-12-26 一种终端设备的控制方法及终端设备
PCT/CN2017/118740 WO2019127043A1 (fr) 2017-12-26 2017-12-26 Procédé de commande de dispositif terminal et dispositif terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/118740 WO2019127043A1 (fr) 2017-12-26 2017-12-26 Procédé de commande de dispositif terminal et dispositif terminal

Publications (1)

Publication Number Publication Date
WO2019127043A1 true WO2019127043A1 (fr) 2019-07-04

Family

ID=62645502

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/118740 WO2019127043A1 (fr) 2017-12-26 2017-12-26 Procédé de commande de dispositif terminal et dispositif terminal

Country Status (2)

Country Link
CN (1) CN108235766B (fr)
WO (1) WO2019127043A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112033950A (zh) * 2020-09-10 2020-12-04 青海省农林科学院 一种农药残留检测方法

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540892B (zh) * 2020-12-08 2023-01-20 公安部第三研究所 一种手机隔离检测系统及方法
CN113092376A (zh) * 2021-04-13 2021-07-09 威海诚悦光电科技有限公司 基于激光光谱技术的手持式白酒真伪检测装置及方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103582184A (zh) * 2013-10-31 2014-02-12 中晟国计科技有限公司 一种高安全性能的双卡智能手机
CN104159329A (zh) * 2014-09-03 2014-11-19 谭卫 一种移动终端及其使用方法
CN105162951A (zh) * 2015-07-28 2015-12-16 努比亚技术有限公司 一种移动终端、便携式农药残留物检测系统及方法
CN205385008U (zh) * 2016-03-17 2016-07-13 杨金凤 食品有机残留物质谱检测设备

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314166A (zh) * 2010-07-07 2012-01-11 柳平增 基于物联网的农作物生产智能测控系统
CN101915742B (zh) * 2010-08-10 2012-06-27 北京路源光科技有限公司 基于拉曼技术的生物柴油在线检测仪
US9151709B2 (en) * 2010-09-10 2015-10-06 The Curators Of The University Of Missouri Multiple phase flow system for detecting and isolating substances
CN106461461A (zh) * 2014-01-03 2017-02-22 威利食品有限公司 光谱测定系统、方法和应用
CN104182251A (zh) * 2014-08-12 2014-12-03 小米科技有限责任公司 农作物特征检测方法、装置及终端
US10024717B2 (en) * 2015-11-24 2018-07-17 Trutag Technologies, Inc. Tag reading using targeted spatial spectral detection
CN106203035B (zh) * 2016-06-28 2019-04-02 Oppo广东移动通信有限公司 一种数据访问控制方法及移动终端
CN106485589A (zh) * 2016-10-20 2017-03-08 河南省农业科学院 一种基于物联网的农业企业集团信息化管理系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103582184A (zh) * 2013-10-31 2014-02-12 中晟国计科技有限公司 一种高安全性能的双卡智能手机
CN104159329A (zh) * 2014-09-03 2014-11-19 谭卫 一种移动终端及其使用方法
CN105162951A (zh) * 2015-07-28 2015-12-16 努比亚技术有限公司 一种移动终端、便携式农药残留物检测系统及方法
CN205385008U (zh) * 2016-03-17 2016-07-13 杨金凤 食品有机残留物质谱检测设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112033950A (zh) * 2020-09-10 2020-12-04 青海省农林科学院 一种农药残留检测方法

Also Published As

Publication number Publication date
CN108235766B (zh) 2022-03-04
CN108235766A (zh) 2018-06-29

Similar Documents

Publication Publication Date Title
US9426661B2 (en) Secure lock for mobile device
EP3370449B1 (fr) Procédé et dispositif de configuration d'informations d'indication de sécurité
US9525684B1 (en) Device-specific tokens for authentication
US10078754B1 (en) Volume cryptographic key management
US8935746B2 (en) System with a trusted execution environment component executed on a secure element
EP2973171B1 (fr) Commutation basée sur le contexte à un environnement de système d'exploitation sécurisé
US9213829B2 (en) Computing device including a port and a guest domain
CN107431694B (zh) 加密密钥取回
US9607156B2 (en) System and method for patching a device through exploitation
JP5981035B2 (ja) ハードウェアによるアクセス保護
US10389710B2 (en) Method and system for extracting characteristic information
US9858400B2 (en) Information processing system, terminal, and authentication method
US11706251B2 (en) Simulating user interactions for malware analysis
WO2019127043A1 (fr) Procédé de commande de dispositif terminal et dispositif terminal
JP2019518285A (ja) 情報セキュリティを強化する方法及び端末
US10019577B2 (en) Hardware hardened advanced threat protection
US11228910B2 (en) Mobile communication device and method of determining security status thereof
CN106507300A (zh) 一种找回丢失终端的方法、装置及终端
CN106919812B (zh) 一种应用进程权限管理方法和装置
US20210326455A1 (en) System for analysis and authorization for use of executable environment data in a computing system using hash outputs
CN109933990B (zh) 基于多模式匹配的安全漏洞发现方法、装置及电子设备
CN108123954B (zh) 一种业务办理方法及终端设备
RU2818877C1 (ru) Система и способ антивирусной проверки объектов на мобильном устройстве
EP3687120A1 (fr) Dispositif de communication mobile et procédé de détermination de son état de sécurité
Puente Arribas et al. Malware Analysis on Android

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17935963

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10/11/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 17935963

Country of ref document: EP

Kind code of ref document: A1