CN104462935A - Method and terminal for performing safety verification on application program in multi-operation system - Google Patents

Method and terminal for performing safety verification on application program in multi-operation system Download PDF

Info

Publication number
CN104462935A
CN104462935A CN201410817464.1A CN201410817464A CN104462935A CN 104462935 A CN104462935 A CN 104462935A CN 201410817464 A CN201410817464 A CN 201410817464A CN 104462935 A CN104462935 A CN 104462935A
Authority
CN
China
Prior art keywords
operating system
terminal
application program
security
level
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410817464.1A
Other languages
Chinese (zh)
Other versions
CN104462935B (en
Inventor
叶瑞权
张良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201410817464.1A priority Critical patent/CN104462935B/en
Publication of CN104462935A publication Critical patent/CN104462935A/en
Application granted granted Critical
Publication of CN104462935B publication Critical patent/CN104462935B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • G06F21/445Program or device authentication by mutual authentication, e.g. between devices or programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Telephonic Communication Services (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method for performing safety verification on an application program in a multi-operation system. The safety verification method comprises the following steps of switching a first operation system currently running in a terminal into a second operation system superior to the first operation system in the safety level of the multiple operation systems of the terminal when safety verification operation needing to be performed on the application program running in the first operation system of the terminal is detected; performing the safety verification operation on the application program in the second operation system. The invention further discloses the terminal for performing safety verification on the application program in the multi-operation system. By means of the method and device for performing safety verification on the application program in the multi-operation system, safety data are effectively prevented from being stolen by malicious software when the safety verification operation is performed in the first operation system with a low safety level, and the safety when the safety verification operation is performed on the application program is improved.

Description

The safe verification method of application program and terminal in multiple operating system
Technical field
The present invention relates to intelligent terminal technical field, particularly relate to safe verification method and the terminal of application program in a kind of multiple operating system.
Background technology
At present, in order to meet the demand of user, an intelligent terminal can run multiple independently operating system simultaneously, multiplely independently can to intercom mutually between operating system, but may be different in function, security etc.
In the application program operational process of terminal, due to the needs of service logic, the operation carrying out safety verification may be needed.Existing safe verification method is: in the operating system at the current place of application program, carry out security validation operation, and also namely the security validation operation of each application program is all independently carry out in respective operating system.But the level of security of each independently operating system is different in terminal, if the level of security of the operating system at the current place of application program is lower, when the security validation operation of application program carries out in the operating system at current place, because the level of security of the operating system at the current place of this application program is lower, therefore, be easy to secure data crucial in the operating system causing being obtained current place by Malware when this application program carries out security validation operation, there is larger potential safety hazard.
Foregoing, only for auxiliary understanding technical scheme of the present invention, does not represent and admits that foregoing is prior art.
Summary of the invention
Fundamental purpose of the present invention is the safe verification method and the terminal that provide application program in a kind of multiple operating system, to solve the technical matters of existence larger potential safety hazard when existing application program carries out security validation operation.
For achieving the above object, the safe verification method of application program in a kind of multiple operating system provided by the invention, said method comprising the steps of:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal;
The security validation operation of described application program is carried out in described second operating system.
Preferably, when the described application program when running in the first operating system terminal being detected needs to carry out security validation operation, the step of the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal is switched to comprise described first operating system of current for terminal operation:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, preserve the scene information of the current operation of described application program, and compare in multiple operating systems of terminal according to the level of security of described first operating system, according to comparison result, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal.
Preferably, described second operating system is the operating system that in multiple operating systems of terminal, level of security is the highest.
Preferably, described in described second operating system, carry out the step of the security validation operation of described application program after also comprise:
Complete the security validation operation of described application program in described second operating system after, described second operating system of current for terminal operation is switched back described first operating system, and continue to run described application program in described first operating system.
Preferably, described security validation operation comprises subscriber authentication operation, and described user identity comprises account, password and/or finger print information.
In addition, for achieving the above object, the present invention also provides application programs in a kind of multiple operating system to carry out the terminal of safety verification, and described terminal comprises:
Handover module, when application program for running in the first operating system terminal being detected needs to carry out security validation operation, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal;
Secure verification module, for carrying out the security validation operation of described application program in described second operating system.
Preferably, described handover module specifically for:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, preserve the scene information of the current operation of described application program, and compare in multiple operating systems of terminal according to the level of security of described first operating system, according to comparison result, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal.
Preferably, described second operating system is the operating system that in multiple operating systems of terminal, level of security is the highest.
Preferably, described terminal also comprises:
Run module, for complete the security validation operation of described application program in described second operating system after, described second operating system of current for terminal operation is switched back described first operating system, and continues to run described application program in described first operating system.
Preferably, described security validation operation comprises subscriber authentication operation, and described user identity comprises account, password and/or finger print information.
The safe verification method of application program and terminal in a kind of multiple operating system that the present invention proposes, when application program needs to carry out security validation operation, by the first operating system of current for this application program operation is switched to the second operating system that in multiple operating systems of terminal, level of security is higher, thus the security validation operation of this application program is performed in the second operating system that level of security is higher, like this, efficiently avoid when this application program carries out security validation operation in the first operating system that level of security is lower and stolen secure data by Malware, improve security when this application program carries out security validation operation.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of safe verification method first embodiment of application program in multiple operating system of the present invention;
Fig. 2 is the schematic flow sheet of safe verification method second embodiment of application program in multiple operating system of the present invention;
Fig. 3 is the high-level schematic functional block diagram that in multiple operating system of the present invention, application programs carries out terminal first embodiment of safety verification;
Fig. 4 is the high-level schematic functional block diagram that in multiple operating system of the present invention, application programs carries out terminal second embodiment of safety verification.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The invention provides the safe verification method of application program in a kind of multiple operating system.
With reference to the schematic flow sheet that Fig. 1, Fig. 1 are safe verification method first embodiment of application program in multiple operating system of the present invention.
In a first embodiment, in this multiple operating system, the safe verification method of application program comprises:
Step S10, when the application program run in the first operating system terminal being detected needs to carry out security validation operation, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal;
In the present embodiment, terminal can be mounted with multiple operating system simultaneously, in multiple operating system, each operating system is independently operating system, can communicate mutually, but can difference be had in function, security etc., as the practical application request according to each operating system in multiple operating system, the level of security height of each operating system is different.When the application program run in the first operating system terminal being detected needs to carry out security validation operation, second operating system higher than the level of security of described first operating system is found from multiple operating systems of terminal, and by the second operating system that described first operating system of current for terminal operation switches to level of security higher.Wherein, application program needs the security validation operation carried out to comprise subscriber authentication operation, and described user identity comprises the important security information such as account, password, finger print information.
Step S20, carries out the security validation operation of described application program in described second operating system.
After the second operating system switch to level of security higher described first operating system of current for terminal operation, the security validation operation of described application program can be carried out in the second operating system that level of security is higher, as the identity information such as account, password, finger print information of authentication of users, because the level of security of the second operating system is than the height of the first operating system, therefore, the security validation operation carrying out described application program in the second operating system is safer.
The present embodiment is when application program needs to carry out security validation operation, by the first operating system of current for this application program operation is switched to the second operating system that in multiple operating systems of terminal, level of security is higher, thus the security validation operation of this application program is performed in the second operating system that level of security is higher, like this, effectively prevent when this application program carries out security validation operation in the first operating system that level of security is lower and stolen secure data by Malware, improve security when this application program carries out security validation operation.
Further, in other embodiments, above-mentioned steps S10 can comprise:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, preserve the scene information of the current operation of described application program, and compare in multiple operating systems of terminal according to the level of security of described first operating system, according to comparison result, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal.
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, first the scene information of the current operation of described application program is preserved, comprise the session information, progress information etc. of preserving the current operation of described application program, so that follow-up after described application program executes security validation operation, the scene information that can call preservation continues to run the remaining part of described application program.After having preserved the scene information of the current operation of described application program, level of security according to described first operating system is compared in multiple operating systems of terminal, in multiple operating systems of terminal, the operating system higher than the level of security of described first operating system is found out according to comparison result, in one embodiment, an information can be shown to user, prompting user selects from the high operating system of the level of security of the first operating system described in the ratio found out, and find out the second operating system according to the selection of user, by the second operating system that described first operating system of current for terminal operation switches to user to select.In another embodiment, also in the operating system that the level of security of the first operating system described in the ratio found out is high, random selecting one operating system as the second operating system, and described first operating system of current for terminal operation can be switched to the second operating system chosen.
Further, when the application program run in the first operating system terminal being detected needs to carry out security validation operation, in multiple operating systems of terminal, directly find the operating system that level of security is the highest as the second operating system, then described first operating system of current for terminal operation is switched to described second operating system, like this, ensure when application program needs to carry out security validation operation, be directly switch in multiple operating systems of terminal and find the operating system that level of security is the highest, more quick, security is higher.
As shown in Figure 2, second embodiment of the invention proposes the safe verification method of application program in a kind of multiple operating system, on the basis of above-mentioned first embodiment, also comprises after above-mentioned steps S20:
Step S30, complete the security validation operation of described application program in described second operating system after, described second operating system of current for terminal operation is switched back described first operating system, and continues to run described application program in described first operating system.
The difference of the present embodiment and above-mentioned first embodiment is, the present embodiment also comprises described second operating system of current for terminal operation is switched back described first operating system, and in described first operating system, continue the operation running described application program.
After executing the security validation operation of described application program in the present embodiment in described second operating system, described second operating system of current for terminal operation is continued to switch back described first operating system, like this, the security validation operation of described application program is executed in the second operating system that level of security is higher, after guaranteeing the security of data in the first operating system that level of security is lower, automatically described second operating system of current for terminal operation is switched back described first operating system, and continue to run the remaining part of described application program according to the scene information of the described application program of preserving in described first operating system.User carries out in the process of security validation operation in described application program; after twice switching operating system before performing security validation operation and after completing security validation operation; the operation of described application program can not suspend or stop; the use of user's application programs is more smooth, improves Consumer's Experience.
The present invention further provides application programs in a kind of multiple operating system and carry out the terminal of safety verification.
Reference Fig. 3, Fig. 3 are the high-level schematic functional block diagram that in multiple operating system of the present invention, application programs carries out terminal the 3rd embodiment of safety verification.
In the third embodiment, the terminal that in this multiple operating system, application programs carries out safety verification comprises:
Handover module 01, when application program for running in the first operating system terminal being detected needs to carry out security validation operation, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal;
Secure verification module 02, for carrying out the security validation operation of described application program in described second operating system.
In the present embodiment, terminal can be mounted with multiple operating system simultaneously, in multiple operating system, each operating system is independently operating system, can communicate mutually, but can difference be had in function, security etc., as the practical application request according to each operating system in multiple operating system, the level of security height of each operating system is different.Handover module 01 is when the application program run in the first operating system terminal being detected needs to carry out security validation operation, second operating system higher than the level of security of described first operating system is found from multiple operating systems of terminal, and by the second operating system that described first operating system of current for terminal operation switches to level of security higher.Wherein, application program needs the security validation operation carried out to comprise subscriber authentication operation, and described user identity comprises the important security information such as account, password, finger print information.
After the second operating system that described first operating system of current for terminal operation switches to level of security higher by handover module 01, secure verification module 02 carries out the security validation operation of described application program in the second operating system that level of security is higher, as the identity information such as account, password, finger print information of authentication of users, because the level of security of the second operating system is than the height of the first operating system, therefore, the security validation operation carrying out described application program in the second operating system is safer.
The present embodiment is when application program needs to carry out security validation operation, by handover module 01, first operating system of current for this application program operation is switched to the second operating system that in multiple operating systems of terminal, level of security is higher, thus secure verification module 02 makes the security validation operation of this application program perform in the second operating system that level of security is higher, like this, effectively prevent when this application program carries out security validation operation in the first operating system that level of security is lower and stolen secure data by Malware, improve security when this application program carries out security validation operation.
Further, in other embodiments, above-mentioned handover module 01 may be used for:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, preserve the scene information of the current operation of described application program, and compare in multiple operating systems of terminal according to the level of security of described first operating system, according to comparison result, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal.
Handover module 01 is when the application program run in the first operating system terminal being detected needs to carry out security validation operation, first the scene information of the current operation of described application program is preserved, comprise the session information, progress information etc. of preserving the current operation of described application program, so that follow-up after described application program executes security validation operation, the scene information that can call preservation continues to run the remaining part of described application program.After having preserved the scene information of the current operation of described application program, level of security according to described first operating system is compared in multiple operating systems of terminal, in multiple operating systems of terminal, the operating system higher than the level of security of described first operating system is found out according to comparison result, in one embodiment, handover module 01 can show an information to user, prompting user selects from the high operating system of the level of security of the first operating system described in the ratio found out, and find out the second operating system according to the selection of user, by the second operating system that described first operating system of current for terminal operation switches to user to select.In another embodiment, described first operating system of current for terminal operation also random selecting one operating system as the second operating system, and can be switched to the second operating system chosen by handover module 01 in the operating system that the level of security of the first operating system described in the ratio found out is high.
Further, when handover module 01 detects that the application program run in the first operating system of terminal needs to carry out security validation operation, in multiple operating systems of terminal, directly find the operating system that level of security is the highest as the second operating system, then described first operating system of current for terminal operation is switched to described second operating system, like this, ensure when application program needs to carry out security validation operation, be directly switch in multiple operating systems of terminal and find the operating system that level of security is the highest, more quick, security is higher.
As shown in Figure 4, fourth embodiment of the invention proposes application programs in a kind of multiple operating system and carries out the terminal of safety verification, on the basis of above-mentioned 3rd embodiment, also comprises:
Run module 03, for complete the security validation operation of described application program in described second operating system after, described second operating system of current for terminal operation is switched back described first operating system, and continues to run described application program in described first operating system.
The difference of the present embodiment and above-mentioned 3rd embodiment is, the present embodiment also comprises described second operating system of current for terminal operation is switched back described first operating system, and in described first operating system, continue the operation running described application program.
Run after module 03 executes the security validation operation of described application program in described second operating system in the present embodiment, described second operating system of current for terminal operation is continued to switch back described first operating system, like this, the security validation operation of described application program is executed in the second operating system that level of security is higher, after guaranteeing the security of data in the first operating system that level of security is lower, automatically described second operating system of current for terminal operation is switched back described first operating system, and continue to run the remaining part of described application program according to the scene information of the described application program of preserving in described first operating system.User carries out in the process of security validation operation in described application program; after twice switching operating system before performing security validation operation and after completing security validation operation; the operation of described application program can not suspend or stop; the use of user's application programs is more smooth, improves Consumer's Experience.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add required general hardware platform by software and realize, hardware can certainly be passed through, but in a lot of situation, the former is better embodiment.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computing machine, server, or the network equipment etc.) perform method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize instructions of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. the safe verification method of application program in multiple operating system, is characterized in that, said method comprising the steps of:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal;
The security validation operation of described application program is carried out in described second operating system.
2. the safe verification method of application program in multiple operating system as claimed in claim 1, it is characterized in that, when the described application program when running in the first operating system terminal being detected needs to carry out security validation operation, the step of the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal is switched to comprise described first operating system of current for terminal operation:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, preserve the scene information of the current operation of described application program, and compare in multiple operating systems of terminal according to the level of security of described first operating system, according to comparison result, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal.
3. the safe verification method of application program in multiple operating system as claimed in claim 1 or 2, it is characterized in that, described second operating system is the operating system that in multiple operating systems of terminal, level of security is the highest.
4. the safe verification method of application program in multiple operating system as claimed in claim 2, is characterized in that, described in described second operating system, carry out the step of the security validation operation of described application program after also comprise:
Complete the security validation operation of described application program in described second operating system after, described second operating system of current for terminal operation is switched back described first operating system, and continue to run described application program in described first operating system.
5. the safe verification method of application program in multiple operating system as claimed in claim 1, it is characterized in that, described security validation operation comprises subscriber authentication operation, and described user identity comprises account, password and/or finger print information.
6. in multiple operating system, application programs carries out a terminal for safety verification, it is characterized in that, described terminal comprises:
Handover module, when application program for running in the first operating system terminal being detected needs to carry out security validation operation, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal;
Secure verification module, for carrying out the security validation operation of described application program in described second operating system.
7. terminal as claimed in claim 6, is characterized in that, described handover module specifically for:
When the application program run in the first operating system terminal being detected needs to carry out security validation operation, preserve the scene information of the current operation of described application program, and compare in multiple operating systems of terminal according to the level of security of described first operating system, according to comparison result, described first operating system of current for terminal operation is switched to the second operating system higher than the level of security of described first operating system in multiple operating systems of terminal.
8. terminal as claimed in claims 6 or 7, it is characterized in that, described second operating system is the operating system that in multiple operating systems of terminal, level of security is the highest.
9. terminal as claimed in claim 7, is characterized in that, also comprise:
Run module, for complete the security validation operation of described application program in described second operating system after, described second operating system of current for terminal operation is switched back described first operating system, and continues to run described application program in described first operating system.
10. terminal as claimed in claim 6, is characterized in that, described security validation operation comprises subscriber authentication operation, and described user identity comprises account, password and/or finger print information.
CN201410817464.1A 2014-12-24 2014-12-24 The safe verification method and terminal of application program in multiple operating system Active CN104462935B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410817464.1A CN104462935B (en) 2014-12-24 2014-12-24 The safe verification method and terminal of application program in multiple operating system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410817464.1A CN104462935B (en) 2014-12-24 2014-12-24 The safe verification method and terminal of application program in multiple operating system

Publications (2)

Publication Number Publication Date
CN104462935A true CN104462935A (en) 2015-03-25
CN104462935B CN104462935B (en) 2018-01-09

Family

ID=52908960

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410817464.1A Active CN104462935B (en) 2014-12-24 2014-12-24 The safe verification method and terminal of application program in multiple operating system

Country Status (1)

Country Link
CN (1) CN104462935B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN105631314A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Execution environment switching method of terminal, execution environment switching system of terminal, and terminal
CN105844143A (en) * 2016-03-18 2016-08-10 联想(北京)有限公司 Password processing method and password processing electronic equipment
CN106293313A (en) * 2015-05-27 2017-01-04 富泰华工业(深圳)有限公司 Multiple solutions generates system and method
WO2017016033A1 (en) * 2015-07-30 2017-02-02 宇龙计算机通信科技(深圳)有限公司 Password information authentication method, password information authentication system, and terminal
CN106778110A (en) * 2016-11-29 2017-05-31 北京元心科技有限公司 Method and device for authenticating application program in multiple systems
CN107437021A (en) * 2017-08-10 2017-12-05 北京元心科技有限公司 Intelligent system operation method and device and terminal equipment
CN107533596A (en) * 2015-08-19 2018-01-02 华为技术有限公司 Fingerprint identification method and mobile terminal
WO2020024912A1 (en) * 2018-07-30 2020-02-06 中兴通讯股份有限公司 Operating system switching method, terminal, and computer storage medium
CN111399925A (en) * 2020-03-24 2020-07-10 联想(北京)有限公司 Information processing method, server and client

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102736944A (en) * 2012-06-25 2012-10-17 腾讯科技(深圳)有限公司 Method and device for detecting application program sample
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN104156657A (en) * 2014-09-01 2014-11-19 宇龙计算机通信科技(深圳)有限公司 Information input method and information input device of terminal and terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102736944A (en) * 2012-06-25 2012-10-17 腾讯科技(深圳)有限公司 Method and device for detecting application program sample
CN104102876A (en) * 2014-07-17 2014-10-15 北京握奇智能科技有限公司 Device for safeguarding operational security of client side
CN104156657A (en) * 2014-09-01 2014-11-19 宇龙计算机通信科技(深圳)有限公司 Information input method and information input device of terminal and terminal

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631314A (en) * 2015-04-24 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Execution environment switching method of terminal, execution environment switching system of terminal, and terminal
CN106293313A (en) * 2015-05-27 2017-01-04 富泰华工业(深圳)有限公司 Multiple solutions generates system and method
WO2017016033A1 (en) * 2015-07-30 2017-02-02 宇龙计算机通信科技(深圳)有限公司 Password information authentication method, password information authentication system, and terminal
CN107533596B (en) * 2015-08-19 2019-11-29 华为技术有限公司 Fingerprint identification method and mobile terminal
CN107533596A (en) * 2015-08-19 2018-01-02 华为技术有限公司 Fingerprint identification method and mobile terminal
US10409972B2 (en) 2015-08-19 2019-09-10 Huawei Technologies Co., Ltd. Fingerprint recognition method and mobile terminal
CN105069333A (en) * 2015-08-20 2015-11-18 宇龙计算机通信科技(深圳)有限公司 User domain access method, access system and terminal
CN105844143A (en) * 2016-03-18 2016-08-10 联想(北京)有限公司 Password processing method and password processing electronic equipment
CN106778110A (en) * 2016-11-29 2017-05-31 北京元心科技有限公司 Method and device for authenticating application program in multiple systems
CN107437021A (en) * 2017-08-10 2017-12-05 北京元心科技有限公司 Intelligent system operation method and device and terminal equipment
CN107437021B (en) * 2017-08-10 2020-11-17 北京元心科技有限公司 Intelligent system operation method and device and terminal equipment
WO2020024912A1 (en) * 2018-07-30 2020-02-06 中兴通讯股份有限公司 Operating system switching method, terminal, and computer storage medium
CN111399925A (en) * 2020-03-24 2020-07-10 联想(北京)有限公司 Information processing method, server and client

Also Published As

Publication number Publication date
CN104462935B (en) 2018-01-09

Similar Documents

Publication Publication Date Title
CN104462935A (en) Method and terminal for performing safety verification on application program in multi-operation system
US10856141B2 (en) Security protection negotiation method and network element
CN105049442B (en) A kind of method for switching network and terminal
CN104468611A (en) Data security processing method and device based on dual-system switching
CN104767713B (en) Account binding method, server and system
US9378374B2 (en) Method and device for prompting program uninstallation
CN111049831B (en) Generation control method and device of user hidden identifier and terminal
EP2756703B1 (en) Method for preventing fraud or misuse when using a specific service of a public land mobile network by a user equipment, subscriber identity module and application program
CN107533596B (en) Fingerprint identification method and mobile terminal
CN104320781A (en) Verifying method and system for mobile terminal
CN104331661A (en) Method and system for switching encryption state of terminal
CN100488304C (en) A method and device for binding and unbinding the terminal device with the user identification card
CN105744517A (en) Information authentication method and network side device
CN103118365B (en) The implementation method of the one many nets of card and multi-mode communication terminal
CN104105092A (en) Security monitoring method for wireless network
CN104883341A (en) Application management device, terminal and application management method
CN104202462A (en) Communication control method and system
US11716673B2 (en) Access rejection method, apparatus and system, and storage medium and processor
CN106203578B (en) A kind of smart card, application of IC cards security service call method and device
CN106210148A (en) Real time phone call processing method and processing device
CN105095702B (en) A kind of superuser right control method and device
US10674549B2 (en) Method and apparatus for networking unmanned aerial vehicle and system for controlling unmanned aerial vehicle
CN105407543A (en) Call control method and core network device
CN105472125A (en) Information processing method and electronic device
CN106937283A (en) Dual-card dual-standby terminal exempts from cipher authentication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant