CN111726453B - System switching method, device, terminal and readable storage medium - Google Patents

System switching method, device, terminal and readable storage medium Download PDF

Info

Publication number
CN111726453B
CN111726453B CN201910216572.6A CN201910216572A CN111726453B CN 111726453 B CN111726453 B CN 111726453B CN 201910216572 A CN201910216572 A CN 201910216572A CN 111726453 B CN111726453 B CN 111726453B
Authority
CN
China
Prior art keywords
communication request
target system
identifier
terminal
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910216572.6A
Other languages
Chinese (zh)
Other versions
CN111726453A (en
Inventor
许玲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201910216572.6A priority Critical patent/CN111726453B/en
Priority to PCT/CN2020/071988 priority patent/WO2020186918A1/en
Publication of CN111726453A publication Critical patent/CN111726453A/en
Application granted granted Critical
Publication of CN111726453B publication Critical patent/CN111726453B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a method, a device and a terminal for system switching, relates to the field of computers, and aims to solve the problem of poor communication security caused by the fact that the terminal processes a communication request aiming at another system under one system. The method may comprise: receiving a first communication request; acquiring an identifier corresponding to the communication request; determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of the first system and the second system; processing the communication request in the context of the target system. The invention is used for system switching.

Description

System switching method, device, terminal and readable storage medium
Technical Field
The present invention relates to the field of computers, and in particular, to a method, an apparatus, and a terminal for system switching.
Background
With the popularization of smart phones and the increasingly powerful functions of application programs, the security problem of the mobile phones is increasingly highlighted, and particularly for mobile office work which develops rapidly, personal information and business information coexist in one terminal, so that more security risks are brought.
To ensure security, dual systems, for example, an office system and a living system, are currently used in terminals. The life system can normally use all functions of the terminal, and the office system can only use some appointed functions of the terminal.
However, when the terminal operates in the living system and receives a communication request for the office system, the terminal still processes the communication request in the living system, which results in poor communication security.
Disclosure of Invention
The embodiment of the application provides a system switching method, a system switching device and a terminal, and aims to solve the problem that communication security is poor as the terminal processes a communication request aiming at another system under one system.
In a first aspect, an embodiment of the present application provides a system switching method, which is applied to a terminal, where the terminal is provided with a first system and a second system, and the method includes:
receiving a first communication request;
acquiring an identifier corresponding to the first communication request;
determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of the first system and the second system;
processing the first communication request in the context of the target system.
In a second aspect, an embodiment of the present application provides an apparatus for system handover, including:
a receiving module, configured to receive a first communication request;
the processing module is used for acquiring an identifier corresponding to the first communication request, and determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
In a third aspect, an embodiment of the present application provides a terminal, including: a memory on which a computer program is stored, and a processor, which when executed, implement the steps in the method of loading a plug-in for an application of the first aspect.
In a fourth aspect, the present application provides a non-transitory computer-readable storage medium, on which a computer program is stored, and when the computer program is executed, the steps in the method for loading a plug-in of an application according to the first aspect are implemented.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects:
in the embodiment of the application, after the first communication request is received, the identifier corresponding to the first communication request is obtained, and then the target system corresponding to the obtained identifier is determined according to the obtained identifier and the preset matching rule between the identifier and the system, and the first communication request is processed under the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a method for system handover according to an embodiment of the present invention;
fig. 2 is a communication principle composition diagram of a terminal based on dual system handover according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for artificial intelligence-based autonomous learning of a dual-system terminal according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for secure communication of a dual-system terminal according to an embodiment of the present invention;
fig. 5 is a block diagram of a system switching apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the present invention, it should be understood that the application represents an application program.
It should be understood that, in the following description, if the android system is mentioned as an example, the android system is only shown as an example, and is not limited, the method for system switching provided by the embodiment of the present invention may also be applied to other operating systems, such as an apple operating system (iOS).
The technical solutions provided by the embodiments of the present invention are described in detail below with reference to the accompanying drawings.
The method for system handover provided by the embodiment of the present invention will be described below from the perspective of a terminal. The terminal can be a mobile phone, a tablet personal computer and the like, and a first system and a second system can be arranged in the terminal. The first system and the second system may be isolated systems, the first system and the second system may both belong to android operating systems, but functions of the terminal that are implemented when the terminal operates under the first system and the second system may be different, for example, each function of the terminal may be implemented normally under the first system, and only some specific functions of the terminal may be implemented under the second system.
The terminal of the dual-system operation provides light-weight virtualization through a terminal kernel virtualization technology, and can isolate processes and resources. The scheme is the isolation of an application framework layer, and can support two user systems to run simultaneously, wherein each system comprises a working system and a living system, and each system supports independent application, system setting, address lists, short messages and the like. The two systems are isolated from each other so that safety can be guaranteed.
Fig. 1 is a flowchart of a system handover method according to an embodiment of the present invention. Referring to fig. 1, a method for system handover provided by an embodiment of the present invention may be executed by a terminal, and may include:
at step 110, a first communication request is received.
In the embodiment of the present invention, the first communication request may be any kind of communication request, including but not limited to a video chat request, a voice chat request, a request related to a telephone call, a request related to a short message, and the like. The request related to the telephone can cover the incoming call request, and the request related to the short message can cover the common short message request, the multimedia message request and the like. The first communication request may be from another device separate from the terminal.
And step 120, acquiring an identifier corresponding to the first communication request.
In the embodiment of the present invention, the identifier corresponding to the first communication request may be a unique identifier of the first communication request. For example, if the first communication request is a request related to a phone call or a short message, the identifier corresponding to the first communication request may be a phone number. For another example, if the first communication request is a video chat request, the identifier corresponding to the first communication request may be a unique identifier of the chat software, such as a name, a session ID, or a serial number of the chat software.
Step 130, determining a target system corresponding to the obtained identifier based on the obtained identifier and a matching rule between a preset identifier and the system, where the target system is one of the first system and the second system.
In the embodiment of the invention, the matching rule between the identifier and the system can be preset. Wherein, the matching rule can be set according to the requirement. For example, in the case of a pre-set white list of identities, the matching rules may include that the identities appearing in the pre-set white list correspond to the target system. For another example, in the case of a pre-set black list of identifiers, the matching rule may include that identifiers that do not appear in the pre-set black list correspond to the target system, and so on. Of course, other matching rules can be set as required.
Taking a white list of telephone numbers of government-enterprise customers as an example, the white list of telephone numbers can include group short numbers of enterprise users or enterprise fixed telephones, and the like, and the white list only needs to configure the ranges of the short numbers and the fixed telephones of the enterprise. For example, the group short number of a company is the first 5 numbers of 61, as long as the white list is configured to be 61 x, and the enterprise fixed telephone is 021 + 8534 x.
In an embodiment of the present invention, the target system may be a system with a controlled authority. In other words, the target system may be a system that has a high requirement for security or privacy.
In this embodiment of the present invention, optionally, after determining the target system corresponding to the obtained identifier, the method for system switching provided in this embodiment of the present invention may further include: judging whether the current operating system of the terminal is the target system or not; if the current operating system is not the target system, switching to the target system to operate; and if the current operating system is the target system, keeping the current operating system to continuously operate. The embodiment of the invention can ensure that the terminal finally moves under the target system through the process, and can reduce the workload of switching without switching the system under the condition that the current operating system of the terminal is the target system.
For example, if the currently operating system of the terminal is a first system (e.g., a living system) and the target system is a second system (e.g., a working system), the terminal may switch from the first system (e.g., the living system) to the second system (e.g., the working system); on the contrary, if the currently operating system of the terminal is the second system (e.g., working system) and the target system is also the second system (e.g., working system), the terminal will continue to operate under the currently operating system (i.e., second system).
Step 140, processing the first communication request in the context of the target system.
For example, if the first communication request is an incoming call request, the processing of the first communication request may specifically be: for example, the incoming call request is answered by a touch operation or a key operation, and the incoming call request is rejected by a touch operation or a key operation, for example. If the first communication request is a normal short message request, the processing the first communication request may specifically be: for example, the short message is viewed through touch operation or key operation, and the short message is replied through touch operation or key operation, for example.
In an embodiment of the invention, the target system may be a first system, such as a living system. Alternatively, the target system may be a second system, such as a work system. When the target system is determined to be in the living system, the first communication request can be processed in the environment of the living system, and when the target system is determined to be in the working system, the first communication request can be processed in the environment of the working system. In the process of processing the first communication request, when the first communication request is an incoming call, for example, a ring can be given to prompt the user to answer the call.
In the embodiment of the application, after the first communication request is received, the identifier corresponding to the first communication request is obtained, and then the target system corresponding to the obtained identifier is determined according to the obtained identifier and the preset matching rule between the identifier and the system, and the first communication request is processed under the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
It should be noted that, in the embodiment of the present invention, after the terminal is in the target system (e.g., working system) whose authority is controlled, the user may perform further operation with the terminal under the target system (e.g., working system), for example, perform touch or key operation on the terminal to trigger the second communication request. Optionally, in an embodiment of the present invention, the method for system switching provided in the embodiment of the present invention may further include: receiving an operation of triggering a second communication request; when the second communication request is triggered, determining an implementation system for executing the second communication request; when the implementation system is the target system, recording the identifier corresponding to the second communication request in a self-learning list; and when the implementation system is not the target system, sending the second communication request under the environment of the implementation system. Wherein the second communication request may include a request related to a phone call or a short message. Therefore, self-learning of the terminal in the target system can be achieved, user operation is reduced, and system switching can be performed subsequently based on self-learning results, so that not only can communication safety be guaranteed, but also accuracy and application range of system switching can be improved.
In an embodiment of the invention, the self-learning list may be associated with matching rules between the identity and the system. That is, in one embodiment, matching rules between the identification and the system may include that the identification appearing in the recorded self-learning list corresponds to the target system for which the permissions are governed. In this case, the determining, in step 13, a target system corresponding to the acquired identifier based on the acquired identifier and a matching rule between a preset identifier and a system may include: searching the obtained identification in the self-learning list; and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system. The method for determining the target system based on the self-learning list not only can ensure the accuracy of determining the target system, but also can ensure subsequent compatibility through continuous updating of the self-learning list, and can enlarge the application range.
In this case, for example, telephone or text message operations initiated by the user under the target system whose authority is controlled may be recorded in the self-learning list. Furthermore, when a subsequent request, for example a telephone call or a short message, is received from another device, the terminal can look up the recorded self-learning list. If a phone number corresponding to a received, e.g., phone call or short message, is found in the self-learning list, it may be determined that the received phone call or short message corresponds to the target system, and the received phone call or short message may be processed in the context of the target system.
In the embodiment of the present invention, the implementation system may be a system in which the terminal is currently operating. Accordingly, in the case where the determined implementation system (e.g., living system) is not the target system (office system) when the second communication request is triggered, the second communication request may be issued directly at the implementation system (e.g., living system). For example, in the embodiment of the present invention, if the terminal is not in a target system (e.g., a working system) whose authority is controlled when the second communication request is issued, the terminal is in a living system, for example. Then at this point, a second communication request may be issued directly under the living system.
Fig. 2 is a communication principle composition diagram of a terminal based on dual system handover according to an embodiment of the present invention. Referring to fig. 2, a terminal provided in an embodiment of the present invention may include: a Host (Host) system, a Home (Home) system, a Work (Work) system and a Modem (Modem) module. Wherein:
host (Host) system: the virtualization system provides light-weight virtualization, supports isolation of processes and resources, does not need mechanisms such as instruction interpretation required by full virtualization, and is low in performance loss.
Living (Home) system: and the user system is simultaneously operated with the working system, and is mainly provided with applications used by the user daily.
The working system comprises: the working system and the living system run simultaneously, and the system is mainly provided with an application which is required by a user to process a working transaction.
In the embodiment of the invention, a living (Home) system can be a standard intelligent operating system, and a user can perform normal mobile phone function operation; the Work (Work) system can safely control the sensitive authority, such as limiting internet surfing, limiting Bluetooth, being incapable of installing third-party application and the like, and is mainly used for developing Work business.
Telephone (Phone) module: a communication module of an Android system.
The ill (radio Interface layer) is a radio Interface adaptation layer module, which comprises two parts, one part is a Java layer Rilj, and the other part is an underlying Rild module.
Rilj: is part of Ril, Rilj provides a generic API (application program interface) interface for the upper layers, is responsible for maintaining communication with Rild, and sends requests from the upper layers to the Rild module.
A Rild module: is part of Ril and Rild is the system's daemon. The function of Rild is to continuously transmit the request sent by Rilj to a lower Modem module, and to send the request of Modem to Rilj in time.
AI (artificial intelligence) module: a white list of identities may be configured, as well as identities derived through self-learning, such as telephone numbers.
A system switching module: and responding to system switching commands of the two user systems to carry out system switching, or carrying out automatic system switching under the condition of meeting a certain condition.
Fig. 3 is a flowchart of a method for artificial intelligence-based autonomous learning of a dual-system terminal according to an embodiment of the present invention. Fig. 3 is illustrated with labels as telephone numbers and is not meant to be limiting. Referring to fig. 3, a flowchart of a method for artificial intelligence-based autonomous learning of a dual-system terminal according to an embodiment of the present invention may include:
step 301, receiving a communication request triggered by a user. For example, the user makes a call or sends a short message at the foreground system. The foreground system may be a Work (Work) system or a Home (Home) system.
Step 302, the telephone (Phone) module of the foreground system transmits the communication data to the Rild module of the Host system through RilJ.
In step 303, the Rild module in the Host system determines whether the communication request is from the Work system.
Step 304, if the communication request is from the Work (Work) system, the Rild module transmits the telephone number information of the communication request to the AI module, and the AI module extracts the telephone number from the communication request initiated by the Work (Work) system and stores the telephone number.
In step 305, if the communication request is not from the Work (Work) system, the Rild module transmits the communication data to the Modem module for communication processing, such as sending out a communication request.
Through this process, the AI module process stores a working system-related telephone number. Through the continuous learning processing for a period of time, the AI module learns more and more telephone numbers related to the work stored, and then when receiving the telephone number or short message from the related number, the AI module is distributed to the work system to be processed more and more accurately.
Fig. 4 is a flowchart of a method for secure call of a dual-system terminal according to an embodiment of the present invention. Fig. 3 is an illustration of a label as a telephone number, and is not meant to be limiting. Referring to fig. 4, a method for secure call of a dual-system terminal according to an embodiment of the present invention may include:
step 401, an incoming call request is received. In this case, the terminal foreground system is, for example, a living (Home) system.
In step 402, the modulator-demodulator (Modem) module reports the incoming call request to the Rild module of the Host (Host) system, and the Rild module is transmitted to the AI module.
In step 403, after the AI module receives the incoming call request from the Rild module, it determines whether the incoming call number is a white list number stored in the AI module, or whether the incoming call number is a phone number self-learned and stored by the AI module.
Wherein the AI module in the Host system has configured a phone white list or learns the phone number associated with the job through the self-learning process of fig. 3, supra.
If the incoming call number is a white list number stored in the AI module or a phone number that the AI module learns from itself, steps 404 to 406 are performed.
Step 404, the switching module of the main (Host) system initiates switching, and switches the foreground system to the Work (Work) system.
In step 405, the Rild module of the Host (Host) system reports data to the RilJ of the Phone (Phone) module of the Work (Work) system.
Step 406, the telephone module of the Work (Work) system rings to wait for the user to answer.
If the incoming call number is not a white list number stored in the AI module or a phone number that is self-learned by the AI module, steps 407 to 408 are performed.
In step 407, the Rild module in the Host (Host) system reports the data to the RilJ of the Phone (Phone) module of the Home (Home) system.
In step 408, the Phone module of the living (Home) system rings to wait for the user to answer.
The embodiment of the invention is additionally provided with an AI module on the basis of the traditional double-system scheme, wherein the AI module is arranged in a main (Host) system, and the AI module can be configured with a white list of telephone numbers of government and enterprise clients, including group short numbers of enterprise users or enterprise fixed telephones and the like; if the number on the white list is incoming call and short message, the terminal system will automatically distribute to Work (Work) system to process the communication request. In addition, the AI module can self-learn and store the number information of outgoing calls and short messages sent by the user from a Work (Work) system; after continuous learning, when the dual-system terminal receives a communication request of an incoming call or a short message, the number is automatically judged to determine whether the number needs to be distributed to a Work (Work) system to process the communication request. Therefore, the communication request sent by the number related to Work can be ensured to be automatically distributed to a Work (Work) system for processing. Therefore, the safety of the communication data is ensured.
Fig. 5 is a block diagram of a system switching apparatus according to an embodiment of the present invention. Referring to fig. 5, an apparatus 500 for system switching according to an embodiment of the present invention may include: a receiving module 510 and a processing module 520. It is to be understood that both the system switch module and the AI module mentioned above may be part of the processing module. Wherein:
a receiving module 510, configured to receive a first communication request;
a processing module 520, configured to obtain an identifier corresponding to the first communication request received by the receiving module 510, and determine, based on the obtained identifier and a matching rule between a preset identifier and a system, a target system corresponding to the obtained identifier, where the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
In the embodiment of the application, after the first communication request is received, the identifier corresponding to the first communication request is obtained, and then the target system corresponding to the obtained identifier is determined according to the obtained identifier and the preset matching rule between the identifier and the system, and the first communication request is processed under the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
Optionally, in an embodiment of the present invention, the first communication request includes a request related to a phone call or a short message, and the identifier is a phone number.
Optionally, in an embodiment of the present invention, the target system is a system with a controlled authority.
Optionally, in an embodiment of the present invention, the receiving module 510 is further configured to receive an operation of triggering a second communication request; the processing module 520 is further configured to determine an implementation system for executing the second communication request when the second communication request is triggered; and when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list. Wherein the second communication request may comprise a request related to a phone call or a short message
Correspondingly, the apparatus 500 further includes a sending module, configured to issue the second communication request in the environment of the implementation system when the implementation system is not the target system.
Optionally, in an embodiment of the present invention, the matching rule includes: the identity appearing in the self-learning list corresponds to the target system;
in the process of determining the target system corresponding to the obtained identifier based on the obtained identifier and the matching rule between the preset identifier and the system, the processing module 520 may be specifically configured to:
searching the obtained identification in the self-learning list; and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
Optionally, in an embodiment of the present invention, after determining the target system corresponding to the obtained identifier, the processing module 520 is further configured to:
judging whether the current operating system of the terminal is the target system or not; if the current operating system is not the target system, switching to the target system to operate; and if the current operating system is the target system, keeping the current operating system to continuously operate.
Optionally, in an embodiment of the present invention, the matching rule includes: the identifiers appearing in the pre-set white list correspond to the target system and/or the identifiers appearing in the recorded self-learning list correspond to the target system.
An embodiment of the present application further provides a terminal, and fig. 6 is a schematic structural diagram of the terminal provided in the embodiment of the present application. As shown in fig. 6, the terminal may have a large difference due to different configurations or performances, and may include one or more processors 601 and a memory 602, where one or more stored applications or data may be stored in the memory 602. Wherein the memory 602 may be transient or persistent storage. The application program stored in the memory 602 may include one or more modules (not shown), each of which may include a series of computer programs for the terminal. Further, the processor 601 may be arranged in communication with the memory 602 to execute a series of computer programs in the memory 602 on the terminal. The terminal may also include one or more power supplies 603, one or more wired or wireless network interfaces 604, one or more input-output interfaces 605, one or more keyboards 606, etc.
In a specific embodiment, the terminal includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and when executed by the processor, the computer program implements the following procedures:
receiving a first communication request;
acquiring an identifier corresponding to the first communication request;
determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system;
processing the first communication request in the context of the target system.
The terminal provided by the embodiment of the application acquires the identifier corresponding to the first communication request after receiving the first communication request, and then determines the target system corresponding to the acquired identifier according to the acquired identifier and the preset matching rule between the identifier and the system, and processes the first communication request in the environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
Optionally, the first communication request includes a request related to a phone call or a short message, the identifier is a phone number, and the target system is a system with a controlled authority.
Optionally, the matching rule includes: the identifiers appearing in the pre-set white list correspond to the target system and/or the identifiers appearing in the recorded self-learning list correspond to the target system.
Optionally, the computer program, when executed by the processor, may further perform the following: receiving an operation of triggering a second communication request; when the second communication request is triggered, determining an implementation system for executing the second communication request; when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list; issuing the second communication request in an environment of the enforcement system when the enforcement system is not the target system. Wherein the second communication request may include a request related to a phone call or a short message.
Optionally, the matching rule includes: the identification appearing in the self-learning list corresponds to the target system. The computer program, when executed by the processor, may further perform the following: searching the obtained identification in the self-learning list; and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
Optionally, the computer program, when executed by the processor, may further perform the following: after determining the target system corresponding to the obtained identifier, judging whether the current operating system of the terminal is the target system; if the current operating system is not the target system, switching to the target system to operate; and if the current operating system is the target system, keeping the current operating system to continuously operate.
In addition, a non-transitory computer-readable storage medium is provided in an embodiment of the present application, where the storage medium is used to store a computer program, and the computer program, when executed by a processor, implements the steps in any method for system handover provided in the embodiment of the present invention. For example, the computer program when executed by a processor implements the following: receiving a first communication request; acquiring an identifier corresponding to the first communication request; determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system; processing the first communication request in the context of the target system.
The computer-readable storage medium provided by the embodiment of the application, after receiving the first communication request, first obtains an identifier corresponding to the first communication request, and then determines a target system corresponding to the obtained identifier according to the obtained identifier and a matching rule between a preset identifier and the system, and processes the first communication request in an environment of the target system. In this way, the security of communication can be ensured by processing the first communication request under the target system corresponding to the first communication request.
The computer-readable storage medium includes a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information and/or information that can be accessed by a computing device. As defined herein, computer readable media does not include transitory computer readable media (transmyedia) such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The foregoing description of specific embodiments has been presented for purposes of illustration and description. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A system switching method is applied to a terminal, and is characterized in that a first system and a second system are arranged in the terminal, and the method comprises the following steps:
receiving a first communication request;
acquiring an identifier corresponding to the first communication request;
determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of the first system and the second system;
processing the first communication request in the context of the target system;
the method further comprises the following steps:
receiving an operation of triggering a second communication request;
when the second communication request is triggered, determining an implementation system for executing the second communication request, wherein the implementation system is a system currently operated by the terminal when the second communication request is triggered;
when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list;
issuing the second communication request in an environment of the enforcement system when the enforcement system is not the target system.
2. The method of claim 1, wherein the matching rule comprises: the identity appearing in the self-learning list corresponds to the target system;
the determining the target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system comprises:
searching the obtained identification in the self-learning list;
and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
3. The method of claim 1, wherein after the determining the target system to which the obtained identity corresponds, the method further comprises:
judging whether the current operating system of the terminal is the target system or not;
if the current operating system is not the target system, switching to the target system to operate;
and if the current operating system is the target system, keeping the current operating system to continuously operate.
4. The method of claim 1, wherein the matching rule comprises: the identifiers appearing in the pre-set white list correspond to the target system and/or the identifiers appearing in the recorded self-learning list correspond to the target system.
5. The method of claim 1 or 2, wherein the first communication request comprises a request related to a phone call or a short message, the identifier is a phone number, the target system is a system with a controlled authority, and the second communication request comprises a request related to a phone call or a short message.
6. The utility model provides a device of system switching, is applied to the terminal, characterized in that, be provided with first system and second system in the terminal, include:
a receiving module, configured to receive a first communication request;
the processing module is used for acquiring an identifier corresponding to the first communication request received by the receiving module, and determining a target system corresponding to the acquired identifier based on the acquired identifier and a preset matching rule between the identifier and the system, wherein the target system is one of a first system and a second system; processing the first communication request in the context of the target system;
the receiving module is further configured to receive an operation of triggering a second communication request;
the processing module is further configured to determine an implementation system for executing the second communication request when the second communication request is triggered, where the implementation system is a system currently running in the terminal when the second communication request is triggered; when the implementation system is the target system, recording the identification corresponding to the second communication request in a self-learning list;
the apparatus further includes a sending module configured to send the second communication request in an environment of the implementation system when the implementation system is not the target system.
7. The apparatus of claim 6, wherein the matching rule comprises: the identity appearing in the self-learning list corresponds to the target system;
in the process of determining a target system corresponding to the acquired identifier based on the acquired identifier and a matching rule between a preset identifier and a system, the processing module is specifically configured to:
searching the obtained identification in the self-learning list;
and if the acquired identification is found in the self-learning list, determining that the identification corresponds to the target system.
8. The apparatus of claim 6 or 7, wherein the first communication request comprises a request related to a phone call or a short message, the identifier is a phone number, the target system is a system with a controlled authority, and the second communication request comprises a request related to a phone call or a short message.
9. A terminal, comprising a memory and a processor, the memory having stored thereon a computer program that, when executed, performs the steps of the method according to any one of claims 1 to 5.
10. A non-transitory computer readable storage medium, wherein a computer program is stored on the storage medium, which when executed, performs the steps of the method according to any one of claims 1 to 5.
CN201910216572.6A 2019-03-21 2019-03-21 System switching method, device, terminal and readable storage medium Active CN111726453B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910216572.6A CN111726453B (en) 2019-03-21 2019-03-21 System switching method, device, terminal and readable storage medium
PCT/CN2020/071988 WO2020186918A1 (en) 2019-03-21 2020-01-14 System switching method and apparatus, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910216572.6A CN111726453B (en) 2019-03-21 2019-03-21 System switching method, device, terminal and readable storage medium

Publications (2)

Publication Number Publication Date
CN111726453A CN111726453A (en) 2020-09-29
CN111726453B true CN111726453B (en) 2022-06-03

Family

ID=72518961

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910216572.6A Active CN111726453B (en) 2019-03-21 2019-03-21 System switching method, device, terminal and readable storage medium

Country Status (2)

Country Link
CN (1) CN111726453B (en)
WO (1) WO2020186918A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114640738A (en) * 2020-12-15 2022-06-17 鼎桥通信技术有限公司 Communication method, communication device, mobile terminal and readable storage medium
CN113656077A (en) * 2021-07-23 2021-11-16 北京鸿合爱学教育科技有限公司 Function setting method and related equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468611A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Data security processing method and device based on dual-system switching
CN105635428A (en) * 2015-03-23 2016-06-01 西安酷派软件科技有限公司 Notice processing method, notice processing device and terminal
CN105847524A (en) * 2015-01-15 2016-08-10 宇龙计算机通信科技(深圳)有限公司 Dual-system-based communication method and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8077845B2 (en) * 2007-06-27 2011-12-13 Honeywell International Inc. Remote control of a security system using telephone device
CN104243716B (en) * 2014-09-28 2017-02-08 酷派软件技术(深圳)有限公司 Information acquiring method and device
CN105049630B (en) * 2015-08-07 2018-06-19 北京元心科技有限公司 The telephone receiving method of intelligent terminal and its multisystem
CN105554259B (en) * 2015-12-11 2019-07-19 北京元心科技有限公司 Multi-system-based method for preventing telephone conflict and intelligent terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104468611A (en) * 2014-12-24 2015-03-25 宇龙计算机通信科技(深圳)有限公司 Data security processing method and device based on dual-system switching
CN105847524A (en) * 2015-01-15 2016-08-10 宇龙计算机通信科技(深圳)有限公司 Dual-system-based communication method and terminal
CN105635428A (en) * 2015-03-23 2016-06-01 西安酷派软件科技有限公司 Notice processing method, notice processing device and terminal

Also Published As

Publication number Publication date
WO2020186918A1 (en) 2020-09-24
CN111726453A (en) 2020-09-29

Similar Documents

Publication Publication Date Title
US9747120B2 (en) Mobile device with virtual interfaces
RU2595890C2 (en) Method and device for execution of user activity commands
WO2016090702A1 (en) Dual-card dual-standby call method, device and terminal
US7877091B2 (en) Method and system for executing a container managed application on a processing device
CN105580392A (en) Seamless call transitions
US9553901B2 (en) VOIP service with streamlined call transfer options
CN111726453B (en) System switching method, device, terminal and readable storage medium
US20160066253A1 (en) Systems and Methods of Controlling Communication with Multiple Subscriptions and Radio Protocol Stacks
US11528593B2 (en) Network slicing using dedicated network node
WO2017062101A1 (en) System and method for trusted operability when moving between network functions virtualization states
CN104601818A (en) Method and device for switching operating systems in communication process
CN110945467B (en) Disturbance-free method and terminal
KR20140100909A (en) Systems and methods for providing safe confluence modality
WO2015188761A1 (en) Traffic acquiring method and apparatus based on operating system
US20140297817A1 (en) Managing Software Operations Based Upon User Status In A Unified Communications Environment
CN101339508A (en) Java2 miniature edition application operation method and device
CA2892715C (en) System and method for unifying the listing and launching of applications and packages spread across multiple domains
US11271975B2 (en) Enriched calling based call type notification
US11563782B2 (en) Enriched calling based call routing
CN111447692B (en) Call method and device for multi-system terminal, electronic equipment and storage medium
KR102638733B1 (en) Communication system based on cloud phone and method thereof
CN113365346A (en) Paging method, paging device, electronic equipment and storage medium
EP3637938B1 (en) Network management method, wireless access device, terminal and storage medium
CN113259305A (en) Intranet and extranet communication method and device
KR102399456B1 (en) System for voice call service using distal assistance device, method thereof and non-transitory computer readable medium having computer program recorded thereon

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant