WO2016112566A1 - 系统处理方法、系统处理装置和终端 - Google Patents

系统处理方法、系统处理装置和终端 Download PDF

Info

Publication number
WO2016112566A1
WO2016112566A1 PCT/CN2015/071994 CN2015071994W WO2016112566A1 WO 2016112566 A1 WO2016112566 A1 WO 2016112566A1 CN 2015071994 W CN2015071994 W CN 2015071994W WO 2016112566 A1 WO2016112566 A1 WO 2016112566A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
terminal
wearable device
switching mode
communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2015/071994
Other languages
English (en)
French (fr)
Inventor
刘亚鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to EP15877484.4A priority Critical patent/EP3246844A4/en
Publication of WO2016112566A1 publication Critical patent/WO2016112566A1/zh
Priority to US15/405,310 priority patent/US20170124355A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/74Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F1/00Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
    • G06F1/16Constructional details or arrangements
    • G06F1/1613Constructional details or arrangements for portable computers
    • G06F1/163Wearable computers, e.g. on a belt
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Definitions

  • the present invention relates to the field of terminal technologies, and in particular, to a system processing method, a system processing apparatus, and a terminal.
  • the terminal in the related art is installed with a dual system, that is, a common system with a lower security level and a security system with a higher security level, and the switching method of the dual system generally performs specific operations on the terminal (such as inputting a password command, etc.) ) to achieve dual system switching.
  • the above-mentioned switching method of the terminal dual system only realizes the switching of the dual system, and does not take into consideration the risk that the data in the system with a higher security level will be leaked when different users use the same terminal, that is, When different users use the same terminal, the interface they see is the same. Even if the current system of the terminal is a common system with a lower security level, different users can use the system switching mode switched to the security system to know the terminal. The existence of a security system increases the risk of illegally deciphering the security system. The data in the security system may be illegally leaked, thereby reducing the security performance of the terminal and thus reducing the user experience.
  • the invention is based on the above problems, and proposes a new technical solution, which can accurately judge illegal users, so that illegal users cannot use the system switching mode to enter a target system with a higher security level or even if an illegal user uses the system switching mode to enter After the target system, the target system cannot be used normally, thus ensuring the security of the target system with higher security level and its internal data.
  • an aspect of the present invention provides a system processing method for a terminal,
  • the terminal includes a plurality of systems, and the method includes: determining whether communication between the terminal and the target wearable device is normal; and when the determination result is yes, allowing the system switching mode to be switched from the current system to the target system to be normal.
  • Using the target system otherwise, prohibiting the use of the system switching mode to enter the target system or after entering the target system using the system switching mode, controlling a specified application in the target system to fail to operate normally, wherein
  • the target wearable device is a wearable device that is bound to the terminal, the target system is any other system in the plurality of systems whose security level is higher than the current system, and the system is switched.
  • the mode is a system switching mode that is switched from the current system to the target system.
  • the target wearable device is a wearable device carried by the owner of the terminal
  • the identity of the user who uses the terminal can be performed by determining whether the communication between the terminal and the target wearable device is normal. Identification, that is, if the communication is normal, the target wearable device is close to the terminal, and the user who uses the terminal is the owner of the terminal, and is not an illegal user. Therefore, the function corresponding to the system switching mode can be enabled. The system switching mode is allowed to be switched from the current system to the target system, and the target system is normally used. Otherwise, if the communication is not normal, the target wearable device is far away from the terminal, thereby indicating that the user who uses the terminal is not all of the terminal. It is an illegal user.
  • the system switching mode can be hidden or the corresponding function can be prohibited or the function of the target system can be restricted, so that the user cannot use the system switching mode to enter the target system or even if the user uses the system switching mode to enter. After the target system, it cannot be made normally. Target system, thereby ensuring a higher level of security target system, and its internal data security;
  • the system switching mode includes a system switching mode on the software and a system switching mode on the hardware, and all system switching modes that can be switched from the current system to the target system are included, for example, the system switching mode may be current
  • the system switches to the virtual switching identifier of the target system or the physical switching button that is switched from the current system to the target system;
  • the system switching mode is the system switching mode on the software
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, including: displaying the device on the display interface of the terminal.
  • the icon corresponding to the system switching mode is used by the owner of the terminal to switch from the current system to the target system according to the system switching mode, and the owner of the terminal can use the target system normally; the prohibiting use of the system switching mode to enter the location State
  • the standard system includes: hiding an icon corresponding to the system switching mode, thereby hiding the target system with a higher security level, so that the user of the terminal does not know the existence of the target system with a higher security level, thereby enabling the terminal to be used.
  • the intention of deciphering the target system to steal private data in the target system is ensured, thereby ensuring the security of the target system with higher security level and its internal data, or turning off the switching function corresponding to the system switching mode to prohibit the use of the terminal.
  • the system switching mode is the system switching mode on the hardware
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, which includes: displaying the device on the display interface of the terminal. Describe a system switching mode and open a switching function corresponding to the system switching mode, so that the owner of the terminal switches from the current system to the target system according to the switching mode, and enables the owner of the terminal to use the target system normally;
  • the system switching mode is used to enter the target system, specifically: hiding the system switching mode, or turning off the switching function corresponding to the system switching mode, so that the owner of the terminal cannot switch from the current system to the target system;
  • the specified application includes: an application related to data in the target system, where the system is in use
  • the controlling the specified application in the target system fails to operate normally, specifically: after the terminal user enters the target system by using the system switching manner, controlling the target system
  • the specified applications such as address book, call record, SMS, WeChat, MMS, Notepad, voice service, and data service cannot be started, so that the user of the terminal cannot use the target system normally, and thus the terminal user cannot Normally viewing or using data in a target system with a higher privilege level or performing some illegal operations in the target system fully ensures the security of data of a system with a higher privilege level.
  • the determining whether the communication between the terminal and the target wearable device is normal includes: controlling the terminal to send a communication request to the target wearable device; determining whether the terminal is Receiving a communication response from the target wearable device within a preset time, and determining that communication between the terminal and the target wearable device is normal when the determination result is YES; otherwise, determining the terminal and Communication between the target wearable devices The letter is abnormal.
  • the user of the terminal can be accurately determined by determining whether the communication response from the target wearable device is received within the preset time. Whether it is an illegal user, that is, if the illegal user is using the terminal, it is inevitably far away from the owner of the target wearing device (ie, the owner of the terminal), and the target wearable device may not receive the request signal of the terminal. Therefore, the terminal will not receive the communication response from the target wearable device within the preset time, and the communication between the two is abnormal. Otherwise, the terminal can receive the communication response from the target wearable device within the preset time. , the communication between the two is normal.
  • the communication mode between the two may be wired communication mode or wireless communication mode, wherein the wireless communication mode may be multiple communication modes such as Bluetooth and 2.4G.
  • the determining whether the communication between the terminal and the target wearable device is normal specifically, if: When the number of the wearable devices that the terminal normally communicates is higher than the preset number, it is determined that the communication between the terminal and the target wearable device is normal, otherwise, the terminal is determined to be between the terminal and the target wearable device. Communication is abnormal.
  • the method further includes: when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, to the terminal and the target Other wearable devices in the wearable device send a prompt signal.
  • the target wearable device when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, the distance between the two is inadvertently pulled to cause communication interruption.
  • the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to target the wearable device and the terminal in time.
  • the role of the state when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, the distance between the two is inadvertently pulled to cause communication interruption.
  • the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to target the wear
  • the target wearable device includes: at least one of wearable glasses, wearable earrings, a wearable watch, and a wearable wristband; and the When the result is YES, the system switching mode is allowed to be switched from the current system to the target system to normally use the target system; otherwise, the use of the system switching mode to enter the target system is prohibited, including: when the judgment result is yes And displaying an icon corresponding to the system switching mode; otherwise, hiding an icon corresponding to the system switching mode or a system switching function corresponding to the system switching mode.
  • the target wearable device includes but is not limited to the above, and may further include: a wearable earphone or the like; and if the target wearable device can communicate normally with the terminal, the user who uses the terminal is all of the terminal. It is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current system to the target system according to the system switching mode. Otherwise, if the communication is not normal, the description is The target wearable device is far away from the terminal, and the user who uses the terminal is not the owner of the terminal and is an illegal user. Therefore, the icon corresponding to the system switching mode can be hidden in the current system, thereby hiding the security level.
  • a wearable earphone or the like if the target wearable device can communicate normally with the terminal, the user who uses the terminal is all of the terminal. It is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current
  • the target system so that the user of the terminal does not know the existence of the target system with a higher security level, so that the user of the terminal does not have the will to decipher the target system to steal the privacy data in the target system, thereby ensuring the target system with higher security level. And the security of its internal data, or by directly closing the said System switching mode switching function corresponding to the user using the terminal to prohibit the system switches into the mode of the target system, to ensure the security of data of the target system.
  • Another aspect of the present invention provides a system processing apparatus for a terminal, the terminal comprising a plurality of systems, the apparatus comprising: a determining unit, determining whether communication between the terminal and the target wearable device is normal; The processing unit, when the determination result is yes, is allowed to switch from the current system to the target system by using the system switching mode to normally use the target system; otherwise, prohibiting the system switching mode from entering the target system or using the After the system switching mode enters the target system, the specified application in the target system cannot be operated normally, where the target wearable device is a wearable device bound to the terminal, and the target system is The security level of the plurality of systems is higher than any other system of the current system, and the system switching mode is a system switching mode that is switched from the current system to the target system.
  • the target wearable device is a wearable device carried by the owner of the terminal, it is determined whether the communication between the terminal and the target wearable device is normal, The identity of the user who uses the terminal can be identified, that is, if the communication is normal, the target wearable device is close to the terminal, and the user who uses the terminal is the owner of the terminal, not an illegal user, and therefore, The function corresponding to the system switching mode is enabled, and the system switching mode is allowed to be switched from the current system to the target system, and the target system is normally used. Otherwise, if the communication is not normal, the target wearable device is far away from the terminal. Furthermore, the user who uses the terminal is not the owner of the terminal and is an illegal user.
  • the system switching mode can be hidden or the corresponding function can be prohibited or the function of the target system can be restricted, so that the user cannot use the system switching mode to enter.
  • the target system or the target system cannot be used normally even after the user enters the target system by using the system switching mode, thereby ensuring the security of the target system with higher security level and its internal data;
  • the system switching mode includes a system switching mode on the software and a system switching mode on the hardware, and all system switching modes that can be switched from the current system to the target system are included, for example, the system switching mode may be current
  • the system switches to the virtual switching identifier of the target system or the physical switching button that is switched from the current system to the target system;
  • the system switching mode is the system switching mode on the software
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, including: displaying the device on the display interface of the terminal.
  • the icon corresponding to the system switching mode is used by the owner of the terminal to switch from the current system to the target system according to the system switching mode, and the owner of the terminal can use the target system normally; the prohibiting use of the system switching mode to enter the location
  • the target system specifically includes: hiding an icon corresponding to the system switching mode, thereby hiding the target system with a higher security level, so that the user of the terminal does not know the existence of the target system with a higher security level, thereby enabling the terminal to The user does not have the intention to decipher the target system to steal the privacy data in the target system, thereby ensuring the security of the target system with higher security level and its internal data, or turning off the switching function corresponding to the system switching mode to prohibit the terminal.
  • the user uses the system switching mode to enter the target system, etc.
  • the system switching mode is the system switching mode on the hardware
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, which includes: displaying the device on the display interface of the terminal. Describe the system switching mode and open the switching function corresponding to the system switching mode, so that the owner of the terminal switches from the current system to the switching mode according to the switching mode.
  • the target system, and the owner of the terminal can use the target system normally; the prohibiting the use of the system switching mode to enter the target system, specifically: hiding the system switching mode, or closing the system switching mode corresponding Switching functions so that the owner of the terminal cannot switch from the current system to the target system;
  • the specified application includes: an application related to data in the target system, where the system is in use
  • the controlling the specified application in the target system fails to operate normally, specifically: after the terminal user enters the target system by using the system switching manner, controlling the target system
  • the specified applications such as address book, call record, SMS, WeChat, MMS, Notepad, voice service, and data service cannot be started, so that the user of the terminal cannot use the target system normally, and thus the terminal user cannot Normally viewing or using data in a target system with a higher privilege level or performing some illegal operations in the target system fully ensures the security of data of a system with a higher privilege level.
  • the determining unit is configured to: control the terminal to send a communication request to the target wearable device; and determine whether the terminal receives the wearable from the target within a preset time.
  • the communication response of the device and when the determination result is yes, determining that the communication between the terminal and the target wearable device is normal; otherwise, determining that the communication between the terminal and the target wearable device is abnormal.
  • the user of the terminal can be accurately determined by determining whether the communication response from the target wearable device is received within the preset time. Whether it is an illegal user, that is, if the illegal user is using the terminal, it is inevitably far away from the owner of the target wearing device (ie, the owner of the terminal), and the target wearable device may not receive the request signal of the terminal. Therefore, the terminal will not receive the communication response from the target wearable device within the preset time, and the communication between the two is abnormal. Otherwise, the terminal can receive the communication response from the target wearable device within the preset time. , the communication between the two is normal.
  • the communication mode between the two may be wired communication mode or wireless communication mode, wherein the wireless communication mode may be multiple communication modes such as Bluetooth and 2.4G.
  • the determining unit is further configured to: when the target wearable device includes multiple wearable devices, if the number of wearable devices that normally communicate with the terminal is higher than a preset In the case of a number, it is determined that the communication between the terminal and the target wearable device is normal, otherwise, the communication between the terminal and the target wearable device is abnormal.
  • the method further includes: a sending unit, when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, to the terminal and Other wearable devices in the target wearable device send a prompt signal.
  • the target wearable device when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, the distance between the two is inadvertently pulled to cause communication interruption.
  • the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to target the wearable device and the terminal in time.
  • the role of the state when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, the distance between the two is inadvertently pulled to cause communication interruption.
  • the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to target the wear
  • the target wearable device includes: at least one of wearable glasses, wearable earrings, a wearable watch, and a wearable wristband; and the processing unit is specifically configured to: When the determination result is YES, the icon corresponding to the system switching mode is displayed. Otherwise, the icon corresponding to the system switching mode or the system switching function corresponding to the system switching mode is prohibited.
  • the target wearable device includes but is not limited to the above, and may further include: a wearable earphone or the like; and if the target wearable device can communicate normally with the terminal, the user who uses the terminal is all of the terminal. It is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current system to the target system according to the system switching mode. Otherwise, if the communication is not normal, the description is The target wearable device is far away from the terminal, and the user who uses the terminal is not the owner of the terminal and is an illegal user. Therefore, the icon corresponding to the system switching mode can be hidden in the current system, thereby hiding the security level.
  • a wearable earphone or the like if the target wearable device can communicate normally with the terminal, the user who uses the terminal is all of the terminal. It is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current
  • the target system so that the user of the terminal does not know the existence of the target system with a higher security level, so that the user of the terminal does not decipher the target system to steal the target system.
  • the willingness to protect the privacy data thereby ensuring the security of the target system with higher security level and its internal data, or prohibiting the user of the terminal from using the system switching mode by directly turning off the switching function corresponding to the system switching mode. Enter the target system to ensure the security of the data of the target system.
  • a further aspect of the present invention provides a terminal, comprising: the system processing apparatus according to any one of the above aspects.
  • an illegal user can be accurately judged, so that an illegal user cannot use the system switching mode to enter a target system with a higher security level or even if an illegal user uses the system switching mode to enter the target system. After that, the target system cannot be used normally, thereby ensuring the security of the target system with higher security level and its internal data.
  • an illegal user can be accurately judged, so that an illegal user cannot use the system switching mode to enter a target system with a higher security level or the illegal user cannot use the target system after using the system switching mode to enter the target system.
  • FIG. 1 is a flow chart showing a system processing method according to an embodiment of the present invention
  • FIG. 2 is a flow chart showing a system processing method according to another embodiment of the present invention.
  • FIG. 3 is a block diagram showing the structure of a system processing apparatus according to an embodiment of the present invention.
  • FIG. 4 is a schematic diagram showing the principle structure of a system processing apparatus according to an embodiment of the present invention.
  • FIG. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 1 is a flow chart showing a system processing method according to an embodiment of the present invention.
  • a system processing method includes: Step 102: determining whether communication between the terminal and a target wearable device is normal; and step 104, when the determination result is yes, allowing Switching from the current system to the target system using the system switching mode to normally use the target system; otherwise, prohibiting the use of the system switching mode to enter the target system or after entering the target system using the system switching mode, controlling The specified application in the target system is not functioning properly, wherein the target wearable device is a wearable device that is bound to the terminal, and the target system is higher than the security level in the multiple systems. Any other system of the current system, and the system switching mode is a system switching mode that is switched from the current system to the target system.
  • the target wearable device is a wearable device carried by the owner of the terminal
  • the identity of the user who uses the terminal can be performed by determining whether the communication between the terminal and the target wearable device is normal. Identification, that is, if the communication is normal, the target wearable device is close to the terminal, and the user who uses the terminal is the owner of the terminal, and is not an illegal user. Therefore, the function corresponding to the system switching mode can be enabled. The system switching mode is allowed to be switched from the current system to the target system, and the target system is normally used. Otherwise, if the communication is not normal, the target wearable device is far away from the terminal, thereby indicating that the user who uses the terminal is not all of the terminal. It is an illegal user.
  • the system switching mode can be hidden or the corresponding function can be prohibited or the function of the target system can be restricted, so that the user cannot use the system switching mode to enter the target system or even if the user uses the system switching mode to enter. After the target system, it cannot be made normally. Target system, thereby ensuring a higher level of security target system, and its internal data security;
  • the system switching mode includes a system switching mode on the software and a system switching mode on the hardware, and all system switching modes that can be switched from the current system to the target system are included, for example, the system switching mode may be current
  • the system switches to the virtual switching identifier of the target system or the physical switching button that is switched from the current system to the target system;
  • the switching mode is switched from the current system to the target system to normally use the target system, and specifically includes: displaying, on the display interface of the terminal, an icon corresponding to the system switching mode, for the owner of the terminal to be current according to the system switching mode.
  • the system is switched to the target system, and the owner of the terminal can use the target system normally; the prohibiting the use of the system switching mode to enter the target system, specifically: hiding an icon corresponding to the system switching mode, thereby hiding the A target system with a higher security level, so that the user of the terminal does not know the existence of a target system with a higher security level, and thus the user of the terminal does not have the will to decipher the target system to steal private data in the target system, thereby ensuring the security level.
  • a higher target system, security of its internal data, or a switching function corresponding to the system switching mode is disabled to prohibit the user of the terminal from entering the target system by using the system switching mode;
  • the system switching mode is the system switching mode on the hardware
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, which includes: displaying the device on the display interface of the terminal. Describe a system switching mode and open a switching function corresponding to the system switching mode, so that the owner of the terminal switches from the current system to the target system according to the switching mode, and enables the owner of the terminal to use the target system normally;
  • the system switching mode is used to enter the target system, specifically: hiding the system switching mode, or turning off the switching function corresponding to the system switching mode, so that the owner of the terminal cannot switch from the current system to the target system;
  • the specified application includes: an application related to data in the target system, where the system is in use
  • the controlling the specified application in the target system fails to operate normally, specifically: after the terminal user enters the target system by using the system switching manner, controlling the target system
  • the specified applications such as address book, call record, SMS, WeChat, MMS, Notepad, voice service, and data service cannot be started, so that the user of the terminal cannot use the target system normally, and thus the terminal user cannot Normally viewing or using data in a target system with a higher privilege level or performing some illegal operations in the target system fully ensures the security of data of a system with a higher privilege level.
  • the determining the terminal and the target wearable device Whether the communication is normal or not includes: controlling the terminal to send a communication request to the target wearable device; determining whether the terminal receives a communication response from the target wearable device within a preset time, and determining When the result is YES, it is determined that the communication between the terminal and the target wearable device is normal; otherwise, the communication between the terminal and the target wearable device is abnormal.
  • the user of the terminal can be accurately determined by determining whether the communication response from the target wearable device is received within the preset time. Whether it is an illegal user, that is, if the illegal user is using the terminal, it is inevitably far away from the owner of the target wearing device (ie, the owner of the terminal), and the target wearable device may not receive the request signal of the terminal. Therefore, the terminal will not receive the communication response from the target wearable device within the preset time, and the communication between the two is abnormal. Otherwise, the terminal can receive the communication response from the target wearable device within the preset time. , the communication between the two is normal.
  • the communication mode between the two may be wired communication mode or wireless communication mode, wherein the wireless communication mode may be multiple communication modes such as Bluetooth and 2.4G.
  • the determining whether the communication between the terminal and the target wearable device is normal specifically, if: When the number of the wearable devices that the terminal normally communicates is higher than the preset number, it is determined that the communication between the terminal and the target wearable device is normal, otherwise, the terminal is determined to be between the terminal and the target wearable device. Communication is abnormal.
  • the method further includes: when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, to the terminal and the target Other wearable devices in the wearable device send a prompt signal.
  • the target wearable device when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, it is inadvertently The distance between the two is extended to cause communication interruption, and at the same time, the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to promptly target the state of the wearable device and the terminal.
  • the target wearable device includes: at least one of wearable glasses, wearable earrings, a wearable watch, and a wearable wristband; and when the judgment result is YES, The system switching mode is allowed to be switched from the current system to the target system to use the target system normally; otherwise, the system switching mode is prohibited from entering the target system, and the method includes: displaying the system when the determination result is yes The icon corresponding to the switching mode, otherwise, the icon corresponding to the system switching mode or the system switching function corresponding to the system switching mode is prohibited.
  • the target wearable device includes but is not limited to the above, and may further include: a wearable earphone or the like; and if the target wearable device can communicate normally with the terminal, the user who uses the terminal is all of the terminal. It is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current system to the target system according to the system switching mode. Otherwise, if the communication is not normal, the description is The target wearable device is far away from the terminal, and the user who uses the terminal is not the owner of the terminal and is an illegal user. Therefore, the icon corresponding to the system switching mode can be hidden in the current system, thereby hiding the security level.
  • a wearable earphone or the like if the target wearable device can communicate normally with the terminal, the user who uses the terminal is all of the terminal. It is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current
  • the target system so that the user of the terminal does not know the existence of the target system with a higher security level, so that the user of the terminal does not have the will to decipher the target system to steal the privacy data in the target system, thereby ensuring the target system with higher security level. And the security of its internal data, or by directly closing the said System switching mode switching function corresponding to the user using the terminal to prohibit the system switches into the mode of the target system, to ensure the security of data of the target system.
  • FIG. 2 is a flow chart showing a system processing method according to another embodiment of the present invention.
  • a system processing method according to another embodiment of the present invention (in this embodiment, the terminal is a mobile phone, and the dual system, that is, the security system and the common system, is installed on the mobile phone, and one mobile phone can be multiple
  • the wearable device is bound, and the same wearable device can also be bound to different mobile phones), including:
  • Step 202 detecting that the user operates the mobile phone, for example, detecting that the user performs the mobile phone A wake-up state or a power-on operation by the standby state.
  • Step 204 Detect a connection state between the mobile phone and the wearable device, and the device communication module in the mobile phone detects the current communication connection state of the mobile phone according to the wearable device binding list, where the wearable device binding list is the mobile phone and the wearable device.
  • Related data such as mobile phones, are connected and communicated with wearable glasses, wearable earrings, wearable watches, wearable bracelets.
  • Step 206 Determine whether the connection between the mobile phone and the wearable device is normal.
  • the determination result is yes, the communication connection state between the mobile phone and the at least one bound wearable device is normal (if the number of wearable devices that normally communicate with the terminal is higher than
  • the preset number is determined, the communication between the terminal and the target wearable device is determined to be normal, and the process proceeds to step 208.
  • the determination result is no, the multiple wearable devices bound to the mobile phone are all disconnected. The phone may be loaned to someone else or has been lost, proceeding to step 210.
  • Step 208 When the connection between the mobile phone and the wearable device is normal, the related operation mode (system switching mode of the security system) and the security system of the security system are displayed, so that the user can quickly switch to the security system.
  • the related operation mode system switching mode of the security system
  • the security system of the security system are displayed, so that the user can quickly switch to the security system.
  • Step 210 hide the relevant operation mode of the security system and the data of the security system, thereby hiding the security system, preventing other users from discovering the security system in the mobile phone, and reducing the risk of the security system being deciphered, thereby preventing the information in the security system from being illegal. Stealing, thereby improving the security performance of the mobile phone, and simultaneously sending a warning signal such as a vibration notification, a voice notification, and/or a light notification to other wearable devices bound to the mobile phone to prompt the user terminal that the terminal may not be within the user's foreseeable range.
  • a warning signal such as a vibration notification, a voice notification, and/or a light notification
  • Step 212 The mobile phone executes a corresponding instruction according to the operation of the user, for example, the mobile phone executes an instruction to wake up from the standby state.
  • FIG. 3 shows a block diagram of a system processing apparatus in accordance with an embodiment of the present invention.
  • a system processing apparatus 300 includes a judging unit 302 and a processing unit 304.
  • the determining unit 302 is configured to determine whether the communication between the terminal and the target wearable device is normal; and when the determination result is YES, the processing unit 304 allows the system switching mode to be used to switch from the current system to the target system to use the normal system.
  • the target system otherwise, prohibiting the use of the system switching mode to enter the target system or using the system to cut After the user enters the target system, the specified application in the target system cannot be operated normally, where the target wearable device is a wearable device that is bound to the terminal, and the target system is Any of the other systems in which the security level is higher than the current system, and the system switching mode is a system switching mode that is switched from the current system to the target system.
  • the target wearable device is a wearable device carried by the owner of the terminal
  • the identity of the user who uses the terminal can be performed by determining whether the communication between the terminal and the target wearable device is normal. Identification, that is, if the communication is normal, the target wearable device is close to the terminal, and the user who uses the terminal is the owner of the terminal, and is not an illegal user. Therefore, the function corresponding to the system switching mode can be enabled. The system switching mode is allowed to be switched from the current system to the target system, and the target system is normally used. Otherwise, if the communication is not normal, the target wearable device is far away from the terminal, thereby indicating that the user who uses the terminal is not all of the terminal. It is an illegal user.
  • the system switching mode can be hidden or the corresponding function can be prohibited or the function of the target system can be restricted, so that the user cannot use the system switching mode to enter the target system or even if the user uses the system switching mode to enter. After the target system, it cannot be made normally. Target system, thereby ensuring a higher level of security target system, and its internal data security;
  • the system switching mode includes a system switching mode on the software and a system switching mode on the hardware, and all system switching modes that can be switched from the current system to the target system are included, for example, the system switching mode may be current
  • the system switches to the virtual switching identifier of the target system or the physical switching button that is switched from the current system to the target system;
  • the system switching mode is the system switching mode on the software
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, including: displaying the device on the display interface of the terminal.
  • the icon corresponding to the system switching mode is used by the owner of the terminal to switch from the current system to the target system according to the system switching mode, and the owner of the terminal can use the target system normally; the prohibiting use of the system switching mode to enter the location
  • the target system specifically includes: hiding an icon corresponding to the system switching mode, thereby hiding the target system with a higher security level, so that the user of the terminal does not know the existence of the target system with a higher security level, thereby enabling the terminal to The user did not decipher the target system to steal the privacy of the target system According to the intention, thereby ensuring the target system with a higher security level, and the security of its internal data, or turning off the switching function corresponding to the system switching mode, to prohibit the user of the terminal from entering the target using the system switching mode. System,
  • the system switching mode is the system switching mode on the hardware
  • the system switching mode is allowed to be switched from the current system to the target system to use the target system normally, which includes: displaying the device on the display interface of the terminal. Describe a system switching mode and open a switching function corresponding to the system switching mode, so that the owner of the terminal switches from the current system to the target system according to the switching mode, and enables the owner of the terminal to use the target system normally;
  • the system switching mode is used to enter the target system, specifically: hiding the system switching mode, or turning off the switching function corresponding to the system switching mode, so that the owner of the terminal cannot switch from the current system to the target system;
  • the specified application includes: an application related to data in the target system, where the system is in use
  • the controlling the specified application in the target system fails to operate normally, specifically: after the terminal user enters the target system by using the system switching manner, controlling the target system
  • the specified applications such as address book, call record, SMS, WeChat, MMS, Notepad, voice service, and data service cannot be started, so that the user of the terminal cannot use the target system normally, and thus the terminal user cannot Normally viewing or using data in a target system with a higher privilege level or performing some illegal operations in the target system fully ensures the security of data of a system with a higher privilege level.
  • the determining unit 302 is specifically configured to: control the terminal to send a communication request to the target wearable device; and determine whether the terminal receives the target from the target within a preset time.
  • the communication response of the wearable device is determined, and when the determination result is yes, it is determined that the communication between the terminal and the target wearable device is normal; otherwise, the communication between the terminal and the target wearable device is abnormal.
  • the user of the terminal can be accurately determined by determining whether the communication response from the target wearable device is received within the preset time. Whether it is an illegal user, that is, if it is an illegal user If the terminal is used, it is inevitably far away from the owner of the target wearable device (ie, the owner of the terminal), and the target wearable device may not receive the request signal of the terminal, and thus the terminal may not receive the preset time.
  • the communication response from the target wearable device is abnormal, the communication between the two is abnormal. Otherwise, the terminal can receive the communication response from the target wearable device within the preset time, and the communication between the two is normal.
  • the communication mode between the two may be wired communication mode or wireless communication mode, wherein the wireless communication mode may be multiple communication modes such as Bluetooth and 2.4G.
  • the determining unit 302 is further configured to: when the target wearable device includes multiple wearable devices, if the number of wearable devices that normally communicate with the terminal is higher than the pre- When the number is set, it is determined that the communication between the terminal and the target wearable device is normal, otherwise, the communication between the terminal and the target wearable device is abnormal.
  • the method further includes: a sending unit 306, when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, to the terminal And sending a prompt signal to other wearable devices in the target wearable device.
  • the target wearable device when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, the distance between the two is inadvertently pulled to cause communication interruption.
  • the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to target the wearable device and the terminal in time.
  • the role of the state when the target wearable device communicates with the terminal, if the target wearable device is disconnected from the terminal, by sending a prompt signal to the terminal and other wearable devices, not only the user may be prevented from misoperation, but also the user is prevented from being
  • the target wearable device communicates with the terminal, the distance between the two is inadvertently pulled to cause communication interruption.
  • the terminal or the wearable device can be prevented from being stolen, and the user can be prompted to target the wear
  • the target wearable device includes: at least one of wearable glasses, wearable earrings, a wearable watch, and a wearable wristband; and the processing unit 304 is specifically configured to: When the determination result is yes, the icon corresponding to the system switching mode is displayed. Otherwise, the icon corresponding to the system switching mode or the system switching function corresponding to the system switching mode is prohibited.
  • the target wearable device includes but is not limited to the above, and may further include: a wearable earphone, etc.; and if the target wearable device can communicate with the terminal normally, The user who uses the terminal is the owner of the terminal, and is not an illegal user. Therefore, the icon corresponding to the system switching mode can be displayed in the current system, so that the owner of the terminal can switch from the current system to the target system according to the system switching mode. On the other hand, if the communication is not normal, the target wearable device is far away from the terminal, and the user who uses the terminal is not the owner of the terminal, and is an illegal user. Therefore, the icon corresponding to the system switching mode can be hidden in the current system.
  • FIG. 4 is a schematic block diagram showing the structure of a system processing apparatus according to an embodiment of the present invention.
  • the system processing apparatus 300 according to an embodiment of the present invention (in this embodiment, the terminal is a mobile phone, and the dual system, that is, the security system and the common system, is installed on the mobile phone, and one mobile phone can be multiple
  • the wearable device is bound, and the same wearable device can also be bound to different mobile phones), including:
  • the user operation module 402 is configured to detect and perform an operation (specified operation) of the user on the mobile phone, and send the detection result to the state determination module 406.
  • Device communication module 404 for managing a communication connection between the mobile phone and the wearable device, and maintaining a wearable device binding list, for example, increasing or decreasing the wearable device in the wearable device binding list, the device communication module 404 may The wearable device binding list is updated.
  • the same wearable device can correspond to multiple mobile phones, and the same mobile phone can also correspond to multiple wearable devices.
  • the state judging module 406 judging whether the connection between the mobile phone and the wearable device is normal according to the signals of the user operation module 402 and the device communication module 404, and sending a specific operation instruction to the security management module according to the connection state of the mobile phone and the wearable device. 408 and device communication module 404.
  • the security management module 408 performs corresponding operations according to the operation instructions sent by the state determination module 406.
  • Security protection operation for example, when the mobile phone is in normal communication with at least one of the bound wearable devices, the security management module 408 displays the relevant operation mode (system switching mode) and security system data entering the security system;
  • the security management module 408 hides the related operation mode of the security system and the data of the security system, and sends a vibration notification, a voice notification, and/or to the wearable device bound to the mobile phone. Or a warning signal such as a light notification to indicate that the user terminal may not be within the user's foreseeable range.
  • FIG. 5 shows a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • a terminal 500 includes: the system processing apparatus 300 according to any one of the above aspects.
  • an illegal user can be accurately determined, so that an illegal user cannot use the system switching mode to enter a target system with a higher security level or even if an illegal user uses the system switching mode to enter After the target system, the target system cannot be used normally, thus ensuring the security of the target system with higher security level and its internal data.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Mathematical Physics (AREA)
  • Human Computer Interaction (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提出了一种系统处理方法、一种系统处理装置和一种终端,其中,系统处理方法包括:判断终端与目标可穿戴设备之间的通信是否正常;在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用目标系统,否则,禁止使用系统切换方式进入目标系统或在使用系统切换方式进入目标系统后,控制目标系统中的指定应用程序无法正常运行。通过本发明的技术方案,可以对非法用户进行准确判断,使非法用户无法使用系统切换方式进入安全等级较高的目标系统或即便非法用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性。

Description

系统处理方法、系统处理装置和终端
本申请要求于2015年1月16日提交中国专利局、申请号为201510024075.8、发明名称为“系统处理方法、系统处理装置和终端”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及终端技术领域,具体而言,涉及一种系统处理方法、系统处理装置和一种终端。
背景技术
目前,相关技术中的终端安装有双系统,即安全等级较低的普通系统和安全等级较高的安全系统,而双系统的切换方法一般是通过在终端上进行特定操作(如输入密码指令等)实现双系统的切换。
然而,上述提到的终端双系统的切换方法只实现了双系统的切换,并没有考虑到不同用户使用同一个终端时安全等级较高的系统中的数据会遭到泄漏的风险,也就是说不同用户使用同一个终端时,看到的界面都是一样的,即使终端的当前系统为安全等级较低的普通系统,但是不同用户都能够使用切换至安全系统的系统切换方式,从而得知终端中有安全系统的存在,进而提高了安全系统遭到非法破译的风险,则安全系统中的数据可能会遭到非法泄漏,从而降低了终端的安全性能,进而降低了用户体验。
因此,不同用户在使用同一个终端时,如何保证终端中安全等级较高的系统中的数据安全,成为亟待解决的问题。
发明内容
本发明正是基于上述问题,提出了一种新的技术方案,可以对非法用户进行准确判断,使非法用户无法使用系统切换方式进入安全等级较高的目标系统或即便非法用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性。
有鉴于此,本发明的一方面提出了一种系统处理方法,用于终端,所 述终端包括多个系统,所述方法包括:判断所述终端与目标可穿戴设备之间的通信是否正常;在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,否则,禁止使用所述系统切换方式进入所述目标系统或在使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的指定应用程序无法正常运行,其中,所述目标可穿戴设备为与所述终端相绑定的可穿戴设备,所述目标系统为所述多个系统中安全等级高于所述当前系统的其他任一系统,且所述系统切换方式为由当前系统切换至所述目标系统的系统切换方式。
在该技术方案中,由于目标可穿戴设备是终端的所有者随身携带的可穿戴设备,因而,通过判断终端与目标可穿戴设备之间的通信是否正常,即可对使用终端的用户的身份进行识别,即如果通信正常,则说明目标可穿戴设备与终端距离较近,进而说明使用终端的用户即为终端的所有者,不是非法用户,因此,可以将系统切换方式对应的功能进行使能,允许使用系统切换方式由当前系统切换至目标系统,并正常使用所述目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可以将系统切换方式进行隐藏或将对应的功能进行禁止或将目标系统的功能进行限制,以使用户无法使用系统切换方式进入目标系统或即便用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性;
其中,该系统切换方式包括软件上的系统切换方式和硬件上的系统切换方式,所有可以实现由当前系统切换至目标系统的系统切换方式均包括在内,例如:该系统切换方式可以为由当前系统切换至目标系统的虚拟切换标识或由当前系统切换至目标系统的物理切换按键;
而当该系统切换方式为软件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式对应的图标以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目 标系统,具体包括:隐藏所述系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或关闭所述系统切换方式对应的切换功能,以禁止终端的使用者使用所述系统切换方式进入所述目标系统等;
而当该系统切换方式为硬件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式并打开所述系统切换方式对应的切换功能,以供终端的所有者根据该切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式,或者关闭所述系统切换方式对应的切换功能,以使终端的所有者无法从当前系统切换至目标系统;
而无论当该系统切换方式为软件上的系统切换方式还是硬件上的系统切换方式,所述指定应用程序均包括:与所述目标系统中的数据相关的应用程序,所述在使用所述系统切换方式进入所述目标系统后,所述控制所述目标系统中的指定应用程序无法正常运行,具体包括:在终端使用者使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的通讯录、通话记录、短信、微信、彩信、记事本、语音业务、数据业务等指定应用程序均无法启动,以使所述终端的使用者无法正常使用目标系统,进而使终端使用者无法正常查看或使用权限等级较高的目标系统中的数据或在目标系统中执行一些非法操作,从而充分地确保了权限等级较高的系统的数据的安全性。
在上述技术方案中,优选地,所述判断所述终端与目标可穿戴设备之间的通信是否正常,具体包括:控制所述终端向所述目标可穿戴设备发送通信请求;判断所述终端是否在预设时间内接收到来自所述目标可穿戴设备的通信响应,并在判断结果为是时,判定所述终端与所述目标可穿戴设备之间的通信正常;否则,判断所述终端与所述目标可穿戴设备之间的通 信异常。
在该技术方案中,因为目标可穿戴设备与终端的通信受限于距离,因而,通过判断是否在预设时间内接收到来自目标可穿戴设备的通信响应,可以准确地判断出终端的使用者是否为非法用户,即如果是非法用户正在使用终端,则必然与携带目标穿戴设备的所有者(即终端的所有者)距离较远,则目标可穿戴设备可能就无法接收到终端的请求信号,因而,终端在预设时间内将无法接收到来自目标可穿戴设备的通信响应,则两者之间的通信异常,反之,则终端在预设时间内能够接收到来自目标可穿戴设备的通信响应,则两者之间的通信正常。当然,两者之间的通信方式可以为有线通信方式或无线通信方式,其中无线通信方式可以为蓝牙、2.4G等多种通信方式。
在上述技术方案中,优选地,在所述目标可穿戴设备包括多个可穿戴设备时,所述判断所述终端与目标可穿戴设备之间的通信是否正常,具体还包括:若与所述终端正常通信的可穿戴设备的数目高于预设数目时,则判定所述终端与所述目标可穿戴设备之间的通信正常,否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,通过根据与终端正常通信的可穿戴设备的数目是否高于预设数目来判断终端与目标可穿戴设备之间的通信是否正常,便于提高通信是否正常的判断准确率,防止误判断。
在上述技术方案中,优选地,还包括:在所述目标可穿戴设备与所述终端通信时,若所述目标可穿戴设备与所述终端断开连接,则向所述终端和所述目标可穿戴设备中的其他可穿戴设备发送提示信号。
在该技术方案中,在目标可穿戴设备与终端通信时,若目标可穿戴设备与终端断开连接,则通过向终端和其他可穿戴设备发送提示信号,不仅可以防止用户误操作,防止用户在目标可穿戴设备与终端通信时,无意中拉远了两者之间的距离而导致通信中断,同时,也可以防止终端或可穿戴设备被盗,可以起到及时提示用户目标可穿戴设备与终端所处状态的作用。
在上述技术方案中,优选地,所述目标可穿戴设备包括:可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环中的至少任一项;以及所述在判断 结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统;否则,禁止使用所述系统切换方式进入所述目标系统,具体包括:在判断结果为是时,显示所述系统切换方式对应的图标,否则,隐藏所述系统切换方式对应的图标或禁止所述系统切换方式对应的系统切换功能。
在该技术方案中,目标可穿戴设备包括但不限于上述几种,还可以包括:可穿戴耳机等;且如果目标可穿戴设备与终端可以正常通信,则说明使用终端的用户即为终端的所有者,不是非法用户,因此,可将系统切换方式对应的图标显示在当前系统中,以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可在当前系统中隐藏该系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或者通过直接关闭所述系统切换方式对应的切换功能来禁止终端的使用者使用所述系统切换方式进入所述目标系统,以确保目标系统的数据的安全性。
本发明的另一方面提出了一种系统处理装置,用于终端,所述终端包括多个系统,所述装置包括:判断单元,判断所述终端与目标可穿戴设备之间的通信是否正常;处理单元,在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,否则,禁止使用所述系统切换方式进入所述目标系统或在使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的指定应用程序无法正常运行,其中,所述目标可穿戴设备为与所述终端相绑定的可穿戴设备,所述目标系统为所述多个系统中安全等级高于所述当前系统的其他任一系统,且所述系统切换方式为由当前系统切换至所述目标系统的系统切换方式。
在该技术方案中,由于目标可穿戴设备是终端的所有者随身携带的可穿戴设备,因而,通过判断终端与目标可穿戴设备之间的通信是否正常, 即可对使用终端的用户的身份进行识别,即如果通信正常,则说明目标可穿戴设备与终端距离较近,进而说明使用终端的用户即为终端的所有者,不是非法用户,因此,可以将系统切换方式对应的功能进行使能,允许使用系统切换方式由当前系统切换至目标系统,并正常使用所述目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可以将系统切换方式进行隐藏或将对应的功能进行禁止或将目标系统的功能进行限制,以使用户无法使用系统切换方式进入目标系统或即便用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性;
其中,该系统切换方式包括软件上的系统切换方式和硬件上的系统切换方式,所有可以实现由当前系统切换至目标系统的系统切换方式均包括在内,例如:该系统切换方式可以为由当前系统切换至目标系统的虚拟切换标识或由当前系统切换至目标系统的物理切换按键;
而当该系统切换方式为软件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式对应的图标以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或关闭所述系统切换方式对应的切换功能,以禁止终端的使用者使用所述系统切换方式进入所述目标系统等;
而当该系统切换方式为硬件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式并打开所述系统切换方式对应的切换功能,以供终端的所有者根据该切换方式由当前系统切换至 目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式,或者关闭所述系统切换方式对应的切换功能,以使终端的所有者无法从当前系统切换至目标系统;
而无论当该系统切换方式为软件上的系统切换方式还是硬件上的系统切换方式,所述指定应用程序均包括:与所述目标系统中的数据相关的应用程序,所述在使用所述系统切换方式进入所述目标系统后,所述控制所述目标系统中的指定应用程序无法正常运行,具体包括:在终端使用者使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的通讯录、通话记录、短信、微信、彩信、记事本、语音业务、数据业务等指定应用程序均无法启动,以使所述终端的使用者无法正常使用目标系统,进而使终端使用者无法正常查看或使用权限等级较高的目标系统中的数据或在目标系统中执行一些非法操作,从而充分地确保了权限等级较高的系统的数据的安全性。
在上述技术方案中,优选地,所述判断单元具体用于:控制所述终端向所述目标可穿戴设备发送通信请求;判断所述终端是否在预设时间内接收到来自所述目标可穿戴设备的通信响应,并在判断结果为是时,判定所述终端与所述目标可穿戴设备之间的通信正常;否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,因为目标可穿戴设备与终端的通信受限于距离,因而,通过判断是否在预设时间内接收到来自目标可穿戴设备的通信响应,可以准确地判断出终端的使用者是否为非法用户,即如果是非法用户正在使用终端,则必然与携带目标穿戴设备的所有者(即终端的所有者)距离较远,则目标可穿戴设备可能就无法接收到终端的请求信号,因而,终端在预设时间内将无法接收到来自目标可穿戴设备的通信响应,则两者之间的通信异常,反之,则终端在预设时间内能够接收到来自目标可穿戴设备的通信响应,则两者之间的通信正常。当然,两者之间的通信方式可以为有线通信方式或无线通信方式,其中无线通信方式可以为蓝牙、2.4G等多种通信方式。
在上述技术方案中,优选地,所述判断单元具体还用于:在所述目标可穿戴设备包括多个可穿戴设备时,若与所述终端正常通信的可穿戴设备的数目高于预设数目时,则判定所述终端与所述目标可穿戴设备之间的通信正常,否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,通过根据与终端正常通信的可穿戴设备的数目是否高于预设数目来判断终端与目标可穿戴设备之间的通信是否正常,便于提高通信是否正常的判断准确率,防止误判断。
在上述技术方案中,优选地,还包括:发送单元,在所述目标可穿戴设备与所述终端通信时,若所述目标可穿戴设备与所述终端断开连接,则向所述终端和所述目标可穿戴设备中的其他可穿戴设备发送提示信号。
在该技术方案中,在目标可穿戴设备与终端通信时,若目标可穿戴设备与终端断开连接,则通过向终端和其他可穿戴设备发送提示信号,不仅可以防止用户误操作,防止用户在目标可穿戴设备与终端通信时,无意中拉远了两者之间的距离而导致通信中断,同时,也可以防止终端或可穿戴设备被盗,可以起到及时提示用户目标可穿戴设备与终端所处状态的作用。
在上述技术方案中,优选地,所述目标可穿戴设备包括:可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环中的至少任一项;以及所述处理单元具体用于:在判断结果为是时,显示所述系统切换方式对应的图标,否则,隐藏所述系统切换方式对应的图标或禁止所述系统切换方式对应的系统切换功能。
在该技术方案中,目标可穿戴设备包括但不限于上述几种,还可以包括:可穿戴耳机等;且如果目标可穿戴设备与终端可以正常通信,则说明使用终端的用户即为终端的所有者,不是非法用户,因此,可将系统切换方式对应的图标显示在当前系统中,以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可在当前系统中隐藏该系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系 统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或者通过直接关闭所述系统切换方式对应的切换功能来禁止终端的使用者使用所述系统切换方式进入所述目标系统,以确保目标系统的数据的安全性。
本发明的又一方面提出了一种终端,包括:如上述任一项技术方案所述的系统处理装置。
在该技术方案中,通过在终端上设置系统处理装置,可以对非法用户进行准确判断,使非法用户无法使用系统切换方式进入安全等级较高的目标系统或即便非法用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性。
通过本发明的技术方案,可以对非法用户进行准确判断,使非法用户无法使用系统切换方式进入安全等级较高的目标系统或即便非法用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性。
附图说明
图1示出了根据本发明的一个实施例的系统处理方法的流程示意图;
图2示出了根据本发明的另一个实施例的系统处理方法的流程示意图;
图3示出了根据本发明的一个实施例的系统处理装置的结构示意图;
图4示出了根据本发明的一个实施例的系统处理装置的原理结构示意图;
图5示出了根据本发明的一个实施例的终端的结构示意图。
具体实施方式
为了可以更清楚地理解本发明的上述目的、特征和优点,下面结合附图和具体实施方式对本发明进行进一步的详细描述。需要说明的是,在不冲突的情况下,本申请的实施例及实施例中的特征可以相互组合。
在下面的描述中阐述了很多具体细节以便于充分理解本发明,但是, 本发明还可以采用其他不同于在此描述的其他方式来实施,因此,本发明的保护范围并不受下面公开的具体实施例的限制。
图1示出了根据本发明的一个实施例的系统处理方法的流程示意图。
如图1所示,根据本发明的一个实施例的系统处理方法,包括:步骤102,判断所述终端与目标可穿戴设备之间的通信是否正常;步骤104,在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,否则,禁止使用所述系统切换方式进入所述目标系统或在使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的指定应用程序无法正常运行,其中,所述目标可穿戴设备为与所述终端相绑定的可穿戴设备,所述目标系统为所述多个系统中安全等级高于所述当前系统的其他任一系统,且所述系统切换方式为由当前系统切换至所述目标系统的系统切换方式。
在该技术方案中,由于目标可穿戴设备是终端的所有者随身携带的可穿戴设备,因而,通过判断终端与目标可穿戴设备之间的通信是否正常,即可对使用终端的用户的身份进行识别,即如果通信正常,则说明目标可穿戴设备与终端距离较近,进而说明使用终端的用户即为终端的所有者,不是非法用户,因此,可以将系统切换方式对应的功能进行使能,允许使用系统切换方式由当前系统切换至目标系统,并正常使用所述目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可以将系统切换方式进行隐藏或将对应的功能进行禁止或将目标系统的功能进行限制,以使用户无法使用系统切换方式进入目标系统或即便用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性;
其中,该系统切换方式包括软件上的系统切换方式和硬件上的系统切换方式,所有可以实现由当前系统切换至目标系统的系统切换方式均包括在内,例如:该系统切换方式可以为由当前系统切换至目标系统的虚拟切换标识或由当前系统切换至目标系统的物理切换按键;
而当该系统切换方式为软件上的系统切换方式时,所述允许使用系统 切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式对应的图标以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或关闭所述系统切换方式对应的切换功能,以禁止终端的使用者使用所述系统切换方式进入所述目标系统等;
而当该系统切换方式为硬件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式并打开所述系统切换方式对应的切换功能,以供终端的所有者根据该切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式,或者关闭所述系统切换方式对应的切换功能,以使终端的所有者无法从当前系统切换至目标系统;
而无论当该系统切换方式为软件上的系统切换方式还是硬件上的系统切换方式,所述指定应用程序均包括:与所述目标系统中的数据相关的应用程序,所述在使用所述系统切换方式进入所述目标系统后,所述控制所述目标系统中的指定应用程序无法正常运行,具体包括:在终端使用者使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的通讯录、通话记录、短信、微信、彩信、记事本、语音业务、数据业务等指定应用程序均无法启动,以使所述终端的使用者无法正常使用目标系统,进而使终端使用者无法正常查看或使用权限等级较高的目标系统中的数据或在目标系统中执行一些非法操作,从而充分地确保了权限等级较高的系统的数据的安全性。
在上述技术方案中,优选地,所述判断所述终端与目标可穿戴设备之 间的通信是否正常,具体包括:控制所述终端向所述目标可穿戴设备发送通信请求;判断所述终端是否在预设时间内接收到来自所述目标可穿戴设备的通信响应,并在判断结果为是时,判定所述终端与所述目标可穿戴设备之间的通信正常;否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,因为目标可穿戴设备与终端的通信受限于距离,因而,通过判断是否在预设时间内接收到来自目标可穿戴设备的通信响应,可以准确地判断出终端的使用者是否为非法用户,即如果是非法用户正在使用终端,则必然与携带目标穿戴设备的所有者(即终端的所有者)距离较远,则目标可穿戴设备可能就无法接收到终端的请求信号,因而,终端在预设时间内将无法接收到来自目标可穿戴设备的通信响应,则两者之间的通信异常,反之,则终端在预设时间内能够接收到来自目标可穿戴设备的通信响应,则两者之间的通信正常。当然,两者之间的通信方式可以为有线通信方式或无线通信方式,其中无线通信方式可以为蓝牙、2.4G等多种通信方式。
在上述技术方案中,优选地,在所述目标可穿戴设备包括多个可穿戴设备时,所述判断所述终端与目标可穿戴设备之间的通信是否正常,具体还包括:若与所述终端正常通信的可穿戴设备的数目高于预设数目时,则判定所述终端与所述目标可穿戴设备之间的通信正常,否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,通过根据与终端正常通信的可穿戴设备的数目是否高于预设数目来判断终端与目标可穿戴设备之间的通信是否正常,便于提高通信是否正常的判断准确率,防止误判断。
在上述技术方案中,优选地,还包括:在所述目标可穿戴设备与所述终端通信时,若所述目标可穿戴设备与所述终端断开连接,则向所述终端和所述目标可穿戴设备中的其他可穿戴设备发送提示信号。
在该技术方案中,在目标可穿戴设备与终端通信时,若目标可穿戴设备与终端断开连接,则通过向终端和其他可穿戴设备发送提示信号,不仅可以防止用户误操作,防止用户在目标可穿戴设备与终端通信时,无意中 拉远了两者之间的距离而导致通信中断,同时,也可以防止终端或可穿戴设备被盗,可以起到及时提示用户目标可穿戴设备与终端所处状态的作用。
在上述技术方案中,优选地,所述目标可穿戴设备包括:可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环中的至少任一项;以及所述在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统;否则,禁止使用所述系统切换方式进入所述目标系统,具体包括:在判断结果为是时,显示所述系统切换方式对应的图标,否则,隐藏所述系统切换方式对应的图标或禁止所述系统切换方式对应的系统切换功能。
在该技术方案中,目标可穿戴设备包括但不限于上述几种,还可以包括:可穿戴耳机等;且如果目标可穿戴设备与终端可以正常通信,则说明使用终端的用户即为终端的所有者,不是非法用户,因此,可将系统切换方式对应的图标显示在当前系统中,以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可在当前系统中隐藏该系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或者通过直接关闭所述系统切换方式对应的切换功能来禁止终端的使用者使用所述系统切换方式进入所述目标系统,以确保目标系统的数据的安全性。
图2示出了根据本发明的另一个实施例的系统处理方法的流程示意图。
如图2所示,根据本发明的另一个实施例的系统处理方法(在本实施例中,终端为手机,手机上安装有双系统,即安全系统和普通系统,且一个手机可以与多个可穿戴设备进行绑定,同一个可穿戴设备也可与不同手机进行绑定),包括:
步骤202,检测到用户对手机进行操作,例如检测到用户对手机进行 由待机状态进行唤醒状态或开机的操作。
步骤204,检测手机与可穿戴设备的连接状态,手机中的设备通信模块根据可穿戴设备绑定列表对手机当前的通信连接状态进行检测,其中可穿戴设备绑定列表为手机与可穿戴设备之间绑定的相关数据,例如,手机与可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环进行绑定连接和通信。
步骤206,判断手机与可穿戴设备的连接是否正常,当判断结果为是时,即手机与至少一个绑定的可穿戴设备通信连接状态正常(若与终端正常通信的可穿戴设备的数目高于预设数目时,则判定终端与目标可穿戴设备之间的通信正常),进入步骤208,当判断结果为否时,即与手机绑定的多个可穿戴设备全处于断开连接状态,说明手机可能借给别人或者已经丢失,进入步骤210。
步骤208,当手机与可穿戴设备的连接正常,显示进入安全系统的相关操作方式(安全系统的系统切换方式)和安全系统的数据,以供用户可以快速地切换至安全系统中。
步骤210,隐藏进入安全系统的相关操作方式和安全系统的数据,从而隐藏安全系统,避免其他用户发现手机中的安全系统,降低安全系统被破译的风险,从而防止安全系统中的信息遭到非法窃取,进而提升手机的安全性能,另外,同时向与手机绑定的其他可穿戴设备发送震动通知、语音通知和/或灯光通知等提示信号,以提示用户终端可能不在用户的预知范围内。
步骤212,手机根据用户的操作执行相应的指令,例如手机执行由待机状态进行唤醒状态的指令。
图3示出了根据本发明的一个实施例的系统处理装置的结构示意图。
如图3所示,根据本发明的一个实施例的系统处理装置300,包括:判断单元302和处理单元304。判断单元302,用于判断所述终端与目标可穿戴设备之间的通信是否正常;处理单元304,在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,否则,禁止使用所述系统切换方式进入所述目标系统或在使用所述系统切 换方式进入所述目标系统后,控制所述目标系统中的指定应用程序无法正常运行,其中,所述目标可穿戴设备为与所述终端相绑定的可穿戴设备,所述目标系统为所述多个系统中安全等级高于所述当前系统的其他任一系统,且所述系统切换方式为由当前系统切换至所述目标系统的系统切换方式。
在该技术方案中,由于目标可穿戴设备是终端的所有者随身携带的可穿戴设备,因而,通过判断终端与目标可穿戴设备之间的通信是否正常,即可对使用终端的用户的身份进行识别,即如果通信正常,则说明目标可穿戴设备与终端距离较近,进而说明使用终端的用户即为终端的所有者,不是非法用户,因此,可以将系统切换方式对应的功能进行使能,允许使用系统切换方式由当前系统切换至目标系统,并正常使用所述目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可以将系统切换方式进行隐藏或将对应的功能进行禁止或将目标系统的功能进行限制,以使用户无法使用系统切换方式进入目标系统或即便用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性;
其中,该系统切换方式包括软件上的系统切换方式和硬件上的系统切换方式,所有可以实现由当前系统切换至目标系统的系统切换方式均包括在内,例如:该系统切换方式可以为由当前系统切换至目标系统的虚拟切换标识或由当前系统切换至目标系统的物理切换按键;
而当该系统切换方式为软件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式对应的图标以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数 据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或关闭所述系统切换方式对应的切换功能,以禁止终端的使用者使用所述系统切换方式进入所述目标系统等;
而当该系统切换方式为硬件上的系统切换方式时,所述允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,具体包括:在终端的显示界面上,显示所述系统切换方式并打开所述系统切换方式对应的切换功能,以供终端的所有者根据该切换方式由当前系统切换至目标系统,并使终端的所有者可以正常使用该目标系统;所述禁止使用所述系统切换方式进入所述目标系统,具体包括:隐藏所述系统切换方式,或者关闭所述系统切换方式对应的切换功能,以使终端的所有者无法从当前系统切换至目标系统;
而无论当该系统切换方式为软件上的系统切换方式还是硬件上的系统切换方式,所述指定应用程序均包括:与所述目标系统中的数据相关的应用程序,所述在使用所述系统切换方式进入所述目标系统后,所述控制所述目标系统中的指定应用程序无法正常运行,具体包括:在终端使用者使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的通讯录、通话记录、短信、微信、彩信、记事本、语音业务、数据业务等指定应用程序均无法启动,以使所述终端的使用者无法正常使用目标系统,进而使终端使用者无法正常查看或使用权限等级较高的目标系统中的数据或在目标系统中执行一些非法操作,从而充分地确保了权限等级较高的系统的数据的安全性。
在上述技术方案中,优选地,所述判断单元302具体用于:控制所述终端向所述目标可穿戴设备发送通信请求;判断所述终端是否在预设时间内接收到来自所述目标可穿戴设备的通信响应,并在判断结果为是时,判定所述终端与所述目标可穿戴设备之间的通信正常;否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,因为目标可穿戴设备与终端的通信受限于距离,因而,通过判断是否在预设时间内接收到来自目标可穿戴设备的通信响应,可以准确地判断出终端的使用者是否为非法用户,即如果是非法用户正在 使用终端,则必然与携带目标穿戴设备的所有者(即终端的所有者)距离较远,则目标可穿戴设备可能就无法接收到终端的请求信号,因而,终端在预设时间内将无法接收到来自目标可穿戴设备的通信响应,则两者之间的通信异常,反之,则终端在预设时间内能够接收到来自目标可穿戴设备的通信响应,则两者之间的通信正常。当然,两者之间的通信方式可以为有线通信方式或无线通信方式,其中无线通信方式可以为蓝牙、2.4G等多种通信方式。
在上述技术方案中,优选地,所述判断单元302具体还用于:在所述目标可穿戴设备包括多个可穿戴设备时,若与所述终端正常通信的可穿戴设备的数目高于预设数目时,则判定所述终端与所述目标可穿戴设备之间的通信正常,否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
在该技术方案中,通过根据与终端正常通信的可穿戴设备的数目是否高于预设数目来判断终端与目标可穿戴设备之间的通信是否正常,便于提高通信是否正常的判断准确率,防止误判断。
在上述技术方案中,优选地,还包括:发送单元306,在所述目标可穿戴设备与所述终端通信时,若所述目标可穿戴设备与所述终端断开连接,则向所述终端和所述目标可穿戴设备中的其他可穿戴设备发送提示信号。
在该技术方案中,在目标可穿戴设备与终端通信时,若目标可穿戴设备与终端断开连接,则通过向终端和其他可穿戴设备发送提示信号,不仅可以防止用户误操作,防止用户在目标可穿戴设备与终端通信时,无意中拉远了两者之间的距离而导致通信中断,同时,也可以防止终端或可穿戴设备被盗,可以起到及时提示用户目标可穿戴设备与终端所处状态的作用。
在上述技术方案中,优选地,所述目标可穿戴设备包括:可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环中的至少任一项;以及所述处理单元304具体用于:在判断结果为是时显示所述系统切换方式对应的图标,否则,隐藏所述系统切换方式对应的图标或禁止所述系统切换方式对应的系统切换功能。
在该技术方案中,目标可穿戴设备包括但不限于上述几种,还可以包括:可穿戴耳机等;且如果目标可穿戴设备与终端可以正常通信,则说明 使用终端的用户即为终端的所有者,不是非法用户,因此,可将系统切换方式对应的图标显示在当前系统中,以供终端的所有者根据该系统切换方式由当前系统切换至目标系统,反之,如果通信不正常,则说明目标可穿戴设备与终端距离较远,进而说明使用终端的用户不是终端的所有者,是非法用户,因此,可在当前系统中隐藏该系统切换方式对应的图标,进而隐藏该安全等级较高的目标系统,以使终端的使用者不知道安全等级较高的目标系统的存在,进而使终端的使用者没有破译目标系统以窃取目标系统中隐私数据的意愿,从而确保安全等级较高的目标系统、及其内部数据的安全性,或者通过直接关闭所述系统切换方式对应的切换功能来禁止终端的使用者使用所述系统切换方式进入所述目标系统,以确保目标系统的数据的安全性。
图4示出了根据本发明的一个实施例的系统处理装置的原理结构示意图。
如图4所示,根据本发明的一个实施例的系统处理装置300(在本实施例中,终端为手机,手机上安装有双系统,即安全系统和普通系统,且一个手机可以与多个可穿戴设备进行绑定,同一个可穿戴设备也可与不同手机进行绑定),包括:
用户操作模块402:用于检测并执行用户对手机的操作(指定操作),并把检测结果发送给状态判断模块406。
设备通信模块404:用于管理手机与可穿戴设备的通信连接,并且维护一张可穿戴设备绑定列表,例如增加或减少可穿戴设备绑定列表中的可穿戴设备时,设备通信模块404可以对可穿戴设备绑定列表进行更新,当然,在这个可穿戴设备绑定列表中,同一个可穿戴设备可以对应多个手机,同一个手机也可以对应多个可穿戴设备。
状态判断模块406:根据用户操作模块402及设备通信模块404的信号来判断手机与可穿戴设备的连接是否正常,并根据手机与可穿戴设备的连接状态,将具体的操作指令发送给安全管理模块408及设备通信模块404。
安全管理模块408:根据状态判断模块406发送的操作指令执行相应 的安全保护操作,例如,当手机与至少一个绑定的可穿戴设备通信连接状态正常,则安全管理模块408显示进入安全系统的相关操作方式(系统切换方式)和安全系统的数据;当手机与绑定的可穿戴设备都处于断开的状态,则安全管理模块408隐藏进入安全系统的相关操作方式和安全系统的数据,同时向与手机绑定的可穿戴设备发送震动通知、语音通知和/或灯光通知等提示信号,以提示用户终端可能不在用户的预知范围内。
图5示出了根据本发明的一个实施例的终端的结构示意图。
如图5所示,根据本发明的一个实施例的终端500,包括:如上述任一项技术方案所述的系统处理装置300。
在该技术方案中,通过在终端500上设置系统处理装置300,可以对非法用户进行准确判断,使非法用户无法使用系统切换方式进入安全等级较高的目标系统或即便非法用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性。
以上结合附图详细说明了本发明的技术方案,可以对非法用户进行准确判断,使非法用户无法使用系统切换方式进入安全等级较高的目标系统或即便非法用户使用系统切换方式进入目标系统后,也无法正常使用目标系统,从而确保安全等级较高的目标系统、及其内部数据的安全性。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。

Claims (10)

  1. 一种系统处理方法,用于终端,其特征在于,所述终端包括多个系统,所述方法包括:
    判断所述终端与目标可穿戴设备之间的通信是否正常;
    在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,否则,禁止使用所述系统切换方式进入所述目标系统或在使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的指定应用程序无法正常运行,其中,所述目标可穿戴设备为与所述终端相绑定的可穿戴设备,所述目标系统为所述多个系统中安全等级高于所述当前系统的其他任一系统,且所述系统切换方式为由当前系统切换至所述目标系统的系统切换方式。
  2. 根据权利要求1所述的系统处理方法,其特征在于,
    所述判断所述终端与目标可穿戴设备之间的通信是否正常,具体包括:
    控制所述终端向所述目标可穿戴设备发送通信请求;
    判断所述终端是否在预设时间内接收到来自所述目标可穿戴设备的通信响应,并在判断结果为是时,判定所述终端与所述目标可穿戴设备之间的通信正常;否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
  3. 根据权利要求1所述的系统处理方法,其特征在于,
    在所述目标可穿戴设备包括多个可穿戴设备时,所述判断所述终端与目标可穿戴设备之间的通信是否正常,具体还包括:
    若与所述终端正常通信的可穿戴设备的数目高于预设数目时,则判定所述终端与所述目标可穿戴设备之间的通信正常,否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
  4. 根据权利要求1所述的系统处理方法,其特征在于,还包括:
    在所述目标可穿戴设备与所述终端通信时,若所述目标可穿戴设备与所述终端断开连接,则向所述终端和所述目标可穿戴设备中的其他可穿戴设备发送提示信号。
  5. 根据权利要求1至4中任一项所述的系统处理方法,其特征在于,
    所述目标可穿戴设备包括:可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环中的至少任一项;以及
    所述在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统;否则,禁止使用所述系统切换方式进入所述目标系统,具体包括:
    在判断结果为是时,显示所述系统切换方式对应的图标,否则,隐藏所述系统切换方式对应的图标或禁止所述系统切换方式对应的系统切换功能。
  6. 一种系统处理装置,用于终端,其特征在于,所述终端包括多个系统,所述装置包括:
    判断单元,判断所述终端与目标可穿戴设备之间的通信是否正常;
    处理单元,在判断结果为是时,允许使用系统切换方式由当前系统切换至目标系统,以正常使用所述目标系统,否则,禁止使用所述系统切换方式进入所述目标系统或在使用所述系统切换方式进入所述目标系统后,控制所述目标系统中的指定应用程序无法正常运行,其中,所述目标可穿戴设备为与所述终端相绑定的可穿戴设备,所述目标系统为所述多个系统中安全等级高于所述当前系统的其他任一系统,且所述系统切换方式为由当前系统切换至所述目标系统的系统切换方式。
  7. 根据权利要求6所述的系统处理装置,其特征在于,
    所述判断单元具体用于:
    控制所述终端向所述目标可穿戴设备发送通信请求;
    判断所述终端是否在预设时间内接收到来自所述目标可穿戴设备的通信响应,并在判断结果为是时,判定所述终端与所述目标可穿戴设备之间的通信正常;否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
  8. 根据权利要求6所述的系统处理装置,其特征在于,
    所述判断单元具体还用于:在所述目标可穿戴设备包括多个可穿戴设备时,若与所述终端正常通信的可穿戴设备的数目高于预设数目时,则判定所述终端与所述目标可穿戴设备之间的通信正常,否则,判断所述终端与所述目标可穿戴设备之间的通信异常。
  9. 根据权利要求6至8中任一项所述的系统处理装置,其特征在于,
    所述目标可穿戴设备包括:可穿戴眼镜、可穿戴耳环、可穿戴手表、可穿戴手环中的至少任一项;以及
    所述处理单元具体用于:
    在判断结果为是时,显示所述系统切换方式对应的图标,否则,隐藏所述系统切换方式对应的图标或禁止所述系统切换方式对应的系统切换功能。
  10. 一种终端,其特征在于,包括:如权利要求6至8中任一项所述的系统处理装置。
PCT/CN2015/071994 2015-01-16 2015-01-30 系统处理方法、系统处理装置和终端 Ceased WO2016112566A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP15877484.4A EP3246844A4 (en) 2015-01-16 2015-01-30 System processing method, system processing device and terminal
US15/405,310 US20170124355A1 (en) 2015-01-16 2017-01-13 System processing method, system processing device and terminal

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510024075.8 2015-01-16
CN201510024075.8A CN104517071B (zh) 2015-01-16 2015-01-16 系统处理方法、系统处理装置和终端

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US15/405,310 Continuation-In-Part US20170124355A1 (en) 2015-01-16 2017-01-13 System processing method, system processing device and terminal

Publications (1)

Publication Number Publication Date
WO2016112566A1 true WO2016112566A1 (zh) 2016-07-21

Family

ID=52792355

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/071994 Ceased WO2016112566A1 (zh) 2015-01-16 2015-01-30 系统处理方法、系统处理装置和终端

Country Status (4)

Country Link
US (1) US20170124355A1 (zh)
EP (1) EP3246844A4 (zh)
CN (1) CN104517071B (zh)
WO (1) WO2016112566A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107004098B (zh) * 2015-05-28 2020-10-16 宇龙计算机通信科技(深圳)有限公司 一种系统切换方法、装置和终端
CN105812584B (zh) * 2016-05-26 2019-08-02 宇龙计算机通信科技(深圳)有限公司 一种基于可穿戴设备的信息防盗方法、装置及设备
CN106997261A (zh) * 2017-04-10 2017-08-01 四川阵风科技有限公司 应用隐藏方法及装置
WO2019047112A1 (zh) * 2017-09-07 2019-03-14 深圳前海达闼云端智能科技有限公司 一种多系统控制方法、控制装置及移动终端
CN109041270B (zh) * 2018-09-14 2023-08-18 珠海奔图电子有限公司 一种控制终端的网络连接的方法和装置
US11874700B2 (en) * 2019-11-12 2024-01-16 International Business Machines Corporation Wearable secure data device
CN113923637A (zh) * 2020-07-07 2022-01-11 成都鼎桥通信技术有限公司 建立连接的方法及设备
CN113407318B (zh) * 2021-06-04 2023-06-23 Oppo广东移动通信有限公司 操作系统切换方法及装置、计算机可读介质和电子设备
CN115688071B (zh) * 2022-12-29 2023-03-17 深圳市光速时代科技有限公司 一种防止智能手表信息篡改的处理方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103399483A (zh) * 2013-07-31 2013-11-20 东莞宇龙通信科技有限公司 可穿戴设备电源管理的方法和装置
US20140134575A1 (en) * 2012-11-15 2014-05-15 Samsung Electronics Co., Ltd Wearable device to represent braille and control method thereof
CN104091133A (zh) * 2014-04-17 2014-10-08 中兴通讯股份有限公司 一种保护终端安全性的方法、终端及系统
CN104199735A (zh) * 2014-09-26 2014-12-10 酷派软件技术(深圳)有限公司 操作系统的切换方法、切换系统和终端

Family Cites Families (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0315156D0 (en) * 2003-06-28 2003-08-06 Ibm Identification system and method
US20100062743A1 (en) * 2004-08-20 2010-03-11 Telefonaktiebolaget Lm Ericsson Wireless lock
US8863261B2 (en) * 2008-07-04 2014-10-14 Samsung Electronics Co., Ltd. User authentication apparatus, method thereof and computer readable recording medium
US8498618B2 (en) * 2009-06-22 2013-07-30 Mourad Ben Ayed Systems for intelligent authentication based on proximity
US8407783B2 (en) * 2010-06-17 2013-03-26 Mediatek Inc. Computing system providing normal security and high security services
CN102075217B (zh) * 2010-12-22 2014-04-30 华为终端有限公司 蓝牙连接的管理方法及设备
CN102805615A (zh) * 2012-07-26 2012-12-05 翁整 一种基于智能手机应用的生命体征监护报警器
US9111085B1 (en) * 2012-09-21 2015-08-18 Girling Kelly Design Group, LLC Computer-implemented system and method for electronic personal identity verification
CN103873959B (zh) * 2012-12-13 2019-02-05 联想(北京)有限公司 一种控制方法和电子设备
WO2014205767A1 (en) * 2013-06-28 2014-12-31 Verizon Patent And Licensing Inc. Human-computer interaction using wearable device
US8994498B2 (en) * 2013-07-25 2015-03-31 Bionym Inc. Preauthorized wearable biometric device, system and method for use thereof
CN103533545B (zh) * 2013-10-25 2016-06-08 小米科技有限责任公司 一种获取有效通讯帐号的方法、装置及设备
GB2520025B (en) * 2013-11-06 2021-04-14 Arm Ip Ltd Calibrating proximity detection for a wearable processing device
US9826400B2 (en) * 2014-04-04 2017-11-21 Qualcomm Incorporated Method and apparatus that facilitates a wearable identity manager
US20150288687A1 (en) * 2014-04-07 2015-10-08 InvenSense, Incorporated Systems and methods for sensor based authentication in wearable devices
CN204065401U (zh) * 2014-05-28 2014-12-31 李杨 一种腕表
EP3133894B1 (en) * 2014-05-29 2018-07-11 Huawei Technologies Co. Ltd. Method and apparatus for selecting terminal mode
US9349035B1 (en) * 2014-06-13 2016-05-24 Maxim Integrated Products, Inc. Multi-factor authentication sensor for providing improved identification
US9769133B2 (en) * 2014-11-21 2017-09-19 Mcafee, Inc. Protecting user identity and personal information by sharing a secret between personal IoT devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140134575A1 (en) * 2012-11-15 2014-05-15 Samsung Electronics Co., Ltd Wearable device to represent braille and control method thereof
CN103399483A (zh) * 2013-07-31 2013-11-20 东莞宇龙通信科技有限公司 可穿戴设备电源管理的方法和装置
CN104091133A (zh) * 2014-04-17 2014-10-08 中兴通讯股份有限公司 一种保护终端安全性的方法、终端及系统
CN104199735A (zh) * 2014-09-26 2014-12-10 酷派软件技术(深圳)有限公司 操作系统的切换方法、切换系统和终端

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3246844A4 *

Also Published As

Publication number Publication date
CN104517071B (zh) 2017-04-05
US20170124355A1 (en) 2017-05-04
EP3246844A1 (en) 2017-11-22
EP3246844A4 (en) 2018-09-12
CN104517071A (zh) 2015-04-15

Similar Documents

Publication Publication Date Title
WO2016112566A1 (zh) 系统处理方法、系统处理装置和终端
JP5784753B2 (ja) 常時稼働組み込み式盗難反応サブシステム
EP3618347B1 (en) Method and device for inputting verification code
TWI525472B (zh) 總是可用的嵌入式盜竊反應子系統(五)
TWI567583B (zh) 總是可用的嵌入式盜竊反應子系統(六)
US9454678B2 (en) Always-available embedded theft reaction subsystem
TWI506473B (zh) 總是可用的嵌入式盜竊反應子系統(一)
US9520048B2 (en) Always-available embedded theft reaction subsystem
CN106874727B (zh) 双屏终端应用处理方法、装置及一种终端
EP2795512A1 (en) Always-available embedded theft reaction subsystem
EP2795506A1 (en) Always-available embedded theft reaction subsystem
EP2795520A1 (en) Always-available embedded theft reaction subsystem
US20110055606A1 (en) Computer system, integrated chip, super io module and control method of the computer system
WO2015196447A1 (en) Data protection based on user input during device boot-up, user login, and device shut-down states
TW201337635A (zh) 總是可用的嵌入式盜竊反應子系統(四)
WO2013095595A1 (en) Always-available embedded theft reaction subsystem
CN106549934B (zh) 网络设备安全系统
CN108763884B (zh) 权限管理方法、装置、移动终端及存储介质
KR20170121040A (ko) 온라인 결제 방법, 장치, 프로그램 및 기록매체
CN105893826A (zh) 基于指纹信息的消息显示方法及智能终端
CN107154999A (zh) 终端及其基于环境信息的解锁方法、存储装置
US10216944B2 (en) Method for executing access control over electronic device and electronic device capable of executing access control
KR101244867B1 (ko) 제외지역이 설정되는 도난방지 기능을 갖는 휴대 단말기 및 이의 도난방지 방법
CN111866272A (zh) 电子设备的控制方法和装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15877484

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2015877484

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE