Switching method of operating system, terminal and computer storage medium

文档序号:1520546 发布日期:2020-02-11 浏览:2次 中文

阅读说明:本技术 一种操作系统的切换方法、终端和计算机存储介质 (Switching method of operating system, terminal and computer storage medium ) 是由 陈璐 于 2018-07-30 设计创作,主要内容包括:本发明实施例公开了一种操作系统的切换方法,包括:当终端的前台的操作系统从第一操作系统切换至第二操作系统时,通过第二操作系统获取身份认证信息;根据身份认证信息设置鉴权信息,并将鉴权信息保存至与第二操作系统对应的存储器中;其中,鉴权信息用于确定终端的操作系统能否从第一操作系统切换至第二操作系统;当与第二操作系统对应的存储器中存储有鉴权信息时,删除第一操作系统中的可视化控件;其中,可视化控件用于控制终端的前台的操作系统从第一操作系统切换至第二操作系统。本发明实施例同时还公开了一种终端及计算机存储介质。(The embodiment of the invention discloses a switching method of an operating system, which comprises the following steps: when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring identity authentication information through the second operating system; setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system; deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operation system of the foreground of the terminal to be switched from the first operation system to the second operation system. The embodiment of the invention also discloses a terminal and a computer storage medium.)

1. A method for switching an operating system is applied to a terminal comprising a first operating system and a second operating system, and comprises the following steps:

when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring identity authentication information through the second operating system;

setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;

deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operating system of the foreground of the terminal to be switched from the first operating system to the second operating system.

2. The method according to claim 1, wherein before the operating system of the foreground of the terminal is switched from the first operating system to the second operating system and the identity authentication information is acquired by the second operating system, the method further comprises:

when the terminal is in an initialization state, the first operating system is operated in the foreground of the terminal, and a first switching request generated by touching the visual control is obtained;

and responding to the first switching request, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.

3. The method according to claim 1, wherein the obtaining, by the second operating system, the identity authentication information when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system comprises:

when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, receiving a setting instruction through the second operating system;

and responding to the setting instruction, and acquiring identity authentication information through the second operating system.

4. The method of claim 1, wherein after deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system, the method further comprises:

when the first operating system runs on the foreground of the terminal, the information to be verified is obtained through the second operating system;

determining whether the information to be verified is matched with the authentication information through the second operating system;

when the information to be verified is matched with the authentication information, generating a second switching request through the second operating system;

and responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.

5. The method of claim 4, wherein the authentication information includes a preset text, and when the first operating system is run in the foreground of the terminal, the obtaining of the information to be verified through the second operating system includes:

when the first operating system runs on the foreground of the terminal, voice information is collected through the second operating system;

correspondingly, the determining, by the second operating system, whether the information to be verified matches the authentication information includes:

analyzing the voice information through the second operating system, and acquiring a keyword in an analysis result;

determining whether the keyword is the preset character or not through the second operating system;

and when the keyword is the preset character, determining that the information to be verified is matched with the authentication information through the second operating system.

6. The method according to claim 4, wherein the authentication information includes preset biometric information, and the obtaining of the information to be verified through the second operating system when the first operating system is run in the foreground of the terminal includes:

when the first operating system runs on the foreground of the terminal, acquiring biological characteristic information through the second operating system;

correspondingly, the determining, by the second operating system, whether the information to be verified matches the authentication information includes:

determining whether the biological characteristic information conforms to the preset biological characteristic information through the second operating system;

and when the biological characteristic information accords with the biological characteristic information, determining that the information to be verified is matched with the authentication information through the second operating system.

7. A terminal, characterized in that the terminal comprises: a processor, a memory, and a communication bus;

the communication bus is used for realizing communication connection between the processor and the memory;

the processor is used for executing a switching program of an operating system in the memory to realize the following steps:

when an operating system of a foreground of the terminal is switched from a first operating system to a second operating system, acquiring identity authentication information through the second operating system;

setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;

deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operating system of the foreground of the terminal to be switched from the first operating system to the second operating system.

8. The terminal of claim 7, wherein the processor performs the step of obtaining the identity authentication information through the second operating system when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, and further implements the following steps:

when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, receiving a setting instruction through the second operating system;

and responding to the setting instruction, and acquiring identity authentication information through the second operating system.

9. The terminal of claim 7, wherein the processor further implements the steps of:

when the first operating system runs on the foreground of the terminal, the information to be verified is obtained through the second operating system;

determining whether the information to be verified is matched with the authentication information through the second operating system;

when the information to be verified is matched with the authentication information, generating a second switching request through the second operating system;

and responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.

10. A computer storage medium, characterized in that the computer storage medium stores one or more programs executable by one or more processors to implement the steps of the switching method of an operating system according to any one of claims 1 to 6.

Technical Field

The present invention relates to, but not limited to, the field of computer technologies, and in particular, to a method for switching an operating system, a terminal, and a computer storage medium.

Background

At present, the switching systems of the dual-system mobile phones in the market are all explicitly switched, for example, the first operating system is switched to the second operating system through a first switching button in the first operating system, and the second operating system is switched to the first operating system through a second switching button in the second operating system. However, users of mobile phones using dual operating systems mostly use one of the operating systems as a hidden operating system, and do not want to be snooped by others.

However, in the current dual-operating-system mobile phone, the user can only switch between the operating systems by displaying the switch button while using the mobile phone.

Disclosure of Invention

In view of this, embodiments of the present invention are expected to provide a switching method of operating systems, a terminal and a computer storage medium, so as to solve the problem in the related art that switching between operating systems can only be performed by displaying a switching button, implement hidden switching between dual operating systems of a terminal, ensure the security of a hidden operating system, and improve the intelligence of a terminal.

In order to achieve the purpose, the technical scheme of the invention is realized as follows:

the embodiment of the invention provides a method for adjusting output parameters of multimedia information, which is applied to a terminal comprising a first operating system and a second operating system, and comprises the following steps:

when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring identity authentication information through the second operating system;

setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;

deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operation system of the foreground of the terminal to be switched from the first operation system to the second operation system.

Optionally, when the authentication information is stored in the memory corresponding to the second operating system, after deleting the visual control in the first operating system, the method further includes:

when a foreground of the terminal runs a first operating system, acquiring information to be verified through a second operating system;

determining whether the information to be verified is matched with the authentication information through a second operating system;

when the information to be verified is matched with the authentication information, a second switching request is generated through a second operating system;

and responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.

An embodiment of the present invention provides a terminal, including: a processor, a memory, and a communication bus;

the communication bus is used for realizing communication connection between the processor and the memory;

the processor is used for executing the switching program of the operating system in the memory to realize the following steps:

when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, acquiring identity authentication information through the second operating system;

setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system;

deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the operation system of the foreground of the terminal to be switched from the first operation system to the second operation system.

Embodiments of the present invention provide a computer storage medium, which stores one or more programs, where the one or more programs are executable by one or more processors to implement the steps of the switching method of the operating system as described above.

According to the switching method of the operating systems, the terminal and the computer storage medium provided by the embodiment of the invention, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, the second operating system is used for acquiring the identity authentication information; setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system; the authentication information is used for determining whether the operating system of the terminal can be switched from the first operating system to the second operating system; deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system; the visual control is used for controlling the switching of an operating system of a foreground of the terminal from a first operating system to a second operating system; that is to say, in the embodiment of the present invention, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, the terminal can set the authentication information through the second operating system to replace the visual control in the first operating system, and delete the visual control after the authentication information is successfully set, so that when the operating system of the foreground of the terminal is switched from the second operating system to the first operating system, the visual control is no longer presented in the first operating system, and it is ensured that the terminal does not display any information related to system switching when running the first operating system, so that the terminal only appears to have one operating system when running the first operating system, the problem of switching between operating systems only by displaying a switch button in the related art is solved, and the hidden switching between the dual operating systems of the terminal is realized, the security of a hidden operating system is ensured, and the intelligence of the terminal is improved.

Drawings

Fig. 1 is a flowchart illustrating a method for switching an operating system according to an embodiment of the present invention;

fig. 2 is a schematic diagram of a terminal according to an embodiment of the present invention;

fig. 3 is a flowchart illustrating another switching method for an operating system according to an embodiment of the present invention;

fig. 4 is a flowchart illustrating a switching method of an operating system according to another embodiment of the present invention;

fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention.

Detailed Description

The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.

It should be appreciated that reference throughout this specification to "an embodiment of the present invention" or "an embodiment described previously" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrase "in an embodiment of the present invention" or "in the foregoing embodiments" in various places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In various embodiments of the present invention, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation on the implementation process of the embodiments of the present invention. The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.

The embodiment of the invention provides a switching method of an operating system, which can be applied to a terminal. In an embodiment of the present invention, the first operating system may be referred to as a public operating system, and the second operating system may be referred to as a hidden operating system. Further, in the running process of the terminal, the operating system running in the foreground of the terminal can be switched between the first operating system and the second operating system.

In the embodiment of the invention, the core idea of the invention is to use a hidden switching mode to realize switching between two operating systems in the terminal, and compared with the method of switching two operating systems in the terminal through a visual control such as a visual button in the related art, the method is more secure and hidden.

Based on the foregoing embodiments, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal, and as shown in fig. 1, the method includes the following steps:

step 101, when an operating system of a foreground of the terminal is switched from a first operating system to a second operating system, acquiring identity authentication information through the second operating system.

Here, the identity authentication information includes at least one of voice information, text information, and biometric information; of course, the identity authentication information may also include other information, which is not specifically limited in this embodiment of the present invention. In the embodiment of the present invention, for example, during initialization of the terminal and after the terminal is powered off and restarted each time, the foreground of the terminal is loaded with the first operating system. The terminal detects that the operating system of the terminal is switched from the first operating system to the second operating system, and the terminal can acquire the identity authentication information through the second operating system.

Illustratively, as shown in fig. 2, the terminal 20 of the present invention includes a first operating system 21 and a second operating system 22, wherein the first operating system includes a first interface 211 and a second interface 212; the second operating system comprises an information acquisition module 221, an information processing module 222 and a setting module 223; further, the first interface 211 is responsible for notifying the information acquisition module 221 to acquire identity authentication information, where the identity authentication information is used to set authentication information; the information acquisition module 221, configured to process the collected information to be verified, compare the information to be verified with the set authentication information, if the information to be verified is matched with the set authentication information, the authentication is passed, and send a switching request to the information processing module 222; a second interface 212, such as a visual control, for sending the switching request to the information processing module 222; an information processing module 222, configured to respond to the switching request and perform switching between the two operating systems; the setting module 223 is responsible for setting the hidden switching mode and instructing the first operating system 21 to delete the second interface 212 through the cross-system channel. It should be noted that, the first interface 211 is different from the second interface 212, and the first interface 211 may be a preset program and is a non-visual interface (in fig. 2, a dashed line box indicates that the first interface 211 is a non-visual interface), and when the terminal 20 determines that the acquired information conforms to preset information, the terminal can call the first interface 211 to notify the information acquisition module 221; the second interface 212 is used to control the switching from the first operating system 21 to the second operating system 22, and is a visual interface (the black bold border in fig. 2 indicates that the first interface 211 is a visual interface), such as a visual touch button.

In this embodiment of the present invention, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system in step 101, before the obtaining the identity authentication information by the second operating system, the method may further include:

first, when the terminal 20 is in an initialized state, a first operating system 21 runs in a foreground of the terminal 20 to obtain a first switching request generated by touching a visual control.

Illustratively, when the terminal 20 is initialized, the terminal 20 loads and runs the first operating system 21 in the foreground of the terminal 20; then, when the user touches the second interface 212, such as a visual control, in the first operating system 21, the terminal 20 generates a first switching request, and sends the first switching request to the information processing module 222 in the second operating system 22 through the second interface 212 in the first operating system 21.

Second, in response to the first switching request, the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22.

Here, the information processing module 222 switches the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22 in response to the first switching request; at this time, the foreground of the terminal 20 runs the second operating system 22, and the terminal 20 may obtain the authentication information for setting the authentication information through the second operating system 22.

And 102, setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system.

Wherein the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22.

Here, the terminal 20 sets the authentication information according to the authentication information after acquiring the authentication information, and saves the authentication information into a memory corresponding to the second operating system 22. That is, the setting and storage of the authentication information are all completed by the terminal through the second operating system 22, and since the second operating system 22 and the first operating system 21 are two completely independent systems, the information processed by the second operating system 22 is stored in the memory corresponding to the second operating system 22, and the first operating system 21 cannot call the memory corresponding to the first operation. In practical application, even if an illegal user breaks through the first operating system 21, the second operating system 22 is not damaged, and the information in the memory corresponding to the second operating system 22 cannot be acquired, so that the security of the hidden operating system is ensured.

And 103, deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system.

The visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.

Here, after the terminal 20 stores the authentication information in the memory corresponding to the second operating system 22, the terminal may instruct the first operating system 21 to delete the visual control in the first operating system 21 through the cross-system channel, such as the second interface 212 described above; then, after deleting the second interface 212 of the public operating system, i.e. the system switching interface in the first operating system 21, the first operating system 21 has no switching interface, and at this time, the first operating system 21, i.e. the public system, appears to be a single-system mobile phone.

In the method for switching operating systems provided in the embodiment of the present invention, when the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22, the second operating system 22 obtains the identity authentication information; setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system 21; wherein, the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22; deleting the visual control in the first operating system 21 when the authentication information is stored in the memory corresponding to the second operating system 22; the visual control is used for controlling the operating system of the foreground of the terminal 20 to be switched from the first operating system 21 to the second operating system 22; that is to say, in the embodiment of the present invention, when the operating system in the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22, the terminal 20 can set the authentication information through the second operating system 22 to replace the visual control in the first operating system 21, and delete the visual control after the authentication information is successfully set, so that when the operating system in the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, the visual control is no longer presented in the first operating system 21, it is ensured that no information related to system switching is displayed when the terminal 20 runs the first operating system 21, so that the terminal 20 only appears to have one operating system when running the first operating system 21, the problem of switching between operating systems only through displaying a switching button in the related art is solved, and the hidden switching between the dual operating systems of the terminal 20 is realized, the security of the hidden operating system is ensured, and the intelligence of the terminal 20 is improved. .

Based on the foregoing embodiment, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal 20 (described with reference to the schematic diagram shown in fig. 2), and as shown in fig. 3, the method includes the following steps:

step 301, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, receiving a setting instruction through the second operating system.

Here, the preset instruction may be generated by completing a preset operation, for example, when the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22, the foreground of the terminal 20 is run with the second operating system 22, and the second operating system 22 includes a setting button for turning on or off a hidden switching mode in the terminal 20. When the user touches the setting button in the second operating system 22, the setting of the hidden switching mode in the terminal 20 is turned on, so that the terminal can be triggered to generate the setting instruction through the second operating system 22.

And step 302, responding to the setting instruction, and acquiring the identity authentication information through the second operating system.

Here, the terminal 20, after generating the setting instruction, acquires, in response to the setting instruction, authentication information for setting authentication information by the second operating system. Here, the obtaining of the authentication information by the second operating system 22 may be receiving the authentication information input by the user by calling the information collecting module 221 by the second operating system 22.

And step 303, setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system.

Wherein the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22.

And step 304, deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system.

The visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.

In this embodiment of the present invention, in step 304, after the authentication information is stored in the memory corresponding to the second operating system and the visual control in the first operating system is deleted, if the first operating system 21 is running in the foreground of the terminal 20, the terminal 20 may further obtain a second switching request generated by the second operating system, and respond to the second switching request through the second operating system to switch the operating system in the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.

In practical applications, the switching of the operating system of the foreground of the terminal 20 from the second operating system 22 to the first operating system 21 may be implemented in a display switching manner; illustratively, the second operating system 22 presents a visual control for controlling the operating system of the foreground of the terminal 20 to switch from the second operating system 22 to the first operating system 21, and the terminal 20 obtains the touch operation by touching the visual control in the second operating system 22 by the user and generates a second switch request through the second operating system 22.

Here, after the terminal 20 acquires the second switching request generated by the second operating system 22, the operating system of the foreground of the terminal 20 is switched from the first operating system 21 to the second operating system 22 in response to the second switching request through the second operating system 22. That is, after the terminal 20 deletes the visual control in the first operating system 21, the second switching request for switching the operating system in the foreground of the terminal 20 from the first operating system 21 to the second operating system can only be generated by the terminal 20 through the second operating system 22 of the terminal, and even if the visual control is installed again to the first operating system 21, the second operating system 22 in the terminal 20 does not receive the external second switching request, and even if the external second switching request is not responded, only the second switching request generated by the second operating system 22 can be responded, so as to ensure the security of the hidden operating system.

It should be noted that, for the descriptions of the same steps and the same contents in this embodiment as those in other embodiments, reference may be made to the descriptions in other embodiments, which are not described herein again.

Based on the foregoing embodiment, an embodiment of the present invention provides a method for switching an operating system, which is applied to a terminal 20 (described with reference to the schematic diagram shown in fig. 2), and as shown in fig. 4, the method includes the following steps:

step 401, when the operating system of the foreground of the terminal is switched from the first operating system to the second operating system, obtaining the identity authentication information through the second operating system.

And 402, setting authentication information according to the identity authentication information, and storing the authentication information into a memory corresponding to the second operating system.

Wherein the authentication information is used to determine whether the operating system of the terminal 20 can be switched from the first operating system 21 to the second operating system 22.

And step 403, deleting the visual control in the first operating system when the authentication information is stored in the memory corresponding to the second operating system.

The visual control is used for controlling the switching of the operating system of the foreground of the terminal 20 from the first operating system 21 to the second operating system 22.

And 404, when the foreground of the terminal runs the first operating system, acquiring the information to be verified through the second operating system.

Here, the information to be authenticated includes at least one of voice information, text information, and biometric information; of course, the information to be verified may also include other information, which is not specifically limited in this embodiment of the present invention. When the foreground of the terminal 20 runs the first operating system 21, the terminal 20 may obtain the information to be verified through the second operating system 22 running in the background of the terminal.

Illustratively, referring to fig. 2, when the operating system of the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, assuming that the authentication information includes a preset fingerprint, when the foreground of the terminal 20 runs the first operating system 21, and when the user touches the fingerprint identification key of the terminal 20, the first interface 211 is triggered to start working, and the information collecting module 221 is notified to collect the fingerprint as the information to be verified.

In this embodiment of the present invention, the authentication information may be a preset text, and the step 404, when the foreground of the terminal runs the first operating system, acquiring the information to be verified through the second operating system may include: when the first operating system 21 is operated in the foreground of the terminal 20, the voice information is collected through the second operating system 22.

Illustratively, referring to fig. 2, when the operating system of the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, assuming that the authentication information includes a password, such as a preset keyword, when the foreground of the terminal 20 runs the first operating system 21, and the user inputs voice to the terminal 20, the first interface 211 starts to work, and notifies the information collecting module 221 to collect the voice as the information to be verified.

In another embodiment of the present invention, the authenticating information may be preset biometric information, and the step 404, when the foreground of the terminal runs the first operating system, acquiring the information to be verified through the second operating system may include: when the first operating system 21 is operated in the foreground of the terminal 20, the biometric information is collected through the second operating system.

Step 405, determining whether the information to be verified is matched with the authentication information through the second operating system.

In this embodiment of the present invention, the authentication information includes preset words, and the step 405 of determining whether the information to be verified and the authentication information are matched by the second operating system may include:

and A1, analyzing the voice information through the second operating system 22, and acquiring the keywords in the analysis result.

Here, the terminal 20 performs analysis processing on the acquired voice information through the second operating system 22, and acquires a keyword in an analysis result.

And A2, determining whether the keyword comprises preset characters through the second operating system 22.

Here, the terminal 20 compares the keyword with the preset text through the second operating system 22 to determine whether the keyword includes the preset text.

And A3, when the keyword comprises the preset characters, determining that the information to be verified conforms to the authentication information through the second operating system 22.

Here, when the terminal 20 determines that the keyword includes the preset character, it determines that the collected information to be verified conforms to the authentication information, and at this time, the authentication is passed.

In another embodiment of the present invention, the authentication information includes preset biometric information, and the step 405 of determining whether the information to be verified and the authentication information match through the second operating system may include:

b1, determining whether the biological characteristic information accords with the preset biological characteristic information through the second operating system 22.

Here, the biometric information may include not only the above-described fingerprint but also an iris, a human face, and the like.

For example, the preset biometric information may be a fingerprint of a thumb of a right hand of the user, and when the operating system of the foreground of the terminal 20 is switched from the second operating system 22 to the first operating system 21, the terminal 20 obtains information to be verified, such as a current fingerprint collected by the fingerprint identification module, through the second operating system 22; then, the terminal 20 compares the current fingerprint with the preset fingerprint progressing.

And B2, when the biological characteristic information accords with the biological characteristic information, determining that the information to be verified accords with the authentication information through the second operating system 22.

Here, when the current fingerprint is the same as the preset fingerprint, such as the fingerprint of the thumb of the right hand of the user, the terminal 20 determines that the biometric information matches the biometric information, and further determines that the information to be verified matches the authentication information through the second operating system 22.

And 406, generating a second switching request through the second operating system when the information to be verified is matched with the authentication information.

Step 407, responding to the second switching request through the second operating system, and switching the operating system of the foreground of the terminal from the first operating system to the second operating system.

In the embodiment of the present invention, after the terminal 20 deletes the visual control in the first operating system 21, the second switching request for switching the operating system in the foreground of the terminal 20 from the first operating system 21 to the second operating system 22 can only be generated by the terminal 20 through its own second operating system 22, and even if the visual control is installed again to the first operating system 21, the second operating system 22 in the terminal 20 will not receive the external second switching request, and will not respond to the external second switching request, and can only respond to the second switching request generated by the second operating system 22, so as to ensure the security of the hidden operating system.

It should be noted that, for the descriptions of the same steps and the same contents in this embodiment as those in other embodiments, reference may be made to the descriptions in other embodiments, which are not described herein again.

Based on the foregoing embodiment, an embodiment of the present invention provides a terminal 50, where the terminal 50 corresponds to the terminal 20 in fig. 2, and the terminal 50 may be applied to the method for switching an operating system provided in the embodiments corresponding to fig. 1, 3, and 4, and as shown in fig. 5, the terminal 50 may include: a processor 51, a memory 52, and a communication bus 53, wherein:

when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22, acquiring the identity authentication information through the second operating system 22; the terminal 50 includes a first operating system 21 and a second operating system 22;

setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system 22; wherein, the authentication information is used to determine whether the operating system of the terminal 50 can be switched from the first operating system 21 to the second operating system 22;

deleting the visual control in the first operating system 21 when the authentication information is stored in the memory corresponding to the second operating system 22; wherein the visual control is used for controlling the switching of the operating system of the foreground of the terminal 50 from the first operating system 21 to the second operating system 22.

In other embodiments of the present invention, the processor 51 is configured to execute the following steps before the step of obtaining the identity authentication information through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 in the memory 52:

when the terminal 50 is in an initialization state, a first operating system 21 runs in a foreground of the terminal 50, and a first switching request generated by touching a visual control is acquired;

in response to the first switching request, the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22.

In other embodiments of the present invention, the processor 51 is configured to execute the step of obtaining the identity authentication information through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 in the memory 52, and further implement the following steps:

receiving a setting instruction through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22;

in response to the setting instruction, the authentication information is acquired by the second operating system 22.

In other embodiments of the present invention, the processor 51 is configured to execute the following steps after the authentication information is stored in the memory corresponding to the second operating system 22 in the memory 52 and the visual control in the first operating system 21 is deleted:

when the foreground of the terminal 50 runs the first operating system 21, acquiring a second switching request generated by the second operating system 22;

the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 by the second operating system 22 in response to the second switching request.

In other embodiments of the present invention, when the processor 51 is configured to execute the step of obtaining the second switching request generated by the second operating system 22 when the first operating system 21 is run in the foreground of the terminal 50 in the memory 52, the following steps may also be implemented:

when the foreground of the terminal 50 runs the first operating system 21, the information to be verified is obtained through the second operating system 22;

determining whether the information to be verified is matched with the authentication information through the second operating system 22;

when the information to be verified matches the authentication information, a second switch request is generated by the second operating system 22.

In other embodiments of the present invention, the authentication information includes preset words, and the processor 51 is configured to execute the following steps when the step of obtaining the information to be verified through the second operating system 22 is executed in the memory 52 when the first operating system 21 is run in the foreground of the terminal 50:

when the foreground of the terminal 50 runs the first operating system 21, acquiring voice information through the second operating system 22;

correspondingly, determining whether the information to be verified is matched with the authentication information through the second operating system 22 includes:

analyzing the voice information through the second operating system 22, and acquiring a keyword in an analysis result;

determining whether the keyword includes a preset word through the second operating system 22;

when the keyword includes the preset character, it is determined by the second operating system 22 that the information to be verified matches the authentication information.

In other embodiments of the present invention, the authentication information includes the preset biometric information processor 51 for executing the step of acquiring the information to be verified through the second operating system 22 when the first operating system 21 is run in the foreground of the terminal 50 in the memory 52, and the following steps can be further implemented:

when the foreground of the terminal 50 runs the first operating system 21, the biological characteristic information is collected through the second operating system 22;

correspondingly, determining whether the information to be verified is matched with the authentication information through the second operating system 22 includes:

determining whether the biometric information conforms to preset biometric information through the second operating system 22;

when the biometric information matches the biometric information, it is determined by the second operating system 22 that the information to be verified matches the authentication information.

It should be noted that, for a specific implementation process of the step executed by the processor in this embodiment, reference may be made to the implementation process in the switching method of the operating system provided in the embodiments corresponding to fig. 1, 2, and 4, and details are not described here again.

Based on the foregoing embodiments, embodiments of the invention provide a computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the steps of:

when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22, acquiring the identity authentication information through the second operating system 22;

setting authentication information according to the identity authentication information, and storing the authentication information in a memory corresponding to the second operating system 22; wherein, the authentication information is used to determine whether the operating system of the terminal 50 can be switched from the first operating system 21 to the second operating system 22;

deleting the visual control in the first operating system 21 when the authentication information is stored in the memory corresponding to the second operating system 22; wherein the visual control is used for controlling the switching of the operating system of the foreground of the terminal 50 from the first operating system 21 to the second operating system 22.

In other embodiments of the invention, the one or more programs are executable by the one or more processors and are further for performing the steps of:

when the terminal 50 is in an initialization state, a first operating system 21 runs in a foreground of the terminal 50, and a first switching request generated by touching a visual control is acquired;

in response to the first switching request, the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22.

In other embodiments of the present invention, the one or more programs may be executed by the one or more processors when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22, and when the identity authentication information is acquired by the second operating system 22, the following steps may be further implemented:

receiving a setting instruction through the second operating system 22 when the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22;

in response to the setting instruction, the authentication information is acquired by the second operating system 22.

In other embodiments of the invention, the one or more programs are executable by the one or more processors and are further for performing the steps of:

when the foreground of the terminal 50 runs the first operating system 21, acquiring a second switching request generated by the second operating system 22;

the operating system of the foreground of the terminal 50 is switched from the first operating system 21 to the second operating system 22 by the second operating system 22 in response to the second switching request.

In other embodiments of the present invention, when the one or more programs are executed by the one or more processors to obtain the second switching request generated by the second operating system 22 when the first operating system 21 is run in the foreground of the terminal 50, the following steps may also be implemented:

when the foreground of the terminal 50 runs the first operating system 21, the information to be verified is obtained through the second operating system 22;

determining whether the information to be verified is matched with the authentication information through the second operating system 22;

when the information to be verified matches the authentication information, a second switch request is generated by the second operating system 22.

In other embodiments of the present invention, the authentication information includes preset words, and the one or more programs may be executed by the one or more processors, when the foreground of the terminal 50 runs the first operating system 21, and obtains the information to be verified through the second operating system 22, the following steps may also be implemented:

when the foreground of the terminal 50 runs the first operating system 21, acquiring voice information through the second operating system 22;

correspondingly, determining whether the information to be verified is matched with the authentication information through the second operating system 22 includes:

analyzing the voice information through the second operating system 22, and acquiring a keyword in an analysis result;

determining whether the keyword includes a preset word through the second operating system 22;

when the keyword includes the preset character, it is determined by the second operating system 22 that the information to be verified matches the authentication information.

In other embodiments of the present invention, the authentication information includes preset biometric information, and the one or more programs can be executed by the one or more processors when the foreground of the terminal 50 runs the first operating system 21 and obtains the information to be verified through the second operating system 22, the following steps can also be implemented:

when the foreground of the terminal 50 runs the first operating system 21, the biological characteristic information is collected through the second operating system 22;

correspondingly, determining whether the information to be verified is matched with the authentication information through the second operating system 22 includes:

determining whether the biometric information conforms to preset biometric information through the second operating system 22;

when the biometric information matches the biometric information, it is determined by the second operating system 22 that the information to be verified matches the authentication information.

It should be noted that, for a specific implementation process of the step executed by the processor in this embodiment, reference may be made to the implementation process in the switching method of the operating system provided in the embodiments corresponding to fig. 1, 2, and 4, and details are not described here again.

The computer storage medium may be a Memory such as a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a magnetic Random Access Memory (FRAM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); and may be various electronic devices such as mobile phones, computers, tablet devices, personal digital assistants, etc., including one or any combination of the above-mentioned memories.

It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, recitation of an element by the phrase "comprising an … …" does not exclude the presence of other like elements in the process, method, article, or apparatus that comprises the element.

The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.

Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method described in the embodiments of the present invention.

The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

18页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:主动式触控笔的检测方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!