[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110222492B - System switching method and device, computer equipment and computer readable storage medium - Google Patents

System switching method and device, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN110222492B
CN110222492B CN201910369129.2A CN201910369129A CN110222492B CN 110222492 B CN110222492 B CN 110222492B CN 201910369129 A CN201910369129 A CN 201910369129A CN 110222492 B CN110222492 B CN 110222492B
Authority
CN
China
Prior art keywords
target application
verification information
account
application icon
switching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201910369129.2A
Other languages
Chinese (zh)
Other versions
CN110222492A (en
Inventor
陈奇
汤凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huimao Technology Co ltd
Original Assignee
Shenzhen Huimao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huimao Technology Co ltd filed Critical Shenzhen Huimao Technology Co ltd
Priority to CN201910369129.2A priority Critical patent/CN110222492B/en
Publication of CN110222492A publication Critical patent/CN110222492A/en
Application granted granted Critical
Publication of CN110222492B publication Critical patent/CN110222492B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the invention discloses a system switching method, a device, computer equipment and a computer readable storage medium, comprising the following steps: when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained; the first system verifies the authority verification information; and if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon. By the method, the system switching efficiency and the safety can be improved to a certain extent.

Description

System switching method and device, computer equipment and computer readable storage medium
Technical Field
The present invention relates to the field of intelligent terminal technologies, and in particular, to a system switching method and apparatus, a computer device, and a computer-readable storage medium.
Background
The intelligent conference tablet dual system is to install two operating systems in an intelligent conference tablet, for example, the intelligent conference tablet installs an Android system and a Windows system at the same time.
The intelligent conference tablet displays the functional interface after being started, the functional interface displays selectable systems, and a user enters the system after selecting one system so as to use the functions provided by the APPs of the system. However, when the user needs to use the APP of another system, the user needs to go back to the function interface to select another system again, and then, after entering another system, the user needs to select the APP to be used, which causes system switching inefficiency and brings great inconvenience to the user. Meanwhile, as the intelligent conference tablet is usually applied to an enterprise, a large number of enterprise secrets are involved, and if the system is switched and APP is used at will, the secrets may be leaked, so that the system security is low.
Therefore, the existing intelligent conference tablet has the problems of low switching efficiency and low safety.
Disclosure of Invention
In view of the above, it is necessary to provide a system switching method, an apparatus, a computer device, and a computer readable storage medium with high efficiency and high security.
A method of system switching, the method comprising:
when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained;
the first system verifies the authority verification information;
and if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
In one embodiment, the permission verification information is fingerprint information, and the preset operation is an operation of pressing the target application icon with a finger.
In one embodiment, the authority verification information is a face image or iris information; before the acquiring the right verification information, the method further comprises: and starting the camera to shoot the face image or the iris image through the camera.
In one embodiment, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon includes: if the authority verification information passes verification, an application starting instruction is sent to the second system through a first serial communication interface of the first system, wherein the application starting instruction comprises a target application identifier; the second system receives the application starting instruction through a second serial communication interface; analyzing the application starting instruction to obtain a target application identifier; and running the target application corresponding to the target application identifier according to the target application identifier.
In one embodiment, before the acquiring the permission verification information when the preset operation of the target application icon for the second system is monitored under the first system, the method further includes: and when the preset operation aiming at the system switching button is monitored under the first system, displaying an application icon of a preset application of the second system.
In one embodiment, before the first system verifies the authority verification information, the method further includes: the first system determines the security level of the target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is a first level, the first system performs verification on the permission verification information; if the security level of the target application corresponding to the target application icon is a second level, displaying a first account password input box to prompt a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and if the account and the password input through the first account password input box pass verification, entering a step of verifying the permission verification information by the first system.
In one embodiment, the method further comprises: and if the authority verification information fails to verify, displaying a second account password input box to prompt the user to input an account and a password for logging in the dual system.
A system switching apparatus, comprising:
the system comprises an acquisition module, a display module and a control module, wherein the acquisition module is used for acquiring authority verification information when monitoring the preset operation of a target application icon aiming at a second system under a first system;
the verification module is used for verifying the authority verification information by the first system;
and the operation module is used for switching the first system to the second system and operating the target application corresponding to the target application icon if the permission verification information passes verification.
In one embodiment, the permission verification information is fingerprint information, and the preset operation is an operation of pressing the target application icon with a finger.
In one embodiment, the authority verification information is a face image or iris information; the device further comprises: and the starting module is used for starting the camera so as to shoot the face image or the iris image through the camera.
In one embodiment, the operation module includes: the instruction sending module is used for sending an application starting instruction to the second system through a first serial communication interface of the first system if the authority verification information passes verification, wherein the application starting instruction comprises a target application identifier; the instruction receiving module is used for receiving the application starting instruction by the second system through a second serial communication interface; the analysis module is used for analyzing the application starting instruction to obtain a target application identifier; and the application running module is used for running the target application corresponding to the target application identifier according to the target application identifier.
In one embodiment, the apparatus further comprises: and the button operation monitoring module is used for displaying an application icon of a preset application of the second system when the preset operation aiming at the system switching button is monitored under the first system.
In one embodiment, the apparatus further comprises: a first level module, configured to determine, by the first system, a security level of a target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is a first level, enter a step in which the first system verifies the permission verification information; and the second grade module is used for displaying the first account password input box if the security grade of the target application corresponding to the target application icon is a second grade, prompting a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and entering the first system to verify the authority verification information if the account and the password input through the first account password input box are verified.
In one embodiment, the apparatus further comprises: and the operation failure module is used for displaying a second account password input box if the authority verification information fails to verify so as to prompt the user to input an account and a password for logging in the dual system.
A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of:
when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained;
the first system verifies the authority verification information;
and if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
A computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to perform the steps of:
when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained;
the first system verifies the authority verification information;
and if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
The embodiment of the invention has the following beneficial effects:
the invention provides a system switching method, a system switching device, computer equipment and a computer readable storage medium, wherein when the preset operation of a target application icon for a second system is monitored under a first system, authority verification information is acquired; then the first system verifies the authority verification information; and finally, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon. Therefore, through the mode, the user can directly execute one preset operation on the target application icon of the second system at the first system interface without quitting the function interface from the first system, the system switching can be realized, the target application selected by the user is operated, the system switching efficiency is greatly improved, meanwhile, the obtained authority verification information can be verified before the system switching is carried out, the system switching is carried out only after the verification is passed, the system using by the user without authority is effectively prevented, and the safety is increased to a certain extent.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1 is a schematic flow chart illustrating an implementation of a system switching method according to an embodiment;
FIG. 2 is a flow chart illustrating an implementation of a system switching method according to an embodiment;
FIG. 3 is a flow diagram illustrating an implementation of step 106 in one embodiment;
FIG. 4 is a diagram of a first account password entry box in one embodiment;
FIG. 5 is a flow chart illustrating an implementation of a system switching method according to an embodiment;
FIG. 6 is a diagram illustrating physical and virtual buttons in one embodiment;
FIG. 7 is a block diagram showing the structure of a system switching device according to an embodiment;
FIG. 8 is a block diagram of a computer device in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, in an embodiment, a system switching method is provided, and an execution subject of the system switching method according to the embodiment of the present invention is a device capable of implementing the system switching method according to the embodiment of the present invention, where the device may include, but is not limited to, a terminal, and the terminal includes a mobile terminal and a desktop terminal, the mobile terminal includes, but is not limited to, a mobile phone and a tablet computer, and the desktop terminal may include, but is not limited to, a dual-system conference tablet. The system switching method specifically comprises the following steps:
step S102, when the preset operation of the target application icon of the second system is monitored under the first system, authority verification information is obtained.
The first system is specifically a system before system switching; and the second system is a system after system switching.
Taking the terminal only comprising an Android system and a Windows system as an example, when the first system is the Android system, the corresponding second system is the Windows system; when the first system is a Windows system, the second system is a Windows system correspondingly.
Taking the terminal only comprising an apple system and a Windows system as an example, when the first system is the apple system, the corresponding second system is the Windows system; when the first system is a Windows system, the second system is an apple system correspondingly.
The first system and the second system are not particularly limited as to what system is used.
When the first system is in a running state, the second system runs in a background silent mode, and all applications of the second system are in a waiting state.
The application icon refers to a graphic mark corresponding to a certain application.
The target application icon refers to an icon of an application of the second system to which a preset operation of the user is directed.
The preset operation may include, but is not limited to, an operation of pressing the application icon, an operation of clicking the application icon, an operation of double-clicking the application icon, and an operation of drawing a circle on the application icon with a finger, which is not specifically limited herein.
The authority verification information is information required for authority verification. Specifically, the authority verification information may be fingerprint information, or a face image, or iris information.
And when the authority verification information is fingerprint information, the preset operation is an operation of pressing the target application icon by a finger. For example, when the terminal displays a first system, a user presses a certain application icon of a second system displayed on a desktop of the terminal by a finger, the application icon pressed by the user is determined as a target application icon, and meanwhile, fingerprint information of the user is acquired by pressing operation of the finger of the user.
When the authorization verification information is a face image or iris information, as shown in fig. 2, before the acquiring authorization verification information in step 102, the method further includes: and step 108, starting the camera to shoot the face image or the iris image through the camera. For example, when the terminal displays a first system, a user clicks a certain application icon of a second system displayed on the desktop of the terminal, the application icon clicked by the user is determined as a target application icon, meanwhile, the camera is started, and then a face image or an iris image is shot when the camera detects a face or an iris, so as to acquire the authority verification information.
And step S104, the first system verifies the authority verification information.
The first system compares the acquired permission verification information with at least one preset permission verification information stored in advance, and if the comparison result of the acquired permission verification information and a certain preset permission verification information is the same, the permission verification information passes verification; and if the acquired permission verification information is different from each preset permission verification information, the permission verification information is failed to verify.
And step S106, if the authority verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
The application refers to a software application. For example, the type of the application may be a website type, a folder type, a video conference type, or a music type, which is not limited in this respect.
The target application refers to an application of the second system corresponding to the target application icon.
The terminal is simultaneously provided with a first mainboard corresponding to the first system and a second mainboard corresponding to the second system, when the first system is an Android system, the first mainboard is the Android mainboard, and when the second system is a Windows system, the second mainboard is a Windows mainboard. The Android mainboard and the Windows mainboard are provided with serial communication interfaces, and the Android mainboard and the Windows mainboard are communicated through the serial communication interfaces.
In this embodiment of the present invention, as shown in fig. 3, if the permission verification information passes verification, the step 106 switches the first system to the second system, and runs the target application corresponding to the target application icon, including:
step 106A, if the permission verification information passes verification, sending an application opening instruction to the second system through a first serial communication interface of the first system, where the application opening instruction includes a target application identifier.
The serial communication interface is a COM interface.
And the application starting instruction is used for indicating the second system to run the target application.
The application identifier is used for uniquely identifying one application.
The target application identifier is an application identifier of the target application corresponding to the target application icon.
When the authority verification information passes verification, the user accessing the second system is indicated as the user with the access authority, and therefore, an application starting instruction is sent to the second system through the first serial communication interface so as to run the target application.
And 106B, the second system receives the application starting instruction through a second serial communication interface.
And 106C, analyzing the application starting instruction to obtain a target application identifier.
And 106D, running the target application corresponding to the target application identifier according to the target application identifier.
The system switching method comprises the steps that firstly, when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained; then the first system verifies the authority verification information; and finally, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon. Therefore, through the mode, the user can directly execute one preset operation on the target application icon of the second system at the first system interface without quitting the function interface from the first system, the system switching can be realized, the target application selected by the user is operated, the system switching efficiency is greatly improved, meanwhile, the obtained authority verification information can be verified before the system switching is carried out, the system switching is carried out only after the verification is passed, the system using by the user without authority is effectively prevented, and the safety is increased to a certain extent.
In this embodiment of the present invention, before the first system verifies the authorization verification information, the method further includes: the first system determines the security level of the target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is a first level, the first system performs verification on the permission verification information; if the security level of the target application corresponding to the target application icon is a second level, displaying a first account password input box to prompt a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and if the account and the password input through the first account password input box pass verification, entering a step of verifying the permission verification information by the first system.
The security level is used for indicating the confidentiality degree of the application, the more confidential the content related in the application is, the lower the security level of the application is, and the corresponding security level is set to be a second level; conversely, the higher the security level of the application, the higher the corresponding security level is set to the first level.
The first account password input box is used for instructing the user to input an account and a password for accessing the confidential application, as shown in fig. 4, wherein the confidential application refers to an application with more confidential contents.
When the security level of the target application is the first level, the fact that the application which the user wants to access at the moment relates to less secrets is shown, and therefore only the authority verification information needs to be verified; when the security level of the application is the second level, it is indicated that the application which the user wants to access at the moment relates to more secrets, so that a first account password input box is popped up, the user is prompted to input an account and a password for switching the system, then the obtained authority verification information is verified after the account and the password are input correctly, the identity of the user is verified in two ways, and the secret content is effectively prevented from being leaked.
In an embodiment of the present invention, the method further comprises: and if the authority verification information fails to verify, displaying a second account password input box to prompt the user to input an account and a password for logging in the dual system.
And the second account password input box indicates the user to input an account and a password for logging in the dual system.
The account and the password for logging in the dual systems are the account and the password which need to be input before the terminal enters one of the dual systems after being started, and when the account and the password for logging in the dual systems are input correctly, a user can enter the selected system.
In one embodiment, as shown in fig. 5, a system switching method is provided, which specifically includes:
step 502, when a preset operation for a system switching button is monitored under the first system, displaying an application icon of a preset application of the second system.
And the system switching button is provided for the user so as to display the application icon of the preset application of the second system by triggering the system switching button.
The system switching button may be an entity button as shown in fig. 6, or may be a virtual button as shown in fig. 6.
When the system switching button is an entity button, the preset operation may be an operation of pressing the entity button once, an operation of pressing the entity button twice in succession, or an operation of snapping the entity button up and down, and is not limited specifically herein.
When the system switching button is a physical button, the physical button may be disposed in a predetermined region of the terminal housing, which is, for example, a terminal sidewall, as shown in fig. 6.
When the system switching button is a virtual button, the display screen of the terminal is a touch screen, the preset operation may be an operation of clicking the virtual button, an operation of double-clicking the virtual button (double-clicking can effectively prevent misoperation), an operation of pressing the virtual button, and an operation of pressing the virtual button within a preset time (long-time pressing can effectively prevent misoperation), and no specific limitation is made herein.
When the system switching button is a virtual button, the virtual button may be disposed in a preset area of the display screen, for example, in a lower right corner of the display screen, as shown in fig. 6.
The preset application is a preset application of a second system which can be accessed through a first system.
The number of the preset applications may be one application of the second system, may be a plurality of applications of the second system, or may be all applications of the second system.
When the preset operation aiming at the system switching button is monitored under the first system, displaying an application icon of a preset application of the second system, wherein at the moment, the application icon of the first system is displayed in a virtual mode, and the application icon of the second system is displayed in a highlighted mode; or the application icons of the first system are completely hidden, and the terminal desktop only displays the application icons of the second system; or the terminal screen comprises a first screen area and a second screen area, the application icons of the first system are displayed in the first screen area of the terminal screen, and the application icons of the second system are displayed in the second screen area of the terminal screen.
Step 504, when the preset operation of the target application icon for the second system is monitored under the first system, the authority verification information is obtained.
Step 506, the first system verifies the authority verification information.
Step 508, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
According to the system switching method, the preset application of the second system is hidden, and the preset application of the second system can be displayed for a user to select only when the system switching button is triggered, so that the application of the first system and the display of various information can not be influenced.
As shown in fig. 7, a system switching apparatus 700 is provided, which specifically includes:
an obtaining module 702, configured to obtain permission verification information when a preset operation of a target application icon for a second system is monitored under a first system;
a verification module 704, configured to verify, by the first system, the permission verification information;
an operation module 706, configured to switch the first system to the second system and operate a target application corresponding to the target application icon if the permission verification information passes verification.
The system switching device firstly acquires authority verification information when monitoring the preset operation of a target application icon aiming at a second system under a first system; then the first system verifies the authority verification information; and finally, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon. Therefore, through the mode, the user can directly execute one preset operation on the target application icon of the second system at the first system interface without quitting the function interface from the first system, the system switching can be realized, the target application selected by the user is operated, the system switching efficiency is greatly improved, meanwhile, the obtained authority verification information can be verified before the system switching is carried out, the system switching is carried out only after the verification is passed, the system using by the user without authority is effectively prevented, and the safety is increased to a certain extent.
In one embodiment, the permission verification information is fingerprint information, and the preset operation is an operation of pressing the target application icon with a finger.
In one embodiment, the authority verification information is a face image or iris information; the apparatus 700 further comprises: and the starting module is used for starting the camera so as to shoot the face image or the iris image through the camera.
In one embodiment, the operation module 706 includes: the instruction sending module is used for sending an application starting instruction to the second system through a first serial communication interface of the first system if the authority verification information passes verification, wherein the application starting instruction comprises a target application identifier; the instruction receiving module is used for receiving the application starting instruction by the second system through a second serial communication interface; the analysis module is used for analyzing the application starting instruction to obtain a target application identifier; and the application running module is used for running the target application corresponding to the target application identifier according to the target application identifier.
In one embodiment, the apparatus 700 further includes: and the button operation monitoring module is used for displaying an application icon of a preset application of the second system when the preset operation aiming at the system switching button is monitored under the first system.
In one embodiment, the apparatus 700 further includes: a first level module, configured to determine, by the first system, a security level of a target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is a first level, enter a step in which the first system verifies the permission verification information; and the second grade module is used for displaying the first account password input box if the security grade of the target application corresponding to the target application icon is a second grade, prompting a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and entering the first system to verify the authority verification information if the account and the password input through the first account password input box are verified.
In one embodiment, the apparatus 700 further includes: and the operation failure module is used for displaying a second account password input box if the authority verification information fails to verify so as to prompt the user to input an account and a password for logging in the dual system.
FIG. 8 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be a terminal, which may include, but is not limited to, a mobile terminal and a desktop terminal, which includes, but is not limited to, a dual-system conference tablet. As shown in fig. 8, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a system switching method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the system switching method. Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the system switching method provided by the present application may be implemented in the form of a computer program, and the computer program may be run on a computer device as shown in fig. 8. The memory of the computer device may store therein respective program templates constituting the system switching means. Such as an acquisition module 802, a verification module 804, and an execution module 806.
A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of:
when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained;
the first system verifies the authority verification information;
and if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
The computer equipment firstly acquires authority verification information when monitoring the preset operation of a target application icon aiming at a second system under a first system; then the first system verifies the authority verification information; and finally, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon. Therefore, through the mode, the user can directly execute one preset operation on the target application icon of the second system at the first system interface without quitting the function interface from the first system, the system switching can be realized, the target application selected by the user is operated, the system switching efficiency is greatly improved, meanwhile, the obtained authority verification information can be verified before the system switching is carried out, the system switching is carried out only after the verification is passed, the system using by the user without authority is effectively prevented, and the safety is increased to a certain extent.
In one embodiment, the permission verification information is fingerprint information, and the preset operation is an operation of pressing the target application icon with a finger.
In one embodiment, the authority verification information is a face image or iris information; the computer program, when executed by the processor, is further configured to: and before the authority verification information is acquired, starting a camera so as to shoot a face image or an iris image through the camera.
In one embodiment, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon includes: if the authority verification information passes verification, an application starting instruction is sent to the second system through a first serial communication interface of the first system, wherein the application starting instruction comprises a target application identifier; the second system receives the application starting instruction through a second serial communication interface; analyzing the application starting instruction to obtain a target application identifier; and running the target application corresponding to the target application identifier according to the target application identifier.
In one embodiment, the computer program, when executed by the processor, is further configured to: and displaying the application icon of the preset application of the second system when the preset operation aiming at the system switching button is monitored under the first system before the authority verification information is acquired when the preset operation aiming at the target application icon of the second system is monitored under the first system.
In one embodiment, the computer program, when executed by the processor, is further configured to: before the first system verifies the authority verification information, the first system determines the security level of the target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is the first level, the first system verifies the authority verification information; if the security level of the target application corresponding to the target application icon is a second level, displaying a first account password input box to prompt a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and if the account and the password input through the first account password input box pass verification, entering a step of verifying the permission verification information by the first system.
In one embodiment, the computer program, when executed by the processor, is further configured to: and if the authority verification information fails to verify, displaying a second account password input box to prompt the user to input an account and a password for logging in the dual system.
In one embodiment, a computer-readable storage medium is proposed, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of:
when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained;
the first system verifies the authority verification information;
and if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon.
The computer-readable storage medium firstly acquires authority verification information when monitoring a preset operation of a target application icon for a second system under a first system; then the first system verifies the authority verification information; and finally, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon. Therefore, through the mode, the user can directly execute one preset operation on the target application icon of the second system at the first system interface without quitting the function interface from the first system, the system switching can be realized, the target application selected by the user is operated, the system switching efficiency is greatly improved, meanwhile, the obtained authority verification information can be verified before the system switching is carried out, the system switching is carried out only after the verification is passed, the system using by the user without authority is effectively prevented, and the safety is increased to a certain extent.
In one embodiment, the permission verification information is fingerprint information, and the preset operation is an operation of pressing the target application icon with a finger.
In one embodiment, the authority verification information is a face image or iris information; the computer program, when executed by the processor, is further configured to: and before the authority verification information is acquired, starting a camera so as to shoot a face image or an iris image through the camera.
In one embodiment, if the permission verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon includes: if the authority verification information passes verification, an application starting instruction is sent to the second system through a first serial communication interface of the first system, wherein the application starting instruction comprises a target application identifier; the second system receives the application starting instruction through a second serial communication interface; analyzing the application starting instruction to obtain a target application identifier; and running the target application corresponding to the target application identifier according to the target application identifier.
In one embodiment, the computer program, when executed by the processor, is further configured to: and displaying the application icon of the preset application of the second system when the preset operation aiming at the system switching button is monitored under the first system before the authority verification information is acquired when the preset operation aiming at the target application icon of the second system is monitored under the first system.
In one embodiment, the computer program, when executed by the processor, is further configured to: before the first system verifies the authority verification information, the first system determines the security level of the target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is the first level, the first system verifies the authority verification information; if the security level of the target application corresponding to the target application icon is a second level, displaying a first account password input box to prompt a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and if the account and the password input through the first account password input box pass verification, entering a step of verifying the permission verification information by the first system.
In one embodiment, the computer program, when executed by the processor, is further configured to: and if the authority verification information fails to verify, displaying a second account password input box to prompt the user to input an account and a password for logging in the dual system.
It should be noted that the system switching method, the system switching device, the computer device and the computer readable storage medium described above belong to a general inventive concept, and the contents in the embodiments of the system switching method, the system switching device, the computer device and the computer readable storage medium may be mutually applicable.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. A method for system switching, comprising:
when the preset operation of a target application icon aiming at a second system is monitored under a first system, authority verification information is obtained;
the first system verifies the authority verification information;
if the authority verification information passes verification, switching the first system to the second system, and running the target application corresponding to the target application icon;
before the first system verifies the authority verification information, the method further comprises the following steps:
the first system determines the security level of the target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is a first level, the first system performs verification on the permission verification information;
if the security level of the target application corresponding to the target application icon is a second level, displaying a first account password input box to prompt a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and if the account and the password input through the first account password input box pass verification, entering a step of verifying the permission verification information by the first system.
2. The method of claim 1, wherein the authority verification information is fingerprint information, and the preset operation is an operation of pressing the target application icon with a finger.
3. The method of claim 1, wherein the authority verification information is a face image or iris information; before the acquiring the right verification information, the method further comprises: and starting the camera to shoot the face image or the iris image through the camera.
4. The method of claim 1, wherein if the permission verification information is verified to be passed, switching the first system to the second system, and running the target application corresponding to the target application icon comprises:
if the authority verification information passes verification, an application starting instruction is sent to the second system through a first serial communication interface of the first system, wherein the application starting instruction comprises a target application identifier;
the second system receives the application starting instruction through a second serial communication interface;
analyzing the application starting instruction to obtain a target application identifier;
and running the target application corresponding to the target application identifier according to the target application identifier.
5. The method of claim 1, wherein before the acquiring the authority verification information when the preset operation for the target application icon of the second system is monitored under the first system, further comprising:
and when the preset operation aiming at the system switching button is monitored under the first system, displaying an application icon of a preset application of the second system.
6. The method of any of claims 1 to 5, further comprising:
and if the authority verification information fails to verify, displaying a second account password input box to prompt the user to input an account and a password for logging in the dual system.
7. A system switching apparatus, comprising:
the system comprises an acquisition module, a display module and a control module, wherein the acquisition module is used for acquiring authority verification information when monitoring the preset operation of a target application icon aiming at a second system under a first system;
the verification module is used for verifying the authority verification information by the first system;
the operation module is used for switching the first system to the second system and operating the target application corresponding to the target application icon if the permission verification information passes verification;
wherein, prior to the verification module, the apparatus is further to:
the first system determines the security level of the target application corresponding to the target application icon, and if the security level of the target application corresponding to the target application icon is a first level, the verification module is executed;
if the security level of the target application corresponding to the target application icon is a second level, displaying a first account password input box to prompt a user to input an account and a password for accessing the confidential application, acquiring the account and the password input through the first account password input box, and if the account and the password input through the first account password input box pass verification, executing the verification module.
8. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the steps of the system switching method according to any one of claims 1 to 6 when executing the computer program.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the system switching method according to any one of claims 1 to 6.
CN201910369129.2A 2019-05-05 2019-05-05 System switching method and device, computer equipment and computer readable storage medium Expired - Fee Related CN110222492B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910369129.2A CN110222492B (en) 2019-05-05 2019-05-05 System switching method and device, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910369129.2A CN110222492B (en) 2019-05-05 2019-05-05 System switching method and device, computer equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110222492A CN110222492A (en) 2019-09-10
CN110222492B true CN110222492B (en) 2021-04-20

Family

ID=67820401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910369129.2A Expired - Fee Related CN110222492B (en) 2019-05-05 2019-05-05 System switching method and device, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110222492B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111880848A (en) * 2020-07-15 2020-11-03 深圳市筑泰防务智能科技有限公司 Switching method and device of operating system, terminal and readable storage medium
CN111950012A (en) * 2020-08-21 2020-11-17 深信服科技股份有限公司 Application running method, device and equipment and computer readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462964A (en) * 2014-11-06 2015-03-25 东莞宇龙通信科技有限公司 Data acquiring method, data acquiring device and terminal
CN104486506A (en) * 2014-12-17 2015-04-01 宇龙计算机通信科技(深圳)有限公司 System loading method, system loading device and terminal
CN104866782A (en) * 2015-05-29 2015-08-26 宇龙计算机通信科技(深圳)有限公司 Data processing method and apparatus

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0680493B2 (en) * 1989-08-10 1994-10-12 株式会社京三製作所 Parallel dual system processor and operating method
JP2013140516A (en) * 2012-01-05 2013-07-18 Sony Corp Information processing apparatus and display control method
CN104123146A (en) * 2013-04-25 2014-10-29 深圳市天方信安电子科技有限公司 Method for achieving hot switching between two systems
CN104239142A (en) * 2014-09-17 2014-12-24 宇龙计算机通信科技(深圳)有限公司 Method and device for quickly switching between double systems and terminal
US10922402B2 (en) * 2014-09-29 2021-02-16 Vmware, Inc. Securing secret data embedded in code against compromised interrupt and exception handlers
CN104408344B (en) * 2014-11-14 2018-02-13 南京酷派软件技术有限公司 System switching method, system switching device and terminal
CN104506732B (en) * 2014-12-29 2017-10-17 宇龙计算机通信科技(深圳)有限公司 System switching method and device based on contact person
CN104461749B (en) * 2014-12-30 2018-05-25 宇龙计算机通信科技(深圳)有限公司 A kind of application program synchronous method, sychronisation and the terminal of multisystem terminal
CN106155783A (en) * 2015-04-15 2016-11-23 宇龙计算机通信科技(深圳)有限公司 The method of the system switching of multisystem and device thereof
CN104794402B (en) * 2015-04-24 2018-06-15 宇龙计算机通信科技(深圳)有限公司 system switching method, system switching device and terminal
CN106250741A (en) * 2016-07-22 2016-12-21 北京珠穆朗玛移动通信有限公司 A kind of system switching method and mobile terminal
CN106844028B (en) * 2017-01-12 2020-08-21 北京珠穆朗玛移动通信有限公司 System switching method based on dual systems and mobile terminal
CN106933682A (en) * 2017-02-10 2017-07-07 华为机器有限公司 The method and terminal of Message Processing
CN107102891B (en) * 2017-03-01 2020-10-30 北京珠穆朗玛移动通信有限公司 Application management method based on dual systems and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104462964A (en) * 2014-11-06 2015-03-25 东莞宇龙通信科技有限公司 Data acquiring method, data acquiring device and terminal
CN104486506A (en) * 2014-12-17 2015-04-01 宇龙计算机通信科技(深圳)有限公司 System loading method, system loading device and terminal
CN104866782A (en) * 2015-05-29 2015-08-26 宇龙计算机通信科技(深圳)有限公司 Data processing method and apparatus

Also Published As

Publication number Publication date
CN110222492A (en) 2019-09-10

Similar Documents

Publication Publication Date Title
EP3370449B1 (en) Method and device for configuring security indication information
CN110362308A (en) Page generation method, device, computer equipment and storage medium
CN106354399A (en) Method, device, and electronic device for assignment of application permission
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
CN106330958A (en) Secure accessing method and device
CN112073289B (en) Instant messaging control method and device
CN106557669A (en) A kind of authority control method and device of application program installation process
CN113225610B (en) Screen projection method, device, equipment and storage medium
CN111176543A (en) Method, device, computer equipment and storage medium for realizing electronic signature
CN110222492B (en) System switching method and device, computer equipment and computer readable storage medium
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN110598384B (en) Information protection method, information protection device and mobile terminal
CN106484796B (en) File management method, file management device and mobile terminal
CN108763888A (en) Files on each of customers processing method, device, computer equipment and storage medium
CN107533596A (en) Fingerprint identification method and mobile terminal
CN106162505B (en) Soft SIM communication method, device and terminal
CN110688632A (en) Application program login method, device, equipment and storage medium
CN113411203B (en) Terminal configuration method and device, computer equipment and storage medium
CN106951771B (en) Mobile terminal using method of android operating system
CN111709054B (en) Privacy space information access control method and device and computer equipment
WO2019127043A1 (en) Terminal device control method and terminal device
CN111046356B (en) Content access method and device and computer readable storage medium
CN106959813A (en) A kind of interface control method and system
CN110895612B (en) Unlocking method and device and terminal equipment
CN115442798A (en) Mobile terminal touch screen failure substitution device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210420

CF01 Termination of patent right due to non-payment of annual fee