Unlock instant, AI-driven research and patent intelligence for your innovation.

Multisystem entering method and device and terminal

A technology for entering devices and multiple systems. It is applied in the fields of digital data protection, instruments, and digital data authentication. It can solve the problems of poor user operation experience and entering another system, and achieve the effect of improving the user experience.

Active Publication Date: 2014-11-19
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a multi-system access method, device and terminal to solve the problem in the prior art that users can only enter one system first and then enter another system, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multisystem entering method and device and terminal
  • Multisystem entering method and device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to further explain the technical means and functions adopted by the present invention to achieve the intended purpose, the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.

[0025] The multi-system entry method of the embodiment of the present invention is applied to a terminal with more than two operating systems, for example, a mobile phone with dual systems. In this embodiment, a terminal with two operating systems is taken as an example for illustration, and the two operating systems are defined as a first system and a second system respectively. Specifically, one of the first system and the second system may be a security system, while the other may be a common system.

[0026] see figure 1 , the first implementation of the technical solution provides a multi-system access method, including steps:

[0027] S101, setting unlocking rules for multiple systems.

[0028] In this step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multisystem entering method. The method includes: setting unlocking rules of multiple systems; detecting matching conditions of received unlocking passwords and the multisystem unlocking rules; according to the matching conditions of the received unlocking passwords and the unlocking rules, entering the corresponding system. The invention further provides a multisystem entering device and a terminal correspondingly. The problem of poor user operating experience due to the fact that a user can only enter one system prior to entering another system can be solved.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a multi-system entry method, device and terminal. Background technique [0002] At present, an important feature of smart phones is the use of open operating systems, such as iOS and Android. Many third-party applications can be installed on such an operating system platform, so that the functions of the mobile phone are expanded, but at the same time, viruses and malicious software are easy to invade, resulting in leakage of private data such as user calls, text messages, and contacts. In order to improve the security of mobile phones, mobile phones with dual operating systems have appeared at present, which have two operating systems, one of which can be used to handle common affairs, generally referred to as the common system; Confidential or private transactions are generally called security systems. Certainly, there may be more operating systems in the terminal. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F21/45G06F2221/2105G06F21/62
Inventor 李锡金
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD