Unlock instant, AI-driven research and patent intelligence for your innovation.

A multi-system access method, device and terminal

An access device and multi-system technology, applied in digital data protection, instruments, digital data authentication, etc., can solve problems such as poor user experience and access to another system, and achieve the effect of improving user experience

Active Publication Date: 2017-04-19
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a multi-system access method, device and terminal to solve the problem in the prior art that users can only enter one system first and then enter another system, resulting in poor user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A multi-system access method, device and terminal
  • A multi-system access method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to further explain the technical means and functions adopted by the present invention to achieve the intended purpose, the present invention will be described in detail below in conjunction with the accompanying drawings and preferred embodiments.

[0025] The multi-system entry method of the embodiment of the present invention is applied to a terminal with more than two operating systems, for example, a mobile phone with dual systems. In this embodiment, a terminal with two operating systems is taken as an example for illustration, and the two operating systems are defined as a first system and a second system respectively. Specifically, one of the first system and the second system may be a security system, while the other may be a common system.

[0026] see figure 1 , the first implementation of the technical solution provides a multi-system access method, including steps:

[0027] S101, setting unlocking rules for multiple systems.

[0028] In this step...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-system entry method, which includes: setting multi-system unlocking rules; detecting the match between the received unlocking password and the multi-system unlocking rule; and according to the received unlocking password and the unlocking If the rules match, enter the corresponding system. The present invention also provides a multi-system entry device and terminal correspondingly. The present invention can solve the problem of poor user operation experience caused by only being able to enter one system first and then enter another system.

Description

technical field [0001] The present invention relates to the technical field of terminals, in particular to a multi-system entry method, device and terminal. Background technique [0002] At present, an important feature of smart phones is the use of open operating systems, such as iOS and Android. Many third-party applications can be installed on such an operating system platform, so that the functions of the mobile phone are expanded, but at the same time, viruses and malicious software are easy to invade, resulting in leakage of private data such as user calls, text messages, and contacts. In order to improve the security of mobile phones, mobile phones with dual operating systems have appeared at present, which have two operating systems, one of which can be used to handle common affairs, generally referred to as the common system; Confidential or private transactions are generally called security systems. Certainly, there may be more operating systems in the terminal. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31
CPCG06F21/31G06F21/45G06F2221/2105G06F21/62
Inventor 李锡金
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD