Method for obtaining login certification in intelligent terminal, intelligent terminal and operation system thereof

An operating system and smart terminal technology, applied in the field of operating systems, can solve problems such as user property loss, user privacy leakage, etc., and achieve a high level of security.

Inactive Publication Date: 2016-05-18
CHINA UNIONPAY
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this also brings some problems, for example, when the mobile terminal installed with these applications is lost, the user's privacy may be leaked
Even today, with the increasing development of online payment, for example,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for obtaining login certification in intelligent terminal, intelligent terminal and operation system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following introduces some of the possible embodiments of the present invention, which are intended to provide a basic understanding of the present invention, but are not intended to identify key or decisive elements of the present invention or limit the scope of protection. It is easy to understand that, according to the technical solution of the present invention, those skilled in the art may propose other alternative implementation manners without changing the essence and spirit of the present invention. Therefore, the following specific embodiments and drawings are only exemplary descriptions of the technical solution of the present invention, and should not be regarded as the entirety of the present invention or as a limitation or restriction on the technical solution of the present invention.

[0028] The TEEI (TrustedExecutiveEnvironmentIntegration Trusted Execution Environment Integration) system developed by UnionPay is an operating system with a high level o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method for obtaining login certification in an intelligent terminal. The intelligent terminal includes a first operation system and a second operation system which operate on the intelligent terminal, wherein the second operation system includes a safety grade higher than the safety grade of the second operation system. The method comprises: a user selects an application requiring to use in the first operation system of the intelligent terminal, and the application prompts the user to input the login certification or perform automatic login; after the user selects the automatic login, the first operation system initiates the call request of the login certification of the application to the second operation system; on the basis of the call request, the second operation system verifies the user identity and retrieves the required login certification; and the second operation system returns back the login certification to the first operation system. The present invention further discloses an intelligent terminal and an operation system operated on the intelligent terminal.

Description

technical field [0001] The invention relates to a method for obtaining login credentials in an intelligent terminal, an intelligent terminal and an operating system. Background technique [0002] At present, there are various instant messaging applications on smart terminals, such as WeChat, QQ, and mailboxes. Generally speaking, such applications allow users to automatically save login passwords. In order to save trouble, users usually choose this way of automatic saving without input. However, this also brings some problems, for example, when the mobile terminal installed with these applications is lost, the user's privacy may be leaked. Even, with the increasing development of online payment, for example, hackers can easily break through ordinary mobile phone operating systems through various technical means, thereby obtaining sensitive information such as user's payment password, thereby causing loss of user's property. [0003] Therefore, there is a need for a method...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3213H04L9/3231H04L63/0807H04L63/0861H04L9/32H04L9/40
Inventor 褚红梅才华
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products