CN105631254B - Unlocking method and tripper - Google Patents

Unlocking method and tripper Download PDF

Info

Publication number
CN105631254B
CN105631254B CN201510998604.4A CN201510998604A CN105631254B CN 105631254 B CN105631254 B CN 105631254B CN 201510998604 A CN201510998604 A CN 201510998604A CN 105631254 B CN105631254 B CN 105631254B
Authority
CN
China
Prior art keywords
terminal device
unlocked
bootloader
server
bootloader file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510998604.4A
Other languages
Chinese (zh)
Other versions
CN105631254A (en
Inventor
刘广鑫
续丽娜
王舒捷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510998604.4A priority Critical patent/CN105631254B/en
Publication of CN105631254A publication Critical patent/CN105631254A/en
Application granted granted Critical
Publication of CN105631254B publication Critical patent/CN105631254B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

The disclosure is directed to a kind of unlocking method and trippers, are related to terminal device technical field.The described method includes: sending unlocking request to server, the unlocking request is for requesting unlock bootloader;Obtain the bootloader file unlocked that the server provides, the bootloader file unlocked is sent after the verifying that the unlocking request passes through the server by the server;Using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked, bootloader unlock is completed.The disclosure is by requesting unlock bootloader to server, and after the verifying that unlocking request passes through server, obtain the bootloader file unlocked that server is sent, then with the bootloader file not unlocked in the bootloader file replacement terminal equipment unlocked, complete bootloader unlock, entire unlocking process is realized without PC, easy to operate, reduces the difficulty of user's brush machine.

Description

Unlocking method and tripper
Technical field
This disclosure relates to terminal device technical field more particularly to a kind of unlocking method and tripper.
Background technique
The system in mobile phone and significant data are tampered with Android mobile phone in order to prevent, and when factory is generally all right Bootloader (start-up loading) file is locked, and the Android mobile phone of the bootloader file equipped with locking can not be direct Brush machine.When user needs brush machine, needs to first pass through the channel unlock bootloader of official's unlock, could be brushed after unlock Machine.
Currently, the mode for the unlock bootloader that Android mobile phone manufacturer provides, it usually needs come by PC PC It realizes, entire unlocking process is cumbersome, creates great difficulties to user's brush machine.
Summary of the invention
To overcome the problems in correlation technique, the disclosure provides a kind of unlocking method and tripper.
According to the first aspect of the embodiments of the present disclosure, a kind of unlocking method is provided, which comprises
Unlocking request is sent to server, the unlocking request is for requesting unlock bootloader;
Obtain the bootloader file unlocked that the server provides, the bootloader file unlocked It is to be sent by the server after the verifying that the unlocking request passes through the server;
It is complete using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked It is unlocked at bootloader.
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is easy to operate, reduce the difficulty of user's brush machine.
Wherein, server is the server that terminal device manufacturer provides.
It is described to send unlocking request to server according to a kind of implementation of disclosure first aspect, comprising:
It is applied using the unlock that the manufacturer of the terminal device provides to the server and sends unlocking request.
In this implementation, the unlock application provided using official carries out the transmission of brush machine unlocking request, on the one hand may be used To simplify user's operation, on the other hand can ensure information security.
According to another implementation of disclosure first aspect, the unlocking request includes the model of the terminal device And mark.
According to another implementation of disclosure first aspect, it is described obtain that the server provides unlocked Bootloader file, comprising:
The purchase information of the terminal device is sent to the server;
When the purchase information of the terminal device is by the server authentication, the solution that the server is sent is received The bootloader file of lock.
According to another implementation of disclosure first aspect, the unlocking request includes the type of the terminal device Number, mark and the terminal device purchase information.
In above-mentioned implementation, by submitting the model of terminal device, mark and the terminal device to server Information is bought, authenticates server according to identity of the above- mentioned information to user, so that it is guaranteed that the unlocking request is machine Main sending in person, rather than what other users issued, it ensure that the safety of brush machine process.
Wherein, purchase information includes but is not limited at least one of the account information bought and order number of purchase.
It is described using the bootloader file unlocked according to another implementation of disclosure first aspect The bootloader file not unlocked in replacement terminal device, comprising:
Obtain the bootloader file replacement instruction for unlocking application and issuing that the manufacturer of the terminal device provides;
In response to the bootloader file replacement instruction, the signature of the verifying bootloader file unlocked With the signature of the unlock application;
When the signature verification of the signature of the bootloader file unlocked and the unlock application passes through, use The bootloader file not unlocked in the bootloader file replacement terminal device unlocked.
Wherein, the signature of the bootloader file unlocked and the signature of unlock application are mentioned by the manufacturer of terminal device For the two can be identical, which is also stored in terminal device when leaving the factory, to ensure that terminal device can use the signature Verify the legitimacy of the bootloader file unlocked and unlock application.
According to the second aspect of an embodiment of the present disclosure, a kind of unlocking method is provided, which comprises
It obtains terminal device and sends unlocking request, and the unlocking request is verified, the unlocking request is for asking Solve lock bootloader;
The bootloader file unlocked is sent to the terminal device, the bootloader file unlocked is The unlocking request after verifying by sending.
In the disclosure, server verifies the unlocking request in the unlocking request for receiving user, and logical in unlocking request It crosses after verifying, the bootloader file unlocked is sent to terminal device, so that terminal device can be carried out directly Bootloader file replacement, to unlock bootloader.
According to a kind of implementation of disclosure second aspect, the unlocking request include the terminal device model and Mark.
According to another implementation of disclosure second aspect, described send to the terminal device has been unlocked Bootloader file, comprising:
Receive the purchase information for the terminal device that the terminal device is sent;
The purchase information of the terminal device is verified;
When the purchase information of the terminal device passes through verifying, unlocked to terminal device transmission Bootloader file.
According to another implementation of disclosure second aspect, the unlocking request includes the type of the terminal device Number, mark and the terminal device purchase information.
According to the third aspect of an embodiment of the present disclosure, a kind of tripper is provided, described device includes:
Request module, for sending unlocking request to server, the unlocking request is for requesting unlock bootloader;
Module is obtained, the bootloader file unlocked that provides for obtaining the server is described to have unlocked Bootloader file is sent after the verifying that the unlocking request passes through the server by the server;
Processing module, for what is do not unlocked in the use bootloader file replacement terminal device unlocked Bootloader file completes bootloader unlock.
According to a kind of implementation of the disclosure third aspect, the request module, for using the terminal device The unlock that manufacturer provides applies to the server and sends unlocking request.
According to another implementation of the disclosure third aspect, the unlocking request includes the model of the terminal device And mark.
According to another implementation of the disclosure third aspect, the acquisition module, for being sent to the server The purchase information of the terminal device;
When the purchase information of the terminal device is by the server authentication, the solution that the server is sent is received The bootloader file of lock.
According to another implementation of the disclosure third aspect, the unlocking request includes the type of the terminal device Number, mark and the terminal device purchase information.
According to another implementation of the disclosure third aspect, the processing module, comprising:
Acquisition submodule, the bootloader text that the unlock application that the manufacturer for obtaining the terminal device provides issues Part replacement instruction;
Submodule is verified, in response to the bootloader file replacement instruction, verifying is described have been unlocked The signature of the signature of bootloader file and the unlock application;
Submodule is replaced, for when the signature of the bootloader file unlocked and the signature of the unlock application When being verified, using the bootloader text not unlocked in the bootloader file replacement terminal device unlocked Part.
According to a fourth aspect of embodiments of the present disclosure, a kind of tripper is provided, described device includes:
Authentication module sends unlocking request for obtaining terminal device, and verifies to the unlocking request, the solution Lock request is for requesting unlock bootloader;
Sending module, it is described to have unlocked for sending the bootloader file that has unlocked to the terminal device Bootloader file is the unlocking request by sending after verifying.
According to a kind of implementation of disclosure fourth aspect, the unlocking request include the terminal device model and Mark.
According to another implementation of disclosure fourth aspect, the sending module is used for:
Receive the purchase information for the terminal device that the terminal device is sent;
The purchase information of the terminal device is verified;
When the purchase information of the terminal device passes through verifying, unlocked to terminal device transmission Bootloader file.
According to another implementation of disclosure fourth aspect, the unlocking request includes the type of the terminal device Number, mark and the terminal device purchase information.
According to a fifth aspect of the embodiments of the present disclosure, a kind of tripper is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Unlocking request is sent to server, the unlocking request is for requesting unlock bootloader;
Obtain the bootloader file unlocked that the server provides, the bootloader file unlocked It is to be sent by the server after the verifying that the unlocking request passes through the server;
It is complete using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked It is unlocked at bootloader.
According to a sixth aspect of an embodiment of the present disclosure, a kind of tripper is provided, described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
It obtains terminal device and sends unlocking request, and the unlocking request is verified, the unlocking request is for asking Solve lock bootloader;
The bootloader file unlocked is sent to the terminal device, the bootloader file unlocked is The unlocking request after verifying by sending.
The technical scheme provided by this disclosed embodiment can include the following benefits:
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is directly completed by terminal device, realizes simply, reduce the difficulty of user's brush machine.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is application scenario diagram shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of unlocking method shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of unlocking method shown according to an exemplary embodiment.
Fig. 4 is a kind of flow chart of unlocking method shown according to an exemplary embodiment.
Fig. 5 is a kind of flow chart of unlocking method shown according to an exemplary embodiment.
Fig. 6 is a kind of block diagram of tripper shown according to an exemplary embodiment.
Fig. 7 is a kind of block diagram of tripper shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of tripper shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of tripper shown according to an exemplary embodiment.
Figure 10 is a kind of block diagram of tripper shown according to an exemplary embodiment.
Figure 11 is a kind of block diagram of tripper shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
For the ease of the description of embodiment, below first simply introduce the application scenarios of embodiment in the disclosure.Fig. 1 is Application scenario diagram shown according to an exemplary embodiment, referring to Fig. 1, which includes terminal device 10 and server 20, end End equipment 10 include but is not limited to be smart phone, smartwatch, Intelligent bracelet, tablet computer etc..Server 20 sets for terminal The server that standby 10 manufacturer is arranged, terminal device 10 realize that bootloader is unlocked by communicating with server 20, specific mistake Journey is shown in hereinafter.
It should be noted that the apparatus described above type is only for example, the disclosure to this with no restriction.
Fig. 2 is a kind of flow chart of unlocking method shown according to an exemplary embodiment, as shown in Fig. 2, the unlock side Terminal device of the method suitable for aforementioned scene, comprising the following steps:
In step s 11, unlocking request is sent to server, unlocking request is for requesting unlock bootloader.
In step s 12, the bootloader file unlocked that server provides, the bootloader unlocked are obtained File is unlocking request by being sent after the verifying of server by server.
Wherein, the bootloader file unlocked is unlocking request by being sent after the verifying of server by server Include two kinds of situations: the first is, server authentication sends the bootloader file unlocked immediately after passing through, referring to figure Method flow provided by 5;It is for second, using other additional identifications after server authentication, then to retransmit and unlocked Bootloader file, referring to fig. 4 provided by method flow.
In step s 13, using not unlocked in the bootloader file replacement terminal device unlocked Bootloader file completes bootloader unlock.
After the bootloader file not unlocked using the bootloader file unlocked replacement, user can be carried out The operation of brush machine.
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is directly completed by terminal device, realizes simply, reduce the difficulty of user's brush machine.
Fig. 3 is a kind of flow chart of unlocking method shown according to an exemplary embodiment, as shown in figure 3, the unlock side Server of the method suitable for aforementioned scene, comprising the following steps:
In the step s 21, it obtains terminal device and sends unlocking request, and unlocking request is verified, unlocking request is used Bootloader is unlocked in request.
In step S22, the bootloader file unlocked is sent to terminal device, the bootloader text unlocked Part is unlocking request by sending after verifying.
In the disclosure, server verifies the unlocking request in the unlocking request for receiving user, and logical in unlocking request It crosses after verifying, the bootloader file unlocked is sent to terminal device, so that terminal device can be carried out directly The replacement of bootloader file unlocks bootloader, and entire unlocking process is realized without PC, directly passes through terminal device It completes, realizes simply, reduce the difficulty of user's brush machine.
Fig. 4 is a kind of flow chart of unlocking method shown according to an exemplary embodiment, as shown in figure 4, the limitation side Terminal device and server of the method suitable for aforementioned scene, comprising the following steps:
In step S31, terminal device to server send unlocking request, unlocking request include terminal device model and Mark;The unlocking request that server receiving terminal equipment is sent.
Wherein, the mark of terminal device can be IMEI (the International Mobile of terminal device Equipment Identity, International Mobile Station Equipment Identification) number.
In step s 32, server verifies the model and mark of terminal device, and returns and unlock to terminal device Response, unlock response are used to indicate the model of terminal device and identify whether to pass through verifying;Terminal device receives server and returns Unlock response.
Database is provided in server, which is used for the factory information of storage terminal device, such as terminal device Purchase information of model, mark and terminal device etc..In step s 32, server searches the terminal device in the database Model and mark, determine whether terminal device is certified products, if finding the model and mark of corresponding terminal device, determine The terminal device is certified products, then sends the model of instruction terminal equipment to terminal device and identify the unlock response by verifying; Otherwise, it sends the model of instruction terminal equipment and identifies unverified unlock response.
In step S33, when the model of terminal device and mark pass through server authentication, terminal device is sent out to server The purchase information for end equipment of making arrangements for his funeral, the purchase information for the terminal device that server receiving terminal equipment is sent.
Wherein, purchase information includes but is not limited at least one of the account information bought and order number of purchase.Than Such as, account information can be the account number cipher that uses when user is bought by electric business channel, or when being bought by channel under line The identification card number etc. used;Order number can be the O/No. obtained when user is bought by electric business channel, Huo Zhetong Cross the O/No. that channel under line is commercially available.
Above-mentioned purchase information is automatic when buying completion or by manually storing in above-mentioned server.
Optionally, when passing through the verifying of step S32, terminal device prompts the purchase information of user's input terminal equipment, To continue subsequent step.
Optionally, when the model of terminal device and mark do not pass through server authentication, terminal device stops unlock process.
In step S34, server verifies the purchase information of terminal device, and the verifying returned to terminal device As a result, whether the unlocking request that verification result is used to indicate terminal device is verified;Terminal device receives what server returned Verification result.
In step S34, server searches the purchase information of the terminal device in the database, determines that the unlocking request is It is sent by owner, if finding the purchase information of corresponding terminal device, determines that the unlocking request is by owner's sheet Human hair is sent, then sends instruction unlocking request to terminal device and pass through the verification result of verifying;Otherwise, instruction unlocking request is sent not Pass through the verification result of verifying.
Optionally, when the purchase information of terminal device does not pass through server authentication, terminal device stops unlock process.
Above-mentioned steps S31-S34 realizes terminal device and sends unlocking request to server, and server obtains terminal device Unlocking request is sent, and unlocking request is verified.
In one implementation, terminal device is applied to server using the unlock that the manufacturer of terminal device provides and is sent Unlocking request.
Optionally, before step S31, this method further include: the solution that the manufacturer of installing terminal equipment terminal device provides Lock applies (mobile application).
In alternatively possible implementation, which can be used as pre-installed software or system software is mounted in terminal in advance In equipment.
It is worth noting that step S34 is optional step, when the purchase information of terminal device passes through server authentication, Server directly executes step S35, without sending verification result.
In step s 35, when unlocking request is verified, server has been unlocked to terminal device transmission Bootloader file;Terminal device obtains the bootloader file unlocked that server provides.
In one implementation, terminal device has been unlocked by what unlock application received that server sends Bootloader file.
In step S36, do not unlocked in the bootloader file replacement terminal device that terminal device use has unlocked Bootloader file completes bootloader unlock.
Optionally, step S36 includes: that terminal device obtains the unlock application sending that the manufacturer of terminal device provides Bootloader file replacement instruction;Verify the signature of the bootloader file unlocked and the signature of unlock application;When When the signature of the bootloader file of unlock and the signature verification of unlock application pass through, using the bootloader text unlocked The bootloader file not unlocked in part replacement terminal device.
The signature for the bootloader file that terminal device has been unlocked by verifying, it is ensured that the bootloader text unlocked The signature of part is not tampered with.The signature that terminal device passes through verifying unlock application, it is ensured that its bootloader file issued replaces Change the legitimacy of instruction.
It wherein, can using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked To include: that corresponding bootloader subregion is written in the bootloader file that will have been unlocked, the write operation is by terminal device System executes.In general, needing to restart terminal after corresponding bootloader subregion is written in the bootloader file that will have been unlocked Equipment can be completed to unlock.
In one possible implementation, when terminal device is in the bootloader unlocked for receiving server transmission After file, above-mentioned bootloader file replacement process is executed automatically.
In the alternatively possible implementation, when terminal device has been unlocked receive that server sends After bootloader file, the unlock instruction of user's input is received, after receiving the unlock instruction of user's input, is executed above-mentioned Bootloader file replacement process.
Wherein, the signature of the bootloader file unlocked and the signature of unlock application are mentioned by the manufacturer of terminal device For the two can be identical, which is also stored in terminal device when leaving the factory, to ensure that terminal device can use the signature Verify the legitimacy of the bootloader file unlocked and unlock application.
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is directly completed by terminal device, realizes simply, reduce the difficulty of user's brush machine.It is set in addition, needing to provide terminal when unlock Standby purchase information has effectively prevented terminal device so that the other users other than owner can not unlock equipment By the risk of malice brush machine.
Fig. 5 is a kind of flow chart of unlocking method shown according to an exemplary embodiment, as shown in figure 5, the limitation side Terminal device and server of the method suitable for aforementioned scene, comprising the following steps:
In step S41, terminal device to server send unlocking request, unlocking request include terminal device model, The purchase information of mark and terminal device;The unlocking request that server receiving terminal equipment is sent.
Wherein, the mark of terminal device can be the IMEI number of terminal device.
Wherein, purchase information includes but is not limited at least one of the account information bought and order number of purchase.Than Such as, account information can be the account number cipher that uses when user is bought by electric business channel, or when being bought by channel under line The identification card number etc. used;Order number can be the O/No. obtained when user is bought by electric business channel, Huo Zhetong Cross the O/No. that channel under line is commercially available.
Above-mentioned purchase information is automatic when buying completion or by manually storing in above-mentioned server.
In step S42, server verifies the purchase information of the model of terminal device, mark and terminal device, And unlock response is returned to terminal device, whether the unlocking request that unlock response is used to indicate terminal device is verified;Terminal Equipment receives the unlock response that server returns.
Database is provided in server, which is used for the factory information of storage terminal device, such as terminal device Purchase information of model, mark and terminal device etc..In step S42, server searches the terminal device in the database Model, the purchase information of mark and terminal device, determine terminal device whether be certified products and meanwhile determine the unlocking request be by What owner sent, if finding the purchase information of the model of corresponding terminal device, mark and terminal device, determining should Terminal device is certified products and determines that the unlocking request is sent by owner, then sends instruction unlocking request to terminal device Pass through the unlock response of verifying;Otherwise, the unverified unlock response of instruction unlocking request is sent.
Above-mentioned steps S41-S42 realizes terminal device and sends unlocking request to server, and server obtains terminal device Unlocking request is sent, and unlocking request is verified.
Optionally, when the purchase information of the model of terminal device, mark and terminal device does not pass through server authentication, eventually End equipment stops unlock process.
In one implementation, terminal device is applied to server using the unlock that the manufacturer of terminal device provides and is sent Unlocking request.
Optionally, before step S41, this method further include: the solution that the manufacturer of installing terminal equipment terminal device provides Lock application.
In alternatively possible implementation, which can be used as pre-installed software or system software is mounted in terminal in advance In equipment.
It is worth noting that step S42 is optional step, when the purchase of the model of terminal device, mark and terminal device When information passes through server authentication, server directly executes step S43, unlocks response without sending.
In step S43, when unlocking request is verified, server has been unlocked to terminal device transmission Bootloader file;Terminal device obtains the bootloader file unlocked that server provides.
In one implementation, terminal device has been unlocked by what unlock application received that server sends Bootloader file.
In step S44, do not unlocked in the bootloader file replacement terminal device that terminal device use has unlocked Bootloader file completes bootloader unlock.
Optionally, step S44 includes: that terminal device obtains the unlock application sending that the manufacturer of terminal device provides Bootloader file replacement instruction;Verify the signature of the bootloader file unlocked and the signature of unlock application;When When the signature of the bootloader file of unlock and the signature verification of unlock application pass through, using the bootloader text unlocked The bootloader file not unlocked in part replacement terminal device.
The signature for the bootloader file that terminal device has been unlocked by verifying, it is ensured that the bootloader text unlocked The signature of part is not tampered with.The signature that terminal device passes through verifying unlock application, it is ensured that its bootloader file issued replaces Change the legitimacy of instruction.
It wherein, can using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked To include: that corresponding bootloader subregion is written in the bootloader file that will have been unlocked, the write operation is by terminal device System executes.In general, needing to restart terminal after corresponding bootloader subregion is written in the bootloader file that will have been unlocked Equipment can be completed to unlock.
In one possible implementation, when terminal device is in the bootloader unlocked for receiving server transmission After file, above-mentioned bootloader file replacement process is executed automatically.
In the alternatively possible implementation, when terminal device has been unlocked receive that server sends After bootloader file, the unlock instruction of user's input is received, after receiving the unlock instruction of user's input, is executed above-mentioned Bootloader file replacement process.
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is directly completed by terminal device, realizes simply, reduce the difficulty of user's brush machine.It is set in addition, needing to provide terminal when unlock Standby purchase information has effectively prevented terminal device so that the other users other than owner can not unlock equipment By the risk of malice brush machine.
Fig. 6 is a kind of block diagram of tripper shown according to an exemplary embodiment, which can be terminal A part of equipment or terminal device, as shown in fig. 6, device includes:
Request module 301, for sending unlocking request to server, unlocking request is for requesting unlock bootloader;
Module 302 is obtained, for obtaining the bootloader file of server offer unlocked, has been unlocked Bootloader file is unlocking request by being sent after the verifying of server by server;
Processing module 303, for using not unlocked in the bootloader file replacement terminal device unlocked Bootloader file completes bootloader unlock.
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is directly completed by terminal device, realizes simply, reduce the difficulty of user's brush machine.
Fig. 7 is a kind of block diagram of tripper shown according to an exemplary embodiment, which can be terminal A part of equipment or terminal device, as shown in fig. 7, device includes:
Request module 401, for sending unlocking request to server, unlocking request is for requesting unlock bootloader;
Module 402 is obtained, for obtaining the bootloader file of server offer unlocked, has been unlocked Bootloader file is unlocking request by being sent after the verifying of server by server;
Processing module 403, for using not unlocked in the bootloader file replacement terminal device unlocked Bootloader file completes bootloader unlock.
Optionally, request module 401, the unlock provided for the manufacturer using terminal device are applied to server transmission solution Lock request.
In one possible implementation, unlocking request includes the model and mark of terminal device.
Further, module 402 is obtained, for sending the purchase information of terminal device to server;
When the purchase information of terminal device passes through server authentication, receive that server sends has been unlocked Bootloader file.
In alternatively possible implementation, unlocking request includes the model, mark and terminal device of terminal device Buy information.
Optionally, processing module 403, comprising:
Acquisition submodule 4031, the bootloader text that the unlock application that the manufacturer for obtaining terminal device provides issues Part replacement instruction;
Submodule 4032 is verified, for what is unlocked in response to bootloader file replacement instruction, verifying The signature of bootloader file and the signature of unlock application;
Replace submodule 4033, the signature of the bootloader file for that ought unlock and the signature verification of unlock application By when, using the bootloader file that does not unlock in the bootloader file replacement terminal device unlocked.
The disclosure by requesting unlock bootloader to server, and unlocking request by the verifying of server it Afterwards, the bootloader file unlocked that server is sent is obtained, is then substituted eventually with the bootloader file unlocked The bootloader file not unlocked in end equipment completes bootloader unlock, and entire unlocking process is realized without PC, It is directly completed by terminal device, realizes simply, reduce the difficulty of user's brush machine.It is set in addition, needing to provide terminal when unlock Standby purchase information has effectively prevented terminal device so that the other users other than owner can not unlock equipment By the risk of malice brush machine.
Fig. 8 is a kind of block diagram of tripper shown according to an exemplary embodiment, which can be service A part of device or server, as shown in figure 8, device includes:
Authentication module 501 sends unlocking request for obtaining terminal device, and verifies to unlocking request, and unlock is asked It asks for requesting unlock bootloader;
Sending module 502 has been unlocked for sending the bootloader file unlocked to terminal device Bootloader file is unlocking request by sending after verifying.
In the disclosure, server verifies the unlocking request in the unlocking request for receiving user, and logical in unlocking request It crosses after verifying, the bootloader file unlocked is sent to terminal device, so that terminal device can be carried out directly The replacement of bootloader file unlocks bootloader, and entire unlocking process is realized without PC, directly passes through terminal device It completes, realizes simply, reduce the difficulty of user's brush machine.
Fig. 9 is a kind of block diagram of tripper shown according to an exemplary embodiment, which can be service A part of device or server, as shown in figure 9, device includes:
Authentication module 601 sends unlocking request for obtaining terminal device, and verifies to unlocking request, and unlock is asked It asks for requesting unlock bootloader;
Sending module 602 has been unlocked for sending the bootloader file unlocked to terminal device Bootloader file is unlocking request by sending after verifying.
In one possible implementation, unlocking request includes the model and mark of terminal device.
Further, sending module 602, the purchase information for the terminal device that receiving terminal apparatus is sent;To terminal The purchase information of equipment is verified;When the purchase information of terminal device passes through verifying, unlocked to terminal device transmission Bootloader file.
In alternatively possible implementation, unlocking request includes the model, mark and terminal device of terminal device Buy information.
Optionally, authentication module 601, comprising:
Receiving submodule 6011, the unlocking request sent for receiving terminal apparatus;
Verify submodule 6012, model, mark and terminal for model and mark or terminal device to terminal device The purchase information of equipment is verified.
In the disclosure, server verifies the unlocking request in the unlocking request for receiving user, and logical in unlocking request It crosses after verifying, the bootloader file unlocked is sent to terminal device, so that terminal device can be carried out directly The replacement of bootloader file unlocks bootloader, and entire unlocking process is realized without PC, directly passes through terminal device It completes, realizes simply, reduce the difficulty of user's brush machine.In addition, need to provide the purchase information of terminal device when unlock, so that Other users other than owner can not unlock equipment, effectively prevent terminal device by the risk of malice brush machine.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Figure 10 is a kind of block diagram of tripper 900 shown according to an exemplary embodiment.For example, tripper 900 It can be mobile terminal.
Referring to Fig.1 0, tripper 900 may include following one or more components: processing component 902, memory 904, Electric power assembly 906, multimedia component 908, audio component 910, the interface 912 of input/output (I/O), sensor module 914, And communication component 916.
The integrated operation of the usually control tripper 900 of processing component 902, such as with display, call, data are logical Letter, camera operation and record operate associated operation.Processing component 902 may include one or more processors 920 to hold Row instruction, to perform all or part of the steps of the methods described above.In addition, processing component 902 may include one or more moulds Block, convenient for the interaction between processing component 902 and other assemblies.For example, processing component 902 may include multi-media module, with Facilitate the interaction between multimedia component 908 and processing component 902.
Memory 904 is configured as storing various types of data to support the operation in equipment 900.These data are shown Example includes the instruction of any application or method for operating on tripper 900, contact data, telephone directory number According to, message, picture, video etc..Memory 904 can by any kind of volatibility or non-volatile memory device or they Combination realize, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable Programmable read only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, quick flashing Memory, disk or CD.
Electric power assembly 906 provides electric power for the various assemblies of tripper 900.Electric power assembly 906 may include power supply pipe Reason system, one or more power supplys and other with for tripper 900 generate, manage, and distribute the associated component of electric power.
Multimedia component 908 includes the screen of one output interface of offer between the tripper 900 and user. In some embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch surface Plate, screen may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touches Sensor is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding The boundary of movement, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, Multimedia component 908 includes a front camera and/or rear camera.When tripper 900 is in operation mode, as clapped When taking the photograph mode or video mode, front camera and/or rear camera can receive external multi-medium data.It is each preposition Camera and rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 910 is configured as output and/or input audio signal.For example, audio component 910 includes a Mike Wind (MIC), when tripper 900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone It is configured as receiving external audio signal.The received audio signal can be further stored in memory 904 or via logical Believe that component 916 is sent.In some embodiments, audio component 910 further includes a loudspeaker, is used for output audio signal.
I/O interface 912 provides interface between processing component 902 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 914 includes one or more sensors, for providing the state of various aspects for tripper 900 Assessment.For example, sensor module 914 can detecte the state that opens/closes of tripper 900, the relative positioning of component, example As the component be tripper 900 display and keypad, sensor module 914 can also detect tripper 900 or The position change of 900 1 components of tripper, the existence or non-existence that user contacts with tripper 900, tripper 900 The temperature change of orientation or acceleration/deceleration and tripper 900.Sensor module 914 may include proximity sensor, be configured For detecting the presence of nearby objects without any physical contact.Sensor module 914 can also include optical sensor, Such as CMOS or ccd image sensor, for being used in imaging applications.In some embodiments, which may be used also To include acceleration transducer, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between tripper 900 and other equipment. Tripper 900 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.Show at one In example property embodiment, communication component 916 receives broadcast singal or broadcast from external broadcasting management system via broadcast channel Relevant information.In one exemplary embodiment, the communication component 916 further includes near-field communication (NFC) module, short to promote Cheng Tongxin.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, tripper 900 can be by one or more application specific integrated circuit (ASIC), number Word signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 904 of instruction, above-metioned instruction can be executed by the processor 920 of tripper 900 to complete the above method.Example Such as, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, soft Disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is held by the processor of device When row, so that device enough executes a kind of unlocking method, which comprises
Unlocking request is sent to server, unlocking request is for requesting unlock bootloader;
The bootloader file unlocked that server provides is obtained, the bootloader file unlocked is that unlock is asked It asks and is sent by server after the verifying by server;
Using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked, complete Bootloader unlock.
According to a kind of implementation of the disclosure, unlocking request is sent to server, comprising:
It is applied using the unlock that the manufacturer of terminal device provides to server and sends unlocking request.
According to another implementation of the disclosure, unlocking request includes the model and mark of terminal device.
According to another implementation of the disclosure, the bootloader file unlocked that server provides is obtained, packet It includes:
The purchase information of terminal device is sent to server;
When the purchase information of terminal device passes through server authentication, receive that server sends has been unlocked Bootloader file.
According to another implementation of the disclosure, unlocking request includes the model, mark and terminal device of terminal device Purchase information.
According to another implementation of the disclosure, replaced in terminal device not using the bootloader file unlocked The bootloader file of unlock, comprising:
Obtain the bootloader file replacement instruction for unlocking application and issuing that the manufacturer of terminal device provides;
Verify the signature of the bootloader file unlocked and the signature of unlock application;
When the signature verification of the signature of the bootloader file unlocked and unlock application passes through, using what is unlocked The bootloader file not unlocked in bootloader file replacement terminal device.
Figure 11 is a kind of block diagram of tripper 1900 shown according to an exemplary embodiment.For example, device 1900 can To be provided as a server.Referring to Fig.1 1, it further comprises one or more places that device 1900, which includes processing component 1922, Manage device and memory resource represented by a memory 1932, for store can by the instruction of the execution of processing component 1922, Such as application program.The application program stored in memory 1932 may include it is one or more each correspond to one The module of group instruction.In addition, processing component 1922 is configured as executing instruction, to execute above-mentioned unlocking method, this method comprises:
It obtains terminal device and sends unlocking request, and unlocking request is verified, unlocking request is for requesting unlock bootloader;
The bootloader file unlocked is sent to terminal device, the bootloader file unlocked is unlocking request Pass through what is sent after verifying.
According to a kind of implementation of the disclosure, unlocking request includes the model and mark of terminal device.
According to another implementation of the disclosure, the bootloader file unlocked is sent to terminal device, comprising:
The purchase information for the terminal device that receiving terminal apparatus is sent;
The purchase information of terminal device is verified;
When the purchase information of terminal device passes through verifying, the bootloader file unlocked is sent to terminal device.
According to another implementation of the disclosure, unlocking request includes the model, mark and terminal device of terminal device Purchase information.
Device 1900 can also include that a power supply module 1926 be configured as the power management of executive device 1900, and one Wired or wireless network interface 1950 is configured as device 1900 being connected to network and input and output (I/O) interface 1958.Device 1900 can be operated based on the operating system for being stored in memory 1932, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (21)

1. a kind of unlocking method, which is characterized in that the described method includes:
Unlocking request is sent to server, the unlocking request is for requesting unlock bootloader;
The bootloader file unlocked that the server provides is obtained, the bootloader file unlocked is institute It states and is sent by the server after the verifying that unlocking request passes through the server;
Using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked, complete Bootloader unlock;
Wherein, described using the bootloader text not unlocked in the bootloader file replacement terminal device unlocked Part, comprising:
Obtain the bootloader file replacement instruction for unlocking application and issuing that the manufacturer of the terminal device provides;
In response to the bootloader file replacement instruction, the signature of the verifying bootloader file unlocked and institute State the signature of unlock application;
When the signature verification of the signature of the bootloader file unlocked and the unlock application passes through, using described The bootloader file not unlocked in the bootloader file replacement terminal device unlocked.
2. the method according to claim 1, wherein described send unlocking request to server, comprising:
It is applied using the unlock that the manufacturer of the terminal device provides to the server and sends unlocking request.
3. method according to claim 1 or 2, which is characterized in that the unlocking request includes the type of the terminal device Number and mark.
4. according to the method described in claim 3, it is characterized in that, it is described obtain that the server provides unlocked Bootloader file, comprising:
The purchase information of the terminal device is sent to the server;
When the purchase information of the terminal device is by the server authentication, receive that the server sends has been unlocked Bootloader file.
5. method according to claim 1 or 2, which is characterized in that the unlocking request includes the type of the terminal device Number, mark and the terminal device purchase information.
6. a kind of unlocking method, which is characterized in that the described method includes:
It obtains terminal device and sends unlocking request, and the unlocking request is verified, the unlocking request is for that please solve Lock bootloader;
The bootloader file unlocked is sent to the terminal device, the bootloader file unlocked is described Unlocking request after verifying by sending;
Wherein, the bootloader file unlocked is used for the manufacturer when the terminal device in response to the terminal device The unlock application of offer issues the bootloader file replacement instruction, the verifying bootloader file unlocked The signature of signature and the unlock application, and the label of the signature of the bootloader file unlocked and the unlock application When name is verified, the bootloader file not unlocked in terminal device is replaced.
7. according to the method described in claim 6, it is characterized in that, the unlocking request include the terminal device model and Mark.
8. the method according to the description of claim 7 is characterized in that described send to the terminal device has unlocked Bootloader file, comprising:
Receive the purchase information for the terminal device that the terminal device is sent;
The purchase information of the terminal device is verified;
When the purchase information of the terminal device passes through verifying, the bootloader text unlocked is sent to the terminal device Part.
9. according to the method described in claim 6, it is characterized in that, the unlocking request include the terminal device model, The purchase information of mark and the terminal device.
10. a kind of tripper, which is characterized in that described device includes:
Request module, for sending unlocking request to server, the unlocking request is for requesting unlock bootloader;
Module is obtained, the bootloader file unlocked that provides for obtaining the server is described to have unlocked Bootloader file is sent after the verifying that the unlocking request passes through the server by the server;
Processing module, for what is do not unlocked in the use bootloader file replacement terminal device unlocked Bootloader file completes bootloader unlock;
Wherein, the processing module, comprising:
Acquisition submodule, the bootloader file that the unlock application that the manufacturer for obtaining the terminal device provides issues replace Change instruction;
Submodule is verified, in response to the bootloader file replacement instruction, verifying is described have been unlocked The signature of the signature of bootloader file and the unlock application;
Submodule is replaced, for when the signature of the bootloader file unlocked and the signature verification of the unlock application By when, the bootloader file that does not unlock in the bootloader file replacement terminal device that has been unlocked using described.
11. device according to claim 10, which is characterized in that the request module, for using the terminal device Manufacturer provide unlock apply to the server send unlocking request.
12. device described in 0 or 11 according to claim 1, which is characterized in that the unlocking request includes the terminal device Model and mark.
13. device according to claim 12, which is characterized in that the acquisition module, for being sent to the server The purchase information of the terminal device;
When the purchase information of the terminal device is by the server authentication, receive that the server sends has been unlocked Bootloader file.
14. device described in 0 or 11 according to claim 1, which is characterized in that the unlocking request includes the terminal device The purchase information of model, mark and the terminal device.
15. a kind of tripper, which is characterized in that described device includes:
Authentication module sends unlocking request for obtaining terminal device, and verifies to the unlocking request, and the unlock is asked It asks for requesting unlock bootloader;
Sending module, it is described to have unlocked for sending the bootloader file that has unlocked to the terminal device Bootloader file is the unlocking request by sending after verifying;
Wherein, the bootloader file unlocked is used for the manufacturer when the terminal device in response to the terminal device The unlock application of offer issues the bootloader file replacement instruction, the verifying bootloader file unlocked The signature of signature and the unlock application, and the label of the signature of the bootloader file unlocked and the unlock application When name is verified, the bootloader file not unlocked in terminal device is replaced.
16. device according to claim 15, which is characterized in that the unlocking request includes the model of the terminal device And mark.
17. device according to claim 16, which is characterized in that the sending module is used for:
Receive the purchase information for the terminal device that the terminal device is sent;
The purchase information of the terminal device is verified;
When the purchase information of the terminal device passes through verifying, the bootloader text unlocked is sent to the terminal device Part.
18. device according to claim 15, which is characterized in that the unlocking request includes the type of the terminal device Number, mark and the terminal device purchase information.
19. a kind of tripper, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
Unlocking request is sent to server, the unlocking request is for requesting unlock bootloader;
The bootloader file unlocked that the server provides is obtained, the bootloader file unlocked is institute It states and is sent by the server after the verifying that unlocking request passes through the server;
Using the bootloader file not unlocked in the bootloader file replacement terminal device unlocked, complete Bootloader unlock;
Wherein, described using the bootloader text not unlocked in the bootloader file replacement terminal device unlocked Part, comprising:
Obtain the bootloader file replacement instruction for unlocking application and issuing that the manufacturer of the terminal device provides;
In response to the bootloader file replacement instruction, the signature of the verifying bootloader file unlocked and institute State the signature of unlock application;
When the signature verification of the signature of the bootloader file unlocked and the unlock application passes through, using described The bootloader file not unlocked in the bootloader file replacement terminal device unlocked.
20. a kind of tripper, which is characterized in that described device includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
It obtains terminal device and sends unlocking request, and the unlocking request is verified, the unlocking request is for that please solve Lock bootloader;
The bootloader file unlocked is sent to the terminal device, the bootloader file unlocked is described Unlocking request after verifying by sending;
Wherein, the bootloader file unlocked is used for the manufacturer when the terminal device in response to the terminal device The unlock application of offer issues the bootloader file replacement instruction, the verifying bootloader file unlocked The signature of signature and the unlock application, and the label of the signature of the bootloader file unlocked and the unlock application When name is verified, the bootloader file not unlocked in terminal device is replaced.
21. a kind of computer readable storage medium, which is characterized in that the computer readable storage medium includes at least one finger It enables, when at least one instruction is executed by processor, perform claim requires the described in any item unlocking methods of 1-5.
CN201510998604.4A 2015-12-26 2015-12-26 Unlocking method and tripper Active CN105631254B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510998604.4A CN105631254B (en) 2015-12-26 2015-12-26 Unlocking method and tripper

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510998604.4A CN105631254B (en) 2015-12-26 2015-12-26 Unlocking method and tripper

Publications (2)

Publication Number Publication Date
CN105631254A CN105631254A (en) 2016-06-01
CN105631254B true CN105631254B (en) 2018-12-25

Family

ID=56046182

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510998604.4A Active CN105631254B (en) 2015-12-26 2015-12-26 Unlocking method and tripper

Country Status (1)

Country Link
CN (1) CN105631254B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203124A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 Operational approach and operation device, terminal are installed
CN106446629A (en) * 2016-09-13 2017-02-22 中国电子科技集团公司第三十二研究所 Security encryption method and system for intelligent mobile terminal
CN106375350B (en) * 2016-11-29 2020-12-29 北京小米移动软件有限公司 Flashing verification method and device
CN110113475A (en) * 2019-04-30 2019-08-09 大连睿海信息科技有限公司 Android system mobile phone screen lock crack method based on Lian Fa section MTK processor communication agreement
CN112003982B (en) * 2020-08-12 2021-08-24 厦门市美亚柏科信息股份有限公司 Mobile phone unlocking method and system based on chip detachment
CN112363662B (en) * 2020-11-26 2022-04-08 深圳创维-Rgb电子有限公司 Screen locking and unlocking method of display screen, display terminal and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750100A (en) * 2012-06-20 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Terminal and method for identifying operating system of terminal
CN103019775A (en) * 2012-11-28 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for flashing for terminal equipment
CN104765607A (en) * 2015-04-01 2015-07-08 闻泰通讯股份有限公司 Compiling-free reinstalling package correcting method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102750100A (en) * 2012-06-20 2012-10-24 宇龙计算机通信科技(深圳)有限公司 Terminal and method for identifying operating system of terminal
CN103019775A (en) * 2012-11-28 2013-04-03 北京小米科技有限责任公司 Method, device and equipment for flashing for terminal equipment
CN104765607A (en) * 2015-04-01 2015-07-08 闻泰通讯股份有限公司 Compiling-free reinstalling package correcting method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"华为荣耀畅玩4X解锁教程bootloader解锁教程";pgaotehuai33;《百度经验》;20141125;第1-3页 *

Also Published As

Publication number Publication date
CN105631254A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN105631254B (en) Unlocking method and tripper
KR101766987B1 (en) Method, device, program and recording medium for certification of operation
CN104202306A (en) Method, device and system of access authentication
CN104866750A (en) Method and device for starting application
CN104484200A (en) Method and device for updating firmware
CN105791309B (en) A kind of method, apparatus and system executing business processing
US9892249B2 (en) Methods and devices for authorizing operation
CN104933351A (en) Information security processing method and information security processing device
JP2018518721A (en) Information transfer control method, apparatus, smart terminal, program, and recording medium
EP3407278A1 (en) Method and apparatus for reporting loss of card or device associated with account number or stolen of account number
CN105871913A (en) Identity authentication method and system
CN105407070A (en) Logging-in authorization method and device
CN104468581B (en) The method and device of login application program
CN104639533A (en) Safety control method and device based on terminal
CN106204029A (en) The method and apparatus of Quick Response Code payment
CN105511922A (en) Application startup controlling method and device
CN104158665A (en) Method and device of verification
CN106600768A (en) Intelligent door lock authentication method, device and terminal
CN104125267A (en) Account protection method, device and terminal equipment
CN107395624A (en) Information processing method and device
CN108600238B (en) Method, device and system for transmitting card data
CN107071008A (en) Localization method, device and the equipment of terminal device
CN106375350A (en) Recovery verification method and device
CN106293717A (en) The processing method of the setting of terminal, device and terminal
CN105809052A (en) Binding information recording method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant