CN108494944B - Terminal device and control method - Google Patents

Terminal device and control method Download PDF

Info

Publication number
CN108494944B
CN108494944B CN201810106073.7A CN201810106073A CN108494944B CN 108494944 B CN108494944 B CN 108494944B CN 201810106073 A CN201810106073 A CN 201810106073A CN 108494944 B CN108494944 B CN 108494944B
Authority
CN
China
Prior art keywords
information
storage terminal
content
preset
preset condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810106073.7A
Other languages
Chinese (zh)
Other versions
CN108494944A (en
Inventor
巩玉敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meizu Technology Co Ltd
Original Assignee
Meizu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meizu Technology Co Ltd filed Critical Meizu Technology Co Ltd
Priority to CN201810106073.7A priority Critical patent/CN108494944B/en
Publication of CN108494944A publication Critical patent/CN108494944A/en
Application granted granted Critical
Publication of CN108494944B publication Critical patent/CN108494944B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a terminal control method, which comprises the following steps: a first storage terminal acquires first information, wherein the first information originates from the outside of the first terminal and has security relevance with the first storage terminal; judging whether the information carried outside the content of the first information meets a first preset condition or not; and if so, executing a first operation and keeping the validity of a first state associated with the judgment result of the first preset condition and the information carried except the content meeting the first information within a preset time. The risk of data loss caused by the fact that the first storage terminal cannot be operated is reduced. The invention also discloses corresponding terminal equipment.

Description

Terminal device and control method
Technical Field
The present invention relates to the field of communications, and in particular, to a terminal device and a control method.
Background
In the prior art, mobile terminals, especially mobile phones, have been widely popularized, become daily indispensable devices for people, and have a very high frequency of use. Moreover, for a touch screen mobile phone, with the continuous development of mobile phone products, the screen occupation ratio becomes larger and larger, and the risk of screen breakage is larger and larger.
Once the screen is broken, the user cannot operate the mobile phone, and important materials in the mobile phone, such as photos, videos, files, address books and other information, are difficult to effectively retrieve. Of course, except for the case where there is an original backup. In the prior art, users generally connect a mobile phone to a computer in order to export data.
However, the mobile phone is often in a locked state, and the computer does not have the right to read data from the mobile phone at this time, and the user cannot operate the screen, so that the user cannot input a password to unlock the mobile phone; or, although the mobile phone is in the unlocked state, the mobile phone is not set in the MTP (media device) mode, and thus data in the mobile phone cannot be read.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a method for reducing the risk caused by the failure of data retrieval.
Based on this, the invention provides a terminal control method, comprising:
a first storage terminal acquires first information, wherein the first information originates from the outside of the first terminal and has security relevance with the first storage terminal;
judging whether the information carried outside the content of the first information meets a first preset condition or not;
and if so, executing a first operation and keeping the validity of a first state associated with the judgment result of the first preset condition and the information carried except the content meeting the first information within a preset time.
Wherein the information carried outside the content of the first information comprises the source of the first information and/or the amount of the first information.
Judging whether the content of the first information meets a second preset condition or not;
if the first preset condition and the second preset condition are both met, executing the first operation and keeping the validity of a first state associated with the judgment result of the first preset condition and the information carried except the content meeting the first information and the judgment result of the second preset condition within a preset time.
Wherein the first operation includes opening a first right of the first storage terminal.
Wherein the maintaining of the validity of the first state associated with the judgment result that the first preset condition and the information carried in addition to the content of the first information are satisfied within the preset time includes: the first right is kept permanently open.
The first permission comprises permission for reading data of the first storage terminal, and the first storage terminal is an operation-disabled device.
Wherein the first preset condition comprises at least one of the following conditions:
the first information is derived from a storage record of the first storage terminal;
the first information is sourced from the storage records of the first storage terminal, and the quantity of the first information is greater than or equal to a first value;
the number of the first information is greater than or equal to a second value.
Wherein the second preset condition comprises at least one of: the content of the first information conforms to a preset format, and a first field of the content of the first information is consistent with first data in the first storage terminal.
The first operation comprises unlocking the first storage terminal and setting the first storage terminal to be in an MTP mode.
Correspondingly, the invention further provides a terminal device, which comprises a processor and a memory, wherein the memory stores computer executable codes, and the processor executes the computer executable codes to realize the method of any technical scheme.
In the invention, the user identity can be verified by utilizing the information sent from the outside, so that the first storage terminal can open the authority, and further other equipment can read the data in the first storage terminal. Therefore, the risk of data loss caused by the fact that the first storage terminal cannot be operated is reduced.
Drawings
FIG. 1 is a schematic diagram of one embodiment of an apparatus of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the terminal control method comprises the following steps:
step 1: the method comprises the steps that a first storage terminal acquires first information, wherein the first information originates from the outside of the first terminal and has security relevance with the first storage terminal.
The terminal may be a handheld mobile terminal such as a mobile phone, a tablet computer, and the like. In one embodiment of the present invention, the first storage terminal is a terminal that is inoperable, i.e., the user cannot control the terminal through normal operation. For example, for a mobile phone with a touch screen, a touch failure of the touch screen may cause a user to be unable to operate the mobile phone, and at this time, the mobile phone is an inoperable terminal; for touch screen failure, it can be caused by external force, such as impact causing screen rupture, or self failure.
As for the manner of acquiring the first information by the first storage terminal, it may be acquired by wireless communication, for example, acquired from the base station side through a mobile communication network, or acquired from another terminal or a hot spot through a short-range wireless communication network. For the case of obtaining from the base station side through the mobile communication network, it may be to obtain a short message transmitted through a signaling channel as the first information, or to obtain an instant message/mail or the like transmitted through a data channel as the first information. It is understood that even messages/mails or the like as described above may be acquired as the first information in a manner of passing through a short-range wireless communication network.
The following description will focus on short messages as an example, it being understood that the same applies to other types of information.
The first information is information originated from outside the first storage terminal, that is, the information originally stored in the first storage terminal does not belong to the first information. In addition, the first information is not arbitrary information, and is primarily related to the security of the first storage terminal, and if the first information is not related to the security of the first storage terminal, it does not belong to the first information described herein.
For the security association between the first information and the first storage terminal, the association manner is various and may be a preset information type. For example, when a short message is determined as the first message, the short message is associated with the security of the first storage terminal, and a message other than the short message, such as an instant message, is not associated with the security of the first storage terminal. For example, if the first information is sent to the first storage terminal through the information channel of the mobile communication network, the first information is information associated with the security of the first storage terminal according to a preset setting, and if the first information is received from the short-range wireless communication network at this time, only the information received through the mobile communication network is associated with the security according to the preset setting, so that the first information received from the short-range wireless communication network is considered not to be associated with the security.
This has the advantage that unnecessary interference can be eliminated, the information security of the first storage terminal is improved, and the processing efficiency can also be improved.
Step 2: judging whether the information carried outside the content of the first information meets a first preset condition or not;
and if so, executing a first operation and keeping the validity of a first state associated with the judgment result of the first preset condition and the information carried except the content meeting the first information within a preset time.
The content of the first information as referred to herein may refer to a portion of the first information that carries user-level value in a particular way in a typical usage scenario. For example, in the case of a short message, the part of the short message viewed by the user is the content of the first message, and in the case of a short message sent from the base station to the terminal, the part of the signaling format added thereto is not considered to be the content of the first message. One specific example is: the first storage terminal receives the first information, the first information is a short message, the short message is that the user A sends the user B (the holder of the first storage terminal) that the user B means to inquire whether to eat dinner home or not, and then the user A edits the content of the short message, and the short message is 'do you go home to eat dinner or not in the evening'? ". After the first storage terminal receives the short message, the part in the quotation mark is considered as the content of the first message.
Similarly, the same is true for the receipt of WeChat messages, where the portion of the user-level value conveyed by the WeChat message is content. This is similar to a short message.
In addition to the content of the first information, the content of the first information may be determined based on the above explanation, and after it is determined what the content of the first information is, the content of the first information may be regarded as the content of the first information excluding the other parts after being related to the content of the first information.
In the embodiment of the present invention, the content of the first information may refer to a source of the first information, where the source may refer to a source of a user plane, and may also refer to a source of a communication plane. For the source at the user level, the user name (another user, for example, name of zhang san, lie si, etc.) or the phone number (for example, phone number) of the sender of the first information may be referred to; for the source of the communication plane, it may refer to a MAC address or an IP address or a gateway address, etc. of the sender of the first information.
In a further embodiment of the invention, the first information may be other than its content, for example, the amount of the first information. It is to be understood that the first message may comprise one or more specific messages, for example, the first message may comprise a plurality of short messages or a plurality of micro-message messages; this is the number of short messages or micro messages.
Of course, in the embodiment of the present invention, the above two schemes other than the content of the first information may be combined, that is, both the source and the quantity of the first information are included.
The first preset condition in this step may be, based on the user plane source of the first information, to determine whether the phone number of the sender of the first information is a phone number already stored in a storage record (e.g., an address book, a call record, etc.) of the first storage terminal; further, it may be determined whether the sender phone number is a phone number of a specific group in the storage record of the first storage terminal, such as a parent group.
For the situation that the storage record is a call record, the situation that the first storage terminal cannot be rescued because a certain telephone number is not stored in the address book can be solved, and in the situation, a user only needs to dial the telephone number of the first storage terminal first to enable the certain telephone number to exist in the call record. Thereby, the feasibility of rescue is improved and the efficiency is improved.
As for the communication layer source of the first information, it may be determined whether the MAC address of the sender device of the first information is in a preset MAC address list, or it may be determined whether the IP address of the sender device is in a preset IP address list.
In the embodiment of the present invention, in the description of the first preset condition corresponding to the source of the first information, a time element may be further added. That is, it is determined whether the source of the first message meets the limitation of the source part in the first predetermined condition within a predetermined time or within a predetermined time period or at a predetermined time point. This increases the reliability of the determination, and the security of the first storage terminal.
Based on the above, the content of the first information is not limited to the number, and the first preset condition may be to determine whether the number of the first information meets a preset number requirement, for example, the number of the first information reaches 3. Similarly, a time factor may be added, that is, whether the quantity of the first information meets the limitation of the quantity part in the first preset condition within a preset time or a preset time period or a preset time point or a regular time is judged. This also increases the reliability of the determination, and thus the security of the first storage terminal.
In a further embodiment of the invention, the determination of the first predetermined condition combines the source of the first information and the amount of the first information. That is, the source of the first information and the amount of the first information need to satisfy both the source and the amount specified in the first preset condition. This dual authentication helps to improve security. Meanwhile, if the time element is added, the triple verification can better guarantee the requirement on safety.
The first operation in this step is, in the embodiment of the present invention, to open the first authority of the first storage terminal. And the first authority may be an authority to read data in the first storage terminal. For maintaining the validity of the first state associated with the judgment result of the first preset condition and the information carried by the first information except the content meeting the first information within the preset time, the first state associated with the judgment result is a meaningful state or setting for subsequently rescuing the first storage terminal, and may correspond to the specific content of the first operation, for example, if the first operation is opening the first right, the first state is a state where the first right exists and is valid; the preset time highlights the state or the setting timeliness which is meaningful for rescuing the first storage terminal, so that the safety and the convenience are improved.
For validity within a predetermined time, maintaining permanent validity may be included in embodiments of the present invention. Therefore, the user can read the data in the first storage terminal at any time. Meanwhile, the first storage terminal can be used as a USB flash disk on the premise that the user does not want to repair the inoperability of the first storage terminal, and therefore the use efficiency and the economy are improved.
In the embodiment of the present invention, this step may specifically include permanently opening the right to read the data of the first storage terminal. The permanent opening represents the validity within a preset time, and the right to read the data of the first storage terminal can be understood as an enabled state, i.e. the first state.
In an embodiment of the present invention, for the case that the first storage terminal is a mobile phone, when the step is executed, when the USB connection mode originally set in the mobile phone is a non-MTP mode (for example, the USB charging mode), the connection mode is set to the MTP mode and is kept permanently valid, so as to ensure that the user can read the content in the mobile phone through the USB connection at any time.
When the connection mode set in the original mobile phone is originally the MTP mode, the MTP mode is maintained and set to be permanently effective when the first preset condition is judged to be satisfied.
Of course, in another embodiment of the present invention, the preset time is not limited to be permanently valid for validity within the preset time, and may be any time preset. More specifically, the setting of the preset time is embodied in the content of the first information, that is, the preset time is recorded in the content of the first information, and the first storage terminal enables the setting of the preset time after parsing the preset time in the first information.
It should be noted that, when the first storage terminal is in the locked state, if it is determined that the first preset condition is met, the first storage terminal is unlocked first and the unlocked state within the preset time is maintained. At this time, the unlock state may be considered as the first state, which is associated with the determination result. And then, setting the USB connection mode of the first storage terminal as the MTP mode. At this time, both the unlocked state and the state of the MTP mode may be considered as the first state.
Through the steps, the user can read the data in the first storage terminal according to the requirement of the user, and the risk caused by data loss is avoided.
In another embodiment of a terminal control method according to the present invention, on the basis of the above embodiment, the present embodiment adds a judgment on a second preset condition. Specifically, it is determined whether the content of the first information satisfies a second preset condition.
In this embodiment, it is determined whether the content of the first information satisfies a second preset condition, and if so; when the information carried outside the content of the first information also meets the first preset condition, that is, when the first preset condition and the second preset condition are both met, and the judgment result is positive, the first operation is executed and the validity of the first state associated with the judgment result meeting the first information and the first preset condition and the judgment result meeting the first information and the second preset condition within the preset time is maintained.
That is, the first state is associated with two determination results, and the association is shown here that the determination results are both positive, that is, two preset conditions are simultaneously satisfied.
For the content of the first information, in one embodiment of the invention, it may refer to a portion of one information having a user-level value. Continuing with the example of the above embodiment, a short message "do you go home and eat dinner at tonight? The part within the quotation mark is the part with user-level value, i.e. the content itself that is meaningful for the average end user.
For the second preset condition, in the embodiment of the present invention, it may be at least one of the following:
the method comprises the following steps that firstly, the content of first information accords with a preset format;
secondly, a first field of the content of the first information is consistent with first data in the first storage terminal;
and thirdly, the content of the first information accords with the preset format, and the first field of the content of the first information is consistent with the first data in the first storage terminal.
For condition one: the content of the first information conforms to a preset format, where the preset format may be a syntax rule of the content itself, or an arrangement rule of the content itself, or a semantic rule of the content itself, or a character of the content itself, and so on.
For example, the content of the first information may be content — "# 9527 #", in the quotation mark. The second predetermined condition may then be a rule that starts with # #andends with # with four digits in between.
As another example, the content of the first information may be the content in the quotation mark- "abcdef". The second preset condition may be a character string of at least 5 characters or more arranged in the order of the english alphabet.
As another example, the content of the first information may be content in a quotation mark, which is "rescue mobile phone acquisition right". The second preset condition may be that the content includes the meaning expression of the rescue and acquisition right.
As yet another example, the content of the first information may be the content in the quotation mark- "skjfasfa Ω". And the second preset condition may be that the content includes the omega character.
For condition two: the first field of the content of the first information is identical to the first data in the first storage terminal. Here, the first data in the first storage terminal may refer to a password of an open right of the first storage terminal, and the right may be a right to read data in the first storage terminal as described above, for example, unlocking a mobile phone and setting the mobile phone to an MTP connection mode.
The first field may be a specific field in the content of the first message when the first message is edited by the pre-rule. Examples are as follows:
the content of the first information may be the content in the quotation marks ". x 9527XXXX 7259", in which case the second predetermined condition may be starting with a first set of four digits, followed by ending with a first set of four digits and immediately preceding the ending with a second set of four digits, the first set of four digits and the second set of four digits including a set of characters therebetween, the first set of four digits and the second set of four digits being in a mirror image relationship with the set of characters as the center. And the set of characters is the first field conveyed in the content of the first information.
For condition three: the combination of condition one and condition two is used, and on the basis of the description of condition one and condition two, the skilled person can know how to combine condition one and condition two, and therefore the details are not repeated herein.
It should be noted that, the first field mentioned in the second condition is consistent with the first data, and the fact is that the validity is verified, after the verification is passed, if the original first storage terminal is in the locked state, the unlocking is performed at this time, and if the connection mode of the original first storage terminal is a mode other than the MTP mode, such as a charging mode, the MTP mode is set at this time.
The unlocked state and the state of the MTP connection mode can be referred to as the first state, and the time effectiveness of the first state can be referred to as the above description.
The existence of the second preset condition further verifies the acquisition of the authority on the content level, and the safety of data reading is improved.
It should be noted that, for information carried in addition to the content of the first information, the MAC address, the IP address, the telephone number, and the like described in the above embodiments may be put into the content of the first information to be determined, and only the positions where the information is extracted are different.
In addition, for the embodiment represented by the second preset condition, it may not be related to the embodiment represented by the first preset condition. That is, the first operation is performed only by judging the content of the first information, the first state is maintained to be valid, and the like. Since the person skilled in the art will know how to operate on the basis of the above description, no further description will be given.
A usage scenario is described in detail below by taking the first storage terminal as a mobile phone as an example:
due to the fact that the mobile phone Ta of the user A is carelessly used, the mobile phone Ta falls to the ground, the screen of the mobile phone Ta is broken, the display screen cannot display the mobile phone Ta, and the touch screen is also out of order. However, the important information of the user a is stored in the mobile phone Ta, and the user a tries to derive the important information in the mobile phone Ta.
Then, the user a connects the mobile phone Ta to the computer through the USB connection line. However, since the mobile phone Ta is unlocked, the computer cannot read the data in the mobile phone Ta after being connected to the computer. Also, the user a recognizes that even if the mobile phone Ta is unlocked, since it has previously set the USB connection mode of the mobile phone Ta to the charging mode, data cannot be read.
At this time, the user A finds that the mobile phone numbers of 4 colleagues A, B, C and D, and 4 colleagues A, B, C, D and E are stored in the address list. The user a makes the 4 colleagues edit a short message, and the content is ". about. 9527556677887259". After receiving the short message, the mobile phone Ta of the user a first judges whether the sources of the 4 short messages, namely the mobile phone number of the epdm is in the address list of the local phone, and counts 4 at this time after judging.
Then, the mobile phone Ta determines whether the contents of the four short messages meet a second preset condition, that is, according to the rule: beginning with a first set of four digits followed by a first set of four digits, ending with a second set of four digits followed by an ending with a second set of four digits, the first and second sets of four digits comprising a set of characters therebetween, the first set of four digits and the second set of four digits being in mirror image relation centered on the set of characters. And the characters between the first group of four digits and the second group of four digits are the unlocking password.
After judgment, the four short messages all meet the rule, and the extracted decoding password is consistent with the unlocking password stored in the mobile phone Ta.
Then, the mobile phone Ta considers that both the first preset condition and the second preset condition are satisfied, so that the mobile phone Ta is automatically unlocked, and the USB connection mode of the mobile phone Ta is set to the MTP mode. And the time-effectiveness is set to be permanent.
At this time, the user a can smoothly read the data in the mobile phone Ta after connecting the mobile phone Ta to the computer.
In another embodiment of the invention, based on the above description, to avoid others (e.g. epdm) reading data in the handset Ta jointly. After or before the user A reads the data of the mobile phone Ta, a user interface is output to the computer of the user A to receive a new password input by the user A, and the mobile phone Ta can replace the original password after receiving the new password. In this way, the aforementioned risk of data theft is avoided.
It is noted that for the data transfer of the first storage terminal, it may be based on the USB connection as described above, or may be based on a wireless connection. In general, any manner of connection and transmission is contemplated.
The present application also includes several embodiments that may be used in combination with the above embodiments, and further description of the combination is not provided herein since it will be apparent to those skilled in the art based on the description of how the combination may be made:
step 1, establishing communication connection between a first storage terminal and a second storage terminal;
the first storage terminal may be any electronic device with storage and control functions, such as a mobile phone, a tablet computer, a wearable device, and the like. The second storage terminal may be any electronic device with a storage function, such as a usb disk, a mobile hard disk, a mobile phone, a tablet computer, a hard disk, and so on.
In this step, the first storage terminal and the second storage terminal are first physically connected, for example, through a USB transmission medium, although other suitable methods may be adopted, and the present invention is not limited to specific connection and transmission method/protocol. Thereafter, a data communication connection, such as the USB communication connection described hereinabove, between the first storage terminal and the second storage terminal is created according to existing device discovery and connection establishment mechanisms.
In one embodiment of the invention, the first storage terminal is an inoperable device. By inoperable device, it may be meant an inoperable device due to some malfunction or accident. For example, for a terminal including a touch screen, it may be the case that the touch screen fails, or other faults of the touch screen cause the touch signal to be unrecognizable; the display screen failure may also be the case, which mainly means that the display screen failure causes the content to be unable to be displayed, specifically, for example, the screen is broken, and at this time, the user cannot see the operated object, so the operation is also the case of being unable.
And for the second storage terminal, it can be referred to as a rescue device. On which data needed for rescue are stored, i.e. needed for rescue of the first storage device. Therefore, the requirement on the device performance of the second storage device is not high, as long as the data required for rescue can be stored. In an embodiment of the present invention, the second storage terminal is an OTG device, so that the first storage terminal can be used as a host device to read data from the second storage terminal.
And 2, searching data meeting preset conditions in the second storage terminal by the first storage terminal, and taking the data meeting the conditions as first data.
Based on the fact that the communication between the first storage terminal and the second storage terminal in the previous step is not obstructed, the first storage terminal does the search in the second storage terminal in the current step.
The preset condition may be, in some embodiments of the present invention, a preset name (e.g., a file name), a preset date (e.g., a file created/modified on the current day), a preset format, a preset storage address, and the like. In short, as long as a certain data on the second storage terminal can be locked through the predetermined condition, what index is adopted for locking can be determined according to actual needs.
It should be noted that the data meeting the preset condition may be organized and stored in a file, and the file stores data required for rescue. Therefore, in this case, the search for data meeting the preset condition in this step may also be regarded as a search for a file meeting the preset condition, and the data is found when the file is found and is taken as the first data.
In another embodiment of the present invention, the data meeting the preset condition may also be organized and stored in a non-file manner, and only stored in the data itself. For example, in the case of presetting a storage address at the time of presetting a condition, it may be predetermined which sector/physical page/physical address, etc. of the storage space of the second storage terminal stores data required for rescue, which is a manner that the data is not organized in the form of a file but is in a data structure such as through various data volumes or data chains.
In any case, whatever the presentation, once the data is found, it is treated as the first data.
Step 3, the first storage terminal reads the first data in the second storage terminal;
in this step, after the connection establishment is completed in the previous step, the first storage terminal is used as a master device to read the first data in the second storage terminal.
The first data may be plaintext data, or may be data encrypted by a predetermined encryption method, where the plaintext or encryption is rejected from the requirement on the security level. If the data is encrypted, the first storage terminal may decrypt the first data after reading the first data, or may not decrypt the first data, depending on what the object is determined in the subsequent determination step, and if the determined object is plaintext data, decryption is required, and if the determined object is encrypted data, decryption may not be required.
And 4, judging whether the first data is consistent with preset data in the first storage terminal, if so, executing a first operation and keeping the validity of a first state associated with a judgment result that the first data is consistent with the preset data within preset time.
As is apparent from the above description, if it is agreed in advance that it is data in the clear, the preset data is also in the clear, which is directly compared with the first data; if the encrypted data is agreed in advance, the first data needs to be decrypted and then compared with the preset data, or the encrypted data can be directly compared in some encryption algorithms, and if the encrypted data is consistent, the data before encryption can be considered to be consistent, in this case, the encrypted first data is not decrypted, but directly compared with the preset data (obviously, the encrypted data).
In an embodiment of the present invention, the preset data in the first storage terminal is a password for obtaining the authority thereof, such as an unlocking password, a password for changing a connection mode between two terminals (MTP, PTP (camera picture transmission mode), charging mode), and the like.
For the description of this step, the following cases are also needed:
case 1: if the first storage terminal is connected with the second storage terminal in a USB mode, the first storage terminal is in a locking state, but the mode of the USB connection is an MTP mode; then, the preset data may be a password for releasing the locking state of the first storage terminal, that is, an unlocking password;
case 2: if the first storage terminal is connected with the second storage terminal in a USB mode, the first storage terminal is in a locking state, and the USB connection mode is a non-MTP mode; then, the preset data may also be a password for releasing the locking state of the first storage terminal, that is, an unlocking password; however, the unlocking password is used to change the USB connection mode. Based on this, the following steps may need to be added:
when the first storage terminal is in the MTP mode, the first storage terminal is unlocked and the connection mode of the first storage terminal is changed to the MTP mode.
Case 3: if the first storage terminal is connected with the second storage terminal in a USB mode, the first storage terminal is in an unlocked state, but the USB connection mode is a non-MTP mode; then, the preset data may be a password for changing the mode of the USB connection to the MTP mode. And when the first data is detected to be consistent with the password and the first storage terminal is in the unlocking state, modifying the connection mode into an MTP mode.
It should be noted that, in some cases, the password for unlocking and the password for changing the connection mode to MTP may be the same. That is, when the first data is consistent with the preset data, the unlocking is performed first, and if the first data is already in the unlocking state, the unlocking is skipped, and then the connection mode is changed to the MTP mode.
In this step, when the first data is consistent with the preset data, in order to ensure smooth progress of the rescue work, the settings related to the guarantee of the smooth progress of the rescue work are maintained to be valid. This step is stated to be valid for a preset time, which can be set as desired. In one embodiment of the invention, will remain permanently effective. For example, the unlocked state described above is permanently active, the setting of the MTP mode is permanently active, and so on.
The first operation in this step is an action of removing obstacles to ensure that the rescue work is smoothly performed. For example, as described above, the obstacle may be that the first storage terminal is locked, or the connection mode of the first storage terminal is a non-MTP mode, etc. The first operation is performed as an obstacle-removing operation, and the state in which the first operation is effective to ensure that the rescue work is performed smoothly may be maintained in some cases.
Of course, the first state may be one state or a group of states, and this is not limited herein. The "associated with the judgment result that the first data is consistent with the preset data" in this step may be understood as being influenced by the judgment of consistency. For example, what is affected by the password consistency determination is the trip of the unlock state and the setting of the MTP mode.
It is to be understood that the reference to passwords in the present invention is a broad concept and any one that can implement rights verification is within the scope of the present invention, such as key files and the like.
It should be noted that, for different operating systems and different protocol support cases, the purpose of the MTP mode is to enable an external device to read internal data of the first storage terminal. Therefore, the present invention is not limited to the MTP mode itself, and any transmission mode/connection mode, etc. that enables an external device to read the internal data of the first storage terminal are within the scope of the present invention.
It is to be understood that the present invention does not limit the sequence of the above steps, and it is within the protection of the present invention to change the execution sequence to solve the technical problem of the present invention.
In another embodiment of the present invention, the following scheme may be adopted:
1. and opening the voice assistant by long pressing a home key, and enabling the user to speak out the password as required and then unlocking the mobile phone.
2. The screen-breaking mobile phone verifies the password spoken by the user through the voice assistant, the unlocking broadcast is sent out after the verification is passed, and after receiving the unlocking broadcast, the MTP informs the media storage to set a mark for unlocking the user and starts the MTP mode. Once unlocking, the method is permanent and effective, and the mobile phone is in an MTP mode after being restarted.
3. After the MTP mode is started, the computer is connected, the user mobile phone memory disc is displayed on the computer, and the user can normally operate the file to copy and backup the file to the computer.
4. In addition, after unlocking, a user can also use the screen-breaking mobile phone as a USB flash disk, and the equipment utilization rate is improved.
In an embodiment of the terminal device of the present invention, referring to fig. 1, the terminal 6000 may be various handheld devices (e.g., mobile phone, tablet, PDA, etc.), which may include one or more processors of a processing core, radio frequency circuits, a memory including one or more computer readable storage media, an input device, a display device, a sensor, an audio circuit, a WiFi module, and a power supply, etc. Those skilled in the art will appreciate that the configuration of the terminal 6000 in this embodiment is not limiting and may include more or fewer components or some components in combination or a different arrangement of components. Wherein:
the radio frequency circuit can be used for receiving and transmitting information or receiving and transmitting signals in a communication process, and particularly, downlink information of a base station is received and then is transmitted to one or more processors for processing; in addition, data relating to uplink is transmitted to the base station. Typically, the radio frequency circuitry includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the radio frequency circuitry may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), email, SMS (Short Messaging Service), and the like.
The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 6000, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide access to the memory by the processor and the input device.
The input device may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input device may include a touch-sensitive surface as well as other input devices. The touch-sensitive surface, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (e.g., operations by a user on or near the touch-sensitive surface using a finger, a stylus, or any other suitable object or attachment) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch sensitive surface may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch detection device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor, and can receive and execute commands sent by the processor. In addition, touch sensitive surfaces may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input device may include other input devices in addition to touch sensitive surfaces. In particular, the other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display device may be used to display information input by or provided to the user and various graphical user interfaces of the terminal 6000, which may be constituted by graphics, text, icons, video and any combination thereof. The Display device may include a Display panel, and optionally, the Display panel may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface may overlie the display panel, and when a touch operation is detected on or near the touch-sensitive surface, the touch operation is transmitted to the processor to determine the type of touch event, and the processor then provides a corresponding visual output on the display panel in accordance with the type of touch event. Although in the present embodiment the touch sensitive surface and the display panel are implemented as two separate components for input and output functions, in some embodiments the touch sensitive surface may be integrated with the display panel for input and output functions.
The terminal 6000 can also include at least one sensor such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel according to the brightness of ambient light, and a proximity sensor that may turn off the display panel and/or the backlight when the terminal 6000 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal 6000, detailed descriptions thereof are omitted.
Audio circuitry, a speaker, and a microphone may provide an audio interface between the user and the terminal 6000. The audio circuit can transmit the electric signal converted from the received audio data to the loudspeaker, and the electric signal is converted into a sound signal by the loudspeaker to be output; on the other hand, the microphone converts the collected sound signal into an electrical signal, which is received by the audio circuit and converted into audio data, which is then output to the processor for processing, and then transmitted to another device via the rf circuit, or the audio data is output to the memory for further processing. The audio circuitry may also include an ear-bud jack to provide communication of a peripheral headset with the terminal 6000.
WiFi belongs to short-distance wireless transmission technology, and the terminal 6000 can help a user to receive and send e-mails, browse webpages, access streaming media and the like through a WiFi module, and provides wireless broadband internet access for the user. Although a WiFi module is given in the present embodiment, it is understood that it does not belong to the essential constitution of the terminal 6000, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor is a control part of the terminal 6000, connects the respective parts by using various interfaces and lines, and executes various functions of the terminal 6000 and processes data by operating or executing software programs and/or modules stored in the memory and calling data stored in the memory, thereby integrally monitoring the mobile phone. Optionally, the processor may include one or more processing cores; preferably, the processor may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor.
The terminal 6000 may also include a power supply (e.g., a battery) for powering the various components, and preferably the power supply may be logically coupled to the processor through a power management system that may manage charging, discharging, and power consumption. The power supply may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
Although not shown, the terminal 6000 may further include a camera, a bluetooth module, and the like, which will not be described herein. Specifically, in this embodiment, the display device of the terminal 6000 is a touch screen display, and the terminal 6000 further includes a memory and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors to implement the methods in the above method embodiments.
In an embodiment of the storage medium of the present invention, one or more computer readable program codes are stored thereon, which when executed, may implement the various functions of the above method embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A terminal control method, comprising:
a first storage terminal acquires first information, wherein the first information originates from the outside of the first storage terminal and has security relevance with the first storage terminal; the first storage terminal is an operation-disabled device; the association mode of the first information and the first storage terminal is a preset information channel;
judging whether the information carried outside the content of the first information meets a first preset condition or not; the information carried outside the content of the first information includes the amount of the first information; the first preset condition comprises that the quantity of the first information meets a preset quantity;
judging whether the content of the first information meets a second preset condition or not; the second preset condition comprises that a first field of the content of the first information is consistent with first data in the first storage terminal;
if the first preset condition and the second preset condition are both met, executing a first operation and keeping the validity of a first state associated with the judgment result of the first preset condition and the information carried except the content meeting the first information and the judgment result of the second preset condition within a preset time; the first operation includes opening a first right of the first storage terminal.
2. The method of claim 1, wherein the information carried in addition to the content of the first information further comprises a source of the first information.
3. The method of claim 1, wherein the setting of the preset time is embodied in the content of the first information.
4. The method according to claim 1, wherein the maintaining validity of the first state associated with the judgment result of the first preset condition and the judgment result of the second preset condition and the content satisfying the first information for a preset time comprises: the first right is kept permanently open.
5. The method according to claim 3 or 4, wherein the first right comprises a right to read data of the first storage terminal.
6. The method of claim 2, wherein the first preset condition further comprises:
and the telephone number of the sender of the first information is stored in the storage record of the first storage terminal, or the MAC address or the IP address of the equipment of the sender of the first information is stored in a preset MAC address list or an IP address list.
7. The method according to claim 1, wherein the second preset condition further comprises: the content of the first information conforms to a preset format.
8. The method of claim 1, wherein the first operation comprises unlocking the first storage terminal and setting the first storage terminal to MTP mode.
9. A terminal device comprising a processor and a memory, the memory storing computer executable code, the processor executing the computer executable code to implement the method of any one of claims 1 to 8.
10. A computer-readable storage medium, storing a computer program which, when executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 8.
CN201810106073.7A 2018-01-31 2018-01-31 Terminal device and control method Active CN108494944B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810106073.7A CN108494944B (en) 2018-01-31 2018-01-31 Terminal device and control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810106073.7A CN108494944B (en) 2018-01-31 2018-01-31 Terminal device and control method

Publications (2)

Publication Number Publication Date
CN108494944A CN108494944A (en) 2018-09-04
CN108494944B true CN108494944B (en) 2021-01-22

Family

ID=63344444

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810106073.7A Active CN108494944B (en) 2018-01-31 2018-01-31 Terminal device and control method

Country Status (1)

Country Link
CN (1) CN108494944B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323219A (en) * 2014-07-01 2016-02-10 腾讯科技(深圳)有限公司 Method and device for verifying identity information of user account
CN105516057A (en) * 2014-09-24 2016-04-20 腾讯科技(深圳)有限公司 Data processing method, apparatus and system
CN106534041A (en) * 2015-09-09 2017-03-22 腾讯科技(深圳)有限公司 Verification method, verification platform and client

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105323219A (en) * 2014-07-01 2016-02-10 腾讯科技(深圳)有限公司 Method and device for verifying identity information of user account
CN105516057A (en) * 2014-09-24 2016-04-20 腾讯科技(深圳)有限公司 Data processing method, apparatus and system
CN106534041A (en) * 2015-09-09 2017-03-22 腾讯科技(深圳)有限公司 Verification method, verification platform and client

Also Published As

Publication number Publication date
CN108494944A (en) 2018-09-04

Similar Documents

Publication Publication Date Title
US10341860B2 (en) Learned dual band WIFI network association
EP3007477B1 (en) Network connection method, hotspot terminal, and management terminal
US20150363165A1 (en) Method For Quickly Starting Application Service, and Terminal
US20190373469A1 (en) Techniques for enabling computing devices to identify when they are in proximity to one another
JP6596173B1 (en) Incoming call management method and apparatus
CN107346397B (en) Information processing method and related product
JP2012114906A (en) Access point connection device and method thereof in portable terminal apparatus
CN103458408A (en) Network connection method and network sharing method and device
CN103731810A (en) Access point sharing method and device
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN104683301B (en) Password storage method and device
WO2019223441A1 (en) File sharing method, apparatus, readable storage medium, and mobile terminal
EP2885909B1 (en) Apparatus, method and computer program product for sharing data
CN103379448A (en) Method of reducing a waiting time when cancelling a connection and an electronic device therefor
CN103763112A (en) User identity protection method and apparatus
WO2015010591A1 (en) Method and terminal device for adding contacts
EP3687118B1 (en) Information search method, terminal, network device, and system
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN106413032B (en) Hotspot establishing method and terminal equipment
JP2019510303A (en) Icon processing method and apparatus for application
CN106792434B (en) Hotspot establishing method and terminal equipment
WO2021147430A1 (en) Information processing method and device, and storage medium
CN107135498B (en) File sharing method and equipment
CN110944318B (en) Lock card setting method and device, storage medium and terminal
CN108494944B (en) Terminal device and control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant