CN109960536A - Electronic equipments safety starts method, apparatus and electronic equipment - Google Patents
Electronic equipments safety starts method, apparatus and electronic equipment Download PDFInfo
- Publication number
- CN109960536A CN109960536A CN201910242186.4A CN201910242186A CN109960536A CN 109960536 A CN109960536 A CN 109960536A CN 201910242186 A CN201910242186 A CN 201910242186A CN 109960536 A CN109960536 A CN 109960536A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- information
- user
- distance
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2133—Verifying human interaction, e.g., Captcha
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Telephone Function (AREA)
Abstract
Present disclose provides a kind of electronic equipment safe starting methods, applied to the first electronic equipment, it include: in response to the trigger event that is switched on, the first information is obtained, the first information is used for the distance between the second electronic equipment for characterizing first electronic equipment and mutually binding with first electronic equipment;If the distance is less than preset distance, start first electronic equipment;And if the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends reminder message.The disclosure additionally provides a kind of electronic equipment safety starting device and electronic equipment.
Description
Technical field
This disclosure relates to a kind of electronic equipment safe starting method, device and electronic equipment.
Background technique
With the continuous development of computer technology and Internet technology, various electronic equipment layers go out difference, substantially each
User is owned by two or more electronic equipments, such as personal computer, tablet computer, smart phone, smartwatch, trip
Gaming machine etc..Under some cases, the electronic equipment that user is possessed not user at one's side, these electronic equipments can be direct in user
Except the physical extent of management, the use of going beyond one's commission of other users can be potentially encountered.
In the prior art, the use of going beyond one's commission of other users usually is prevented by the way that password is arranged to electronic equipment, however set
After setting password, inconvenience will also result in the use of the user with access right.
Summary of the invention
An aspect of this disclosure provides a kind of electronic equipment safe starting method, is applied to the first electronic equipment, packet
Include: in response to be switched on trigger event, obtain the first information, the first information for characterize first electronic equipment and with institute
State the distance between the second electronic equipment that the first electronic equipment is mutually bound.If the distance is less than preset distance, start institute
State the first electronic equipment.And if the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu, which is sent, to be reminded
Message.
Optionally, the above-mentioned acquisition first information includes: that the signal strength based on mobile communications network calculates first electricity
The relative position information of sub- equipment and one or more base stations determines that the first position is believed based on the relative position information
Breath.The second location information that second electronic equipment is sent is received, wherein the second location information is based on described
The relative position informations of second electronic equipment and one or more of base stations and determination.And it is based on the first position
Information and the second location information determine the first information.
Optionally, if the distance of first information characterization is not less than the preset distance, the above method further include: base
It is verified in the authentication information of user's input, starts first electronic equipment when being verified.
Optionally, before responding the booting trigger event, the above method further include: first electronic equipment
In the state of starting, in response to the binding trigger event about second electronic equipment, carried out with second electronic equipment
Binding, and, when with the second electronic equipment binding success, store trusted identity corresponding with second electronic equipment
Authentication information.On this basis, it includes: to receive user to input that the above-mentioned authentication information based on user's input, which carries out verifying,
Authentication information, and, the authentication information is matched with the trusted identity authentication information, works as successful match
When be verified.
Optionally, it includes: the base station transfer based on mobile communications network that above-mentioned and second electronic equipment, which carries out binding,
Mode or equipment direct-passing mode, the second electronic equipment of Xiang Suoshu send the first dynamically verifying information.If in the first predetermined time
First dynamically verifying information of user's input, determination and the second electronic equipment binding success are received in time limit, with
And if not receiving first dynamically verifying information of user's input in the first predetermined time period, it is determining with it is described
Second electronic equipment Bind Failed.
Optionally, if the distance of first information characterization is not less than the preset distance, the above method further include: to
Second electronic equipment sends the second dynamically verifying information.The above-mentioned authentication information based on user's input carries out verifying packet
It includes: receiving the authentication information of user's input in the second predetermined time period, and, by the authentication information and institute
It states the second dynamically verifying information to be matched, be verified when successful match.
Optionally, it is above-mentioned to second electronic equipment send reminder message include: it is described based on user input body
Before part authentication information is verified, the second electronic equipment of Xiang Suoshu sends reminder message.Alternatively, being inputted described based on user
Authentication information verified after, when verifying not by when to second electronic equipment send reminder message.
Optionally, after the above-mentioned transmission reminder message to second electronic equipment, the above method further include: if connect
Receiving the trust that second electronic equipment returns indicates message, starts first electronic equipment.
Another aspect of the present disclosure provides a kind of electronic equipment safety starting device, is applied to the first electronic equipment, packet
It includes and obtains module, the first starting module and reminding module.Module is obtained to be used to obtain the first letter in response to the trigger event that is switched on
Breath, the second electronics that the first information is used to characterize first electronic equipment and mutually bind with first electronic equipment are set
It is the distance between standby.First starting module is used to start first electronic equipment when the distance is less than preset distance.With
And reminding module is used for when the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends reminder message.
Optionally, obtaining module includes computational submodule, the first determining submodule, location information receiving submodule and second
Determine submodule.Computational submodule calculates first electronic equipment and one for the signal strength based on mobile communications network
Or the relative position information of multiple base stations.First determines that submodule is used to determine described first based on the relative position information
Confidence breath.Location information receiving submodule is used to receive the second location information that second electronic equipment is sent, wherein
The second location information is the relative position information based on second electronic equipment with one or more of base stations and true
Fixed.And second determine that submodule is used to determine described the based on the first location information and the second location information
One information.
Optionally, above-mentioned apparatus further includes authentication module and the second starting module.Authentication module is used to work as the distance not
When less than the preset distance, the authentication information based on user's input is verified.And second starting module for working as
Start first electronic equipment when being verified.
Optionally, above-mentioned apparatus further includes binding module and memory module.Binding module is used to obtain module response institute
Before stating booting trigger event, in the state that first electronic equipment has been turned on, in response to being set about second electronics
Standby binding trigger event is bound with second electronic equipment.And memory module is used to work as and second electronics
When apparatus bound success, trusted identity authentication information corresponding with second electronic equipment is stored.On this basis, mould is verified
Block includes the first authentication information receiving submodule and the first matched sub-block.First authentication information receiving submodule is used for receiving
The authentication information of family input.And first matched sub-block be used for the authentication information and the trusted identity
Authentication information is matched, and is verified when successful match.
Optionally, binding module includes sending submodule and verification information receiving submodule.Sending submodule is for being based on
The base station transfer mode or equipment direct-passing mode of mobile communications network, the second electronic equipment of Xiang Suoshu send the first dynamic authentication letter
Breath.Verification information receiving submodule is used to test when first dynamic for receiving user's input in the first predetermined time period
It is determining with the second electronic equipment binding success when demonstrate,proving information, and, when not receiving use in the first predetermined time period
First dynamically verifying information of family input, determining and the second electronic equipment Bind Failed.
Optionally, above-mentioned apparatus further includes sending module, for when the distance of first information characterization is not less than described
When preset distance, the second electronic equipment of Xiang Suoshu sends the second dynamically verifying information.On this basis, authentication module includes second
Authentication information receiving submodule and the second matched sub-block.Second authentication information receiving submodule was used in the second phase predetermined time
The authentication information of user's input is received in limit.And second matched sub-block be used for the authentication information and institute
It states the second dynamically verifying information to be matched, be verified when successful match.
Optionally, reminding module is used for before authentication module is verified based on the authentication information that user inputs,
Reminder message is sent to second electronic equipment, alternatively, carrying out in authentication module based on the authentication information that user inputs
After verifying, reminder message is sent to second electronic equipment when verifying does not pass through.
Optionally, above-mentioned apparatus further includes third starting module, for sending out in reminding module to second electronic equipment
After sending reminder message, if receiving the trust that second electronic equipment returns indicates message, start first electronics
Equipment.
Another aspect of the present disclosure provides a kind of electronic equipment, comprising: memory, processor and storage are on a memory
And the computer program that can be run on a processor, for realizing side as described above when the processor executes described program
Method.
Another aspect of the present disclosure provides a kind of computer readable storage medium, is stored with computer executable instructions,
Described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to
It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Figure 1A~Figure 1B, which is diagrammatically illustrated, starts method, apparatus and electricity according to the electronic equipments safety of the embodiment of the present disclosure
The application scenarios of sub- equipment;
Fig. 2 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the schematic diagram of the acquisition first information according to the embodiment of the present disclosure;
Fig. 4 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of another embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to the embodiment of the present disclosure;
Fig. 6 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to another embodiment of the disclosure;And
Fig. 7 diagrammatically illustrates the block diagram of electronic equipment according to an embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary
, and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining
Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin
It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid
Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein
The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of
Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood
Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to
Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C "
Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or
System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come
Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least
One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have
B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart
Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer,
The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with
Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard
The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger
The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system
System uses or instruction execution system is combined to use.
Embodiment of the disclosure provides a kind of electronic equipment safe starting method, device and can apply this method
Electronic equipment.This method is applied to the first electronic equipment, including the first information obtains stage, analysis stage, startup stage
And reminding stage.The stage is obtained in the first information, in response to being directed to the booting trigger event of the first electronic equipment, obtains characterization the
The first information of the distance between one electronic equipment and the second electronic equipment mutually bound with the first electronic equipment.Subsequently into peace
Judge the stage entirely, judges whether the distance between the first electronic equipment and the second electronic equipment are less than preset distance.If it is less than
Then enter startup stage, start first electronic equipment, reminding stage is entered if being not less than, is sent out to the second electronic equipment
Reminder message is sent, to inform that the current someone of the second electronic equipment is attempting to start the first electronic equipment.
Figure 1A~Figure 1B, which is diagrammatically illustrated, starts method, apparatus and electricity according to the electronic equipments safety of the embodiment of the present disclosure
The application scenarios of sub- equipment.It should be noted that be only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 1, with
The technology contents of the disclosure are helped skilled in the art to understand, but are not meant to that the embodiment of the present disclosure may not be usable for other
Equipment, system, environment or scene.
As shown in Figure 1A, the scene that same user has administration authority to multiple electronic equipments is illustrated.The application scenarios
It may include user 100 and electronic equipment 101,102,103, user 100 has administrative power to electronic equipment 101,102,103
Limit.
Electronic equipment 101,102,103 can be the various electronic equipments with identical or different function, including but unlimited
In smart phone, smartwatch, intelligent glasses, game machine, tablet computer, pocket computer on knee and desktop computer etc.
Deng.Electronic equipment 101,102,103 can be used to carry out various operations for user 100, such as carry out browsing webpage, network social intercourse, information
The operations such as processing, amusement, meet the various demands in work and life.
It can be communicated by way of straight-through or transfer between electronic equipment 101,102,103, such as electronic equipment
101, any in 102,103 to pass through such as D2D (Device to Device, device-to-device), bluetooth therebetween
(Bluetooth), RFID (Radio Frequency Identification, radio frequency identification), cellular mobile communication
The various wired or wireless communication links such as (Cellular Mobile Communication), fiber optic cables are communicated.
As shown in Figure 1B, another user 100 ' does not have administration authority to above-mentioned electronic equipment 101,102,103, now the use
Family 100 ' allows going beyond one's commission using electronic equipment 101 without user's 100.As described above, electronic equipment 101,102,
It can be communicated by way of straight-through or transfer between 103, then user 100 ' uses the phase of 101 this event of electronic equipment
Closing information can be sent on other electronic equipments 102 and 103 of user 100 by electronic equipment 101.
It should be noted that the starting of electronic equipments safety provided by embodiment of the present disclosure method can generally be set by electronics
Any electronic equipment in standby 101,102,103 executes.Correspondingly, electronic equipments safety provided by the embodiment of the present disclosure starts
Device generally can be set in any electronic equipment in electronic equipment 101,102,103.
It should be understood that the number of the electronic equipment in Figure 1A~Figure 1B, the type of electronic equipment are only schematical.Root
It factually now needs, can have the electronic equipment of arbitrary number, any kind.
Fig. 2 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of the embodiment of the present disclosure, this method
Applied to the first electronic equipment.
As shown in Fig. 2, this method includes operation S201~S203.
The first information is obtained in response to the trigger event that is switched in operation S201.
Wherein, the acquired first information be used for characterize the first electronic equipment and mutually bound with the first electronic equipment second
The distance between electronic equipment.
In operation S202, if the distance between the first electronic equipment and the second electronic equipment of first information characterization are less than
Preset distance starts the first electronic equipment.
In operation S203, if the distance between first electronic equipment and the second electronic equipment of first information characterization be not small
In preset distance, reminder message is sent to the second electronic equipment.
As it can be seen that method according to Fig.2, the first electronic equipment be triggered be switched on when, first obtain characterization first electricity
The first information of the distance between sub- equipment and the second electronic equipment mutually bound with first electronic equipment.When first electronics
The distance between equipment and the second electronic equipment be less than preset distance when, illustrate first electronic equipment be currently located at belong to it is same
Near the second electronic equipment of user, i.e., in the physical extent that the user with administration authority can directly manage.At this time
Think that the booting trigger event of the first electronic equipment is safe, for example, can be by with administration authority user or by
What other users of user's proximity authorization with administration authority implemented, therefore the first electronics can be directly initiated and set
It is standby.And when the distance between first electronic equipment and the second electronic equipment are not less than preset distance, illustrate first electronics
Equipment is currently apart from each other with the second electronic equipment for belonging to same user, i.e. the first electronic equipment, which may be not on, has pipe
In the physical extent that the user of reason permission can directly manage.The booting trigger event for thinking the first electronic equipment at this time may be not
Safety, therefore reminder message is sent to the second electronic equipment, there is the user of the administration authority booting trigger event to inform.
User's use habit can be met with compromise between security and convenience by starting method according to the electronic equipments safety of the embodiment of the present disclosure
And demand.
For example, the first electronic equipment is personal computer, the second electronic equipment is the intelligence mutually bound with the first electronic equipment
Energy mobile phone, the first electronic equipment and the second electronic equipment belong to user A.When the first electronic equipment, which is triggered, to be switched on, first
Electronic equipment first obtains the first information for characterizing the distance between first electronic equipment and second electronic equipment, i.e. acquisition user
The distance between the personal computer and smart phone of A information.When the distance between the personal computer of user A and smart phone
When less than preset distance, illustrate that the personal computer of user A is currently located near the smart phone of user A, due to usual feelings
User A can carry smart phone under condition, then illustrate that the personal computer of user A is currently located near user A, i.e., in use
In the physical extent that family A can be managed directly.Think that the booting trigger event of the first electronic equipment is safe at this time, it may be possible to by
User A is implemented by other user B of user's A proximity authorization, therefore can directly initiate the first electronic equipment.When
When the distance between personal computer and smart phone of user A are not less than preset distance, illustrate that the personal computer of user A is worked as
It is preceding apart from each other with the smart phone of user A, since user A can carry smart phone under normal conditions, then illustrate user A
Personal computer be not currently near user A.Think that the booting trigger event of the first electronic equipment may be dangerous at this time
, therefore reminder message is sent to the second electronic equipment, to inform that user A someone is try to start first electronic equipment.
In one embodiment of the present disclosure, the first of the distance between the first electronic equipment and second electronic equipment is characterized
Information is that the location information of location information and the second electronic equipment based on the first electronic equipment obtains.First electronic equipment and
The location information of second electronic equipment can be obtained by base station location technology.For example, aforesaid operations S201 obtains the first information
It may include: that calculate first electronic equipment opposite with one or more base stations for the signal strength based on mobile communications network
Location information determines the first location information based on the relative position information.Receive what second electronic equipment was sent
The second location information, wherein the second location information is based on second electronic equipment and one or more of bases
The relative position information stood and determination.And based on described in the first location information and second location information determination
The first information.
Fig. 3 diagrammatically illustrates the schematic diagram of the acquisition first information according to the embodiment of the present disclosure.
As shown in figure 3, the first electronic equipment is computer 301, the second electronic equipment is smart phone 302, the first electronics
Equipment and the second electronic equipment all have mobile communication module.The mobile communication environment of first electronic equipment and the second electronic equipment
In be equipped with base station 1, base station 2, base station 3, base station 4 and base station 5, base station 1, base station 2, base station 3, base station 4 and base station 5 position mutually not
Known to identical and location information.For the first electronic equipment, it is based on signal strength principle relevant to communication distance, according to
The location information of mobile communication signal intensity and each base station between first electronic equipment and each base station can be calculated
The first location information of one electronic equipment.Similarly, for the second electronic equipment, according to the second electronic equipment and each base station
Between mobile communication signal intensity and each base station location information, the second position of the second electronic equipment can be calculated
Information.First electronic equipment can obtain the second electronic equipment hair by various wired, wireless, straight-through or transfer communication modes
The second location information sent determines the first information, first information characterization first according to first location information and second location information
The distance between electronic equipment and the second electronic equipment D.
In the other embodiments of the disclosure, the location information of the first electronic equipment and the second electronic equipment can also pass through
The wireless locations skills such as GPS (Global Positioning System, global positioning system) location technology, Wi-Fi location technology
Art obtains.The mode that first electronic equipment obtains the mode of location information and the second electronic equipment obtains location information can be identical
It can also be different, need depending on the concrete function of the first electronic equipment and the second electronic equipment, herein with no restrictions.
Fig. 4 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of another embodiment of the disclosure, should
Method is applied to the first electronic equipment.
As shown in figure 4, this method includes operation S401~S407.
In operation S401, in the state that the first electronic equipment has been turned on, in response to the binding about the second electronic equipment
Trigger event is bound with second electronic equipment.
In operation S402, under the first electronic equipment resting state, in response to the trigger event that is switched on, characterization the is obtained
The first information of the distance between one electronic equipment and the second electronic equipment.
In operation S403, judge whether the distance between the first electronic equipment and the second electronic equipment are less than preset distance,
If so, operation S405 is executed, if not, executing operation S406.
In operation S404, start the first electronic equipment.
In operation S405, the authentication information of user's input is received.
In operation S406, judge whether the authentication information passes through verifying, if so, operation S404 is executed, if
It is no, execute operation S407.
In operation S407, reminder message is sent to the second electronic equipment.
In one embodiment of the present disclosure, in aforesaid operations S401 the first electronic equipment in response to the second electronic equipment
Trigger event is bound, carrying out binding with second electronic equipment may include: the base station transfer side based on mobile communications network
Formula or equipment direct-passing mode, the second electronic equipment of Xiang Suoshu send the first dynamically verifying information, which exists
In first predetermined time period effectively.If first dynamic for receiving user's input in the first predetermined time period is tested
Information, determination and the second electronic equipment binding success are demonstrate,proved, and, if not receiving use in the first predetermined time period
First dynamically verifying information of family input, determining and the second electronic equipment Bind Failed.
Further, when the first electronic equipment and the second electronic equipment binding success, the storage of the first electronic equipment and institute
State the corresponding trusted identity authentication information of the second electronic equipment.Then on this basis, as an optional embodiment, above-mentioned behaviour
Make S406 judge user input authentication information whether pass through verifying process may is that by user input authentication
Information is matched with the trusted identity authentication information stored when binding success, when successful match determination be verified, when
Determine that verifying does not pass through when with failure.
In another embodiment of the disclosure, when judging the distance between the first electronic equipment and the second electronic equipment no
When less than preset distance, before the authentication information that aforesaid operations S405 receives user's input, according to the embodiment of the present disclosure
Electronic equipments safety starting method can also to include: the first electronic equipment send the second dynamic authentication letter to the second electronic equipment
Breath, second dynamically verifying information are effective within second scheduled time.
After sending the second dynamically verifying information to the second electronic equipment, as an optional embodiment, above-mentioned reception
The operation of the authentication information of user's input may is that the authentication that user's input is received in the second predetermined time period
Information, then, aforesaid operations S406 judges whether the authentication information of user's input passes through the process of verifying and may is that institute
It states authentication information to be matched with second dynamically verifying information, when successful match, determination is verified, and works as matching
Determine that verifying does not pass through when failure.
Using the first electronic equipment being mentioned above as personal computer X, the second electronic equipment be smart phone Y, first
The example that electronic equipment and the second electronic equipment belong to user A is illustrated.It is needing smart phone Y used in oneself
When being associated with personal computer X, user A sends bind request, individual calculus using smart phone Y-direction personal computer X
Machine X is pre- for first to smart phone Y transmission term of validity by short message mode or D2D communication mode in response to the bind request
It fixes time first dynamically verifying information in time limit, and shows verification information input interface.If personal computer X is predetermined first
The first dynamically verifying information that user's input is received in time illustrates the user and personal computer X of current smart phone Y
User it is consistent, be determined as binding success state., whereas if personal computer X is not received within the first predetermined time
First dynamically verifying information of user's input or the verification information received and the first dynamically verifying information mismatch, and explanation is worked as
The user of the user and personal computer X of preceding smart phone Y are inconsistent, it is determined that are Bind Failed state.It is being bound into
After function, personal computer X stores trusted identity authentication information corresponding with smart phone Y.
Explained above is the binding procedures of two electronic equipments, similarly, when user wishes multiple electronics used in it
It when equipment is associated, can be bound, multiple electronic equipments and same equipment can be bound by above-mentioned binding,
It can also be bound between any two in multiple electronic equipments.After binding procedure, any two in multiple electronic equipments
It can be the state of being directly bound or indirect binding state between electronic equipment.Also, the trusted identity stored after binding success
Authentication information can be one or more, can according to need and is configured.
The personal computer X of user A, can be with compromise between security and side after other electronic equipments with user A are mutually bound
Just property is operated.Personal computer X in inactive state, BIOS (the Basic Input/Output of personal computer X
System, basic input output system) in response to the trigger event that is switched on, call mobile communication module to obtain by base station location technology
The first location information of personal computer X is taken, then logical by short message mode or D2D communication mode or various other wire/wireless
Letter mode obtains the second location information of smart phone Y, determines individual calculus according to first location information and second location information
The distance between machine X and smart phone Y.Wherein, the mobile communication module in personal computer X can be 5G (5th
Generation wireless systems, the 5th third-generation mobile communication technology) mobile communication module, it is also possible to other types
Mobile communication module, can be arranged depending on concrete condition.
If the distance between current personal computers X and smart phone Y are less than preset distance, illustrate personal computer X
With smart phone Y at a distance of relatively closely, the operator of personal computer X should be the user A or user B by user's A proximity authorization,
The operating system that then BIOS system directly initiates personal computer X makes it possible to work normally, without inputting authentication information,
It is very convenient.
If the distance between current personal computers X and smart phone Y are not less than preset distance, illustrate personal computer
X and smart phone Y are apart from each other.In order to avoid other users go beyond one's commission using personal computer X, as an optional implementation
The BIOS system of example, personal computer X shows authentication information input interface, receives the authentication letter that user is inputted
Breath, the authentication information of the input is matched with the trusted identity authentication information prestored, the just starting when successful match
The operating system of people's computer X.The above process can be adapted for following three kinds of situations: (1) user A is used personal in the first place
Computer X, but the smart phone Y of user A is fallen in the second place;(2) user A is not near personal computer X, user B
Personal computer X is licensed through user A;And (3) user A, not near personal computer X, user B is without user A
License personal computer X.First two situation can (user A be directly inputted by inputting correct authentication information
Or user A informs user B input) carry out normal use personal computer X, and the third situation is use of going beyond one's commission, the present embodiment is logical
The matching process of authentication information is crossed to guarantee safety.
According to above-described embodiment, for above-mentioned (2) user A not near personal computer X, user B is awarded through user A's
The case where power is using personal computer X, user A needs to inform that user B trusted identity authentication information is due to usual user B
Temporarily allowed using personal computer X, after this use, user A usually requires actively to change trusted identity certification
Go beyond one's commission use of the information to prevent user B subsequent to personal computer X.For this purpose, judging as a preferred embodiment
After the distance between current personal computers X and smart phone Y are not less than preset distance, in order to avoid other users go beyond one's commission use
The BIOS system of personal computer X, personal computer X pass through short message mode or D2D communication mode or various other wire/wireless
Communication mode sends term of validity to smart phone Y as the second dynamically verifying information of the second predetermined time period, and shows body
Part authentication information input interface receives the authentication information that user is inputted in the second predetermined time period, this is defeated
The authentication information entered matches with the second dynamically verifying information, just starts the operation of personal computer X when successful match
System.In this way, user A can inform that the user B current short time is effective when allowing user B temporarily to use personal computer X
Second dynamically verifying information, after this use, user B can not start individual calculus using second dynamically verifying information
The operating system of machine X not only ensure that safety but also eliminated reliable information change procedure for user A, meet user's need
It asks.
Electronic equipments safety according to the embodiment of the present disclosure starts method, and above-mentioned first electronic equipment is to the second electronic equipment
The operation for sending reminder message can be in the authentication information for receiving user's input, the authentication information based on user's input
It is executed before being verified, it can also be after the authentication information inputted based on user be verified, when verifying does not pass through
Shi Zhihang, the purpose is to remind the user with administration authority that current first electronic equipment is being attempted in use.
Further, in one embodiment of the present disclosure, in above-mentioned first electronic equipment to second electronic equipment
After sending reminder message, if starting method according to the electronic equipments safety of the embodiment of the present disclosure can also include: to receive
The trust that second electronic equipment returns indicates message, starts first electronic equipment.
For example, user A authorized user B uses the feelings of personal computer X for user A not near personal computer X
Condition, personal computer X send reminder message when judging smart phone Y not nearby, to smart phone Y, and user A is being received
After the reminder message, sending information by smart phone Y-direction personal computer X indicates message, illustrates that the operation of user B is safety
The very high operation of rank, can directly initiate the operating system of personal computer X.
It should be noted that above illustrating by taking personal computer X and smart phone Y as an example according to the embodiment of the present disclosure
Electronic equipment safe starting method implementation process, the first electronic equipment and the second electronic equipment can in other embodiments
To be various types of electronic equipments, the quantity of the second electronic equipment can be one or more, not influence the reality of this programme
It applies.
Fig. 5 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to the embodiment of the present disclosure, which sets
Standby safety starting device 500 is applied to the first electronic equipment.
As shown in figure 5, electronic equipments safety starter 500 includes: to obtain module 510, the first starting module 520 and mention
Awake module 530.
Module 510 is obtained to be used to obtain the first information, the first information is for characterizing institute in response to the trigger event that is switched on
The distance between the second electronic equipment stating the first electronic equipment and mutually being bound with first electronic equipment.
First starting module 520 is used to start first electronic equipment when the distance is less than preset distance.
Reminding module 530 is used for when the distance is not less than the preset distance, and the second electronic equipment of Xiang Suoshu is sent
Reminder message.
Fig. 6 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to another embodiment of the disclosure, the electricity
Sub- equipment safety starter 600 is applied to the first electronic equipment.
As shown in fig. 6, electronic equipments safety starter 600 includes: to obtain module 610, the first starting module 620 and mention
Awake module 630.Module 610, the first starting module 620 and reminding module 630 is obtained to be respectively provided with and obtain module 510, first
Starting module 520 and the corresponding function of reminding module 530, details are not described herein for duplicate part.
In one embodiment of the present disclosure, obtaining module 610 includes that computational submodule 611, first determines submodule
612, location information receiving submodule 613 and second determines submodule 614.
Computational submodule 611 calculates first electronic equipment and one for the signal strength based on mobile communications network
Or the relative position information of multiple base stations.First determines that submodule 612 is used to determine described the based on the relative position information
One location information.Location information receiving submodule 613 is used to receive the second confidence that second electronic equipment is sent
Breath, wherein the second location information is that the relative position based on second electronic equipment and one or more of base stations is believed
Breath and determine.And second determine submodule 614 be used for based on the first location information and the second location information it is true
The fixed first information.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes authentication module 640 and second
Starting module 650.
Authentication module 640 is used for the authentication based on user's input when the distance is not less than the preset distance
Information is verified.And second starting module 650 for starting first electronic equipment when being verified.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes binding module 660 and storage
Module 670.
Binding module 660 is used for before obtaining module and responding the booting trigger event, in first electronic equipment
In the state of having been turned on, in response to the binding trigger event about second electronic equipment, with second electronic equipment into
Row binding.And memory module 670 is used for when with the second electronic equipment binding success, storage and second electronics
The corresponding trusted identity authentication information of equipment.
On this basis, authentication module 640 includes the first authentication information receiving submodule 641 and the first matched sub-block
642.First authentication information receiving submodule 641 is used to receive the authentication information of user's input.And first matching submodule
Block 642 is verified logical for matching the authentication information with the trusted identity authentication information when successful match
It crosses.
In one embodiment of the present disclosure, binding module 660 includes that sending submodule 661 and verification information receive submodule
Block 662.
Sending submodule 661 is used for base station transfer mode or equipment direct-passing mode based on mobile communications network, Xiang Suoshu
Second electronic equipment sends the first dynamically verifying information.Verification information receiving submodule 662 is used for when in the first phase predetermined time
When receiving first dynamically verifying information of user's input in limit, determining and the second electronic equipment binding success;With
It is determining with described the and when first dynamically verifying information for not receiving user's input in the first predetermined time period
Two electronic equipment Bind Faileds.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes sending module 680, is used for
When the distance of first information characterization is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends the second dynamic and tests
Demonstrate,prove information.
On this basis, authentication module 640 includes the second authentication information receiving submodule 643 and the second matched sub-block
644。
Second authentication information receiving submodule 643 is recognized for receiving the identity of user's input in the second predetermined time period
Demonstrate,prove information.And second matched sub-block 644 be used to carry out the authentication information and second dynamically verifying information
Matching, is verified when successful match.
As an optional embodiment, reminding module 630 in the identity that authentication module 640 is inputted based on user for recognizing
Before card information is verified, the second electronic equipment of Xiang Suoshu sends reminder message, alternatively, being based on user in authentication module 640
After the authentication information of input is verified, reminder message is sent to second electronic equipment when verifying does not pass through.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes third starting module 690,
For being returned if receiving second electronic equipment after reminding module sends reminder message to second electronic equipment
The trust returned indicates message, starts first electronic equipment.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution
Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example
Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement
A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son
Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule,
Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate
Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity
Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real
Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality
It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement
Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, obtaining module 610, the first starting module 620 and reminding module 630, authentication module 640 and the second starting mould
Any number of in block 650, binding module 660, memory module 670, sending module 680 and third starting module 690 can be with
Merging is realized in a module or any one module therein can be split into multiple modules.Alternatively, these modules
In at least partly functions of one or more modules can be combined at least partly function of other modules, and in a mould
It is realized in block.In accordance with an embodiment of the present disclosure, module 610, the first starting module 620 and reminding module 630, authentication module are obtained
640 and second starting module 650, binding module 660, memory module 670, sending module 680 and third starting module 690
At least one of can at least be implemented partly as hardware circuit, such as it is field programmable gate array (FPGA), programmable
Logic array (PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), or can lead to
Cross and the hardware such as any other rational method that is integrated or encapsulating or firmware carried out to realize to circuit, or with software, hardware with
And it any one in three kinds of implementations of firmware or several appropriately combined is realized with wherein any.Alternatively, obtaining module
610, the first starting module 620 and reminding module 630, authentication module 640 and the second starting module 650, binding module 660, deposit
At least one of storage module 670, sending module 680 and third starting module 690 can at least be implemented partly as counting
Calculation machine program module can execute corresponding function when the computer program module is run.
Fig. 7 diagrammatically illustrates the electronic equipment according to an embodiment of the present disclosure for being adapted for carrying out method as described above
Block diagram.Intelligent conversational system shown in Fig. 7 is only an example, should not function and use scope band to the embodiment of the present disclosure
Carry out any restrictions.
As shown in fig. 7, electronic equipment 700 includes processor 710 and computer readable storage medium 720.The electronic equipment
700 can execute the method according to the embodiment of the present disclosure.
Specifically, processor 710 for example may include general purpose microprocessor, instruction set processor and/or related chip group
And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 710 can also include using for caching
The onboard storage device on way.Processor 710 can be the different movements for executing the method flow according to the embodiment of the present disclosure
Single treatment unit either multiple processing units.
Computer readable storage medium 720, such as can be non-volatile computer readable storage medium, specific example
Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as
Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 720 may include computer program 721, which may include generation
Code/computer executable instructions execute processor 710 according to the embodiment of the present disclosure
Method or its any deformation.
Computer program 721 can be configured to have the computer program code for example including computer program module.Example
Such as, in the exemplary embodiment, the code in computer program 721 may include one or more program modules, for example including
721A, module 721B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can
To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 710
When execution, processor 710 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, obtaining module 610, the first starting module 620 and reminding module 630, authentication module
640 and second starting module 650, binding module 660, memory module 670, sending module 680 and third starting module 690
At least one of can be implemented as the computer program module with reference to Fig. 7 description can be with when being executed by processor 710
Realize the answer generation method in knowledge based library described above.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality
It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/
In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts
When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium
Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory
(ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light
Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can
With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist
In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure
Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents,
A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment,
But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.
Claims (10)
1. a kind of electronic equipment safe starting method is applied to the first electronic equipment, comprising:
In response to be switched on trigger event, obtain the first information, the first information for characterize first electronic equipment and with
The distance between the second electronic equipment that first electronic equipment is mutually bound;
If the distance is less than preset distance, start first electronic equipment;And
If the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends reminder message.
2. according to the method described in claim 1, wherein, the acquisition first information includes:
Signal strength based on mobile communications network calculates the relative position of first electronic equipment and one or more base stations
Information;
The first location information is determined based on the relative position information;
The second location information that second electronic equipment is sent is received, wherein the second location information is based on described
The relative position informations of second electronic equipment and one or more of base stations and determination;And
The first information is determined based on the first location information and the second location information.
3. according to the method described in claim 1, wherein, if the distance is not less than the preset distance, the method is also
Include: that the authentication information based on user's input is verified, starts first electronic equipment when being verified.
4. according to the method described in claim 3, wherein:
Before responding the booting trigger event, the method also includes:
In the state that first electronic equipment has been turned on, thing is triggered in response to the binding about second electronic equipment
Part is bound with second electronic equipment;And
When with the second electronic equipment binding success, trusted identity certification letter corresponding with second electronic equipment is stored
Breath;
The authentication information based on user's input carries out verifying and includes:
Receive the authentication information of user's input;And
The authentication information is matched with the trusted identity authentication information, is verified when successful match.
It is described to carry out binding with second electronic equipment and include: 5. according to the method described in claim 4, wherein
Base station transfer mode or equipment direct-passing mode based on mobile communications network, it is dynamic that the second electronic equipment of Xiang Suoshu sends first
State verification information;
It is determining with described the if receiving first dynamically verifying information of user's input in the first predetermined time period
Two electronic equipment binding success;And
If not receiving first dynamically verifying information of user's input in the first predetermined time period, it is determining with it is described
Second electronic equipment Bind Failed.
6. according to the method described in claim 3, wherein:
If the distance is not less than the preset distance, the method also includes: the second electronic equipment of Xiang Suoshu sends second
Dynamically verifying information;
The authentication information based on user's input carries out verifying and includes:
The authentication information of user's input is received in the second predetermined time period;And
The authentication information is matched with second dynamically verifying information, is verified when successful match.
It is described to send reminder message to second electronic equipment and include: 7. according to the method described in claim 3, wherein
Before the authentication information based on user's input is verified, the second electronic equipment of Xiang Suoshu, which sends to remind, to disappear
Breath;Or
After the authentication information based on user's input is verified, when verifying does not pass through to second electronics
Equipment sends reminder message.
8. according to the method described in claim 1, wherein, it is described send reminder message to second electronic equipment after,
The method also includes:
If receiving the trust that second electronic equipment returns indicates message, start first electronic equipment.
9. a kind of electronic equipment safety starting device is applied to the first electronic equipment, comprising:
Module is obtained, for obtaining the first information, the first information is for characterizing described first in response to the trigger event that is switched on
Electronic equipment and the distance between the second electronic equipment mutually bound with first electronic equipment;
Starting module, for starting first electronic equipment when the distance is less than preset distance;And
Reminding module, for when the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu to send prompting and disappears
Breath.
10. a kind of electronic equipment, comprising: memory, processor and storage are on a memory and the meter that can run on a processor
When calculation machine program, the processor execute described program for realizing:
In response to be switched on trigger event, obtain the first information, the first information for characterize the electronic equipment and with it is described
The distance between another electronic equipment that electronic equipment is mutually bound;
If the distance is less than preset distance, start the electronic equipment;And
If the distance is not less than the preset distance, reminder message is sent to another electronic equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910242186.4A CN109960536B (en) | 2019-03-27 | 2019-03-27 | Electronic equipment safety starting method and device and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910242186.4A CN109960536B (en) | 2019-03-27 | 2019-03-27 | Electronic equipment safety starting method and device and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109960536A true CN109960536A (en) | 2019-07-02 |
CN109960536B CN109960536B (en) | 2021-09-14 |
Family
ID=67025066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910242186.4A Active CN109960536B (en) | 2019-03-27 | 2019-03-27 | Electronic equipment safety starting method and device and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109960536B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259372A (en) * | 2020-02-06 | 2020-06-09 | 联想(北京)有限公司 | Security verification method and electronic device |
CN114980093A (en) * | 2021-02-18 | 2022-08-30 | Oppo广东移动通信有限公司 | Equipment verification method and device, computer equipment and storage medium |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102790674A (en) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | Authentication method, equipment and system |
US8539382B2 (en) * | 2009-04-03 | 2013-09-17 | Palm, Inc. | Preventing unintentional activation and/or input in an electronic device |
CN104933351A (en) * | 2015-05-26 | 2015-09-23 | 小米科技有限责任公司 | Information security processing method and information security processing device |
CN105528538A (en) * | 2014-09-28 | 2016-04-27 | 酷派软件技术(深圳)有限公司 | Terminal system starting method and apparatus |
CN105991600A (en) * | 2015-02-25 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Identity authentication and apparatus, server and terminal |
CN106127482A (en) * | 2016-06-30 | 2016-11-16 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN106326709A (en) * | 2016-08-26 | 2017-01-11 | 中国人民解放军78196部队 | Intelligent terminal security processing method and device |
CN107197075A (en) * | 2017-07-03 | 2017-09-22 | 深圳市海邻科信息技术有限公司 | Clean boot means of defence, device and computer-readable recording medium |
EP3288444A1 (en) * | 2015-05-01 | 2018-03-07 | Assa Abloy AB | Invisible indication of duress via wearable |
CN108076213A (en) * | 2017-10-30 | 2018-05-25 | 努比亚技术有限公司 | A kind of terminal based reminding method, terminal and computer readable storage medium |
CN108171045A (en) * | 2018-01-15 | 2018-06-15 | 联想(北京)有限公司 | Electronic equipment and its control method |
CN108959868A (en) * | 2018-06-28 | 2018-12-07 | 南昌华勤电子科技有限公司 | A kind of booting computer method, apparatus and computer |
CN108958812A (en) * | 2018-06-06 | 2018-12-07 | 联想(北京)有限公司 | A kind of starting method and electronic equipment |
CN109074443A (en) * | 2017-06-02 | 2018-12-21 | 华为技术有限公司 | A kind of unlocking method and device |
-
2019
- 2019-03-27 CN CN201910242186.4A patent/CN109960536B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8539382B2 (en) * | 2009-04-03 | 2013-09-17 | Palm, Inc. | Preventing unintentional activation and/or input in an electronic device |
CN102790674A (en) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | Authentication method, equipment and system |
CN105528538A (en) * | 2014-09-28 | 2016-04-27 | 酷派软件技术(深圳)有限公司 | Terminal system starting method and apparatus |
CN105991600A (en) * | 2015-02-25 | 2016-10-05 | 阿里巴巴集团控股有限公司 | Identity authentication and apparatus, server and terminal |
EP3288444A1 (en) * | 2015-05-01 | 2018-03-07 | Assa Abloy AB | Invisible indication of duress via wearable |
CN104933351A (en) * | 2015-05-26 | 2015-09-23 | 小米科技有限责任公司 | Information security processing method and information security processing device |
CN106127482A (en) * | 2016-06-30 | 2016-11-16 | 联想(北京)有限公司 | A kind of information processing method and electronic equipment |
CN106326709A (en) * | 2016-08-26 | 2017-01-11 | 中国人民解放军78196部队 | Intelligent terminal security processing method and device |
CN109074443A (en) * | 2017-06-02 | 2018-12-21 | 华为技术有限公司 | A kind of unlocking method and device |
CN107197075A (en) * | 2017-07-03 | 2017-09-22 | 深圳市海邻科信息技术有限公司 | Clean boot means of defence, device and computer-readable recording medium |
CN108076213A (en) * | 2017-10-30 | 2018-05-25 | 努比亚技术有限公司 | A kind of terminal based reminding method, terminal and computer readable storage medium |
CN108171045A (en) * | 2018-01-15 | 2018-06-15 | 联想(北京)有限公司 | Electronic equipment and its control method |
CN108958812A (en) * | 2018-06-06 | 2018-12-07 | 联想(北京)有限公司 | A kind of starting method and electronic equipment |
CN108959868A (en) * | 2018-06-28 | 2018-12-07 | 南昌华勤电子科技有限公司 | A kind of booting computer method, apparatus and computer |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111259372A (en) * | 2020-02-06 | 2020-06-09 | 联想(北京)有限公司 | Security verification method and electronic device |
CN114980093A (en) * | 2021-02-18 | 2022-08-30 | Oppo广东移动通信有限公司 | Equipment verification method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109960536B (en) | 2021-09-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107077552B (en) | Bio-identification verifying is distributed between the device in AD-HOC network | |
JP6510610B2 (en) | System and method for remotely initiating lost mode on a computing device | |
CN105426714B (en) | System and method for certification based on equipment | |
CN105306204B (en) | Security verification method, device and system | |
CN109600223A (en) | Verification method, Activiation method, device, equipment and storage medium | |
CN106664522A (en) | Measuring device and method for measuring the level of a liquid in a container | |
CN107196901B (en) | Identity registration and authentication method and device | |
WO2014197323A1 (en) | Device locator disable authentication | |
CN103476030A (en) | Method for connecting mobile terminal to network, mobile terminal and terminal equipment | |
CN109314703A (en) | Method for managing the state of connection equipment | |
CN105307287A (en) | Connection method and wearable equipment | |
CN106716471A (en) | Systems and methods for identifying mobile devices | |
CN104993934A (en) | Connection processing method and system for intelligent wearable device and mobile terminal | |
EP2330787B1 (en) | Generation of a time-dependent password in a mobile comunication device | |
CN108647501A (en) | Multiple utility program shares password unlocking method, device, equipment and storage medium | |
JP2020509622A (en) | Wireless network type detection method and apparatus and electronic device | |
CN115001817B (en) | Off-line identity recognition method, device and equipment | |
CN105630592A (en) | Identity verification based space switching method and apparatus as well as terminal | |
CN109960536A (en) | Electronic equipments safety starts method, apparatus and electronic equipment | |
CN107005558B (en) | Location-based user disambiguation | |
CN112468497B (en) | Block chain terminal equipment authorization authentication method, device, equipment and storage medium | |
CN111814181B (en) | System authority authorization method and device, electronic equipment and storage medium | |
CN104782154B (en) | A kind of method and apparatus for disabling algorithm in a device | |
CN106203016B (en) | A kind of terminal processing method and equipment | |
CN108549804A (en) | Mode switching method and device, computer readable storage medium, terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |