CN109960536A - Electronic equipments safety starts method, apparatus and electronic equipment - Google Patents

Electronic equipments safety starts method, apparatus and electronic equipment Download PDF

Info

Publication number
CN109960536A
CN109960536A CN201910242186.4A CN201910242186A CN109960536A CN 109960536 A CN109960536 A CN 109960536A CN 201910242186 A CN201910242186 A CN 201910242186A CN 109960536 A CN109960536 A CN 109960536A
Authority
CN
China
Prior art keywords
electronic equipment
information
user
distance
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910242186.4A
Other languages
Chinese (zh)
Other versions
CN109960536B (en
Inventor
融志强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910242186.4A priority Critical patent/CN109960536B/en
Publication of CN109960536A publication Critical patent/CN109960536A/en
Application granted granted Critical
Publication of CN109960536B publication Critical patent/CN109960536B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)

Abstract

Present disclose provides a kind of electronic equipment safe starting methods, applied to the first electronic equipment, it include: in response to the trigger event that is switched on, the first information is obtained, the first information is used for the distance between the second electronic equipment for characterizing first electronic equipment and mutually binding with first electronic equipment;If the distance is less than preset distance, start first electronic equipment;And if the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends reminder message.The disclosure additionally provides a kind of electronic equipment safety starting device and electronic equipment.

Description

Electronic equipments safety starts method, apparatus and electronic equipment
Technical field
This disclosure relates to a kind of electronic equipment safe starting method, device and electronic equipment.
Background technique
With the continuous development of computer technology and Internet technology, various electronic equipment layers go out difference, substantially each User is owned by two or more electronic equipments, such as personal computer, tablet computer, smart phone, smartwatch, trip Gaming machine etc..Under some cases, the electronic equipment that user is possessed not user at one's side, these electronic equipments can be direct in user Except the physical extent of management, the use of going beyond one's commission of other users can be potentially encountered.
In the prior art, the use of going beyond one's commission of other users usually is prevented by the way that password is arranged to electronic equipment, however set After setting password, inconvenience will also result in the use of the user with access right.
Summary of the invention
An aspect of this disclosure provides a kind of electronic equipment safe starting method, is applied to the first electronic equipment, packet Include: in response to be switched on trigger event, obtain the first information, the first information for characterize first electronic equipment and with institute State the distance between the second electronic equipment that the first electronic equipment is mutually bound.If the distance is less than preset distance, start institute State the first electronic equipment.And if the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu, which is sent, to be reminded Message.
Optionally, the above-mentioned acquisition first information includes: that the signal strength based on mobile communications network calculates first electricity The relative position information of sub- equipment and one or more base stations determines that the first position is believed based on the relative position information Breath.The second location information that second electronic equipment is sent is received, wherein the second location information is based on described The relative position informations of second electronic equipment and one or more of base stations and determination.And it is based on the first position Information and the second location information determine the first information.
Optionally, if the distance of first information characterization is not less than the preset distance, the above method further include: base It is verified in the authentication information of user's input, starts first electronic equipment when being verified.
Optionally, before responding the booting trigger event, the above method further include: first electronic equipment In the state of starting, in response to the binding trigger event about second electronic equipment, carried out with second electronic equipment Binding, and, when with the second electronic equipment binding success, store trusted identity corresponding with second electronic equipment Authentication information.On this basis, it includes: to receive user to input that the above-mentioned authentication information based on user's input, which carries out verifying, Authentication information, and, the authentication information is matched with the trusted identity authentication information, works as successful match When be verified.
Optionally, it includes: the base station transfer based on mobile communications network that above-mentioned and second electronic equipment, which carries out binding, Mode or equipment direct-passing mode, the second electronic equipment of Xiang Suoshu send the first dynamically verifying information.If in the first predetermined time First dynamically verifying information of user's input, determination and the second electronic equipment binding success are received in time limit, with And if not receiving first dynamically verifying information of user's input in the first predetermined time period, it is determining with it is described Second electronic equipment Bind Failed.
Optionally, if the distance of first information characterization is not less than the preset distance, the above method further include: to Second electronic equipment sends the second dynamically verifying information.The above-mentioned authentication information based on user's input carries out verifying packet It includes: receiving the authentication information of user's input in the second predetermined time period, and, by the authentication information and institute It states the second dynamically verifying information to be matched, be verified when successful match.
Optionally, it is above-mentioned to second electronic equipment send reminder message include: it is described based on user input body Before part authentication information is verified, the second electronic equipment of Xiang Suoshu sends reminder message.Alternatively, being inputted described based on user Authentication information verified after, when verifying not by when to second electronic equipment send reminder message.
Optionally, after the above-mentioned transmission reminder message to second electronic equipment, the above method further include: if connect Receiving the trust that second electronic equipment returns indicates message, starts first electronic equipment.
Another aspect of the present disclosure provides a kind of electronic equipment safety starting device, is applied to the first electronic equipment, packet It includes and obtains module, the first starting module and reminding module.Module is obtained to be used to obtain the first letter in response to the trigger event that is switched on Breath, the second electronics that the first information is used to characterize first electronic equipment and mutually bind with first electronic equipment are set It is the distance between standby.First starting module is used to start first electronic equipment when the distance is less than preset distance.With And reminding module is used for when the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends reminder message.
Optionally, obtaining module includes computational submodule, the first determining submodule, location information receiving submodule and second Determine submodule.Computational submodule calculates first electronic equipment and one for the signal strength based on mobile communications network Or the relative position information of multiple base stations.First determines that submodule is used to determine described first based on the relative position information Confidence breath.Location information receiving submodule is used to receive the second location information that second electronic equipment is sent, wherein The second location information is the relative position information based on second electronic equipment with one or more of base stations and true Fixed.And second determine that submodule is used to determine described the based on the first location information and the second location information One information.
Optionally, above-mentioned apparatus further includes authentication module and the second starting module.Authentication module is used to work as the distance not When less than the preset distance, the authentication information based on user's input is verified.And second starting module for working as Start first electronic equipment when being verified.
Optionally, above-mentioned apparatus further includes binding module and memory module.Binding module is used to obtain module response institute Before stating booting trigger event, in the state that first electronic equipment has been turned on, in response to being set about second electronics Standby binding trigger event is bound with second electronic equipment.And memory module is used to work as and second electronics When apparatus bound success, trusted identity authentication information corresponding with second electronic equipment is stored.On this basis, mould is verified Block includes the first authentication information receiving submodule and the first matched sub-block.First authentication information receiving submodule is used for receiving The authentication information of family input.And first matched sub-block be used for the authentication information and the trusted identity Authentication information is matched, and is verified when successful match.
Optionally, binding module includes sending submodule and verification information receiving submodule.Sending submodule is for being based on The base station transfer mode or equipment direct-passing mode of mobile communications network, the second electronic equipment of Xiang Suoshu send the first dynamic authentication letter Breath.Verification information receiving submodule is used to test when first dynamic for receiving user's input in the first predetermined time period It is determining with the second electronic equipment binding success when demonstrate,proving information, and, when not receiving use in the first predetermined time period First dynamically verifying information of family input, determining and the second electronic equipment Bind Failed.
Optionally, above-mentioned apparatus further includes sending module, for when the distance of first information characterization is not less than described When preset distance, the second electronic equipment of Xiang Suoshu sends the second dynamically verifying information.On this basis, authentication module includes second Authentication information receiving submodule and the second matched sub-block.Second authentication information receiving submodule was used in the second phase predetermined time The authentication information of user's input is received in limit.And second matched sub-block be used for the authentication information and institute It states the second dynamically verifying information to be matched, be verified when successful match.
Optionally, reminding module is used for before authentication module is verified based on the authentication information that user inputs, Reminder message is sent to second electronic equipment, alternatively, carrying out in authentication module based on the authentication information that user inputs After verifying, reminder message is sent to second electronic equipment when verifying does not pass through.
Optionally, above-mentioned apparatus further includes third starting module, for sending out in reminding module to second electronic equipment After sending reminder message, if receiving the trust that second electronic equipment returns indicates message, start first electronics Equipment.
Another aspect of the present disclosure provides a kind of electronic equipment, comprising: memory, processor and storage are on a memory And the computer program that can be run on a processor, for realizing side as described above when the processor executes described program Method.
Another aspect of the present disclosure provides a kind of computer readable storage medium, is stored with computer executable instructions, Described instruction is when executed for realizing method as described above.
Another aspect of the present disclosure provides a kind of computer program, and the computer program, which includes that computer is executable, to be referred to It enables, described instruction is when executed for realizing method as described above.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Figure 1A~Figure 1B, which is diagrammatically illustrated, starts method, apparatus and electricity according to the electronic equipments safety of the embodiment of the present disclosure The application scenarios of sub- equipment;
Fig. 2 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of the embodiment of the present disclosure;
Fig. 3 diagrammatically illustrates the schematic diagram of the acquisition first information according to the embodiment of the present disclosure;
Fig. 4 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of another embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to the embodiment of the present disclosure;
Fig. 6 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to another embodiment of the disclosure;And
Fig. 7 diagrammatically illustrates the block diagram of electronic equipment according to an embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable data processing units, so that these instructions are when executed by this processor can be with Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system System uses or instruction execution system is combined to use.
Embodiment of the disclosure provides a kind of electronic equipment safe starting method, device and can apply this method Electronic equipment.This method is applied to the first electronic equipment, including the first information obtains stage, analysis stage, startup stage And reminding stage.The stage is obtained in the first information, in response to being directed to the booting trigger event of the first electronic equipment, obtains characterization the The first information of the distance between one electronic equipment and the second electronic equipment mutually bound with the first electronic equipment.Subsequently into peace Judge the stage entirely, judges whether the distance between the first electronic equipment and the second electronic equipment are less than preset distance.If it is less than Then enter startup stage, start first electronic equipment, reminding stage is entered if being not less than, is sent out to the second electronic equipment Reminder message is sent, to inform that the current someone of the second electronic equipment is attempting to start the first electronic equipment.
Figure 1A~Figure 1B, which is diagrammatically illustrated, starts method, apparatus and electricity according to the electronic equipments safety of the embodiment of the present disclosure The application scenarios of sub- equipment.It should be noted that be only the example that can apply the scene of the embodiment of the present disclosure shown in Fig. 1, with The technology contents of the disclosure are helped skilled in the art to understand, but are not meant to that the embodiment of the present disclosure may not be usable for other Equipment, system, environment or scene.
As shown in Figure 1A, the scene that same user has administration authority to multiple electronic equipments is illustrated.The application scenarios It may include user 100 and electronic equipment 101,102,103, user 100 has administrative power to electronic equipment 101,102,103 Limit.
Electronic equipment 101,102,103 can be the various electronic equipments with identical or different function, including but unlimited In smart phone, smartwatch, intelligent glasses, game machine, tablet computer, pocket computer on knee and desktop computer etc. Deng.Electronic equipment 101,102,103 can be used to carry out various operations for user 100, such as carry out browsing webpage, network social intercourse, information The operations such as processing, amusement, meet the various demands in work and life.
It can be communicated by way of straight-through or transfer between electronic equipment 101,102,103, such as electronic equipment 101, any in 102,103 to pass through such as D2D (Device to Device, device-to-device), bluetooth therebetween (Bluetooth), RFID (Radio Frequency Identification, radio frequency identification), cellular mobile communication The various wired or wireless communication links such as (Cellular Mobile Communication), fiber optic cables are communicated.
As shown in Figure 1B, another user 100 ' does not have administration authority to above-mentioned electronic equipment 101,102,103, now the use Family 100 ' allows going beyond one's commission using electronic equipment 101 without user's 100.As described above, electronic equipment 101,102, It can be communicated by way of straight-through or transfer between 103, then user 100 ' uses the phase of 101 this event of electronic equipment Closing information can be sent on other electronic equipments 102 and 103 of user 100 by electronic equipment 101.
It should be noted that the starting of electronic equipments safety provided by embodiment of the present disclosure method can generally be set by electronics Any electronic equipment in standby 101,102,103 executes.Correspondingly, electronic equipments safety provided by the embodiment of the present disclosure starts Device generally can be set in any electronic equipment in electronic equipment 101,102,103.
It should be understood that the number of the electronic equipment in Figure 1A~Figure 1B, the type of electronic equipment are only schematical.Root It factually now needs, can have the electronic equipment of arbitrary number, any kind.
Fig. 2 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of the embodiment of the present disclosure, this method Applied to the first electronic equipment.
As shown in Fig. 2, this method includes operation S201~S203.
The first information is obtained in response to the trigger event that is switched in operation S201.
Wherein, the acquired first information be used for characterize the first electronic equipment and mutually bound with the first electronic equipment second The distance between electronic equipment.
In operation S202, if the distance between the first electronic equipment and the second electronic equipment of first information characterization are less than Preset distance starts the first electronic equipment.
In operation S203, if the distance between first electronic equipment and the second electronic equipment of first information characterization be not small In preset distance, reminder message is sent to the second electronic equipment.
As it can be seen that method according to Fig.2, the first electronic equipment be triggered be switched on when, first obtain characterization first electricity The first information of the distance between sub- equipment and the second electronic equipment mutually bound with first electronic equipment.When first electronics The distance between equipment and the second electronic equipment be less than preset distance when, illustrate first electronic equipment be currently located at belong to it is same Near the second electronic equipment of user, i.e., in the physical extent that the user with administration authority can directly manage.At this time Think that the booting trigger event of the first electronic equipment is safe, for example, can be by with administration authority user or by What other users of user's proximity authorization with administration authority implemented, therefore the first electronics can be directly initiated and set It is standby.And when the distance between first electronic equipment and the second electronic equipment are not less than preset distance, illustrate first electronics Equipment is currently apart from each other with the second electronic equipment for belonging to same user, i.e. the first electronic equipment, which may be not on, has pipe In the physical extent that the user of reason permission can directly manage.The booting trigger event for thinking the first electronic equipment at this time may be not Safety, therefore reminder message is sent to the second electronic equipment, there is the user of the administration authority booting trigger event to inform. User's use habit can be met with compromise between security and convenience by starting method according to the electronic equipments safety of the embodiment of the present disclosure And demand.
For example, the first electronic equipment is personal computer, the second electronic equipment is the intelligence mutually bound with the first electronic equipment Energy mobile phone, the first electronic equipment and the second electronic equipment belong to user A.When the first electronic equipment, which is triggered, to be switched on, first Electronic equipment first obtains the first information for characterizing the distance between first electronic equipment and second electronic equipment, i.e. acquisition user The distance between the personal computer and smart phone of A information.When the distance between the personal computer of user A and smart phone When less than preset distance, illustrate that the personal computer of user A is currently located near the smart phone of user A, due to usual feelings User A can carry smart phone under condition, then illustrate that the personal computer of user A is currently located near user A, i.e., in use In the physical extent that family A can be managed directly.Think that the booting trigger event of the first electronic equipment is safe at this time, it may be possible to by User A is implemented by other user B of user's A proximity authorization, therefore can directly initiate the first electronic equipment.When When the distance between personal computer and smart phone of user A are not less than preset distance, illustrate that the personal computer of user A is worked as It is preceding apart from each other with the smart phone of user A, since user A can carry smart phone under normal conditions, then illustrate user A Personal computer be not currently near user A.Think that the booting trigger event of the first electronic equipment may be dangerous at this time , therefore reminder message is sent to the second electronic equipment, to inform that user A someone is try to start first electronic equipment.
In one embodiment of the present disclosure, the first of the distance between the first electronic equipment and second electronic equipment is characterized Information is that the location information of location information and the second electronic equipment based on the first electronic equipment obtains.First electronic equipment and The location information of second electronic equipment can be obtained by base station location technology.For example, aforesaid operations S201 obtains the first information It may include: that calculate first electronic equipment opposite with one or more base stations for the signal strength based on mobile communications network Location information determines the first location information based on the relative position information.Receive what second electronic equipment was sent The second location information, wherein the second location information is based on second electronic equipment and one or more of bases The relative position information stood and determination.And based on described in the first location information and second location information determination The first information.
Fig. 3 diagrammatically illustrates the schematic diagram of the acquisition first information according to the embodiment of the present disclosure.
As shown in figure 3, the first electronic equipment is computer 301, the second electronic equipment is smart phone 302, the first electronics Equipment and the second electronic equipment all have mobile communication module.The mobile communication environment of first electronic equipment and the second electronic equipment In be equipped with base station 1, base station 2, base station 3, base station 4 and base station 5, base station 1, base station 2, base station 3, base station 4 and base station 5 position mutually not Known to identical and location information.For the first electronic equipment, it is based on signal strength principle relevant to communication distance, according to The location information of mobile communication signal intensity and each base station between first electronic equipment and each base station can be calculated The first location information of one electronic equipment.Similarly, for the second electronic equipment, according to the second electronic equipment and each base station Between mobile communication signal intensity and each base station location information, the second position of the second electronic equipment can be calculated Information.First electronic equipment can obtain the second electronic equipment hair by various wired, wireless, straight-through or transfer communication modes The second location information sent determines the first information, first information characterization first according to first location information and second location information The distance between electronic equipment and the second electronic equipment D.
In the other embodiments of the disclosure, the location information of the first electronic equipment and the second electronic equipment can also pass through The wireless locations skills such as GPS (Global Positioning System, global positioning system) location technology, Wi-Fi location technology Art obtains.The mode that first electronic equipment obtains the mode of location information and the second electronic equipment obtains location information can be identical It can also be different, need depending on the concrete function of the first electronic equipment and the second electronic equipment, herein with no restrictions.
Fig. 4 diagrammatically illustrates the flow chart for starting method according to the electronic equipments safety of another embodiment of the disclosure, should Method is applied to the first electronic equipment.
As shown in figure 4, this method includes operation S401~S407.
In operation S401, in the state that the first electronic equipment has been turned on, in response to the binding about the second electronic equipment Trigger event is bound with second electronic equipment.
In operation S402, under the first electronic equipment resting state, in response to the trigger event that is switched on, characterization the is obtained The first information of the distance between one electronic equipment and the second electronic equipment.
In operation S403, judge whether the distance between the first electronic equipment and the second electronic equipment are less than preset distance, If so, operation S405 is executed, if not, executing operation S406.
In operation S404, start the first electronic equipment.
In operation S405, the authentication information of user's input is received.
In operation S406, judge whether the authentication information passes through verifying, if so, operation S404 is executed, if It is no, execute operation S407.
In operation S407, reminder message is sent to the second electronic equipment.
In one embodiment of the present disclosure, in aforesaid operations S401 the first electronic equipment in response to the second electronic equipment Trigger event is bound, carrying out binding with second electronic equipment may include: the base station transfer side based on mobile communications network Formula or equipment direct-passing mode, the second electronic equipment of Xiang Suoshu send the first dynamically verifying information, which exists In first predetermined time period effectively.If first dynamic for receiving user's input in the first predetermined time period is tested Information, determination and the second electronic equipment binding success are demonstrate,proved, and, if not receiving use in the first predetermined time period First dynamically verifying information of family input, determining and the second electronic equipment Bind Failed.
Further, when the first electronic equipment and the second electronic equipment binding success, the storage of the first electronic equipment and institute State the corresponding trusted identity authentication information of the second electronic equipment.Then on this basis, as an optional embodiment, above-mentioned behaviour Make S406 judge user input authentication information whether pass through verifying process may is that by user input authentication Information is matched with the trusted identity authentication information stored when binding success, when successful match determination be verified, when Determine that verifying does not pass through when with failure.
In another embodiment of the disclosure, when judging the distance between the first electronic equipment and the second electronic equipment no When less than preset distance, before the authentication information that aforesaid operations S405 receives user's input, according to the embodiment of the present disclosure Electronic equipments safety starting method can also to include: the first electronic equipment send the second dynamic authentication letter to the second electronic equipment Breath, second dynamically verifying information are effective within second scheduled time.
After sending the second dynamically verifying information to the second electronic equipment, as an optional embodiment, above-mentioned reception The operation of the authentication information of user's input may is that the authentication that user's input is received in the second predetermined time period Information, then, aforesaid operations S406 judges whether the authentication information of user's input passes through the process of verifying and may is that institute It states authentication information to be matched with second dynamically verifying information, when successful match, determination is verified, and works as matching Determine that verifying does not pass through when failure.
Using the first electronic equipment being mentioned above as personal computer X, the second electronic equipment be smart phone Y, first The example that electronic equipment and the second electronic equipment belong to user A is illustrated.It is needing smart phone Y used in oneself When being associated with personal computer X, user A sends bind request, individual calculus using smart phone Y-direction personal computer X Machine X is pre- for first to smart phone Y transmission term of validity by short message mode or D2D communication mode in response to the bind request It fixes time first dynamically verifying information in time limit, and shows verification information input interface.If personal computer X is predetermined first The first dynamically verifying information that user's input is received in time illustrates the user and personal computer X of current smart phone Y User it is consistent, be determined as binding success state., whereas if personal computer X is not received within the first predetermined time First dynamically verifying information of user's input or the verification information received and the first dynamically verifying information mismatch, and explanation is worked as The user of the user and personal computer X of preceding smart phone Y are inconsistent, it is determined that are Bind Failed state.It is being bound into After function, personal computer X stores trusted identity authentication information corresponding with smart phone Y.
Explained above is the binding procedures of two electronic equipments, similarly, when user wishes multiple electronics used in it It when equipment is associated, can be bound, multiple electronic equipments and same equipment can be bound by above-mentioned binding, It can also be bound between any two in multiple electronic equipments.After binding procedure, any two in multiple electronic equipments It can be the state of being directly bound or indirect binding state between electronic equipment.Also, the trusted identity stored after binding success Authentication information can be one or more, can according to need and is configured.
The personal computer X of user A, can be with compromise between security and side after other electronic equipments with user A are mutually bound Just property is operated.Personal computer X in inactive state, BIOS (the Basic Input/Output of personal computer X System, basic input output system) in response to the trigger event that is switched on, call mobile communication module to obtain by base station location technology The first location information of personal computer X is taken, then logical by short message mode or D2D communication mode or various other wire/wireless Letter mode obtains the second location information of smart phone Y, determines individual calculus according to first location information and second location information The distance between machine X and smart phone Y.Wherein, the mobile communication module in personal computer X can be 5G (5th Generation wireless systems, the 5th third-generation mobile communication technology) mobile communication module, it is also possible to other types Mobile communication module, can be arranged depending on concrete condition.
If the distance between current personal computers X and smart phone Y are less than preset distance, illustrate personal computer X With smart phone Y at a distance of relatively closely, the operator of personal computer X should be the user A or user B by user's A proximity authorization, The operating system that then BIOS system directly initiates personal computer X makes it possible to work normally, without inputting authentication information, It is very convenient.
If the distance between current personal computers X and smart phone Y are not less than preset distance, illustrate personal computer X and smart phone Y are apart from each other.In order to avoid other users go beyond one's commission using personal computer X, as an optional implementation The BIOS system of example, personal computer X shows authentication information input interface, receives the authentication letter that user is inputted Breath, the authentication information of the input is matched with the trusted identity authentication information prestored, the just starting when successful match The operating system of people's computer X.The above process can be adapted for following three kinds of situations: (1) user A is used personal in the first place Computer X, but the smart phone Y of user A is fallen in the second place;(2) user A is not near personal computer X, user B Personal computer X is licensed through user A;And (3) user A, not near personal computer X, user B is without user A License personal computer X.First two situation can (user A be directly inputted by inputting correct authentication information Or user A informs user B input) carry out normal use personal computer X, and the third situation is use of going beyond one's commission, the present embodiment is logical The matching process of authentication information is crossed to guarantee safety.
According to above-described embodiment, for above-mentioned (2) user A not near personal computer X, user B is awarded through user A's The case where power is using personal computer X, user A needs to inform that user B trusted identity authentication information is due to usual user B Temporarily allowed using personal computer X, after this use, user A usually requires actively to change trusted identity certification Go beyond one's commission use of the information to prevent user B subsequent to personal computer X.For this purpose, judging as a preferred embodiment After the distance between current personal computers X and smart phone Y are not less than preset distance, in order to avoid other users go beyond one's commission use The BIOS system of personal computer X, personal computer X pass through short message mode or D2D communication mode or various other wire/wireless Communication mode sends term of validity to smart phone Y as the second dynamically verifying information of the second predetermined time period, and shows body Part authentication information input interface receives the authentication information that user is inputted in the second predetermined time period, this is defeated The authentication information entered matches with the second dynamically verifying information, just starts the operation of personal computer X when successful match System.In this way, user A can inform that the user B current short time is effective when allowing user B temporarily to use personal computer X Second dynamically verifying information, after this use, user B can not start individual calculus using second dynamically verifying information The operating system of machine X not only ensure that safety but also eliminated reliable information change procedure for user A, meet user's need It asks.
Electronic equipments safety according to the embodiment of the present disclosure starts method, and above-mentioned first electronic equipment is to the second electronic equipment The operation for sending reminder message can be in the authentication information for receiving user's input, the authentication information based on user's input It is executed before being verified, it can also be after the authentication information inputted based on user be verified, when verifying does not pass through Shi Zhihang, the purpose is to remind the user with administration authority that current first electronic equipment is being attempted in use.
Further, in one embodiment of the present disclosure, in above-mentioned first electronic equipment to second electronic equipment After sending reminder message, if starting method according to the electronic equipments safety of the embodiment of the present disclosure can also include: to receive The trust that second electronic equipment returns indicates message, starts first electronic equipment.
For example, user A authorized user B uses the feelings of personal computer X for user A not near personal computer X Condition, personal computer X send reminder message when judging smart phone Y not nearby, to smart phone Y, and user A is being received After the reminder message, sending information by smart phone Y-direction personal computer X indicates message, illustrates that the operation of user B is safety The very high operation of rank, can directly initiate the operating system of personal computer X.
It should be noted that above illustrating by taking personal computer X and smart phone Y as an example according to the embodiment of the present disclosure Electronic equipment safe starting method implementation process, the first electronic equipment and the second electronic equipment can in other embodiments To be various types of electronic equipments, the quantity of the second electronic equipment can be one or more, not influence the reality of this programme It applies.
Fig. 5 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to the embodiment of the present disclosure, which sets Standby safety starting device 500 is applied to the first electronic equipment.
As shown in figure 5, electronic equipments safety starter 500 includes: to obtain module 510, the first starting module 520 and mention Awake module 530.
Module 510 is obtained to be used to obtain the first information, the first information is for characterizing institute in response to the trigger event that is switched on The distance between the second electronic equipment stating the first electronic equipment and mutually being bound with first electronic equipment.
First starting module 520 is used to start first electronic equipment when the distance is less than preset distance.
Reminding module 530 is used for when the distance is not less than the preset distance, and the second electronic equipment of Xiang Suoshu is sent Reminder message.
Fig. 6 diagrammatically illustrates the block diagram of the electronic equipments safety starter according to another embodiment of the disclosure, the electricity Sub- equipment safety starter 600 is applied to the first electronic equipment.
As shown in fig. 6, electronic equipments safety starter 600 includes: to obtain module 610, the first starting module 620 and mention Awake module 630.Module 610, the first starting module 620 and reminding module 630 is obtained to be respectively provided with and obtain module 510, first Starting module 520 and the corresponding function of reminding module 530, details are not described herein for duplicate part.
In one embodiment of the present disclosure, obtaining module 610 includes that computational submodule 611, first determines submodule 612, location information receiving submodule 613 and second determines submodule 614.
Computational submodule 611 calculates first electronic equipment and one for the signal strength based on mobile communications network Or the relative position information of multiple base stations.First determines that submodule 612 is used to determine described the based on the relative position information One location information.Location information receiving submodule 613 is used to receive the second confidence that second electronic equipment is sent Breath, wherein the second location information is that the relative position based on second electronic equipment and one or more of base stations is believed Breath and determine.And second determine submodule 614 be used for based on the first location information and the second location information it is true The fixed first information.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes authentication module 640 and second Starting module 650.
Authentication module 640 is used for the authentication based on user's input when the distance is not less than the preset distance Information is verified.And second starting module 650 for starting first electronic equipment when being verified.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes binding module 660 and storage Module 670.
Binding module 660 is used for before obtaining module and responding the booting trigger event, in first electronic equipment In the state of having been turned on, in response to the binding trigger event about second electronic equipment, with second electronic equipment into Row binding.And memory module 670 is used for when with the second electronic equipment binding success, storage and second electronics The corresponding trusted identity authentication information of equipment.
On this basis, authentication module 640 includes the first authentication information receiving submodule 641 and the first matched sub-block 642.First authentication information receiving submodule 641 is used to receive the authentication information of user's input.And first matching submodule Block 642 is verified logical for matching the authentication information with the trusted identity authentication information when successful match It crosses.
In one embodiment of the present disclosure, binding module 660 includes that sending submodule 661 and verification information receive submodule Block 662.
Sending submodule 661 is used for base station transfer mode or equipment direct-passing mode based on mobile communications network, Xiang Suoshu Second electronic equipment sends the first dynamically verifying information.Verification information receiving submodule 662 is used for when in the first phase predetermined time When receiving first dynamically verifying information of user's input in limit, determining and the second electronic equipment binding success;With It is determining with described the and when first dynamically verifying information for not receiving user's input in the first predetermined time period Two electronic equipment Bind Faileds.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes sending module 680, is used for When the distance of first information characterization is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends the second dynamic and tests Demonstrate,prove information.
On this basis, authentication module 640 includes the second authentication information receiving submodule 643 and the second matched sub-block 644。
Second authentication information receiving submodule 643 is recognized for receiving the identity of user's input in the second predetermined time period Demonstrate,prove information.And second matched sub-block 644 be used to carry out the authentication information and second dynamically verifying information Matching, is verified when successful match.
As an optional embodiment, reminding module 630 in the identity that authentication module 640 is inputted based on user for recognizing Before card information is verified, the second electronic equipment of Xiang Suoshu sends reminder message, alternatively, being based on user in authentication module 640 After the authentication information of input is verified, reminder message is sent to second electronic equipment when verifying does not pass through.
In one embodiment of the present disclosure, electronic equipments safety starter 600 further includes third starting module 690, For being returned if receiving second electronic equipment after reminding module sends reminder message to second electronic equipment The trust returned indicates message, starts first electronic equipment.
It should be noted that in device section Example each module/unit/subelement etc. embodiment, the skill of solution Art problem, the function of realization and the technical effect reached respectively with the implementation of corresponding step each in method section Example Mode, the technical issues of solving, the function of realization and the technical effect that reaches are same or like, and details are not described herein.
It is module according to an embodiment of the present disclosure, submodule, unit, any number of or in which any more in subelement A at least partly function can be realized in a module.It is single according to the module of the embodiment of the present disclosure, submodule, unit, son Any one or more in member can be split into multiple modules to realize.According to the module of the embodiment of the present disclosure, submodule, Any one or more in unit, subelement can at least be implemented partly as hardware circuit, such as field programmable gate Array (FPGA), programmable logic array (PLA), system on chip, the system on substrate, the system in encapsulation, dedicated integrated electricity Road (ASIC), or can be by the hardware or firmware for any other rational method for integrate or encapsulate to circuit come real Show, or with any one in three kinds of software, hardware and firmware implementations or with wherein any several appropriately combined next reality It is existing.Alternatively, can be at least by part according to one or more of the module of the embodiment of the present disclosure, submodule, unit, subelement Ground is embodied as computer program module, when the computer program module is run, can execute corresponding function.
For example, obtaining module 610, the first starting module 620 and reminding module 630, authentication module 640 and the second starting mould Any number of in block 650, binding module 660, memory module 670, sending module 680 and third starting module 690 can be with Merging is realized in a module or any one module therein can be split into multiple modules.Alternatively, these modules In at least partly functions of one or more modules can be combined at least partly function of other modules, and in a mould It is realized in block.In accordance with an embodiment of the present disclosure, module 610, the first starting module 620 and reminding module 630, authentication module are obtained 640 and second starting module 650, binding module 660, memory module 670, sending module 680 and third starting module 690 At least one of can at least be implemented partly as hardware circuit, such as it is field programmable gate array (FPGA), programmable Logic array (PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), or can lead to Cross and the hardware such as any other rational method that is integrated or encapsulating or firmware carried out to realize to circuit, or with software, hardware with And it any one in three kinds of implementations of firmware or several appropriately combined is realized with wherein any.Alternatively, obtaining module 610, the first starting module 620 and reminding module 630, authentication module 640 and the second starting module 650, binding module 660, deposit At least one of storage module 670, sending module 680 and third starting module 690 can at least be implemented partly as counting Calculation machine program module can execute corresponding function when the computer program module is run.
Fig. 7 diagrammatically illustrates the electronic equipment according to an embodiment of the present disclosure for being adapted for carrying out method as described above Block diagram.Intelligent conversational system shown in Fig. 7 is only an example, should not function and use scope band to the embodiment of the present disclosure Carry out any restrictions.
As shown in fig. 7, electronic equipment 700 includes processor 710 and computer readable storage medium 720.The electronic equipment 700 can execute the method according to the embodiment of the present disclosure.
Specifically, processor 710 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 710 can also include using for caching The onboard storage device on way.Processor 710 can be the different movements for executing the method flow according to the embodiment of the present disclosure Single treatment unit either multiple processing units.
Computer readable storage medium 720, such as can be non-volatile computer readable storage medium, specific example Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 720 may include computer program 721, which may include generation Code/computer executable instructions execute processor 710 according to the embodiment of the present disclosure Method or its any deformation.
Computer program 721 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 721 may include one or more program modules, for example including 721A, module 721B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 710 When execution, processor 710 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, obtaining module 610, the first starting module 620 and reminding module 630, authentication module 640 and second starting module 650, binding module 660, memory module 670, sending module 680 and third starting module 690 At least one of can be implemented as the computer program module with reference to Fig. 7 description can be with when being executed by processor 710 Realize the answer generation method in knowledge based library described above.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/ In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents, A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.

Claims (10)

1. a kind of electronic equipment safe starting method is applied to the first electronic equipment, comprising:
In response to be switched on trigger event, obtain the first information, the first information for characterize first electronic equipment and with The distance between the second electronic equipment that first electronic equipment is mutually bound;
If the distance is less than preset distance, start first electronic equipment;And
If the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu sends reminder message.
2. according to the method described in claim 1, wherein, the acquisition first information includes:
Signal strength based on mobile communications network calculates the relative position of first electronic equipment and one or more base stations Information;
The first location information is determined based on the relative position information;
The second location information that second electronic equipment is sent is received, wherein the second location information is based on described The relative position informations of second electronic equipment and one or more of base stations and determination;And
The first information is determined based on the first location information and the second location information.
3. according to the method described in claim 1, wherein, if the distance is not less than the preset distance, the method is also Include: that the authentication information based on user's input is verified, starts first electronic equipment when being verified.
4. according to the method described in claim 3, wherein:
Before responding the booting trigger event, the method also includes:
In the state that first electronic equipment has been turned on, thing is triggered in response to the binding about second electronic equipment Part is bound with second electronic equipment;And
When with the second electronic equipment binding success, trusted identity certification letter corresponding with second electronic equipment is stored Breath;
The authentication information based on user's input carries out verifying and includes:
Receive the authentication information of user's input;And
The authentication information is matched with the trusted identity authentication information, is verified when successful match.
It is described to carry out binding with second electronic equipment and include: 5. according to the method described in claim 4, wherein
Base station transfer mode or equipment direct-passing mode based on mobile communications network, it is dynamic that the second electronic equipment of Xiang Suoshu sends first State verification information;
It is determining with described the if receiving first dynamically verifying information of user's input in the first predetermined time period Two electronic equipment binding success;And
If not receiving first dynamically verifying information of user's input in the first predetermined time period, it is determining with it is described Second electronic equipment Bind Failed.
6. according to the method described in claim 3, wherein:
If the distance is not less than the preset distance, the method also includes: the second electronic equipment of Xiang Suoshu sends second Dynamically verifying information;
The authentication information based on user's input carries out verifying and includes:
The authentication information of user's input is received in the second predetermined time period;And
The authentication information is matched with second dynamically verifying information, is verified when successful match.
It is described to send reminder message to second electronic equipment and include: 7. according to the method described in claim 3, wherein
Before the authentication information based on user's input is verified, the second electronic equipment of Xiang Suoshu, which sends to remind, to disappear Breath;Or
After the authentication information based on user's input is verified, when verifying does not pass through to second electronics Equipment sends reminder message.
8. according to the method described in claim 1, wherein, it is described send reminder message to second electronic equipment after, The method also includes:
If receiving the trust that second electronic equipment returns indicates message, start first electronic equipment.
9. a kind of electronic equipment safety starting device is applied to the first electronic equipment, comprising:
Module is obtained, for obtaining the first information, the first information is for characterizing described first in response to the trigger event that is switched on Electronic equipment and the distance between the second electronic equipment mutually bound with first electronic equipment;
Starting module, for starting first electronic equipment when the distance is less than preset distance;And
Reminding module, for when the distance is not less than the preset distance, the second electronic equipment of Xiang Suoshu to send prompting and disappears Breath.
10. a kind of electronic equipment, comprising: memory, processor and storage are on a memory and the meter that can run on a processor When calculation machine program, the processor execute described program for realizing:
In response to be switched on trigger event, obtain the first information, the first information for characterize the electronic equipment and with it is described The distance between another electronic equipment that electronic equipment is mutually bound;
If the distance is less than preset distance, start the electronic equipment;And
If the distance is not less than the preset distance, reminder message is sent to another electronic equipment.
CN201910242186.4A 2019-03-27 2019-03-27 Electronic equipment safety starting method and device and electronic equipment Active CN109960536B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910242186.4A CN109960536B (en) 2019-03-27 2019-03-27 Electronic equipment safety starting method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910242186.4A CN109960536B (en) 2019-03-27 2019-03-27 Electronic equipment safety starting method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN109960536A true CN109960536A (en) 2019-07-02
CN109960536B CN109960536B (en) 2021-09-14

Family

ID=67025066

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910242186.4A Active CN109960536B (en) 2019-03-27 2019-03-27 Electronic equipment safety starting method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN109960536B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259372A (en) * 2020-02-06 2020-06-09 联想(北京)有限公司 Security verification method and electronic device
CN114980093A (en) * 2021-02-18 2022-08-30 Oppo广东移动通信有限公司 Equipment verification method and device, computer equipment and storage medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
US8539382B2 (en) * 2009-04-03 2013-09-17 Palm, Inc. Preventing unintentional activation and/or input in an electronic device
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105528538A (en) * 2014-09-28 2016-04-27 酷派软件技术(深圳)有限公司 Terminal system starting method and apparatus
CN105991600A (en) * 2015-02-25 2016-10-05 阿里巴巴集团控股有限公司 Identity authentication and apparatus, server and terminal
CN106127482A (en) * 2016-06-30 2016-11-16 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106326709A (en) * 2016-08-26 2017-01-11 中国人民解放军78196部队 Intelligent terminal security processing method and device
CN107197075A (en) * 2017-07-03 2017-09-22 深圳市海邻科信息技术有限公司 Clean boot means of defence, device and computer-readable recording medium
EP3288444A1 (en) * 2015-05-01 2018-03-07 Assa Abloy AB Invisible indication of duress via wearable
CN108076213A (en) * 2017-10-30 2018-05-25 努比亚技术有限公司 A kind of terminal based reminding method, terminal and computer readable storage medium
CN108171045A (en) * 2018-01-15 2018-06-15 联想(北京)有限公司 Electronic equipment and its control method
CN108959868A (en) * 2018-06-28 2018-12-07 南昌华勤电子科技有限公司 A kind of booting computer method, apparatus and computer
CN108958812A (en) * 2018-06-06 2018-12-07 联想(北京)有限公司 A kind of starting method and electronic equipment
CN109074443A (en) * 2017-06-02 2018-12-21 华为技术有限公司 A kind of unlocking method and device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8539382B2 (en) * 2009-04-03 2013-09-17 Palm, Inc. Preventing unintentional activation and/or input in an electronic device
CN102790674A (en) * 2011-05-20 2012-11-21 阿里巴巴集团控股有限公司 Authentication method, equipment and system
CN105528538A (en) * 2014-09-28 2016-04-27 酷派软件技术(深圳)有限公司 Terminal system starting method and apparatus
CN105991600A (en) * 2015-02-25 2016-10-05 阿里巴巴集团控股有限公司 Identity authentication and apparatus, server and terminal
EP3288444A1 (en) * 2015-05-01 2018-03-07 Assa Abloy AB Invisible indication of duress via wearable
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN106127482A (en) * 2016-06-30 2016-11-16 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN106326709A (en) * 2016-08-26 2017-01-11 中国人民解放军78196部队 Intelligent terminal security processing method and device
CN109074443A (en) * 2017-06-02 2018-12-21 华为技术有限公司 A kind of unlocking method and device
CN107197075A (en) * 2017-07-03 2017-09-22 深圳市海邻科信息技术有限公司 Clean boot means of defence, device and computer-readable recording medium
CN108076213A (en) * 2017-10-30 2018-05-25 努比亚技术有限公司 A kind of terminal based reminding method, terminal and computer readable storage medium
CN108171045A (en) * 2018-01-15 2018-06-15 联想(北京)有限公司 Electronic equipment and its control method
CN108958812A (en) * 2018-06-06 2018-12-07 联想(北京)有限公司 A kind of starting method and electronic equipment
CN108959868A (en) * 2018-06-28 2018-12-07 南昌华勤电子科技有限公司 A kind of booting computer method, apparatus and computer

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259372A (en) * 2020-02-06 2020-06-09 联想(北京)有限公司 Security verification method and electronic device
CN114980093A (en) * 2021-02-18 2022-08-30 Oppo广东移动通信有限公司 Equipment verification method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109960536B (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN107077552B (en) Bio-identification verifying is distributed between the device in AD-HOC network
JP6510610B2 (en) System and method for remotely initiating lost mode on a computing device
CN105426714B (en) System and method for certification based on equipment
CN105306204B (en) Security verification method, device and system
CN109600223A (en) Verification method, Activiation method, device, equipment and storage medium
CN106664522A (en) Measuring device and method for measuring the level of a liquid in a container
CN107196901B (en) Identity registration and authentication method and device
WO2014197323A1 (en) Device locator disable authentication
CN103476030A (en) Method for connecting mobile terminal to network, mobile terminal and terminal equipment
CN109314703A (en) Method for managing the state of connection equipment
CN105307287A (en) Connection method and wearable equipment
CN106716471A (en) Systems and methods for identifying mobile devices
CN104993934A (en) Connection processing method and system for intelligent wearable device and mobile terminal
EP2330787B1 (en) Generation of a time-dependent password in a mobile comunication device
CN108647501A (en) Multiple utility program shares password unlocking method, device, equipment and storage medium
JP2020509622A (en) Wireless network type detection method and apparatus and electronic device
CN115001817B (en) Off-line identity recognition method, device and equipment
CN105630592A (en) Identity verification based space switching method and apparatus as well as terminal
CN109960536A (en) Electronic equipments safety starts method, apparatus and electronic equipment
CN107005558B (en) Location-based user disambiguation
CN112468497B (en) Block chain terminal equipment authorization authentication method, device, equipment and storage medium
CN111814181B (en) System authority authorization method and device, electronic equipment and storage medium
CN104782154B (en) A kind of method and apparatus for disabling algorithm in a device
CN106203016B (en) A kind of terminal processing method and equipment
CN108549804A (en) Mode switching method and device, computer readable storage medium, terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant