CN103226680A - Shutdown protection method and device - Google Patents

Shutdown protection method and device Download PDF

Info

Publication number
CN103226680A
CN103226680A CN201310151559XA CN201310151559A CN103226680A CN 103226680 A CN103226680 A CN 103226680A CN 201310151559X A CN201310151559X A CN 201310151559XA CN 201310151559 A CN201310151559 A CN 201310151559A CN 103226680 A CN103226680 A CN 103226680A
Authority
CN
China
Prior art keywords
portable terminal
user
scope check
input
carried out
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310151559XA
Other languages
Chinese (zh)
Inventor
唐金腾
杨向荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Samsung Semiconductor China R&D Co Ltd
Samsung Electronics Co Ltd
Original Assignee
Samsung Semiconductor China R&D Co Ltd
Samsung Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Samsung Semiconductor China R&D Co Ltd, Samsung Electronics Co Ltd filed Critical Samsung Semiconductor China R&D Co Ltd
Priority to CN201310151559XA priority Critical patent/CN103226680A/en
Publication of CN103226680A publication Critical patent/CN103226680A/en
Priority to KR1020130132994A priority patent/KR20140128212A/en
Priority to US14/251,846 priority patent/US20140323089A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a shutdown protection method and a device. The shutdown protection method comprises the following steps: when a shutdown request of a user is received, a permission checking procedure preset in a mobile terminal is started; permission checking is performed on the user input by the permission checking procedure to determine whether the shutdown operation of the mobile terminal is carried out or not; and when the user input successfully passes the permission checking, the shutdown operation of the mobile terminal is carried out.

Description

Close method for protecting and device thereof
Technical field
The present invention relates to a kind of pass method for protecting and device thereof, more particularly, relate to a kind of pass method for protecting and device thereof that is used for portable terminal is carried out safeguard protection.
Background technology
Along with development of electronic technology, portable terminal (for example, mobile phone, notebook computer, personal digital assistant etc.) has become indispensable product in people's life.
At present; the manufacturer of portable terminal and even user (for example pay much attention to the power-on protection function; requiring the user to import startup password could start shooting), the authority of but having ignored when portable terminal shut down is protected, to such an extent as to anyone can be at will to other people portable terminal execution power-off operation.This is unfavorable for the control of the portable terminal owner to own article.For example, stolen at portable terminal, the burglar is turning-off mobile terminal at once, so as not to the portable terminal owner by make a phone call, mode such as GPS location seeks portable terminal.Although be provided with lock function in existing most of portable terminal, the battery of the portable terminal that has even can not be removed, however under the user unlocked the situation of function, anyone still can at random carry out power-off operation to portable terminal.Therefore, there is serious potential safety hazard aspect the portable terminal shutdown.
Summary of the invention
Therefore, expectation provides and can prevent that anyone from carrying out power-off operation to portable terminal, thereby improves the method and apparatus of the security of portable terminal.
According to an aspect of the present invention, provide a kind of pass method for protecting, may further comprise the steps: when receiving user's shutdown request, be enabled in the scope check program that sets in advance in the portable terminal; Come scope check is carried out in user's input by the scope check program, to determine whether to carry out the power-off operation of portable terminal; When the user imports successfully by scope check, carry out the power-off operation of portable terminal.
Selectively, described pass method for protecting is further comprising the steps of: when user's input is not passed through scope check, stop the power-off operation of portable terminal, thereby make portable terminal keep open state.
Selectively, the scope check program is installed in the portable terminal by the manufacturer or the mobile terminal user of portable terminal.
Selectively, user's input is password input, fingerprint input, facial image input, phonetic entry.
Selectively, the scope check program is carried out password identification, fingerprint recognition, recognition of face or speech identifying function, comes scope check is carried out in user's input.
According to an aspect of the present invention, provide a kind of pass protector, comprising: start module, when receiving user's shutdown request, be enabled in the scope check program that sets in advance in the portable terminal; Check module, come scope check is carried out in user's input by the scope check program, to determine whether to carry out the power-off operation of portable terminal; Execution module when the user imports successfully by scope check, is carried out the power-off operation of portable terminal.
Description of drawings
By the description of embodiment being carried out below in conjunction with accompanying drawing, these and/or other aspect of the present invention and advantage will become clear and be easier to and understand, wherein:
Fig. 1 is the process flow diagram that illustrates according to the pass method for protecting of the embodiment of the invention;
Fig. 2 is the block diagram that illustrates according to the pass protector of the embodiment of the invention.
Embodiment
Now the embodiment of the invention is described in detail, its example shown in the accompanying drawings, wherein, identical label is represented same parts all the time.Below with reference to the accompanying drawings embodiment is described to explain the present invention.
Fig. 1 is the process flow diagram that illustrates according to the embodiment of the invention.
With reference to Fig. 1, in step 101, when receiving user's shutdown request, be enabled in the scope check program that sets in advance in the portable terminal.According to the embodiment of the invention, the scope check program can be installed in the portable terminal when making portable terminal by the manufacturer of portable terminal, perhaps can be installed in the portable terminal after buying portable terminal by mobile terminal user.Yet, the invention is not restricted to this, also can the scope check program be installed in the portable terminal by other modes.
In step 102, come scope check is carried out in user's input by the scope check program, to determine whether to carry out the power-off operation of portable terminal.Here, user's input can be the input of (but being not limited to) password, fingerprint input, facial image input or phonetic entry etc.For this reason, the scope check program can be carried out functions such as password identification, fingerprint recognition, recognition of face or speech recognition, comes scope check is carried out in user's input, thereby determines whether user's input can pass through scope check.
In step 103, when the user imports successfully by scope check, carry out the power-off operation of portable terminal.That is to say that the user who only has corresponding authority could carry out the shutdown of portable terminal.On the other hand, when user's input is failed by scope check, stop the power-off operation of portable terminal, thereby make portable terminal keep open state.
Fig. 2 is the block diagram that illustrates according to the pass protector of the embodiment of the invention.
With reference to Fig. 2, described pass protector comprises startup module 201, checks module 202 and execution module 203.When receiving user's shutdown request, start module 201 and be enabled in the scope check program that sets in advance in the portable terminal.Inspection module 202 comes scope check is carried out in user's input by the scope check program, to determine whether to carry out the power-off operation of portable terminal.When the user imported successfully by scope check, execution module 203 was carried out the power-off operation of portable terminal.
Therefore,, can guarantee to have only the normally power supply of turning-off mobile terminal of authorized user by using pass method for protecting and device thereof according to the embodiment of the invention, thus the security that improves portable terminal.
Though shown and described some embodiment, it should be appreciated by those skilled in the art that without departing from the principles and spirit of the present invention can make amendment to these embodiment, scope of the present invention is limited by claim and equivalent thereof.

Claims (6)

1. one kind closes method for protecting, may further comprise the steps:
When receiving user's shutdown request, be enabled in the scope check program that sets in advance in the portable terminal;
Come scope check is carried out in user's input by the scope check program, to determine whether to carry out the power-off operation of portable terminal;
When the user imports successfully by scope check, carry out the power-off operation of portable terminal.
2. pass according to claim 1 method for protecting, further comprising the steps of:
When user's input is not passed through scope check, stop the power-off operation of portable terminal, thereby make portable terminal keep open state.
3. pass according to claim 1 method for protecting, wherein, the scope check program is installed in the portable terminal by the manufacturer or the mobile terminal user of portable terminal.
4. pass according to claim 1 method for protecting, wherein, user's input is password input, fingerprint input, facial image input, phonetic entry.
5. pass according to claim 4 method for protecting, wherein, the scope check program is carried out password identification, fingerprint recognition, recognition of face or speech identifying function, comes scope check is carried out in user's input.
6. one kind closes protector, comprising:
Start module, when receiving user's shutdown request, be enabled in the scope check program that sets in advance in the portable terminal;
Check module, come scope check is carried out in user's input by the scope check program, to determine whether to carry out the power-off operation of portable terminal;
Execution module when the user imports successfully by scope check, is carried out the power-off operation of portable terminal.
CN201310151559XA 2013-04-27 2013-04-27 Shutdown protection method and device Pending CN103226680A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201310151559XA CN103226680A (en) 2013-04-27 2013-04-27 Shutdown protection method and device
KR1020130132994A KR20140128212A (en) 2013-04-27 2013-11-04 Power-off protection method and device and mobile terminal adopting the same
US14/251,846 US20140323089A1 (en) 2013-04-27 2014-04-14 Power-off protection method and an apparatus therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310151559XA CN103226680A (en) 2013-04-27 2013-04-27 Shutdown protection method and device

Publications (1)

Publication Number Publication Date
CN103226680A true CN103226680A (en) 2013-07-31

Family

ID=48837121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310151559XA Pending CN103226680A (en) 2013-04-27 2013-04-27 Shutdown protection method and device

Country Status (2)

Country Link
KR (1) KR20140128212A (en)
CN (1) CN103226680A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458124A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Shutdown processing method, device and terminal equipment for terminal
CN105872212A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 Mobile terminal power-off method and device
WO2017161735A1 (en) * 2016-03-21 2017-09-28 乐视控股(北京)有限公司 User management method, user management system and user terminal
CN113568329A (en) * 2020-04-28 2021-10-29 广州汽车集团股份有限公司 Shutdown control method and system based on MCU and SOC communication

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016093591A1 (en) 2014-12-08 2016-06-16 주식회사 포인트모바일 Pda terminal and operation control method therefor
KR101703351B1 (en) * 2014-12-08 2017-02-07 주식회사 포인트모바일 PAD terminal and power control method thereof

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020073341A1 (en) * 2000-12-08 2002-06-13 Chung-Hui Chen System and method for securing computer information from remote sides
CN1395439A (en) * 2001-07-10 2003-02-05 华为技术有限公司 Shutdown restriction method for shutdown restricted safety mobile terminal
CN101414284A (en) * 2007-10-19 2009-04-22 华硕电脑股份有限公司 Data protection method and access authority management method
CN101420684A (en) * 2007-10-26 2009-04-29 英业达股份有限公司 Anti-theft system for mobile phone and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020073341A1 (en) * 2000-12-08 2002-06-13 Chung-Hui Chen System and method for securing computer information from remote sides
CN1395439A (en) * 2001-07-10 2003-02-05 华为技术有限公司 Shutdown restriction method for shutdown restricted safety mobile terminal
CN101414284A (en) * 2007-10-19 2009-04-22 华硕电脑股份有限公司 Data protection method and access authority management method
CN101420684A (en) * 2007-10-26 2009-04-29 英业达股份有限公司 Anti-theft system for mobile phone and method thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103458124A (en) * 2013-09-02 2013-12-18 小米科技有限责任公司 Shutdown processing method, device and terminal equipment for terminal
CN103458124B (en) * 2013-09-02 2016-03-30 小米科技有限责任公司 A kind of shutdown processing method of terminal, device and terminal equipment
WO2017161735A1 (en) * 2016-03-21 2017-09-28 乐视控股(北京)有限公司 User management method, user management system and user terminal
CN105872212A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 Mobile terminal power-off method and device
CN113568329A (en) * 2020-04-28 2021-10-29 广州汽车集团股份有限公司 Shutdown control method and system based on MCU and SOC communication
CN113568329B (en) * 2020-04-28 2023-10-24 广州汽车集团股份有限公司 Shutdown control method and system based on MCU and SOC communication

Also Published As

Publication number Publication date
KR20140128212A (en) 2014-11-05

Similar Documents

Publication Publication Date Title
EP3147768B1 (en) Screen interface unlocking method and screen interface unlocking device
CN103226680A (en) Shutdown protection method and device
CN104008346A (en) Method and device for starting privacy mode of data processing device
WO2015117332A1 (en) Method and device for enabling interface in usb debugging mode, and terminal
US8892904B2 (en) Hardware enforced security governing access to an operating system
CN103020553B (en) A kind of guarding against theft for mobile terminal guard method
CN103391354A (en) Information security system and information security method
CN102694920A (en) Mobile phone antitheft method
CN101655814A (en) Method for authenticating smart battery and terminal
CN110598384B (en) Information protection method, information protection device and mobile terminal
CN104217142A (en) Method and device for protecting terminal through power-on password
CN102722663A (en) Handheld smart device data security protection method
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN104134024A (en) Mobile terminal privacy protection method and system
CN105516500A (en) Method and system for selecting device mode
CN105306691A (en) Personal information protection method and terminal
CN111316269A (en) Terminal security protection method and device
CN105760754A (en) Method and device for processing application notice
KR101603830B1 (en) Method for secondary security of using speech recognition
CN107707692A (en) The antitheft mobile phone and its alarm method of software and hardware combining
EP3098744A1 (en) A remotely protected electronic device
CN101799854A (en) Control device based on handwriting encryption and implementation method thereof
CN104834872A (en) Mobile terminal antitheft control system and method
TWI585611B (en) Device and method for unlockingscreen of electronic apparatus
KR101662944B1 (en) Laptop locking control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130731

RJ01 Rejection of invention patent application after publication