CN104216742A - Upgrade control method and device based on password - Google Patents

Upgrade control method and device based on password Download PDF

Info

Publication number
CN104216742A
CN104216742A CN201410420971.1A CN201410420971A CN104216742A CN 104216742 A CN104216742 A CN 104216742A CN 201410420971 A CN201410420971 A CN 201410420971A CN 104216742 A CN104216742 A CN 104216742A
Authority
CN
China
Prior art keywords
brush machine
information
machine program
user
storage area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410420971.1A
Other languages
Chinese (zh)
Other versions
CN104216742B (en
Inventor
吴鸣
刘山荣
詹远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410420971.1A priority Critical patent/CN104216742B/en
Publication of CN104216742A publication Critical patent/CN104216742A/en
Application granted granted Critical
Publication of CN104216742B publication Critical patent/CN104216742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)

Abstract

The invention discloses an upgrade control method and an upgrade control device based on a password. The method comprises the following steps of receiving verification information input by a user; receiving a control command input by the user when the verification information is judged to be correct; extracting preset designated information from a designated storage region of a register when the control command is a command allowing the operation of upgrading program, and storing the designated information into a target storage region of the register; when receiving the command for running the upgrading program and judging the information stored in the target storage region is the designated information, running the upgrading program. According to the scheme provided by the invention, only when the verification information input by the user is correct, can the user input the control command, and the upgrading program is further operated, so that the upgrading program can be prevented from being operated by illegal personnel, and the safety of a mobile terminal is improved.

Description

Brush machine control method and device based on password
Technical field
The present invention relates to communication technical field, in particular, relate to brush machine control method and device based on password.
Background technology
At present, most of smart mobile phones all can be by the mode of the brush machine operating system of resetting.Generally, user can pass through the pre-set combination button of cell phone manufacturer, enters the brush machine interface of smart mobile phone, to reinstall the operating system of smart mobile phone.For example, user wants to reinstall the operating system of smart mobile phone A, this user can be at smart mobile phone during in off-mode, press the pre-set combination button of cell phone manufacturer, smart mobile phone just can enter brush machine interface from off-mode, now, this user can brush machine operation to this smart mobile phone in several ways, with the operating system of this smart mobile phone of resetting.
In research and practice process, inventor finds that above-mentioned correlation technique at least exists following problem:
Whether the user that can initiatively not remove to identify current brush machine due to smart mobile phone is validated user, as long as at smart mobile phone pre-set combination button of input handset manufacturer under off-mode, anyone can brush machine operation to this smart mobile phone, operating system with this mobile phone of resetting, so once user's smart mobile phone is stolen by unauthorized person, unauthorized person just can be brushed machine operation to this smart mobile phone so, to remove cryptoguard or the anti-theft feature in this smart mobile phone, so above-mentioned relevant brush machine technology cannot prevent unauthorized person smart mobile phone is brushed to machine operation, thereby reduced the security of smart mobile phone.
Therefore, how to avoid unauthorized person to brush machine operation to smart mobile phone, become the problem of needing at present solution badly.
Summary of the invention
For overcoming the problem existing in correlation technique, the disclosure provides a kind of brush machine control method and device based on password, to avoid unauthorized person to brush machine operation to mobile terminal, thus the security that improves mobile terminal.
According to the first aspect of disclosure embodiment, a kind of brush machine control method based on password is provided, comprising:
Receive the authorization information of user's input;
Judge described authorization information when correct, receiving the steering order of user's input;
During the instruction that is the operation of permission brush machine program in described steering order, in the designated storage area of register, extract predefined appointed information, and described appointed information is stored in the target storage area of described register;
When canned data is described appointed information in receiving the instruction of the described brush machine program of operation and judging described target storage area, move described brush machine program.
Optionally, describedly judging described authorization information when correct, the step that receives the steering order of user's input comprises:
Obtain determination information pre-stored in register;
Judge that whether described authorization information is identical with described determination information;
When described authorization information is identical with described determination information, receive the steering order of user's input.
Optionally, when described authorization information is correct, the step that receives the steering order of user's input comprises:
Obtain terminal iidentification pre-stored in register;
Described authorization information and described terminal iidentification are sent in server, so that whether described server is judged described authorization information corresponding with described terminal iidentification;
When receiving described authorization information that described server the sends confirmation corresponding with described terminal iidentification, receive the steering order that user inputs.
Optionally, described method also comprises:
In described steering order, be while forbidding the instruction of described brush machine program operation, delete the total data in the target storage area of described register;
While not storing information in receiving the instruction of the described brush machine program of operation and judging described target storage area, output cannot move the warning message of described brush machine program.
Optionally, after the steering order of described reception user input, described method also comprises:
In described steering order, be while forbidding the instruction of described brush machine program operation, default storage area at described register extracts predefined presupposed information, and described presupposed information is stored in the target storage area of described register, described presupposed information is not identical with described appointed information;
When in receiving the instruction of the described brush machine program of operation and judging described target storage area, canned data is described presupposed information, output cannot move the warning message of described brush machine program.
According to the second aspect of disclosure embodiment, a kind of brush machine control device based on password is provided, comprising:
Receiver module, for receiving the authorization information of user's input;
The first execution module, for judging described authorization information when correct, receives the steering order of user's input;
The second execution module, in described steering order when allowing the instruction of brush machine program operation, in the designated storage area of register, extract predefined appointed information, and described appointed information be stored in the target storage area of described register;
The 3rd execution module, for when receiving the instruction of the described brush machine program of operation and judging described target storage area canned data and be described appointed information, moves described brush machine program.
Optionally, described the first execution module comprises:
First obtains submodule, for obtaining the pre-stored determination information of register;
Judgement submodule, for judging that whether described authorization information is identical with described determination information;
The first implementation sub-module, for when described authorization information is identical with described determination information, receives the steering order of user's input.
Optionally, described the first execution module comprises:
Second obtains submodule, for obtaining the pre-stored terminal iidentification of register;
Send submodule, for described authorization information and described terminal iidentification are sent to server, so that described server is judged described authorization information is whether corresponding with described terminal iidentification;
The second implementation sub-module, for when receiving described authorization information that described server the sends confirmation corresponding with described terminal iidentification, receives the steering order that user inputs.
Optionally, described device also comprises:
The 4th execution module, for being while forbidding the instruction of described brush machine program operation in described steering order, deletes the total data in the target storage area of described register;
The 5th execution module, for when receiving the instruction of the described brush machine program of operation and judging described target storage area and do not store information, output cannot move the warning message of described brush machine program.
Optionally, described device also comprises:
The 6th execution module, being used in described steering order is while forbidding the instruction of described brush machine program operation, default storage area at described register extracts predefined presupposed information, and described presupposed information is stored in the target storage area of described register, described presupposed information is not identical with described appointed information;
The 7th execution module, for when receiving the instruction of the described brush machine program of operation and judging described target storage area canned data and be described presupposed information, output cannot move the warning message of described brush machine program.
According to the third aspect of disclosure embodiment, a kind of brush machine control device based on password is provided, comprising:
Processor;
Storer for storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the authorization information of user's input;
Judge described authorization information when correct, receiving the steering order of user's input;
During the instruction that is the operation of permission brush machine program in described steering order, in the designated storage area of register, extract predefined appointed information, and described appointed information is stored in the target storage area of described register;
When canned data is described appointed information in receiving the instruction of the described brush machine program of operation and judging described target storage area, move described brush machine program.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: the scheme that the disclosure provides is in the situation that to judge the authorization information of user input correct, can receive the steering order of user's input, thereby realize, appointed information is stored in target storage area, now, as long as receive the instruction of operation brush machine program, just can move brush machine program.Therefore, the scheme that the disclosure provides is only when the authorization information of user input is correct, and user can input control order, and then operation brush machine program, so the disclosure can be avoided unauthorized person operation brush machine program, thus the security that improves mobile terminal.
Should be understood that, it is only exemplary and explanatory that above general description and details are hereinafter described, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing is herein merged in instructions and forms the part of this instructions, shows embodiment according to the invention, and is used from and explains principle of the present invention with instructions one.
Fig. 1 is according to the process flow diagram of a kind of brush machine control method based on password shown in an exemplary embodiment.
Fig. 2 is according to the schematic diagram of a kind of brush machine control device based on password shown in an exemplary embodiment.
Fig. 3 is according to the block diagram of a kind of brush machine control device based on password shown in an exemplary embodiment.
Embodiment
Here will at length to exemplary embodiment, describe, its example shown in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the present invention.On the contrary, they are only the examples with apparatus and method as consistent in some aspects that described in detail in appended claims, of the present invention.
Embodiment mono-
Fig. 1 is according to the process flow diagram of a kind of brush machine control method based on password shown in an exemplary embodiment, and as shown in Figure 1, the brush machine control method based on password shown in Fig. 1 can be in terminal.The brush machine control method based on password that the disclosure provides can be avoided unauthorized person operation brush machine program, thus the security that improves mobile terminal.The method comprises the following steps.
In step S11, receive the authorization information of user's input.
Wherein, the scheme that the disclosure provides can be applied in terminal, terminal can for smart mobile phone etc. can Receipt Validation information equipment.Authorization information can be various types of Word messages, and for example, authorization information is Chinese character information, numerical information or character information etc.; The graphical information that authorization information also can be inputted for user on the screen of terminal, for example, user can utilize finger on the screen of terminal, to input specific figure; Authorization information can also be voice messaging, and for example, user can pass through the microphone input voice information of terminal.Certainly, authorization information can also be the information of other types, and the above-mentioned information type providing is provided.
Wherein, when user is correct to the authorization information of terminal input, the instruction that terminal just can continue to receive the permission of this user's input or forbid brushing the operation of machine program; User during to the authorization information mistake of terminal input, the instruction that terminal just can not continue to receive the permission of this user's input or forbid brushing the operation of machine program.For example, validated user can have correct authorization information, so validated user can be inputted correct authorization information to terminal when needs are brushed machine to terminal, and after terminal is verified, continues to allow to terminal input the instruction of brush machine program operation.Now, user just can send by predefined key combination the instruction of operation brush machine program to terminal, when terminal receives the instruction of this operation brush machine program, terminal just can be moved this brush machine program, and demonstrate brush machine interface corresponding to this brush machine program, so that user can brush on machine interface and brush machine operation at this.After user completes brush machine operation on this brush machine interface, user can input correct authorization information to terminal again, and after terminal is verified, continuation is to the instruction of terminal input inhibit brush machine program operation, now, even input predefined key combination to terminal, also cannot make terminal start brush machine program, so the method that the disclosure provides can make disabled user after stealing this terminal, cannot brush machine operation to this terminal, and then can make validated user have an opportunity to give this terminal for change by pre-anti-theft program in terminal.
In step S12, judging authorization information when correct, receive the steering order of user's input.
Wherein, after terminal receives the authorization information of user input, terminal need to judge that whether this authorization information is correct, in terminal judges, goes out this authorization information when correct, and terminal just can receive the steering order of user's input so.If it is incorrect that terminal judges goes out the authorization information of user's input, just terminal can not continue to receive the steering order that user inputs so.
In addition, steering order can be the instruction that allows brush machine program to move, also can be for forbidding brushing the instruction of machine program operation.User can allow the instruction of brush machine program operation when wanting to brush machine to terminal input, thereby assurance terminal can be moved this brush machine program when receiving the instruction of operation brush machine program; User can be when brush machine completes, and to the instruction of terminal input inhibit brush machine program operation, thereby assurance terminal can not moved this brush machine program when receiving the instruction of operation brush machine program.
In step S13, during the instruction that is the operation of permission brush machine program in steering order, in the designated storage area of register, extract predefined appointed information, and appointed information is stored in the target storage area of register.
Wherein, register can be the storer of terminal, and the designated storage area of register is a pre-set storage space, and this designated storage area is used for depositing predefined appointed information.The target storage area of register is pre-set another one storage space, and when terminal recognition goes out the instruction that steering order is the operation of permission brush machine program, this target storage area just can be responsible for storing predefined appointed information.Appointed information can be various types of Word messages, and for example, authorization information can be Chinese character information, numerical information or character information etc., and certainly, appointed information can also be the information of other types, and the above-mentioned information type providing is provided.
In addition, the object that the appointed information of designated storage area is stored to target storage area is to authorize the authority of brush machine program operation.Because terminal is when receiving the instruction of operation brush machine program, terminal need to judge in target storage area, whether canned data is appointed information, if it is appointed information that terminal judges goes out canned data in target storage area, terminal thinks that the instruction of this operation brush machine program is valid instruction so, and terminal can be moved this brush machine program; If it is not appointed information that terminal judges goes out canned data in target storage area, terminal can think that the instruction of this operation brush machine program is disable instruction, and terminal can not moved this brush machine program.So during the instruction that is only the operation of permission brush machine program in steering order, terminal just can be stored to the appointed information in designated storage area in the target storage area of register, so that terminal canned data in receiving the instruction of operation brush machine program and judging target storage area is while being appointed information, operation brush machine program.
In step S14, when in receiving the instruction of operation brush machine program and judging target storage area, canned data is appointed information, operation brush machine program.
Wherein, brush machine program can be brush machine program prefabricated in terminal.For example, brush machine program is to start fast fastboot brush machine program, when in terminal receives the instruction of operation fastboot brush machine program and judges target storage area, canned data is appointed information, terminal just can be moved fastboot brush machine program, so that user is under the interactive interface of fastboot brush machine program, terminal is brushed to machine operation.And for example, brush machine program is for recovering Recovery brush machine program, when in terminal receives the instruction of operation Recovery brush machine program and judges target storage area, canned data is appointed information, terminal just can be moved Recovery brush machine program, so that user is under the interactive interface of Recovery brush machine program, terminal is brushed to machine operation.
In the embodiment shown in fig. 1, the scheme that the disclosure provides is in the situation that to judge the authorization information of user input correct, can receive the steering order of user's input, thereby realize, appointed information is stored in target storage area, now, as long as receive the instruction of operation brush machine program, just can move brush machine program.Therefore, the scheme that the disclosure provides is only when the authorization information of user input is correct, and user can input control order, and then operation brush machine program, so the disclosure can be avoided unauthorized person operation brush machine program, thus the security that improves mobile terminal.
Below by instantiation, the method shown in Fig. 1 is described.
For example, suppose that user wants the smart mobile phone A of oneself to brush machine operation under fastboot brush machine program.User is to smart mobile phone A input validation information " 12345 ", the authorization information " 12345 " that smart mobile phone A judges user's input is correct, smart mobile phone A thinks that the user of current input validation information " 12345 " is validated user, smart mobile phone A can demonstrate " allowing smart mobile phone A operation fastboot brush machine program? ", and demonstrate the choice box X of " allowing operation fastboot brush machine program " and the choice box Y of " forbidding moving fastboot brush machine program ".User has clicked the choice box X of " allowing operation fastboot brush machine program ", now, smart mobile phone A has extracted predefined appointed information " 800 " in the designated storage area of register, and this appointed information " 800 " is stored in the target storage area of register to smart mobile phone A output information " you have selected to allow smart mobile phone A operation fastboot brush machine program ".User shuts down smart mobile phone A, and the combination button of pressing smart mobile phone A is to send the instruction of operation fastboot brush machine program to smart mobile phone A, smart mobile phone A understands whether canned data in the target storage area that judge register is appointed information " 800 " after receiving this instruction, and it is appointed information " 800 " really that smart mobile phone A judges canned data in the target storage area of register, smart mobile phone A can move fastboot brush machine program, so that user brushes machine operation to this smart mobile phone A.
In an optional embodiment of the present disclosure, after step S12, the method that the disclosure provides can also comprise the following steps: in steering order, be while forbidding brushing the instruction of machine program operation, delete the total data in the target storage area of register; While not storing information in receiving the instruction of operation brush machine program and judging target storage area, output cannot move the warning message of brush machine program.For example, suppose that user does not wish that the smart mobile phone A of oneself can move fastboot brush machine program.User is to smart mobile phone A input validation information " 12345 ", the authorization information " 12345 " that smart mobile phone A judges user's input is correct, smart mobile phone A thinks that the user of current input validation information " 12345 " is validated user, smart mobile phone A can demonstrate " allowing smart mobile phone A operation fastboot brush machine program? ", and demonstrate the choice box X of " allowing operation fastboot brush machine program " and the choice box Y of " forbidding moving fastboot brush machine program ".User has clicked the choice box Y of " forbidding moving fastboot brush machine program ", now, smart mobile phone A can delete the total data in the target storage area of register, and exports information " you have selected to forbid smart mobile phone A operation fastboot brush machine program ".User shuts down smart mobile phone A, and the combination button of pressing smart mobile phone A is to send the instruction of operation fastboot brush machine program to smart mobile phone A, smart mobile phone A understands in the target storage area that judge register whether do not store information after receiving this instruction, and smart mobile phone A judges in the target storage area of register and does not really store information, smart mobile phone A can demonstrate " you do not have the authority of operation fastboot brush machine program! " warning message, and can not enter fastboot brush machine program.The object of doing is like this, if user's smart mobile phone A is stolen by disabled user, the fastboot that cannot move this smart mobile phone A due to disabled user brushes machine program, so disabled user just cannot brush machine operation to smart mobile phone A, thereby user just can give this smart mobile phone A for change again by the antitheft software of smart mobile phone A.
In another optional embodiment of the present disclosure, after step S12, the method that the disclosure provides can also comprise the following steps: in steering order, be while forbidding brushing the instruction of machine program operation, default storage area at register extracts predefined presupposed information, and presupposed information is stored in the target storage area of register, presupposed information is not identical with appointed information.When in receiving the instruction of operation brush machine program and judging target storage area, canned data is presupposed information, output cannot move the warning message of brush machine program.For example, suppose that user does not wish that the smart mobile phone A of oneself can move fastboot brush machine program.User is to smart mobile phone A input validation information " 12345 ", the authorization information " 12345 " that smart mobile phone A judges user's input is correct, smart mobile phone A thinks that the user of current input validation information " 12345 " is validated user, smart mobile phone A can demonstrate " allowing smart mobile phone A operation fastboot brush machine program? ", and demonstrate the choice box X of " allowing operation fastboot brush machine program " and the choice box Y of " forbidding moving fastboot brush machine program ".User has clicked the choice box Y of " forbidding moving fastboot brush machine program ", now, smart mobile phone A can delete the total data in the target storage area of register, the default storage area of register extracts predefined presupposed information " 700 ", and presupposed information " 700 " is stored in the target storage area of register, and export information " you have selected to forbid smart mobile phone A operation fastboot brush machine program ".User shuts down smart mobile phone A, and the combination button of pressing smart mobile phone A is to send the instruction of operation fastboot brush machine program to smart mobile phone A, smart mobile phone A understands whether canned data in the target storage area that judge register is presupposed information " 700 " after receiving this instruction, and it is presupposed information " 700 " really that smart mobile phone A judges canned data in the target storage area of register, smart mobile phone A can demonstrate " you do not have the authority of operation fastboot brush machine program! " warning message, and can not enter fastboot brush machine program.The object of doing is like this, if user's smart mobile phone A is stolen by disabled user, the fastboot that cannot move this smart mobile phone A due to disabled user brushes machine program, so disabled user just cannot brush machine operation to smart mobile phone A, thereby user just can give this smart mobile phone A for change again by the antitheft software of smart mobile phone A.
In another optional embodiment of the present disclosure, step S12 can also comprise following sub-step: obtain determination information pre-stored in register; Judge that whether authorization information is identical with determination information; When authorization information is identical with determination information, receive the steering order of user's input.For example, suppose that user wants the smart mobile phone A of oneself to brush machine operation under fastboot brush machine program.User is to smart mobile phone A input validation information " 12345 ", smart mobile phone A can obtain determination information pre-stored in register, suppose that determination information is for " 12345 ", smart mobile phone A can judge that whether the authorization information " 12345 " that user inputs is identical with determination information " 12345 " so, it is identical with determination information " 12345 " that smart mobile phone A can judge authorization information " 12345 ", smart mobile phone A thinks that the user of current input validation information " 12345 " is validated user, and smart mobile phone A just can receive the steering order of user's input.The object of doing is like this, whether the authorization information of judging user's input by determination information pre-stored in smart mobile phone is correct, whether thereby judging this user is validated user, at smart mobile phone, judge the authorization information of user input when identical with determination information, just can think that this user is for validated user, and receive the steering order of this user's input.
In another optional embodiment of the present disclosure, step S12 can also comprise following sub-step: obtain terminal iidentification pre-stored in register; Authorization information and terminal iidentification are sent in server, so that whether server is judged authorization information corresponding with terminal iidentification; When receiving authorization information that server the sends confirmation corresponding with terminal iidentification, receive the steering order that user inputs.For example, suppose that user wants the smart mobile phone A of oneself to brush machine operation under fastboot brush machine program.User is to smart mobile phone A input validation information " 12345 ", smart mobile phone A can obtain terminal iidentification pre-stored in register, suppose that this terminal iidentification is for " ID-123 ", and authorization information " 12345 " and terminal iidentification " ID-123 " are sent in server, now, server can retrieve the information that terminal iidentification " ID-123 " is corresponding in database, suppose that in database, retrieving the information that terminal iidentification " ID-123 " is corresponding is " 12345 ", server thinks that the user of this authorization information of input " 12345 " is validated user so, server can send confirmation by smart mobile phone A, when smart mobile phone A receives the confirmation of server transmission, smart mobile phone A just can receive the steering order of user's input.The object of doing is like this, the authorization information of the terminal iidentification of smart mobile phone and user's input is sent to server to be verified, take and determine whether this user is validated user, after server sends confirmation, smart mobile phone just can think that this user is for validated user, and receives the steering order of this user's input.
Embodiment bis-
Fig. 2 is according to the schematic diagram of a kind of brush machine control device based on password shown in an exemplary embodiment.The brush machine control device based on password that the disclosure provides can be avoided unauthorized person operation brush machine program, thus the security that improves mobile terminal.With reference to Fig. 2, this device comprises receiver module 11, the first execution module 12, the second execution module 13 and the 3rd execution module 14.Wherein:
Receiver module 11, for receiving the authorization information of user's input.
The first execution module 12, for judging authorization information when correct, receives the steering order of user's input.
The second execution module 13, in steering order when allowing the instruction of brush machine program operation, in the designated storage area of register, extract predefined appointed information, and appointed information be stored in the target storage area of register.
The 3rd execution module 14, for receiving the instruction of operation brush machine program and judging target storage area canned data while being appointed information, operation brush machine program.
In an optional embodiment of the present disclosure, the first execution module 12 can also comprise that first obtains submodule, judgement submodule and the first implementation sub-module, and wherein, first obtains submodule, for obtaining the pre-stored determination information of register.Judgement submodule, for judging that whether authorization information is identical with determination information.The first implementation sub-module, for when authorization information is identical with determination information, receives the steering order of user's input.
In another optional embodiment of the present disclosure, the first execution module 12 can also comprise that second obtains submodule, transmission submodule and the second implementation sub-module, and wherein, second obtains submodule, for obtaining the pre-stored terminal iidentification of register.Send submodule, for authorization information and terminal iidentification are sent to server, so that server is judged authorization information is whether corresponding with terminal iidentification.The second implementation sub-module, for when receiving authorization information that server the sends confirmation corresponding with terminal iidentification, receives the steering order that user inputs.
In another optional embodiment of the present disclosure, this device can also comprise a lower module: the 4th execution module, for being while forbidding brushing the instruction of machine program operation in steering order, delete the total data in the target storage area of register.The 5th execution module, for receiving the instruction of operation brush machine program and judging target storage area while not storing information, output cannot move the warning message of brush machine program.
In another optional embodiment of the present disclosure, this device can also comprise a lower module: the 6th execution module, for being while forbidding brushing the instruction of machine program operation in steering order, default storage area at register extracts predefined presupposed information, and presupposed information is stored in the target storage area of register, presupposed information is not identical with appointed information.The 7th execution module, for receiving the instruction of operation brush machine program and judging target storage area canned data while being presupposed information, output cannot move the warning message of brush machine program.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations have been described in detail in the embodiment of relevant the method, will not elaborate explanation herein.
Embodiment tri-
Fig. 3 is according to the block diagram of a kind of brush machine control device 800 based on password shown in an exemplary embodiment.For example, device 800 can be mobile phone, computing machine, digital broadcast terminal, information receiving and transmitting equipment, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 3, device 800 can comprise following one or more assembly: processing components 802, storer 804, power supply module 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of I/O (I/O), sensor module 814, and communications component 816.
The integrated operation of processing components 802 common control device 800, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Processing components 802 can comprise that one or more processors 820 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 802 can comprise one or more modules, is convenient to mutual between processing components 802 and other assemblies.For example, processing components 802 can comprise multi-media module, to facilitate mutual between multimedia groupware 808 and processing components 802.
Storer 804 is configured to store various types of data to be supported in the operation of device 800.The example of these data comprises for any application program of operation on device 800 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 804 can be realized by the volatibility of any type or non-volatile memory device or their combination, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), ROM (read-only memory) (ROM), magnetic store, flash memory, disk or CD.
Power supply module 806 provides electric power for installing 800 various assemblies.Power supply module 806 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for device 800.
Multimedia groupware 808 is included in the screen that an output interface is provided between described device 800 and user.In certain embodiments, screen can comprise liquid crystal display (LCD) and touch panel (TP).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.Described touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to described touch or slide.In certain embodiments, multimedia groupware 808 comprises a front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 comprises a microphone (MIC), and when device 800 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal receiving can be further stored in storer 804 or be sent via communications component 816.In certain embodiments, audio-frequency assembly 810 also comprises a loudspeaker, for output audio signal.
I/O interface 812 is for providing interface between processing components 802 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 814 comprises one or more sensors, is used to device 800 that the state estimation of various aspects is provided.For example, sensor module 814 can detect the opening/closing state of device 800, the relative positioning of assembly, for example described assembly is display and the keypad of device 800, the position of all right pick-up unit 800 of sensor module 814 or 800 1 assemblies of device changes, user is with device 800 existence that contact or do not have the temperature variation of device 800 orientation or acceleration/deceleration and device 800.Sensor module 814 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 814 can also comprise optical sensor, as CMOS or ccd image sensor, for using in imaging applications.In certain embodiments, this sensor module 814 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to be convenient to the communication of wired or wireless mode between device 800 and other equipment.Device 800 wireless networks that can access based on communication standard, as WiFi, 2G or 3G, or their combination.In one exemplary embodiment, communications component 816 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, described communications component 816 also comprises near-field communication (NFC) module, to promote junction service.For example, can be based on radio-frequency (RF) identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be realized by one or more application specific integrated circuit (ASIC), digital signal processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD) (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components, for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the storer 804 of instruction, above-mentioned instruction can have been carried out said method by the processor 820 of device 800.For example, described non-provisional computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage equipment etc.
A kind of non-provisional computer-readable recording medium, when the instruction in described storage medium is carried out by the processor of mobile terminal, make mobile terminal can carry out a kind of brush machine control method based on password, described method comprises: the authorization information that receives user's input; Judge authorization information when correct, receiving the steering order of user's input; During the instruction that is the operation of permission brush machine program in steering order, in the designated storage area of register, extract predefined appointed information, and appointed information is stored in the target storage area of register; When in receiving the instruction of operation brush machine program and judging target storage area, canned data is appointed information, operation brush machine program.
Those skilled in the art, considering instructions and putting into practice after invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Instructions and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various modifications and change not departing from its scope.Scope of the present invention is only limited by appended claim.

Claims (11)

1. the brush machine control method based on password, is characterized in that, comprising:
Receive the authorization information of user's input;
Judge described authorization information when correct, receiving the steering order of user's input;
During the instruction that is the operation of permission brush machine program in described steering order, in the designated storage area of register, extract predefined appointed information, and described appointed information is stored in the target storage area of described register;
When canned data is described appointed information in receiving the instruction of the described brush machine program of operation and judging described target storage area, move described brush machine program.
2. the brush machine control method based on password according to claim 1, is characterized in that, is describedly judging described authorization information when correct, and the step that receives the steering order of user's input comprises:
Obtain determination information pre-stored in register;
Judge that whether described authorization information is identical with described determination information;
When described authorization information is identical with described determination information, receive the steering order of user's input.
3. the brush machine control method based on password according to claim 1, is characterized in that, is describedly judging described authorization information when correct, and the step that receives the steering order of user's input comprises:
Obtain terminal iidentification pre-stored in register;
Described authorization information and described terminal iidentification are sent in server, so that whether described server is judged described authorization information corresponding with described terminal iidentification;
When receiving described authorization information that described server the sends confirmation corresponding with described terminal iidentification, receive the steering order that user inputs.
4. the brush machine control method based on password according to claim 1, is characterized in that, described method also comprises:
In described steering order, be while forbidding the instruction of described brush machine program operation, delete the total data in the target storage area of described register;
While not storing information in receiving the instruction of the described brush machine program of operation and judging described target storage area, output cannot move the warning message of described brush machine program.
5. the brush machine control method based on password according to claim 1, is characterized in that, after the steering order of described reception user input, described method also comprises:
In described steering order, be while forbidding the instruction of described brush machine program operation, default storage area at described register extracts predefined presupposed information, and described presupposed information is stored in the target storage area of described register, described presupposed information is not identical with described appointed information;
When in receiving the instruction of the described brush machine program of operation and judging described target storage area, canned data is described presupposed information, output cannot move the warning message of described brush machine program.
6. the brush machine control device based on password, is characterized in that, comprising:
Receiver module, for receiving the authorization information of user's input;
The first execution module, for judging described authorization information when correct, receives the steering order of user's input;
The second execution module, in described steering order when allowing the instruction of brush machine program operation, in the designated storage area of register, extract predefined appointed information, and described appointed information be stored in the target storage area of described register;
The 3rd execution module, for when receiving the instruction of the described brush machine program of operation and judging described target storage area canned data and be described appointed information, moves described brush machine program.
7. the brush machine control device based on password according to claim 6, is characterized in that, described the first execution module comprises:
First obtains submodule, for obtaining the pre-stored determination information of register;
Judgement submodule, for judging that whether described authorization information is identical with described determination information;
The first implementation sub-module, for when described authorization information is identical with described determination information, receives the steering order of user's input.
8. the brush machine control device based on password according to claim 6, is characterized in that, described the first execution module comprises:
Second obtains submodule, for obtaining the pre-stored terminal iidentification of register;
Send submodule, for described authorization information and described terminal iidentification are sent to server, so that described server is judged described authorization information is whether corresponding with described terminal iidentification;
The second implementation sub-module, for when receiving described authorization information that described server the sends confirmation corresponding with described terminal iidentification, receives the steering order that user inputs.
9. the brush machine control device based on password according to claim 6, is characterized in that, described device also comprises:
The 4th execution module, for being while forbidding the instruction of described brush machine program operation in described steering order, deletes the total data in the target storage area of described register;
The 5th execution module, for when receiving the instruction of the described brush machine program of operation and judging described target storage area and do not store information, output cannot move the warning message of described brush machine program.
10. the brush machine control device based on password according to claim 6, is characterized in that, described device also comprises:
The 6th execution module, being used in described steering order is while forbidding the instruction of described brush machine program operation, default storage area at described register extracts predefined presupposed information, and described presupposed information is stored in the target storage area of described register, described presupposed information is not identical with described appointed information;
The 7th execution module, for when receiving the instruction of the described brush machine program of operation and judging described target storage area canned data and be described presupposed information, output cannot move the warning message of described brush machine program.
11. 1 kinds of brush machine control device based on password, is characterized in that, comprising:
Processor;
Storer for storage of processor executable instruction;
Wherein, described processor is configured to:
Receive the authorization information of user's input;
Judge described authorization information when correct, receiving the steering order of user's input;
During the instruction that is the operation of permission brush machine program in described steering order, in the designated storage area of register, extract predefined appointed information, and described appointed information is stored in the target storage area of described register;
When canned data is described appointed information in receiving the instruction of the described brush machine program of operation and judging described target storage area, move described brush machine program.
CN201410420971.1A 2014-08-25 2014-08-25 Brush machine control method and device based on password Active CN104216742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410420971.1A CN104216742B (en) 2014-08-25 2014-08-25 Brush machine control method and device based on password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410420971.1A CN104216742B (en) 2014-08-25 2014-08-25 Brush machine control method and device based on password

Publications (2)

Publication Number Publication Date
CN104216742A true CN104216742A (en) 2014-12-17
CN104216742B CN104216742B (en) 2017-12-19

Family

ID=52098271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410420971.1A Active CN104216742B (en) 2014-08-25 2014-08-25 Brush machine control method and device based on password

Country Status (1)

Country Link
CN (1) CN104216742B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104636900A (en) * 2015-02-10 2015-05-20 西安智道取宝科技有限公司 Control method and system of high-reliability express box
CN104809368A (en) * 2015-03-19 2015-07-29 广东欧珀移动通信有限公司 Download protecting method and terminal
CN104933349A (en) * 2015-05-20 2015-09-23 广东欧珀移动通信有限公司 USB (universal serial bus) switching device with download verification function and download verification method
CN105335632A (en) * 2015-10-09 2016-02-17 广东欧珀移动通信有限公司 Payment information protection method and device
CN105740013A (en) * 2016-01-26 2016-07-06 广东欧珀移动通信有限公司 Flash operation control method and apparatus
CN105930719A (en) * 2016-05-04 2016-09-07 南京诚达运动控制系统有限公司 Encryption method of control panel of numerically-controlled machine tool
CN105975825A (en) * 2016-04-25 2016-09-28 乐视控股(北京)有限公司 Safety protection method and device, and mobile terminal
CN106937275A (en) * 2017-02-13 2017-07-07 深圳盈达信息科技有限公司 A kind of equipment that system unique identifier and hardware ID are preserved under Android system
CN106992857A (en) * 2017-03-30 2017-07-28 努比亚技术有限公司 A kind of brush machine verification method and device
CN107358108A (en) * 2017-07-06 2017-11-17 北京小米移动软件有限公司 software control method, device and mobile terminal
CN112004227A (en) * 2020-08-25 2020-11-27 上海商米科技集团股份有限公司 Flashing control method and system for mobile equipment
CN113514093A (en) * 2021-04-21 2021-10-19 北京锐达仪表有限公司 Safety instrument debugging terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210231A1 (en) * 2004-01-12 2005-09-22 Bouchier Paul H Controlling update of content of a programmable read-only memory
CN102378155A (en) * 2011-11-29 2012-03-14 深圳芯智汇科技有限公司 System and method for remotely controlling mobile terminal
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN103577733A (en) * 2013-09-02 2014-02-12 小米科技有限责任公司 Safety protection method and device for terminal equipment and terminal equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050210231A1 (en) * 2004-01-12 2005-09-22 Bouchier Paul H Controlling update of content of a programmable read-only memory
CN102378155A (en) * 2011-11-29 2012-03-14 深圳芯智汇科技有限公司 System and method for remotely controlling mobile terminal
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN103577733A (en) * 2013-09-02 2014-02-12 小米科技有限责任公司 Safety protection method and device for terminal equipment and terminal equipment

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104636900A (en) * 2015-02-10 2015-05-20 西安智道取宝科技有限公司 Control method and system of high-reliability express box
CN104636900B (en) * 2015-02-10 2018-07-31 西安智道取宝科技有限公司 The control method and system of highly reliable express box
CN104809368B (en) * 2015-03-19 2018-01-23 广东欧珀移动通信有限公司 One kind downloads guard method and terminal
CN104809368A (en) * 2015-03-19 2015-07-29 广东欧珀移动通信有限公司 Download protecting method and terminal
CN104933349A (en) * 2015-05-20 2015-09-23 广东欧珀移动通信有限公司 USB (universal serial bus) switching device with download verification function and download verification method
CN104933349B (en) * 2015-05-20 2017-10-13 广东欧珀移动通信有限公司 With the USB switching devices and download verification method for downloading authentication function
CN105335632A (en) * 2015-10-09 2016-02-17 广东欧珀移动通信有限公司 Payment information protection method and device
CN105335632B (en) * 2015-10-09 2018-05-04 广东欧珀移动通信有限公司 The guard method of payment information and device
CN105740013A (en) * 2016-01-26 2016-07-06 广东欧珀移动通信有限公司 Flash operation control method and apparatus
CN105740013B (en) * 2016-01-26 2019-08-23 Oppo广东移动通信有限公司 Brush machine method of controlling operation thereof and device
CN105975825A (en) * 2016-04-25 2016-09-28 乐视控股(北京)有限公司 Safety protection method and device, and mobile terminal
WO2017185658A1 (en) * 2016-04-25 2017-11-02 乐视控股(北京)有限公司 Security protection method and apparatus, mobile terminal, and electronic device
CN105930719A (en) * 2016-05-04 2016-09-07 南京诚达运动控制系统有限公司 Encryption method of control panel of numerically-controlled machine tool
CN105930719B (en) * 2016-05-04 2019-06-11 南京诚达运动控制系统有限公司 A kind of numerically-controlled machine tool control panel encryption method
CN106937275A (en) * 2017-02-13 2017-07-07 深圳盈达信息科技有限公司 A kind of equipment that system unique identifier and hardware ID are preserved under Android system
CN106992857A (en) * 2017-03-30 2017-07-28 努比亚技术有限公司 A kind of brush machine verification method and device
CN106992857B (en) * 2017-03-30 2020-11-10 义乌国信土地规划咨询有限公司 Machine-swiping verification method and device
CN107358108A (en) * 2017-07-06 2017-11-17 北京小米移动软件有限公司 software control method, device and mobile terminal
CN112004227A (en) * 2020-08-25 2020-11-27 上海商米科技集团股份有限公司 Flashing control method and system for mobile equipment
CN112004227B (en) * 2020-08-25 2024-02-02 上海商米科技集团股份有限公司 Brushing control method and system of mobile equipment
CN113514093A (en) * 2021-04-21 2021-10-19 北京锐达仪表有限公司 Safety instrument debugging terminal

Also Published As

Publication number Publication date
CN104216742B (en) 2017-12-19

Similar Documents

Publication Publication Date Title
CN104216742A (en) Upgrade control method and device based on password
CN104866750A (en) Method and device for starting application
CN104503688A (en) Intelligent hardware device control achieving method and device
CN105407098A (en) Identity verification method and device
CN104243250A (en) Access authorization method, device and equipment based on intelligent housing system
CN104933351A (en) Information security processing method and information security processing device
CN104573550A (en) Method and device for protecting data
CN104703031A (en) Smart television control method and device
CN105450841A (en) Method and device of terminal guard against theft
CN105072079A (en) Account logon method, account logon device and terminal device
CN104331228A (en) Screen locking method and device
CN105335677A (en) Anti-theft method and device of mobile terminal
US20210326429A1 (en) Access control method and device, electronic device and storage medium
CN104735670A (en) Network access method and device
CN105677214A (en) Application management method and apparatus
CN105491229A (en) Method and device for remotely controlling mobile terminal
CN104391712A (en) Shutdown method and device
CN104950838A (en) Network account binding method and device
CN105162784A (en) Verification information input processing method and device
CN104537380A (en) Clustering method and device
CN105808996A (en) Method and device for unlocking screen of terminal
CN105407070A (en) Logging-in authorization method and device
CN104063654A (en) Monitoring method and device for application program
CN104217328A (en) Multi-verification payment method and multi-verification payment device
CN105631254A (en) Unlocking method and unlocking device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant