CN104216742B - Brush machine control method and device based on password - Google Patents

Brush machine control method and device based on password Download PDF

Info

Publication number
CN104216742B
CN104216742B CN201410420971.1A CN201410420971A CN104216742B CN 104216742 B CN104216742 B CN 104216742B CN 201410420971 A CN201410420971 A CN 201410420971A CN 104216742 B CN104216742 B CN 104216742B
Authority
CN
China
Prior art keywords
information
brush machine
instruction
machine program
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410420971.1A
Other languages
Chinese (zh)
Other versions
CN104216742A (en
Inventor
吴鸣
刘山荣
詹远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410420971.1A priority Critical patent/CN104216742B/en
Publication of CN104216742A publication Critical patent/CN104216742A/en
Application granted granted Critical
Publication of CN104216742B publication Critical patent/CN104216742B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The disclosure is directed to a kind of brush machine control method and device based on password, this method includes:Receive the checking information of user's input;When judging that checking information is correct, the control instruction of user's input is received;When control instruction is the instruction for allowing brush machine program to run, specify information set in advance is extracted in the designated storage area of register, and specify information is stored into the target storage domain of register;When the information for receiving the instruction of operation brush machine program and judging to store in the domain of target storage is specify information, brush machine program is run.The scheme that the disclosure provides is only when the checking information of user's input is correct, and user can input control instruction, and then run brush machine program, so the disclosure can avoid unauthorized person from running brush machine program, so as to improve the security of mobile terminal.

Description

Brush machine control method and device based on password
Technical field
The present invention relates to communication technical field, in particular, is related to the brush machine control method and device based on password.
Background technology
At present, most of smart mobile phones can by way of brush machine repacking operation system.Under normal circumstances, Yong Huke With by the pre-set combination button of cell phone manufacturer, to enter the brush machine interface of smart mobile phone, to reinstall intelligent hand The operating system of machine.For example, user wants to reinstall smart mobile phone A operating system, the user can be in smart mobile phone During off-mode, the pre-set combination button of cell phone manufacturer is pressed, smart mobile phone will enter Shua Ji circle from off-mode Face, now, the user can carry out brush machine operation to the smart mobile phone in several ways, to reset the operation of the smart mobile phone System.
Studying with practice process, inventor has found that above-mentioned correlation technique at least has problems with:
Due to smart mobile phone will not the user for removing to identify current brush machine of active whether be validated user, as long as in intelligent hand Machine is in the combination button that input handset manufacturer is pre-set under off-mode, and anyone can be carried out to the smart mobile phone Brush machine operates, to reset the operating system of the mobile phone, once so the smart mobile phone of user is stolen by unauthorized person, then it is illegal Personnel will carry out brush machine operation to the smart mobile phone, to remove cryptoguard or the anti-theft feature in the smart mobile phone, institute It can not prevent unauthorized person from carrying out brush machine operation to smart mobile phone with above-mentioned related brush machine technology, so as to reduce smart mobile phone Security.
Therefore, unauthorized person how is avoided to carry out brush machine operation to smart mobile phone, the problem of turning into current urgent need to resolve.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of brush machine control method and dress based on password Put, to avoid unauthorized person from carrying out brush machine operation to mobile terminal, so as to improve the security of mobile terminal.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of brush machine control method based on password, including:
Receive the checking information of user's input;
When judging that the checking information is correct, the control instruction of user's input is received;
It is pre- in the designated storage area extraction of register when the control instruction is the instruction for allowing brush machine program to run The specify information first set, and the specify information is stored into the target storage domain of the register;
Receive the instruction of the operation brush machine program and judge the information stored in the target storage domain For the specify information when, run the brush machine program.
Optionally, it is described when judging that the checking information is correct, receive user input control instruction the step of wrap Include:
Obtain the judgement information prestored in register;
Judge whether the checking information is identical with the judgement information;
When the checking information is identical with the judgement information, the control instruction of user's input is received.
Optionally, when the checking information is correct, receive user input control instruction the step of include:
Obtain the terminal iidentification prestored in register;
The checking information and the terminal iidentification are sent into server, so that the server judges described test It is whether corresponding with the terminal iidentification to demonstrate,prove information;
In the confirmation that the checking information for receiving the server transmission is corresponding with the terminal iidentification, Receive the control instruction of user's input.
Optionally, methods described also includes:
When the control instruction is to forbid the instruction of the brush machine program operation, the target storage of the register is deleted Total data in region;
The non-storage information in receiving the instruction for running the brush machine program and judging the target storage domain When, output can not run the warning message of the brush machine program.
Optionally, after the control instruction of the reception user input, methods described also includes:
When the control instruction is to forbid the instruction of the brush machine program operation, in the default memory block of the register Presupposed information set in advance is extracted in domain, and the presupposed information is stored into the target storage domain of the register, institute Presupposed information is stated to differ with the specify information;
Receive the instruction of the operation brush machine program and judge the information stored in the target storage domain For the presupposed information when, output can not run the warning message of the brush machine program.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of brush machine control device based on password, including:
Receiving module, for receiving the checking information of user's input;
First execution module, for when judging that the checking information is correct, receiving the control instruction of user's input;
Second execution module, for the control instruction be allow brush machine program run instruction when, in register Designated storage area extracts specify information set in advance, and the specify information is stored to the target storage of the register In region;
3rd execution module, for receiving the instruction for running the brush machine program and judging the target storage When the information stored in region is the specify information, the brush machine program is run.
Optionally, first execution module includes:
First acquisition submodule, for obtaining the judgement information prestored in register;
Judging submodule, for judging whether the checking information is identical with the judgement information;
First implementation sub-module, for when the checking information is identical with the judgement information, receiving user's input Control instruction.
Optionally, first execution module includes:
Second acquisition submodule, for obtaining the terminal iidentification prestored in register;
Sending submodule, for the checking information and the terminal iidentification to be sent into server, so that the clothes Business device judges whether the checking information is corresponding with the terminal iidentification;
Second implementation sub-module, for receiving the checking information and the terminal iidentification that the server is sent During corresponding confirmation, the control instruction of user's input is received.
Optionally, described device also includes:
4th execution module, for when the control instruction is to forbid the instruction of the brush machine program operation, deleting institute State the total data in the target storage domain of register;
5th execution module, for receiving the instruction for running the brush machine program and judging the target storage In region during non-storage information, output can not run the warning message of the brush machine program.
Optionally, described device also includes:
6th execution module, for when the control instruction is to forbid the instruction of brush machine program operation, described The default storage region of register extracts presupposed information set in advance, and the presupposed information is stored to the register In the domain of target storage, the presupposed information differs with the specify information;
7th execution module, for receiving the instruction for running the brush machine program and judging the target storage When the information stored in region is the presupposed information, output can not run the warning message of the brush machine program.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of brush machine control device based on password, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Receive the checking information of user's input;
When judging that the checking information is correct, the control instruction of user's input is received;
It is pre- in the designated storage area extraction of register when the control instruction is the instruction for allowing brush machine program to run The specify information first set, and the specify information is stored into the target storage domain of the register;
Receive the instruction of the operation brush machine program and judge the information stored in the target storage domain For the specify information when, run the brush machine program.
The technical scheme provided by this disclosed embodiment can include the following benefits:The scheme that the disclosure provides is being sentenced Break user input checking information it is correct in the case of, can receive user input control instruction, will refer to so as to realize Determine information to be stored in the domain of target storage, now, can be to run brush machine journey as long as receiving the instruction of operation brush machine program Sequence.Therefore, only when the checking information of user's input is correct, user can input control and refer to the scheme that the disclosure provides Order, and then brush machine program is run, so the disclosure can avoid unauthorized person from running brush machine program, so as to improve mobile terminal Security.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of brush machine control method based on password according to an exemplary embodiment.
Fig. 2 is a kind of schematic diagram of brush machine control device based on password according to an exemplary embodiment.
Fig. 3 is a kind of block diagram of brush machine control device based on password according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
Embodiment one
Fig. 1 is a kind of flow chart of brush machine control method based on password according to an exemplary embodiment, such as Fig. 1 Shown, the brush machine control method based on password shown in Fig. 1 can be used in terminal.The brush machine based on password that the disclosure provides Control method can avoid unauthorized person from running brush machine program, so as to improve the security of mobile terminal.This method includes following Step.
In step s 11, the checking information of user's input is received.
Wherein, the scheme that the disclosure provides can be applied in the terminal, and terminal can be received for smart mobile phone etc. and tested The equipment for demonstrate,proving information.Checking information can be various types of text informations, for example, checking information is Chinese character information, numeral letter Breath or character information etc.;Checking information can also be the graphical information that is inputted on the screen of terminal of user, for example, user can be with Specific figure is inputted on the screen of terminal using finger;Checking information can also be voice messaging, for example, user can lead to Cross the microphone input voice information of terminal.Certainly, checking information can also be other kinds of information, it is not limited to it is above-mentioned Information type through offer.
Wherein, when the checking information that user inputs to terminal is correct, terminal just may proceed to receive permitting for user input Perhaps or forbid brush machine program run instruction;In the checking information mistake that user inputs to terminal, terminal just will not continue to connect The instruction received the permission of user input or forbid brush machine program to run.For example, validated user can possess correct checking information, So validated user can input correct checking information when needing to carry out brush machine to terminal to terminal, and in terminal authentication After, continue the instruction for allowing brush machine program to run to terminal input.Now, user can be to be pressed by set in advance Key combination sends the instruction of operation brush machine program to terminal, and when terminal receives the instruction of the operation brush machine program, terminal is just The brush machine program can be run, and shows brush machine interface corresponding to the brush machine program, so that user can be on the brush machine interface Carry out brush machine operation.After user completes the operation of brush machine on the brush machine interface, user can input correct to terminal again Checking information, and in terminal authentication after, continue the instruction for forbidding brush machine program to run to terminal input, now, even if Key combination set in advance is inputted to terminal, terminal is started brush machine program, so the method that the disclosure provides can So that disabled user after the terminal is stolen, can not carry out brush machine operation, and then can have validated user to the terminal Chance gives the terminal for change by the prefabricated anti-theft program in terminal.
In step s 12, when judging that checking information is correct, the control instruction of user's input is received.
Wherein, after the checking information that terminal receives user's input, just whether terminal need to judge the checking information Really, when terminal judges that the checking information is correct, then terminal can with receive user input control instruction.If terminal Judge that the checking information of user's input is incorrect, then terminal just will not continue to receive the control instruction of user's input.
In addition, control instruction can be the instruction for allowing brush machine program to run, or forbid what brush machine program was run Instruction.User can allow the instruction that brush machine program runs, so as to ensure that terminal can be in desired brush machine to terminal input The brush machine program is run during the instruction for receiving operation brush machine program;User can forbid when brush machine is completed to terminal input The instruction of brush machine program operation, so as to ensure that terminal can will not run the brush machine when receiving the instruction of operation brush machine program Program.
In step s 13, when control instruction is the instruction for allowing brush machine program to run, in the designated storage area of register Specify information set in advance is extracted in domain, and specify information is stored into the target storage domain of register.
Wherein, register can be the memory of terminal, and the designated storage area of register is pre-set one Memory space, the designated storage area are used to deposit specify information set in advance.The target storage domain of register is advance Another memory space set, when it is the instruction for allowing brush machine program to run that terminal recognition, which goes out control instruction, the mesh Mark storage region will be responsible for storing specify information set in advance.Specify information can be various types of text informations, example Such as, checking information can be Chinese character information, digital information or character information etc., and certainly, specify information can also be other types Information, it is not limited to the above-mentioned information type provided.
In addition, the purpose that the specify information of designated storage area is stored to target storage domain is to authorize brush machine program The authority of operation.Because when receiving the instruction of operation brush machine program, terminal needs to judge to deposit in the domain of target storage terminal Whether the information of storage is specify information, if the information that terminal is judged to store in the domain of target storage is specify information, then Terminal thinks that the instruction of the operation brush machine program is valid instruction, and terminal can run the brush machine program;If terminal judges mesh The information stored in mark storage region is not specify information, and terminal will be considered that the instruction of the operation brush machine program is illegal instruction, Terminal will not run the brush machine program.So only when control instruction is the instruction for allowing brush machine program to run, terminal just meeting Specify information in designated storage area is stored into the target storage domain of register, so that terminal is receiving operation brush When the information for instructing and judging to store in the domain of target storage of machine program is specify information, brush machine program is run.
In step S14, stored in receiving the instruction of operation brush machine program and judging target storage domain When information is specify information, brush machine program is run.
Wherein, brush machine program can be brush machine program prefabricated in terminal.For example, brush machine program starts to be quick Fastboot brush machine programs, receive the instruction of operation fastboot brush machine programs in terminal and judge target storage domain When the information of middle storage is specify information, terminal will run fastboot brush machine programs, in order to which user brushes in fastboot Under the interactive interface of machine program, brush machine operation is carried out to terminal.And for example, brush machine program is recovery Recovery brush machine programs, The information for instructing and judging to store in the domain of target storage that terminal receives operation Recovery brush machine programs is specified During information, terminal will run Recovery brush machine programs, in order to which user is under the interactive interface of Recovery brush machine programs, Brush machine operation is carried out to terminal.
In the embodiment shown in fig. 1, the scheme that the disclosure provides is correct in the checking information for judging user's input In the case of, the control instruction of user's input can be received, specify information is stored in the domain of target storage so as to realize, this When, can be to run brush machine program as long as receiving the instruction of operation brush machine program.Therefore, the scheme that the disclosure provides only has When the checking information of user's input is correct, user can input control instruction, and then run brush machine program, so the disclosure Unauthorized person can be avoided to run brush machine program, so as to improve the security of mobile terminal.
Illustrate the method shown in Fig. 1 below by instantiation.
For example, it is assumed that user wants to carry out brush machine operation under fastboot brush machine programs to the smart mobile phone A of oneself.With To smart mobile phone A validation informations " 12345 ", smart mobile phone A judges that the checking information " 12345 " of user's input is just at family True, then smart mobile phone A thinks that the user of current validation information " 12345 " is validated user, and smart mobile phone A can be shown " smart mobile phone A whether is allowed to run fastboot brush machine programs", and show " allowing to run fastboot brush machines program " The choice box X and choice box Y of " forbidding running fastboot brush machines program ".User, which has clicked, " to be allowed to run fastboot brush machines The choice box X of program ", now, smart mobile phone A is extracted specify information set in advance in the designated storage area of register " 800 ", and the specify information " 800 " is stored into the target storage domain of register, smart mobile phone A output prompt messages " you have selected to allow smart mobile phone A to run fastboot brush machines program ".User shuts down smart mobile phone A, and presses intelligent hand To send the instruction of operation fastboot brush machine programs to smart mobile phone A, smart mobile phone A receives this and referred to machine A combination button Whether the information that can judge to store in the target storage domain of register after order is specify information " 800 ", and smart mobile phone A sentences The information stored in the target storage domain for register of breaking is specify information " 800 " really, and smart mobile phone A can be run Fastboot brush machine programs, in order to which user carries out brush machine operation to smart mobile phone A.
In an optional embodiment of the disclosure, after step s 12, the method that the disclosure provides can also include Following steps:When control instruction is the instruction for forbidding brush machine program to run, delete complete in the target storage domain of register Portion's data;In non-storage information in receiving the instruction of operation brush machine program and judging target storage domain, nothing is exported Method runs the warning message of brush machine program.For example, it is assumed that user, which is not intended to the smart mobile phone A of oneself, can run fastboot brushes Machine program.For user to smart mobile phone A validation informations " 12345 ", smart mobile phone A judges the checking information of user's input " 12345 " are correct, then smart mobile phone A thinks that the user of current validation information " 12345 " is validated user, intelligent hand Whether machine A can be shown " allows smart mobile phone A to run fastboot brush machine programs", and show " allow run fastboot The choice box X of brush machine program " and the choice box Y of " forbidding running fastboot brush machines program ".User, which has clicked, " to be forbidden running The choice box Y of fastboot brush machines program ", now, smart mobile phone A can delete whole numbers in the target storage domain of register According to, and export prompt message " you have selected to forbid smart mobile phone A operation fastboot brush machines program ".User is by smart mobile phone A Shutdown, and smart mobile phone A combination button is pressed with the instruction to smart mobile phone A transmission operation fastboot brush machine programs, intelligence Can mobile phone A receive in the target storage domain that register can be judged after the instruction whether non-storage information, and smart mobile phone A Judge certain non-storage information in the target storage domain of register, smart mobile phone A can show that " you are without operation The authority of fastboot brush machine programs!" warning message, and fastboot brush machine programs will not be entered.The purpose so done It is, if the smart mobile phone A of user is stolen by disabled user, because disabled user can not run smart mobile phone A's Fastboot brush machine programs, so disabled user just can not carry out brush machine operation to smart mobile phone A, so as to which user can be to pass through Smart mobile phone A antitheft software gives smart mobile phone A for change again.
In another optional embodiment of the disclosure, after step s 12, the method that the disclosure provides can also wrap Include following steps:It is pre- in the default storage region extraction of register when control instruction is the instruction for forbidding brush machine program to run The presupposed information first set, and presupposed information is stored into the target storage domain of register, presupposed information and specify information Differ.It is presupposed information in the information for receiving the instruction of operation brush machine program and judging to store in the domain of target storage When, output can not run the warning message of brush machine program.For example, it is assumed that the smart mobile phone A that user is not intended to oneself can be run Fastboot brush machine programs.For user to smart mobile phone A validation informations " 12345 ", smart mobile phone A judges user's input Checking information " 12345 " is correct, then smart mobile phone A thinks that the user of current validation information " 12345 " is legal use Family, whether smart mobile phone A can be shown " allows smart mobile phone A to run fastboot brush machine programs", and show and " allow to transport The choice box X of row fastboot brush machines program " and the choice box Y of " forbidding running fastboot brush machines program ".User clicks The choice box Y of " forbidding running fastboot brush machines program ", now, smart mobile phone A can delete the target storage domain of register In total data, the default storage region of register extracts presupposed information " 700 " set in advance, and by presupposed information " 700 " are stored into the target storage domain of register, and export prompt message " you have selected to forbid smart mobile phone A to run Fastboot brush machines program ".User shuts down smart mobile phone A, and presses smart mobile phone A combination button with to smart mobile phone A The instruction of operation fastboot brush machine programs is sent, smart mobile phone A can judge that the target of register stores after receiving the instruction Whether the information stored in region is presupposed information " 700 ", and smart mobile phone A is judged in the target storage domain of register The information of storage is presupposed information " 700 " really, and smart mobile phone A can show that " you are without operation fastboot brush machine programs Authority!" warning message, and fastboot brush machine programs will not be entered.The purpose for the arrangement is that the if intelligence of user Mobile phone A is stolen by disabled user, because disabled user can not run smart mobile phone A fastboot brush machine programs, so non- Method user just can not carry out brush machine operation to smart mobile phone A, so as to user can with by smart mobile phone A antitheft software again Give smart mobile phone A for change.
In another optional embodiment of the disclosure, step S12 can also include following sub-step:Obtain register In the judgement information that prestores;Judge whether checking information is identical with judging information;It is identical with judging information in checking information When, receive the control instruction that user inputs.For example, it is assumed that user is wanted to the smart mobile phone A of oneself in fastboot brush machine journeys Brush machine operation is carried out under sequence.To smart mobile phone A validation informations " 12345 ", smart mobile phone A can obtain pre- in register user The judgement information first stored, it is assumed that judge that information is " 12345 ", then smart mobile phone A can judge the checking information of user's input Whether " 12345 " are identical with judging information " 12345 ", and smart mobile phone A can judge checking information " 12345 " with judging information " 12345 " are identical, then smart mobile phone A thinks that the user of current validation information " 12345 " is validated user, smart mobile phone A The control instruction of user's input will be received.The purpose for the arrangement is that by the judgement information that is prestored in smart mobile phone come Judge whether the checking information of user's input is correct, so as to judge whether the user is validated user, sentences in smart mobile phone When the checking information for user's input of breaking is identical with judging information, just will be considered that the user is validated user, and receives the user The control instruction of input.
In another optional embodiment of the disclosure, step S12 can also include following sub-step:Obtain register In the terminal iidentification that prestores;Checking information and terminal iidentification are sent into server, so that server is judged to verify Whether information is corresponding with terminal iidentification;In the checking information for the receiving server transmission confirmation letter corresponding with terminal iidentification During breath, the control instruction of user's input is received.For example, it is assumed that user is wanted to the smart mobile phone A of oneself in fastboot brush machines Brush machine operation is carried out under program.User can be obtained in register to smart mobile phone A validation informations " 12345 ", smart mobile phone A The terminal iidentification prestored, it is assumed that the terminal iidentification is " ID-123 ", and by checking information " 12345 " and terminal iidentification " ID- 123 " send into server, and now, server can retrieve information corresponding to terminal iidentification " ID-123 " in database, false It is " 12345 " to be located in database and retrieve information corresponding to terminal iidentification " ID-123 ", then server thinks that inputting this tests The user of card information " 12345 " is validated user, and server meeting smart mobile phone A sends confirmation, received in smart mobile phone A During the confirmation that server is sent, smart mobile phone A will receive the control instruction of user's input.The purpose for the arrangement is that will The terminal iidentification of smart mobile phone and the checking information of user's input are sent to server and verified, with determine the user whether be Validated user, after server sends confirmation, smart mobile phone will think that the user is validated user, and receive the use The control instruction of family input.
Embodiment two
Fig. 2 is a kind of schematic diagram of brush machine control device based on password according to an exemplary embodiment.This public affairs Opening the brush machine control device based on password of offer can avoid unauthorized person from running brush machine program, so as to improve mobile terminal Security.Reference picture 2, the device include receiving module 11, the first execution module 12, the second execution module 13 and the 3rd and perform mould Block 14.Wherein:
Receiving module 11, for receiving the checking information of user's input.
First execution module 12, for when judging that checking information is correct, receiving the control instruction of user's input.
Second execution module 13, for control instruction be allow brush machine program run instruction when, in the finger of register Determine storage region and extract specify information set in advance, and specify information is stored into the target storage domain of register.
3rd execution module 14, in receiving the instruction of operation brush machine program and judging target storage domain When the information of storage is specify information, brush machine program is run.
In an optional embodiment of the disclosure, the first execution module 12 can also include the first acquisition submodule, Judging submodule and the first implementation sub-module, wherein, the first acquisition submodule, for obtaining the judgement prestored in register Information.Judging submodule, for judging whether checking information is identical with judging information.First implementation sub-module, for verifying When information is identical with judging information, the control instruction of user's input is received.
In another optional embodiment of the disclosure, the first execution module 12 can also include second and obtain submodule Block, sending submodule and the second implementation sub-module, wherein, the second acquisition submodule, for obtaining what is prestored in register Terminal iidentification.Sending submodule, for checking information and terminal iidentification to be sent into server, so that server is judged to test It is whether corresponding with terminal iidentification to demonstrate,prove information.Second implementation sub-module, for receive server transmission checking information with During the corresponding confirmation of terminal iidentification, the control instruction of user's input is received.
In another optional embodiment of the disclosure, the device can also include a lower module:4th execution module, For when control instruction is the instruction for forbidding brush machine program to run, deleting whole numbers in the target storage domain of register According to.5th execution module, for receiving the instruction of operation brush machine program and judging not store in the domain of target storage During information, output can not run the warning message of brush machine program.
In another optional embodiment of the disclosure, the device can also include a lower module:6th execution module, For when control instruction is the instruction for forbidding brush machine program to run, being extracted in the default storage region of register set in advance Presupposed information, and presupposed information is stored into the target storage domain of register, presupposed information differs with specify information.The Seven execution modules, for being in the information for receiving the instruction of operation brush machine program and judging to store in the domain of target storage During presupposed information, output can not run the warning message of brush machine program.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Embodiment three
Fig. 3 is a kind of block diagram of brush machine control device 800 based on password according to an exemplary embodiment.Example Such as, device 800 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board is set It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 3, device 800 can include following one or more assemblies:Processing component 802, memory 804, power supply Component 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and Communication component 816.
The integrated operation of the usual control device 800 of processing component 802, such as communicated with display, call, data, phase The operation that machine operates and record operation is associated.Processing component 802 can refer to including one or more processors 820 to perform Order, to complete all or part of step of above-mentioned method.In addition, processing component 802 can include one or more modules, just Interaction between processing component 802 and other assemblies.For example, processing component 802 can include multi-media module, it is more to facilitate Interaction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 800.These data are shown Example includes the instruction of any application program or method for being operated on device 800, contact data, telephone book data, disappears Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between described device 800 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers Body component 808 includes a front camera and/or rear camera.When device 800 is in operator scheme, such as screening-mode or During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone by with It is set to reception external audio signal.The audio signal received can be further stored in memory 804 or via communication set Part 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented Estimate.For example, sensor cluster 814 can detect opening/closed mode of device 800, and the relative positioning of component, for example, it is described Component is the display and keypad of device 800, and sensor cluster 814 can be with 800 1 components of detection means 800 or device Position change, the existence or non-existence that user contacts with device 800, the orientation of device 800 or acceleration/deceleration and device 800 Temperature change.Sensor cluster 814 can include proximity transducer, be configured to detect in no any physical contact The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be believed by one or more application specific integrated circuits (ASIC), numeral Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 800.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device performs so that mobile terminal is able to carry out a kind of brush machine control method based on password, and methods described includes:Receive user The checking information of input;When judging that checking information is correct, the control instruction of user's input is received;It is permission in control instruction During the instruction of brush machine program operation, specify information set in advance is extracted in the designated storage area of register, and by specified letter Breath is stored into the target storage domain of register;Receive the instruction of operation brush machine program and judge target storage When the information stored in domain is specify information, brush machine program is run.
Those skilled in the art will readily occur to the present invention its after considering specification and putting into practice invention disclosed herein Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or Person's adaptations follow the general principle of the present invention and including the undocumented common knowledges in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (7)

  1. A kind of 1. brush machine control method based on password, it is characterised in that including:
    Receive the checking information of user's input;
    When judging that the checking information is correct, the control instruction of user's input is received;
    When the control instruction is the instruction for allowing brush machine program to run, set in advance in the designated storage area extraction of register Fixed specify information, and the specify information is stored into the target storage domain of the register;
    After the control instruction of the reception user input, methods described also includes:It is described to forbid in the control instruction During the instruction of brush machine program operation, the total data in the target storage domain of the register is deleted;Receiving operation institute When stating the instruction of brush machine program and judging non-storage information in the target storage domain, output can not run the brush machine The warning message of program;
    Or, after the control instruction of the reception user input, methods described also includes:In the control instruction to forbid When stating the instruction of brush machine program operation, presupposed information set in advance is extracted in the default storage region of the register, and will The presupposed information is stored into the target storage domain of the register, the presupposed information and the specify information not phase Together;It is described in the information for receiving the instruction of the operation brush machine program and judging to store in the target storage domain During presupposed information, output can not run the warning message of the brush machine program;
    It is institute in the information for receiving the instruction of the operation brush machine program and judging to store in the target storage domain When stating specify information, the brush machine program is run.
  2. 2. the brush machine control method according to claim 1 based on password, it is characterised in that described to judge described test Demonstrate,prove information it is correct when, receive user input control instruction the step of include:
    Obtain the judgement information prestored in register;
    Judge whether the checking information is identical with the judgement information;
    When the checking information is identical with the judgement information, the control instruction of user's input is received.
  3. 3. the brush machine control method according to claim 1 based on password, it is characterised in that described to judge described test Demonstrate,prove information it is correct when, receive user input control instruction the step of include:
    Obtain the terminal iidentification prestored in register;
    The checking information and the terminal iidentification are sent into server, so that the server judges the checking letter Whether breath is corresponding with the terminal iidentification;
    In the confirmation that the checking information for receiving the server transmission is corresponding with the terminal iidentification, receive The control instruction of user's input.
  4. A kind of 4. brush machine control device based on password, it is characterised in that including:
    Receiving module, for receiving the checking information of user's input;
    First execution module, for when judging that the checking information is correct, receiving the control instruction of user's input;
    Second execution module, for the control instruction be allow brush machine program run instruction when, register specify Storage region extracts specify information set in advance, and the specify information is stored to the target storage domain of the register In;
    Described device also includes:4th execution module, for being to forbid the finger of the brush machine program operation in the control instruction When making, the total data in the target storage domain of the register is deleted;5th execution module, for receiving operation institute When stating the instruction of brush machine program and judging non-storage information in the target storage domain, output can not run the brush machine The warning message of program;
    Or, described device also includes:6th execution module, for being to forbid the brush machine program to run in the control instruction During instruction, presupposed information set in advance is extracted in the default storage region of the register, and the presupposed information is stored Into the target storage domain of the register, the presupposed information differs with the specify information;7th execution module, use In being described receiving the information for instructing and judging to store in the target storage domain of the operation brush machine program During presupposed information, output can not run the warning message of the brush machine program;
    3rd execution module, for receiving the instruction for running the brush machine program and judging the target storage domain When the information of middle storage is the specify information, the brush machine program is run.
  5. 5. the brush machine control device according to claim 4 based on password, it is characterised in that the first execution module bag Include:
    First acquisition submodule, for obtaining the judgement information prestored in register;
    Judging submodule, for judging whether the checking information is identical with the judgement information;
    First implementation sub-module, for when the checking information is identical with the judgement information, receiving the control of user's input Instruction.
  6. 6. the brush machine control device according to claim 4 based on password, it is characterised in that the first execution module bag Include:
    Second acquisition submodule, for obtaining the terminal iidentification prestored in register;
    Sending submodule, for the checking information and the terminal iidentification to be sent into server, so that the server Judge whether the checking information is corresponding with the terminal iidentification;
    Second implementation sub-module, for relative with the terminal iidentification in the checking information for receiving the server transmission During the confirmation answered, the control instruction of user's input is received.
  7. A kind of 7. brush machine control device based on password, it is characterised in that including:
    Processor;
    For storing the memory of processor-executable instruction;
    Wherein, the processor is configured as:
    Receive the checking information of user's input;
    When judging that the checking information is correct, the control instruction of user's input is received;
    When the control instruction is the instruction for allowing brush machine program to run, set in advance in the designated storage area extraction of register Fixed specify information, and the specify information is stored into the target storage domain of the register;
    It is to forbid the finger of the brush machine program operation in the control instruction after the control instruction of the reception user input When making, the total data in the target storage domain of the register is deleted;Receiving the instruction that runs the brush machine program And when judging non-storage information in the target storage domain, output can not run the warning message of the brush machine program;
    Or, it is to forbid the brush machine program to run in the control instruction after the control instruction of the reception user input Instruction when, extract presupposed information set in advance in the default storage region of the register, and the presupposed information is deposited Into the target storage domain of the register, the presupposed information differs with the specify information for storage;Receiving operation When the information for instructing and judging to store in the target storage domain of the brush machine program is the presupposed information, output The warning message of the brush machine program can not be run;
    It is institute in the information for receiving the instruction of the operation brush machine program and judging to store in the target storage domain When stating specify information, the brush machine program is run.
CN201410420971.1A 2014-08-25 2014-08-25 Brush machine control method and device based on password Active CN104216742B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410420971.1A CN104216742B (en) 2014-08-25 2014-08-25 Brush machine control method and device based on password

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410420971.1A CN104216742B (en) 2014-08-25 2014-08-25 Brush machine control method and device based on password

Publications (2)

Publication Number Publication Date
CN104216742A CN104216742A (en) 2014-12-17
CN104216742B true CN104216742B (en) 2017-12-19

Family

ID=52098271

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410420971.1A Active CN104216742B (en) 2014-08-25 2014-08-25 Brush machine control method and device based on password

Country Status (1)

Country Link
CN (1) CN104216742B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104636900B (en) * 2015-02-10 2018-07-31 西安智道取宝科技有限公司 The control method and system of highly reliable express box
CN104809368B (en) * 2015-03-19 2018-01-23 广东欧珀移动通信有限公司 One kind downloads guard method and terminal
CN104933349B (en) * 2015-05-20 2017-10-13 广东欧珀移动通信有限公司 With the USB switching devices and download verification method for downloading authentication function
CN105335632B (en) * 2015-10-09 2018-05-04 广东欧珀移动通信有限公司 The guard method of payment information and device
CN105740013B (en) * 2016-01-26 2019-08-23 Oppo广东移动通信有限公司 Brush machine method of controlling operation thereof and device
CN105975825A (en) * 2016-04-25 2016-09-28 乐视控股(北京)有限公司 Safety protection method and device, and mobile terminal
CN105930719B (en) * 2016-05-04 2019-06-11 南京诚达运动控制系统有限公司 A kind of numerically-controlled machine tool control panel encryption method
CN106937275B (en) * 2017-02-13 2020-10-16 深圳盈达信息科技有限公司 Equipment for storing system unique identifier and hardware ID (identity) under android system
CN106992857B (en) * 2017-03-30 2020-11-10 义乌国信土地规划咨询有限公司 Machine-swiping verification method and device
CN107358108A (en) * 2017-07-06 2017-11-17 北京小米移动软件有限公司 software control method, device and mobile terminal
CN112004227B (en) * 2020-08-25 2024-02-02 上海商米科技集团股份有限公司 Brushing control method and system of mobile equipment
CN113514093A (en) * 2021-04-21 2021-10-19 北京锐达仪表有限公司 Safety instrument debugging terminal

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378155A (en) * 2011-11-29 2012-03-14 深圳芯智汇科技有限公司 System and method for remotely controlling mobile terminal
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN103577733A (en) * 2013-09-02 2014-02-12 小米科技有限责任公司 Safety protection method and device for terminal equipment and terminal equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7178015B2 (en) * 2004-01-12 2007-02-13 Hewlett-Packard Development Company, L.P. Security measures in a partitionable computing system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102378155A (en) * 2011-11-29 2012-03-14 深圳芯智汇科技有限公司 System and method for remotely controlling mobile terminal
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN102694920A (en) * 2012-05-28 2012-09-26 广东欧珀移动通信有限公司 Mobile phone antitheft method
CN103577733A (en) * 2013-09-02 2014-02-12 小米科技有限责任公司 Safety protection method and device for terminal equipment and terminal equipment

Also Published As

Publication number Publication date
CN104216742A (en) 2014-12-17

Similar Documents

Publication Publication Date Title
CN104216742B (en) Brush machine control method and device based on password
CN105389516A (en) Sensitive picture reminding method and apparatus
CN104933351A (en) Information security processing method and information security processing device
CN106210238B (en) Short message storage method and device
CN104282064B (en) Gate inhibition's answer method and device
CN107734178A (en) Presentation of information processing method, device, equipment and storage medium
CN104063654B (en) The monitoring method and device of application program
CN107404723A (en) A kind of method and apparatus of access base station
CN106325670A (en) Message prompting method and device
CN106529277A (en) Message preview method and device
CN106446653A (en) Application authority management method and device and electronic equipment
CN107230060A (en) The method and apparatus that a kind of account is reported the loss
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN106888309A (en) The fingerprint recognition reminding method and device of video terminal
CN106953969A (en) The screen control method and device of mobile terminal
CN106372943A (en) Message processing method and device
CN106537288A (en) Application autostart control method and device
CN106845199A (en) Object authentication method and device
CN104298903B (en) Access the method and device of mobile terminal
CN106709284A (en) Root package validation method and device
CN106471513A (en) Authority control method and device
CN106791145A (en) Short message management method and device
CN107656616A (en) Input interface displaying method, device, electronic equipment
CN106789554A (en) The method and device of short message treatment
CN104506710B (en) Short message management method, terminal and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant