CN104216742B - Brush machine control method and device based on password - Google Patents
Brush machine control method and device based on password Download PDFInfo
- Publication number
- CN104216742B CN104216742B CN201410420971.1A CN201410420971A CN104216742B CN 104216742 B CN104216742 B CN 104216742B CN 201410420971 A CN201410420971 A CN 201410420971A CN 104216742 B CN104216742 B CN 104216742B
- Authority
- CN
- China
- Prior art keywords
- information
- brush machine
- instruction
- machine program
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The disclosure is directed to a kind of brush machine control method and device based on password, this method includes:Receive the checking information of user's input;When judging that checking information is correct, the control instruction of user's input is received;When control instruction is the instruction for allowing brush machine program to run, specify information set in advance is extracted in the designated storage area of register, and specify information is stored into the target storage domain of register;When the information for receiving the instruction of operation brush machine program and judging to store in the domain of target storage is specify information, brush machine program is run.The scheme that the disclosure provides is only when the checking information of user's input is correct, and user can input control instruction, and then run brush machine program, so the disclosure can avoid unauthorized person from running brush machine program, so as to improve the security of mobile terminal.
Description
Technical field
The present invention relates to communication technical field, in particular, is related to the brush machine control method and device based on password.
Background technology
At present, most of smart mobile phones can by way of brush machine repacking operation system.Under normal circumstances, Yong Huke
With by the pre-set combination button of cell phone manufacturer, to enter the brush machine interface of smart mobile phone, to reinstall intelligent hand
The operating system of machine.For example, user wants to reinstall smart mobile phone A operating system, the user can be in smart mobile phone
During off-mode, the pre-set combination button of cell phone manufacturer is pressed, smart mobile phone will enter Shua Ji circle from off-mode
Face, now, the user can carry out brush machine operation to the smart mobile phone in several ways, to reset the operation of the smart mobile phone
System.
Studying with practice process, inventor has found that above-mentioned correlation technique at least has problems with:
Due to smart mobile phone will not the user for removing to identify current brush machine of active whether be validated user, as long as in intelligent hand
Machine is in the combination button that input handset manufacturer is pre-set under off-mode, and anyone can be carried out to the smart mobile phone
Brush machine operates, to reset the operating system of the mobile phone, once so the smart mobile phone of user is stolen by unauthorized person, then it is illegal
Personnel will carry out brush machine operation to the smart mobile phone, to remove cryptoguard or the anti-theft feature in the smart mobile phone, institute
It can not prevent unauthorized person from carrying out brush machine operation to smart mobile phone with above-mentioned related brush machine technology, so as to reduce smart mobile phone
Security.
Therefore, unauthorized person how is avoided to carry out brush machine operation to smart mobile phone, the problem of turning into current urgent need to resolve.
The content of the invention
To overcome problem present in correlation technique, the disclosure provides a kind of brush machine control method and dress based on password
Put, to avoid unauthorized person from carrying out brush machine operation to mobile terminal, so as to improve the security of mobile terminal.
According to the first aspect of the embodiment of the present disclosure, there is provided a kind of brush machine control method based on password, including:
Receive the checking information of user's input;
When judging that the checking information is correct, the control instruction of user's input is received;
It is pre- in the designated storage area extraction of register when the control instruction is the instruction for allowing brush machine program to run
The specify information first set, and the specify information is stored into the target storage domain of the register;
Receive the instruction of the operation brush machine program and judge the information stored in the target storage domain
For the specify information when, run the brush machine program.
Optionally, it is described when judging that the checking information is correct, receive user input control instruction the step of wrap
Include:
Obtain the judgement information prestored in register;
Judge whether the checking information is identical with the judgement information;
When the checking information is identical with the judgement information, the control instruction of user's input is received.
Optionally, when the checking information is correct, receive user input control instruction the step of include:
Obtain the terminal iidentification prestored in register;
The checking information and the terminal iidentification are sent into server, so that the server judges described test
It is whether corresponding with the terminal iidentification to demonstrate,prove information;
In the confirmation that the checking information for receiving the server transmission is corresponding with the terminal iidentification,
Receive the control instruction of user's input.
Optionally, methods described also includes:
When the control instruction is to forbid the instruction of the brush machine program operation, the target storage of the register is deleted
Total data in region;
The non-storage information in receiving the instruction for running the brush machine program and judging the target storage domain
When, output can not run the warning message of the brush machine program.
Optionally, after the control instruction of the reception user input, methods described also includes:
When the control instruction is to forbid the instruction of the brush machine program operation, in the default memory block of the register
Presupposed information set in advance is extracted in domain, and the presupposed information is stored into the target storage domain of the register, institute
Presupposed information is stated to differ with the specify information;
Receive the instruction of the operation brush machine program and judge the information stored in the target storage domain
For the presupposed information when, output can not run the warning message of the brush machine program.
According to the second aspect of the embodiment of the present disclosure, there is provided a kind of brush machine control device based on password, including:
Receiving module, for receiving the checking information of user's input;
First execution module, for when judging that the checking information is correct, receiving the control instruction of user's input;
Second execution module, for the control instruction be allow brush machine program run instruction when, in register
Designated storage area extracts specify information set in advance, and the specify information is stored to the target storage of the register
In region;
3rd execution module, for receiving the instruction for running the brush machine program and judging the target storage
When the information stored in region is the specify information, the brush machine program is run.
Optionally, first execution module includes:
First acquisition submodule, for obtaining the judgement information prestored in register;
Judging submodule, for judging whether the checking information is identical with the judgement information;
First implementation sub-module, for when the checking information is identical with the judgement information, receiving user's input
Control instruction.
Optionally, first execution module includes:
Second acquisition submodule, for obtaining the terminal iidentification prestored in register;
Sending submodule, for the checking information and the terminal iidentification to be sent into server, so that the clothes
Business device judges whether the checking information is corresponding with the terminal iidentification;
Second implementation sub-module, for receiving the checking information and the terminal iidentification that the server is sent
During corresponding confirmation, the control instruction of user's input is received.
Optionally, described device also includes:
4th execution module, for when the control instruction is to forbid the instruction of the brush machine program operation, deleting institute
State the total data in the target storage domain of register;
5th execution module, for receiving the instruction for running the brush machine program and judging the target storage
In region during non-storage information, output can not run the warning message of the brush machine program.
Optionally, described device also includes:
6th execution module, for when the control instruction is to forbid the instruction of brush machine program operation, described
The default storage region of register extracts presupposed information set in advance, and the presupposed information is stored to the register
In the domain of target storage, the presupposed information differs with the specify information;
7th execution module, for receiving the instruction for running the brush machine program and judging the target storage
When the information stored in region is the presupposed information, output can not run the warning message of the brush machine program.
According to the third aspect of the embodiment of the present disclosure, there is provided a kind of brush machine control device based on password, including:
Processor;
For storing the memory of processor-executable instruction;
Wherein, the processor is configured as:
Receive the checking information of user's input;
When judging that the checking information is correct, the control instruction of user's input is received;
It is pre- in the designated storage area extraction of register when the control instruction is the instruction for allowing brush machine program to run
The specify information first set, and the specify information is stored into the target storage domain of the register;
Receive the instruction of the operation brush machine program and judge the information stored in the target storage domain
For the specify information when, run the brush machine program.
The technical scheme provided by this disclosed embodiment can include the following benefits:The scheme that the disclosure provides is being sentenced
Break user input checking information it is correct in the case of, can receive user input control instruction, will refer to so as to realize
Determine information to be stored in the domain of target storage, now, can be to run brush machine journey as long as receiving the instruction of operation brush machine program
Sequence.Therefore, only when the checking information of user's input is correct, user can input control and refer to the scheme that the disclosure provides
Order, and then brush machine program is run, so the disclosure can avoid unauthorized person from running brush machine program, so as to improve mobile terminal
Security.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not
The disclosure can be limited.
Brief description of the drawings
Accompanying drawing herein is merged in specification and forms the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of brush machine control method based on password according to an exemplary embodiment.
Fig. 2 is a kind of schematic diagram of brush machine control device based on password according to an exemplary embodiment.
Fig. 3 is a kind of block diagram of brush machine control device based on password according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, of the invention.
Embodiment one
Fig. 1 is a kind of flow chart of brush machine control method based on password according to an exemplary embodiment, such as Fig. 1
Shown, the brush machine control method based on password shown in Fig. 1 can be used in terminal.The brush machine based on password that the disclosure provides
Control method can avoid unauthorized person from running brush machine program, so as to improve the security of mobile terminal.This method includes following
Step.
In step s 11, the checking information of user's input is received.
Wherein, the scheme that the disclosure provides can be applied in the terminal, and terminal can be received for smart mobile phone etc. and tested
The equipment for demonstrate,proving information.Checking information can be various types of text informations, for example, checking information is Chinese character information, numeral letter
Breath or character information etc.;Checking information can also be the graphical information that is inputted on the screen of terminal of user, for example, user can be with
Specific figure is inputted on the screen of terminal using finger;Checking information can also be voice messaging, for example, user can lead to
Cross the microphone input voice information of terminal.Certainly, checking information can also be other kinds of information, it is not limited to it is above-mentioned
Information type through offer.
Wherein, when the checking information that user inputs to terminal is correct, terminal just may proceed to receive permitting for user input
Perhaps or forbid brush machine program run instruction;In the checking information mistake that user inputs to terminal, terminal just will not continue to connect
The instruction received the permission of user input or forbid brush machine program to run.For example, validated user can possess correct checking information,
So validated user can input correct checking information when needing to carry out brush machine to terminal to terminal, and in terminal authentication
After, continue the instruction for allowing brush machine program to run to terminal input.Now, user can be to be pressed by set in advance
Key combination sends the instruction of operation brush machine program to terminal, and when terminal receives the instruction of the operation brush machine program, terminal is just
The brush machine program can be run, and shows brush machine interface corresponding to the brush machine program, so that user can be on the brush machine interface
Carry out brush machine operation.After user completes the operation of brush machine on the brush machine interface, user can input correct to terminal again
Checking information, and in terminal authentication after, continue the instruction for forbidding brush machine program to run to terminal input, now, even if
Key combination set in advance is inputted to terminal, terminal is started brush machine program, so the method that the disclosure provides can
So that disabled user after the terminal is stolen, can not carry out brush machine operation, and then can have validated user to the terminal
Chance gives the terminal for change by the prefabricated anti-theft program in terminal.
In step s 12, when judging that checking information is correct, the control instruction of user's input is received.
Wherein, after the checking information that terminal receives user's input, just whether terminal need to judge the checking information
Really, when terminal judges that the checking information is correct, then terminal can with receive user input control instruction.If terminal
Judge that the checking information of user's input is incorrect, then terminal just will not continue to receive the control instruction of user's input.
In addition, control instruction can be the instruction for allowing brush machine program to run, or forbid what brush machine program was run
Instruction.User can allow the instruction that brush machine program runs, so as to ensure that terminal can be in desired brush machine to terminal input
The brush machine program is run during the instruction for receiving operation brush machine program;User can forbid when brush machine is completed to terminal input
The instruction of brush machine program operation, so as to ensure that terminal can will not run the brush machine when receiving the instruction of operation brush machine program
Program.
In step s 13, when control instruction is the instruction for allowing brush machine program to run, in the designated storage area of register
Specify information set in advance is extracted in domain, and specify information is stored into the target storage domain of register.
Wherein, register can be the memory of terminal, and the designated storage area of register is pre-set one
Memory space, the designated storage area are used to deposit specify information set in advance.The target storage domain of register is advance
Another memory space set, when it is the instruction for allowing brush machine program to run that terminal recognition, which goes out control instruction, the mesh
Mark storage region will be responsible for storing specify information set in advance.Specify information can be various types of text informations, example
Such as, checking information can be Chinese character information, digital information or character information etc., and certainly, specify information can also be other types
Information, it is not limited to the above-mentioned information type provided.
In addition, the purpose that the specify information of designated storage area is stored to target storage domain is to authorize brush machine program
The authority of operation.Because when receiving the instruction of operation brush machine program, terminal needs to judge to deposit in the domain of target storage terminal
Whether the information of storage is specify information, if the information that terminal is judged to store in the domain of target storage is specify information, then
Terminal thinks that the instruction of the operation brush machine program is valid instruction, and terminal can run the brush machine program;If terminal judges mesh
The information stored in mark storage region is not specify information, and terminal will be considered that the instruction of the operation brush machine program is illegal instruction,
Terminal will not run the brush machine program.So only when control instruction is the instruction for allowing brush machine program to run, terminal just meeting
Specify information in designated storage area is stored into the target storage domain of register, so that terminal is receiving operation brush
When the information for instructing and judging to store in the domain of target storage of machine program is specify information, brush machine program is run.
In step S14, stored in receiving the instruction of operation brush machine program and judging target storage domain
When information is specify information, brush machine program is run.
Wherein, brush machine program can be brush machine program prefabricated in terminal.For example, brush machine program starts to be quick
Fastboot brush machine programs, receive the instruction of operation fastboot brush machine programs in terminal and judge target storage domain
When the information of middle storage is specify information, terminal will run fastboot brush machine programs, in order to which user brushes in fastboot
Under the interactive interface of machine program, brush machine operation is carried out to terminal.And for example, brush machine program is recovery Recovery brush machine programs,
The information for instructing and judging to store in the domain of target storage that terminal receives operation Recovery brush machine programs is specified
During information, terminal will run Recovery brush machine programs, in order to which user is under the interactive interface of Recovery brush machine programs,
Brush machine operation is carried out to terminal.
In the embodiment shown in fig. 1, the scheme that the disclosure provides is correct in the checking information for judging user's input
In the case of, the control instruction of user's input can be received, specify information is stored in the domain of target storage so as to realize, this
When, can be to run brush machine program as long as receiving the instruction of operation brush machine program.Therefore, the scheme that the disclosure provides only has
When the checking information of user's input is correct, user can input control instruction, and then run brush machine program, so the disclosure
Unauthorized person can be avoided to run brush machine program, so as to improve the security of mobile terminal.
Illustrate the method shown in Fig. 1 below by instantiation.
For example, it is assumed that user wants to carry out brush machine operation under fastboot brush machine programs to the smart mobile phone A of oneself.With
To smart mobile phone A validation informations " 12345 ", smart mobile phone A judges that the checking information " 12345 " of user's input is just at family
True, then smart mobile phone A thinks that the user of current validation information " 12345 " is validated user, and smart mobile phone A can be shown
" smart mobile phone A whether is allowed to run fastboot brush machine programs", and show " allowing to run fastboot brush machines program "
The choice box X and choice box Y of " forbidding running fastboot brush machines program ".User, which has clicked, " to be allowed to run fastboot brush machines
The choice box X of program ", now, smart mobile phone A is extracted specify information set in advance in the designated storage area of register
" 800 ", and the specify information " 800 " is stored into the target storage domain of register, smart mobile phone A output prompt messages
" you have selected to allow smart mobile phone A to run fastboot brush machines program ".User shuts down smart mobile phone A, and presses intelligent hand
To send the instruction of operation fastboot brush machine programs to smart mobile phone A, smart mobile phone A receives this and referred to machine A combination button
Whether the information that can judge to store in the target storage domain of register after order is specify information " 800 ", and smart mobile phone A sentences
The information stored in the target storage domain for register of breaking is specify information " 800 " really, and smart mobile phone A can be run
Fastboot brush machine programs, in order to which user carries out brush machine operation to smart mobile phone A.
In an optional embodiment of the disclosure, after step s 12, the method that the disclosure provides can also include
Following steps:When control instruction is the instruction for forbidding brush machine program to run, delete complete in the target storage domain of register
Portion's data;In non-storage information in receiving the instruction of operation brush machine program and judging target storage domain, nothing is exported
Method runs the warning message of brush machine program.For example, it is assumed that user, which is not intended to the smart mobile phone A of oneself, can run fastboot brushes
Machine program.For user to smart mobile phone A validation informations " 12345 ", smart mobile phone A judges the checking information of user's input
" 12345 " are correct, then smart mobile phone A thinks that the user of current validation information " 12345 " is validated user, intelligent hand
Whether machine A can be shown " allows smart mobile phone A to run fastboot brush machine programs", and show " allow run fastboot
The choice box X of brush machine program " and the choice box Y of " forbidding running fastboot brush machines program ".User, which has clicked, " to be forbidden running
The choice box Y of fastboot brush machines program ", now, smart mobile phone A can delete whole numbers in the target storage domain of register
According to, and export prompt message " you have selected to forbid smart mobile phone A operation fastboot brush machines program ".User is by smart mobile phone A
Shutdown, and smart mobile phone A combination button is pressed with the instruction to smart mobile phone A transmission operation fastboot brush machine programs, intelligence
Can mobile phone A receive in the target storage domain that register can be judged after the instruction whether non-storage information, and smart mobile phone A
Judge certain non-storage information in the target storage domain of register, smart mobile phone A can show that " you are without operation
The authority of fastboot brush machine programs!" warning message, and fastboot brush machine programs will not be entered.The purpose so done
It is, if the smart mobile phone A of user is stolen by disabled user, because disabled user can not run smart mobile phone A's
Fastboot brush machine programs, so disabled user just can not carry out brush machine operation to smart mobile phone A, so as to which user can be to pass through
Smart mobile phone A antitheft software gives smart mobile phone A for change again.
In another optional embodiment of the disclosure, after step s 12, the method that the disclosure provides can also wrap
Include following steps:It is pre- in the default storage region extraction of register when control instruction is the instruction for forbidding brush machine program to run
The presupposed information first set, and presupposed information is stored into the target storage domain of register, presupposed information and specify information
Differ.It is presupposed information in the information for receiving the instruction of operation brush machine program and judging to store in the domain of target storage
When, output can not run the warning message of brush machine program.For example, it is assumed that the smart mobile phone A that user is not intended to oneself can be run
Fastboot brush machine programs.For user to smart mobile phone A validation informations " 12345 ", smart mobile phone A judges user's input
Checking information " 12345 " is correct, then smart mobile phone A thinks that the user of current validation information " 12345 " is legal use
Family, whether smart mobile phone A can be shown " allows smart mobile phone A to run fastboot brush machine programs", and show and " allow to transport
The choice box X of row fastboot brush machines program " and the choice box Y of " forbidding running fastboot brush machines program ".User clicks
The choice box Y of " forbidding running fastboot brush machines program ", now, smart mobile phone A can delete the target storage domain of register
In total data, the default storage region of register extracts presupposed information " 700 " set in advance, and by presupposed information
" 700 " are stored into the target storage domain of register, and export prompt message " you have selected to forbid smart mobile phone A to run
Fastboot brush machines program ".User shuts down smart mobile phone A, and presses smart mobile phone A combination button with to smart mobile phone A
The instruction of operation fastboot brush machine programs is sent, smart mobile phone A can judge that the target of register stores after receiving the instruction
Whether the information stored in region is presupposed information " 700 ", and smart mobile phone A is judged in the target storage domain of register
The information of storage is presupposed information " 700 " really, and smart mobile phone A can show that " you are without operation fastboot brush machine programs
Authority!" warning message, and fastboot brush machine programs will not be entered.The purpose for the arrangement is that the if intelligence of user
Mobile phone A is stolen by disabled user, because disabled user can not run smart mobile phone A fastboot brush machine programs, so non-
Method user just can not carry out brush machine operation to smart mobile phone A, so as to user can with by smart mobile phone A antitheft software again
Give smart mobile phone A for change.
In another optional embodiment of the disclosure, step S12 can also include following sub-step:Obtain register
In the judgement information that prestores;Judge whether checking information is identical with judging information;It is identical with judging information in checking information
When, receive the control instruction that user inputs.For example, it is assumed that user is wanted to the smart mobile phone A of oneself in fastboot brush machine journeys
Brush machine operation is carried out under sequence.To smart mobile phone A validation informations " 12345 ", smart mobile phone A can obtain pre- in register user
The judgement information first stored, it is assumed that judge that information is " 12345 ", then smart mobile phone A can judge the checking information of user's input
Whether " 12345 " are identical with judging information " 12345 ", and smart mobile phone A can judge checking information " 12345 " with judging information
" 12345 " are identical, then smart mobile phone A thinks that the user of current validation information " 12345 " is validated user, smart mobile phone A
The control instruction of user's input will be received.The purpose for the arrangement is that by the judgement information that is prestored in smart mobile phone come
Judge whether the checking information of user's input is correct, so as to judge whether the user is validated user, sentences in smart mobile phone
When the checking information for user's input of breaking is identical with judging information, just will be considered that the user is validated user, and receives the user
The control instruction of input.
In another optional embodiment of the disclosure, step S12 can also include following sub-step:Obtain register
In the terminal iidentification that prestores;Checking information and terminal iidentification are sent into server, so that server is judged to verify
Whether information is corresponding with terminal iidentification;In the checking information for the receiving server transmission confirmation letter corresponding with terminal iidentification
During breath, the control instruction of user's input is received.For example, it is assumed that user is wanted to the smart mobile phone A of oneself in fastboot brush machines
Brush machine operation is carried out under program.User can be obtained in register to smart mobile phone A validation informations " 12345 ", smart mobile phone A
The terminal iidentification prestored, it is assumed that the terminal iidentification is " ID-123 ", and by checking information " 12345 " and terminal iidentification " ID-
123 " send into server, and now, server can retrieve information corresponding to terminal iidentification " ID-123 " in database, false
It is " 12345 " to be located in database and retrieve information corresponding to terminal iidentification " ID-123 ", then server thinks that inputting this tests
The user of card information " 12345 " is validated user, and server meeting smart mobile phone A sends confirmation, received in smart mobile phone A
During the confirmation that server is sent, smart mobile phone A will receive the control instruction of user's input.The purpose for the arrangement is that will
The terminal iidentification of smart mobile phone and the checking information of user's input are sent to server and verified, with determine the user whether be
Validated user, after server sends confirmation, smart mobile phone will think that the user is validated user, and receive the use
The control instruction of family input.
Embodiment two
Fig. 2 is a kind of schematic diagram of brush machine control device based on password according to an exemplary embodiment.This public affairs
Opening the brush machine control device based on password of offer can avoid unauthorized person from running brush machine program, so as to improve mobile terminal
Security.Reference picture 2, the device include receiving module 11, the first execution module 12, the second execution module 13 and the 3rd and perform mould
Block 14.Wherein:
Receiving module 11, for receiving the checking information of user's input.
First execution module 12, for when judging that checking information is correct, receiving the control instruction of user's input.
Second execution module 13, for control instruction be allow brush machine program run instruction when, in the finger of register
Determine storage region and extract specify information set in advance, and specify information is stored into the target storage domain of register.
3rd execution module 14, in receiving the instruction of operation brush machine program and judging target storage domain
When the information of storage is specify information, brush machine program is run.
In an optional embodiment of the disclosure, the first execution module 12 can also include the first acquisition submodule,
Judging submodule and the first implementation sub-module, wherein, the first acquisition submodule, for obtaining the judgement prestored in register
Information.Judging submodule, for judging whether checking information is identical with judging information.First implementation sub-module, for verifying
When information is identical with judging information, the control instruction of user's input is received.
In another optional embodiment of the disclosure, the first execution module 12 can also include second and obtain submodule
Block, sending submodule and the second implementation sub-module, wherein, the second acquisition submodule, for obtaining what is prestored in register
Terminal iidentification.Sending submodule, for checking information and terminal iidentification to be sent into server, so that server is judged to test
It is whether corresponding with terminal iidentification to demonstrate,prove information.Second implementation sub-module, for receive server transmission checking information with
During the corresponding confirmation of terminal iidentification, the control instruction of user's input is received.
In another optional embodiment of the disclosure, the device can also include a lower module:4th execution module,
For when control instruction is the instruction for forbidding brush machine program to run, deleting whole numbers in the target storage domain of register
According to.5th execution module, for receiving the instruction of operation brush machine program and judging not store in the domain of target storage
During information, output can not run the warning message of brush machine program.
In another optional embodiment of the disclosure, the device can also include a lower module:6th execution module,
For when control instruction is the instruction for forbidding brush machine program to run, being extracted in the default storage region of register set in advance
Presupposed information, and presupposed information is stored into the target storage domain of register, presupposed information differs with specify information.The
Seven execution modules, for being in the information for receiving the instruction of operation brush machine program and judging to store in the domain of target storage
During presupposed information, output can not run the warning message of brush machine program.
On the device in above-described embodiment, wherein modules perform the concrete mode of operation in relevant this method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Embodiment three
Fig. 3 is a kind of block diagram of brush machine control device 800 based on password according to an exemplary embodiment.Example
Such as, device 800 can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, and flat board is set
It is standby, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 3, device 800 can include following one or more assemblies:Processing component 802, memory 804, power supply
Component 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and
Communication component 816.
The integrated operation of the usual control device 800 of processing component 802, such as communicated with display, call, data, phase
The operation that machine operates and record operation is associated.Processing component 802 can refer to including one or more processors 820 to perform
Order, to complete all or part of step of above-mentioned method.In addition, processing component 802 can include one or more modules, just
Interaction between processing component 802 and other assemblies.For example, processing component 802 can include multi-media module, it is more to facilitate
Interaction between media component 808 and processing component 802.
Memory 804 is configured as storing various types of data to support the operation in device 800.These data are shown
Example includes the instruction of any application program or method for being operated on device 800, contact data, telephone book data, disappears
Breath, picture, video etc..Memory 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM) are erasable to compile
Journey read-only storage (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash
Device, disk or CD.
Power supply module 806 provides electric power for the various assemblies of device 800.Power supply module 806 can include power management system
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 800.
Multimedia groupware 808 is included in the screen of one output interface of offer between described device 800 and user.One
In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch sensings
Device is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or sliding action
Border, but also detect and touched or the related duration and pressure of slide with described.In certain embodiments, more matchmakers
Body component 808 includes a front camera and/or rear camera.When device 800 is in operator scheme, such as screening-mode or
During video mode, front camera and/or rear camera can receive outside multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio-frequency assembly 810 is configured as output and/or input audio signal.For example, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, microphone by with
It is set to reception external audio signal.The audio signal received can be further stored in memory 804 or via communication set
Part 816 is sent.In certain embodiments, audio-frequency assembly 810 also includes a loudspeaker, for exports audio signal.
I/O interfaces 812 provide interface between processing component 802 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, and the state for providing various aspects for device 800 is commented
Estimate.For example, sensor cluster 814 can detect opening/closed mode of device 800, and the relative positioning of component, for example, it is described
Component is the display and keypad of device 800, and sensor cluster 814 can be with 800 1 components of detection means 800 or device
Position change, the existence or non-existence that user contacts with device 800, the orientation of device 800 or acceleration/deceleration and device 800
Temperature change.Sensor cluster 814 can include proximity transducer, be configured to detect in no any physical contact
The presence of neighbouring object.Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, for into
As being used in application.In certain embodiments, the sensor cluster 814 can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.In an exemplary implementation
In example, communication component 816 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 816 also includes near-field communication (NFC) module, to promote junction service.Example
Such as, in NFC module radio frequency identification (RFID) technology can be based on, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 800 can be believed by one or more application specific integrated circuits (ASIC), numeral
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory 804 of instruction, above-mentioned instruction can be performed to complete the above method by the processor 820 of device 800.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device performs so that mobile terminal is able to carry out a kind of brush machine control method based on password, and methods described includes:Receive user
The checking information of input;When judging that checking information is correct, the control instruction of user's input is received;It is permission in control instruction
During the instruction of brush machine program operation, specify information set in advance is extracted in the designated storage area of register, and by specified letter
Breath is stored into the target storage domain of register;Receive the instruction of operation brush machine program and judge target storage
When the information stored in domain is specify information, brush machine program is run.
Those skilled in the art will readily occur to the present invention its after considering specification and putting into practice invention disclosed herein
Its embodiment.The application be intended to the present invention any modification, purposes or adaptations, these modifications, purposes or
Person's adaptations follow the general principle of the present invention and including the undocumented common knowledges in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be appreciated that the invention is not limited in the precision architecture for being described above and being shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present invention is only limited by appended claim.
Claims (7)
- A kind of 1. brush machine control method based on password, it is characterised in that including:Receive the checking information of user's input;When judging that the checking information is correct, the control instruction of user's input is received;When the control instruction is the instruction for allowing brush machine program to run, set in advance in the designated storage area extraction of register Fixed specify information, and the specify information is stored into the target storage domain of the register;After the control instruction of the reception user input, methods described also includes:It is described to forbid in the control instruction During the instruction of brush machine program operation, the total data in the target storage domain of the register is deleted;Receiving operation institute When stating the instruction of brush machine program and judging non-storage information in the target storage domain, output can not run the brush machine The warning message of program;Or, after the control instruction of the reception user input, methods described also includes:In the control instruction to forbid When stating the instruction of brush machine program operation, presupposed information set in advance is extracted in the default storage region of the register, and will The presupposed information is stored into the target storage domain of the register, the presupposed information and the specify information not phase Together;It is described in the information for receiving the instruction of the operation brush machine program and judging to store in the target storage domain During presupposed information, output can not run the warning message of the brush machine program;It is institute in the information for receiving the instruction of the operation brush machine program and judging to store in the target storage domain When stating specify information, the brush machine program is run.
- 2. the brush machine control method according to claim 1 based on password, it is characterised in that described to judge described test Demonstrate,prove information it is correct when, receive user input control instruction the step of include:Obtain the judgement information prestored in register;Judge whether the checking information is identical with the judgement information;When the checking information is identical with the judgement information, the control instruction of user's input is received.
- 3. the brush machine control method according to claim 1 based on password, it is characterised in that described to judge described test Demonstrate,prove information it is correct when, receive user input control instruction the step of include:Obtain the terminal iidentification prestored in register;The checking information and the terminal iidentification are sent into server, so that the server judges the checking letter Whether breath is corresponding with the terminal iidentification;In the confirmation that the checking information for receiving the server transmission is corresponding with the terminal iidentification, receive The control instruction of user's input.
- A kind of 4. brush machine control device based on password, it is characterised in that including:Receiving module, for receiving the checking information of user's input;First execution module, for when judging that the checking information is correct, receiving the control instruction of user's input;Second execution module, for the control instruction be allow brush machine program run instruction when, register specify Storage region extracts specify information set in advance, and the specify information is stored to the target storage domain of the register In;Described device also includes:4th execution module, for being to forbid the finger of the brush machine program operation in the control instruction When making, the total data in the target storage domain of the register is deleted;5th execution module, for receiving operation institute When stating the instruction of brush machine program and judging non-storage information in the target storage domain, output can not run the brush machine The warning message of program;Or, described device also includes:6th execution module, for being to forbid the brush machine program to run in the control instruction During instruction, presupposed information set in advance is extracted in the default storage region of the register, and the presupposed information is stored Into the target storage domain of the register, the presupposed information differs with the specify information;7th execution module, use In being described receiving the information for instructing and judging to store in the target storage domain of the operation brush machine program During presupposed information, output can not run the warning message of the brush machine program;3rd execution module, for receiving the instruction for running the brush machine program and judging the target storage domain When the information of middle storage is the specify information, the brush machine program is run.
- 5. the brush machine control device according to claim 4 based on password, it is characterised in that the first execution module bag Include:First acquisition submodule, for obtaining the judgement information prestored in register;Judging submodule, for judging whether the checking information is identical with the judgement information;First implementation sub-module, for when the checking information is identical with the judgement information, receiving the control of user's input Instruction.
- 6. the brush machine control device according to claim 4 based on password, it is characterised in that the first execution module bag Include:Second acquisition submodule, for obtaining the terminal iidentification prestored in register;Sending submodule, for the checking information and the terminal iidentification to be sent into server, so that the server Judge whether the checking information is corresponding with the terminal iidentification;Second implementation sub-module, for relative with the terminal iidentification in the checking information for receiving the server transmission During the confirmation answered, the control instruction of user's input is received.
- A kind of 7. brush machine control device based on password, it is characterised in that including:Processor;For storing the memory of processor-executable instruction;Wherein, the processor is configured as:Receive the checking information of user's input;When judging that the checking information is correct, the control instruction of user's input is received;When the control instruction is the instruction for allowing brush machine program to run, set in advance in the designated storage area extraction of register Fixed specify information, and the specify information is stored into the target storage domain of the register;It is to forbid the finger of the brush machine program operation in the control instruction after the control instruction of the reception user input When making, the total data in the target storage domain of the register is deleted;Receiving the instruction that runs the brush machine program And when judging non-storage information in the target storage domain, output can not run the warning message of the brush machine program;Or, it is to forbid the brush machine program to run in the control instruction after the control instruction of the reception user input Instruction when, extract presupposed information set in advance in the default storage region of the register, and the presupposed information is deposited Into the target storage domain of the register, the presupposed information differs with the specify information for storage;Receiving operation When the information for instructing and judging to store in the target storage domain of the brush machine program is the presupposed information, output The warning message of the brush machine program can not be run;It is institute in the information for receiving the instruction of the operation brush machine program and judging to store in the target storage domain When stating specify information, the brush machine program is run.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410420971.1A CN104216742B (en) | 2014-08-25 | 2014-08-25 | Brush machine control method and device based on password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410420971.1A CN104216742B (en) | 2014-08-25 | 2014-08-25 | Brush machine control method and device based on password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104216742A CN104216742A (en) | 2014-12-17 |
CN104216742B true CN104216742B (en) | 2017-12-19 |
Family
ID=52098271
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410420971.1A Active CN104216742B (en) | 2014-08-25 | 2014-08-25 | Brush machine control method and device based on password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104216742B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104636900B (en) * | 2015-02-10 | 2018-07-31 | 西安智道取宝科技有限公司 | The control method and system of highly reliable express box |
CN104809368B (en) * | 2015-03-19 | 2018-01-23 | 广东欧珀移动通信有限公司 | One kind downloads guard method and terminal |
CN104933349B (en) * | 2015-05-20 | 2017-10-13 | 广东欧珀移动通信有限公司 | With the USB switching devices and download verification method for downloading authentication function |
CN105335632B (en) * | 2015-10-09 | 2018-05-04 | 广东欧珀移动通信有限公司 | The guard method of payment information and device |
CN105740013B (en) * | 2016-01-26 | 2019-08-23 | Oppo广东移动通信有限公司 | Brush machine method of controlling operation thereof and device |
CN105975825A (en) * | 2016-04-25 | 2016-09-28 | 乐视控股(北京)有限公司 | Safety protection method and device, and mobile terminal |
CN105930719B (en) * | 2016-05-04 | 2019-06-11 | 南京诚达运动控制系统有限公司 | A kind of numerically-controlled machine tool control panel encryption method |
CN106937275B (en) * | 2017-02-13 | 2020-10-16 | 深圳盈达信息科技有限公司 | Equipment for storing system unique identifier and hardware ID (identity) under android system |
CN106992857B (en) * | 2017-03-30 | 2020-11-10 | 义乌国信土地规划咨询有限公司 | Machine-swiping verification method and device |
CN107358108A (en) * | 2017-07-06 | 2017-11-17 | 北京小米移动软件有限公司 | software control method, device and mobile terminal |
CN112004227B (en) * | 2020-08-25 | 2024-02-02 | 上海商米科技集团股份有限公司 | Brushing control method and system of mobile equipment |
CN113514093A (en) * | 2021-04-21 | 2021-10-19 | 北京锐达仪表有限公司 | Safety instrument debugging terminal |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378155A (en) * | 2011-11-29 | 2012-03-14 | 深圳芯智汇科技有限公司 | System and method for remotely controlling mobile terminal |
CN102694920A (en) * | 2012-05-28 | 2012-09-26 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method |
CN103324874A (en) * | 2012-03-23 | 2013-09-25 | 联想(北京)有限公司 | Verification method and electronic device |
CN103577733A (en) * | 2013-09-02 | 2014-02-12 | 小米科技有限责任公司 | Safety protection method and device for terminal equipment and terminal equipment |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7178015B2 (en) * | 2004-01-12 | 2007-02-13 | Hewlett-Packard Development Company, L.P. | Security measures in a partitionable computing system |
-
2014
- 2014-08-25 CN CN201410420971.1A patent/CN104216742B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102378155A (en) * | 2011-11-29 | 2012-03-14 | 深圳芯智汇科技有限公司 | System and method for remotely controlling mobile terminal |
CN103324874A (en) * | 2012-03-23 | 2013-09-25 | 联想(北京)有限公司 | Verification method and electronic device |
CN102694920A (en) * | 2012-05-28 | 2012-09-26 | 广东欧珀移动通信有限公司 | Mobile phone antitheft method |
CN103577733A (en) * | 2013-09-02 | 2014-02-12 | 小米科技有限责任公司 | Safety protection method and device for terminal equipment and terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
CN104216742A (en) | 2014-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104216742B (en) | Brush machine control method and device based on password | |
CN105389516A (en) | Sensitive picture reminding method and apparatus | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN106210238B (en) | Short message storage method and device | |
CN104282064B (en) | Gate inhibition's answer method and device | |
CN107734178A (en) | Presentation of information processing method, device, equipment and storage medium | |
CN104063654B (en) | The monitoring method and device of application program | |
CN107404723A (en) | A kind of method and apparatus of access base station | |
CN106325670A (en) | Message prompting method and device | |
CN106529277A (en) | Message preview method and device | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN107230060A (en) | The method and apparatus that a kind of account is reported the loss | |
CN104219053A (en) | Information displaying method, information concealing method and information concealing device | |
CN106888309A (en) | The fingerprint recognition reminding method and device of video terminal | |
CN106953969A (en) | The screen control method and device of mobile terminal | |
CN106372943A (en) | Message processing method and device | |
CN106537288A (en) | Application autostart control method and device | |
CN106845199A (en) | Object authentication method and device | |
CN104298903B (en) | Access the method and device of mobile terminal | |
CN106709284A (en) | Root package validation method and device | |
CN106471513A (en) | Authority control method and device | |
CN106791145A (en) | Short message management method and device | |
CN107656616A (en) | Input interface displaying method, device, electronic equipment | |
CN106789554A (en) | The method and device of short message treatment | |
CN104506710B (en) | Short message management method, terminal and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |