CN104462964A - Data acquiring method, data acquiring device and terminal - Google Patents
Data acquiring method, data acquiring device and terminal Download PDFInfo
- Publication number
- CN104462964A CN104462964A CN201410624642.9A CN201410624642A CN104462964A CN 104462964 A CN104462964 A CN 104462964A CN 201410624642 A CN201410624642 A CN 201410624642A CN 104462964 A CN104462964 A CN 104462964A
- Authority
- CN
- China
- Prior art keywords
- destination application
- data
- data acquisition
- goal systems
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- User Interface Of Digital Computer (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a data acquiring method, a data acquiring device and a terminal. The data acquiring method comprises the steps that when a target system in the terminal receives a data acquiring order, an appointed progress and/or an appointed application procedure in the target system are/is controlled to stop running; a preset target application program runs, whether data acquiring triggering signals are received or not is judged according to the preset target application program, if yes, data in the target system are allowed to be acquired, and if not, the data in the target system are forbidden to be acquired, wherein the safety level of the target system is higher than the preset safety level. By means of the technical scheme, the data can be acquired from a safety system, and the safety of data acquiring can be ensured.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of data capture method, a kind of data acquisition facility and a kind of terminal.
Background technology
Along with intelligent terminal, security issues become increasingly urgent; numerous manufacturer terminal releases security terminal respectively, leading safety board, but from current effect; Terminal security still can not reach the expectation of user, in data security, secret protection etc., also have a lot of improvements.For the terminal being provided with dual system, one is run conventional system, a security of operation system, wherein, security system cannot outside copies data, namely data are one-way transmissions, can only from conventional system copies data to security system, and can not from security system copies data to conventional system, so, when user needs to change terminal, the significant data such as contact person, note stored in the security system then cannot copy out, and Consumer's Experience is bad.
Therefore, how to realize copying out data from the security system of terminal, and guarantee the security of data copy, become problem demanding prompt solution.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can realize obtaining data from security system, and can guarantee the security of data acquisition.
In view of this, an aspect of of the present present invention proposes a kind of data capture method, for terminal, it is characterized in that, described terminal is provided with multiple system, described method comprises: when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, before the described default destination application of operation, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, describedly judge whether to receive data acquisition trigger pip by described default destination application, specifically comprise: when the appointed function button in described terminal is pressed, described default destination application judges to receive described data acquisition trigger pip; When the appointed function button in described terminal is not pressed, described default destination application judges not receive described data acquisition trigger pip.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other disabled users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Another aspect of the present invention proposes a kind of data acquisition facility, for terminal, described terminal is provided with multiple system, described device comprises: control module, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Processing unit, run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, described processing unit also for: operation described default destination application before, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, described processing unit specifically for: when the appointed function button in described terminal is pressed, judge to receive described data acquisition trigger pip by described default destination application; When the appointed function button in described terminal is not pressed, judge not receive described data acquisition trigger pip by described default destination application.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other disabled users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: updating block, according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Another aspect of the present invention proposes a kind of terminal, comprises the data acquisition facility as above described in any one.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
By technical scheme of the present invention, can realize obtaining data from security system, and the security of data acquisition can be guaranteed.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of data capture method according to an embodiment of the invention;
Fig. 2 shows the structural representation of data acquisition facility according to an embodiment of the invention;
Fig. 3 shows the structural representation of terminal according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of data capture method according to an embodiment of the invention.
As shown in Figure 1, data capture method according to an embodiment of the invention, comprising: step 102, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Step 104, runs the destination application preset; Step 106, judges whether to receive data acquisition trigger pip; Step 108, when judged result is for being, allow to obtain the data in described goal systems, otherwise forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, before the described default destination application of operation, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, describedly judge whether to receive data acquisition trigger pip by described default destination application, specifically comprise: when the appointed function button in described terminal is pressed, described default destination application judges to receive described data acquisition trigger pip; When the appointed function button in described terminal is not pressed, described default destination application judges not receive described data acquisition trigger pip.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Fig. 2 shows the structural representation of data acquisition facility according to an embodiment of the invention.
As shown in Figure 2, data acquisition facility 200 according to an embodiment of the invention, comprise: control module 202, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Processing unit 204, run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, described processing unit 204 also for: operation described default destination application before, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, described processing unit 204 specifically for: when the appointed function button in described terminal is pressed, judge to receive described data acquisition trigger pip by described default destination application; When the appointed function button in described terminal is not pressed, judge not receive described data acquisition trigger pip by described default destination application.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other disabled users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: updating block 206, according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Fig. 3 shows the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, comprises the data acquisition facility 200 as above described in any one.
In this technical scheme, terminal 300 is by data acquisition facility 200, when the goal systems of terminal 300 receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this is for provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade, on the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal 300 bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
More than be described with reference to the accompanying drawings technical scheme of the present invention, can have realized obtaining data from security system, and the security of data acquisition can be guaranteed.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.
Claims (11)
1. a data capture method, for terminal, is characterized in that, described terminal is provided with multiple system, and described method comprises:
When the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service;
Run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
2. data capture method according to claim 1, is characterized in that,
Before the described default destination application of operation, warning terminal user input runs the key of described destination application, judges that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
3. data capture method according to claim 1, is characterized in that,
Describedly judge whether to receive data acquisition trigger pip by described default destination application, specifically comprise:
When the appointed function button in described terminal is pressed, described default destination application judges to receive described data acquisition trigger pip;
When the appointed function button in described terminal is not pressed, described default destination application judges not receive described data acquisition trigger pip.
4. data capture method according to claim 3, is characterized in that,
Described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
5. data capture method according to any one of claim 1 to 4, is characterized in that, also comprises:
According to the more newer command received, upgrade described default destination application.
6. a data acquisition facility, for terminal, is characterized in that, described terminal is provided with multiple system, and described device comprises:
Control module, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service;
Processing unit, run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
7. data acquisition facility according to claim 6, is characterized in that,
Described processing unit also for: operation described default destination application before, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
8. data acquisition facility according to claim 6, is characterized in that,
Described processing unit specifically for:
When the appointed function button in described terminal is pressed, judge to receive described data acquisition trigger pip by described default destination application;
When the appointed function button in described terminal is not pressed, judge not receive described data acquisition trigger pip by described default destination application.
9. data acquisition facility according to claim 8, is characterized in that,
Described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
10. the data acquisition facility according to any one of claim 6 to 9, is characterized in that, also comprises:
Updating block, according to the more newer command received, upgrades described default destination application.
11. 1 kinds of terminals, is characterized in that, comprise the data acquisition facility according to any one of claim 6 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410624642.9A CN104462964A (en) | 2014-11-06 | 2014-11-06 | Data acquiring method, data acquiring device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410624642.9A CN104462964A (en) | 2014-11-06 | 2014-11-06 | Data acquiring method, data acquiring device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104462964A true CN104462964A (en) | 2015-03-25 |
Family
ID=52908989
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410624642.9A Pending CN104462964A (en) | 2014-11-06 | 2014-11-06 | Data acquiring method, data acquiring device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104462964A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222492A (en) * | 2019-05-05 | 2019-09-10 | 深圳汇茂科技股份有限公司 | System switching method, device, computer equipment and computer readable storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030032425A1 (en) * | 2001-08-11 | 2003-02-13 | Hong-Sik Kim | Schema change method of dual system |
CN102509054A (en) * | 2011-09-30 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and application program control method for mobile terminal |
CN102842007A (en) * | 2012-07-16 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Access control method and system of mobile terminal application program |
CN103955638A (en) * | 2014-05-20 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Method and device for privacy protection |
CN104020976A (en) * | 2014-06-20 | 2014-09-03 | 深圳市中兴移动通信有限公司 | Method and device for adjusting screen brightness |
-
2014
- 2014-11-06 CN CN201410624642.9A patent/CN104462964A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030032425A1 (en) * | 2001-08-11 | 2003-02-13 | Hong-Sik Kim | Schema change method of dual system |
CN102509054A (en) * | 2011-09-30 | 2012-06-20 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal and application program control method for mobile terminal |
CN102842007A (en) * | 2012-07-16 | 2012-12-26 | 腾讯科技(深圳)有限公司 | Access control method and system of mobile terminal application program |
CN103955638A (en) * | 2014-05-20 | 2014-07-30 | 深圳市中兴移动通信有限公司 | Method and device for privacy protection |
CN104020976A (en) * | 2014-06-20 | 2014-09-03 | 深圳市中兴移动通信有限公司 | Method and device for adjusting screen brightness |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110222492A (en) * | 2019-05-05 | 2019-09-10 | 深圳汇茂科技股份有限公司 | System switching method, device, computer equipment and computer readable storage medium |
CN110222492B (en) * | 2019-05-05 | 2021-04-20 | 深圳汇茂科技股份有限公司 | System switching method and device, computer equipment and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2894584B1 (en) | Screen unlocking method, device and terminal | |
CN103581722B (en) | TV remote controller | |
EP2821970B2 (en) | Access control communication device, method, computer program and computer program product | |
CN102236764B (en) | Method and monitoring system for Android system to defend against desktop information attack | |
CN104871096B (en) | For exchanging the system and method for supporting data with the device without physical user interface | |
WO2016193417A1 (en) | Home appliance control method and control system | |
JP2007259290A (en) | Mobile base station apparatus | |
CN108270786A (en) | Right management method, device, storage medium and the intelligent terminal of application program | |
EP2568407B1 (en) | Method and system for communicating with and programming a secure element | |
CN107832065A (en) | Firmware upgrade method, water purifier, upgrade-system and readable storage medium storing program for executing | |
US10481812B2 (en) | Storage device and information processing system | |
CN104539806A (en) | Mobile terminals and emergency unlocking method thereof | |
CN103019755B (en) | The wireless program method for down loading of multi-CPU in embedded system | |
US11968749B2 (en) | Method for installing subscriber profile and electronic device therefor | |
CN101895883B (en) | Smart card supporting authentication arithmetic update and method for updating authentication arithmetic | |
KR102237312B1 (en) | Portable access control communication device, method, computer program and computer program product | |
CN104657161A (en) | Method and device for updating firmware of mobile terminal | |
CN104573463A (en) | System switching method, system switching device and terminal | |
CN104182704A (en) | Safety strategy setting method, safety strategy setting device and terminal | |
CN108989160A (en) | A kind of method and system avoiding equipment control hazard | |
CN102930219A (en) | Processing method and device for data setting | |
CN109116745A (en) | Safety protection method for intelligent equipment control household appliance | |
CN104462964A (en) | Data acquiring method, data acquiring device and terminal | |
CN103577204A (en) | Software upgrading method and software upgrading system for mobile devices | |
CN104363352A (en) | System determining method, system determining device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20150325 |