CN104462964A - Data acquiring method, data acquiring device and terminal - Google Patents

Data acquiring method, data acquiring device and terminal Download PDF

Info

Publication number
CN104462964A
CN104462964A CN201410624642.9A CN201410624642A CN104462964A CN 104462964 A CN104462964 A CN 104462964A CN 201410624642 A CN201410624642 A CN 201410624642A CN 104462964 A CN104462964 A CN 104462964A
Authority
CN
China
Prior art keywords
destination application
data
data acquisition
goal systems
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410624642.9A
Other languages
Chinese (zh)
Inventor
杨光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Yulong Telecommunication Technology Co Ltd
Original Assignee
Dongguan Yulong Telecommunication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Yulong Telecommunication Technology Co Ltd filed Critical Dongguan Yulong Telecommunication Technology Co Ltd
Priority to CN201410624642.9A priority Critical patent/CN104462964A/en
Publication of CN104462964A publication Critical patent/CN104462964A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a data acquiring method, a data acquiring device and a terminal. The data acquiring method comprises the steps that when a target system in the terminal receives a data acquiring order, an appointed progress and/or an appointed application procedure in the target system are/is controlled to stop running; a preset target application program runs, whether data acquiring triggering signals are received or not is judged according to the preset target application program, if yes, data in the target system are allowed to be acquired, and if not, the data in the target system are forbidden to be acquired, wherein the safety level of the target system is higher than the preset safety level. By means of the technical scheme, the data can be acquired from a safety system, and the safety of data acquiring can be ensured.

Description

Data capture method, data acquisition facility and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of data capture method, a kind of data acquisition facility and a kind of terminal.
Background technology
Along with intelligent terminal, security issues become increasingly urgent; numerous manufacturer terminal releases security terminal respectively, leading safety board, but from current effect; Terminal security still can not reach the expectation of user, in data security, secret protection etc., also have a lot of improvements.For the terminal being provided with dual system, one is run conventional system, a security of operation system, wherein, security system cannot outside copies data, namely data are one-way transmissions, can only from conventional system copies data to security system, and can not from security system copies data to conventional system, so, when user needs to change terminal, the significant data such as contact person, note stored in the security system then cannot copy out, and Consumer's Experience is bad.
Therefore, how to realize copying out data from the security system of terminal, and guarantee the security of data copy, become problem demanding prompt solution.
Summary of the invention
The present invention, just based on the problems referred to above, proposes a kind of new technical scheme, can realize obtaining data from security system, and can guarantee the security of data acquisition.
In view of this, an aspect of of the present present invention proposes a kind of data capture method, for terminal, it is characterized in that, described terminal is provided with multiple system, described method comprises: when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, before the described default destination application of operation, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, describedly judge whether to receive data acquisition trigger pip by described default destination application, specifically comprise: when the appointed function button in described terminal is pressed, described default destination application judges to receive described data acquisition trigger pip; When the appointed function button in described terminal is not pressed, described default destination application judges not receive described data acquisition trigger pip.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other disabled users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Another aspect of the present invention proposes a kind of data acquisition facility, for terminal, described terminal is provided with multiple system, described device comprises: control module, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Processing unit, run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, described processing unit also for: operation described default destination application before, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, described processing unit specifically for: when the appointed function button in described terminal is pressed, judge to receive described data acquisition trigger pip by described default destination application; When the appointed function button in described terminal is not pressed, judge not receive described data acquisition trigger pip by described default destination application.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other disabled users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: updating block, according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Another aspect of the present invention proposes a kind of terminal, comprises the data acquisition facility as above described in any one.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
By technical scheme of the present invention, can realize obtaining data from security system, and the security of data acquisition can be guaranteed.
Accompanying drawing explanation
Fig. 1 shows the schematic flow sheet of data capture method according to an embodiment of the invention;
Fig. 2 shows the structural representation of data acquisition facility according to an embodiment of the invention;
Fig. 3 shows the structural representation of terminal according to an embodiment of the invention.
Embodiment
In order to more clearly understand above-mentioned purpose of the present invention, feature and advantage, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that, when not conflicting, the feature in the embodiment of the application and embodiment can combine mutually.
Set forth a lot of detail in the following description so that fully understand the present invention; but; the present invention can also adopt other to be different from other modes described here and implement, and therefore, protection scope of the present invention is not by the restriction of following public specific embodiment.
Fig. 1 shows the schematic flow sheet of data capture method according to an embodiment of the invention.
As shown in Figure 1, data capture method according to an embodiment of the invention, comprising: step 102, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Step 104, runs the destination application preset; Step 106, judges whether to receive data acquisition trigger pip; Step 108, when judged result is for being, allow to obtain the data in described goal systems, otherwise forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, before the described default destination application of operation, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, describedly judge whether to receive data acquisition trigger pip by described default destination application, specifically comprise: when the appointed function button in described terminal is pressed, described default destination application judges to receive described data acquisition trigger pip; When the appointed function button in described terminal is not pressed, described default destination application judges not receive described data acquisition trigger pip.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Fig. 2 shows the structural representation of data acquisition facility according to an embodiment of the invention.
As shown in Figure 2, data acquisition facility 200 according to an embodiment of the invention, comprise: control module 202, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service; Processing unit 204, run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
In this technical scheme, when the goal systems of terminal receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this be provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade; On the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
In technique scheme, preferably, described processing unit 204 also for: operation described default destination application before, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
In this technical scheme, by carrying out key input validation before operational objective application program, effectively can prevent because destination application to be caused the outflow of the data in goal systems by disabled user's error starting, thus ensure the security of data acquisition further.
In technique scheme, preferably, described processing unit 204 specifically for: when the appointed function button in described terminal is pressed, judge to receive described data acquisition trigger pip by described default destination application; When the appointed function button in described terminal is not pressed, judge not receive described data acquisition trigger pip by described default destination application.
In this technical scheme, manually control presses the mode of appointed function key to provide data acquisition trigger pip, effectively can limit the behavior of backstage wooden horse automatic acquisition data, ensure the security of data acquisition further.
In technique scheme, preferably, described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
In this technical scheme, at least one item that appointed function key includes but not limited to volume increase button, volume-down keys, takes pictures in key and earphone key, the diversity of appointed function key, can effectively prevent on the one hand other disabled users can data retrieval mechanisms arbitrarily in trigger target system, and then the security of guarantee data; On the other hand, user can be made to carry out setting and the change of appointed function key according to the actual requirements, this is conducive to promoting Consumer's Experience.
In technique scheme, preferably, also comprise: updating block 206, according to the more newer command received, upgrade described default destination application.
In this technical scheme, user or manufacturer can make manufacturer change this destination application preset according to actual conditions the function of this destination application constantly to be improved, to promote the security of data acquisition further, promotes Consumer's Experience.
Fig. 3 shows the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, comprises the data acquisition facility 200 as above described in any one.
In this technical scheme, terminal 300 is by data acquisition facility 200, when the goal systems of terminal 300 receives data retrieval commands, by control appointment process in this goal systems and/or specified application out of service, and when the destination application preset is determined to receive trigger pip, other-end or safe class is just allowed to obtain data lower than the system of the safe class of goal systems, can effectively prevent wooden horse implanted and running background and the data obtained in goal systems, this is for provide favourable precondition from safe class higher than obtaining data this goal systems of preset security grade, on the other hand, pretend to be this destination application in order to ensure other unauthorized applications or run this destination application by illegal means, thus affect the security of data acquisition, the testing mechanism of default destination application can be arranged on before dispatching from the factory in the read/write function of the file such as internal memory or network side of terminal 300 bottom, cause leaking of data to realize effectively preventing other program malice from pretending to be this destination application, thus ensure the security of the data acquisition of goal systems.
More than be described with reference to the accompanying drawings technical scheme of the present invention, can have realized obtaining data from security system, and the security of data acquisition can be guaranteed.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.Within the spirit and principles in the present invention all, any amendment done, equivalent replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (11)

1. a data capture method, for terminal, is characterized in that, described terminal is provided with multiple system, and described method comprises:
When the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service;
Run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
2. data capture method according to claim 1, is characterized in that,
Before the described default destination application of operation, warning terminal user input runs the key of described destination application, judges that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
3. data capture method according to claim 1, is characterized in that,
Describedly judge whether to receive data acquisition trigger pip by described default destination application, specifically comprise:
When the appointed function button in described terminal is pressed, described default destination application judges to receive described data acquisition trigger pip;
When the appointed function button in described terminal is not pressed, described default destination application judges not receive described data acquisition trigger pip.
4. data capture method according to claim 3, is characterized in that,
Described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
5. data capture method according to any one of claim 1 to 4, is characterized in that, also comprises:
According to the more newer command received, upgrade described default destination application.
6. a data acquisition facility, for terminal, is characterized in that, described terminal is provided with multiple system, and described device comprises:
Control module, when the goal systems in described terminal receives data retrieval commands, control appointment process in described goal systems and/or specified application out of service;
Processing unit, run the destination application preset, to judge whether to receive data acquisition trigger pip by described default destination application, and when judged result is for being, allow to obtain the data in described goal systems, otherwise, forbid obtaining the data in described goal systems, wherein, the safe class of described goal systems is higher than preset security grade.
7. data acquisition facility according to claim 6, is characterized in that,
Described processing unit also for: operation described default destination application before, warning terminal user input runs the key of described destination application, judge that whether described key is correct, and when judged result is for being, bring into operation described destination application, otherwise, do not run described destination application.
8. data acquisition facility according to claim 6, is characterized in that,
Described processing unit specifically for:
When the appointed function button in described terminal is pressed, judge to receive described data acquisition trigger pip by described default destination application;
When the appointed function button in described terminal is not pressed, judge not receive described data acquisition trigger pip by described default destination application.
9. data acquisition facility according to claim 8, is characterized in that,
Described appointed function button comprises at least one item in following button: volume increases button, volume-down keys, key of taking pictures, earphone key.
10. the data acquisition facility according to any one of claim 6 to 9, is characterized in that, also comprises:
Updating block, according to the more newer command received, upgrades described default destination application.
11. 1 kinds of terminals, is characterized in that, comprise the data acquisition facility according to any one of claim 6 to 10.
CN201410624642.9A 2014-11-06 2014-11-06 Data acquiring method, data acquiring device and terminal Pending CN104462964A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410624642.9A CN104462964A (en) 2014-11-06 2014-11-06 Data acquiring method, data acquiring device and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410624642.9A CN104462964A (en) 2014-11-06 2014-11-06 Data acquiring method, data acquiring device and terminal

Publications (1)

Publication Number Publication Date
CN104462964A true CN104462964A (en) 2015-03-25

Family

ID=52908989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410624642.9A Pending CN104462964A (en) 2014-11-06 2014-11-06 Data acquiring method, data acquiring device and terminal

Country Status (1)

Country Link
CN (1) CN104462964A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030032425A1 (en) * 2001-08-11 2003-02-13 Hong-Sik Kim Schema change method of dual system
CN102509054A (en) * 2011-09-30 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and application program control method for mobile terminal
CN102842007A (en) * 2012-07-16 2012-12-26 腾讯科技(深圳)有限公司 Access control method and system of mobile terminal application program
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104020976A (en) * 2014-06-20 2014-09-03 深圳市中兴移动通信有限公司 Method and device for adjusting screen brightness

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030032425A1 (en) * 2001-08-11 2003-02-13 Hong-Sik Kim Schema change method of dual system
CN102509054A (en) * 2011-09-30 2012-06-20 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and application program control method for mobile terminal
CN102842007A (en) * 2012-07-16 2012-12-26 腾讯科技(深圳)有限公司 Access control method and system of mobile terminal application program
CN103955638A (en) * 2014-05-20 2014-07-30 深圳市中兴移动通信有限公司 Method and device for privacy protection
CN104020976A (en) * 2014-06-20 2014-09-03 深圳市中兴移动通信有限公司 Method and device for adjusting screen brightness

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222492A (en) * 2019-05-05 2019-09-10 深圳汇茂科技股份有限公司 System switching method, device, computer equipment and computer readable storage medium
CN110222492B (en) * 2019-05-05 2021-04-20 深圳汇茂科技股份有限公司 System switching method and device, computer equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
EP2894584B1 (en) Screen unlocking method, device and terminal
CN103581722B (en) TV remote controller
EP2821970B2 (en) Access control communication device, method, computer program and computer program product
CN102236764B (en) Method and monitoring system for Android system to defend against desktop information attack
CN104871096B (en) For exchanging the system and method for supporting data with the device without physical user interface
WO2016193417A1 (en) Home appliance control method and control system
JP2007259290A (en) Mobile base station apparatus
CN108270786A (en) Right management method, device, storage medium and the intelligent terminal of application program
EP2568407B1 (en) Method and system for communicating with and programming a secure element
CN107832065A (en) Firmware upgrade method, water purifier, upgrade-system and readable storage medium storing program for executing
US10481812B2 (en) Storage device and information processing system
CN104539806A (en) Mobile terminals and emergency unlocking method thereof
CN103019755B (en) The wireless program method for down loading of multi-CPU in embedded system
US11968749B2 (en) Method for installing subscriber profile and electronic device therefor
CN101895883B (en) Smart card supporting authentication arithmetic update and method for updating authentication arithmetic
KR102237312B1 (en) Portable access control communication device, method, computer program and computer program product
CN104657161A (en) Method and device for updating firmware of mobile terminal
CN104573463A (en) System switching method, system switching device and terminal
CN104182704A (en) Safety strategy setting method, safety strategy setting device and terminal
CN108989160A (en) A kind of method and system avoiding equipment control hazard
CN102930219A (en) Processing method and device for data setting
CN109116745A (en) Safety protection method for intelligent equipment control household appliance
CN104462964A (en) Data acquiring method, data acquiring device and terminal
CN103577204A (en) Software upgrading method and software upgrading system for mobile devices
CN104363352A (en) System determining method, system determining device and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150325