CN105787321A - Terminal shutdown method and device as well as terminal - Google Patents

Terminal shutdown method and device as well as terminal Download PDF

Info

Publication number
CN105787321A
CN105787321A CN201610052171.8A CN201610052171A CN105787321A CN 105787321 A CN105787321 A CN 105787321A CN 201610052171 A CN201610052171 A CN 201610052171A CN 105787321 A CN105787321 A CN 105787321A
Authority
CN
China
Prior art keywords
user
terminal
authentication information
judge
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610052171.8A
Other languages
Chinese (zh)
Inventor
肖敏
叶瑞权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201610052171.8A priority Critical patent/CN105787321A/en
Publication of CN105787321A publication Critical patent/CN105787321A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)
  • Telephone Function (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

The invention discloses a terminal shutdown method and device as well as a terminal. The terminal shutdown method comprises the following steps: when receiving a shutdown instruction, collecting the current authentication information of a user; authenticating the current authentication information in a Bootloader of the terminal so as to judge whether the user is a legal user; and if the user is a legal user, controlling the terminal to be shut down the terminal, and if the user is an illegal user, controlling the terminal to be in a stolen mode. Through the technical scheme, the illegal users are prevented from decoding the authentication scheme when the terminal is shut down, so as to improve the safety of the authentication when the terminal is shut down.

Description

Terminal closedown method, terminal closedown device and terminal
Technical field
The present invention relates to field of terminal technology, in particular to a kind of terminal closedown method, a kind of terminal closedown device and a kind of terminal.
Background technology
In the related, user is when to terminal closedown, it is not necessary to be authenticated directly just can shutting down, or only inputs simple password determine whether to carry out power-off operation when shutdown.But, if user not being authenticated just directly shutdown, also implying that the positioning function closed a terminal, being so difficult to use family when lost terminal and tracking the position of terminal, and disabled user directly shuts down after stealing terminal and carries out again the operation of brush machine;It addition, the mode of subscription authentication is only carried out by password in the application layer of terminal, disabled user is easy to decryption.
Therefore, when how to improve terminal closedown, the safety of authentication becomes technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention is based on the problems referred to above, it is proposed that a kind of new technical scheme, it is to avoid disabled user cracks authentication scheme during terminal closedown, thus the safety of authentication when improving terminal closedown.
In view of this, a first aspect of the present invention proposes a kind of terminal closedown method, including: when receiving shutdown command, gather the current authentication information of user;Described current authentication information is authenticated by the Bootloader of terminal, to judge that whether described user is for validated user;If described user is validated user, then control described terminal closedown, if described user is disabled user, then controls described terminal and be in stolen pattern.
In this technical scheme, by carrying out user authentication in the Bootloader of terminal, it is to avoid correlation technique carries out user authentication in the application layer of terminal, it is possible to be prevented effectively from authentication scheme when disabled user cracks terminal closedown.And when determining that user is disabled user, control terminal and be in stolen pattern, such terminal is constantly in open state, disabled user cannot be shut down, also just make the disabled user cannot to terminal brush machine, and user can remotely control this terminal under stolen pattern, thus improve the probability that terminal is retrieved.Preferably, disabled user can also use the fingerprint stayed during terminal send to the terminal presetting contact person under stolen pattern, to determine the identity of disabled user.
In technique scheme, it is preferable that before the described terminal of described control is in the step of stolen pattern, including: control described terminal and turn back on.
In this technical scheme, before control terminal is in stolen pattern, controlling terminal and turn back on so that switching to stolen pattern when the system of terminal is properly functioning, thus ensureing the system reliability of operation of terminal.
In any of the above-described technical scheme, it is preferable that the described terminal of described control is in the step of stolen pattern, also includes: position the geographical position at described terminal place, and record described geographical position.
In this technical scheme, by positioning the geographical position at terminal place always, and recording geographical position, so that user understands the geographical position of stolen terminal accurately and in time, further increasing the probability that stolen terminal is retrieved.
In any of the above-described technical scheme, it is preferable that described current authentication information includes one below or its combination: finger print information, iris information, facial information, palmprint information, acoustic information;And described in the Bootloader of terminal, described current authentication information is authenticated, to judge that described user is whether for the step of validated user, specifically includes: mated with the authentication information that prestores by described current authentication information in described Bootloader;If the match is successful, then judge that described user is as validated user, if it fails to match, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be bio information, such as: finger print information, iris information, facial information, palmprint information, acoustic information, judge whether user is validated user by carrying out mating with the authentication information that prestores by current authentication information, thus realizing the user to using terminal to carry out certification quickly and accurately.
In any of the above-described technical scheme, it is preferable that described current authentication information includes: described user presses the force value of described terminal screen;And described in the Bootloader of terminal, described current authentication information is authenticated, to judge that described user is whether for the step of validated user, specifically include: in described Bootloader, obtain the pressure rank corresponding with described force value, and described pressure rank and preset pressure rank are compared;If described pressure rank is consistent with described preset pressure rank, then judge that described user is as validated user, if described pressure rank is inconsistent with described preset pressure rank, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be the force value that user presses terminal screen, by being compared to judge whether user is validated user by the pressure rank belonging to this force value and preset pressure rank, thus realizing the user to using terminal to carry out certification quickly and accurately.
A second aspect of the present invention proposes a kind of terminal closedown device, including: collecting unit, for when receiving shutdown command, gathering the current authentication information of user;Judging unit, for being authenticated described current authentication information, to judge that whether described user is for validated user in the Bootloader of terminal;First control unit, for when described user is validated user, controlling described terminal closedown, when described user is disabled user, controls described terminal and be in stolen pattern.
In this technical scheme, by carrying out user authentication in the Bootloader of terminal, it is to avoid correlation technique carries out user authentication in the application layer of terminal, it is possible to be prevented effectively from authentication scheme when disabled user cracks terminal closedown.And when determining that user is disabled user, control terminal and be in stolen pattern, such terminal is constantly in open state, disabled user cannot be shut down, also just make the disabled user cannot to terminal brush machine, and user can remotely control this terminal under stolen pattern, thus improve the probability that terminal is retrieved.Preferably, disabled user can also use the fingerprint stayed during terminal send to the other-end presetting contact person under stolen pattern, to determine the identity of disabled user.
In technique scheme, it is preferable that also include: the second control unit, it is used for controlling described terminal and turns back on.
In this technical scheme, before control terminal is in stolen pattern, controlling terminal and turn back on so that switching to stolen pattern when the system of terminal is properly functioning, thus ensureing the system reliability of operation of terminal.
In any of the above-described technical scheme, it is preferable that also include: positioning unit, for positioning the geographical position at described terminal place, and record described geographical position.
In this technical scheme, by positioning the geographical position at terminal place always, and recording geographical position, so that user understands the geographical position of stolen terminal accurately and in time, further increasing the probability that stolen terminal is retrieved.
In any of the above-described technical scheme, it is preferable that described current authentication information includes one below or its combination: finger print information, iris information, facial information, palmprint information, acoustic information;And described judging unit includes: matching unit, for described current authentication information being mated with the authentication information that prestores in described Bootloader;Described judging unit specifically for, if the match is successful, then judge that described user is as validated user, if it fails to match, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be bio information, such as: finger print information, iris information, facial information, palmprint information, acoustic information, judge whether user is validated user by carrying out mating with the authentication information that prestores by current authentication information, thus realizing the user to using terminal to carry out certification quickly and accurately.
In any of the above-described technical scheme, it is preferable that described current authentication information includes: described user presses the force value of described terminal screen;And described judging unit includes: comparing unit, for obtaining the pressure rank corresponding with described force value in described Bootloader, and described pressure rank and preset pressure rank are compared;Described judging unit specifically for, if described pressure rank is consistent with described preset pressure rank, then judge that described user is as validated user, if described pressure rank and described preset pressure rank are inconsistent, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be the force value that user presses terminal screen, by being compared to judge whether user is validated user by the pressure rank belonging to this force value and preset pressure rank, thus realizing the user to using terminal to carry out certification quickly and accurately.
A third aspect of the present invention proposes a kind of terminal, and including the terminal closedown device according to any one of technique scheme, therefore, this terminal has the technique effect identical with the terminal closedown device according to any one of technique scheme, does not repeat them here.
Pass through technical scheme, it is to avoid disabled user cracks authentication scheme during terminal closedown, thus the safety of authentication when improving terminal closedown.
Accompanying drawing explanation
Fig. 1 illustrates the schematic flow sheet of terminal closedown method according to an embodiment of the invention;
Fig. 2 illustrates the structural representation of terminal closedown device according to an embodiment of the invention;
Fig. 3 illustrates the structural representation of terminal according to an embodiment of the invention;
Fig. 4 illustrates the structural representation of terminal according to another embodiment of the invention.
Detailed description of the invention
In order to the above-mentioned purpose of the present invention, feature and advantage can be more clearly understood that, below in conjunction with the drawings and specific embodiments, the present invention is further described in detail.It should be noted that when not conflicting, embodiments herein and the feature in embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention; but; the present invention can also adopt other to be different from other modes described here to implement, and therefore, protection scope of the present invention is by the restriction of following public specific embodiment.
Fig. 1 illustrates the schematic flow sheet of terminal closedown method according to an embodiment of the invention.
As it is shown in figure 1, terminal closedown method according to an embodiment of the invention, including:
Step 102, when receiving shutdown command, gathers the current authentication information of user;
Step 104, is authenticated described current authentication information in the Bootloader of terminal, to judge that whether described user is for validated user;
Step 106, if described user is validated user, then controls described terminal closedown;
Step 108, if described user is disabled user, then controls described terminal and is in stolen pattern.
In this technical scheme, by carrying out user authentication in the Bootloader of terminal, it is to avoid correlation technique carries out user authentication in the application layer of terminal, it is possible to be prevented effectively from authentication scheme when disabled user cracks terminal closedown.And when determining that user is disabled user, control terminal and be in stolen pattern, such terminal is constantly in open state, disabled user cannot be shut down, also just make the disabled user cannot to terminal brush machine, and user can remotely control this terminal under stolen pattern, thus improve the probability that terminal is retrieved.Preferably, disabled user can also use the fingerprint stayed during terminal send to the terminal presetting contact person under stolen pattern, to determine the identity of disabled user.
Wherein, in embedded OS, Bootloader (bootload, bootstrap before system start-up) ran before operating system nucleus runs.Can initiating hardware equipment, set up memory headroom mapping graph, thus the hardware environment of system being taken to a proper states, in order to get out correct environment for final call operation system kernel.In embedded OS, usually not firmware program (note: the embedded type CPU having also can embedded startup program one section short and small) as BIOS, therefore, the loading of whole system starts task and is just completed by Bootloader completely.In an embedded OS, system generally all starts to perform from address 0x00000000 when powering on or reset, and this address corresponding be exactly the Bootloader program of system.Bootloader has two kinds of operator schemes, one is self-starting pattern, in such a mode, operating system is loaded into RAM (RandomAccessMenory by Bootloader from certain solid storage device of terminal, random access memory) middle operation, whole process does not have the intervention of user;Another kind is interactive mode, in such a mode, Bootloader in terminal will wait until in RAM from download kernel image exploitation main frame (Host) by the current means such as serial ports or network, can be write in the solid-state storage medium in terminal by Bootloader, or it is directly entered the guiding of system, it is also possible to received the order of user by serial ports.
In technique scheme, it is preferable that before step 108, including: control described terminal and turn back on.
In this technical scheme, before control terminal is in stolen pattern, controlling terminal and turn back on so that switching to stolen pattern when the system of terminal is properly functioning, thus ensureing the system reliability of operation of terminal.
In any of the above-described technical scheme, it is preferable that step 108 also includes: position the geographical position at described terminal place, and record described geographical position.
In this technical scheme, by positioning the geographical position at terminal place always, and recording geographical position, so that user understands the geographical position of stolen terminal accurately and in time, further increasing the probability that stolen terminal is retrieved.
In any of the above-described technical scheme, it is preferable that described current authentication information includes one below or its combination: finger print information, iris information, facial information, palmprint information, acoustic information;And step 104 specifically includes: in described Bootloader, described current authentication information is mated with the authentication information that prestores;If the match is successful, then judge that described user is as validated user, if it fails to match, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be bio information, such as: finger print information, iris information, facial information, palmprint information, acoustic information, judge whether user is validated user by carrying out mating with the authentication information that prestores by current authentication information, thus realizing the user to using terminal to carry out certification quickly and accurately.
In any of the above-described technical scheme, it is preferable that described current authentication information includes: described user presses the force value of described terminal screen;And step 104 specifically includes: obtain the pressure rank corresponding with described force value in described Bootloader, and described pressure rank and preset pressure rank are compared;If described pressure rank is consistent with described preset pressure rank, then judge that described user is as validated user, if described pressure rank is inconsistent with described preset pressure rank, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be the force value that user presses terminal screen, by being compared to judge whether user is validated user by the pressure rank belonging to this force value and preset pressure rank, thus realizing the user to using terminal to carry out certification quickly and accurately.
In any of the above-described technical scheme, it is preferable that the current authentication information of multi collect user, it is authenticated with the current authentication information to multi collect, thus ensureing accuracy and reliability that user is authenticated.
Fig. 2 illustrates the structural representation of terminal closedown device according to an embodiment of the invention.
As in figure 2 it is shown, terminal closedown device 200 according to an embodiment of the invention, including: collecting unit 202, judging unit 204 and the first control unit 206, wherein, collecting unit 202, for when receiving shutdown command, gathering the current authentication information of user;Judging unit 204, for being authenticated described current authentication information, to judge that whether described user is for validated user in the Bootloader of terminal;First control unit 206, for when described user is validated user, controlling described terminal closedown, when described user is disabled user, controls described terminal and be in stolen pattern.
In this technical scheme, by carrying out user authentication in the Bootloader of terminal, it is to avoid correlation technique carries out user authentication in the application layer of terminal, it is possible to be prevented effectively from authentication scheme when disabled user cracks terminal closedown.And when determining that user is disabled user, control terminal and be in stolen pattern, such terminal is constantly in open state, disabled user cannot be shut down, also just make the disabled user cannot to terminal brush machine, and user can remotely control this terminal under stolen pattern, thus improve the probability that terminal is retrieved.Preferably, disabled user can also use the fingerprint stayed during terminal send to the other-end presetting contact person under stolen pattern, to determine the identity of disabled user.
Wherein, in embedded OS, Bootloader (bootload, bootstrap before system start-up) ran before operating system nucleus runs.Can initiating hardware equipment, set up memory headroom mapping graph, thus the hardware environment of system being taken to a proper states, in order to get out correct environment for final call operation system kernel.In embedded OS, usually not firmware program (note: the embedded type CPU having also can embedded startup program one section short and small) as BIOS, therefore, the loading of whole system starts task and is just completed by Bootloader completely.In an embedded OS, system generally all starts to perform from address 0x00000000 when powering on or reset, and this address corresponding be exactly the Bootloader program of system.Bootloader has two kinds of operator schemes, and one is self-starting pattern, and in such a mode, operating system is loaded in RAM from certain solid storage device of terminal and runs by Bootloader, and whole process does not have the intervention of user;Another kind is interactive mode, in such a mode, Bootloader in terminal will wait until in RAM from download kernel image exploitation main frame (Host) by the current means such as serial ports or network, can be write in the solid-state storage medium in terminal by Bootloader, or it is directly entered the guiding of system, it is also possible to received the order of user by serial ports.
In technique scheme, it is preferable that also include: the second control unit 208, it is used for controlling described terminal and turns back on.
In this technical scheme, before control terminal is in stolen pattern, controlling terminal and turn back on so that switching to stolen pattern when the system of terminal is properly functioning, thus ensureing the system reliability of operation of terminal.
In any of the above-described technical scheme, it is preferable that also include: positioning unit 210, for positioning the geographical position at described terminal place, and record described geographical position.
In this technical scheme, by positioning the geographical position at terminal place always, and recording geographical position, so that user understands the geographical position of stolen terminal accurately and in time, further increasing the probability that stolen terminal is retrieved.
In any of the above-described technical scheme, it is preferable that described current authentication information includes one below or its combination: finger print information, iris information, facial information, palmprint information, acoustic information;And described judging unit 204 includes: matching unit 2042, for described current authentication information being mated with the authentication information that prestores in described Bootloader;Described judging unit 204 specifically for, if the match is successful, then judge that described user is as validated user, if it fails to match, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be bio information, such as: finger print information, iris information, facial information, palmprint information, acoustic information, judge whether user is validated user by carrying out mating with the authentication information that prestores by current authentication information, thus realizing the user to using terminal to carry out certification quickly and accurately.
In any of the above-described technical scheme, it is preferable that described current authentication information includes: described user presses the force value of described terminal screen;And described judging unit 204 includes: comparing unit 2044, for obtaining the pressure rank corresponding with described force value in described Bootloader, and described pressure rank and preset pressure rank are compared;Described judging unit 204 specifically for, if described pressure rank is consistent with described preset pressure rank, then judge that described user is as validated user, if described pressure rank and described preset pressure rank are inconsistent, then judge that described user is as disabled user.
In this technical scheme, current authentication information can be the force value that user presses terminal screen, by being compared to judge whether user is validated user by the pressure rank belonging to this force value and preset pressure rank, thus realizing the user to using terminal to carry out certification quickly and accurately.
In any of the above-described technical scheme, it is preferable that the current authentication information of multi collect user, it is authenticated with the current authentication information to multi collect, thus ensureing accuracy and reliability that user is authenticated.
Fig. 3 illustrates the structural representation of terminal according to an embodiment of the invention.
As shown in Figure 3, terminal 300 according to an embodiment of the invention, including the terminal closedown device 200 according to any one of technique scheme, therefore, this terminal 300 has the technique effect identical with the terminal closedown device 200 according to any one of technique scheme, does not repeat them here.
Fig. 4 illustrates the structural representation of terminal according to another embodiment of the invention.
As shown in Figure 4, terminal 400 according to another embodiment of the invention, in this embodiment, current authentication information is finger print information, this terminal 400 includes: finger print acquisition module 402, Bootloader404, shutdown module 406 and mode switch module 408, Bootloader404 include: fingerprint authentication module 4042.Wherein, finger print acquisition module 402 is for when receiving shutdown command, gather the finger print information of user, and finger print information is sent to Bootloader404, finger print information is authenticated by Bootloader404 determine that whether this user is for validated user, specifically, the finger print information of collection is mated by the fingerprint authentication module 4042 in Bootloader404 with pre-stored fingerprint information, if the match is successful for both, then illustrate that this user is for validated user, now sending the result that the match is successful to shutdown module 406, shutdown module 406 is for shutting down to terminal;If it fails to match for both, then illustrate that this user is not validated user, i.e. disabled user, then the result that it fails to match is sent to mode switch module 408, after mode switch module 408 receives the result that it fails to match, controlling terminal and switch to stolen pattern, under stolen pattern, user can remotely control this terminal.
Technical scheme is described in detail, it is to avoid disabled user cracks authentication scheme during terminal closedown above in association with accompanying drawing, thus the safety of authentication when improving terminal closedown.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (11)

1. a terminal closedown method, it is characterised in that including:
When receiving shutdown command, gather the current authentication information of user;
Described current authentication information is authenticated by the Bootloader of terminal, to judge that whether described user is for validated user;
If described user is validated user, then control described terminal closedown, if described user is disabled user, then controls described terminal and be in stolen pattern.
2. terminal closedown method according to claim 1, it is characterised in that before the described terminal of described control is in the step of stolen pattern, including:
Control described terminal to turn back on.
3. terminal closedown method according to claim 1, it is characterised in that the described terminal of described control is in the step of stolen pattern, also includes:
Position the geographical position at described terminal place, and record described geographical position.
4. terminal closedown method according to any one of claim 1 to 3, it is characterised in that described current authentication information includes one below or its combination: finger print information, iris information, facial information, palmprint information, acoustic information;And described in the Bootloader of terminal, described current authentication information is authenticated, to judge that described user is whether for the step of validated user, specifically includes:
Described current authentication information is mated by described Bootloader with the authentication information that prestores;
If the match is successful, then judge that described user is as validated user, if it fails to match, then judge that described user is as disabled user.
5. terminal closedown method according to any one of claim 1 to 3, it is characterised in that described current authentication information includes: described user presses the force value of described terminal screen;And described in the Bootloader of terminal, described current authentication information is authenticated, to judge that described user is whether for the step of validated user, specifically includes:
Described Bootloader obtains the pressure rank corresponding with described force value, and described pressure rank and preset pressure rank are compared;
If described pressure rank is consistent with described preset pressure rank, then judge that described user is as validated user, if described pressure rank is inconsistent with described preset pressure rank, then judge that described user is as disabled user.
6. a terminal closedown device, it is characterised in that including:
Collecting unit, for when receiving shutdown command, gathering the current authentication information of user;
Judging unit, for being authenticated described current authentication information, to judge that whether described user is for validated user in the Bootloader of terminal;
First control unit, for when described user is validated user, controlling described terminal closedown, when described user is disabled user, controls described terminal and be in stolen pattern.
7. terminal closedown device according to claim 6, it is characterised in that also include:
Second control unit, is used for controlling described terminal and turns back on.
8. terminal closedown device according to claim 6, it is characterised in that also include:
Positioning unit, for positioning the geographical position at described terminal place, and records described geographical position.
9. the terminal closedown device according to any one of claim 6 to 8, it is characterised in that described current authentication information includes one below or its combination: finger print information, iris information, facial information, palmprint information, acoustic information;And described judging unit includes:
Matching unit, for mating described current authentication information with the authentication information that prestores in described Bootloader;
Described judging unit specifically for, if the match is successful, then judge that described user is as validated user, if it fails to match, then judge that described user is as disabled user.
10. the terminal closedown device according to any one of claim 6 to 8, it is characterised in that described current authentication information includes: described user presses the force value of described terminal screen;And described judging unit includes:
Comparing unit, for obtaining the pressure rank corresponding with described force value in described Bootloader, and compares described pressure rank and preset pressure rank;
Described judging unit specifically for, if described pressure rank is consistent with described preset pressure rank, then judge that described user is as validated user, if described pressure rank and described preset pressure rank are inconsistent, then judge that described user is as disabled user.
11. a terminal, it is characterised in that including: the terminal closedown device as according to any one of claim 6 to 10.
CN201610052171.8A 2016-01-26 2016-01-26 Terminal shutdown method and device as well as terminal Pending CN105787321A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610052171.8A CN105787321A (en) 2016-01-26 2016-01-26 Terminal shutdown method and device as well as terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610052171.8A CN105787321A (en) 2016-01-26 2016-01-26 Terminal shutdown method and device as well as terminal

Publications (1)

Publication Number Publication Date
CN105787321A true CN105787321A (en) 2016-07-20

Family

ID=56402456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610052171.8A Pending CN105787321A (en) 2016-01-26 2016-01-26 Terminal shutdown method and device as well as terminal

Country Status (1)

Country Link
CN (1) CN105787321A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711127A (en) * 2017-10-25 2019-05-03 中国电信股份有限公司 Mobile terminal safety means of defence, device and its mobile terminal
CN110163014A (en) * 2019-05-15 2019-08-23 Oppo广东移动通信有限公司 Terminal device theft preventing method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752754A (en) * 2012-06-21 2012-10-24 华为终端有限公司 Method for security certificate of user identification card locking data and mobile terminal
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN104573567A (en) * 2013-10-17 2015-04-29 联芯科技有限公司 Chip programming encryption protecting method and system
CN104657644A (en) * 2013-11-22 2015-05-27 中国长城计算机深圳股份有限公司 Method and device for acquiring and verifying fingerprint
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103324874A (en) * 2012-03-23 2013-09-25 联想(北京)有限公司 Verification method and electronic device
CN102752754A (en) * 2012-06-21 2012-10-24 华为终端有限公司 Method for security certificate of user identification card locking data and mobile terminal
CN104573567A (en) * 2013-10-17 2015-04-29 联芯科技有限公司 Chip programming encryption protecting method and system
CN104657644A (en) * 2013-11-22 2015-05-27 中国长城计算机深圳股份有限公司 Method and device for acquiring and verifying fingerprint
CN104143059A (en) * 2014-07-31 2014-11-12 可牛网络技术(北京)有限公司 Method and system for improving safety of mobile terminal
CN105187640A (en) * 2015-08-21 2015-12-23 上海斐讯数据通信技术有限公司 Anti-theft method and system of mobile terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109711127A (en) * 2017-10-25 2019-05-03 中国电信股份有限公司 Mobile terminal safety means of defence, device and its mobile terminal
CN110163014A (en) * 2019-05-15 2019-08-23 Oppo广东移动通信有限公司 Terminal device theft preventing method and device

Similar Documents

Publication Publication Date Title
CN104641669B (en) The device and method of control switching for the electronic access client in the case where not requiring network to access
US8549317B2 (en) Authentication method, authentication apparatus and authentication program storage medium
CN104199688A (en) Mobile terminal and system reinstallation control method and device thereof
US20090100516A1 (en) Secure Bait and Switch Resume
CN101578609A (en) Secure booting a computing device
US8387133B2 (en) Power on certification method for personal computer and power on certification system thereof
WO2018000509A1 (en) Safe operation method, operation device, and terminal
US20160004648A1 (en) Data erasing apparatus, data erasing method, and computer-readable storage medium
CN102110195A (en) Computer system and identification method and device for user
CN104318186A (en) Code switching method, equipment and terminal
US10783088B2 (en) Systems and methods for providing connected anti-malware backup storage
EP3009950A1 (en) Method and apparatus for continuous and implicit local authentication of wireless mobile users based on dynamic profiling of conduct patterns
CN106803862A (en) Image processing system and control method
CN110770728A (en) Unmanned aerial vehicle control method, unmanned aerial vehicle and terminal for controlling unmanned aerial vehicle
CN105787321A (en) Terminal shutdown method and device as well as terminal
KR100991191B1 (en) Computer security module and computer apparatus using the same
CN111405550B (en) WhatsApp key file extraction method and WhatsApp key file extraction equipment
US8924306B2 (en) Remote computer rebooting tool
WO2020133500A1 (en) Method and device for unlocking terminal device, and storage medium
JP3422472B2 (en) Personal computer system
JP6650755B2 (en) Remote destruction system and remote destruction method for storage device
CN111316269A (en) Terminal security protection method and device
WO2017185461A1 (en) Method and system for recovering tampered key information of virtual subscriber identity module
JP2006031575A (en) Hard disk security management system and method therefor
CN108804892A (en) Electronic device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160720

RJ01 Rejection of invention patent application after publication