CN106488454A - A kind of method of connection external equipment, device and mobile terminal - Google Patents
A kind of method of connection external equipment, device and mobile terminal Download PDFInfo
- Publication number
- CN106488454A CN106488454A CN201510536598.0A CN201510536598A CN106488454A CN 106488454 A CN106488454 A CN 106488454A CN 201510536598 A CN201510536598 A CN 201510536598A CN 106488454 A CN106488454 A CN 106488454A
- Authority
- CN
- China
- Prior art keywords
- external equipment
- space
- unique identifier
- user
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of method of connection external equipment, device and mobile terminal, wherein, the method includes:When the connection request of external equipment is received, distribute an independent user's space by multiple domain space technology;In the case of the connection request of external equipment is received, external equipment is connected to independent user's space, so that the security of external equipment is detected in independent user's space.The present invention is when the connection request of external equipment is received, distribute an independent user's space by multiple domain space technology, when external equipment is accessed, it is linked in above-mentioned independent user's space, to detect the security of external equipment, now, even there is safety problem in external equipment, connected due to which is independent user's space, and the normal user's space of nonterminal, therefore, the data in terminal will not be destroyed or steal, the security of system is improved, solves problem of the prior art.
Description
Technical field
The present invention relates to field of mobile communication, more particularly to a kind of method of connection external equipment, device and
Mobile terminal.
Background technology
For current intelligent terminal, can all connect external equipment, such as bluetooth earphone, intelligent hand
The equipment such as table.However, the mode of the external equipment of intelligent terminal connection at present is all directly in current user state
Lower connection, and external equipment is directly enabled, the security again to external equipment is verified afterwards.
As prior art is that external equipment is first coupled to intelligent terminal and then detect security again, outward
The equipment of connecing is directly connected to the normal user's space of intelligent terminal and conducts interviews, if external equipment has safety
Problem, then the data when the equipment that detects is problematic in intelligent terminal may be destroyed or steal, user
Experience is relatively low.
Content of the invention
The invention provides a kind of method of connection external equipment, device and mobile terminal, existing at least to solve
It is that external equipment is first coupled to intelligent terminal and then again security is detected to have technology, if external equipment
There is safety problem, then the data when the equipment that detects is problematic in intelligent terminal may be destroyed or steal
Take, the relatively low problem of Consumer's Experience.
On the one hand, the present invention provides a kind of method of connection external equipment, including:Receiving external equipment
Connection request when, by multiple domain space technology distribute an independent user's space;Described external in acceptance
In the case of the connection request of equipment, the external equipment is connected to the independent user's space, with
The security of the detection external equipment in the independent user's space.
Further, after the connection request for receiving external equipment, also include:Judge the external equipment
Whether there is unique identifier, wherein, the unique identifier is the terminal in the external equipment first
Generate during the secondary access terminal;In the case of there is no the unique identifier, during according to current detection
Between generate the corresponding unique identifier of external equipment, with by the unique identifier will described outward
Connect equipment and access the independent user's space;In the case of with the unique identifier, according to described
Unique identifier determines whether to access the independent user's space.
Further, determine whether that accessing the independent user's space includes according to the unique identifier:Root
Judge this time connection with the last time difference for accessing the terminal whether default according to the unique identifier
In time range;In the case that the time difference is in the preset time range, by the external equipment
It is connected to the normal user's space of terminal;In the case that the time difference is not in the preset time range,
The external equipment is connected to the independent user's space.
Further, after detecting the security of the external equipment in the independent user's space, also wrap
Include:In the case that the security of the external equipment meets preset standard, the external equipment is connected to
The normal user's space of terminal, to realize normal access;Do not meet in the security of the external equipment default
In the case of standard, the connection with the peripheral apparatus is disconnected.
Further, disconnect with after the connection of the peripheral apparatus, also include:Record the peripheral apparatus
Unique identifier, with when the external equipment asks to access the terminal again, according to the unique identification
The access operation of the code shielding external equipment.
On the other hand, present invention also offers a kind of connection external equipment device, including:Distribute module,
For when the connection request of external equipment is received, distributing an independent user by multiple domain space technology
Space;Link block, in the case of the connection request of the external equipment is received, will be described external
Equipment is connected to the independent user's space, to detect described external set in the independent user's space
Standby security.
Further, described device also includes:Judge module, for judging whether the external equipment has only
One identification code, wherein, the unique identifier is that access is described for the first time in the external equipment for the terminal
Generate during terminal;Generation module, in the case of not having the unique identifier, according to current inspection
The corresponding unique identifier of the external equipment of survey time generation one, to pass through the unique identifier by institute
State external equipment and access the independent user's space;AM access module, for the unique identifier
In the case of, determine whether to access the independent user's space according to the unique identifier.
Further, the AM access module includes:Judging unit, for judging this according to the unique identifier
Whether secondary connection is with the last time difference for accessing the terminal in preset time range;Access unit, uses
In the case of in the time difference in the preset time range, the external equipment is connected to terminal
Normal user's space;In the case that the time difference is not in the preset time range, will be described outer
The equipment of connecing is connected to the independent user's space.
Further, the AM access module, is additionally operable to meet preset standard in the security of the external equipment
In the case of, the external equipment is connected to the normal user's space of terminal, to realize normal access;Institute
State external equipment security do not meet preset standard in the case of, disconnect and the connection of the peripheral apparatus.
Further, described device also includes:Logging modle, for disconnecting the connection with the peripheral apparatus
Afterwards, the unique identifier of the peripheral apparatus is recorded, to ask access described again in the external equipment
During terminal, the access operation of the external equipment is shielded according to the unique identifier.
Another aspect, present invention also offers a kind of mobile terminal, including:Company any one of above-mentioned
Connect the device of external equipment.
The present invention distributes an independence when the connection request of external equipment is received by multiple domain space technology
User's space, access external equipment when, be linked in above-mentioned independent user's space, with detection
The security of external equipment, now, even external equipment has safety problem, connected due to which is only
Vertical user's space, and the normal user's space of nonterminal, therefore, the data in terminal will not be destroyed or
Person steals, and improves the security of system, and it is that external equipment is first coupled to intelligent terminal to solve prior art
Then again security is detected, if external equipment has safety problem, asks in the equipment of detecting
Data during topic in intelligent terminal may be destroyed or steal, the relatively low problem of Consumer's Experience.
Description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantages and benefit are for ability
Domain those of ordinary skill will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred embodiment, and simultaneously
It is not considered as limitation of the present invention.And in whole accompanying drawing, it is denoted by the same reference numerals identical
Part.In the accompanying drawings:
Fig. 1 is the flow chart of the method for connecting external equipment in the embodiment of the present invention;
Fig. 2 is the first structural representation for the device for connecting external equipment in the embodiment of the present invention;
Fig. 3 is second structural representation of the device for connecting external equipment in the embodiment of the present invention;
Fig. 4 is the structural representation of the device AM access module for connecting external equipment in the embodiment of the present invention;
Fig. 5 is the third structural representation for the device for connecting external equipment in the embodiment of the present invention;
Fig. 6 is each functional module attachment structure schematic diagram of smart mobile phone in the preferred embodiment of the present invention.
Specific embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although show in accompanying drawing
The exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and should be by
Embodiments set forth here is limited.Conversely, provide these embodiments to be able to be best understood from this
Open, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
It is that external equipment is first coupled to intelligent terminal and then examine security again to solve prior art
Survey, the data if external equipment has safety problem, when the equipment that detects is problematic in intelligent terminal
May be destroyed or steal, the relatively low problem of Consumer's Experience, the invention provides a kind of connection external equipment
Method, device and mobile terminal, below in conjunction with accompanying drawing and embodiment, the present invention is carried out further in detail
Describe in detail bright.It should be appreciated that specific embodiment described herein is not limited only in order to explain the present invention
The present invention.
The embodiment of the present invention provides a kind of method of connection external equipment, the flow process of the method as shown in figure 1,
Including step S102 to S104:
S102, when the connection request of external equipment is received, distributes an independence by multiple domain space technology
User's space;
S104, in the case of the connection request of external equipment is received, external equipment is connected to independent use
Family space, to detect the security of external equipment in independent user's space.
The embodiment of the present invention distributes one when the connection request of external equipment is received by multiple domain space technology
Individual independent user's space, when external equipment is accessed, is linked in above-mentioned independent user's space,
To detect the security of external equipment, now, even external equipment has safety problem, due to its connection
Be independent user's space, and the normal user's space of nonterminal, therefore, data in terminal will not be by
Destroy or steal, the security of system is improved, it is that external equipment is first coupled to intelligence to solve prior art
Then energy terminal detects to security again, if external equipment has safety problem, sets detecting
Data when having problem in intelligent terminal may be destroyed or steal, the relatively low problem of Consumer's Experience.
After the connection request for receiving external equipment, can also be determined whether by unique identifier can
So that external equipment is quickly accessed, that is, judge whether external equipment has unique identifier.Wherein, Wei Yishi
Other code is generated in external equipment first time access terminal for terminal.
In the case that external equipment does not have unique identifier, one is generated according to current sensing time and external set
Standby corresponding unique identifier, after generating the unique identifier, when the next external equipment still wants to access the end
During end, it is possible to be confirmed whether to quickly access by the identification code.Certainly, in the process, first
In the case of generating unique identifier, it is to need external equipment to be accessed independent user's space to carry out safety
Property checking.
In the case that external equipment has unique identifier, determine whether to access independently according to unique identifier
User's space, specifically include:According to unique identifier judge this time connection and last access terminal when
Between differ from whether in preset time range;If the time difference in preset time range, illustrates to disconnect with terminal
The time of connection is shorter, there is no potential safety hazard, again external equipment can be connected directly to terminal normal
User's space;If the time difference not in preset time range, illustrates the time disconnected with terminal relatively
Long, it is understood that there may be potential safety hazard, accordingly, it would be desirable to external equipment is connected to independent user's space be pacified
Full property detection.
After detecting the security of external equipment in independent user's space, if the security of external equipment
Meet preset standard, then external equipment is connected to the normal user's space of terminal, to realize normal access;
If the security of external equipment does not meet preset standard, illustrate there is potential safety hazard, disconnect and setting with peripheral hardware
Standby connection.
After the connection with peripheral apparatus is disconnected, in order to avoid being carried out when the external equipment sends request again
The processes such as safety detection, can first record the unique identifier of peripheral apparatus, again please in external equipment
When access terminal is sought, the access operation of external equipment is shielded according to unique identifier.
The embodiment of the present invention also provides a kind of device of connection external equipment, structural representation such as Fig. 2 of the device
Shown, including:Distribute module 10, for when the connection request of external equipment is received, empty by multiple domain
Between technology distribute an independent user's space;Link block 20, is coupled with distribute module 10, for
In the case of receiving the connection request of external equipment, external equipment is connected to independent user's space, with
The security of detection external equipment in independent user's space.
Fig. 3 shows another structural representation of said apparatus, and said apparatus can also include:Judge mould
Block 30, is coupled with distribute module 10, for judging whether external equipment has unique identifier, wherein,
Unique identifier is generated in external equipment first time access terminal for terminal;Generation module 40, with judgement
Module 30 is coupled, for, in the case of without unique identifier, generating one according to current sensing time
The corresponding unique identifier of external equipment, empty external equipment is accessed independent user by unique identifier
Between;AM access module 50, is coupled with judge module 30, in the case of with unique identifier, root
Determine whether to access independent user's space according to unique identifier.
In the above-described embodiments, when judge module 30 is coupled with distribute module 10, it is to will determine that module 30
There is interactive relation with distribute module 10, be not relationship between superior and subordinate as depicted, that is, work as distribution
When module 10 receives the connection request of external equipment, turn to judge module 30 and carry out unique identity code,
Determine whether distribute module 10 distributes one further according to the implementing result such as generation module 40 and AM access module 50
Independent user's space.
The structural representation of above-mentioned AM access module 50 can be as shown in figure 4, which includes:Judging unit 501, uses
According to the time difference of unique identifier judgement this time connection and last access terminal whether in Preset Time
In the range of;Access unit 502, is coupled with judging unit 501, in the time difference in preset time range
In the case of interior, external equipment is connected to the normal user's space of terminal;In the time difference not in Preset Time
In the range of in the case of, external equipment is connected to independent user's space.
When realizing, AM access module 50 is additionally operable to meet the situation of preset standard in the security of external equipment
Under, external equipment is connected to the normal user's space of terminal, to realize normal access;In external equipment
In the case that security does not meet preset standard, the connection with peripheral apparatus is disconnected.Based on AM access module 50
The function, Fig. 5 again shows a kind of structural representation of said apparatus, on the basis of Fig. 3, the dress
Putting to include:Logging modle 60, is coupled with AM access module 50, for disconnecting and peripheral apparatus
After connection, the unique identifier of peripheral apparatus is recorded, with when external equipment asks access terminal again,
The access operation of external equipment is shielded according to unique identifier.
The embodiment of the present invention also provides a kind of mobile terminal, and which includes the device of above-mentioned connection external equipment.
Those skilled in the art according to above-mentioned record, know how by integrally disposed for said apparatus in the terminal,
Here is omitted.It should be noted that said apparatus or mobile terminal are operationally, its internal each mould
Block is all to need interaction when its function is realized, and is not complete independently.
Preferred embodiment
A kind of smart mobile phone is embodiments provided, which is internally provided with connection external equipment (also referred to as
Peripheral hardware) device, its can need high security in some users connect external equipment scene under (as hand
The safe space of machine), a kind of external equipment method of attachment based on multi-domain technique is provided, is accessed for detecting
External equipment, improve mobile phone connect external equipment security.
The each functional module attachment structure of embodiment of the present invention smart mobile phone illustrate as shown in fig. 6, including:Peripheral hardware
Judge module, user's space management module, peripheral hardware connection processing module and peripheral hardware detection module, in Fig. 6 also
Refer to be derived the process of each module work.Below, in conjunction with each module in Fig. 6, illustrate that smart mobile phone works
Process.
When mobile phone will connect external equipment, after driving detects external equipment, peripheral hardware judge module is preferential
Judge whether the external equipment for connecting is that First Contact Connections mobile phone/(distance is last for Connection Time last time time-out
Connection Time whether exceed preset value, if it exceeds need to detect again).If it is, produce accordingly sentencing
Disconnected result, and to user's space management module and peripheral hardware connection processing module transmission.
User's space management module generates a new user's space temporarily according to the judged result for receiving,
The space is to minimize, and is only used for detecting the security of connection external equipment.Processed by peripheral hardware connection afterwards
Mobile phone peripheral hardware is connected to this interim new space for generating by module.And the characteristic due to multiple domain space technology,
The peripheral hardware of now mobile phone connection is only capable of accessing/operating the data of this temporary space, so as on the mobile phone that ensures
Secure user data.
In temporary space, peripheral hardware detection module is detected to the external equipment that mobile phone connects, and combination is worked as
The front time generates unique identifier of the mobile phone to the external equipment, and the identification code is used for connecting again later
The external equipment and Connection Time last time is recognized when connecing.When realizing, if generated before, herein no longer
Generate.
Testing result be shown as the external equipment dangerous when, then given by peripheral hardware judge module feedback result
Peripheral hardware connects processing module, makes the connection of its closing hand phone and the external equipment, while identification code is fed back to
Peripheral hardware judge module.
Testing result be shown as the external equipment safe when, then by peripheral hardware judge module feedback result to outer
If connection processing module, its connection by mobile phone with the external equipment is made to go to normal users, normal to access
User's space, while identification code is fed back to peripheral hardware judge module.
It should be noted that in the present embodiment, although the title of each functional module is different, but each function mould
The general function of block is identical with each functional module summation of the device for connecting external equipment in above-described embodiment.
Embodiment of the present invention method of operating is simple and efficient, participates in without the need for user;Safety can effectively have been prevented
The external equipment of hidden danger conducts interviews to data in mobile phone and operates, and improves the security performance of system.
Obviously, those skilled in the art can carry out various changes and modification without deviating from this to the present invention
Bright spirit and scope.So, if the present invention these modification and modification belong to the claims in the present invention and
Within the scope of its equivalent technologies, then the present invention is also intended to comprising these changes and modification.
Claims (11)
1. a kind of connection external equipment method, it is characterised in that include:
When the connection request of external equipment is received, distribute an independent user by multiple domain space technology
Space;
In the case of the connection request of the external equipment is received, the external equipment is connected to described only
Vertical user's space, to detect the security of the external equipment in the independent user's space.
2. the method for claim 1, it is characterised in that please in the connection for receiving external equipment
After asking, also include:
Judge whether the external equipment has unique identifier, wherein, the unique identifier exists for terminal
The external equipment is accessed for the first time and to be generated during the terminal;
In the case of not having the unique identifier, one is generated according to current sensing time and described external set
Standby corresponding unique identifier, described independent to be accessed the external equipment by the unique identifier
User's space;
In the case of with the unique identifier, according to the unique identifier determines whether access
Independent user's space.
3. method as claimed in claim 2, it is characterised in that being determined according to the unique identifier is
No access the independent user's space and include:
Judge whether are this time connection and the last time difference for accessing the terminal according to the unique identifier
In preset time range;
In the case that the time difference is in the preset time range, the external equipment is connected to end
Hold normal user's space;
In the case that the time difference is not in the preset time range, the external equipment is connected to
The independent user's space.
4. method as claimed any one in claims 1 to 3, it is characterised in that described independent
In user's space after the security of the detection external equipment, also include:
In the case that the security of the external equipment meets preset standard, the external equipment is connected to
The normal user's space of terminal, to realize normal access;
In the case that the security of the external equipment does not meet preset standard, disconnect and the peripheral apparatus
Connection.
5. method as claimed in claim 4, it is characterised in that disconnect the connection with the peripheral apparatus
Afterwards, also include:
The unique identifier of the peripheral apparatus is recorded, to ask again to access the end in the external equipment
During end, the access operation of the external equipment is shielded according to the unique identifier.
6. a kind of connection external equipment device, it is characterised in that include:
Distribute module, for when the connection request of external equipment is received, being distributed by multiple domain space technology
One independent user's space;
Link block, in the case of the connection request of the external equipment is received, external sets described
For the independent user's space is connected to, to detect the external equipment in the independent user's space
Security.
7. device as claimed in claim 6, it is characterised in that described device also includes:
Judge module, for judging whether the external equipment has unique identifier, wherein, described unique
Identification code is that terminal is generated when the external equipment accesses the terminal for the first time;
Generation module, for, in the case of not having the unique identifier, generating according to current sensing time
The corresponding unique identifier of one external equipment, with by the unique identifier by the external equipment
Access the independent user's space;
AM access module, in the case of with the unique identifier, true according to the unique identifier
The independent user's space whether is accessed determine.
8. device as claimed in claim 7, it is characterised in that the AM access module includes:
According to the unique identifier, judging unit, for judging that this time connection accesses the terminal with last
Time difference whether in preset time range;
Access unit, in the case of in the time difference in the preset time range, will be described outer
The equipment of connecing is connected to the normal user's space of terminal;In the time difference not in the preset time range
In the case of, the external equipment is connected to the independent user's space.
9. the device as any one of claim 6 to 8, it is characterised in that
The AM access module, is additionally operable in the case that the security of the external equipment meets preset standard,
The external equipment is connected to the normal user's space of terminal, to realize normal access;External set described
In the case that standby security does not meet preset standard, the connection with the peripheral apparatus is disconnected.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Logging modle, for, after the connection with the peripheral apparatus is disconnected, recording the peripheral apparatus
Unique identifier, with when the external equipment asks to access the terminal again, according to the unique identification
The access operation of the code shielding external equipment.
11. a kind of mobile terminals, it is characterised in that include:Any one of claim 6 to 10
Connection external equipment device.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510536598.0A CN106488454B (en) | 2015-08-28 | 2015-08-28 | Method and device for connecting external equipment and mobile terminal |
PCT/CN2015/093535 WO2017035943A1 (en) | 2015-08-28 | 2015-10-31 | Method and apparatus for connecting external device, and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510536598.0A CN106488454B (en) | 2015-08-28 | 2015-08-28 | Method and device for connecting external equipment and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106488454A true CN106488454A (en) | 2017-03-08 |
CN106488454B CN106488454B (en) | 2020-03-17 |
Family
ID=58186680
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510536598.0A Expired - Fee Related CN106488454B (en) | 2015-08-28 | 2015-08-28 | Method and device for connecting external equipment and mobile terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106488454B (en) |
WO (1) | WO2017035943A1 (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101197667A (en) * | 2007-12-26 | 2008-06-11 | 北京飞天诚信科技有限公司 | Dynamic password authentication method |
CN102098475A (en) * | 2009-12-11 | 2011-06-15 | 鸿富锦精密工业(深圳)有限公司 | Electronic equipment, and method for acquiring connecting relationship between interfaces and external equipment |
CN102172095A (en) * | 2011-04-26 | 2011-08-31 | 华为终端有限公司 | Method for connecting bluetooth devices and bluetooth device |
CN102663283A (en) * | 2012-03-20 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Method for dynamically isolating computer system |
US8458800B1 (en) * | 2010-10-01 | 2013-06-04 | Viasat, Inc. | Secure smartphone |
CN103198263A (en) * | 2012-10-26 | 2013-07-10 | 马国强 | Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100570592C (en) * | 2008-10-29 | 2009-12-16 | 清华大学 | A kind of soft computer and implementation method |
US20110161452A1 (en) * | 2009-12-24 | 2011-06-30 | Rajesh Poornachandran | Collaborative malware detection and prevention on mobile devices |
WO2015094189A1 (en) * | 2013-12-17 | 2015-06-25 | Intel Corporation | Detection of unauthorized memory modification and access using transactional memory |
-
2015
- 2015-08-28 CN CN201510536598.0A patent/CN106488454B/en not_active Expired - Fee Related
- 2015-10-31 WO PCT/CN2015/093535 patent/WO2017035943A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101197667A (en) * | 2007-12-26 | 2008-06-11 | 北京飞天诚信科技有限公司 | Dynamic password authentication method |
CN102098475A (en) * | 2009-12-11 | 2011-06-15 | 鸿富锦精密工业(深圳)有限公司 | Electronic equipment, and method for acquiring connecting relationship between interfaces and external equipment |
US8458800B1 (en) * | 2010-10-01 | 2013-06-04 | Viasat, Inc. | Secure smartphone |
CN102172095A (en) * | 2011-04-26 | 2011-08-31 | 华为终端有限公司 | Method for connecting bluetooth devices and bluetooth device |
CN102663283A (en) * | 2012-03-20 | 2012-09-12 | 浪潮电子信息产业股份有限公司 | Method for dynamically isolating computer system |
CN103198263A (en) * | 2012-10-26 | 2013-07-10 | 马国强 | Method for establishing encrypted/decrypted storage space by virtue of personnel computer external secrete key |
Also Published As
Publication number | Publication date |
---|---|
WO2017035943A1 (en) | 2017-03-09 |
CN106488454B (en) | 2020-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10171997B2 (en) | Method and apparatus for interconnection between terminal device and gateway device | |
JP6391700B2 (en) | Method for processing impedance abnormality of power adapter, terminal and charging circuit | |
US20190340348A1 (en) | Security verification method and device | |
CN100495377C (en) | Method for inspecting type of connected peripheral apparatus and terminal interface | |
CN104601799A (en) | Data transmission method and mobile terminal | |
CN104978300B (en) | Mobile terminal and its detection method being connect with external equipment and device | |
CN104318170B (en) | A kind of method and device based on multi-mobile-terminal protection data safety | |
CN107404740B (en) | Method for switching network, device and the terminal device of safety | |
CN106488394A (en) | A kind of method and device of equipment connection | |
CN105827405A (en) | Remotely-controlled safety lock device and remote control method thereof | |
CN104980420A (en) | Business processing method, device, terminal and server | |
CN104462934B (en) | A kind of information processing method and electronic equipment | |
CN101119383A (en) | Method and apparatus of establishing iSCSI conversation for objective terminal and initiating terminal | |
CN106169955B (en) | The safety certifying method and system of distribution network terminal wireless maintenance | |
CN102724140B (en) | Instant messaging good friend's addition means and device | |
CN107612571A (en) | Terminal and its control circuit of multipurpose Kato, prevent SIM card from burning the method for card | |
CN106488454A (en) | A kind of method of connection external equipment, device and mobile terminal | |
CN105022951A (en) | Information processing method and electronic equipment | |
CN107145456B (en) | Method, device and system for identifying self-connection of equipment | |
CN106411917B (en) | A kind of method and relevant device of file transmission detection | |
CN113365257B (en) | Master-slave earphone switching method and device, earphone and readable storage medium | |
CN103812870A (en) | Information processing method and electronic equipment | |
CN104618326B (en) | A kind of information processing method and electronic equipment | |
CN105450843A (en) | Method and device of arranging operation mode of mobile terminal | |
CN105187377B (en) | Data processing method and device, and data access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20200317 Termination date: 20210828 |