CN106529234A - Data partition password verification method and device under debugging mode, and terminal equipment - Google Patents

Data partition password verification method and device under debugging mode, and terminal equipment Download PDF

Info

Publication number
CN106529234A
CN106529234A CN201610924302.7A CN201610924302A CN106529234A CN 106529234 A CN106529234 A CN 106529234A CN 201610924302 A CN201610924302 A CN 201610924302A CN 106529234 A CN106529234 A CN 106529234A
Authority
CN
China
Prior art keywords
password
data
instruction
terminal unit
subregions
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610924302.7A
Other languages
Chinese (zh)
Other versions
CN106529234B (en
Inventor
孙哲
黄增志
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201610924302.7A priority Critical patent/CN106529234B/en
Publication of CN106529234A publication Critical patent/CN106529234A/en
Application granted granted Critical
Publication of CN106529234B publication Critical patent/CN106529234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a data partition password verification method and device under a debugging mode, and terminal equipment. The method comprises the following steps of: in a startup process of the terminal equipment, obtaining a password verification instruction input by a user, wherein the password verification instruction is used for indicating the terminal equipment to carry out data partition password verification; in a preset storage area, obtaining a data partition password, wherein the preset storage area is an area which is set in the debugging mode version of the terminal equipment and is used for storing the data partition password; and sending a password verification request which comprises the data partition password to the underlying encryption equipment of the terminal equipment to enable the underlying encryption equipment to verify the data partition password. The method is used for improving debugging efficiency for the terminal equipment.

Description

Data subregions method of password authentication, device and terminal unit under debugging mode
Technical field
The present embodiments relate to data subregions password authentification under field of computer technology, more particularly to a kind of debugging mode Method, device and terminal unit.
Background technology
At present, in the terminal unit (such as mobile phone) of most android systems, in order to ensure the safety of user data Property, need to be encrypted the data subregions of terminal unit.
After the data subregions encryption to terminal unit, in terminal unit start process, user needs to be input into data Subregion password just can guarantee that terminal unit normal boot-strap.During debugging to terminal unit, in order to ensure to debug ring Border is consistent to the practical service environment of terminal unit with user, therefore, during debugging to terminal unit, it is also desirable to Data subregions are encrypted.Terminal unit is being carried out in debugging process, possible multiple commissioning staffs are needed to same terminal Equipment is debugged, and this results in the data subregion passwords that part commissioning staff may be unaware that terminal unit.In prior art In, when user does not know the data subregion passwords of terminal unit, in order to ensure that terminal unit normally can start, it usually needs The data subregions of terminal unit are formatted, and re-encrypted is carried out to data subregions, due to current terminal unit The usual capacity of data subregions larger (such as 64G etc.) so that longer to data subregion encryption times (such as 30 minutes or 1 little When etc.) so that the time for starting terminal unit in the case where user does not know data subregion passwords is longer.
However, during debugging to terminal unit, commissioning staff Jing does not often know data point of terminal unit Area's password, and the time of startup terminal unit is longer in the case where user does not know data subregion passwords, and then cause to end It is less efficient that end equipment is debugged.
The content of the invention
The embodiment of the present invention provides data subregion method of password authentications, device and terminal unit under a kind of debugging mode, uses In debugging efficiency of the raising to terminal unit.
In a first aspect, the embodiment of the present invention provides data subregion method of password authentications under a kind of debugging mode, including:
In the start process of terminal unit, the password authentification instruction of user input is obtained, and the password authentification instruction is used Data subregion password authentifications are carried out in instruction terminal equipment;
Data subregion passwords are obtained in default memory area, the default memory area is the debugging mould in terminal unit Region arrange in formula version, for storing data subregion passwords;
Sending to the bottom encryption device of the terminal unit includes the password authentification request of the data subregions password, with The bottom encryption device is made to verify the data subregions password.
In one embodiment, it is described to obtain data subregion passwords in default memory area, including:
Startup possesses the default background service of root authority;
The data subregions password is obtained in the default memory area by the default background service.
In another embodiment, the password authentification instruction for obtaining user input, including:
Receive auxiliary equipment and instructed with the password authentification that adb instruction modes send, wherein, the auxiliary equipment and institute State terminal unit to connect by adb ports;
Or,
Default pressing instruction of the receive user to the programmable button input in the terminal unit, and pressed according to described presetting Pressure instruction generates the password authentification instruction.
In another embodiment, before the password authentification instruction of user input is obtained, also include:
After the terminal unit shows interface for password input, register the corresponding instruction of the interface for password input and monitor Device, the instruction audiomonitor are used to monitor password authentification instruction;
Accordingly, the password authentification for including the data subregions password is sent to the bottom encryption device of the terminal unit Request, including:
After the password authentification instruction that the user input is listened to by the instruction audiomonitor, by the instruction Audiomonitor, generation include the password authentification request of the data subregions password, and send institute to the bottom encryption device State password authentification request.
In another embodiment, methods described also includes:
The data subregions password modification instruction of user input is obtained, the data subregions password modification instruction includes waiting to set Put the type of data subregions password and the data subregions password to be placed;
The data subregions password to be placed and the data subregions password to be placed are sent to the bottom encryption device Type so that the bottom encryption device is according to the data subregions password to be placed and the data subregions password to be placed Type, data subregion passwords in data subregions are modified;
Startup possesses the default background service of root authority, and controls the default background service according to described to be placed The type of data subregions password and the data subregions password to be placed, enters to data subregion passwords in the default memory area Row is arranged.
In another embodiment, to the bottom encryption device send the data subregions password to be placed it Before, also include:
Obtain the type of the data subregions password to be placed;
If the type of the data subregions password to be placed is image type, by the data to be placed of described image type Subregion password is converted to character types.
Second aspect, the embodiment of the present invention provide data subregion password authentication devices under a kind of debugging mode, including:
First acquisition module, in the start process of terminal unit, obtaining the password authentification instruction of user input, institute Stating password authentification and instructing carries out data subregion password authentifications for instruction terminal equipment;
Second acquisition module, for obtaining data subregion passwords in default memory area, the default memory area is Region arrange in the debugging mode version of the terminal unit, for storing data subregion passwords;
Sending module, sending for the bottom encryption device to the terminal unit includes the close of the data subregions password Code checking request, so that the bottom encryption device is verified to the data subregions password.
In one embodiment, second acquisition module is used for:
Startup possesses the default background service of root authority;
The data subregions password is obtained in the default memory area by the default background service.
In another embodiment, first acquisition module is used for:
Receive auxiliary equipment and instructed with the password authentification that adb instruction modes send, wherein, the auxiliary equipment and institute State terminal unit to connect by adb ports;
Or,
Default pressing instruction of the receive user to the programmable button input in the terminal unit, and pressed according to described presetting Pressure instruction generates the password authentification instruction.
In another embodiment, described device also includes Registering modules, wherein,
The Registering modules are used for, before the password authentification instruction that first acquisition module obtains user input, After the terminal unit shows interface for password input, the corresponding instruction audiomonitor of the interface for password input, the finger are registered Audiomonitor is made for monitoring password authentification instruction;
Accordingly, the sending module is used for, in the password that the user input is listened to by the instruction audiomonitor After checking instruction, by the instruction audiomonitor, generation includes the password authentification request of the data subregions password, and The password authentification request is sent to the bottom encryption device.
In another embodiment, described device also includes the 3rd acquisition module, starting module, wherein,
3rd acquisition module is used for, and obtains the data subregions password modification instruction of user input, the data subregions Password modification instruction includes the type of data subregions password to be placed and the data subregions password to be placed;
The sending module is additionally operable to, and sends the data subregions password to be placed and described to the bottom encryption device The type of data subregions password to be placed, so that the bottom encryption device is according to the data subregions password to be placed and described The type of data subregions password to be placed, modifies to data subregion passwords in data subregions;
The starting module is used for, and startup possesses the default background service of root authority, and controls the default backstage clothes It is engaged according to the data subregions password to be placed and the type of the data subregions password to be placed, to the default memory area Middle data subregions password is configured.
In another embodiment, described device also includes the 4th acquisition module and modular converter, wherein,
4th acquisition module is used for, and sends described to be placed to the bottom encryption device in the sending module Before data subregion passwords, the type of the data subregions password to be placed is obtained;
The modular converter is used for, when the type of the data subregions password to be placed is image type, by the figure As the data subregions password to be placed of type is converted to character types.
The third aspect, the embodiment of the present invention provide a kind of terminal unit, and the terminal unit includes that above-mentioned second aspect is appointed Data subregions password authentication device under debugging mode described in one.
Data subregions method of password authentication, device and terminal unit under debugging mode provided in an embodiment of the present invention, at end In the start process of end equipment, after checking device gets the password authentification instruction of user input, checking device is default Data subregion passwords are obtained in memory area, and includes the close of data subregion passwords to the bottom encryption device transmission of terminal unit Code checking request, so that bottom encryption device is verified to data subregion passwords.In above process, by data subregion passwords Backup in default memory area, when user input data subregion password is needed, can using back up data subregions password as The password of user input transfers to bottom encryption device to be verified, so so that commissioning staff is in the mistake debugged to terminal unit Cheng Zhong, when commissioning staff forgets data subregion passwords, can be rapidly completed data subregion password authentifications, and realize terminal unit It is normal to start, and then improve the debugging efficiency of terminal unit.
Description of the drawings
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing Accompanying drawing to be used needed for having technology description is briefly described, it should be apparent that, drawings in the following description are these Some bright embodiments, for those of ordinary skill in the art, without having to pay creative labor, can be with Other accompanying drawings are obtained according to these accompanying drawings.
The application scenario diagram of data subregion method of password authentications under the debugging mode that Fig. 1 is provided for invention;
The flow chart one of data subregion method of password authentications under the debugging mode that Fig. 2 is provided for the present invention;
The flowchart 2 of data subregion method of password authentications under the debugging mode that Fig. 3 is provided for the present invention;
The flow chart to data subregion password amending methods that Fig. 4 is provided for the present invention;
The image schematic diagram of the data subregion passwords of the image type that Fig. 5 is provided for the present invention;
The structural representation one of data subregion password authentication devices under the debugging mode that Fig. 6 is provided for the present invention;
The structural representation two of data subregion password authentication devices under the debugging mode that Fig. 7 is provided for the present invention.
Specific embodiment
To make purpose, technical scheme and the advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is The a part of embodiment of the present invention, rather than the embodiment of whole.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
Fig. 1 refers to Fig. 1 to invent the application scenario diagram of data subregion method of password authentications under the debugging mode for providing, Include display interface 101, data subregions password authentication device 102, bottom encryption device 103, data subregions in terminal unit 104 and default memory area 105.
In this application, after user is provided with data subregion passwords for data subregions, data subregions password can be protected Exist in data subregions 104.Further, default memory area 105, the default memory area are provided with terminal unit 105 are used to store unencrypted data subregion passwords, optionally, can be that terminal unit arranges data subregion passwords in user When, also the password that user is arranged is stored in the default memory area 105.
During terminal unit is started shooting, data subregions are in encrypted state, need user input data subregion password, To realize terminal unit normal boot-strap.When user input data subregion password is needed, can show in display interface 101 Data subregion Password Input frames.When user forgets data subregion passwords, user can be input into password authentification instruction and (for example pass through Auxiliary equipment imports to the adb instructions in terminal unit), password authentification is carried out to trigger data subregions password authentication device 102, Specifically, unencrypted data subregions can be obtained in default memory area 104 close for data subregions password authentication device 102 Code, and the data subregions password for getting is sent to bottom encryption device 103 as the password of user input, so that bottom adds Close equipment 103 verifies that to data subregion passwords specifically, bottom encryption device 103 can obtain use in data subregions The data subregion passwords that family is arranged, and data subregions password that data subregions password authentication device 102 is sent and data subregions In data subregion passwords contrasted, as default memory area is as the data subregion passwords in data subregions so that Bottom encryption device is to data subregion password authentification successes.In above process, by backing up data subregion passwords, and will backup Data subregions password carry out password authentification as the password of user input, so so that commissioning staff is being adjusted to terminal unit During examination, when commissioning staff forgets data subregion passwords, data subregion password authentifications can be rapidly completed, and realize end End equipment normally starts.It should be noted that the method shown in the application is applied to the terminal unit of debugging mode.
Below, the technical scheme shown in the application is described in detail by specific embodiment.It should be noted that under These specific embodiments of face can be combined with each other, may be in certain embodiments for same or analogous concept or process Repeat no more.
Under the debugging mode that Fig. 2 is provided for the present invention, the flow chart one of data subregion method of password authentications, refers to Fig. 2, The method can include:
S201, the password authentification instruction in the start process of terminal unit, obtaining user input, password authentification instruction are used Data subregion password authentifications are carried out in instruction terminal equipment;
S202, obtain data subregion passwords in default memory area, default memory area is the debugging in terminal unit Region arrange in schema version, for storing data subregion passwords;
S203, the password authentification request for including data subregion passwords to the bottom encryption device transmission of terminal unit, so that Bottom encryption device is verified to data subregion passwords.
The executive agent of the embodiment of the present invention is (the hereinafter referred checking dress of data subregion password authentication devices under debugging mode Put), the checking device can pass through software and/or hardware is realized.Optionally, the checking device can be arranged on terminal unit In.Optionally, the terminal unit shown in the application can be mobile phone, apparatus such as computer.
In actual application, during terminal unit under debugging mode is started shooting, when needing user input During data subregion passwords, data subregion interface for password input is shown in the display interface of terminal unit, if user knows data Subregion password, then user directly in data subregion interface for password input be input into data subregion passwords, to realize terminal unit just Often start.If user does not know data subregion passwords, user can be input into password authentification instruction, to trigger checking device rear Platform carries out data subregion password authentifications.
Optionally, verify that the password authentification that device can obtain user input by the feasible implementation of the following two kinds refers to Order:
A kind of feasible implementation:
Checking device receives the password authentification instruction that auxiliary equipment is sent with adb instruction modes, wherein, auxiliary equipment and end End equipment is connected by adb ports.
In this kind of feasible implementation, when user needs to be input into password authentification instruction, terminal can be set by user Standby adb ports are connected with auxiliary equipment, and in auxiliary equipment send password authentification to terminal unit by adb instruction modes Instruction, optionally, the password authentification instruction can be test.password.AUTO.Optionally, auxiliary equipment can be computer Deng equipment.
In above process, connected by the adb ports by auxiliary equipment and terminal unit, in that context it may be convenient to by auxiliary Equipment sends password authentification instruction to terminal unit, improves the convenience of user input password authentification instruction.
Another kind of feasible implementation:
Default pressing instruction of the receive user to the programmable button input in terminal unit, and according to default pressing instruction life Instruct into password authentification.
In this kind of feasible implementation, when user needs to be input into password authentification instruction, user can be set to terminal The default pressing instruction of programmable button input in standby, so as to terminal unit generates password authentification according to the default pressing instruction refer to Order.Optionally, the default pressing instruction can be continuous three pressing operations to upper volume key, or, the default pressing refers to Order can also be the pressing operation of continuous 3 seconds to lower volume key.In actual application, can set according to actual needs Put the default pressing instruction.Optionally, the function that default pressing instruction can be pre-set in terminal unit (generates password to test Card instruction).
In above process, when user need be input into password authentification instruct when, user only need to terminal unit in it is pre- If the default pressing instruction of key-press input, without using auxiliary equipment, further improves user input password authentification and refers to The convenience of order.
After checking device gets the password authentification instruction of user input, checking device is obtained in default memory area Data subregion passwords are taken, optionally, checking device can control to start the default background service for possessing root authority, and by pre- If background service obtains data subregion passwords in default memory area.As the default background service has root authority, because This, the default background service has higher authority so that can easily in default memory block by the default background service Data subregion passwords are obtained in domain, it is to avoid checking device cannot obtain asking for data subregion passwords in default memory area Topic.In the prior art, just carried out changing the operation of password to encryption layer by systems communicate after user input new password, due to answering Even if with the password for now saving user input, data base still cannot be read before decryption when start next time.Can Choosing, default memory area can be diag subregions, and the default background service can be serviced for flagservice.
After checking device obtains data subregion passwords in default memory area, checking device generates password authentification please Ask, the password authentification request includes the data subregion passwords for acquiring, and sends to the bottom encryption device of terminal unit The password authentification is asked.After bottom encryption device receives password authentification request, data is obtained in password authentification request Subregion password, and the data subregion passwords that user is arranged are obtained in data subregions, wherein, the data subregions in data subregions are close Password of the code for encryption, accordingly, bottom encryption device can be decrypted to the data subregion passwords in data subregions, and will The data subregion passwords in the data subregions after data subregions password and decryption in password authentification request are contrasted, due to close Data subregions password in code checking request is consistent with the data subregion passwords in the data subregions after decryption, therefore, bottom adds Close equipment passes through to data subregion password authentifications.The password authentification of data subregions is passed through afterwards in bottom encryption device, Android System reboot, the mirror image after the decryption of carry data subregions, to complete power-on operation.
Bottom encryption device in terminal unit is located at the bottom of terminal unit, and (carry should to complete start in terminal unit With system, such as android system) before, bottom encryption device is capable of achieving to carry out the data subregions password of terminal unit Process, for example, data subregion passwords are verified etc., optionally, the bottom encryption device can pass through software and/or hardware Realize.
Data subregions method of password authentication under debugging mode provided in an embodiment of the present invention, in the start process of terminal unit In, after checking device gets the password authentification instruction of user input, checking device is obtained in default memory area Data subregion passwords, and the password authentification request for including data subregion passwords is sent to the bottom encryption device of terminal unit, with Bottom encryption device is made to verify data subregion passwords.In above process, by data subregion password backups such as The default memory area of diag subregions etc, when user input data subregion password is needed, can be by with root authority Background service transfer to bottom encryption device to carry out using the data subregions password of diag Area-Specific Archives as the password of user input Checking, so so that commissioning staff during debugging to terminal unit, when commissioning staff forgets data subregion passwords, Data subregion password authentifications can be rapidly completed, and realize that terminal unit normally starts, and then improve the debugging of terminal unit Efficiency.
On the basis of embodiment illustrated in fig. 2, optionally, after terminal unit shows interface for password input, can note The corresponding instruction audiomonitor of volume interface for password input, and the password authentification instruction by the instruction audiomonitor monitoring users input, Specifically, embodiment shown in Figure 3.
The flowchart 2 of data subregion method of password authentications under the debugging mode that Fig. 3 is provided for the present invention, real shown in Fig. 2 On the basis of applying example, Fig. 3 is referred to, the method can include:
S301, terminal unit show interface for password input after, the corresponding instruction audiomonitor of log-in password inputting interface, Instruction audiomonitor is used to monitor password authentification instruction;
S302, the password authentification instruction that user input is listened to by instruction audiomonitor;
S303, startup possess the default background service of root authority;
S304, data subregion passwords are obtained by default background service in default memory area;
S305, by instruct audiomonitor, generation include data subregion passwords password authentification ask;
S306, to bottom encryption device send password authentification request so that bottom encryption device to password authentification request in Data subregion passwords verified.
Before the embodiment shown in Fig. 3 is performed, when user needs to boot up terminal unit, user is set in terminal Standby middle input start-up command, for example, the start-up command can be the length to power key by operation.Terminal unit is according to user input Start-up command after, mount virtual data, to start android system, wherein, virtual data be used for store Android systems System starts necessary data.After android system starts, interface for password input is shown in terminal unit, to use Family is input into password authentification instruction according to interface for password input.
In S301, after terminal unit shows interface for password input, the corresponding instruction prison of log-in password inputting interface Device is listened, and optionally, interface for password input and instruction audiomonitor can be bound, so that it is shown in interface for password input Afterwards, corresponding instruction audiomonitor can be shown.Optionally, the corresponding instruction audiomonitor of interface for password input is tested for monitoring password Card instruction.
In S302, after register instruction audiomonitor, password authentification can be instructed by the instruction audiomonitor in real time Monitored, to judge whether to receive password authentification instruction.Optionally, instruct the title that audiomonitor can pass through instruction to determine to refer to The type of order.It should be noted that substantially one section of pre-set programs code of instruction audiomonitor, does not hear in instruction audiomonitor When password authentification is instructed, the corresponding program code of instruction audiomonitor will not be performed;When instruction audiomonitor listens to password authentification During instruction, the corresponding program code of instruction audiomonitor is performed.
In S303-S304, startup possesses the default background server of root authority, and by default background service pre- If data subregion passwords are obtained in memory area.Optionally, S303-S304 can also be performed before S301, and the present invention is right The execution moment of S303-S304 is not especially limited.
In S305-S306, after the password authentification instruction that user input is listened to by instruction audiomonitor, execution refers to The corresponding application program of audiomonitor, the application program is made to possess following function:The data that acquisition is acquired in memory area Subregion password, generation include the password authentification request of the data subregion passwords, and please to the transmission password authentification of bottom encryption device Ask, so that bottom encryption device is verified to the data subregion passwords in password authentification request.Wherein, bottom encryption device pair The proof procedure of data subregion passwords is described in detail in the embodiment depicted in figure 2, is no longer repeated herein.
In above process, in advance by data subregions password backup in default memory area, showing interface for password input Afterwards, password authentification instruction is monitored by register instruction audiomonitor, after password authentification instruction is listened to, after root authority Platform service acquisition data subregion passwords, are handed over the data subregions password for backing up as the password of user input by instructing audiomonitor Verified by bottom encryption device, so so that commissioning staff is forgotten in commissioning staff during debugging to terminal unit During note data subregion passwords, data subregion password authentifications can be rapidly completed, and realize that terminal unit normally starts, and then be improved The debugging efficiency of terminal unit.
Below, by the embodiment shown in Fig. 4, the process modified to the data subregion passwords of terminal unit by user It is described in detail.
Fig. 4 is the flow chart to data subregion password amending methods that provides of the present invention, refers to Fig. 4, and the method can be with Including:
S401, the data subregions password modification instruction for obtaining user input, the modification instruction of data subregions password include treating The type of data subregions password and data subregions password to be placed is set;
S402, the type that data subregions password to be placed and data subregions password to be placed are sent to bottom encryption device, So that bottom encryption device is according to data subregions password to be placed and the type of data subregions password to be placed, in data subregions Data subregion passwords are modified;
S403, startup possess the default background service of root authority, and control default background service according to data to be placed The type of subregion password and data subregions password to be placed, is configured to data subregion passwords in default memory area.
In the embodiment shown in fig. 4, after terminal unit start, user can according to actual needs to terminal unit Data subregion passwords modify, wherein, when terminal unit is first powered on, the data subregions password of terminal unit is acquiescence Password.
When user needs to modify the data subregion passwords of terminal unit, the display interface of subscriber terminal equipment is adjusted Interface is changed to password, and interface is changed by password and be input into the modification instruction of data subregions password, the modification of data subregions password refers to Order includes the type of data subregions password to be placed and data subregions password to be placed, and the data subregions password to be placed is use The new data subregion passwords of family input.Optionally, the type of data subregions password to be placed can be text type and image Type.
After checking device acquires the modification instruction of data subregions password, checking device can obtain terminal unit Release type, if release type is non-debugging version, checking device performs S402, if release type is debugging version, holds Row S402 and S403.
After checking device acquires the modification instruction of data subregions password, checking device is changed in data subregions password The type of data subregions password to be placed and data subregions password to be placed is obtained in instruction, and judges the class of data subregion passwords If so, data subregions password to be placed is then converted to character by type whether image type.Below, it is close for data subregions with reference to Fig. 5 The type transformation process of code is described in detail.
The image schematic diagram of the data subregion passwords of the image type that Fig. 5 is provided for the present invention, refers to Fig. 5, the image The data subregions password of type be sliding trace of the user to numeric keypad, the image according to Fig. 5, user is to numeral The sliding trace of keyboard is followed successively by 3,5,8,9.The data subregions password of image type is turned by checking device according to the sliding trace It is changed to the data subregion passwords of character types:3589, and the 3589 corresponding password type of data subregions password is recorded for image Type.
After checking device acquires the data subregion passwords by character representation, checking device is set to bottom encryption Preparation send the type of data subregions password to be placed and data subregions password to be placed, so that bottom encryption device is according to be placed The type of data subregions password and data subregions password to be placed, modifies to data subregion passwords in data subregions.
Checking device also starts the default background service for possessing root authority, and controls default background service according to be placed The type of data subregions password and data subregions password to be placed, is configured to data subregion passwords in default memory area. Optionally, password type memory block and code content memory block are included in default memory area, accordingly, checking device is close The type of data subregion passwords is stored in code type memory block, data subregion passwords are stored in password memory storage area.It is optional , the size of password type memory block can be 2 bytes, and the size of code content memory block can be 32 bytes.
It should be noted that S402 and S403 sequentially can be performed, it is also possible to which, while performing, the present invention is to S402 and S403 Execution sequence be not especially limited.
In above process, when user modifies to data subregion passwords, will be user amended data subregions close Code back up to default memory area so that terminal unit start shooting during, can using backup data subregions password as The password of user input transfers to bottom encryption device to be verified, so so that commissioning staff is in the mistake debugged to terminal unit Cheng Zhong, when commissioning staff forgets data subregion passwords, can be rapidly completed data subregion password authentifications, and realize terminal unit It is normal to start, and then improve the debugging efficiency of terminal unit.
Under the debugging mode that Fig. 6 is provided for the present invention, the structural representation one of data subregion password authentication devices, refers to Fig. 6, the device can include:
First acquisition module 601, for, in the start process of terminal unit, the password authentification for obtaining user input refers to Order, the password authentification is instructed carries out data subregion password authentifications for instruction terminal equipment;
Second acquisition module 602, for obtaining data subregion passwords, the default memory area in default memory area It is region arrange in the debugging mode version of the terminal unit, for storing data subregion passwords;
Sending module 603, sending for the bottom encryption device to the terminal unit includes the data subregions password Password authentification request so that the bottom encryption device is verified to the data subregions password.
Device provided in an embodiment of the present invention can perform the technical scheme shown in said method embodiment, and which realizes principle And beneficial effect is similar, is no longer repeated herein.
In one embodiment, second acquisition module 602 is used for:
Startup possesses the default background service of root authority;
The data subregions password is obtained in the default memory area by the default background service.
In another embodiment, first acquisition module 601 is used for:
Receive auxiliary equipment and instructed with the password authentification that adb instruction modes send, wherein, the auxiliary equipment and institute State terminal unit to connect by adb ports;
Or,
Default pressing instruction of the receive user to the programmable button input in the terminal unit, and pressed according to described presetting Pressure instruction generates the password authentification instruction.
The structural representation two of data subregion password authentication devices under the debugging mode that Fig. 7 is provided for the present invention, in Fig. 6 institutes On the basis of showing embodiment, Fig. 7 is referred to, described device also includes Registering modules 604, wherein,
The Registering modules 604 are used for, and the password authentification for obtaining user input in first acquisition module 601 instructs it Before, after the terminal unit shows interface for password input, register the corresponding instruction audiomonitor of the interface for password input, institute Stating instruction audiomonitor is used to monitor password authentification instruction;
Accordingly, the sending module 603 is used for, and is listening to the close of the user input by the instruction audiomonitor After code checking instruction, by the instruction audiomonitor, generation includes the password authentification request of the data subregions password, And the password authentification request is sent to the bottom encryption device.
In another embodiment, described device also includes the 3rd acquisition module 605, starting module 606, wherein,
3rd acquisition module 605 is used for, and obtains the data subregions password modification instruction of user input, and the data divides Area's password modification instruction includes the type of data subregions password to be placed and the data subregions password to be placed;
The sending module 603 is additionally operable to, to the bottom encryption device send the data subregions password to be placed and The type of the data subregions password to be placed so that the bottom encryption device according to the data subregions password to be placed and The type of the data subregions password to be placed, modifies to data subregion passwords in data subregions;
The starting module 606 is used for, and startup possesses the default background service of root authority, and controls the default backstage Service according to the data subregions password to be placed and the type of the data subregions password to be placed, to the default memory block In domain, data subregions password is configured.
In another embodiment, described device also includes the 4th acquisition module 607 and modular converter 608, wherein,
4th acquisition module 607 is used for, and is treating described in the sending module 603 to bottom encryption device transmission Before data subregion passwords are set, the type of the data subregions password to be placed is obtained;
The modular converter 608 is used for, when the type of the data subregions password to be placed is image type, will be described The data subregions password to be placed of image type is converted to character types.
Device provided in an embodiment of the present invention can perform the technical scheme shown in said method embodiment, and which realizes principle And beneficial effect is similar, is no longer repeated herein.
The embodiment of the present invention also provides a kind of terminal unit, and the terminal unit includes institute in Fig. 6-Fig. 7 any embodiments Data subregions password authentication device under the debugging mode for showing.It should be noted that under the debugging mode that includes of the terminal unit The structure of data subregion password authentication devices, principle and accessible beneficial effect are realized, shown in Fig. 6-Fig. 7 embodiments Debugging mode under data subregion password authentication devices structure, realize that principle and accessible beneficial effect are identical, herein not Repeated again.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above-mentioned each method embodiment can be led to Cross the related hardware of programmed instruction to complete.Aforesaid program can be stored in a computer read/write memory medium.The journey Sequence upon execution, performs the step of including above-mentioned each method embodiment;And aforesaid storage medium includes:ROM, RAM, magnetic disc or Person's CD etc. is various can be with the medium of store program codes.
Finally it should be noted that:Various embodiments above only to illustrate technical scheme, rather than a limitation;To the greatest extent Pipe has been described in detail to the present invention with reference to foregoing embodiments, it will be understood by those within the art that:Its according to So the technical scheme described in foregoing embodiments can be modified, or which part or all technical characteristic are entered Row equivalent;And these modifications or replacement, do not make the essence of appropriate technical solution depart from various embodiments of the present invention technology The scope of scheme.

Claims (10)

1. data subregion method of password authentications under a kind of debugging mode, it is characterised in that include:
In the start process of terminal unit, the password authentification instruction of user input is obtained, and the password authentification is instructed for referring to Show that terminal unit carries out data subregion password authentifications;
Data subregion passwords are obtained in default memory area, the default memory area is the debugging mould in the terminal unit Region arrange in formula version, for storing data subregion passwords;
Sending to the bottom encryption device of the terminal unit includes the password authentification request of the data subregions password, so that institute State bottom encryption device to verify the data subregions password.
2. method according to claim 1, it is characterised in that described in default memory area to obtain data subregions close Code, including:
Startup possesses the default background service of root authority;
The data subregions password is obtained in the default memory area by the default background service.
3. method according to claim 1, it is characterised in that the password authentification instruction of the acquisition user input, including:
Receive auxiliary equipment and instructed with the password authentification that adb instruction modes send, wherein, the auxiliary equipment and the end End equipment is connected by adb ports;
Or,
Default pressing instruction of the receive user to the programmable button input in the terminal unit, and referred to according to the default pressing Order generates the password authentification instruction.
4. the method according to any one of claim 1-3, it is characterised in that obtaining the password authentification instruction of user input Before, also include:
After the terminal unit shows interface for password input, the corresponding instruction audiomonitor of the interface for password input is registered, The instruction audiomonitor is used to monitor password authentification instruction;
Accordingly, sending to the bottom encryption device of the terminal unit includes that the password authentification of the data subregions password please Ask, including:
After the password authentification instruction that the user input is listened to by the instruction audiomonitor, monitored by the instruction Device, generation include the password authentification request of the data subregions password, and send described close to the bottom encryption device Code checking request.
5. the method according to any one of claim 1-3, it is characterised in that methods described also includes:
The data subregions password modification instruction of user input is obtained, the data subregions password modification instruction includes to be placed The type of data subregions password and the data subregions password to be placed;
The class of the data subregions password to be placed and the data subregions password to be placed is sent to the bottom encryption device Type, so that the bottom encryption device is according to the data subregions password to be placed and the class of the data subregions password to be placed Type, modifies to data subregion passwords in data subregions;
Startup possesses the default background service of root authority, and controls the default background service according to the data to be placed point The type of area's password and the data subregions password to be placed, sets to data subregion passwords in the default memory area Put.
6. data subregion password authentication devices under a kind of debugging mode, it is characterised in that include:
First acquisition module, it is in the start process of terminal unit, obtaining the password authentification instruction of user input, described close Code checking instruction carries out data subregion password authentifications for instruction terminal equipment;
Second acquisition module, for obtaining data subregion passwords in default memory area, the default memory area is in institute Region arrange in the debugging mode version for stating terminal unit, for storing data subregion passwords;
Sending module, sending for the bottom encryption device to the terminal unit includes that the password of the data subregions password is tested Card request, so that the bottom encryption device is verified to the data subregions password.
7. device according to claim 6, it is characterised in that second acquisition module is used for:
Startup possesses the default background service of root authority;
The data subregions password is obtained in the default memory area by the default background service.
8. device according to claim 6, it is characterised in that first acquisition module is used for:
Receive auxiliary equipment and instructed with the password authentification that adb instruction modes send, wherein, the auxiliary equipment and the end End equipment is connected by adb ports;
Or,
Default pressing instruction of the receive user to the programmable button input in the terminal unit, and referred to according to the default pressing Order generates the password authentification instruction.
9. the device according to any one of claim 6-8, it is characterised in that described device also includes Registering modules, wherein,
The Registering modules are used for, before the password authentification instruction that first acquisition module obtains user input, described After terminal unit shows interface for password input, the corresponding instruction audiomonitor of the interface for password input, the instruction prison are registered Device is listened for monitoring password authentification instruction;
Accordingly, the sending module is used for, in the password authentification that the user input is listened to by the instruction audiomonitor After instruction, by the instruction audiomonitor, generation includes the password authentification request of the data subregions password, and to institute State bottom encryption device and send the password authentification request.
10. a kind of terminal unit, it is characterised in that the terminal unit includes the debugging mould described in any one of claim 6-9 Data subregions password authentication device under formula.
CN201610924302.7A 2016-10-24 2016-10-24 Data subregion method of password authentication, device and terminal device under debugging mode Active CN106529234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610924302.7A CN106529234B (en) 2016-10-24 2016-10-24 Data subregion method of password authentication, device and terminal device under debugging mode

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610924302.7A CN106529234B (en) 2016-10-24 2016-10-24 Data subregion method of password authentication, device and terminal device under debugging mode

Publications (2)

Publication Number Publication Date
CN106529234A true CN106529234A (en) 2017-03-22
CN106529234B CN106529234B (en) 2019-09-17

Family

ID=58293022

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610924302.7A Active CN106529234B (en) 2016-10-24 2016-10-24 Data subregion method of password authentication, device and terminal device under debugging mode

Country Status (1)

Country Link
CN (1) CN106529234B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359354A (en) * 2008-09-28 2009-02-04 北京飞天诚信科技有限公司 Method and system for implementing power-on protection
CN102955921A (en) * 2012-10-19 2013-03-06 威盛电子股份有限公司 Electronic device and safe starting method
CN103020502A (en) * 2012-12-06 2013-04-03 大连奥林匹克电子城文豪电子经销处 Computer power-on system based on basic input/output system (BIOS)
CN103164644A (en) * 2011-12-19 2013-06-19 联想(北京)有限公司 Terminal device and starting machine controlling method thereof
CN105631259A (en) * 2015-04-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Power-on verification method, power-on verification device and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101359354A (en) * 2008-09-28 2009-02-04 北京飞天诚信科技有限公司 Method and system for implementing power-on protection
CN103164644A (en) * 2011-12-19 2013-06-19 联想(北京)有限公司 Terminal device and starting machine controlling method thereof
CN102955921A (en) * 2012-10-19 2013-03-06 威盛电子股份有限公司 Electronic device and safe starting method
CN103020502A (en) * 2012-12-06 2013-04-03 大连奥林匹克电子城文豪电子经销处 Computer power-on system based on basic input/output system (BIOS)
CN105631259A (en) * 2015-04-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Power-on verification method, power-on verification device and terminal

Also Published As

Publication number Publication date
CN106529234B (en) 2019-09-17

Similar Documents

Publication Publication Date Title
US9979817B2 (en) Using automatically collected device problem information to route and guide users' requests
US9843930B2 (en) Trusted execution environment initialization method and mobile terminal
US9292680B2 (en) Mobile terminal detection method and mobile terminal
CN110719166A (en) Chip burning method, chip burning device, chip burning system and storage medium
CN107659632A (en) A kind of file encryption-decryption method, device and computer-readable recording medium
US20070239980A1 (en) Authentication method, authentication apparatus and authentication program storage medium
JP2015092374A5 (en)
JP2015092374A (en) Apparatus and methods for managing firmware verification on wireless device
JP2008547092A5 (en)
JP2012084159A5 (en)
CN107743115A (en) A kind of identity identifying method of terminal applies, device and system
CN105337974A (en) Account authorization method, account login method, account authorization device and client end
CN103324874A (en) Verification method and electronic device
CN105635794A (en) Screen recording method and system
CN107818272A (en) Hard disk secure starts and hard disk binding method, device and industrial computer
CN106203998A (en) A kind of method and device of withdrawing deposit of net cast
CN107026749A (en) Multi-user configuration method and device, multi-user's switching method and device, terminal
CN106529234B (en) Data subregion method of password authentication, device and terminal device under debugging mode
CN105871840B (en) A kind of certificate management method and system
CN107704743A (en) Device and Related product with data backup function
CN111882079A (en) Debugging method, device and system
CN103678972A (en) System and method for limits of authority
CN109670296A (en) A kind of method and apparatus removing iOS backup password
US20090210948A1 (en) Remote computer rebooting tool
CN112788640B (en) Communication equipment testing method and device, storage medium and terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant