CN106604139A - Control method and apparatus for intelligent device - Google Patents
Control method and apparatus for intelligent device Download PDFInfo
- Publication number
- CN106604139A CN106604139A CN201611047597.0A CN201611047597A CN106604139A CN 106604139 A CN106604139 A CN 106604139A CN 201611047597 A CN201611047597 A CN 201611047597A CN 106604139 A CN106604139 A CN 106604139A
- Authority
- CN
- China
- Prior art keywords
- smart machine
- root authority
- encryption file
- information
- checking information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/443—OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/41—Structure of client; Structure of client peripherals
- H04N21/418—External card to be used in combination with the client device, e.g. for conditional access
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to a control method and apparatus for an intelligent device. When access of an external device with an encrypted file is detected, the encrypted file is decrypted and verification information is obtained; when the verification information is identical with preset information, root authority of an intelligent device is started and an operation control instruction under the root authority of the intelligent device is obtained; and according to the root authority and the operation control instruction, an operation corresponding to the operation control instruction is executed. With the encrypted file of the accessed external device, when the verification information of the encrypted file is identical with the preset information, the verification information is represented to be effective, thereby realizing obtaining of the root authority of the intelligent device and executing the operation under the root authority. When the intelligent device fails to work due to a problem, the root authority can be obtained by using the control method and apparatus and the operations like debugging under the root authority are carried out, so that a problem that an intelligent television set can not be used due to some problems can be solved and thus the user can use the intelligent device conveniently.
Description
Technical field
The present invention relates to technical field of intelligence, the control method and device of more particularly to a kind of smart machine.
Background technology
With the development of intellectual technology, smart machine is widely used in people's life, and intelligent TV set is exactly wherein
One kind, the operating systems such as linux or android are applied in intelligent television, and existence anduniquess is super in these operating systems
User root, it has all of authority in operating system, that is to say, under root authority, user can be to intelligent TV set
In any file (including system file) operation such as increased, deleted, being changed, being inquired about.At present, intelligent TV set is in production
After finishing, in order to ensure its safety, root authority can be all closed, and not allow user to open, i.e., user does not have root authority
Intelligent television is operated, but once intelligent TV set goes wrong, need acquisition root authority to carry out intelligent TV set
Debugging, however, user does not have root authority, it is impossible to it is carried out the operational control such as to debug, causes intelligent TV set to occur asking
Topic can not be used, and be not easy to user and used.
The content of the invention
Based on this, it is necessary to for the existing technical problem that cannot be operated to smart machine without root authority, there is provided
A kind of control method and device for obtaining the smart machine that root authority is operated to smart machine.
A kind of control method of smart machine, comprises the steps:
When having detected external equipment and accessing, detect in the external equipment for accessing whether there is encryption file;
If so, the encryption file is decrypted, obtains checking information;
When the checking information is identical with presupposed information, start the root authority of the smart machine;
Obtain and the operational control under the root authority of the smart machine is instructed, and according to the root authority and institute
Operational control instruction is stated, is performed and the operational control corresponding operation of instruction.
The present invention also provides a kind of control device of smart machine, including:
Detection module, for when having detected external equipment and accessing, detecting whether have in the external equipment for accessing
Encryption file;
Deciphering module, for the detection module testing result for be when, to it is described encryption file be decrypted, obtain
Checking information;
Starting module, for when the checking information is identical with presupposed information, starting the root power of the smart machine
Limit;
Performing module, for the operational control instruction under root authority of the acquisition to the smart machine, and according to described
Root authority and the operational control are instructed, and are performed and the operational control corresponding operation of instruction.
The control method and device of above-mentioned smart machine, when having detected external equipment and accessing, it is described that detection is accessed
Whether there is encryption file in external equipment, if so, the encryption file is decrypted, checking information is obtained, when the checking
When information is identical with presupposed information, start the root authority of the smart machine, obtain the root authority to the smart machine
Under operational control instruction, and instructed according to the root authority and the operational control, execution refers to the operational control
Make corresponding operation.By the encryption file in the external equipment of access, when checking information and presupposed information in encryption file
When identical, checking information is represented effectively, that is, file is encrypted effectively, so as to realizing the acquisition of the root authority of smart machine and performing
Operation under root authority, going wrong in smart machine to use, can be by the control method of above-mentioned smart machine and dress
Acquisition root authority is put, the operation for obtaining the root authority of smart machine and carrying out under root authority is for example debugged, to solve intelligence
Can television set go wrong non-serviceable problem, it is user-friendly.
Description of the drawings
Fig. 1 is a kind of flow chart of the control method of the smart machine of embodiment;
Fig. 2 is the flow chart of the control method of the smart machine of another kind of embodiment;
Fig. 3 is a kind of module map of the control device of the smart machine of embodiment.
Specific embodiment
Refer to Fig. 1, there is provided a kind of control method of the smart machine of embodiment, comprise the following steps:
S110:When having detected external equipment and accessing, detect in the external equipment for accessing whether there is encryption file.
If so, following steps are then performed:
S120:It is decrypted to encrypting file, obtains checking information.
In smart machine production process, by carrying out being cased by after detection is finished to smart machine indices
Shipment, for example, intelligent TV set is exactly one of which.In order to ensure the safety of smart machine, smart machine after production is finished,
The root authority of smart machine can be closed, because the certain operations to smart machine need root authority, such as to system
Increase, deletion, modification, inquiry of file etc. are operated, so as to production is closed after finishing to root authority so that Bu Nengsui
Meaning carries out the operation under above-mentioned root authority to smart machine, to guarantee safety.However, when smart machine goes wrong or has a spy
When different demand needs to carry out the operation under root authority to smart machine, the root authority for obtaining smart machine is needed, in this reality
In applying example, in order to obtain root authority, smart machine is linked into smart machine this sound firstly the need of having detected whether external equipment,
If detecting sometimes, detect and whether have in the external equipment of access encryption file, in encryption file checking information is carried,
That is, by correct encryption file, subsequently can normally start root authority, that is to say, that in external equipment is detected
When having encryption file, acquisition checking information can be decrypted to it.In the present embodiment, checking information includes the thing of smart machine
Reason address (MAC Address) or product ID.
S130:Whether detection checking information is identical with presupposed information.
When checking information is identical with presupposed information, following steps are performed:
S140:Start the root authority of smart machine.
After obtaining checking information, need to detect the accuracy of checking information, that is, detect checking information and default letter
Whether breath is identical, and presupposed information is correct and can start the information of root authority according to presupposed information, so as to be tested by detection
Whether card information is identical with presupposed information, you can detects whether checking information is effective for root authority is started.When checking letter
When breath is identical with presupposed information, checking information is illustrated effectively, i.e., the encryption file of corresponding external equipment is effective, you can opened
The root authority of dynamic smart machine.In a specific example, smart machine be by interface can external external equipment equipment, example
Such as, intelligent TV set, different from mobile terminal, intelligent TV set is provided with interface, external equipment is accessed by interface, by outer
Encryption file in portion's equipment carries out root authority acquisition.External equipment can be External memory equipment, and intelligent TV set can be provided with
USB (Universal Serial Bus, USB (universal serial bus)) interface, by USB interface outside USB flash disk equipment is can access.
S150:Obtain and the operational control under the root authority of smart machine is instructed, and according to root authority and operation
Control instruction, performs and the operational control corresponding operation of instruction.
Smart machine is obtained after root authority, and smart machine can perform the various operations under root authority, that is to say, that
User can carry out the operation under root authority to smart machine, and smart machine can obtain the behaviour under the root authority of smart machine
Make control instruction, and instructed according to root authority and operational control, perform and the operational control corresponding operation of instruction, that is,
Perform the operation under root authority, for example, the debugging of smart machine, so as to realize the control of smart machine.
The control method of above-mentioned smart machine, when having detected external equipment and accessing, detects that the outside accessed sets
Whether have encryption file in standby, if so, the encryption file be decrypted, obtain checking information, when the checking information with
When presupposed information is identical, start the root authority of the smart machine, obtain to the behaviour under the root authority of the smart machine
Make control instruction, and instructed according to the root authority and the operational control, perform corresponding with operational control instruction
Operation.By the encryption file in the external equipment of access, when the checking information in encrypting file is identical with presupposed information,
Represent checking information effectively, that is, encrypt file effectively, so as to realizing the acquisition of the root authority of smart machine and performing root power
Operation under limit, going wrong in smart machine to use, and can obtain root power by the control method of above-mentioned smart machine
Limit, the operation for obtaining the root authority of smart machine and carrying out under root authority is for example debugged, to solve intelligent TV set appearance
The non-serviceable problem of problem, it is user-friendly.
Fig. 2 is referred to, wherein in one embodiment, the control method of above-mentioned smart machine also includes step:
When checking information and presupposed information are differed, following steps are performed:
S260:Provide the incorrect information of encryption file.
When checking information and presupposed information are differed, represent that checking information is invalid and incorrect, in external equipment
Encryption file be invalid incorrect, so as to, it is impossible to effectively start root authority, now, provide encryption file be incorrect and carry
Show information, with inform user this encryption file it is incorrect.
Wherein in one embodiment, when having detected external equipment and accessing, whether detect in the external equipment for accessing
The step of having encryption file includes:
When outside USB flash disk equipment access has been detected, detect in the outside USB flash disk equipment for accessing whether there is encryption file.
In the present embodiment, inserting outside USB flash disk equipment on smart machine by way of to obtain smart machine
The authority of root, that is to say, that the encryption file for carrying checking information is prestored in outside USB flash disk equipment, encryption file is
Generated according to checking information, checking information includes the physical address (MAC Address) or product ID of smart machine, that is,
Say, corresponding encryption file can be generated according to the physical address (MAC Address) of smart machine or product ID, and be unique
's.When needing to obtain root authority, outside USB flash disk equipment is inserted into smart machine, smart machine has detected outside USB flash disk equipment
During access, detect in the outside USB flash disk equipment for accessing whether there is encryption file, when there is encryption file in external equipment USB flash disk, carry out
The step of next step is decrypted and checking information is detected.
Wherein in one embodiment, perform with after the operational control corresponding operation of instruction, also including step:
Close the root authority of smart machine.
Smart machine has been performed after corresponding operating, for example, after smart machine debugging is finished, closes root authority, it is ensured that he
People cannot be further continued for carrying out the associative operation of root authority, for example, the associative operation such as deletion system file, it is ensured that smart machine
Safety.
Refer to Fig. 3, the control device of the smart machine of another embodiment, including:
Detection module 310, whether have in the external equipment for accessing for when having detected external equipment and accessing, detecting plus
Ciphertext part.
Deciphering module 320, for detection module testing result for be when, to encrypt file be decrypted, verified
Information.
In smart machine production process, by carrying out being cased by after detection is finished to smart machine indices
Shipment, for example, intelligent TV set is exactly one of which.In order to ensure the safety of smart machine, smart machine after production is finished,
The root authority of smart machine can be closed, because the certain operations to smart machine need root authority, such as to system
Increase, deletion, modification, inquiry of file etc. are operated, so as to production is closed after finishing to root authority so that Bu Nengsui
Meaning carries out the operation under above-mentioned root authority to smart machine, to guarantee safety.However, when smart machine goes wrong or has a spy
When different demand needs to carry out the operation under root authority to smart machine, the root authority for obtaining smart machine is needed, in this reality
In applying example, in order to obtain root authority, smart machine is linked into smart machine this sound firstly the need of having detected whether external equipment,
If detecting sometimes, detect and whether have in the external equipment of access encryption file, in encryption file checking information is carried,
That is, by correct encryption file, subsequently can normally start root authority, that is to say, that in external equipment is detected
When having encryption file, acquisition checking information can be decrypted to it.In the present embodiment, checking information includes the thing of smart machine
Reason address (MAC Address) or product ID.
Starting module 330, for when checking information is identical with presupposed information, starting the root authority of smart machine.
After obtaining checking information, need to detect the accuracy of checking information, that is, detect checking information and default letter
Whether breath is identical, and presupposed information is correct and can start the information of root authority according to presupposed information, so as to be tested by detection
Whether card information is identical with presupposed information, you can detects whether checking information is effective for root authority is started.When checking letter
When breath is identical with presupposed information, checking information is illustrated effectively, i.e., the encryption file of corresponding external equipment is effective, you can opened
The root authority of dynamic smart machine.In a specific example, smart machine be by interface can external external equipment equipment, example
Such as, intelligent TV set, different from mobile terminal, intelligent TV set is provided with interface, external equipment is accessed by interface, by outer
Encryption file in portion's equipment carries out root authority acquisition.External equipment can be External memory equipment, and intelligent TV set can be provided with
USB (Universal Serial Bus, USB (universal serial bus)) interface, by USB interface outside USB flash disk equipment is can access.
Performing module 340, for the operational control instruction under root authority of the acquisition to smart machine, and weighs according to root
Limit and operational control instruction, perform and the operational control corresponding operation of instruction.
Smart machine is obtained after root authority, and smart machine can perform the various operations under root authority, that is to say, that
User can carry out the operation under root authority to smart machine, and smart machine can obtain the behaviour under the root authority of smart machine
Make control instruction, and instructed according to root authority and operational control, perform and the operational control corresponding operation of instruction, that is,
Perform the operation under root authority, for example, the debugging of smart machine, so as to realize the control of smart machine.
The control device of above-mentioned smart machine, when having detected external equipment and accessing, detects that the outside accessed sets
Whether have encryption file in standby, if so, the encryption file be decrypted, obtain checking information, when the checking information with
When presupposed information is identical, start the root authority of the smart machine, obtain to the behaviour under the root authority of the smart machine
Make control instruction, and instructed according to the root authority and the operational control, perform corresponding with operational control instruction
Operation.By the encryption file in the external equipment of access, when the checking information in encrypting file is identical with presupposed information,
Represent checking information effectively, that is, encrypt file effectively, so as to realizing the acquisition of the root authority of smart machine and performing root power
Operation under limit, going wrong in smart machine to use, and can obtain root power by the control device of above-mentioned smart machine
Limit, the operation for obtaining the root authority of smart machine and carrying out under root authority is for example debugged, to solve intelligent TV set appearance
The non-serviceable problem of problem, it is user-friendly.
Wherein in one embodiment, the control device of above-mentioned smart machine also includes reminding module.
Reminding module, for when checking information and presupposed information are differed, providing the incorrect information of encryption file.
When checking information and presupposed information are differed, represent that checking information is invalid and incorrect, in external equipment
Encryption file be invalid incorrect, so as to, it is impossible to effectively start root authority, now, provide encryption file be incorrect and carry
Show information, with inform user this encryption file it is incorrect.
Wherein in one embodiment, detection module, also particularly useful for when outside USB flash disk equipment access has been detected, is examined
Whether survey in the outside USB flash disk equipment for accessing has encryption file.
In the present embodiment, inserting outside USB flash disk equipment on smart machine by way of to obtain smart machine
The authority of root, that is to say, that the encryption file for carrying checking information is prestored in outside USB flash disk equipment, encryption file is
Generated according to checking information, checking information includes the physical address (MAC Address) or product ID of smart machine, that is,
Say, corresponding encryption file can be generated according to the physical address (MAC Address) of smart machine or product ID, and be unique
's.When needing to obtain root authority, outside USB flash disk equipment is inserted into smart machine, smart machine has detected outside USB flash disk equipment
During access, detect in the outside USB flash disk equipment for accessing whether there is encryption file, when there is encryption file in external equipment USB flash disk, carry out
Next step is decrypted and checking information detection.
Wherein in one embodiment, the control device of above-mentioned smart machine also includes:
Closedown module, for closing the root authority of smart machine.
Smart machine has been performed after corresponding operating, for example, after smart machine debugging is finished, closes root authority, it is ensured that he
People cannot be further continued for carrying out the associative operation of root authority, for example, the associative operation such as deletion system file, it is ensured that smart machine
Safety.
Each technical characteristic of above example can be combined arbitrarily, to make description succinct, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, there is no lance in the combination of these technical characteristics
Shield, is all considered to be the scope of this specification record.
Above example only expresses the several embodiments of the present invention, and its description is more concrete and detailed, but can not
Therefore it is interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art,
Without departing from the inventive concept of the premise, some deformations and improvement can also be made, these belong to the protection model of the present invention
Enclose.Therefore, the protection domain of patent of the present invention should be defined by claims.
Claims (10)
1. a kind of control method of smart machine, it is characterised in that comprise the steps:
When having detected external equipment and accessing, detect in the external equipment for accessing whether there is encryption file;
If so, the encryption file is decrypted, obtains checking information;
When the checking information is identical with presupposed information, start the root authority of the smart machine;
Obtain and the operational control under the root authority of the smart machine is instructed, and according to the root authority and the behaviour
Make control instruction, perform and the operational control corresponding operation of instruction.
2. the control method of smart machine according to claim 1, it is characterised in that described when having detected external equipment
During access, detect that the step of whether having encryption file in the external equipment for accessing includes:
When outside USB flash disk equipment access has been detected, whether there is encryption file in the described outside USB flash disk equipment that detection is accessed.
3. the control method of smart machine according to claim 1, it is characterised in that the execution and the operational control
After instructing corresponding operation, also including step:
Close the root authority of the smart machine.
4. the control method of smart machine according to claim 1, it is characterised in that the checking information includes the intelligence
The physical address or product ID of energy equipment.
5. the control method of smart machine according to claim 1, it is characterised in that also including step:
When the checking information and presupposed information are differed, the incorrect information of encryption file is given.
6. a kind of control device of smart machine, it is characterised in that include:
Detection module, for when having detected external equipment and accessing, detecting in the external equipment for accessing whether there is encryption
File;
Deciphering module, for the detection module testing result for be when, to it is described encryption file be decrypted, verified
Information;
Starting module, for when the checking information is identical with presupposed information, starting the root authority of the smart machine;
Performing module, for the operational control instruction under root authority of the acquisition to the smart machine, and according to the root
Authority and the operational control are instructed, and are performed and the operational control corresponding operation of instruction.
7. the control device of smart machine according to claim 6, it is characterised in that the detection module, it is also concrete to use
In when outside USB flash disk equipment access has been detected, whether there is encryption file in the described outside USB flash disk equipment that detection is accessed.
8. the control device of smart machine according to claim 6, it is characterised in that also include:
Closedown module, for closing the root authority of the smart machine.
9. the control device of smart machine according to claim 6, it is characterised in that the checking information includes the intelligence
The physical address or product ID of energy equipment.
10. the control device of smart machine according to claim 6, it is characterised in that also include
Reminding module, for when the checking information and presupposed information are differed, providing the incorrect information of encryption file.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611047597.0A CN106604139A (en) | 2016-11-23 | 2016-11-23 | Control method and apparatus for intelligent device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611047597.0A CN106604139A (en) | 2016-11-23 | 2016-11-23 | Control method and apparatus for intelligent device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106604139A true CN106604139A (en) | 2017-04-26 |
Family
ID=58593024
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611047597.0A Pending CN106604139A (en) | 2016-11-23 | 2016-11-23 | Control method and apparatus for intelligent device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106604139A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107358090A (en) * | 2017-07-05 | 2017-11-17 | 北京珠穆朗玛移动通信有限公司 | Control method, mobile terminal and the storage medium of System Privileges |
CN107454391A (en) * | 2017-09-22 | 2017-12-08 | 上海帆声图像科技有限公司 | Television set HDCP encryption detection methods based on hardware verification |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020188538A1 (en) * | 2000-05-22 | 2002-12-12 | Robertson James A. | Method and system for implementing a databus in a global ecosystem of interrelated services |
CN102333241A (en) * | 2011-10-26 | 2012-01-25 | 青岛海信宽带多媒体技术有限公司 | Universal serial bus (USB) upgrading method for digital television and USB upgrading system for digital television |
CN103198265A (en) * | 2013-03-28 | 2013-07-10 | 上海斐讯数据通信技术有限公司 | Method for starting root permission of mobile device |
CN104469475A (en) * | 2014-11-19 | 2015-03-25 | 乐视网信息技术(北京)股份有限公司 | Information interactive method, device and system and smart television |
CN104573473A (en) * | 2014-12-05 | 2015-04-29 | 小米科技有限责任公司 | Method and authentication device for unlocking administration authority |
CN104881283A (en) * | 2015-05-20 | 2015-09-02 | 深圳市创维电器科技有限公司 | Method and system for obtaining root privilege of terminal device based on android |
US20160217123A1 (en) * | 2015-01-27 | 2016-07-28 | Abbyy Development Llc | Methods and systems for decision-tree-based automated symbol recognition |
CN105975818A (en) * | 2015-11-06 | 2016-09-28 | 乐视移动智能信息技术(北京)有限公司 | Method and device for obtaining super user permission |
-
2016
- 2016-11-23 CN CN201611047597.0A patent/CN106604139A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020188538A1 (en) * | 2000-05-22 | 2002-12-12 | Robertson James A. | Method and system for implementing a databus in a global ecosystem of interrelated services |
CN102333241A (en) * | 2011-10-26 | 2012-01-25 | 青岛海信宽带多媒体技术有限公司 | Universal serial bus (USB) upgrading method for digital television and USB upgrading system for digital television |
CN103198265A (en) * | 2013-03-28 | 2013-07-10 | 上海斐讯数据通信技术有限公司 | Method for starting root permission of mobile device |
CN104469475A (en) * | 2014-11-19 | 2015-03-25 | 乐视网信息技术(北京)股份有限公司 | Information interactive method, device and system and smart television |
CN104573473A (en) * | 2014-12-05 | 2015-04-29 | 小米科技有限责任公司 | Method and authentication device for unlocking administration authority |
US20160217123A1 (en) * | 2015-01-27 | 2016-07-28 | Abbyy Development Llc | Methods and systems for decision-tree-based automated symbol recognition |
CN104881283A (en) * | 2015-05-20 | 2015-09-02 | 深圳市创维电器科技有限公司 | Method and system for obtaining root privilege of terminal device based on android |
CN105975818A (en) * | 2015-11-06 | 2016-09-28 | 乐视移动智能信息技术(北京)有限公司 | Method and device for obtaining super user permission |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107358090A (en) * | 2017-07-05 | 2017-11-17 | 北京珠穆朗玛移动通信有限公司 | Control method, mobile terminal and the storage medium of System Privileges |
CN107454391A (en) * | 2017-09-22 | 2017-12-08 | 上海帆声图像科技有限公司 | Television set HDCP encryption detection methods based on hardware verification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104156642B (en) | A kind of security password input system and method based on safe touch screen control chip | |
CN103810437B (en) | A kind of method of hide application program and terminal | |
CN105871558B (en) | A kind of digital control system right management method based on USB flash disk physical serial numbers | |
WO2019144403A1 (en) | Chip access method, security control module, chip and debugging device | |
CN108351925A (en) | Unlock and recovery to encryption device | |
KR20170085571A (en) | Apparatus and method for improving security of terminal | |
EP2821866A1 (en) | Control program management system and method for changing control program | |
CN109344598A (en) | The binding of equipment room and authority control method, device, equipment and storage medium | |
CN102647712B (en) | A kind of mobile phone data encryption method and decryption method | |
CN103198037A (en) | Reliable pipe control method and system for IO (input output) equipment | |
CN109284585A (en) | A kind of script encryption method, script decryption operation method and relevant apparatus | |
CN107180204A (en) | A kind of method, storage device and mobile terminal for preventing information stolen | |
CN104537282B (en) | It is a kind of that method is licensed based on encryption flash memory disk and big data computing | |
CN105678162A (en) | TPM-based operating system secure boot control method | |
CN105631259A (en) | Power-on verification method, power-on verification device and terminal | |
CN106604139A (en) | Control method and apparatus for intelligent device | |
CN104104650B (en) | data file access method and terminal device | |
CN110245495A (en) | BIOS method of calibration, configuration method, equipment and system | |
CN105740661A (en) | Method and device for protecting application program | |
CN107818272A (en) | Hard disk secure starts and hard disk binding method, device and industrial computer | |
CN110245464A (en) | The method and apparatus for protecting file | |
CN110704814A (en) | Anti-copy method and device, and storage medium | |
EP3193262A1 (en) | Database operation method and device | |
CN104504336A (en) | Method and device for preventing embedded system from being maliciously debugged online | |
CN105095780B (en) | The access method and device of test port in a kind of chip |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170426 |
|
RJ01 | Rejection of invention patent application after publication |