CN106604139A - Control method and apparatus for intelligent device - Google Patents

Control method and apparatus for intelligent device Download PDF

Info

Publication number
CN106604139A
CN106604139A CN201611047597.0A CN201611047597A CN106604139A CN 106604139 A CN106604139 A CN 106604139A CN 201611047597 A CN201611047597 A CN 201611047597A CN 106604139 A CN106604139 A CN 106604139A
Authority
CN
China
Prior art keywords
smart machine
root authority
encryption file
information
checking information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611047597.0A
Other languages
Chinese (zh)
Inventor
严红超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201611047597.0A priority Critical patent/CN106604139A/en
Publication of CN106604139A publication Critical patent/CN106604139A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/443OS processes, e.g. booting an STB, implementing a Java virtual machine in an STB or power management in an STB
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/418External card to be used in combination with the client device, e.g. for conditional access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a control method and apparatus for an intelligent device. When access of an external device with an encrypted file is detected, the encrypted file is decrypted and verification information is obtained; when the verification information is identical with preset information, root authority of an intelligent device is started and an operation control instruction under the root authority of the intelligent device is obtained; and according to the root authority and the operation control instruction, an operation corresponding to the operation control instruction is executed. With the encrypted file of the accessed external device, when the verification information of the encrypted file is identical with the preset information, the verification information is represented to be effective, thereby realizing obtaining of the root authority of the intelligent device and executing the operation under the root authority. When the intelligent device fails to work due to a problem, the root authority can be obtained by using the control method and apparatus and the operations like debugging under the root authority are carried out, so that a problem that an intelligent television set can not be used due to some problems can be solved and thus the user can use the intelligent device conveniently.

Description

The control method and device of smart machine
Technical field
The present invention relates to technical field of intelligence, the control method and device of more particularly to a kind of smart machine.
Background technology
With the development of intellectual technology, smart machine is widely used in people's life, and intelligent TV set is exactly wherein One kind, the operating systems such as linux or android are applied in intelligent television, and existence anduniquess is super in these operating systems User root, it has all of authority in operating system, that is to say, under root authority, user can be to intelligent TV set In any file (including system file) operation such as increased, deleted, being changed, being inquired about.At present, intelligent TV set is in production After finishing, in order to ensure its safety, root authority can be all closed, and not allow user to open, i.e., user does not have root authority Intelligent television is operated, but once intelligent TV set goes wrong, need acquisition root authority to carry out intelligent TV set Debugging, however, user does not have root authority, it is impossible to it is carried out the operational control such as to debug, causes intelligent TV set to occur asking Topic can not be used, and be not easy to user and used.
The content of the invention
Based on this, it is necessary to for the existing technical problem that cannot be operated to smart machine without root authority, there is provided A kind of control method and device for obtaining the smart machine that root authority is operated to smart machine.
A kind of control method of smart machine, comprises the steps:
When having detected external equipment and accessing, detect in the external equipment for accessing whether there is encryption file;
If so, the encryption file is decrypted, obtains checking information;
When the checking information is identical with presupposed information, start the root authority of the smart machine;
Obtain and the operational control under the root authority of the smart machine is instructed, and according to the root authority and institute Operational control instruction is stated, is performed and the operational control corresponding operation of instruction.
The present invention also provides a kind of control device of smart machine, including:
Detection module, for when having detected external equipment and accessing, detecting whether have in the external equipment for accessing Encryption file;
Deciphering module, for the detection module testing result for be when, to it is described encryption file be decrypted, obtain Checking information;
Starting module, for when the checking information is identical with presupposed information, starting the root power of the smart machine Limit;
Performing module, for the operational control instruction under root authority of the acquisition to the smart machine, and according to described Root authority and the operational control are instructed, and are performed and the operational control corresponding operation of instruction.
The control method and device of above-mentioned smart machine, when having detected external equipment and accessing, it is described that detection is accessed Whether there is encryption file in external equipment, if so, the encryption file is decrypted, checking information is obtained, when the checking When information is identical with presupposed information, start the root authority of the smart machine, obtain the root authority to the smart machine Under operational control instruction, and instructed according to the root authority and the operational control, execution refers to the operational control Make corresponding operation.By the encryption file in the external equipment of access, when checking information and presupposed information in encryption file When identical, checking information is represented effectively, that is, file is encrypted effectively, so as to realizing the acquisition of the root authority of smart machine and performing Operation under root authority, going wrong in smart machine to use, can be by the control method of above-mentioned smart machine and dress Acquisition root authority is put, the operation for obtaining the root authority of smart machine and carrying out under root authority is for example debugged, to solve intelligence Can television set go wrong non-serviceable problem, it is user-friendly.
Description of the drawings
Fig. 1 is a kind of flow chart of the control method of the smart machine of embodiment;
Fig. 2 is the flow chart of the control method of the smart machine of another kind of embodiment;
Fig. 3 is a kind of module map of the control device of the smart machine of embodiment.
Specific embodiment
Refer to Fig. 1, there is provided a kind of control method of the smart machine of embodiment, comprise the following steps:
S110:When having detected external equipment and accessing, detect in the external equipment for accessing whether there is encryption file.
If so, following steps are then performed:
S120:It is decrypted to encrypting file, obtains checking information.
In smart machine production process, by carrying out being cased by after detection is finished to smart machine indices Shipment, for example, intelligent TV set is exactly one of which.In order to ensure the safety of smart machine, smart machine after production is finished, The root authority of smart machine can be closed, because the certain operations to smart machine need root authority, such as to system Increase, deletion, modification, inquiry of file etc. are operated, so as to production is closed after finishing to root authority so that Bu Nengsui Meaning carries out the operation under above-mentioned root authority to smart machine, to guarantee safety.However, when smart machine goes wrong or has a spy When different demand needs to carry out the operation under root authority to smart machine, the root authority for obtaining smart machine is needed, in this reality In applying example, in order to obtain root authority, smart machine is linked into smart machine this sound firstly the need of having detected whether external equipment, If detecting sometimes, detect and whether have in the external equipment of access encryption file, in encryption file checking information is carried, That is, by correct encryption file, subsequently can normally start root authority, that is to say, that in external equipment is detected When having encryption file, acquisition checking information can be decrypted to it.In the present embodiment, checking information includes the thing of smart machine Reason address (MAC Address) or product ID.
S130:Whether detection checking information is identical with presupposed information.
When checking information is identical with presupposed information, following steps are performed:
S140:Start the root authority of smart machine.
After obtaining checking information, need to detect the accuracy of checking information, that is, detect checking information and default letter Whether breath is identical, and presupposed information is correct and can start the information of root authority according to presupposed information, so as to be tested by detection Whether card information is identical with presupposed information, you can detects whether checking information is effective for root authority is started.When checking letter When breath is identical with presupposed information, checking information is illustrated effectively, i.e., the encryption file of corresponding external equipment is effective, you can opened The root authority of dynamic smart machine.In a specific example, smart machine be by interface can external external equipment equipment, example Such as, intelligent TV set, different from mobile terminal, intelligent TV set is provided with interface, external equipment is accessed by interface, by outer Encryption file in portion's equipment carries out root authority acquisition.External equipment can be External memory equipment, and intelligent TV set can be provided with USB (Universal Serial Bus, USB (universal serial bus)) interface, by USB interface outside USB flash disk equipment is can access.
S150:Obtain and the operational control under the root authority of smart machine is instructed, and according to root authority and operation Control instruction, performs and the operational control corresponding operation of instruction.
Smart machine is obtained after root authority, and smart machine can perform the various operations under root authority, that is to say, that User can carry out the operation under root authority to smart machine, and smart machine can obtain the behaviour under the root authority of smart machine Make control instruction, and instructed according to root authority and operational control, perform and the operational control corresponding operation of instruction, that is, Perform the operation under root authority, for example, the debugging of smart machine, so as to realize the control of smart machine.
The control method of above-mentioned smart machine, when having detected external equipment and accessing, detects that the outside accessed sets Whether have encryption file in standby, if so, the encryption file be decrypted, obtain checking information, when the checking information with When presupposed information is identical, start the root authority of the smart machine, obtain to the behaviour under the root authority of the smart machine Make control instruction, and instructed according to the root authority and the operational control, perform corresponding with operational control instruction Operation.By the encryption file in the external equipment of access, when the checking information in encrypting file is identical with presupposed information, Represent checking information effectively, that is, encrypt file effectively, so as to realizing the acquisition of the root authority of smart machine and performing root power Operation under limit, going wrong in smart machine to use, and can obtain root power by the control method of above-mentioned smart machine Limit, the operation for obtaining the root authority of smart machine and carrying out under root authority is for example debugged, to solve intelligent TV set appearance The non-serviceable problem of problem, it is user-friendly.
Fig. 2 is referred to, wherein in one embodiment, the control method of above-mentioned smart machine also includes step:
When checking information and presupposed information are differed, following steps are performed:
S260:Provide the incorrect information of encryption file.
When checking information and presupposed information are differed, represent that checking information is invalid and incorrect, in external equipment Encryption file be invalid incorrect, so as to, it is impossible to effectively start root authority, now, provide encryption file be incorrect and carry Show information, with inform user this encryption file it is incorrect.
Wherein in one embodiment, when having detected external equipment and accessing, whether detect in the external equipment for accessing The step of having encryption file includes:
When outside USB flash disk equipment access has been detected, detect in the outside USB flash disk equipment for accessing whether there is encryption file.
In the present embodiment, inserting outside USB flash disk equipment on smart machine by way of to obtain smart machine The authority of root, that is to say, that the encryption file for carrying checking information is prestored in outside USB flash disk equipment, encryption file is Generated according to checking information, checking information includes the physical address (MAC Address) or product ID of smart machine, that is, Say, corresponding encryption file can be generated according to the physical address (MAC Address) of smart machine or product ID, and be unique 's.When needing to obtain root authority, outside USB flash disk equipment is inserted into smart machine, smart machine has detected outside USB flash disk equipment During access, detect in the outside USB flash disk equipment for accessing whether there is encryption file, when there is encryption file in external equipment USB flash disk, carry out The step of next step is decrypted and checking information is detected.
Wherein in one embodiment, perform with after the operational control corresponding operation of instruction, also including step:
Close the root authority of smart machine.
Smart machine has been performed after corresponding operating, for example, after smart machine debugging is finished, closes root authority, it is ensured that he People cannot be further continued for carrying out the associative operation of root authority, for example, the associative operation such as deletion system file, it is ensured that smart machine Safety.
Refer to Fig. 3, the control device of the smart machine of another embodiment, including:
Detection module 310, whether have in the external equipment for accessing for when having detected external equipment and accessing, detecting plus Ciphertext part.
Deciphering module 320, for detection module testing result for be when, to encrypt file be decrypted, verified Information.
In smart machine production process, by carrying out being cased by after detection is finished to smart machine indices Shipment, for example, intelligent TV set is exactly one of which.In order to ensure the safety of smart machine, smart machine after production is finished, The root authority of smart machine can be closed, because the certain operations to smart machine need root authority, such as to system Increase, deletion, modification, inquiry of file etc. are operated, so as to production is closed after finishing to root authority so that Bu Nengsui Meaning carries out the operation under above-mentioned root authority to smart machine, to guarantee safety.However, when smart machine goes wrong or has a spy When different demand needs to carry out the operation under root authority to smart machine, the root authority for obtaining smart machine is needed, in this reality In applying example, in order to obtain root authority, smart machine is linked into smart machine this sound firstly the need of having detected whether external equipment, If detecting sometimes, detect and whether have in the external equipment of access encryption file, in encryption file checking information is carried, That is, by correct encryption file, subsequently can normally start root authority, that is to say, that in external equipment is detected When having encryption file, acquisition checking information can be decrypted to it.In the present embodiment, checking information includes the thing of smart machine Reason address (MAC Address) or product ID.
Starting module 330, for when checking information is identical with presupposed information, starting the root authority of smart machine.
After obtaining checking information, need to detect the accuracy of checking information, that is, detect checking information and default letter Whether breath is identical, and presupposed information is correct and can start the information of root authority according to presupposed information, so as to be tested by detection Whether card information is identical with presupposed information, you can detects whether checking information is effective for root authority is started.When checking letter When breath is identical with presupposed information, checking information is illustrated effectively, i.e., the encryption file of corresponding external equipment is effective, you can opened The root authority of dynamic smart machine.In a specific example, smart machine be by interface can external external equipment equipment, example Such as, intelligent TV set, different from mobile terminal, intelligent TV set is provided with interface, external equipment is accessed by interface, by outer Encryption file in portion's equipment carries out root authority acquisition.External equipment can be External memory equipment, and intelligent TV set can be provided with USB (Universal Serial Bus, USB (universal serial bus)) interface, by USB interface outside USB flash disk equipment is can access.
Performing module 340, for the operational control instruction under root authority of the acquisition to smart machine, and weighs according to root Limit and operational control instruction, perform and the operational control corresponding operation of instruction.
Smart machine is obtained after root authority, and smart machine can perform the various operations under root authority, that is to say, that User can carry out the operation under root authority to smart machine, and smart machine can obtain the behaviour under the root authority of smart machine Make control instruction, and instructed according to root authority and operational control, perform and the operational control corresponding operation of instruction, that is, Perform the operation under root authority, for example, the debugging of smart machine, so as to realize the control of smart machine.
The control device of above-mentioned smart machine, when having detected external equipment and accessing, detects that the outside accessed sets Whether have encryption file in standby, if so, the encryption file be decrypted, obtain checking information, when the checking information with When presupposed information is identical, start the root authority of the smart machine, obtain to the behaviour under the root authority of the smart machine Make control instruction, and instructed according to the root authority and the operational control, perform corresponding with operational control instruction Operation.By the encryption file in the external equipment of access, when the checking information in encrypting file is identical with presupposed information, Represent checking information effectively, that is, encrypt file effectively, so as to realizing the acquisition of the root authority of smart machine and performing root power Operation under limit, going wrong in smart machine to use, and can obtain root power by the control device of above-mentioned smart machine Limit, the operation for obtaining the root authority of smart machine and carrying out under root authority is for example debugged, to solve intelligent TV set appearance The non-serviceable problem of problem, it is user-friendly.
Wherein in one embodiment, the control device of above-mentioned smart machine also includes reminding module.
Reminding module, for when checking information and presupposed information are differed, providing the incorrect information of encryption file.
When checking information and presupposed information are differed, represent that checking information is invalid and incorrect, in external equipment Encryption file be invalid incorrect, so as to, it is impossible to effectively start root authority, now, provide encryption file be incorrect and carry Show information, with inform user this encryption file it is incorrect.
Wherein in one embodiment, detection module, also particularly useful for when outside USB flash disk equipment access has been detected, is examined Whether survey in the outside USB flash disk equipment for accessing has encryption file.
In the present embodiment, inserting outside USB flash disk equipment on smart machine by way of to obtain smart machine The authority of root, that is to say, that the encryption file for carrying checking information is prestored in outside USB flash disk equipment, encryption file is Generated according to checking information, checking information includes the physical address (MAC Address) or product ID of smart machine, that is, Say, corresponding encryption file can be generated according to the physical address (MAC Address) of smart machine or product ID, and be unique 's.When needing to obtain root authority, outside USB flash disk equipment is inserted into smart machine, smart machine has detected outside USB flash disk equipment During access, detect in the outside USB flash disk equipment for accessing whether there is encryption file, when there is encryption file in external equipment USB flash disk, carry out Next step is decrypted and checking information detection.
Wherein in one embodiment, the control device of above-mentioned smart machine also includes:
Closedown module, for closing the root authority of smart machine.
Smart machine has been performed after corresponding operating, for example, after smart machine debugging is finished, closes root authority, it is ensured that he People cannot be further continued for carrying out the associative operation of root authority, for example, the associative operation such as deletion system file, it is ensured that smart machine Safety.
Each technical characteristic of above example can be combined arbitrarily, to make description succinct, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, there is no lance in the combination of these technical characteristics Shield, is all considered to be the scope of this specification record.
Above example only expresses the several embodiments of the present invention, and its description is more concrete and detailed, but can not Therefore it is interpreted as the restriction to the scope of the claims of the present invention.It should be pointed out that for the person of ordinary skill of the art, Without departing from the inventive concept of the premise, some deformations and improvement can also be made, these belong to the protection model of the present invention Enclose.Therefore, the protection domain of patent of the present invention should be defined by claims.

Claims (10)

1. a kind of control method of smart machine, it is characterised in that comprise the steps:
When having detected external equipment and accessing, detect in the external equipment for accessing whether there is encryption file;
If so, the encryption file is decrypted, obtains checking information;
When the checking information is identical with presupposed information, start the root authority of the smart machine;
Obtain and the operational control under the root authority of the smart machine is instructed, and according to the root authority and the behaviour Make control instruction, perform and the operational control corresponding operation of instruction.
2. the control method of smart machine according to claim 1, it is characterised in that described when having detected external equipment During access, detect that the step of whether having encryption file in the external equipment for accessing includes:
When outside USB flash disk equipment access has been detected, whether there is encryption file in the described outside USB flash disk equipment that detection is accessed.
3. the control method of smart machine according to claim 1, it is characterised in that the execution and the operational control After instructing corresponding operation, also including step:
Close the root authority of the smart machine.
4. the control method of smart machine according to claim 1, it is characterised in that the checking information includes the intelligence The physical address or product ID of energy equipment.
5. the control method of smart machine according to claim 1, it is characterised in that also including step:
When the checking information and presupposed information are differed, the incorrect information of encryption file is given.
6. a kind of control device of smart machine, it is characterised in that include:
Detection module, for when having detected external equipment and accessing, detecting in the external equipment for accessing whether there is encryption File;
Deciphering module, for the detection module testing result for be when, to it is described encryption file be decrypted, verified Information;
Starting module, for when the checking information is identical with presupposed information, starting the root authority of the smart machine;
Performing module, for the operational control instruction under root authority of the acquisition to the smart machine, and according to the root Authority and the operational control are instructed, and are performed and the operational control corresponding operation of instruction.
7. the control device of smart machine according to claim 6, it is characterised in that the detection module, it is also concrete to use In when outside USB flash disk equipment access has been detected, whether there is encryption file in the described outside USB flash disk equipment that detection is accessed.
8. the control device of smart machine according to claim 6, it is characterised in that also include:
Closedown module, for closing the root authority of the smart machine.
9. the control device of smart machine according to claim 6, it is characterised in that the checking information includes the intelligence The physical address or product ID of energy equipment.
10. the control device of smart machine according to claim 6, it is characterised in that also include
Reminding module, for when the checking information and presupposed information are differed, providing the incorrect information of encryption file.
CN201611047597.0A 2016-11-23 2016-11-23 Control method and apparatus for intelligent device Pending CN106604139A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611047597.0A CN106604139A (en) 2016-11-23 2016-11-23 Control method and apparatus for intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611047597.0A CN106604139A (en) 2016-11-23 2016-11-23 Control method and apparatus for intelligent device

Publications (1)

Publication Number Publication Date
CN106604139A true CN106604139A (en) 2017-04-26

Family

ID=58593024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611047597.0A Pending CN106604139A (en) 2016-11-23 2016-11-23 Control method and apparatus for intelligent device

Country Status (1)

Country Link
CN (1) CN106604139A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358090A (en) * 2017-07-05 2017-11-17 北京珠穆朗玛移动通信有限公司 Control method, mobile terminal and the storage medium of System Privileges
CN107454391A (en) * 2017-09-22 2017-12-08 上海帆声图像科技有限公司 Television set HDCP encryption detection methods based on hardware verification

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188538A1 (en) * 2000-05-22 2002-12-12 Robertson James A. Method and system for implementing a databus in a global ecosystem of interrelated services
CN102333241A (en) * 2011-10-26 2012-01-25 青岛海信宽带多媒体技术有限公司 Universal serial bus (USB) upgrading method for digital television and USB upgrading system for digital television
CN103198265A (en) * 2013-03-28 2013-07-10 上海斐讯数据通信技术有限公司 Method for starting root permission of mobile device
CN104469475A (en) * 2014-11-19 2015-03-25 乐视网信息技术(北京)股份有限公司 Information interactive method, device and system and smart television
CN104573473A (en) * 2014-12-05 2015-04-29 小米科技有限责任公司 Method and authentication device for unlocking administration authority
CN104881283A (en) * 2015-05-20 2015-09-02 深圳市创维电器科技有限公司 Method and system for obtaining root privilege of terminal device based on android
US20160217123A1 (en) * 2015-01-27 2016-07-28 Abbyy Development Llc Methods and systems for decision-tree-based automated symbol recognition
CN105975818A (en) * 2015-11-06 2016-09-28 乐视移动智能信息技术(北京)有限公司 Method and device for obtaining super user permission

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188538A1 (en) * 2000-05-22 2002-12-12 Robertson James A. Method and system for implementing a databus in a global ecosystem of interrelated services
CN102333241A (en) * 2011-10-26 2012-01-25 青岛海信宽带多媒体技术有限公司 Universal serial bus (USB) upgrading method for digital television and USB upgrading system for digital television
CN103198265A (en) * 2013-03-28 2013-07-10 上海斐讯数据通信技术有限公司 Method for starting root permission of mobile device
CN104469475A (en) * 2014-11-19 2015-03-25 乐视网信息技术(北京)股份有限公司 Information interactive method, device and system and smart television
CN104573473A (en) * 2014-12-05 2015-04-29 小米科技有限责任公司 Method and authentication device for unlocking administration authority
US20160217123A1 (en) * 2015-01-27 2016-07-28 Abbyy Development Llc Methods and systems for decision-tree-based automated symbol recognition
CN104881283A (en) * 2015-05-20 2015-09-02 深圳市创维电器科技有限公司 Method and system for obtaining root privilege of terminal device based on android
CN105975818A (en) * 2015-11-06 2016-09-28 乐视移动智能信息技术(北京)有限公司 Method and device for obtaining super user permission

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107358090A (en) * 2017-07-05 2017-11-17 北京珠穆朗玛移动通信有限公司 Control method, mobile terminal and the storage medium of System Privileges
CN107454391A (en) * 2017-09-22 2017-12-08 上海帆声图像科技有限公司 Television set HDCP encryption detection methods based on hardware verification

Similar Documents

Publication Publication Date Title
CN104156642B (en) A kind of security password input system and method based on safe touch screen control chip
CN103810437B (en) A kind of method of hide application program and terminal
CN105871558B (en) A kind of digital control system right management method based on USB flash disk physical serial numbers
WO2019144403A1 (en) Chip access method, security control module, chip and debugging device
CN108351925A (en) Unlock and recovery to encryption device
KR20170085571A (en) Apparatus and method for improving security of terminal
EP2821866A1 (en) Control program management system and method for changing control program
CN109344598A (en) The binding of equipment room and authority control method, device, equipment and storage medium
CN102647712B (en) A kind of mobile phone data encryption method and decryption method
CN103198037A (en) Reliable pipe control method and system for IO (input output) equipment
CN109284585A (en) A kind of script encryption method, script decryption operation method and relevant apparatus
CN107180204A (en) A kind of method, storage device and mobile terminal for preventing information stolen
CN104537282B (en) It is a kind of that method is licensed based on encryption flash memory disk and big data computing
CN105678162A (en) TPM-based operating system secure boot control method
CN105631259A (en) Power-on verification method, power-on verification device and terminal
CN106604139A (en) Control method and apparatus for intelligent device
CN104104650B (en) data file access method and terminal device
CN110245495A (en) BIOS method of calibration, configuration method, equipment and system
CN105740661A (en) Method and device for protecting application program
CN107818272A (en) Hard disk secure starts and hard disk binding method, device and industrial computer
CN110245464A (en) The method and apparatus for protecting file
CN110704814A (en) Anti-copy method and device, and storage medium
EP3193262A1 (en) Database operation method and device
CN104504336A (en) Method and device for preventing embedded system from being maliciously debugged online
CN105095780B (en) The access method and device of test port in a kind of chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170426

RJ01 Rejection of invention patent application after publication