CN107169328A - The method to set up and device of clean boot function - Google Patents

The method to set up and device of clean boot function Download PDF

Info

Publication number
CN107169328A
CN107169328A CN201710339915.9A CN201710339915A CN107169328A CN 107169328 A CN107169328 A CN 107169328A CN 201710339915 A CN201710339915 A CN 201710339915A CN 107169328 A CN107169328 A CN 107169328A
Authority
CN
China
Prior art keywords
password
screen
lock
lock password
clean boot
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710339915.9A
Other languages
Chinese (zh)
Inventor
刘薇
周鹏
张恩迪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201710339915.9A priority Critical patent/CN107169328A/en
Publication of CN107169328A publication Critical patent/CN107169328A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a kind of method to set up of clean boot function and device, belong to field of terminal technology.This method includes:When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password;If currently having set the screen-lock password, the screen-lock password is verified;If the screen-lock password is verified, the setting interface of the clean boot function is shown, and the clean boot function is configured by the setting interface of the clean boot function.Pass through the method to set up of the clean boot function, it is to avoid user is continually configured, the puzzlement caused to user it also avoid the waste of resource when changing screen-lock password to clean boot function.

Description

The method to set up and device of clean boot function
Technical field
The present invention relates to field of terminal technology, the method to set up and device of more particularly to a kind of clean boot function.
Background technology
, it is necessary to which the password inputted to user is verified during clean boot function refers to mobile terminal-opening, test A kind of defencive function that just can normally start after demonstrate,proving successfully.In order to be protected to the personal information stored in mobile terminal formation, use Family can open clean boot function, it is to avoid after mobile terminal is stolen during using mobile terminal, cause the individual to believe The leakage of breath.
In correlation technique, when mobile terminal sets clean boot function, it is necessary to be configured with screen-lock password simultaneously. It is, when detecting password setting instruction, to determine the selected password type of user, the password type includes PIN (Personal Identification Number, personal recognition code) code, character string password or pattern password etc..Afterwards, Mobile terminal shows the setting interface of clean boot function, and the setting interface of the clean boot function, which includes opening and closing, to be selected , mobile terminal confirm user's selection be turned on and off option after, display password sets interface, and by user in the password The password inputted in interface is set to be set to screen-lock password.If user selects to open in the setting interface of clean boot function The screen-lock password, then be set to the password of clean boot function by option, to complete setting for screen-lock password and clean boot function Put process.If user selects the off option in the setting interface of clean boot function, the clean boot work(of storage is removed The password of energy.It should be noted that when user change screen-lock password or change clean boot function setting when, be also according to Above-mentioned flow is performed one time.
However, due to user often set clean boot function after, a very long time will not change the safety and open The setting of dynamic function, and the screen-lock password of the mobile terminal can be because the hobby of user often makes change, so that frequently , it is necessary to frequently set clean boot function when changing screen-lock password, puzzlement is caused to user, and waste the money of mobile terminal Source.
The content of the invention
The problem of in order to solve correlation technique, the embodiments of the invention provide a kind of method to set up of clean boot and dress Put.The technical scheme is as follows:
First aspect includes there is provided a kind of method to set up of clean boot, methods described:
When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password;
If currently having set the screen-lock password, the screen-lock password is verified;
If the screen-lock password is verified, the setting interface of the clean boot function is shown, and by described The setting interface of clean boot function is configured to the clean boot function.
Alternatively, it is described that the screen-lock password is verified, including:
Password authentification interface is shown, and obtains the password that user inputs in the password authentification interface, and obtains use The password type of the password of family input;
If the password obtained is identical with the current screen-lock password set, and the password type obtained is with currently having set Screen-lock password password type it is identical, it is determined that the screen-lock password is verified, otherwise, it determines the screen-lock password verify Do not pass through.
Alternatively, the setting interface by the clean boot function is configured to the clean boot function, Including:
If determining to need to open the clean boot function by the setting interface of the clean boot function, by institute The password type for stating screen-lock password and the screen-lock password is stored into the encrypted partition of operating system;
If determining to need to close the clean boot function by the setting interface of the clean boot function, remove The password and password type stored in the encrypted partition of the operating system.
Alternatively, if described currently set the screen-lock password, before being verified to the screen-lock password, also Including:
When the setting for receiving the screen-lock password is instructed, the setting interface of screen-lock password is shown;
Obtain the password that user inputs in the setting interface of the screen-lock password;
The password of acquisition is set to screen-lock password, and the password type of the screen-lock password and the screen-lock password is deposited Store up to the specified location of internal memory.
Alternatively, methods described also includes:
When the modification for receiving the screen-lock password is instructed, the modification interface of the screen-lock password is shown;
The screen-lock password and password stored by the modification interface of the screen-lock password to the specified location of the internal memory Type is modified;
If currently having turned on the clean boot function, the screen-lock password that will be stored in the encrypted partition of operating system The password type of amended screen-lock password and the amended screen-lock password is replaced with password type.
Second aspect includes there is provided a kind of setting device of clean boot, described device:
Judge module, for when the setting for receiving clean boot function is instructed, whether judgement currently to have set screen locking Password;
Authentication module, if for currently having set the screen-lock password, verified to the screen-lock password;
First display module, if be verified for the screen-lock password, shows setting for the clean boot function Put interface;
First setup module, is carried out for the setting interface by the clean boot function to the clean boot function Set.
Alternatively, the authentication module includes:
Display unit, for showing password authentification interface;
Acquiring unit, for obtaining the password that user inputs in the password authentification interface, and obtains user's input Password password type;
Determining unit, if it is identical with the current screen-lock password set for the password obtained, and the cipher type obtained Type is identical with the password type of the current screen-lock password set, it is determined that the screen-lock password is verified, otherwise, it determines institute Screen-lock password checking is stated not pass through.
Alternatively, first setup module includes:
Memory cell, if opened for determining to need to open the safety by the setting interface of the clean boot function Dynamic function, then store the password type of the screen-lock password and the screen-lock password into the encrypted partition of operating system;
Clearing cell, if opened for determining to need to close the safety by the setting interface of the clean boot function The password and password type stored in dynamic function, the then encrypted partition for removing the operating system.
Alternatively, described device also includes:
Second display module, for when the setting for receiving the screen-lock password is instructed, showing the setting of screen-lock password Interface;
Acquisition module, for obtaining the password that user inputs in the setting interface of the screen-lock password;
Second setup module, for the password of acquisition to be set into screen-lock password;
Memory module, for the password type of the screen-lock password and the screen-lock password to be stored to the specific bit of internal memory Put place.
Alternatively, described device also includes:
3rd display module, for when the modification for receiving the screen-lock password is instructed, showing the screen-lock password Change interface;
Modified module, the lock stored for the modification interface by the screen-lock password to the specified location of the internal memory Screen password and password type are modified;
Replacement module, if for currently having turned on the clean boot function, by the encrypted partition of operating system The screen-lock password and password type of storage replace with the cipher type of amended screen-lock password and the amended screen-lock password Type.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:In embodiments of the present invention, when receiving The setting instruction of clean boot function, and when currently screen-lock password has been set, the screen-lock password can be verified, when the lock Shield password authentification by rear, then show the setting interface of the clean boot function, pass through the setting interface of the clean boot function The clean boot function is configured, be that is to say, individually clean boot function can be configured, rather than lock is being set It is configured during screen password, so that when user frequently changes screen-lock password, also will not be continually to clean boot Function is configured, it is to avoid the puzzlement caused to user, and then avoids the waste of resource.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is a kind of method to set up flow chart of clean boot function provided in an embodiment of the present invention;
Fig. 2 is the method to set up flow chart of another clean boot function provided in an embodiment of the present invention;
Fig. 3 is a kind of password type selection interface schematic diagram provided in an embodiment of the present invention;
Fig. 4 is a kind of password authentification interface schematic diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of setting interface schematic diagram of clean boot function provided in an embodiment of the present invention;
Fig. 6 is a kind of method to set up flow chart of screen-lock password provided in an embodiment of the present invention;
Fig. 7 A are the setting apparatus structure schematic diagrams of the first clean boot function provided in an embodiment of the present invention;
Fig. 7 B are a kind of structural representations of authentication module provided in an embodiment of the present invention;
Fig. 7 C are a kind of structural representations of first setup module provided in an embodiment of the present invention;
Fig. 7 D are the setting apparatus structure schematic diagrams of second of clean boot function provided in an embodiment of the present invention;
Fig. 7 E are the setting apparatus structure schematic diagrams of the third clean boot function provided in an embodiment of the present invention;
Fig. 8 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention Formula is described in further detail.
In order to make it easy to understand, before to the embodiment of the present invention carrying out that explanation is explained in detail, first to the embodiment of the present invention The application scenarios being related to are introduced.
During user uses mobile terminal, the stolen of the mobile terminal may be caused because of personal reason etc., So as to cause the leakage for the personal information being stored in the mobile terminal, therefore, in order to be protected to the personal information, the use Family can be configured to the clean boot function of the mobile terminal, to open clean boot function, certainly, and shifting is used in user During dynamic terminal, due to being required for input to enter in advance to the checking password of clean boot function setting in each start process Row checking, mobile terminal ability normal boot-strap after being verified, in order to save in start process, because of input validation password The time verified and wasted, the user can also be configured to clean boot function, with closed safe startup function.
Certainly, the embodiment of the present invention can be applied not only to protect in mobile terminal personal information and save the available machine time Scene, be also applied in other scenes, other application scene will not enumerate in this embodiment of the present invention.
Introduced the present embodiments relate to application scenarios after, detailed solution is carried out to the embodiment of the present invention below Release explanation.
Fig. 1 is a kind of method to set up flow chart of clean boot function provided in an embodiment of the present invention, and this method is applied to In mobile terminal.Referring to Fig. 1, this method comprises the following steps:
Step 101:When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password.
Step 102:If currently having set the screen-lock password, the screen-lock password is verified.
Step 103:If the screen-lock password is verified, the setting interface of the clean boot function is shown, and is passed through The setting interface of the clean boot function is configured to the clean boot function.
In summary, method provided in an embodiment of the present invention, when mobile terminal receives user to clean boot function When instruction is set, it is determined that the current screen-lock password set, and the screen-lock password is verified, when screen-lock password checking is logical Later, then the clean boot function is configured, be that is to say by the setting interface of the clean boot function, can be independent Clean boot function is configured, rather than is configured during screen-lock password is set, so that in user frequently When changing screen-lock password, also continually clean boot function will not be configured, it is to avoid the puzzlement caused to user, and then keep away Exempt from the waste of resource.
Fig. 2 is a kind of method to set up flow chart of clean boot function provided in an embodiment of the present invention, and this method is applied to In mobile terminal.Referring to Fig. 2, this method comprises the following steps:
Step 201:When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password.
During user uses mobile terminal, often part personal information is stored in the mobile terminal, together When, in order to avoid the leakage of the personal information, clean boot function, and then the individual to being stored in the mobile terminal can be opened Information formation protection.Certainly, user may also will be considered that during mobile terminal-opening, input to clean boot function setting Checking password verified after, could normal boot-strap, cause waste of time, in order to save the available machine time, Ke Yiguan Close clean boot function.
Wherein, when the user is configured to the clean boot function of the mobile terminal, clean boot function can be triggered Setting instruction.Because the setting of clean boot function is built upon on the basis of screen-lock password set, it that is to say, the shifting When dynamic terminal has set screen-lock password, clean boot function can be further set, therefore, when mobile terminal detects safety During the setting instruction of startup function, it can be determined that whether screen-lock password currently has been set.
, can be whole from the movement when judging currently whether to have set screen-lock password in a kind of possible implementation Screen-lock password is searched in the specified location of end memory, if found, it is determined that the mobile terminal has currently set screen-lock password, If do not found, it is determined that the mobile terminal is currently not provided with screen-lock password.Wherein, the specified location in internal memory can be thing The storage region first set for screen-lock password.
Wherein, the setting instruction of clean boot function can be touched by user in system sets interface by predetermined registration operation Hair, it is of course also possible to be triggered by user in column is fast set by predetermined registration operation, the predetermined registration operation can be clicked, double-click Or the operation such as slide, this reality is invented and applies example this is not limited.
When determining currently to have set screen-lock password by step 201, in order to determine whether active user is that the movement is whole The owner at end, and then determine whether active user has the authority for setting the clean boot function, now, mobile terminal can be with 202- steps 203, are verified to the screen-lock password as steps described below.
Step 202:If current set screen-lock password, display password authentification interface, and obtains user in the password The password inputted in checking interface, and obtain the password type of the password of user's input.
When mobile terminal determines currently to have set screen-lock password, in order to be verified to the screen-lock password, the movement is whole End can show password authentification interface, and the password that acquisition user inputs from the password authentification interface, and acquisition user are defeated The password type of the password entered, the password authentification interface is used to verify for the screen-lock password of the mobile terminal.
It should be noted that in screen-lock password setting process, mobile terminal can provide a variety of password types, for user Independently select a kind of password type that screen-lock password is set from a variety of password types, certainly, the mobile terminal can also be carried For a kind of password type, screen-lock password is set for user, be that is to say, mobile terminal acquiescence provides a kind of password type of fixation, Can not independently it be selected for user.
Wherein, when mobile terminal provides a variety of password types, the mobile terminal needs to obtain from the specified location of internal memory The password type of the screen-lock password stored is taken, and according to the password type of acquisition, shows corresponding password authentification interface.When So, in this case, in order to further verify active user whether be the mobile terminal the owner, now, the shifting Dynamic terminal can also show password type selection interface, obtain cipher type of the user selected in the password type selection interface Type, and show the corresponding password authentification interface of password type of selection.
However, when mobile terminal gives tacit consent to the password type for providing a kind of fixation, the mobile terminal can directly display silent Recognize the fixed password checking interface of setting, certainly, the mobile terminal can also obtain what is stored from the specified location of internal memory The fixed password type of screen-lock password, and according to the password type of acquisition, show corresponding password authentification interface.It that is to say, it is right A kind of password type of fixation is provided in mobile terminal acquiescence, and also stores while screen-lock password is stored the password of the fixation Type such case, follow-up implementation process can be identical with the implementation process that mobile terminal provides a variety of password types, connects down To provide a kind of password type such case of fixation for mobile terminal acquiescence, only with mobile terminal internal memory specified location Illustrated exemplified by storage screen-lock password.
Wherein, when user inputs password in password authentification interface, password can be inputted by way of button, can also Password is inputted by way of touching, the embodiment of the present invention is not limited this.
Wherein, password type can include PIN code, character string password and pattern password etc., and the character string password is by many Position character composition, can be 4 or 6 etc..Such as, password type selection interface as shown in Figure 3, when user is from the password The password type that screen-lock password is selected in type selection interface is character string password, and the character string password is by 4 character groups Cheng Shi, mobile terminal can show password authentification interface as shown in Figure 4, and user can be tested in the password by way of touching Demonstrate,prove in interface, by way of touching, continuously input character, when the character continuously inputted reaches 4, this is continuously inputted 4 characters are defined as the password of user's input.
Further, when mobile terminal determines currently to be not provided with the screen-lock password, the clean boot can be directly displayed The setting interface of function, now, the setting interface ashing display of the clean boot function.It that is to say, the setting interface can not User is allowed to carry out any operation, it is of course also possible to allow user arbitrarily to change any parameter in the setting interface, But the parameter of modification can not come into force.
Step 203:If the password obtained is identical with the current screen-lock password set, and the password type obtained is with working as The password type of the preceding screen-lock password set is identical, it is determined that screen-lock password is verified.
The password inputted in the password authentification interface when acquisition for mobile terminal to user and the password of user's input it is close During code type, the screen-lock password of storage and the password type of screen-lock password are obtained from the specified location of internal memory, if what is obtained is close Code is identical with the screen-lock password, and the password type obtained is identical with the password type of the current screen-lock password set, then really Lock screen password authentification passes through, if the password type obtained and the password type of the current screen-lock password set, or obtain When the password taken is differed with the screen-lock password, it is determined that screen-lock password checking does not pass through.
However, when mobile terminal gives tacit consent to the password type for providing a kind of fixation, can be obtained from the specified location of internal memory The screen-lock password of storage is taken, if the password obtained is identical with the screen-lock password, it is determined that screen-lock password is verified, if obtained The password taken is different with the screen-lock password, it is determined that screen-lock password checking does not pass through.
Wherein, if it is determined that screen-lock password is verified, mobile terminal can then determine that the user is the mobile terminal The owner, and then the setting interface of 204 display clean boot functions as follows, if it is determined that screen-lock password checking is obstructed Cross, mobile terminal can be with display reminding information, and the prompt message is used to point out the checking of user's screen-lock password not pass through.
Step 204:Show the setting interface of the clean boot function, and the setting interface pair for passing through the clean boot function The clean boot function is configured.
When mobile terminal determine user input password authentification by when, setting circle of the clean boot function can be shown Face.Wherein, it is to be in that the settings button under settings button, original state can be included in the setting interface of the clean boot function Closed mode, in this case, when user clicks on the settings button, it is possible to achieve the unlatching to clean boot function, this When, the settings button is in opening, and in this case, user clicks on the settings button, it is possible to achieve the safety is opened The closing of dynamic function.Such as, the setting interface of the clean boot function can be as shown in Figure 5.
Wherein, if mobile terminal determines to open the clean boot function by the setting interface of the clean boot function, In the case where mobile terminal provides a variety of password types, the password type of the screen-lock password and the screen-lock password can be carried out Encryption, and encrypted result is stored into the encrypted partition of operating system.Give tacit consent in mobile terminal and a kind of fixation is provided In the case of password type, then the screen-lock password can be encrypted, and encrypted result is stored to operating system In encrypted partition.By this method, it is ensured that screen-lock password, or screen-lock password and the screen-lock password password type Security.
In addition, if mobile terminal determines to close the clean boot function by the setting interface of the clean boot function, The information stored in the encrypted partition for then removing the operating system.
Wherein, the operating system is the operating system that is currently installed on of the mobile terminal, and the operating system can be Android (Android) operating systems or IOS, the embodiment of the present invention are not limited this.
After by above-mentioned steps 201-204 to clean boot function setting, if having turned on the clean boot function, Then during subsequently starting shooting or restarting, the checking interface of clean boot function can be shown, so as to pass through operating system Encrypted partition in the information that stores verified, with determine active user whether be the mobile terminal the owner, and then really It is fixed whether to need normal startup.If being turned off the clean boot function, during subsequently starting shooting or restarting, without The checking interface of clean boot function is shown, and then is avoided because needing input validation password to be verified, and the time wasted.
In summary, method provided in an embodiment of the present invention, when mobile terminal receives user to clean boot function When instruction is set, it is determined that the current screen-lock password set, and the screen-lock password is verified, when screen-lock password checking is logical Later, then the clean boot function is configured and be that is to say by the setting interface of the clean boot function, can be individually right Clean boot function is configured, rather than is configured during screen-lock password is set, so as to frequently become in user During more screen-lock password, also continually clean boot function will not be configured, it is to avoid the puzzlement caused to user, and then avoid The waste of resource.
Because clean boot function is configured on the basis of screen-lock password has been set, therefore, for the ease of can Successfully clean boot function is configured, the screen-lock password of the mobile terminal can be set in advance, it is next close to screen locking The setting of code carries out detailed explanation.
Fig. 6 is a kind of method to set up flow chart of screen-lock password provided in an embodiment of the present invention, and this method is applied to movement In terminal.Referring to Fig. 6, this method comprises the following steps:
Step 601:When the setting for receiving screen-lock password is instructed, the setting interface of screen-lock password is shown.
During user uses mobile terminal, in order to avoid other users obtain directly making after the mobile terminal The mobile terminal is used, so that the embarrassment brought to the user by content that the mobile terminal is currently shown.Therefore, the user can be with The setting of screen-lock password is carried out to the mobile terminal, so that in the case where other users use the mobile terminal, it is necessary to advanced The checking of row screen-lock password.Because other users do not know screen-lock password, it is impossible to the mobile terminal is used by checking, so as to keep away The embarrassment that exempt from customs examination user brings.
Wherein, when the user is configured to the screen-lock password of the mobile terminal, the lock can be triggered by predetermined registration operation Shield the setting instruction of password, when mobile terminal receives the setting instruction of the screen-lock password, setting for screen-lock password can be shown Put interface.
It should be noted that such as the description of above-mentioned embodiment, mobile terminal can provide a variety of password types, for user from Independently select a kind of password type that screen-lock password is set in a variety of password types, can also give tacit consent to and a kind of the close of fixation is provided Code type.
When mobile terminal provides a variety of password types, the mobile terminal can show password type selection interface, and obtain Password type of the family selected in the password type selection interface is taken, and then shows the corresponding screen locking of password type of selection Password sets interface, however, when mobile terminal gives tacit consent to the password type for providing a kind of fixation, the mobile terminal can be according to upper State the screen-lock password setting interface that description directly displays default setting.
Step 602:Obtain the password that user inputs in the setting interface of screen-lock password.
Wherein, in the screen-lock password sets interface, user can input password by way of button, can also pass through The mode of touching inputs password, and the embodiment of the present invention is not limited this.
It should be noted that in screen-lock password setting process, mobile terminal can be with double acquisition user input Password, and the password of double input be able to can also differ with identical.When mobile terminal determines the close of double acquisition Identical password simultaneously, is defined as the password that acquisition for mobile terminal is arrived by code-phase, when mobile terminal determines double input When password is differed, then point out the double input password of user to differ, password can be re-entered.Wherein, when user selects When the password type selected is character string password or PIN code etc., the password of double input sets interface can be with screen-lock password Shown with additional character, the additional character can be " * ", "@" or " # " etc., and the embodiment of the present invention is not especially limited to this.
Certainly, mobile terminal can also only obtain the password once inputted in screen-lock password setting interface, in the screen locking Password sets the password that inputs in interface to be shown in the form of plaintext, to confirm that it is defeated that the password of acquisition for mobile terminal is that user wants The password entered.
Such as, when mobile terminal is double obtains the password inputted in screen-lock password setting interface, if selection Screen-lock password type be character string password, and the character string is made up of 4 characters, and user can be set in the screen-lock password In interface, by way of touching, character is continuously inputted, when the character that mobile terminal is obtained for the first time reaches 4, this is connected 4 characters of continuous input are defined as the password that mobile terminal is obtained for the first time, so that " * * * * " symbols are shown, it is assumed that this continuous 4 Position character is " 5621 ", and when the character of second of acquisition of mobile terminal reaches 4,4 characters that this is continuously inputted are determined The password obtained for the second time for mobile terminal, so that " * * * * " symbols are shown, it is assumed that continuous 4 characters are " 5621 ", then really Determining mobile terminal, the password of acquisition is identical with the password that second obtains for the first time, and then identical password " 5621 " is defined as The password of acquisition for mobile terminal.
Step 603:The password of acquisition is set to screen-lock password, and the password type of screen-lock password and screen-lock password is deposited Store up to the specified location of internal memory.
, now can be by the cipher type of the screen-lock password He the screen-lock password when mobile terminal provides a variety of password types Type is stored to the specified location of the internal memory simultaneously.When mobile terminal gives tacit consent to the password type for providing a kind of fixation, now may be used , can also be by the fixed type of the screen-lock password He the screen-lock password so that the screen-lock password is stored to the specified location of internal memory Store to the specified location of internal memory.It that is to say, a kind of password type of fixation is provided for mobile terminal acquiescence, and in storage Also password type such case of the fixation is stored while screen-lock password, follow-up implementation process can be provided with mobile terminal The implementation process of a variety of password types is identical, and a kind of this feelings of the password type of fixation are provided next for mobile terminal acquiescence Condition, is only illustrated by mobile terminal exemplified by the specified location storage screen-lock password of internal memory.
Wherein, when the type of screen-lock password is pattern password, now the screen-lock password of setting can be referred to as pattern lock, The corresponding pattern lock of pattern password can also be converted to character string, so by pattern password it is corresponding with the character string store to The specified location of internal memory.Wherein, pattern lock being converted into character string can be turned according to the conversion method in correlation technique Change, the embodiment of the present invention is not set forth in detail herein.
Further, after mobile terminal is provided with to screen-lock password, in use, the mobile terminal can be with Because the hobby of user is modified to the screen-lock password currently set, wherein, screen locking of the mobile terminal to currently having set Password, which is modified, to be realized by step (1)-(3).
(1) when the modification for receiving screen-lock password is instructed, the modification interface of the screen-lock password is shown.
User, may be because of personal like or other reasons, to what is currently set during using mobile terminal Screen-lock password is modified, when the user carries out screen-lock password modification to the mobile terminal, can be triggered and locked by predetermined registration operation Shield the modification instruction of password, when mobile terminal receives the modification instruction of the screen-lock password, show modification circle of screen-lock password Face.
Screen-lock password modification interface display process can with the screen-lock password of foregoing description set interface display Process is same or similar, and this is not set forth in detail the embodiment of the present invention.
(2) screen-lock password and cipher type stored by the modification interface of the screen-lock password to the specified location of the internal memory Type is modified.
, can be first to current in the screen-lock password modification interface of display when mobile terminal provides a variety of password types The screen-lock password and the password type of the screen-lock password set is verified, if the current screen-lock password set and the lock The password type of screen password is verified, then points out user to input amended screen-lock password corresponding with amended screen-lock password Password type, and screen-lock password and screen-lock password type that the specified location of the internal memory is stored replace with amended lock Shield password and the corresponding password type of amended screen-lock password.Wherein, the setting up procedure of amended screen-lock password can be with The setting up procedure of foregoing description screen-lock password is same or similar, and the embodiment of the present invention is not specifically described.
, can in the screen-lock password modification interface of display when mobile terminal gives tacit consent to the password type for providing a kind of fixation First to verify the screen-lock password currently set, if the current screen-lock password set is verified, point out to use Family inputs amended screen-lock password, and it is close that the screen-lock password that the specified location of the internal memory is stored replaces with amended screen locking Code.
(3) if currently having turned on clean boot function, the screen-lock password that will be stored in the encrypted partition of operating system The password type of amended screen-lock password and amended screen-lock password is replaced with password type.
When mobile terminal provides a variety of password types, modified in the password type to screen-lock password and screen-lock password Afterwards, it can be determined that currently whether have turned on clean boot function, if having turned on clean boot function, by amended lock Screen password and the password type of screen-lock password are encrypted, and to screen locking currently stored in the encrypted partition of operating system Password and the password type of screen-lock password replace with the encrypted result of the password type of amended screen-lock password and screen-lock password.
, can be with after being modified to screen-lock password when mobile terminal gives tacit consent to the password type for providing a kind of fixation Whether judgement currently has turned on clean boot function, if having turned on clean boot function, is described above, when the finger of the internal memory When storage screen-lock password is put in positioning, then amended screen-lock password is encrypted, and to the encrypted partition of operating system In currently stored screen-lock password replace with the encrypted result of amended screen-lock password.
In summary, method provided in an embodiment of the present invention, when mobile terminal receives setting of the user to screen-lock password During instruction, display screen-lock password sets interface, and the screen-lock password obtained based on the setting interface is corresponding with the screen-lock password Password type is stored to the specified location of internal memory, that is to say, individually screen-lock password can be configured, it is not necessary to while right Clean boot function is configured, so as to avoid the puzzlement caused to user, and then avoids the waste of resource.In addition, in modification After screen-lock password, in the case where having turned on clean boot function, the screen-lock password stored in encrypted partition can also be entered Row modification, in order to subsequently can successfully carry out the checking of clean boot function.
Fig. 7 A are a kind of setting schematic devices of clean boot function provided in an embodiment of the present invention, referring to Fig. 7 A, should Device includes:
Judge module 701, for when the setting for receiving clean boot function is instructed, whether judgement currently to have set lock Shield password;
Authentication module 702, if for currently having set the screen-lock password, verified to the screen-lock password;
First display module 703, if be verified for the screen-lock password, shows the setting of the clean boot function Interface;
First setup module 704, is carried out for the setting interface by the clean boot function to the clean boot function Set.
Alternatively, as shown in Figure 7 B, the authentication module 702 includes:
Display unit 7021, for showing password authentification interface;
Acquiring unit 7022, for obtaining the password that user inputs in the password authentification interface, and to obtain user defeated The password type of the password entered;
Determining unit 7023, if it is identical with the current screen-lock password set for the password obtained, and acquisition would be close Code type is identical with the password type of the current screen-lock password set, it is determined that the screen-lock password is verified, otherwise, it determines Screen-lock password checking does not pass through.
Alternatively, as seen in figure 7 c, first setup module 704 includes:
Memory cell 7041, if determining to need to open the clean boot for the setting interface by clean boot function Function, then store the password type of the screen-lock password and screen-lock password into the encrypted partition of operating system;
Clearing cell 7042, if determining to need the closing safety to open for the setting interface by the clean boot function Dynamic function, the then password and password type stored in the encrypted partition of clear operation system.
Alternatively, as illustrated in fig. 7d, the device also includes:
Second display module 705, for when the setting for receiving the screen-lock password is instructed, showing the setting of screen-lock password Interface;
Acquisition module 706, for obtaining the password that user inputs in the setting interface of screen-lock password;
Second setup module 707, for the password of acquisition to be set into screen-lock password;
Memory module 708, for the password type of the screen-lock password and screen-lock password to be stored to the specified location of internal memory Place.
Alternatively, as seen in figure 7e, the device also includes:
3rd display module 709, for when the modification for receiving screen-lock password is instructed, showing modification circle of screen-lock password Face;
Modified module 710, the screen locking stored for the modification interface by screen-lock password to the specified location of internal memory is close Code and password type are modified;
Replacement module 711, if for currently having turned on the clean boot function, by the encrypted partition of operating system The screen-lock password and password type of storage replace with the password type of amended screen-lock password and amended screen-lock password.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:In embodiments of the present invention, when receiving The setting instruction of clean boot function, and when currently screen-lock password has been set, the screen-lock password is verified, when the screen locking is close After code is verified, then the setting interface of the clean boot function is shown, by the setting interface of the clean boot function to this Clean boot function is configured, and that is to say, individually clean boot function can be configured, rather than is setting screen locking close It is configured during code, so that when user frequently changes screen-lock password, also will not be continually to clean boot function It is configured, it is to avoid the puzzlement caused to user, and then avoids the waste of resource.
It should be noted that:The setting device for the clean boot function that above-described embodiment is provided is setting clean boot function When, only with the division progress of above-mentioned each functional module for example, in practical application, as needed can divide above-mentioned functions With by different functional module completions, i.e., the internal structure of device is divided into different functional modules, to complete above description All or part of function.In addition, the setting device for the clean boot function that above-described embodiment is provided and clean boot function Method to set up embodiment belong to same design, it implements process and refers to embodiment of the method, repeats no more here.
Fig. 8 is a kind of mobile terminal structure schematic diagram provided in an embodiment of the present invention.Referring to Fig. 8, mobile terminal 800 can be with Including communication unit 810, include memory 820, the input block of one or more computer-readable recording mediums 830th, display unit 840, sensor 850, voicefrequency circuit 860, WIFI (Wireless Fidelity, Wireless Fidelity) module 870th, the part such as one or the processor 880 and power supply 890 of more than one processing core is included.People in the art Member is appreciated that the mobile terminal structure shown in Fig. 8 does not constitute the restriction to mobile terminal, can include more more than illustrating Or less part, either combine some parts or different parts arrangement.Wherein:
Communication unit 810 can be used for receive and send messages or communication process in, the reception and transmission of signal, the communication unit 810 Can for RF (Radio Frequency, radio frequency) circuit, router, modem, etc. network communication equipment.Especially, when When communication unit 810 is RF circuits, after the downlink information of base station is received, transfer at one or more than one processor 880 Reason;In addition, being sent to base station by up data are related to.Usually as communication unit RF circuits include but is not limited to antenna, At least one amplifier, tuner, one or more oscillators, subscriber identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplexer etc..In addition, communication unit 810 can also be by wireless Communication communicates with network and other equipment.The radio communication can use any communication standard or agreement, include but is not limited to GSM, GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA, LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc..Memory 820 can be used for storage software program and mould Block, processor 880 is stored in the software program and module of memory 820 by operation, thus perform various function application with And data processing.Memory 820 can mainly include storing program area and storage data field, wherein, storing program area can store behaviour Make application program (such as sound-playing function, image player function etc.) needed for system, at least one function etc.;Data storage Area can be stored uses created data (such as voice data, phone directory etc.) etc. according to mobile terminal 800.In addition, storage Device 820 can include high-speed random access memory, can also include nonvolatile memory, for example, at least one disk storage Device, flush memory device or other volatile solid-state parts.Correspondingly, memory 820 can also include memory control Device, to provide the access of processor 880 and input block 830 to memory 820.
Input block 830 can be used for the numeral or character information for receiving input, and generation to be set with user and function The relevant keyboard of control, mouse, action bars, optics or the input of trace ball signal.Preferably, input block 830 may include to touch Sensitive surfaces 831 and other input equipments 832.Touch sensitive surface 831, also referred to as touch display screen or Trackpad, collect and use (such as user is using any suitable objects such as finger, stylus or annex in touch-sensitive table for touch operation of the family on or near it Operation on face 831 or near touch sensitive surface 831), and corresponding attachment means are driven according to formula set in advance.It is optional , touch sensitive surface 831 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used The touch orientation at family, and the signal that touch operation is brought is detected, transmit a signal to touch controller;Touch controller is from touch Touch information is received in detection means, and is converted into contact coordinate, then gives processor 880, and can reception processing device 880 The order sent simultaneously is performed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves Realize touch sensitive surface 831.Except touch sensitive surface 831, input block 830 can also include other input equipments 832.Preferably, Other input equipments 832 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), One or more in trace ball, mouse, action bars etc..
Display unit 840 can be used for the information that is inputted by user of display or the information for being supplied to user and terminal 800 Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination. Display unit 840 may include display panel 841, optionally, can use LCD (Liquid Crystal Display, liquid crystal Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel 841.Further, touch sensitive surface 831 can cover display panel 841, when touch sensitive surface 831 detects touching on or near it Touch after operation, send processor 880 to determine the type of touch event, with type of the preprocessor 880 according to touch event Corresponding visual output is provided on display panel 841.Although in fig. 8, touch sensitive surface 831 and display panel 841 are conducts Two independent parts are inputted and input function to realize, but in some embodiments it is possible to by touch sensitive surface 831 with showing Panel 841 is integrated and realizes input and output function.
Mobile terminal 800 may also include at least one sensor 850, such as optical sensor, motion sensor and other Sensor.Optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 841, proximity transducer can close display when mobile terminal 800 is moved in one's ear Panel 841 and/or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally Three axles) acceleration size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (ratio Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely The other sensors such as the gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor that can also configure in mobile terminal 800, It will not be repeated here.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the COBBAIF between user and mobile terminal 800. Electric signal after the voice data received conversion can be transferred to loudspeaker 861, is changed by loudspeaker 861 by voicefrequency circuit 860 Exported for voice signal;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is connect by voicefrequency circuit 860 Voice data is converted to after receipts, then after voice data output processor 880 is handled, through communication unit 810 to be sent to such as Another terminal, or voice data is exported to memory 820 so as to further processing.Voicefrequency circuit 860 is also possible that ear Tip jack, to provide the communication of peripheral hardware earphone and terminal 800.
In order to realize radio communication, wireless communication unit 870 can be configured with the terminal, the wireless communication unit 870 It can be WIFI module.WIFI belongs to short range wireless transmission technology, and mobile terminal 800 can be with by wireless communication unit 870 Help user to send and receive e-mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet Access.Although showing wireless communication unit 870 in Fig. 8, but it is understood that, it is simultaneously not belonging to mobile terminal 800 It must be configured into, can be omitted as needed in the essential scope for do not change invention completely.
Processor 880 is the control centre of mobile terminal 800, utilizes each of various interfaces and connection whole mobile phone Part, by operation or performs and is stored in software program and/or module in memory 820, and calls and be stored in memory Data in 820, perform the various functions and processing data of mobile terminal 800, so as to carry out integral monitoring to mobile phone.It is optional , processor 880 may include one or more processing cores;It is preferred that, processor 880 can integrated application processor and modulatedemodulate Processor is adjusted, wherein, application processor mainly handles operating system, user interface and application program etc., modem processor Main processing radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile terminal 800 also includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can lead to Cross power-supply management system and processor 880 be logically contiguous, thus by power-supply management system realize management charging, electric discharge and The functions such as power managed.Power supply 860 can also include one or more direct current or AC power, recharging system, electricity The random component such as source failure detector circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, mobile terminal 800 can also include camera, bluetooth module etc., will not be repeated here.
In the present embodiment, mobile terminal also includes one or more than one program, this or one with Upper program storage is configured to by one or more than one computing device in memory, one or one Procedure above is included for carrying out setting for the clean boot function described in above-mentioned Fig. 1, Fig. 2 and Fig. 6 provided in an embodiment of the present invention Put the instruction of method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include the memory of instruction, above-mentioned instruction can complete the above method by the computing device of mobile terminal.For example, described non- Provisional computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light number According to storage device etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device is performed so that mobile terminal is able to carry out the step of the method to set up of the clean boot function described in above-mentioned Fig. 1, Fig. 2 and Fig. 6 Suddenly.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware To complete, the hardware of correlation can also be instructed to complete by program, described program can be stored in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and Within principle, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.

Claims (10)

1. a kind of method to set up of clean boot function, it is characterised in that methods described includes:
When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password;
If currently having set the screen-lock password, the screen-lock password is verified;
If the screen-lock password is verified, the setting interface of the clean boot function is shown, and passes through the safety The setting interface of startup function is configured to the clean boot function.
2. the method as described in claim 1, it is characterised in that described to be verified to the screen-lock password, including:
Show password authentification interface, and obtain the password that user inputs in the password authentification interface, and to obtain user defeated The password type of the password entered;
If the password obtained is identical with the current screen-lock password set, and the password type obtained and the current lock set The password type for shielding password is identical, it is determined that the screen-lock password is verified, otherwise, it determines screen-lock password checking is obstructed Cross.
3. method as claimed in claim 1 or 2, it is characterised in that the setting interface by the clean boot function The clean boot function is configured, including:
If determining to need to open the clean boot function by the setting interface of the clean boot function, by the lock Screen password and the password type of the screen-lock password are stored into the encrypted partition of operating system;
If determining to need to close the clean boot function by the setting interface of the clean boot function, remove described The password and password type stored in the encrypted partition of operating system.
4. the method as described in claim 1-3 is any, it is characterised in that if described currently set the screen-lock password, Before then being verified to the screen-lock password, in addition to:
When the setting for receiving the screen-lock password is instructed, the setting interface of screen-lock password is shown;
Obtain the password that user inputs in the setting interface of the screen-lock password;
The password of acquisition is set to screen-lock password, and by the password type of the screen-lock password and the screen-lock password store to The specified location of internal memory.
5. the method as described in claim 1, it is characterised in that methods described also includes:
When the modification for receiving the screen-lock password is instructed, the modification interface of the screen-lock password is shown;
The screen-lock password and password type stored by the modification interface of the screen-lock password to the specified location of the internal memory Modify;
If currently having turned on the clean boot function, by the screen-lock password stored in the encrypted partition of operating system and close Code type replaces with the password type of amended screen-lock password and the amended screen-lock password.
6. a kind of setting device of clean boot function, it is characterised in that described device includes:
Judge module, for when the setting for receiving clean boot function is instructed, whether judgement currently to have set screen-lock password;
Authentication module, if for currently having set the screen-lock password, verified to the screen-lock password;
First display module, if be verified for the screen-lock password, shows setting circle of the clean boot function Face;
First setup module, sets for the setting interface by the clean boot function to the clean boot function Put.
7. device as claimed in claim 6, it is characterised in that the authentication module includes:
Display unit, for showing password authentification interface;
Acquiring unit, for obtaining the password that user inputs in the password authentification interface, and obtains the close of user's input The password type of code;
Determining unit, if it is identical with the current screen-lock password set for the password obtained, and the password type that obtains and The password type of the current screen-lock password set is identical, it is determined that the screen-lock password is verified, otherwise, it determines the lock Screen password authentification does not pass through.
8. device as claimed in claims 6 or 7, it is characterised in that first setup module includes:
Memory cell, if determining to need to open the clean boot work(for the setting interface by the clean boot function Can, then the password type of the screen-lock password and the screen-lock password is stored into the encrypted partition of operating system;
Clearing cell, if determining to need to close the clean boot work(for the setting interface by the clean boot function Can, then the password and password type stored in the encrypted partition for removing the operating system.
9. the device as described in claim 6-8 is any, it is characterised in that described device also includes:
Second display module, for when the setting for receiving the screen-lock password is instructed, showing the setting interface of screen-lock password;
Acquisition module, for obtaining the password that user inputs in the setting interface of the screen-lock password;
Second setup module, for the password of acquisition to be set into screen-lock password;
Memory module, for the password type of the screen-lock password and the screen-lock password to be stored to the specified location of internal memory Place.
10. device as claimed in claim 6, it is characterised in that described device also includes:
3rd display module, for when the modification for receiving the screen-lock password is instructed, showing the modification of the screen-lock password Interface;
Modified module, the screen locking stored for the modification interface by the screen-lock password to the specified location of the internal memory is close Code and password type are modified;
Replacement module, if for currently having turned on the clean boot function, will be stored in the encrypted partition of operating system Screen-lock password and password type replace with the password type of amended screen-lock password and the amended screen-lock password.
CN201710339915.9A 2017-05-15 2017-05-15 The method to set up and device of clean boot function Pending CN107169328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710339915.9A CN107169328A (en) 2017-05-15 2017-05-15 The method to set up and device of clean boot function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710339915.9A CN107169328A (en) 2017-05-15 2017-05-15 The method to set up and device of clean boot function

Publications (1)

Publication Number Publication Date
CN107169328A true CN107169328A (en) 2017-09-15

Family

ID=59816313

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710339915.9A Pending CN107169328A (en) 2017-05-15 2017-05-15 The method to set up and device of clean boot function

Country Status (1)

Country Link
CN (1) CN107169328A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581617A (en) * 2020-05-18 2020-08-25 北京字节跳动网络技术有限公司 Software access method, device, equipment and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101901320A (en) * 2010-07-29 2010-12-01 广东欧珀电子工业有限公司 Data leakage prevention method for electronic book reader
CN101996289A (en) * 2009-08-24 2011-03-30 鸿富锦精密工业(深圳)有限公司 Computer with password boot-up function and boot-up method thereof
CN102054146A (en) * 2009-11-06 2011-05-11 深圳市研祥通讯终端技术有限公司 Power on password protection method and device
CN102664986A (en) * 2012-03-21 2012-09-12 华为终端有限公司 Cell phone, method for powering on the cell phone and placement of power bottom thereof
CN102984349A (en) * 2012-10-31 2013-03-20 北京小米科技有限责任公司 Method and device for screen locking code generating and screen unlocking method and screen unlocking device and mobile terminal
CN103164644A (en) * 2011-12-19 2013-06-19 联想(北京)有限公司 Terminal device and starting machine controlling method thereof
CN103186748A (en) * 2011-12-29 2013-07-03 鸿富锦精密工业(深圳)有限公司 Electronic device and password protection method thereof
CN103729592A (en) * 2013-12-26 2014-04-16 京东方科技集团股份有限公司 Electronic device and starting method of function interface of electronic device
CN104182667A (en) * 2014-08-26 2014-12-03 广东欧珀移动通信有限公司 Screen lock based data protection method and device
CN105975283A (en) * 2016-05-27 2016-09-28 北京小米移动软件有限公司 Starting method and device for operating system
CN106203124A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 Operational approach and operation device, terminal are installed
CN106326718A (en) * 2016-08-22 2017-01-11 珠海市魅族科技有限公司 Unlocking method, unlocking device and terminal equipment
CN106485105A (en) * 2015-09-02 2017-03-08 成都鼎桥通信技术有限公司 A kind of method for security protection of terminal system and equipment

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101996289A (en) * 2009-08-24 2011-03-30 鸿富锦精密工业(深圳)有限公司 Computer with password boot-up function and boot-up method thereof
CN102054146A (en) * 2009-11-06 2011-05-11 深圳市研祥通讯终端技术有限公司 Power on password protection method and device
CN101901320A (en) * 2010-07-29 2010-12-01 广东欧珀电子工业有限公司 Data leakage prevention method for electronic book reader
CN103164644A (en) * 2011-12-19 2013-06-19 联想(北京)有限公司 Terminal device and starting machine controlling method thereof
CN103186748A (en) * 2011-12-29 2013-07-03 鸿富锦精密工业(深圳)有限公司 Electronic device and password protection method thereof
CN102664986A (en) * 2012-03-21 2012-09-12 华为终端有限公司 Cell phone, method for powering on the cell phone and placement of power bottom thereof
CN102984349A (en) * 2012-10-31 2013-03-20 北京小米科技有限责任公司 Method and device for screen locking code generating and screen unlocking method and screen unlocking device and mobile terminal
CN103729592A (en) * 2013-12-26 2014-04-16 京东方科技集团股份有限公司 Electronic device and starting method of function interface of electronic device
CN104182667A (en) * 2014-08-26 2014-12-03 广东欧珀移动通信有限公司 Screen lock based data protection method and device
CN106485105A (en) * 2015-09-02 2017-03-08 成都鼎桥通信技术有限公司 A kind of method for security protection of terminal system and equipment
CN105975283A (en) * 2016-05-27 2016-09-28 北京小米移动软件有限公司 Starting method and device for operating system
CN106203124A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 Operational approach and operation device, terminal are installed
CN106326718A (en) * 2016-08-22 2017-01-11 珠海市魅族科技有限公司 Unlocking method, unlocking device and terminal equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
TEX_NORSEMAN: ""Secure startup,can it be disabled"", 《FORUMS.ANDROIDCENTRAL.COM/LG-V20/741838-SECURE-STARTUP-CAN-DISABLED.HTML》 *
百度经验: ""苹果手机如何关闭开机密码"", 《HTTPS://JINGYAN.BAIDU.COM/ARTICLE/FEA4511A05E557F7BA91256D.HTML》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581617A (en) * 2020-05-18 2020-08-25 北京字节跳动网络技术有限公司 Software access method, device, equipment and storage medium
CN111581617B (en) * 2020-05-18 2023-04-28 北京字节跳动网络技术有限公司 Software access method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104767863B (en) The unlocking method and terminal of terminal screen
CN104966005B (en) A kind of access control method, and terminal device
CN103473494B (en) A kind of run the method for application, device and terminal unit
CN103634294B (en) Information verifying method and device
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN106778175B (en) Interface locking method and device and terminal equipment
CN106709347B (en) Using the method and device of operation
CN105912905A (en) Fingerprint unlocking method and terminal
CN108881103B (en) Network access method and device
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN107133498A (en) A kind of privacy application management method and device and mobile terminal
CN107395880A (en) Method for information display, device and terminal
CN105389259B (en) A kind of method, apparatus and system for carrying out Application testing
CN104639354B (en) Router administration method and apparatus
CN104573437B (en) Information authentication method, device and terminal
CN107145794A (en) A kind of data processing method and device and mobile terminal
CN107590397A (en) A kind of method and apparatus for showing embedded webpage
CN106980439A (en) The method and device of hiden application icon
CN108804915A (en) Virus method for cleaning, storage device and electric terminal
CN105205371A (en) Locking method and locking device of mobile terminal
CN105246075A (en) Access point connecting method and device
CN110062929A (en) A kind of method, apparatus and terminal showing data
CN106940770A (en) A kind of screen locking method, device and terminal
CN104348944A (en) Caller identification method and caller identification terminal
CN103824003B (en) application program protecting method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915