CN107169328A - The method to set up and device of clean boot function - Google Patents
The method to set up and device of clean boot function Download PDFInfo
- Publication number
- CN107169328A CN107169328A CN201710339915.9A CN201710339915A CN107169328A CN 107169328 A CN107169328 A CN 107169328A CN 201710339915 A CN201710339915 A CN 201710339915A CN 107169328 A CN107169328 A CN 107169328A
- Authority
- CN
- China
- Prior art keywords
- password
- screen
- lock
- lock password
- clean boot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a kind of method to set up of clean boot function and device, belong to field of terminal technology.This method includes:When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password;If currently having set the screen-lock password, the screen-lock password is verified;If the screen-lock password is verified, the setting interface of the clean boot function is shown, and the clean boot function is configured by the setting interface of the clean boot function.Pass through the method to set up of the clean boot function, it is to avoid user is continually configured, the puzzlement caused to user it also avoid the waste of resource when changing screen-lock password to clean boot function.
Description
Technical field
The present invention relates to field of terminal technology, the method to set up and device of more particularly to a kind of clean boot function.
Background technology
, it is necessary to which the password inputted to user is verified during clean boot function refers to mobile terminal-opening, test
A kind of defencive function that just can normally start after demonstrate,proving successfully.In order to be protected to the personal information stored in mobile terminal formation, use
Family can open clean boot function, it is to avoid after mobile terminal is stolen during using mobile terminal, cause the individual to believe
The leakage of breath.
In correlation technique, when mobile terminal sets clean boot function, it is necessary to be configured with screen-lock password simultaneously.
It is, when detecting password setting instruction, to determine the selected password type of user, the password type includes PIN
(Personal Identification Number, personal recognition code) code, character string password or pattern password etc..Afterwards,
Mobile terminal shows the setting interface of clean boot function, and the setting interface of the clean boot function, which includes opening and closing, to be selected
, mobile terminal confirm user's selection be turned on and off option after, display password sets interface, and by user in the password
The password inputted in interface is set to be set to screen-lock password.If user selects to open in the setting interface of clean boot function
The screen-lock password, then be set to the password of clean boot function by option, to complete setting for screen-lock password and clean boot function
Put process.If user selects the off option in the setting interface of clean boot function, the clean boot work(of storage is removed
The password of energy.It should be noted that when user change screen-lock password or change clean boot function setting when, be also according to
Above-mentioned flow is performed one time.
However, due to user often set clean boot function after, a very long time will not change the safety and open
The setting of dynamic function, and the screen-lock password of the mobile terminal can be because the hobby of user often makes change, so that frequently
, it is necessary to frequently set clean boot function when changing screen-lock password, puzzlement is caused to user, and waste the money of mobile terminal
Source.
The content of the invention
The problem of in order to solve correlation technique, the embodiments of the invention provide a kind of method to set up of clean boot and dress
Put.The technical scheme is as follows:
First aspect includes there is provided a kind of method to set up of clean boot, methods described:
When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password;
If currently having set the screen-lock password, the screen-lock password is verified;
If the screen-lock password is verified, the setting interface of the clean boot function is shown, and by described
The setting interface of clean boot function is configured to the clean boot function.
Alternatively, it is described that the screen-lock password is verified, including:
Password authentification interface is shown, and obtains the password that user inputs in the password authentification interface, and obtains use
The password type of the password of family input;
If the password obtained is identical with the current screen-lock password set, and the password type obtained is with currently having set
Screen-lock password password type it is identical, it is determined that the screen-lock password is verified, otherwise, it determines the screen-lock password verify
Do not pass through.
Alternatively, the setting interface by the clean boot function is configured to the clean boot function,
Including:
If determining to need to open the clean boot function by the setting interface of the clean boot function, by institute
The password type for stating screen-lock password and the screen-lock password is stored into the encrypted partition of operating system;
If determining to need to close the clean boot function by the setting interface of the clean boot function, remove
The password and password type stored in the encrypted partition of the operating system.
Alternatively, if described currently set the screen-lock password, before being verified to the screen-lock password, also
Including:
When the setting for receiving the screen-lock password is instructed, the setting interface of screen-lock password is shown;
Obtain the password that user inputs in the setting interface of the screen-lock password;
The password of acquisition is set to screen-lock password, and the password type of the screen-lock password and the screen-lock password is deposited
Store up to the specified location of internal memory.
Alternatively, methods described also includes:
When the modification for receiving the screen-lock password is instructed, the modification interface of the screen-lock password is shown;
The screen-lock password and password stored by the modification interface of the screen-lock password to the specified location of the internal memory
Type is modified;
If currently having turned on the clean boot function, the screen-lock password that will be stored in the encrypted partition of operating system
The password type of amended screen-lock password and the amended screen-lock password is replaced with password type.
Second aspect includes there is provided a kind of setting device of clean boot, described device:
Judge module, for when the setting for receiving clean boot function is instructed, whether judgement currently to have set screen locking
Password;
Authentication module, if for currently having set the screen-lock password, verified to the screen-lock password;
First display module, if be verified for the screen-lock password, shows setting for the clean boot function
Put interface;
First setup module, is carried out for the setting interface by the clean boot function to the clean boot function
Set.
Alternatively, the authentication module includes:
Display unit, for showing password authentification interface;
Acquiring unit, for obtaining the password that user inputs in the password authentification interface, and obtains user's input
Password password type;
Determining unit, if it is identical with the current screen-lock password set for the password obtained, and the cipher type obtained
Type is identical with the password type of the current screen-lock password set, it is determined that the screen-lock password is verified, otherwise, it determines institute
Screen-lock password checking is stated not pass through.
Alternatively, first setup module includes:
Memory cell, if opened for determining to need to open the safety by the setting interface of the clean boot function
Dynamic function, then store the password type of the screen-lock password and the screen-lock password into the encrypted partition of operating system;
Clearing cell, if opened for determining to need to close the safety by the setting interface of the clean boot function
The password and password type stored in dynamic function, the then encrypted partition for removing the operating system.
Alternatively, described device also includes:
Second display module, for when the setting for receiving the screen-lock password is instructed, showing the setting of screen-lock password
Interface;
Acquisition module, for obtaining the password that user inputs in the setting interface of the screen-lock password;
Second setup module, for the password of acquisition to be set into screen-lock password;
Memory module, for the password type of the screen-lock password and the screen-lock password to be stored to the specific bit of internal memory
Put place.
Alternatively, described device also includes:
3rd display module, for when the modification for receiving the screen-lock password is instructed, showing the screen-lock password
Change interface;
Modified module, the lock stored for the modification interface by the screen-lock password to the specified location of the internal memory
Screen password and password type are modified;
Replacement module, if for currently having turned on the clean boot function, by the encrypted partition of operating system
The screen-lock password and password type of storage replace with the cipher type of amended screen-lock password and the amended screen-lock password
Type.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:In embodiments of the present invention, when receiving
The setting instruction of clean boot function, and when currently screen-lock password has been set, the screen-lock password can be verified, when the lock
Shield password authentification by rear, then show the setting interface of the clean boot function, pass through the setting interface of the clean boot function
The clean boot function is configured, be that is to say, individually clean boot function can be configured, rather than lock is being set
It is configured during screen password, so that when user frequently changes screen-lock password, also will not be continually to clean boot
Function is configured, it is to avoid the puzzlement caused to user, and then avoids the waste of resource.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, makes required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of method to set up flow chart of clean boot function provided in an embodiment of the present invention;
Fig. 2 is the method to set up flow chart of another clean boot function provided in an embodiment of the present invention;
Fig. 3 is a kind of password type selection interface schematic diagram provided in an embodiment of the present invention;
Fig. 4 is a kind of password authentification interface schematic diagram provided in an embodiment of the present invention;
Fig. 5 is a kind of setting interface schematic diagram of clean boot function provided in an embodiment of the present invention;
Fig. 6 is a kind of method to set up flow chart of screen-lock password provided in an embodiment of the present invention;
Fig. 7 A are the setting apparatus structure schematic diagrams of the first clean boot function provided in an embodiment of the present invention;
Fig. 7 B are a kind of structural representations of authentication module provided in an embodiment of the present invention;
Fig. 7 C are a kind of structural representations of first setup module provided in an embodiment of the present invention;
Fig. 7 D are the setting apparatus structure schematic diagrams of second of clean boot function provided in an embodiment of the present invention;
Fig. 7 E are the setting apparatus structure schematic diagrams of the third clean boot function provided in an embodiment of the present invention;
Fig. 8 is a kind of structural representation of mobile terminal provided in an embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
In order to make it easy to understand, before to the embodiment of the present invention carrying out that explanation is explained in detail, first to the embodiment of the present invention
The application scenarios being related to are introduced.
During user uses mobile terminal, the stolen of the mobile terminal may be caused because of personal reason etc.,
So as to cause the leakage for the personal information being stored in the mobile terminal, therefore, in order to be protected to the personal information, the use
Family can be configured to the clean boot function of the mobile terminal, to open clean boot function, certainly, and shifting is used in user
During dynamic terminal, due to being required for input to enter in advance to the checking password of clean boot function setting in each start process
Row checking, mobile terminal ability normal boot-strap after being verified, in order to save in start process, because of input validation password
The time verified and wasted, the user can also be configured to clean boot function, with closed safe startup function.
Certainly, the embodiment of the present invention can be applied not only to protect in mobile terminal personal information and save the available machine time
Scene, be also applied in other scenes, other application scene will not enumerate in this embodiment of the present invention.
Introduced the present embodiments relate to application scenarios after, detailed solution is carried out to the embodiment of the present invention below
Release explanation.
Fig. 1 is a kind of method to set up flow chart of clean boot function provided in an embodiment of the present invention, and this method is applied to
In mobile terminal.Referring to Fig. 1, this method comprises the following steps:
Step 101:When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password.
Step 102:If currently having set the screen-lock password, the screen-lock password is verified.
Step 103:If the screen-lock password is verified, the setting interface of the clean boot function is shown, and is passed through
The setting interface of the clean boot function is configured to the clean boot function.
In summary, method provided in an embodiment of the present invention, when mobile terminal receives user to clean boot function
When instruction is set, it is determined that the current screen-lock password set, and the screen-lock password is verified, when screen-lock password checking is logical
Later, then the clean boot function is configured, be that is to say by the setting interface of the clean boot function, can be independent
Clean boot function is configured, rather than is configured during screen-lock password is set, so that in user frequently
When changing screen-lock password, also continually clean boot function will not be configured, it is to avoid the puzzlement caused to user, and then keep away
Exempt from the waste of resource.
Fig. 2 is a kind of method to set up flow chart of clean boot function provided in an embodiment of the present invention, and this method is applied to
In mobile terminal.Referring to Fig. 2, this method comprises the following steps:
Step 201:When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password.
During user uses mobile terminal, often part personal information is stored in the mobile terminal, together
When, in order to avoid the leakage of the personal information, clean boot function, and then the individual to being stored in the mobile terminal can be opened
Information formation protection.Certainly, user may also will be considered that during mobile terminal-opening, input to clean boot function setting
Checking password verified after, could normal boot-strap, cause waste of time, in order to save the available machine time, Ke Yiguan
Close clean boot function.
Wherein, when the user is configured to the clean boot function of the mobile terminal, clean boot function can be triggered
Setting instruction.Because the setting of clean boot function is built upon on the basis of screen-lock password set, it that is to say, the shifting
When dynamic terminal has set screen-lock password, clean boot function can be further set, therefore, when mobile terminal detects safety
During the setting instruction of startup function, it can be determined that whether screen-lock password currently has been set.
, can be whole from the movement when judging currently whether to have set screen-lock password in a kind of possible implementation
Screen-lock password is searched in the specified location of end memory, if found, it is determined that the mobile terminal has currently set screen-lock password,
If do not found, it is determined that the mobile terminal is currently not provided with screen-lock password.Wherein, the specified location in internal memory can be thing
The storage region first set for screen-lock password.
Wherein, the setting instruction of clean boot function can be touched by user in system sets interface by predetermined registration operation
Hair, it is of course also possible to be triggered by user in column is fast set by predetermined registration operation, the predetermined registration operation can be clicked, double-click
Or the operation such as slide, this reality is invented and applies example this is not limited.
When determining currently to have set screen-lock password by step 201, in order to determine whether active user is that the movement is whole
The owner at end, and then determine whether active user has the authority for setting the clean boot function, now, mobile terminal can be with
202- steps 203, are verified to the screen-lock password as steps described below.
Step 202:If current set screen-lock password, display password authentification interface, and obtains user in the password
The password inputted in checking interface, and obtain the password type of the password of user's input.
When mobile terminal determines currently to have set screen-lock password, in order to be verified to the screen-lock password, the movement is whole
End can show password authentification interface, and the password that acquisition user inputs from the password authentification interface, and acquisition user are defeated
The password type of the password entered, the password authentification interface is used to verify for the screen-lock password of the mobile terminal.
It should be noted that in screen-lock password setting process, mobile terminal can provide a variety of password types, for user
Independently select a kind of password type that screen-lock password is set from a variety of password types, certainly, the mobile terminal can also be carried
For a kind of password type, screen-lock password is set for user, be that is to say, mobile terminal acquiescence provides a kind of password type of fixation,
Can not independently it be selected for user.
Wherein, when mobile terminal provides a variety of password types, the mobile terminal needs to obtain from the specified location of internal memory
The password type of the screen-lock password stored is taken, and according to the password type of acquisition, shows corresponding password authentification interface.When
So, in this case, in order to further verify active user whether be the mobile terminal the owner, now, the shifting
Dynamic terminal can also show password type selection interface, obtain cipher type of the user selected in the password type selection interface
Type, and show the corresponding password authentification interface of password type of selection.
However, when mobile terminal gives tacit consent to the password type for providing a kind of fixation, the mobile terminal can directly display silent
Recognize the fixed password checking interface of setting, certainly, the mobile terminal can also obtain what is stored from the specified location of internal memory
The fixed password type of screen-lock password, and according to the password type of acquisition, show corresponding password authentification interface.It that is to say, it is right
A kind of password type of fixation is provided in mobile terminal acquiescence, and also stores while screen-lock password is stored the password of the fixation
Type such case, follow-up implementation process can be identical with the implementation process that mobile terminal provides a variety of password types, connects down
To provide a kind of password type such case of fixation for mobile terminal acquiescence, only with mobile terminal internal memory specified location
Illustrated exemplified by storage screen-lock password.
Wherein, when user inputs password in password authentification interface, password can be inputted by way of button, can also
Password is inputted by way of touching, the embodiment of the present invention is not limited this.
Wherein, password type can include PIN code, character string password and pattern password etc., and the character string password is by many
Position character composition, can be 4 or 6 etc..Such as, password type selection interface as shown in Figure 3, when user is from the password
The password type that screen-lock password is selected in type selection interface is character string password, and the character string password is by 4 character groups
Cheng Shi, mobile terminal can show password authentification interface as shown in Figure 4, and user can be tested in the password by way of touching
Demonstrate,prove in interface, by way of touching, continuously input character, when the character continuously inputted reaches 4, this is continuously inputted
4 characters are defined as the password of user's input.
Further, when mobile terminal determines currently to be not provided with the screen-lock password, the clean boot can be directly displayed
The setting interface of function, now, the setting interface ashing display of the clean boot function.It that is to say, the setting interface can not
User is allowed to carry out any operation, it is of course also possible to allow user arbitrarily to change any parameter in the setting interface,
But the parameter of modification can not come into force.
Step 203:If the password obtained is identical with the current screen-lock password set, and the password type obtained is with working as
The password type of the preceding screen-lock password set is identical, it is determined that screen-lock password is verified.
The password inputted in the password authentification interface when acquisition for mobile terminal to user and the password of user's input it is close
During code type, the screen-lock password of storage and the password type of screen-lock password are obtained from the specified location of internal memory, if what is obtained is close
Code is identical with the screen-lock password, and the password type obtained is identical with the password type of the current screen-lock password set, then really
Lock screen password authentification passes through, if the password type obtained and the password type of the current screen-lock password set, or obtain
When the password taken is differed with the screen-lock password, it is determined that screen-lock password checking does not pass through.
However, when mobile terminal gives tacit consent to the password type for providing a kind of fixation, can be obtained from the specified location of internal memory
The screen-lock password of storage is taken, if the password obtained is identical with the screen-lock password, it is determined that screen-lock password is verified, if obtained
The password taken is different with the screen-lock password, it is determined that screen-lock password checking does not pass through.
Wherein, if it is determined that screen-lock password is verified, mobile terminal can then determine that the user is the mobile terminal
The owner, and then the setting interface of 204 display clean boot functions as follows, if it is determined that screen-lock password checking is obstructed
Cross, mobile terminal can be with display reminding information, and the prompt message is used to point out the checking of user's screen-lock password not pass through.
Step 204:Show the setting interface of the clean boot function, and the setting interface pair for passing through the clean boot function
The clean boot function is configured.
When mobile terminal determine user input password authentification by when, setting circle of the clean boot function can be shown
Face.Wherein, it is to be in that the settings button under settings button, original state can be included in the setting interface of the clean boot function
Closed mode, in this case, when user clicks on the settings button, it is possible to achieve the unlatching to clean boot function, this
When, the settings button is in opening, and in this case, user clicks on the settings button, it is possible to achieve the safety is opened
The closing of dynamic function.Such as, the setting interface of the clean boot function can be as shown in Figure 5.
Wherein, if mobile terminal determines to open the clean boot function by the setting interface of the clean boot function,
In the case where mobile terminal provides a variety of password types, the password type of the screen-lock password and the screen-lock password can be carried out
Encryption, and encrypted result is stored into the encrypted partition of operating system.Give tacit consent in mobile terminal and a kind of fixation is provided
In the case of password type, then the screen-lock password can be encrypted, and encrypted result is stored to operating system
In encrypted partition.By this method, it is ensured that screen-lock password, or screen-lock password and the screen-lock password password type
Security.
In addition, if mobile terminal determines to close the clean boot function by the setting interface of the clean boot function,
The information stored in the encrypted partition for then removing the operating system.
Wherein, the operating system is the operating system that is currently installed on of the mobile terminal, and the operating system can be
Android (Android) operating systems or IOS, the embodiment of the present invention are not limited this.
After by above-mentioned steps 201-204 to clean boot function setting, if having turned on the clean boot function,
Then during subsequently starting shooting or restarting, the checking interface of clean boot function can be shown, so as to pass through operating system
Encrypted partition in the information that stores verified, with determine active user whether be the mobile terminal the owner, and then really
It is fixed whether to need normal startup.If being turned off the clean boot function, during subsequently starting shooting or restarting, without
The checking interface of clean boot function is shown, and then is avoided because needing input validation password to be verified, and the time wasted.
In summary, method provided in an embodiment of the present invention, when mobile terminal receives user to clean boot function
When instruction is set, it is determined that the current screen-lock password set, and the screen-lock password is verified, when screen-lock password checking is logical
Later, then the clean boot function is configured and be that is to say by the setting interface of the clean boot function, can be individually right
Clean boot function is configured, rather than is configured during screen-lock password is set, so as to frequently become in user
During more screen-lock password, also continually clean boot function will not be configured, it is to avoid the puzzlement caused to user, and then avoid
The waste of resource.
Because clean boot function is configured on the basis of screen-lock password has been set, therefore, for the ease of can
Successfully clean boot function is configured, the screen-lock password of the mobile terminal can be set in advance, it is next close to screen locking
The setting of code carries out detailed explanation.
Fig. 6 is a kind of method to set up flow chart of screen-lock password provided in an embodiment of the present invention, and this method is applied to movement
In terminal.Referring to Fig. 6, this method comprises the following steps:
Step 601:When the setting for receiving screen-lock password is instructed, the setting interface of screen-lock password is shown.
During user uses mobile terminal, in order to avoid other users obtain directly making after the mobile terminal
The mobile terminal is used, so that the embarrassment brought to the user by content that the mobile terminal is currently shown.Therefore, the user can be with
The setting of screen-lock password is carried out to the mobile terminal, so that in the case where other users use the mobile terminal, it is necessary to advanced
The checking of row screen-lock password.Because other users do not know screen-lock password, it is impossible to the mobile terminal is used by checking, so as to keep away
The embarrassment that exempt from customs examination user brings.
Wherein, when the user is configured to the screen-lock password of the mobile terminal, the lock can be triggered by predetermined registration operation
Shield the setting instruction of password, when mobile terminal receives the setting instruction of the screen-lock password, setting for screen-lock password can be shown
Put interface.
It should be noted that such as the description of above-mentioned embodiment, mobile terminal can provide a variety of password types, for user from
Independently select a kind of password type that screen-lock password is set in a variety of password types, can also give tacit consent to and a kind of the close of fixation is provided
Code type.
When mobile terminal provides a variety of password types, the mobile terminal can show password type selection interface, and obtain
Password type of the family selected in the password type selection interface is taken, and then shows the corresponding screen locking of password type of selection
Password sets interface, however, when mobile terminal gives tacit consent to the password type for providing a kind of fixation, the mobile terminal can be according to upper
State the screen-lock password setting interface that description directly displays default setting.
Step 602:Obtain the password that user inputs in the setting interface of screen-lock password.
Wherein, in the screen-lock password sets interface, user can input password by way of button, can also pass through
The mode of touching inputs password, and the embodiment of the present invention is not limited this.
It should be noted that in screen-lock password setting process, mobile terminal can be with double acquisition user input
Password, and the password of double input be able to can also differ with identical.When mobile terminal determines the close of double acquisition
Identical password simultaneously, is defined as the password that acquisition for mobile terminal is arrived by code-phase, when mobile terminal determines double input
When password is differed, then point out the double input password of user to differ, password can be re-entered.Wherein, when user selects
When the password type selected is character string password or PIN code etc., the password of double input sets interface can be with screen-lock password
Shown with additional character, the additional character can be " * ", "@" or " # " etc., and the embodiment of the present invention is not especially limited to this.
Certainly, mobile terminal can also only obtain the password once inputted in screen-lock password setting interface, in the screen locking
Password sets the password that inputs in interface to be shown in the form of plaintext, to confirm that it is defeated that the password of acquisition for mobile terminal is that user wants
The password entered.
Such as, when mobile terminal is double obtains the password inputted in screen-lock password setting interface, if selection
Screen-lock password type be character string password, and the character string is made up of 4 characters, and user can be set in the screen-lock password
In interface, by way of touching, character is continuously inputted, when the character that mobile terminal is obtained for the first time reaches 4, this is connected
4 characters of continuous input are defined as the password that mobile terminal is obtained for the first time, so that " * * * * " symbols are shown, it is assumed that this continuous 4
Position character is " 5621 ", and when the character of second of acquisition of mobile terminal reaches 4,4 characters that this is continuously inputted are determined
The password obtained for the second time for mobile terminal, so that " * * * * " symbols are shown, it is assumed that continuous 4 characters are " 5621 ", then really
Determining mobile terminal, the password of acquisition is identical with the password that second obtains for the first time, and then identical password " 5621 " is defined as
The password of acquisition for mobile terminal.
Step 603:The password of acquisition is set to screen-lock password, and the password type of screen-lock password and screen-lock password is deposited
Store up to the specified location of internal memory.
, now can be by the cipher type of the screen-lock password He the screen-lock password when mobile terminal provides a variety of password types
Type is stored to the specified location of the internal memory simultaneously.When mobile terminal gives tacit consent to the password type for providing a kind of fixation, now may be used
, can also be by the fixed type of the screen-lock password He the screen-lock password so that the screen-lock password is stored to the specified location of internal memory
Store to the specified location of internal memory.It that is to say, a kind of password type of fixation is provided for mobile terminal acquiescence, and in storage
Also password type such case of the fixation is stored while screen-lock password, follow-up implementation process can be provided with mobile terminal
The implementation process of a variety of password types is identical, and a kind of this feelings of the password type of fixation are provided next for mobile terminal acquiescence
Condition, is only illustrated by mobile terminal exemplified by the specified location storage screen-lock password of internal memory.
Wherein, when the type of screen-lock password is pattern password, now the screen-lock password of setting can be referred to as pattern lock,
The corresponding pattern lock of pattern password can also be converted to character string, so by pattern password it is corresponding with the character string store to
The specified location of internal memory.Wherein, pattern lock being converted into character string can be turned according to the conversion method in correlation technique
Change, the embodiment of the present invention is not set forth in detail herein.
Further, after mobile terminal is provided with to screen-lock password, in use, the mobile terminal can be with
Because the hobby of user is modified to the screen-lock password currently set, wherein, screen locking of the mobile terminal to currently having set
Password, which is modified, to be realized by step (1)-(3).
(1) when the modification for receiving screen-lock password is instructed, the modification interface of the screen-lock password is shown.
User, may be because of personal like or other reasons, to what is currently set during using mobile terminal
Screen-lock password is modified, when the user carries out screen-lock password modification to the mobile terminal, can be triggered and locked by predetermined registration operation
Shield the modification instruction of password, when mobile terminal receives the modification instruction of the screen-lock password, show modification circle of screen-lock password
Face.
Screen-lock password modification interface display process can with the screen-lock password of foregoing description set interface display
Process is same or similar, and this is not set forth in detail the embodiment of the present invention.
(2) screen-lock password and cipher type stored by the modification interface of the screen-lock password to the specified location of the internal memory
Type is modified.
, can be first to current in the screen-lock password modification interface of display when mobile terminal provides a variety of password types
The screen-lock password and the password type of the screen-lock password set is verified, if the current screen-lock password set and the lock
The password type of screen password is verified, then points out user to input amended screen-lock password corresponding with amended screen-lock password
Password type, and screen-lock password and screen-lock password type that the specified location of the internal memory is stored replace with amended lock
Shield password and the corresponding password type of amended screen-lock password.Wherein, the setting up procedure of amended screen-lock password can be with
The setting up procedure of foregoing description screen-lock password is same or similar, and the embodiment of the present invention is not specifically described.
, can in the screen-lock password modification interface of display when mobile terminal gives tacit consent to the password type for providing a kind of fixation
First to verify the screen-lock password currently set, if the current screen-lock password set is verified, point out to use
Family inputs amended screen-lock password, and it is close that the screen-lock password that the specified location of the internal memory is stored replaces with amended screen locking
Code.
(3) if currently having turned on clean boot function, the screen-lock password that will be stored in the encrypted partition of operating system
The password type of amended screen-lock password and amended screen-lock password is replaced with password type.
When mobile terminal provides a variety of password types, modified in the password type to screen-lock password and screen-lock password
Afterwards, it can be determined that currently whether have turned on clean boot function, if having turned on clean boot function, by amended lock
Screen password and the password type of screen-lock password are encrypted, and to screen locking currently stored in the encrypted partition of operating system
Password and the password type of screen-lock password replace with the encrypted result of the password type of amended screen-lock password and screen-lock password.
, can be with after being modified to screen-lock password when mobile terminal gives tacit consent to the password type for providing a kind of fixation
Whether judgement currently has turned on clean boot function, if having turned on clean boot function, is described above, when the finger of the internal memory
When storage screen-lock password is put in positioning, then amended screen-lock password is encrypted, and to the encrypted partition of operating system
In currently stored screen-lock password replace with the encrypted result of amended screen-lock password.
In summary, method provided in an embodiment of the present invention, when mobile terminal receives setting of the user to screen-lock password
During instruction, display screen-lock password sets interface, and the screen-lock password obtained based on the setting interface is corresponding with the screen-lock password
Password type is stored to the specified location of internal memory, that is to say, individually screen-lock password can be configured, it is not necessary to while right
Clean boot function is configured, so as to avoid the puzzlement caused to user, and then avoids the waste of resource.In addition, in modification
After screen-lock password, in the case where having turned on clean boot function, the screen-lock password stored in encrypted partition can also be entered
Row modification, in order to subsequently can successfully carry out the checking of clean boot function.
Fig. 7 A are a kind of setting schematic devices of clean boot function provided in an embodiment of the present invention, referring to Fig. 7 A, should
Device includes:
Judge module 701, for when the setting for receiving clean boot function is instructed, whether judgement currently to have set lock
Shield password;
Authentication module 702, if for currently having set the screen-lock password, verified to the screen-lock password;
First display module 703, if be verified for the screen-lock password, shows the setting of the clean boot function
Interface;
First setup module 704, is carried out for the setting interface by the clean boot function to the clean boot function
Set.
Alternatively, as shown in Figure 7 B, the authentication module 702 includes:
Display unit 7021, for showing password authentification interface;
Acquiring unit 7022, for obtaining the password that user inputs in the password authentification interface, and to obtain user defeated
The password type of the password entered;
Determining unit 7023, if it is identical with the current screen-lock password set for the password obtained, and acquisition would be close
Code type is identical with the password type of the current screen-lock password set, it is determined that the screen-lock password is verified, otherwise, it determines
Screen-lock password checking does not pass through.
Alternatively, as seen in figure 7 c, first setup module 704 includes:
Memory cell 7041, if determining to need to open the clean boot for the setting interface by clean boot function
Function, then store the password type of the screen-lock password and screen-lock password into the encrypted partition of operating system;
Clearing cell 7042, if determining to need the closing safety to open for the setting interface by the clean boot function
Dynamic function, the then password and password type stored in the encrypted partition of clear operation system.
Alternatively, as illustrated in fig. 7d, the device also includes:
Second display module 705, for when the setting for receiving the screen-lock password is instructed, showing the setting of screen-lock password
Interface;
Acquisition module 706, for obtaining the password that user inputs in the setting interface of screen-lock password;
Second setup module 707, for the password of acquisition to be set into screen-lock password;
Memory module 708, for the password type of the screen-lock password and screen-lock password to be stored to the specified location of internal memory
Place.
Alternatively, as seen in figure 7e, the device also includes:
3rd display module 709, for when the modification for receiving screen-lock password is instructed, showing modification circle of screen-lock password
Face;
Modified module 710, the screen locking stored for the modification interface by screen-lock password to the specified location of internal memory is close
Code and password type are modified;
Replacement module 711, if for currently having turned on the clean boot function, by the encrypted partition of operating system
The screen-lock password and password type of storage replace with the password type of amended screen-lock password and amended screen-lock password.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:In embodiments of the present invention, when receiving
The setting instruction of clean boot function, and when currently screen-lock password has been set, the screen-lock password is verified, when the screen locking is close
After code is verified, then the setting interface of the clean boot function is shown, by the setting interface of the clean boot function to this
Clean boot function is configured, and that is to say, individually clean boot function can be configured, rather than is setting screen locking close
It is configured during code, so that when user frequently changes screen-lock password, also will not be continually to clean boot function
It is configured, it is to avoid the puzzlement caused to user, and then avoids the waste of resource.
It should be noted that:The setting device for the clean boot function that above-described embodiment is provided is setting clean boot function
When, only with the division progress of above-mentioned each functional module for example, in practical application, as needed can divide above-mentioned functions
With by different functional module completions, i.e., the internal structure of device is divided into different functional modules, to complete above description
All or part of function.In addition, the setting device for the clean boot function that above-described embodiment is provided and clean boot function
Method to set up embodiment belong to same design, it implements process and refers to embodiment of the method, repeats no more here.
Fig. 8 is a kind of mobile terminal structure schematic diagram provided in an embodiment of the present invention.Referring to Fig. 8, mobile terminal 800 can be with
Including communication unit 810, include memory 820, the input block of one or more computer-readable recording mediums
830th, display unit 840, sensor 850, voicefrequency circuit 860, WIFI (Wireless Fidelity, Wireless Fidelity) module
870th, the part such as one or the processor 880 and power supply 890 of more than one processing core is included.People in the art
Member is appreciated that the mobile terminal structure shown in Fig. 8 does not constitute the restriction to mobile terminal, can include more more than illustrating
Or less part, either combine some parts or different parts arrangement.Wherein:
Communication unit 810 can be used for receive and send messages or communication process in, the reception and transmission of signal, the communication unit 810
Can for RF (Radio Frequency, radio frequency) circuit, router, modem, etc. network communication equipment.Especially, when
When communication unit 810 is RF circuits, after the downlink information of base station is received, transfer at one or more than one processor 880
Reason;In addition, being sent to base station by up data are related to.Usually as communication unit RF circuits include but is not limited to antenna,
At least one amplifier, tuner, one or more oscillators, subscriber identity module (SIM) card, transceiver, coupler,
LNA (Low Noise Amplifier, low-noise amplifier), duplexer etc..In addition, communication unit 810 can also be by wireless
Communication communicates with network and other equipment.The radio communication can use any communication standard or agreement, include but is not limited to
GSM, GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division
Multiple Access, CDMA), WCDMA, LTE (Long Term Evolution, Long Term Evolution), Email,
SMS (Short Messaging Service, Short Message Service) etc..Memory 820 can be used for storage software program and mould
Block, processor 880 is stored in the software program and module of memory 820 by operation, thus perform various function application with
And data processing.Memory 820 can mainly include storing program area and storage data field, wherein, storing program area can store behaviour
Make application program (such as sound-playing function, image player function etc.) needed for system, at least one function etc.;Data storage
Area can be stored uses created data (such as voice data, phone directory etc.) etc. according to mobile terminal 800.In addition, storage
Device 820 can include high-speed random access memory, can also include nonvolatile memory, for example, at least one disk storage
Device, flush memory device or other volatile solid-state parts.Correspondingly, memory 820 can also include memory control
Device, to provide the access of processor 880 and input block 830 to memory 820.
Input block 830 can be used for the numeral or character information for receiving input, and generation to be set with user and function
The relevant keyboard of control, mouse, action bars, optics or the input of trace ball signal.Preferably, input block 830 may include to touch
Sensitive surfaces 831 and other input equipments 832.Touch sensitive surface 831, also referred to as touch display screen or Trackpad, collect and use
(such as user is using any suitable objects such as finger, stylus or annex in touch-sensitive table for touch operation of the family on or near it
Operation on face 831 or near touch sensitive surface 831), and corresponding attachment means are driven according to formula set in advance.It is optional
, touch sensitive surface 831 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and the signal that touch operation is brought is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection means, and is converted into contact coordinate, then gives processor 880, and can reception processing device 880
The order sent simultaneously is performed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 831.Except touch sensitive surface 831, input block 830 can also include other input equipments 832.Preferably,
Other input equipments 832 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One or more in trace ball, mouse, action bars etc..
Display unit 840 can be used for the information that is inputted by user of display or the information for being supplied to user and terminal 800
Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Display unit 840 may include display panel 841, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
841.Further, touch sensitive surface 831 can cover display panel 841, when touch sensitive surface 831 detects touching on or near it
Touch after operation, send processor 880 to determine the type of touch event, with type of the preprocessor 880 according to touch event
Corresponding visual output is provided on display panel 841.Although in fig. 8, touch sensitive surface 831 and display panel 841 are conducts
Two independent parts are inputted and input function to realize, but in some embodiments it is possible to by touch sensitive surface 831 with showing
Panel 841 is integrated and realizes input and output function.
Mobile terminal 800 may also include at least one sensor 850, such as optical sensor, motion sensor and other
Sensor.Optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 841, proximity transducer can close display when mobile terminal 800 is moved in one's ear
Panel 841 and/or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axles) acceleration size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
The other sensors such as the gyroscope, barometer, hygrometer, thermometer, the infrared ray sensor that can also configure in mobile terminal 800,
It will not be repeated here.
Voicefrequency circuit 860, loudspeaker 861, microphone 862 can provide the COBBAIF between user and mobile terminal 800.
Electric signal after the voice data received conversion can be transferred to loudspeaker 861, is changed by loudspeaker 861 by voicefrequency circuit 860
Exported for voice signal;On the other hand, the voice signal of collection is converted to electric signal by microphone 862, is connect by voicefrequency circuit 860
Voice data is converted to after receipts, then after voice data output processor 880 is handled, through communication unit 810 to be sent to such as
Another terminal, or voice data is exported to memory 820 so as to further processing.Voicefrequency circuit 860 is also possible that ear
Tip jack, to provide the communication of peripheral hardware earphone and terminal 800.
In order to realize radio communication, wireless communication unit 870 can be configured with the terminal, the wireless communication unit 870
It can be WIFI module.WIFI belongs to short range wireless transmission technology, and mobile terminal 800 can be with by wireless communication unit 870
Help user to send and receive e-mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet
Access.Although showing wireless communication unit 870 in Fig. 8, but it is understood that, it is simultaneously not belonging to mobile terminal 800
It must be configured into, can be omitted as needed in the essential scope for do not change invention completely.
Processor 880 is the control centre of mobile terminal 800, utilizes each of various interfaces and connection whole mobile phone
Part, by operation or performs and is stored in software program and/or module in memory 820, and calls and be stored in memory
Data in 820, perform the various functions and processing data of mobile terminal 800, so as to carry out integral monitoring to mobile phone.It is optional
, processor 880 may include one or more processing cores;It is preferred that, processor 880 can integrated application processor and modulatedemodulate
Processor is adjusted, wherein, application processor mainly handles operating system, user interface and application program etc., modem processor
Main processing radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile terminal 800 also includes the power supply 890 (such as battery) powered to all parts, it is preferred that power supply can lead to
Cross power-supply management system and processor 880 be logically contiguous, thus by power-supply management system realize management charging, electric discharge and
The functions such as power managed.Power supply 860 can also include one or more direct current or AC power, recharging system, electricity
The random component such as source failure detector circuit, power supply changeover device or inverter, power supply status indicator.
Although not shown, mobile terminal 800 can also include camera, bluetooth module etc., will not be repeated here.
In the present embodiment, mobile terminal also includes one or more than one program, this or one with
Upper program storage is configured to by one or more than one computing device in memory, one or one
Procedure above is included for carrying out setting for the clean boot function described in above-mentioned Fig. 1, Fig. 2 and Fig. 6 provided in an embodiment of the present invention
Put the instruction of method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include the memory of instruction, above-mentioned instruction can complete the above method by the computing device of mobile terminal.For example, described non-
Provisional computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light number
According to storage device etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device is performed so that mobile terminal is able to carry out the step of the method to set up of the clean boot function described in above-mentioned Fig. 1, Fig. 2 and Fig. 6
Suddenly.
One of ordinary skill in the art will appreciate that realizing that all or part of step of above-described embodiment can be by hardware
To complete, the hardware of correlation can also be instructed to complete by program, described program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc. should be included in the scope of the protection.
Claims (10)
1. a kind of method to set up of clean boot function, it is characterised in that methods described includes:
When the setting for receiving clean boot function is instructed, whether judgement has currently set screen-lock password;
If currently having set the screen-lock password, the screen-lock password is verified;
If the screen-lock password is verified, the setting interface of the clean boot function is shown, and passes through the safety
The setting interface of startup function is configured to the clean boot function.
2. the method as described in claim 1, it is characterised in that described to be verified to the screen-lock password, including:
Show password authentification interface, and obtain the password that user inputs in the password authentification interface, and to obtain user defeated
The password type of the password entered;
If the password obtained is identical with the current screen-lock password set, and the password type obtained and the current lock set
The password type for shielding password is identical, it is determined that the screen-lock password is verified, otherwise, it determines screen-lock password checking is obstructed
Cross.
3. method as claimed in claim 1 or 2, it is characterised in that the setting interface by the clean boot function
The clean boot function is configured, including:
If determining to need to open the clean boot function by the setting interface of the clean boot function, by the lock
Screen password and the password type of the screen-lock password are stored into the encrypted partition of operating system;
If determining to need to close the clean boot function by the setting interface of the clean boot function, remove described
The password and password type stored in the encrypted partition of operating system.
4. the method as described in claim 1-3 is any, it is characterised in that if described currently set the screen-lock password,
Before then being verified to the screen-lock password, in addition to:
When the setting for receiving the screen-lock password is instructed, the setting interface of screen-lock password is shown;
Obtain the password that user inputs in the setting interface of the screen-lock password;
The password of acquisition is set to screen-lock password, and by the password type of the screen-lock password and the screen-lock password store to
The specified location of internal memory.
5. the method as described in claim 1, it is characterised in that methods described also includes:
When the modification for receiving the screen-lock password is instructed, the modification interface of the screen-lock password is shown;
The screen-lock password and password type stored by the modification interface of the screen-lock password to the specified location of the internal memory
Modify;
If currently having turned on the clean boot function, by the screen-lock password stored in the encrypted partition of operating system and close
Code type replaces with the password type of amended screen-lock password and the amended screen-lock password.
6. a kind of setting device of clean boot function, it is characterised in that described device includes:
Judge module, for when the setting for receiving clean boot function is instructed, whether judgement currently to have set screen-lock password;
Authentication module, if for currently having set the screen-lock password, verified to the screen-lock password;
First display module, if be verified for the screen-lock password, shows setting circle of the clean boot function
Face;
First setup module, sets for the setting interface by the clean boot function to the clean boot function
Put.
7. device as claimed in claim 6, it is characterised in that the authentication module includes:
Display unit, for showing password authentification interface;
Acquiring unit, for obtaining the password that user inputs in the password authentification interface, and obtains the close of user's input
The password type of code;
Determining unit, if it is identical with the current screen-lock password set for the password obtained, and the password type that obtains and
The password type of the current screen-lock password set is identical, it is determined that the screen-lock password is verified, otherwise, it determines the lock
Screen password authentification does not pass through.
8. device as claimed in claims 6 or 7, it is characterised in that first setup module includes:
Memory cell, if determining to need to open the clean boot work(for the setting interface by the clean boot function
Can, then the password type of the screen-lock password and the screen-lock password is stored into the encrypted partition of operating system;
Clearing cell, if determining to need to close the clean boot work(for the setting interface by the clean boot function
Can, then the password and password type stored in the encrypted partition for removing the operating system.
9. the device as described in claim 6-8 is any, it is characterised in that described device also includes:
Second display module, for when the setting for receiving the screen-lock password is instructed, showing the setting interface of screen-lock password;
Acquisition module, for obtaining the password that user inputs in the setting interface of the screen-lock password;
Second setup module, for the password of acquisition to be set into screen-lock password;
Memory module, for the password type of the screen-lock password and the screen-lock password to be stored to the specified location of internal memory
Place.
10. device as claimed in claim 6, it is characterised in that described device also includes:
3rd display module, for when the modification for receiving the screen-lock password is instructed, showing the modification of the screen-lock password
Interface;
Modified module, the screen locking stored for the modification interface by the screen-lock password to the specified location of the internal memory is close
Code and password type are modified;
Replacement module, if for currently having turned on the clean boot function, will be stored in the encrypted partition of operating system
Screen-lock password and password type replace with the password type of amended screen-lock password and the amended screen-lock password.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710339915.9A CN107169328A (en) | 2017-05-15 | 2017-05-15 | The method to set up and device of clean boot function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710339915.9A CN107169328A (en) | 2017-05-15 | 2017-05-15 | The method to set up and device of clean boot function |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107169328A true CN107169328A (en) | 2017-09-15 |
Family
ID=59816313
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710339915.9A Pending CN107169328A (en) | 2017-05-15 | 2017-05-15 | The method to set up and device of clean boot function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107169328A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581617A (en) * | 2020-05-18 | 2020-08-25 | 北京字节跳动网络技术有限公司 | Software access method, device, equipment and storage medium |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101901320A (en) * | 2010-07-29 | 2010-12-01 | 广东欧珀电子工业有限公司 | Data leakage prevention method for electronic book reader |
CN101996289A (en) * | 2009-08-24 | 2011-03-30 | 鸿富锦精密工业(深圳)有限公司 | Computer with password boot-up function and boot-up method thereof |
CN102054146A (en) * | 2009-11-06 | 2011-05-11 | 深圳市研祥通讯终端技术有限公司 | Power on password protection method and device |
CN102664986A (en) * | 2012-03-21 | 2012-09-12 | 华为终端有限公司 | Cell phone, method for powering on the cell phone and placement of power bottom thereof |
CN102984349A (en) * | 2012-10-31 | 2013-03-20 | 北京小米科技有限责任公司 | Method and device for screen locking code generating and screen unlocking method and screen unlocking device and mobile terminal |
CN103164644A (en) * | 2011-12-19 | 2013-06-19 | 联想(北京)有限公司 | Terminal device and starting machine controlling method thereof |
CN103186748A (en) * | 2011-12-29 | 2013-07-03 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and password protection method thereof |
CN103729592A (en) * | 2013-12-26 | 2014-04-16 | 京东方科技集团股份有限公司 | Electronic device and starting method of function interface of electronic device |
CN104182667A (en) * | 2014-08-26 | 2014-12-03 | 广东欧珀移动通信有限公司 | Screen lock based data protection method and device |
CN105975283A (en) * | 2016-05-27 | 2016-09-28 | 北京小米移动软件有限公司 | Starting method and device for operating system |
CN106203124A (en) * | 2016-06-29 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | Operational approach and operation device, terminal are installed |
CN106326718A (en) * | 2016-08-22 | 2017-01-11 | 珠海市魅族科技有限公司 | Unlocking method, unlocking device and terminal equipment |
CN106485105A (en) * | 2015-09-02 | 2017-03-08 | 成都鼎桥通信技术有限公司 | A kind of method for security protection of terminal system and equipment |
-
2017
- 2017-05-15 CN CN201710339915.9A patent/CN107169328A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101996289A (en) * | 2009-08-24 | 2011-03-30 | 鸿富锦精密工业(深圳)有限公司 | Computer with password boot-up function and boot-up method thereof |
CN102054146A (en) * | 2009-11-06 | 2011-05-11 | 深圳市研祥通讯终端技术有限公司 | Power on password protection method and device |
CN101901320A (en) * | 2010-07-29 | 2010-12-01 | 广东欧珀电子工业有限公司 | Data leakage prevention method for electronic book reader |
CN103164644A (en) * | 2011-12-19 | 2013-06-19 | 联想(北京)有限公司 | Terminal device and starting machine controlling method thereof |
CN103186748A (en) * | 2011-12-29 | 2013-07-03 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and password protection method thereof |
CN102664986A (en) * | 2012-03-21 | 2012-09-12 | 华为终端有限公司 | Cell phone, method for powering on the cell phone and placement of power bottom thereof |
CN102984349A (en) * | 2012-10-31 | 2013-03-20 | 北京小米科技有限责任公司 | Method and device for screen locking code generating and screen unlocking method and screen unlocking device and mobile terminal |
CN103729592A (en) * | 2013-12-26 | 2014-04-16 | 京东方科技集团股份有限公司 | Electronic device and starting method of function interface of electronic device |
CN104182667A (en) * | 2014-08-26 | 2014-12-03 | 广东欧珀移动通信有限公司 | Screen lock based data protection method and device |
CN106485105A (en) * | 2015-09-02 | 2017-03-08 | 成都鼎桥通信技术有限公司 | A kind of method for security protection of terminal system and equipment |
CN105975283A (en) * | 2016-05-27 | 2016-09-28 | 北京小米移动软件有限公司 | Starting method and device for operating system |
CN106203124A (en) * | 2016-06-29 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | Operational approach and operation device, terminal are installed |
CN106326718A (en) * | 2016-08-22 | 2017-01-11 | 珠海市魅族科技有限公司 | Unlocking method, unlocking device and terminal equipment |
Non-Patent Citations (2)
Title |
---|
TEX_NORSEMAN: ""Secure startup,can it be disabled"", 《FORUMS.ANDROIDCENTRAL.COM/LG-V20/741838-SECURE-STARTUP-CAN-DISABLED.HTML》 * |
百度经验: ""苹果手机如何关闭开机密码"", 《HTTPS://JINGYAN.BAIDU.COM/ARTICLE/FEA4511A05E557F7BA91256D.HTML》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111581617A (en) * | 2020-05-18 | 2020-08-25 | 北京字节跳动网络技术有限公司 | Software access method, device, equipment and storage medium |
CN111581617B (en) * | 2020-05-18 | 2023-04-28 | 北京字节跳动网络技术有限公司 | Software access method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104767863B (en) | The unlocking method and terminal of terminal screen | |
CN104966005B (en) | A kind of access control method, and terminal device | |
CN103473494B (en) | A kind of run the method for application, device and terminal unit | |
CN103634294B (en) | Information verifying method and device | |
CN104580167B (en) | A kind of methods, devices and systems transmitting data | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN106709347B (en) | Using the method and device of operation | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN108881103B (en) | Network access method and device | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN107133498A (en) | A kind of privacy application management method and device and mobile terminal | |
CN107395880A (en) | Method for information display, device and terminal | |
CN105389259B (en) | A kind of method, apparatus and system for carrying out Application testing | |
CN104639354B (en) | Router administration method and apparatus | |
CN104573437B (en) | Information authentication method, device and terminal | |
CN107145794A (en) | A kind of data processing method and device and mobile terminal | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN106980439A (en) | The method and device of hiden application icon | |
CN108804915A (en) | Virus method for cleaning, storage device and electric terminal | |
CN105205371A (en) | Locking method and locking device of mobile terminal | |
CN105246075A (en) | Access point connecting method and device | |
CN110062929A (en) | A kind of method, apparatus and terminal showing data | |
CN106940770A (en) | A kind of screen locking method, device and terminal | |
CN104348944A (en) | Caller identification method and caller identification terminal | |
CN103824003B (en) | application program protecting method, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170915 |