CN109409142A - A kind of processing method and electronic equipment - Google Patents
A kind of processing method and electronic equipment Download PDFInfo
- Publication number
- CN109409142A CN109409142A CN201811158161.8A CN201811158161A CN109409142A CN 109409142 A CN109409142 A CN 109409142A CN 201811158161 A CN201811158161 A CN 201811158161A CN 109409142 A CN109409142 A CN 109409142A
- Authority
- CN
- China
- Prior art keywords
- hardware
- electric treatment
- condition
- carried out
- lower electric
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/81—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/4401—Bootstrapping
- G06F9/4406—Loading of operating system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Power Sources (AREA)
Abstract
The embodiment of the present application discloses a kind of processing method, comprising: at least carries out upper electric treatment to the first hardware;If meeting first condition, lower electric treatment at least is carried out to the first hardware;If meeting second condition, lower electric treatment at least is carried out to first hardware, wherein the first condition is different with the second condition.Pass through above-mentioned processing method, known to, after at least carrying out upper electric treatment to the first hardware, by judging whether first condition or the second condition different from the first condition are met, and then lower electric treatment at least is carried out to the first hardware, so that the mode for carrying out lower electric treatment to the first hardware easily facilitates management, and the effect that the first hardware of limitation uses can be realized by way of carrying out lower electric treatment to the first hardware, it can more guarantee the safety and validity of the limitation to the first hardware.
Description
Technical field
This application involves security fields, and in particular to a kind of processing method and electronic equipment.
Background technique
Currently, with the continuous development of society, horizontal this of people's lives is becoming to become better and better, in the daily work of people
Make, in life, more and more uses electronic equipment, and some users are just wished when using electronic equipment to electronics
Corresponding access authority is arranged in equipment, so limit so that other users when in use, to the fractional hardware in electronic equipment
It uses.In the prior art, electronic equipment is arranged merely by operating system in use of the limitation to the hardware on electronic equipment
Fractional hardware access right, management get up not be very convenient.
Summary of the invention
The application provides a kind of processing method and electronic equipment, by the hardware to electronic equipment carry out upper electric treatment and under
The mode of electric treatment realizes the management of the permission to the hardware of electronic equipment.
In order to solve the above-mentioned technical problem, the embodiment of the present application provides a kind of processing method, comprising:
Upper electric treatment at least is carried out to the first hardware;
If meeting first condition, lower electric treatment at least is carried out to the first hardware;
If meeting second condition, lower electric treatment at least is carried out to first hardware, wherein the first condition and institute
State second condition difference.
In some embodiments of the present application, wherein
It is described to meet first condition, comprising: to judge that the first condition meets in an operating system, then carry out at lower electricity
Reason;
It is described to meet second condition, comprising: to judge that the second condition meets before os starting, then carry out lower electricity
Processing.
In some embodiments of the present application, wherein
It is described that upper electric treatment at least is carried out to the first hardware, comprising: upper electric treatment is carried out to multiple hardware;
It is described to meet second condition, lower electric treatment at least is carried out to first hardware, comprising:
Determine the first access authority;
When judging that first access authority meets, lower electric treatment at least is carried out to first hardware, wherein described
First hardware is the fractional hardware in the multiple hardware.
It is described when judging that first access authority meets in some embodiments of the present application, at least to described
One hardware carries out lower electric treatment, comprising:
It keeps other hardware in the multiple hardware in addition to the first hardware to be in power-up state, and the first hardware is carried out
Lower electric treatment.
In some embodiments of the present application, first access authority of determination, comprising:
When operating system is inactive, the first access authority is determined.
In some embodiments of the present application, it is described lower electric treatment at least is carried out to first hardware after, the side
Method further include:
Determine the second access authority, wherein second access authority is to be able to access that the permission of first hardware;
Obtain reboot operation;Lower electric treatment is carried out to the hardware other than the first hardware in the multiple hardware, and right again
The multiple hardware carries out electric treatment;
Based on second access authority, the power-up state of first hardware is kept.
It is described that lower electric treatment at least is carried out to first hardware in some embodiments of the present application, comprising:
The energization pins of first hardware are powered off.
In some embodiments of the present application, before the energization pins to first hardware power off, institute
State method further include:
Control character write-in is used to access the register of first hardware, wherein the institute of the control character to be written
It states register limitation and accesses first hardware.
Present invention also provides a kind of electronic equipment, comprising:
Module is powered on, is used at least carry out upper electric treatment to the first hardware;
Lower electricity module is used at least carry out down the first hardware when meeting first condition by processing module judgement
Electric treatment;
It is also used at least carry out lower electricity to first hardware when meeting second condition by processing module judgement
Processing, wherein the first condition is different with the second condition.
In some embodiments of the present application, wherein
The module that powers at least carries out upper electric treatment to the first hardware, comprising: by the module that powers on to multiple hard
Part carries out electric treatment;
Meeting second condition by processing module judgement, by the lower electric module at least to first hardware
Carry out lower electric treatment, comprising:
The first access authority is determined by the processing module;
When the processing module judges that first access authority meets, by the lower electric module at least to described the
One hardware carries out lower electric treatment, wherein first hardware is the fractional hardware in the multiple hardware.
It can know in the disclosure of above-described embodiment, after at least carrying out upper electric treatment to the first hardware, pass through judgement
Whether first condition or the second condition different from the first condition are met, and then are at least carried out down to the first hardware
Electric treatment, so that the mode for carrying out lower electric treatment to the first hardware easily facilitates management, and can be by carrying out to the first hardware
The mode of lower electric treatment realizes the effect that the first hardware of limitation uses, and can more guarantee the safety of the limitation to the first hardware
And validity.
Detailed description of the invention
Fig. 1 is the flow chart of processing method provided by the embodiments of the present application;
Fig. 2 is the block diagram of electronic equipment provided by the embodiments of the present application.
Specific embodiment
In the following, being described in detail in conjunction with specific embodiment of the attached drawing to the application, but not as the restriction of the application.
It should be understood that various modifications can be made to disclosed embodiments.Therefore, description above should not regard
To limit, and only as the example of embodiment.Those skilled in the art will expect within the scope and spirit of this
Other modifications.
The attached drawing being included in the description and forms part of the description shows embodiment of the disclosure, and with it is upper
What face provided is used to explain the disclosure together to substantially description and the detailed description given below to embodiment of the disclosure
Principle.
By the description of the preferred form with reference to the accompanying drawings to the embodiment for being given as non-limiting example, the application's
These and other characteristic will become apparent.
It is also understood that although the application is described referring to some specific examples, those skilled in the art
Member realizes many other equivalents of the application in which can determine, they have feature as claimed in claim and therefore all
In the protection scope defined by whereby.
When read in conjunction with the accompanying drawings, in view of following detailed description, above and other aspect, the feature and advantage of the disclosure will become
It is more readily apparent.
The specific embodiment of the disclosure is described hereinafter with reference to attached drawing;It will be appreciated, however, that the disclosed embodiments are only
Various ways implementation can be used in the example of the disclosure.Known and/or duplicate function and structure and be not described in detail to avoid
Unnecessary or extra details makes the disclosure smudgy.Therefore, specific structural and functionality disclosed herein is thin
Section is not intended to restrictions, but as just the basis of claim and representative basis be used to instructing those skilled in the art with
Substantially any appropriate detailed construction diversely uses the disclosure.
This specification can be used phrase " in one embodiment ", " in another embodiment ", " in another embodiment
In " or " in other embodiments ", it can be referred to one or more of the identical or different embodiment according to the disclosure.
The embodiment of the present application provides a kind of processing method, comprising:
Upper electric treatment at least is carried out to the first hardware;
If meeting first condition, lower electric treatment at least is carried out to the first hardware;
If meeting second condition, lower electric treatment at least is carried out to first hardware, wherein the first condition and institute
State second condition difference.
Pass through above-mentioned processing method, it is known that, after at least carrying out upper electric treatment to the first hardware, by judging first
Whether condition or the second condition different from the first condition are met, and then are at least carried out at lower electricity to the first hardware
Reason, so that the mode for carrying out lower electric treatment to the first hardware easily facilitates management, and can be by carrying out lower electricity to the first hardware
The mode of processing realizes the effect that the first hardware of limitation uses, and can more guarantee the safety of the limitation to the first hardware and have
Effect property.
In order to better understand above-mentioned technical proposal, the embodiment of the present application is described in detail with reference to the accompanying drawing, such as
Shown in Fig. 1, Fig. 1 is the flow chart of the processing method of the embodiment of the present application, be the treating method comprises:
Step 101: upper electric treatment at least being carried out to the first hardware.Wherein, the first hardware can be one in electronic equipment
A hardware is also possible to first hardware itself and just sets for the independent hardware that can be used together with other electronic equipments
It is standby, here, not being defined to the first hardware.Wherein, upper electric treatment is carried out to the first hardware to be to be able to make described
One hardware is being needed by use, first hardware is able to carry out normal work.
Step 102: if meeting first condition, lower electric treatment at least being carried out to the first hardware.Wherein, to the first hardware into
The lower electric treatment of row is in order to which first hardware can not be used.
In some embodiments of the present application, wherein described to meet first condition, comprising: judge institute in an operating system
First condition satisfaction is stated, then carries out lower electric treatment.Wherein, carrying out lower electric treatment is in order to which the first hardware can not be used.
Meet first condition and can be user and carried out power-off operation, can be the operation system of electronic equipment locating for first hardware
System, which has been completed, to be started and has entered to system, and user carries out shutdown processing.As an example, being a notes in the first hardware
When hard disk in this computer, if starting in laptop, and after entering operating system, user's discovery attempts to pass through
Other communication equipments establish the connection with the laptop of user, and user is in order to avoid the loss of its data in hard disk, directly
It connects and shutdown processing is carried out to laptop, so that hard disk has been carried out lower electric treatment, prevent the data in hard disk by it
Other people read.
Step 103: if meeting second condition, lower electric treatment at least being carried out to first hardware, wherein described first
Condition is different with the second condition.
It is described to meet second condition in some embodiments of the present application, comprising: before os starting described in judgement
Second condition meets, then carries out lower electric treatment.Wherein, meet the user that second condition can be current operation not having using institute
State the permission of the first hardware.As an example, be described in detail so that the first hardware is the USB interface of laptop as an example,
When laptop starts, upper electric treatment is carried out (after carrying out upper electric treatment, if notes to the USB interface of the laptop
The operating system of this computer normally starts, then connection can be established by the USB interface and external equipment, or realize data transmission
Deng), but (be not limited only to power on USB interface) after completing to the powering on of laptop, need user to input it
Possessed web-privilege password Web, user complete input after, confirm the user and do not have using the USB interface permission, then
At this point, just carrying out lower electric treatment to the USB interface that upper electric treatment is completed, that is, normal in the operating system of laptop
After starting, the USB interface of lower electric treatment can not have been carried out by this and external equipment establishes connection, or has realized number
According to transmission etc..
In some embodiments of the present application, wherein described at least to carry out upper electric treatment to the first hardware, comprising: to more
A hardware carries out electric treatment, that is, is not limited only to only carry out upper electric treatment to first hardware;It is described to meet Article 2
Part at least carries out lower electric treatment to first hardware, comprising: determine the first access authority;Judging first access right
When limit meets, lower electric treatment at least is carried out to first hardware, wherein first hardware is the portion in the multiple hardware
Divide hardware.First access authority can not have the permission for accessing first hardware at least, and then described first
When access authority obtains being determined, lower electric treatment at least just is carried out to first hardware, is realized by determining different access
Permission, providing for user's (being also possible to other main bodys) with different access permission makes corresponding to corresponding access authority
Configuration.As an example, being described in detail by taking office computer as an example, when user A uses the office computer, wherein use
Family A is manager, need it is frequent linked up with extraneous, at this point, when user A is using the office computer, by getting user A
Corresponding access authority, the online resource on the office computer can be used by user A;And office electricity is used in user B
When brain, wherein the user B is a common office worker, and routine work is not necessarily to be linked up with the external world, then, user B is done using this
When service message brain, by getting the corresponding access authority of user B, the online resource on the office computer can not be by user B institute
It uses, that is, after getting the corresponding access authority of user B, lower electric treatment has been carried out to the corresponding hardware configuration of online resource,
So that the user B with the access authority can not use the corresponding hardware configuration of online resource.
It is described when judging that first access authority meets in some embodiments of the present application, at least to described
One hardware carries out lower electric treatment, comprising: and keep other hardware in the multiple hardware in addition to the first hardware to be in power-up state,
And lower electric treatment is carried out to the first hardware.In order to convenient for understanding to above-mentioned technical proposal, or by taking office computer as an example,
Above-mentioned technical proposal is described in detail, either when user A or user B state office computer in use,
When starting the office computer, which is to carry out upper electric treatment to multiple hardware on the office computer, and in determination
After the corresponding access authority of user B, since user B corresponding access authority can not use the online of the office computer to provide
Source, in turn, the office computer side corresponding hardware of resource of surfing the Internet to it carry out lower electric treatment, still, the corresponding access right of user B
Limit can not only use online resource, it is, after realizing to the lower electric treatment of first hardware, it can't
Other hardware in addition to first hardware in the multiple hardware carry out lower electric treatment, that is, will not influence described more
The use of other hardware in addition to first hardware in a hardware, guarantee user can the normal use office computer into
The normal office operation of row.
In some embodiments of the present application, first access authority of determination, comprising: when operating system is inactive,
Determine the first access authority.As an example, being still illustrated so that above-mentioned user B is using office computer as an example, at this point, for using
The corresponding access authority of family B, which, which does not allow to access the second hard disk on the office computer also, (can be with multiple hard
Disk), during actual use, after user B clicks the power button of the office computer, which just starts to have it
The multiple hardware having carry out electric treatment, and after completing upper electric treatment, which is just popped up to input access privilege
Window (before the os starting of office computer), to make user input the corresponding access right of user by the window
Limit, after user B has input its corresponding access authority, which has determined the corresponding access authority of user B, in turn
It learns, which does not allow the corresponding hardware of online resource (providing referring to above-described embodiment) using office computer, meanwhile,
Also do not allow to access the second hard disk on the office computer, at this time just to the corresponding hardware of office computer online resource and second
Hard disk carries out lower electric treatment, guarantees that user B can not use the corresponding hardware of online resource and the second hard disk, that is, play limitation
The effect using corresponding hardware of user B.And wherein, it when operating system is inactive, determines the first access authority, is in order to anti-
Only certain hardware corresponding electronic equipment (such as above-mentioned office computer or other electronic equipments) os starting it
Afterwards, the normal use that lower electric treatment influences whether the electronic equipment is being carried out to these hardware on electronic equipment, such as cause be
Situations such as system collapse or shutdown etc., the hardware other than its permission can not be accessed in the user for limiting not permission by realizing
While effect, guarantee the normal use of electronic equipment, improves the usage experience of user.
In some embodiments of the present application, it is described lower electric treatment is carried out to the first hardware after, the method also includes:
Determine the second access authority, wherein second access authority is to be able to access that the permission of first hardware;Behaviour is restarted in acquisition
Make;Lower electric treatment is carried out to the hardware other than the first hardware in the multiple hardware, and the multiple hardware is carried out again
Electric treatment;Based on second access authority, the power-up state of first hardware is kept.As an example, being with the first hardware
A hard disk (hard disk is labeled as concealed hard disk) in electronic equipment in multiple hard disks, electronic equipment is that a desktop computer is
Example, is described in detail, wherein assuming that the desktop computer is the personal computer of user B, user B is hidden in the desktop computer
The classified document of need for confidentiality is stored in secret hard disk, then, when user A uses the desktop computer, user A is merely capable of leading to
It crosses using the corresponding permission of their own (identity of such as temporary visit person) using the desktop computer, user A can be desk-top by this
Computer carries out normal browsing file, video playing or web page access etc., and still, it is desk-top that user A can not view this
File in computer in concealed hard disk;And during user A uses the desktop computer, (having can check that this is desk-top to user B
The permission of concealed hard disk in computer) need to check some data, and the data side is stored in the desktop computer in concealed hard disk,
So at this point, user B can be by operating the desktop computer, such as pass through input password, fingerprint input, Application on Voiceprint Recognition etc.
(do not do clearly limit herein, as long as the desktop computer can be made to can recognize that the identity of user B) mode keeps this desk-top
Computer confirms the access authority of the user B, and then confirmed that (permission can be looked into for the access authority of user B in the desktop computer
See concealed hard disk in the desktop computer) after, the access authority just based on the user B that confirmed restarts the desktop computer,
So that the desktop computer can carry out reappearing upper electric treatment in restarting to multiple hardware in the desktop computer
(including concealed hardware), also, after based on the restarting of the access authority of the user B, which will not be carried out down
Electric treatment obtains corresponding so that the secret hardware can be accessed after the desktop computer restarts in user B
Data.
It is described that lower electric treatment at least is carried out to first hardware, comprising: to described in some embodiments of the present application
The energization pins of first hardware are powered off.Wherein, energization pins can be connected with external circuit on first hardware
The wiring (being also possible to interface) connect, so that external circuit can pass through the energization pins pair to first hardware
First hardware is powered.As an example, when first hardware is the hard disk on computer, then to first hardware
Energization pins powered off, i.e. being powered for electric connection line for the hard disk on the computer, and then just make described
When second condition is satisfied, the hard disk on the computer can not be checked, and since the energization pins of the hard disk have all been powered down,
It and then use the hard disk can only after being re-started upper electric treatment, it is ensured that the hard disk on the computer
Safety, certainly, first hardware can also be USB interface, microphone, sound equipment etc., do not do specific restriction herein.
It is, being powered off by the energization pins to first hardware, it can be ensured that the safety of the first hardware guarantees first
The user that hardware will not had access authority accesses, and guarantees the safety of the first hardware.
In some embodiments of the present application, before the energization pins to first hardware power off, institute
State method further include: control character write-in is used to access the register of first hardware, wherein the control character to be written
Register limitation access first hardware.Wherein, register can be used to temporary instruction, data and address, incite somebody to action
After register of the control character write-in for accessing first hardware, this is written with the register of the control character just
It is accessed that first hardware can be limited.As an example, when user A is handled official business using office computer, only due to user A
It is only a common office worker, and then the corresponding permission using the office computer of the user A can not use online network interface card,
It is exactly to determine that the corresponding permission of user A meets above-mentioned second condition, and then need to carry out down the online network interface card of the office computer
Electric treatment first can carry out write-in control character to the register that can limit online network interface card access, in turn in actual use
It limits the online network interface card by the register of the write-in control character to be accessed, it is possible to further again to this
The energization pins of online network interface card carry out power down process, and then ensure that, when the user A is using the office computer, online network interface card cannot
It is enough to be used.
Present invention also provides a kind of electronic equipment, comprising:
Module 1 is powered on, is used at least carry out upper electric treatment to the first hardware;
Lower electricity module 3 is used at least carry out the first hardware when meeting first condition by the judgement of processing module 2
Lower electric treatment;
It is also used at least carry out down first hardware when meeting second condition by the processing module 2 judgement
Electric treatment, wherein the first condition is different with the second condition.
Above-mentioned electronic equipment passes through processing after at least carrying out upper electric treatment to the first hardware by powering on module 1
Module 2 judges whether first condition or the second condition different from the first condition are met, and then passes through lower electricity again
Module 3 at least carries out lower electric treatment to the first hardware, so that the mode for carrying out lower electric treatment to the first hardware easily facilitates management,
And the effect that the first hardware of limitation uses can be realized by way of carrying out lower electric treatment to the first hardware, can more it guarantee
Safety and validity to the limitation of the first hardware.
In some embodiments of the present application, wherein
It is described to meet first condition, comprising: to judge that the first condition meets in an operating system, then pass through the lower electricity
Module 3 carries out lower electric treatment;
It is described to meet second condition, comprising: to judge that the second condition meets before os starting, then by described
Lower electricity module 3 carries out lower electric treatment.
In some embodiments of the present application, wherein
The module 1 that powers at least carries out upper electric treatment to the first hardware, comprising: by the module 1 that powers on to multiple
Hardware carries out electric treatment;
Meeting second condition by the processing module 2 judgement, it is at least hard to described first by the lower electric module 3
Part carries out lower electric treatment, comprising:
The first access authority is determined by the processing module 2;
When the processing module 2 judges that first access authority meets, by the lower electric module 3 at least to described
First hardware carries out lower electric treatment, wherein first hardware is the fractional hardware in the multiple hardware.
In some embodiments of the present application, the processing module 2 passes through when judging that first access authority meets
The lower electric module 3 at least carries out lower electric treatment to first hardware, comprising:
It keeps other hardware in the multiple hardware in addition to the first hardware to be in power-up state, and passes through the lower electric mould
Block 3 carries out lower electric treatment to the first hardware.
In some embodiments of the present application, the first access authority is determined by the processing module 2, comprising:
When operating system is inactive, the first access authority is determined by the processing module 2.
In some embodiments of the present application, at least first hardware is carried out by the lower electric module 3 described
After lower electric treatment, the method also includes:
The second access authority is determined by the processing module 2, wherein second access authority is described to be able to access that
The permission of first hardware;
Obtain reboot operation;The hardware other than first hardware in the multiple hardware is carried out by the lower electric module 3
Lower electric treatment, and power on module 1 again by described upper electric treatment is carried out to the multiple hardware;
It is based on second access authority by the processing module 2, keeps the power-up state of first hardware.
It is described that at least first hardware is carried out down by the lower electric module 3 in some embodiments of the present application
Electric treatment, comprising:
The energization pins of first hardware are powered off by the lower electric module 3.
In some embodiments of the present application, the power supply of first hardware is drawn by the lower electric module 3 described
Before foot is powered off, the method also includes:
Control character write-in is used to access the register of first hardware by the lower electric module 3, wherein write-in
The register limitation of the control character accesses first hardware.
Although the application is disclosed as above with preferred embodiment, it is not for limiting the application, any this field skill
Art personnel are not departing from spirit and scope, can make possible variation and modification, therefore the guarantor of the application
Shield range should be subject to the range that the claim of this application defined.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
1, computer-readable medium can be by any side including permanent and non-permanent, removable and non-removable media
Method or technology realize that information stores.Information can be computer readable instructions, data structure, the module of program or other numbers
According to.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulates
Data-signal and carrier wave.
2, it will be understood by those skilled in the art that embodiments herein can provide as the production of method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It can be used moreover, the application can be used in the computer that one or more wherein includes computer usable program code
The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Form.
It is apparent to those skilled in the art that for convenience and simplicity of description, the data of foregoing description
The electronic equipment that processing method is applied to, can be with reference to the corresponding description in before-mentioned products embodiment, and details are not described herein.
Above embodiments are only the exemplary embodiment of the application, are not used in limitation the application, the protection scope of the application
It is defined by the claims.Those skilled in the art can make respectively the application in the essence and protection scope of the application
Kind modification or equivalent replacement, this modification or equivalent replacement also should be regarded as falling within the scope of protection of this application.
Claims (10)
1. a kind of processing method, comprising:
Upper electric treatment at least is carried out to the first hardware;
If meeting first condition, lower electric treatment at least is carried out to the first hardware;
If meeting second condition, lower electric treatment at least is carried out to first hardware, wherein the first condition and described
Two conditions are different.
2. processing method according to claim 1, wherein
It is described to meet first condition, comprising: to judge that the first condition meets in an operating system, then carry out lower electric treatment;
It is described to meet second condition, comprising: to judge that the second condition meets before os starting, then carry out at lower electricity
Reason.
3. processing method according to claim 1, wherein
It is described that upper electric treatment at least is carried out to the first hardware, comprising: upper electric treatment is carried out to multiple hardware;
It is described to meet second condition, lower electric treatment at least is carried out to first hardware, comprising:
Determine the first access authority;
When judging that first access authority meets, lower electric treatment at least is carried out to first hardware, wherein described first
Hardware is the fractional hardware in the multiple hardware.
4. processing method according to claim 3, described when judging that first access authority meets, at least to described
First hardware carries out lower electric treatment, comprising:
It keeps other hardware in the multiple hardware in addition to the first hardware to be in power-up state, and lower electricity is carried out to the first hardware
Processing.
5. processing method according to claim 3, first access authority of determination, comprising:
When operating system is inactive, the first access authority is determined.
6. processing method according to claim 3, it is described lower electric treatment at least is carried out to first hardware after, it is described
Method further include:
Determine the second access authority, wherein second access authority is to be able to access that the permission of first hardware;
Obtain reboot operation;Lower electric treatment is carried out to the hardware other than the first hardware in the multiple hardware, and again to described
Multiple hardware carry out electric treatment;
Based on second access authority, the power-up state of first hardware is kept.
7. processing method according to claim 1, described at least to carry out lower electric treatment to first hardware, comprising:
The energization pins of first hardware are powered off.
8. processing method according to claim 7, before the energization pins to first hardware power off,
The method also includes:
Control character write-in is used to access the register of first hardware, wherein the described of the control character to be written and posts
Storage limitation accesses first hardware.
9. a kind of electronic equipment, comprising:
Module is powered on, is used at least carry out upper electric treatment to the first hardware;
Lower electricity module is used at least carry out at lower electricity the first hardware when meeting first condition by processing module judgement
Reason;
It is also used at least carry out at lower electricity first hardware when meeting second condition by processing module judgement
Reason, wherein the first condition is different with the second condition.
10. electronic equipment according to claim 9, wherein
The module that powers at least carries out upper electric treatment to the first hardware, comprising: by it is described power on module to multiple hardware into
Electric treatment on row;
Meeting second condition by processing module judgement, at least first hardware is being carried out by the lower electric module
Lower electric treatment, comprising:
The first access authority is determined by the processing module;
It is at least hard to described first by the lower electric module when the processing module judges that first access authority meets
Part carries out lower electric treatment, wherein first hardware is the fractional hardware in the multiple hardware.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811158161.8A CN109409142B (en) | 2018-09-30 | 2018-09-30 | Processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811158161.8A CN109409142B (en) | 2018-09-30 | 2018-09-30 | Processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109409142A true CN109409142A (en) | 2019-03-01 |
CN109409142B CN109409142B (en) | 2022-06-28 |
Family
ID=65466710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811158161.8A Active CN109409142B (en) | 2018-09-30 | 2018-09-30 | Processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109409142B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1717100A (en) * | 2004-07-02 | 2006-01-04 | 华为技术有限公司 | Legality identification method of mobile terminal user and its mobile terminal |
CN201159891Y (en) * | 2008-02-27 | 2008-12-03 | 李克东 | Computer information security device |
CN103793643A (en) * | 2012-10-30 | 2014-05-14 | 联想(北京)有限公司 | Starting method and electronic device |
CN103886234A (en) * | 2014-02-27 | 2014-06-25 | 浙江诸暨奇创电子科技有限公司 | Safety computer based on encrypted hard disk and data safety control method of safety computer |
US20140323089A1 (en) * | 2013-04-27 | 2014-10-30 | Samsung Electronics Co., Ltd. | Power-off protection method and an apparatus therefor |
US20160036964A1 (en) * | 2014-07-29 | 2016-02-04 | Verizon Patent And Licensing Inc. | Determining that a user is in a vehicle or driving a vehicle based on sensor data gathered by a user device |
CN106096368A (en) * | 2016-06-16 | 2016-11-09 | 成都才智圣有科技有限责任公司 | Computer data storage Anti-theft system |
CN107194289A (en) * | 2017-03-29 | 2017-09-22 | 山东超越数控电子有限公司 | A kind of USB interface permission control device and authority control method |
CN107423591A (en) * | 2016-05-24 | 2017-12-01 | 天津秋海科技有限公司 | A kind of computer information safe safeguard |
-
2018
- 2018-09-30 CN CN201811158161.8A patent/CN109409142B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1717100A (en) * | 2004-07-02 | 2006-01-04 | 华为技术有限公司 | Legality identification method of mobile terminal user and its mobile terminal |
CN201159891Y (en) * | 2008-02-27 | 2008-12-03 | 李克东 | Computer information security device |
CN103793643A (en) * | 2012-10-30 | 2014-05-14 | 联想(北京)有限公司 | Starting method and electronic device |
US20140323089A1 (en) * | 2013-04-27 | 2014-10-30 | Samsung Electronics Co., Ltd. | Power-off protection method and an apparatus therefor |
CN103886234A (en) * | 2014-02-27 | 2014-06-25 | 浙江诸暨奇创电子科技有限公司 | Safety computer based on encrypted hard disk and data safety control method of safety computer |
US20160036964A1 (en) * | 2014-07-29 | 2016-02-04 | Verizon Patent And Licensing Inc. | Determining that a user is in a vehicle or driving a vehicle based on sensor data gathered by a user device |
CN107423591A (en) * | 2016-05-24 | 2017-12-01 | 天津秋海科技有限公司 | A kind of computer information safe safeguard |
CN106096368A (en) * | 2016-06-16 | 2016-11-09 | 成都才智圣有科技有限责任公司 | Computer data storage Anti-theft system |
CN107194289A (en) * | 2017-03-29 | 2017-09-22 | 山东超越数控电子有限公司 | A kind of USB interface permission control device and authority control method |
Non-Patent Citations (2)
Title |
---|
佚名: "如何限制用户权限禁止访问磁盘内容", 《HTTP://WWW.UQIDONG.COM/HELP/1439.HTML》 * |
欧阳晗黎: "内网安全中硬件设备控制的研究与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN109409142B (en) | 2022-06-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chin et al. | Measuring user confidence in smartphone security and privacy | |
US10572639B2 (en) | Selectively providing personal information and access to functionality on lock screen based on biometric user authentication | |
US20210289002A1 (en) | Adaptive offline policy enforcement based on context | |
US10331879B1 (en) | Systems and methods for automatically generating passwords that comply with password restrictions | |
US7877563B2 (en) | Programmable memory device security | |
US9098675B1 (en) | Authorized delegation of permissions | |
EP2696307A1 (en) | System and method for controlling user's access to protected resources using multi-level authentication | |
US9648031B2 (en) | Identifying an imposter account in a social network | |
CN115516453A (en) | Application specific security | |
US10298558B2 (en) | User authentication relying on recurring public events for shared secrets | |
US10885223B2 (en) | Systems and methods for anonymizing user accounts | |
US11003798B1 (en) | Systems and methods for enforcing age-based application constraints | |
US7882547B2 (en) | Securely calling web services from macros | |
CN104704506A (en) | System control | |
CN107409129A (en) | Use the mandate in accesses control list and the distributed system of group | |
CN116070267A (en) | Data security protection method, device, equipment and machine-readable storage medium | |
US20210049297A1 (en) | Cognitively hiding sensitive content on a computing device | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
US20240048562A1 (en) | Sponsor delegation for multi-factor authentication | |
US10552646B2 (en) | System and method for preventing thin/zero client from unauthorized physical access | |
US11144656B1 (en) | Systems and methods for protection of storage systems using decoy data | |
KR20050063174A (en) | Personal terminal with multiple password system and control method thereof | |
CN109409142A (en) | A kind of processing method and electronic equipment | |
US10609013B2 (en) | Twin factor authentication for controller | |
Smith et al. | CompTIA Strata Study Guide Authorized Courseware: Exams FC0-U41, FC0-U11, and FC0-U21 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |