CN109409142B - Processing method and electronic equipment - Google Patents

Processing method and electronic equipment Download PDF

Info

Publication number
CN109409142B
CN109409142B CN201811158161.8A CN201811158161A CN109409142B CN 109409142 B CN109409142 B CN 109409142B CN 201811158161 A CN201811158161 A CN 201811158161A CN 109409142 B CN109409142 B CN 109409142B
Authority
CN
China
Prior art keywords
hardware
power
processing
condition
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811158161.8A
Other languages
Chinese (zh)
Other versions
CN109409142A (en
Inventor
张波
王鹤来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201811158161.8A priority Critical patent/CN109409142B/en
Publication of CN109409142A publication Critical patent/CN109409142A/en
Application granted granted Critical
Publication of CN109409142B publication Critical patent/CN109409142B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/81Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer by operating on the power supply, e.g. enabling or disabling power-on, sleep or resume operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4406Loading of operating system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Power Sources (AREA)

Abstract

The embodiment of the application discloses a processing method, which comprises the following steps: at least carrying out power-on processing on the first hardware; if the first condition is met, at least powering down the first hardware; and at least powering down the first hardware if a second condition is met, wherein the first condition and the second condition are different. By the processing method, after at least the first hardware is subjected to power-on processing, whether the first condition or the second condition different from the first condition is met is judged, and then at least the first hardware is subjected to power-off processing, so that the mode of performing power-off processing on the first hardware is more convenient to manage, the effect of limiting the use of the first hardware is realized by the mode of performing power-off processing on the first hardware, and the safety and the effectiveness of limiting the first hardware can be more ensured.

Description

Processing method and electronic equipment
Technical Field
The present application relates to the field of security, and in particular, to a processing method and an electronic device.
Background
At present, with the continuous development of society, the living standard of people becomes better and better, in daily work and life of people, more and more electronic equipment is used, and some users hope to set corresponding access authority for the electronic equipment when using the electronic equipment, so that the use of partial hardware in the electronic equipment by other users is limited. In the prior art, the use of hardware on the electronic device is limited, and the use permission of part of hardware of the electronic device is only set through an operating system, so that the management is not very convenient.
Disclosure of Invention
The application provides a processing method and electronic equipment, and management of authority of hardware of the electronic equipment is achieved by means of power-on processing and power-off processing of the hardware of the electronic equipment.
In order to solve the foregoing technical problem, an embodiment of the present application provides a processing method, including:
at least carrying out power-on processing on the first hardware;
if the first condition is met, at least powering down the first hardware;
and at least powering down the first hardware if a second condition is met, wherein the first condition and the second condition are different.
In some embodiments of the present application, wherein,
the satisfying of the first condition includes: judging that the first condition is met in an operating system, and performing power-off processing;
the second condition is satisfied, including: and judging that the second condition is met before the operating system is started, and powering off.
In some embodiments of the present application, wherein,
the at least powering on the first hardware comprises: electrifying a plurality of hardware;
the meeting of the second condition, at least performing power-down processing on the first hardware, including:
Determining a first access right;
and when the first access right is judged to be met, at least powering down the first hardware, wherein the first hardware is part of the plurality of hardware.
In some embodiments of the present application, said powering down at least the first hardware when it is determined that the first access right is satisfied includes:
and keeping other hardware except the first hardware in the plurality of hardware in a power-on state, and powering off the first hardware.
In some embodiments of the present application, the determining the first access right includes:
when the operating system is not started, a first access right is determined.
In some embodiments of the present application, after the at least first hardware is powered down, the method further comprises:
determining a second access right, wherein the second access right is a right capable of accessing the first hardware;
obtaining a restart operation; powering off hardware except the first hardware in the plurality of pieces of hardware, and powering on the plurality of pieces of hardware again;
based on the second access right, a power-on state of the first hardware is maintained.
In some embodiments of the present application, said at least powering down said first hardware comprises:
and powering off a power supply pin of the first hardware.
In some embodiments of the present application, prior to said powering down the power supply pin of the first hardware, the method further comprises:
writing a control character to a register for accessing the first hardware, wherein the register to which the control character is written restricts access to the first hardware.
The present application further provides an electronic device, including:
the power-on module is used for performing power-on processing on at least first hardware;
the power-off module is used for at least performing power-off processing on the first hardware when the processing module judges that the first condition is met;
and the processing module is further configured to perform power-down processing on at least the first hardware when it is determined that a second condition is satisfied, where the first condition and the second condition are different.
In some embodiments of the present application, wherein,
the power-on module at least performs power-on processing on first hardware, and comprises the following steps: carrying out power-on processing on a plurality of pieces of hardware through the power-on module;
when the processing module judges that a second condition is met, the power-down module at least performs power-down processing on the first hardware, and the processing method comprises the following steps:
Determining, by the processing module, a first access right;
when the processing module judges that the first access authority is met, at least powering off the first hardware through the powering off module, wherein the first hardware is part of the plurality of pieces of hardware.
The disclosure of the above embodiment may learn that, after at least performing power-on processing on the first hardware, by determining whether the first condition or a second condition different from the first condition is satisfied, and then performing power-off processing on the first hardware, a mode of performing power-off processing on the first hardware is more convenient to manage, an effect of limiting use of the first hardware can be achieved by performing power-off processing on the first hardware, and safety and effectiveness of limiting the first hardware can be more ensured.
Drawings
Fig. 1 is a flowchart of a processing method provided in an embodiment of the present application;
fig. 2 is a block diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
Specific embodiments of the present application will be described in detail below with reference to the accompanying drawings, but the present application is not limited thereto.
It will be understood that various modifications may be made to the embodiments disclosed herein. Accordingly, the foregoing description should not be considered as limiting, but merely as exemplifications of embodiments. Other modifications within the scope and spirit of the present disclosure will occur to those skilled in the art.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the disclosure and, together with a general description of the disclosure given above, and the detailed description of the embodiments given below, serve to explain the principles of the disclosure.
These and other characteristics of the present application will become apparent from the following description of a preferred form of embodiment, given as a non-limiting example, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present disclosure will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present disclosure are described hereinafter with reference to the drawings; however, it is to be understood that the disclosed embodiments are merely examples of the disclosure that may be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the disclosure in unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present disclosure in virtually any appropriately detailed structure.
The description may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the disclosure.
An embodiment of the present application provides a processing method, including:
at least carrying out power-on processing on the first hardware;
if the first condition is met, at least powering down the first hardware;
and at least powering down the first hardware if a second condition is met, wherein the first condition and the second condition are different.
By the processing method, after at least the first hardware is subjected to power-on processing, whether the first condition or the second condition different from the first condition is met is judged, and then at least the first hardware is subjected to power-off processing, so that the mode of performing power-off processing on the first hardware is more convenient to manage, the effect of limiting the use of the first hardware is realized by the mode of performing power-off processing on the first hardware, and the safety and the effectiveness of limiting the first hardware can be more ensured.
In order to better understand the above technical solution, an embodiment of the present application is described in detail below with reference to the accompanying drawings, as shown in fig. 1, fig. 1 is a flowchart of a processing method according to the embodiment of the present application, where the processing method includes:
Step 101: at least the first hardware is powered on. The first hardware may be one of the electronic devices, or the first hardware itself may be an independent hardware device that can be used with other electronic devices, and the first hardware is not limited herein. The power-on processing is carried out on the first hardware, so that the first hardware can normally work when the first hardware needs to be used.
Step 102: and at least powering down the first hardware if the first condition is met. Wherein the first hardware is powered down to be unusable.
In some embodiments of the present application, wherein the satisfying a first condition comprises: and judging that the first condition is met in the operating system, and powering off. Wherein the power-down process is performed so that the first hardware cannot be used. The first condition is satisfied, where the first condition is that the user performs a shutdown operation, and the first condition is that an operating system of the electronic device where the first hardware is located has been started and has entered the system, and the user performs a shutdown process. As an example, when the first hardware is a hard disk in a laptop computer, after the laptop computer is started and enters an operating system, a user finds that someone tries to establish a connection with the laptop computer of the user through other communication devices, and the user directly shuts down the laptop computer to avoid losing data in the hard disk, so that the hard disk is powered off and the data in the hard disk is prevented from being read by other people.
Step 103: and at least powering down the first hardware if a second condition is met, wherein the first condition and the second condition are different.
In some embodiments of the present application, the satisfying a second condition includes: and judging that the second condition is met before the operating system is started, and powering off. Wherein the second condition being satisfied may be that the currently operating user does not have the right to use the first hardware. As an example, taking the first hardware as the USB interface of the notebook computer as an example, a detailed description will be given, when the notebook computer is started, the USB interface of the notebook computer is powered on (after the power-on process is performed, if the operating system of the notebook computer is normally started, a connection with an external device can be established through the USB interface, or data transmission is realized, etc.), but after the power-on of the notebook computer is completed (not only the USB interface is powered on), the user is required to input the authority password that the user has, and after the user completes the input, it is confirmed that the user does not have the authority to use the USB interface, at this time, the power-off process is performed on the USB interface that has been powered on, that is, after the operating system of the notebook computer is normally started, a connection with an external device cannot be established through the USB interface that has been powered off, or to effect data transmission, etc.
In some embodiments of the present application, the performing, by the at least first hardware, a power-up process includes: powering on a plurality of pieces of hardware, namely, the method is not limited to only powering on the first piece of hardware; when the second condition is met, at least powering down the first hardware comprises: determining a first access right; and when the first access authority is judged to be met, at least powering down the first hardware, wherein the first hardware is part of the plurality of pieces of hardware. The first access right may at least not have a right to access the first hardware, and then when the first access right is determined, at least the first hardware is powered off, so that different access rights are determined, and available configurations corresponding to the corresponding access rights are provided for users (or other subjects) with different access rights. As an example, taking an office computer as an example for detailed description, when a user a uses the office computer, wherein the user a is a manager and needs to communicate with the outside frequently, at this time, when the user a uses the office computer, the internet access resource on the office computer can be used by the user a by acquiring the access right corresponding to the user a; when the user B uses the office computer, wherein the user B is a common staff member, daily work does not need to communicate with the outside, and then when the user B uses the office computer, the internet access resource on the office computer cannot be used by the user B by acquiring the access right corresponding to the user B, that is, after the access right corresponding to the user B is acquired, the hardware configuration corresponding to the internet access resource is powered off, so that the user B with the access right cannot use the hardware configuration corresponding to the internet access resource.
In some embodiments of the present application, said powering down at least the first hardware when it is determined that the first access right is satisfied includes: and keeping other hardware except the first hardware in the plurality of hardware in a power-on state, and powering off the first hardware. In order to facilitate understanding of the above technical solution, or take an office computer as an example, the above technical solution is described in detail, when the office computer is started up, no matter the user a or the user B uses the office computer, the office computer performs power-on processing on a plurality of hardware on the office computer, and after determining the access right corresponding to the user B, since the access right corresponding to the user B cannot use the internet-surfing resource of the office computer, the office computer performs power-off processing on the hardware corresponding to the internet-surfing resource, but the access right corresponding to the user B cannot use the internet-surfing resource only, that is, after the power-off processing on the first hardware is implemented, the power-off processing on other hardware except the first hardware in the plurality of hardware is not performed, that is, the use of other hardware except the first hardware in the plurality of hardware is not influenced, and the user can normally use the office computer to carry out normal office operation.
In some embodiments of the application, the determining the first access right includes: when the operating system is not started, a first access right is determined. As an example, it is also explained by taking the above-mentioned user B as an example of using an office computer, at this time, regarding the access right corresponding to the user B, the user B does not yet allow to access a second hard disk (which may have a plurality of hard disks) on the office computer, in the actual use process, after the user B clicks a power-on key of the office computer, the office computer starts to perform power-on processing on a plurality of hardware that the office computer has, after the power-on processing is completed, the office computer pops up a window for inputting the user access right (before the operating system of the office computer is started) so that the user inputs the access right corresponding to the user through the window, after the user B inputs the corresponding access right, the office computer determines the access right corresponding to the user B, and then knows that the user B does not allow to use the hardware corresponding to the internet resource of the office computer (see the above-mentioned embodiment), meanwhile, the second hard disk on the office computer is not allowed to be accessed, and at the moment, the hardware and the second hard disk corresponding to the internet resource of the office computer are powered off, so that the user B is ensured not to be capable of using the hardware and the second hard disk corresponding to the internet resource, namely, the function of limiting the user B to use the corresponding hardware is achieved. When the operating system is not started, the first access right is determined to prevent that after some hardware is started in the operating system of the corresponding electronic device (such as the office computer or other electronic devices), the normal use of the electronic device is affected by powering off the hardware on the electronic device, such as system crash or shutdown, so that the normal use of the electronic device is ensured while the effect that a user without the right cannot access the hardware except the right is limited, and the use experience of the user is improved.
In some embodiments of the present application, after the powering down the first hardware, the method further comprises: determining a second access right, wherein the second access right is a right capable of accessing the first hardware; obtaining a restart operation; powering off hardware except the first hardware in the plurality of pieces of hardware, and powering on the plurality of pieces of hardware again; based on the second access right, a power-on state of the first hardware is maintained. As an example, the details are described by taking the first hardware as one hard disk (the hard disk is labeled as a hidden hard disk) of a plurality of hard disks in the electronic device, and taking the electronic device as a desktop computer, where, assuming that the desktop computer is a private computer of the user B, the user B stores a confidential file to be confidential in the hidden hard disk in the desktop computer, then, when the user a uses the desktop computer, the user a can only use the desktop computer by using its own corresponding authority (such as the identity of a temporary visitor), and the user a can perform normal file browsing, video playing, or web page accessing and the like through the desktop computer, but the user a cannot view the file in the hidden hard disk in the desktop computer; during the period that the user a uses the desktop computer, the user B (having the right to view the hidden hard disk in the desktop computer) needs to view some data, and the data is stored in the hidden hard disk in the desktop computer, at this time, the user B can make the desktop computer confirm the access right of the user B by operating the desktop computer, for example, by inputting a password, a fingerprint input, a voiceprint identification, and the like (which are not explicitly limited, as long as the identity of the user B can be identified by the desktop computer), and then after the desktop computer confirms the access right of the user B (which can view the hidden hard disk in the desktop computer), the desktop computer is restarted based on the confirmed access right of the user B, so that the desktop computer can perform the power-up reproduction processing (including the hidden hardware) on a plurality of hardware in the desktop computer when being restarted, and after the desktop computer is restarted based on the access authority of the user B, the secret hardware cannot be powered off, so that the user B can access the secret hardware to obtain corresponding data after the desktop computer is restarted.
In some embodiments of the present application, said at least powering down said first hardware comprises: and powering off a power supply pin of the first hardware. The power supply pin is a connection (or an interface) which is formed on the first hardware and can be connected with an external circuit, so that the external circuit can supply power to the first hardware through the power supply pin. As an example, when the first hardware is a hard disk on a computer, the power supply pin of the first hardware is powered off, that is, the power supply pin of the hard disk on the computer is not powered on, so that when the second condition is met, the hard disk on the computer cannot be viewed, and since the power supply pin of the hard disk is powered off, the hard disk cannot be used until being powered on again, so that the security of the hard disk on the computer is ensured, of course, the first hardware may also be a USB interface, a microphone, a sound device, and the like, which is not limited explicitly herein. Namely, the power supply pins of the first hardware are powered off, so that the safety of the first hardware can be ensured, the first hardware cannot be accessed by a user without access authority, and the safety of the first hardware is ensured.
In some embodiments of the application, prior to said powering down the power pin of the first hardware, the method further comprises: writing a control character to a register for accessing the first hardware, wherein the register to which the control character is written restricts access to the first hardware. The register can be used for temporarily storing instructions, data and addresses, and after a control character is written into the register for accessing the first hardware, the register written with the control character can limit the first hardware to be accessed. As an example, when the user a uses an office computer to work, because the user a is only a common staff member, and further the right of using the office computer corresponding to the user a cannot use the internet access card, that is, it is determined that the right corresponding to the user a satisfies the second condition, and further the internet access card of the office computer needs to be powered off, in actual use, a control character may be written into a register that can limit access to the internet access card, and then the register that writes the control character limits access to the internet access card, and further, the power supply pin of the internet access card may be powered off again, so that it is ensured that the internet access card cannot be used when the user a uses the office computer.
The present application further provides an electronic device, including:
a power-on module 1, which is used for at least performing power-on processing on first hardware;
the power-down module 3 is used for at least performing power-down processing on the first hardware when the processing module 2 judges that the first condition is met;
and is further configured to, when it is determined by the processing module 2 that a second condition is satisfied, perform power down processing on at least the first hardware, where the first condition is different from the second condition.
After the power-on module 1 at least powers on the first hardware, the electronic device judges whether the first condition or a second condition different from the first condition is met or not through the processing module 2, and then at least powers off the first hardware through the power-off module 3, so that the mode of powering off the first hardware is more convenient to manage, the effect of limiting the use of the first hardware can be realized through the mode of powering off the first hardware, and the safety and the effectiveness of limiting the first hardware can be more ensured.
In some embodiments of the present application, wherein,
the first condition is satisfied, including: if the first condition is judged to be met in the operating system, the power-off module 3 is used for performing power-off processing;
The second condition is satisfied, including: and when the second condition is judged to be met before the operating system is started, performing power-off processing through the power-off module 3.
In some embodiments of the present application, wherein,
the power-on module 1 at least performs power-on processing on first hardware, and includes: the power-on module 1 is used for carrying out power-on processing on a plurality of pieces of hardware;
when the processing module 2 determines that a second condition is met, the power-down module 3 at least performs power-down processing on the first hardware, including:
determining, by the processing module 2, a first access right;
when the processing module 2 determines that the first access right is satisfied, at least powering down the first hardware by the powering down module 3, where the first hardware is a part of the plurality of hardware.
In some embodiments of the present application, when determining that the first access right is satisfied, the processing module 2 performs power-down processing on at least the first hardware through the power-down module 3, where the power-down processing includes:
and keeping other hardware except the first hardware in the plurality of hardware in a power-on state, and performing power-off processing on the first hardware through the power-off module 3.
In some embodiments of the present application, determining, by the processing module 2, the first access right includes:
when the operating system is not started, the processing module 2 determines a first access right.
In some embodiments of the present application, after the at least the first hardware is powered down by the power down module 3, the method further comprises:
determining a second access right through the processing module 2, wherein the second access right is a right capable of accessing the first hardware;
obtaining a restart operation; powering off the hardware except the first hardware in the plurality of pieces of hardware by the power-off module 3, and powering on the plurality of pieces of hardware by the power-on module 1 again;
and keeping the power-on state of the first hardware through the processing module 2 based on the second access right.
In some embodiments of the present application, the powering down at least the first hardware by the powering down module 3 includes:
and powering off a power supply pin of the first hardware through the power-down module 3.
In some embodiments of the present application, before the powering down the power supply pin of the first hardware by the power down module 3, the method further comprises:
Writing, by the power down module 3, a control character to a register for accessing the first hardware, wherein the register to which the control character is written restricts access to the first hardware.
Although the present application has been described with reference to the preferred embodiments, it is not intended to limit the present application, and those skilled in the art can make variations and modifications without departing from the spirit and scope of the present application, therefore, the scope of the present application should be determined by the claims that follow.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
1. Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
2. As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the electronic device to which the data processing method described above is applied may refer to the corresponding description in the foregoing product embodiments, and details are not repeated herein.
The above embodiments are only exemplary embodiments of the present application, and are not intended to limit the present application, and the protection scope of the present application is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present application and such modifications and equivalents should also be considered to be within the scope of the present application.

Claims (6)

1. A method of processing, comprising:
At least carrying out power-on processing on the first hardware;
if the first condition is met, at least powering down the first hardware;
powering down at least the first hardware if a second condition is met, wherein the first condition and the second condition are different;
wherein, the at least powering on the first hardware comprises:
electrifying a plurality of pieces of hardware of the electronic equipment;
wherein the meeting of the second condition, at least powering down the first hardware, comprises:
determining a first access right; wherein the first access right is a right without access to the first hardware;
when the first access right is judged to be satisfied, keeping other hardware except the first hardware in the plurality of hardware in a power-on state, and powering down the first hardware, wherein the first hardware is part of the plurality of hardware,
after the at least first hardware is powered down, the method further comprises:
determining a second access right, wherein the second access right is a right capable of accessing the first hardware;
obtaining a restart operation; powering off hardware except the first hardware in the plurality of pieces of hardware, and powering on the plurality of pieces of hardware again;
Based on the second access right, a power-on state of the first hardware is maintained.
2. The processing method according to claim 1,
the first condition is satisfied, including: judging that the first condition is met in an operating system, and performing power-off processing;
the second condition is satisfied, including: and judging that the second condition is met before the operating system is started, and powering off.
3. The processing method of claim 1, the determining a first access right, comprising:
when the operating system is not started, a first access right is determined.
4. The processing method of claim 1, the powering down at least the first hardware comprising:
and powering off a power supply pin of the first hardware.
5. The processing method of claim 4, prior to the powering down the power pin of the first hardware, the method further comprising:
writing a control character to a register for accessing the first hardware, wherein the register written to the control character restricts access to the first hardware.
6. An electronic device, comprising:
the power-on module is used for performing power-on processing on at least first hardware;
The power-off module is used for at least performing power-off processing on the first hardware when the processing module judges that the first condition is met;
the processing module is further configured to perform power-down processing on at least the first hardware when it is determined that a second condition is satisfied, where the first condition and the second condition are different;
the power-on module at least performs power-on processing on first hardware, and the power-on processing includes: carrying out power-on processing on a plurality of pieces of hardware of the electronic equipment through the power-on module;
wherein, when the processing module determines that the second condition is satisfied, the power-down module at least performs power-down processing on the first hardware, including:
determining, by the processing module, a first access right; wherein the first access right is a right without access to the first hardware;
when the processing module judges that the first access authority is met, keeping other hardware except the first hardware in the plurality of hardware in a power-on state, and performing power-off processing on the first hardware through the power-off module, wherein the first hardware is part of the plurality of hardware,
after the at least first hardware is powered off, the processing module determines a second access right, wherein the second access right is a right capable of accessing the first hardware; performing power-off processing on hardware other than the first hardware in the plurality of pieces of hardware through the power-off module, and performing power-on processing on the plurality of pieces of hardware through the power-on module again; maintaining, by the processing module, a powered-on state of the first hardware based on the second access permission.
CN201811158161.8A 2018-09-30 2018-09-30 Processing method and electronic equipment Active CN109409142B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811158161.8A CN109409142B (en) 2018-09-30 2018-09-30 Processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811158161.8A CN109409142B (en) 2018-09-30 2018-09-30 Processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN109409142A CN109409142A (en) 2019-03-01
CN109409142B true CN109409142B (en) 2022-06-28

Family

ID=65466710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811158161.8A Active CN109409142B (en) 2018-09-30 2018-09-30 Processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN109409142B (en)

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100450270C (en) * 2004-07-02 2009-01-07 华为技术有限公司 Legality identification method of mobile terminal user and its mobile terminal
CN201159891Y (en) * 2008-02-27 2008-12-03 李克东 Computer information security device
CN103793643A (en) * 2012-10-30 2014-05-14 联想(北京)有限公司 Starting method and electronic device
US20140323089A1 (en) * 2013-04-27 2014-10-30 Samsung Electronics Co., Ltd. Power-off protection method and an apparatus therefor
CN103886234B (en) * 2014-02-27 2017-01-04 浙江诸暨奇创电子科技有限公司 A kind of fail-safe computer based on encryption hard disk and data security control method thereof
US9258409B1 (en) * 2014-07-29 2016-02-09 Verizon Patent And Licensing Inc. Determining that a user is in a vehicle or driving a vehicle based on sensor data gathered by a user device
CN107423591A (en) * 2016-05-24 2017-12-01 天津秋海科技有限公司 A kind of computer information safe safeguard
CN106096368A (en) * 2016-06-16 2016-11-09 成都才智圣有科技有限责任公司 Computer data storage Anti-theft system
CN107194289A (en) * 2017-03-29 2017-09-22 山东超越数控电子有限公司 A kind of USB interface permission control device and authority control method

Also Published As

Publication number Publication date
CN109409142A (en) 2019-03-01

Similar Documents

Publication Publication Date Title
US7877563B2 (en) Programmable memory device security
US10181041B2 (en) Methods, systems, and apparatuses for managing a hard drive security system
EP2161673A1 (en) Method and system for protecting data
US20060004974A1 (en) Portable non-volatile memory device and method for preventing unauthorized access to data stored thereon
US8695104B2 (en) System and method for creating conditional immutable objects in a storage device
TW201337580A (en) Techniques to apply and share remote policies on mobile devices
EP3425846A1 (en) Authorization method and device for joint account, and authentication method and device for joint account
US20070124600A1 (en) Work system with an automatic OS login function and method for using the same
US6976172B2 (en) System and method for protected messaging
TWI779230B (en) Method, system, device and device for enabling biometric application function
CN116070267A (en) Data security protection method, device, equipment and machine-readable storage medium
US10069825B2 (en) Electronic device identification
JP2007272506A (en) Authentication system, authentication information management apparatus, authentication information distribution method and computer program
CN109409142B (en) Processing method and electronic equipment
Kharade et al. Setting barrier to removable drive through password protection for data security
KR20050063174A (en) Personal terminal with multiple password system and control method thereof
US11232220B2 (en) Encryption management for storage devices
US20070168582A1 (en) Method for protecting an i/o port of a computer
JP2009245079A (en) Information terminal device and information processing method
KR20110023685A (en) Solid state disk with authentication function and driving method thereof
US20090235365A1 (en) Data access system
CN113051533A (en) Safety management method of terminal equipment
KR20080088911A (en) New data storage card, interface device and method by memory's bad pattern
JP4434428B2 (en) Information terminal equipment
US20240012889A1 (en) Secure processor performing user authentication, and electronic device including the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant