CN113378216A - eMMC control method, system and storage medium thereof - Google Patents

eMMC control method, system and storage medium thereof Download PDF

Info

Publication number
CN113378216A
CN113378216A CN202110595576.7A CN202110595576A CN113378216A CN 113378216 A CN113378216 A CN 113378216A CN 202110595576 A CN202110595576 A CN 202110595576A CN 113378216 A CN113378216 A CN 113378216A
Authority
CN
China
Prior art keywords
password
data
hidden area
user
area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110595576.7A
Other languages
Chinese (zh)
Inventor
任鸣
罗挺
吴大畏
李晓强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yeestor Microelectronics Co ltd
Original Assignee
Yeestor Microelectronics Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yeestor Microelectronics Co ltd filed Critical Yeestor Microelectronics Co ltd
Priority to CN202110595576.7A priority Critical patent/CN113378216A/en
Publication of CN113378216A publication Critical patent/CN113378216A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an eMMC control method, a system and a storage medium thereof, wherein the eMMC control method comprises the following steps: after the terminal is powered on, acquiring a power-on password of a user at the terminal; when the write operation of a user is acquired, writing data into a storage area; when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed. The method and the device have the effects that the terminal can be used by most people, and the privacy of partial data is guaranteed.

Description

eMMC control method, system and storage medium thereof
Technical Field
The invention relates to the field of data storage, in particular to an eMMC control method and system with an encryption function and a storage medium thereof.
Background
When the current terminal protects data, a password is usually set when the terminal is started, and the data of the terminal can be browsed only through the verification of the start password.
The above prior art solutions have the following drawbacks: in some cases, only a small portion of the terminal is not shown to all, but only the person who enters the correct password can read the data in the terminal due to the power-on password, so that the number of users who can use the terminal is very limited.
Disclosure of Invention
In order to make a terminal usable by most people and to ensure privacy of part of data, the present application provides an eMMC control method having an encryption function.
In a first aspect, the eMMC control method provided in the present application adopts the following technical solution:
an eMMC control method, comprising: after the terminal is powered on, acquiring a power-on password of a user at the terminal; when the write operation of a user is acquired, writing data into a storage area; when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
By adopting the technical scheme, only when the input power-on password is the same as the preset verification password, the data to be hidden can be written into the hidden area, and other users who do not input the correct power-on password can only store the data into the conventional storage area. The data privacy of the user who inputs the power-on password correctly is ensured.
Optionally, the method further includes: when a user reads the operation, displaying the data of the storage area on the terminal;
when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, when the user enters the terminal after inputting the password correctly, the data in the hidden area can be directly seen, and the password does not need to be input additionally, so that the data reading is more convenient. And when the user inputs the password incorrectly, the hidden area is not displayed, so that the data in the hidden area is not acquired by the user, and the privacy of the data is improved.
Optionally, the method further includes: when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, after the user inputs the power-on password incorrectly, the terminal provides a way for determining whether the user can read the hidden data or not through the authentication information, and provides another way for reading the hidden data for the user.
Optionally, when the user resets the verification password, if the verification password is reset, the data in the hidden area is deleted, and if the verification password is not reset, the hidden area is not operated.
By adopting the technical scheme, after the verification password is modified, the data in the hidden area are directly deleted, so that the steps that the user needs to delete the data in the hidden area one by one are reduced, the operation flow of the user is reduced, and the operation efficiency is improved.
In a second aspect, the present application provides an eMMC control system, which adopts the following technical solution:
an eMMC control system, comprising: the terminal comprises a power-on password acquisition module, a power-on password acquisition module and a power-on password acquisition module, wherein the power-on password acquisition module is used for acquiring a power-on password input by a user in the terminal after the terminal is powered on; the writing module is used for writing data into the storage area when the user writing operation is acquired; the password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
By adopting the technical scheme, only when the input power-on password is the same as the preset verification password, the data to be hidden can be written into the hidden area, and other users who do not input the correct power-on password can only store the data into the conventional storage area. The data privacy of the user who inputs the power-on password correctly is ensured.
Optionally, the method includes: the reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data; the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, when the user enters the terminal after inputting the password correctly, the data in the hidden area can be directly seen, and the password does not need to be input additionally, so that the data reading is more convenient. And when the user inputs the password incorrectly, the hidden area is not displayed, so that the data in the hidden area is not acquired by the user, and the privacy of the data is improved.
Optionally, the method includes: the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, after the user inputs the power-on password incorrectly, the terminal provides a way for determining whether the user can read the hidden data or not through the authentication information, and provides another way for reading the hidden data for the user.
Optionally, the method includes: and the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
By adopting the technical scheme, after the verification password is modified, the data in the hidden area are directly deleted, so that the steps that the user needs to delete the data in the hidden area one by one are reduced, the operation flow of the user is reduced, and the operation efficiency is improved.
In a third aspect, the present application provides a computer readable storage medium storing a computer program that is loadable by a processor and operable to execute one of the eMMC control methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. only the user who inputs the boot password and the verification password are the same can store the data into the hidden area;
2. the user who inputs the boot password and the verification password are the same can read the data in the hidden area, so that the privacy of the data is improved, and the operation of other users on the data in the storage area is not influenced;
3. when the authentication information is the same as the verification information, the data in the hidden area can be displayed, and another way for a user to read the data in the hidden area is provided.
Drawings
Fig. 1 is a schematic flow chart of an eMMC control method according to an embodiment of the present application;
fig. 2 is a block diagram of an eMMC control system according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.
An embodiment of the present invention provides an eMMC control method, which includes, in combination with fig. 1, the following steps:
s101: and after the terminal is powered on, acquiring a power-on password of the user at the terminal.
In the embodiment of the application, the terminal can be any device with a storage function, such as a mobile phone, a television box, a vehicle event recorder and the like. The boot password may be a character password or biometric information of a person, such as facial identification information, fingerprint identification information, and the like. The character password and the biological identification information can be used as the starting password together. Taking a mobile phone as an example, when the boot password is a character password, after the boot screen of the terminal is displayed, the password input box is displayed on the display screen to prompt the user to input the password, when the display screen is a touch screen, the soft keyboard is displayed on the display screen for the user to input the password, and when the display screen does not have a touch function, the user can input the password through the physical keyboard.
S102: and writing data into the storage area when the user writing operation is acquired.
In the embodiment of the application, after the user inputs the power-on password, the user can write the data into the storage area no matter whether the power-on password is correct or not. The memory area includes a memory area in the central control chip (for example, a read-only memory area ROM in the central control chip) and an embedded multimedia card eMMC built in the terminal.
S103: when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
In the embodiment of the present application, the authentication password may be stored in a Flash memory (a non-volatile memory) of the terminal in advance. When a user inputs a power-on password, the eMMC controller calls a verification password in the Flash memory, the power-on password is compared with the verification password, when the power-on password is the same as a preset verification password, a display screen of the terminal displays a prompt for inquiring whether a data prompt box written in a storage area is hidden or not, and the user selects whether a prompt is sent to the prompt box according to the requirement of the user. If the user selects yes, the data is copied to the hidden area after being encrypted, the data in the original storage area is deleted, and if the user selects no, the data is not moved and is reserved in the storage area. In some embodiments, the operation of encrypting and copying data from the storage area to the hidden area and deleting data in the original storage area may not be performed when the user performs the writing operation, that is, the user may perform the above operation on data already stored in the storage area to hide data originally displayed by all people. When the boot password is different from the preset verification password, the written data is not processed, specifically, the terminal does not display a data prompt box for inquiring whether to hide the written storage area on the display screen, so that a user who inputs the boot password incorrectly writes the data into the storage area normally without knowing that the hidden area exists.
The eMMC control method further comprises the following steps:
s201: and when the user reads the operation, displaying the data in the storage area on the terminal.
S202: when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
In the embodiment of the application, when the boot password is the same as the preset verification password, the terminal displays the specific representation form of the hidden area on the display screen as an icon corresponding to the data in the hidden area, or displays the icon corresponding to the folder by taking the folder as the hidden area for storing the data. The icon of the data in the hidden area or the folder corresponding to the hidden area may be displayed in the same manner as the icon of the data in the storage area, and in order to distinguish the data in the hidden area from the data in the storage area, the icon may be displayed in a semi-transparent state, or a pattern of the icon may be marked, or a name of the folder corresponding to the hidden area or a name of the data in the hidden area may be marked by adding characters. When the boot password is different from the preset verification password, the icons of the folders corresponding to the hidden area and the icons corresponding to the data in the hidden area are not displayed, so that users who input the boot password incorrectly do not know the existence of the hidden area.
The eMMC control method further comprises the following steps:
s301: when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
In the embodiment of the application, an authentication frame for authenticating user information is displayed on a display screen of the terminal, the authentication information may be fixed information, such as fixed characters, the user may be asked questions in the form of questions in the authentication frame, an input frame is provided below the questions for the user to input answers, and when the answers input by the user are the same as the passwords stored in the terminal, the authentication information is the same as the preset authentication information. In some embodiments, the verification information may also be dynamic information, for example, the terminal obtains a dynamic password from the server through the communication module, the server sends the dynamic password to the communication device of the user, and an input box for inputting the dynamic password is displayed in a display screen of the terminal, when the dynamic password input by the user is the same as the dynamic password obtained by the terminal, that is, the authentication information is the same as the preset verification information. When the authentication information is the same as the preset verification information, the hidden area is displayed, the data in the hidden area can be read, but the data can only be read and can not be written in because the power-on password input by the user is different from the verification password.
The eMMC control method further comprises the following steps:
s401: and when the operation of resetting the verification password by the user is obtained, if the verification password is reset, deleting the data in the hidden area, and if the verification password is not reset, not operating the hidden area.
In the embodiment of the application, a reset icon of the reset password is displayed on a display screen of the terminal, when a user clicks the reset icon, a reset frame is displayed on the display screen, the original verification password and the reset verification password need to be input into the reset frame, and when the original verification password is input correctly, the input reset verification password is used as a new verification password. After the password reset is verified, all data in the hidden area are deleted, the workload of a user for deleting the data in the hidden area can be reduced, and the efficiency is improved.
The embodiment of the application also provides an eMMC control system, and the eMMC control system corresponds to the eMMC control methods in the embodiment one to one. As shown in fig. 2, the eMMC control system includes a power-on password obtaining module, a writing module, a password verifying module, a reading module, an information verifying module, and a resetting module. The functional modules are explained in detail as follows:
and the power-on password acquisition module is used for acquiring the power-on password input by the user at the terminal after the terminal is powered on.
And the writing module is used for writing data into the storage area when the user writing operation is acquired.
The password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; when the boot password is different from the preset verification password, the written data is not processed;
the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
The reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data;
the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
And the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
The eMMC control system can be applied to equipment such as mobile phones, television boxes, automobile data recorders and the like, wherein two file systems are divided into the equipment for use, one file system is a file system of a normal storage area and can be seen by anyone; the other is a file system of the hidden area, which is visible only to those who know that the hidden area exists and know the power-on password.
In some embodiments, the present application further provides a computer-readable storage medium storing a computer program that is loadable by a processor and operable to perform one of the eMMC control methods described above.
The computer-readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.

Claims (9)

1. An eMMC control method, comprising:
after the terminal is powered on, acquiring a power-on password of a user at the terminal;
when the write operation of a user is acquired, writing data into a storage area;
when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
2. The eMMC control method of claim 1, further comprising:
when a user reads the operation, displaying the data of the storage area on the terminal;
when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
3. The eMMC control method of claim 1 or 2, further comprising:
when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
4. The eMMC control method of any one of claims 1-3, wherein when the user resets the authentication password, data in the hidden area is deleted if the authentication password is reset, and the hidden area is not operated if the authentication password is not reset.
5. An eMMC control system, comprising:
the terminal comprises a power-on password acquisition module, a power-on password acquisition module and a power-on password acquisition module, wherein the power-on password acquisition module is used for acquiring a power-on password input by a user in the terminal after the terminal is powered on;
the writing module is used for writing data into the storage area when the user writing operation is acquired;
the password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
6. The eMMC control system of claim 5, comprising:
the reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data;
the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
7. The eMMC control system of claim 5 or 6, comprising:
the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
8. The eMMC control system of any one of claims 5-7, comprising:
and the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
9. A computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 4.
CN202110595576.7A 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof Pending CN113378216A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110595576.7A CN113378216A (en) 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110595576.7A CN113378216A (en) 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof

Publications (1)

Publication Number Publication Date
CN113378216A true CN113378216A (en) 2021-09-10

Family

ID=77574865

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110595576.7A Pending CN113378216A (en) 2021-05-29 2021-05-29 eMMC control method, system and storage medium thereof

Country Status (1)

Country Link
CN (1) CN113378216A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201072A (en) * 2010-03-22 2011-09-28 英属开曼群岛商康帝国际科技股份有限公司 System and method for managing storage device
CN103927652A (en) * 2013-01-15 2014-07-16 周宏建 Portable electronic transaction device
CN103971719A (en) * 2013-01-31 2014-08-06 山东先行电子信息技术有限公司 Password memory protection UK disk
CN104715207A (en) * 2013-12-16 2015-06-17 航天信息股份有限公司 Method for storing files through secret key on android platform
CN106156573A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 A kind of method controlling intelligent terminal and the device of control intelligent terminal
CN107818028A (en) * 2017-04-26 2018-03-20 西安航空学院 A kind of computer data backup and restoring method
CN108171025A (en) * 2017-12-08 2018-06-15 深圳市金立通信设备有限公司 Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN110069934A (en) * 2018-01-23 2019-07-30 群联电子股份有限公司 Storage system, host system verification method and memory storage apparatus
CN110807186A (en) * 2019-11-06 2020-02-18 杭州华澜微电子股份有限公司 Method, device, equipment and storage medium for safe storage of storage equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102201072A (en) * 2010-03-22 2011-09-28 英属开曼群岛商康帝国际科技股份有限公司 System and method for managing storage device
CN103927652A (en) * 2013-01-15 2014-07-16 周宏建 Portable electronic transaction device
CN103971719A (en) * 2013-01-31 2014-08-06 山东先行电子信息技术有限公司 Password memory protection UK disk
CN104715207A (en) * 2013-12-16 2015-06-17 航天信息股份有限公司 Method for storing files through secret key on android platform
CN106156573A (en) * 2015-04-13 2016-11-23 阿里巴巴集团控股有限公司 A kind of method controlling intelligent terminal and the device of control intelligent terminal
CN107818028A (en) * 2017-04-26 2018-03-20 西安航空学院 A kind of computer data backup and restoring method
CN109840435A (en) * 2017-11-27 2019-06-04 深圳市朗科科技股份有限公司 A kind of data guard method storing equipment
CN108171025A (en) * 2017-12-08 2018-06-15 深圳市金立通信设备有限公司 Implementation method, terminal and the computer readable storage medium of multi-user login pattern
CN110069934A (en) * 2018-01-23 2019-07-30 群联电子股份有限公司 Storage system, host system verification method and memory storage apparatus
CN108563933A (en) * 2018-04-19 2018-09-21 Oppo广东移动通信有限公司 Control method, device, storage medium and the mobile terminal of application program
CN110807186A (en) * 2019-11-06 2020-02-18 杭州华澜微电子股份有限公司 Method, device, equipment and storage medium for safe storage of storage equipment

Similar Documents

Publication Publication Date Title
US8566611B2 (en) Electronic device, unlocking method, and program
CN108171025B (en) Method for realizing multi-user login mode, terminal and computer readable storage medium
CN110659512B (en) Picture management method, device, terminal and storage medium
CN105760737A (en) Control method for applications and terminal
CN105701420B (en) A kind of management method and terminal of user data
US20030145182A1 (en) Data storage apparatus, data storing method, data verification apparatus, data access permission apparatus, and program and storage medium therefor
CN102968587A (en) Electronic equipment and method for retrieving unlocking information of electronic equipment
US20060047783A1 (en) Methods and apparatuses for automatically selecting a profile
CN107506721A (en) A kind of more method for collecting iris and system
JP2001202484A (en) Security management system and its program storage medium
US8190813B2 (en) Terminal apparatus with restricted non-volatile storage medium
US20130174227A1 (en) Computer-readable medium, information processing device, information processing method and information processing system
JP2022002103A (en) Privacy protecting method and protecting device for mobile terminal and mobile terminal
KR20050063174A (en) Personal terminal with multiple password system and control method thereof
JP2007528035A (en) Smart card for storing invisible signatures
JP2006018848A (en) Detachable device
JP2001117661A (en) Portable information terminal equipment and program recording medium for the same
JP2009181218A (en) Authentication device, authentication method and program
CN113378216A (en) eMMC control method, system and storage medium thereof
CN105871840A (en) Certificate management method and system
CN111614832B (en) Operation mode switching method and device, storage medium and related equipment
CN110851881B (en) Security detection method and device for terminal equipment, electronic equipment and storage medium
JP2005234809A (en) Attachable/detachable external storage device and automatic start program
CN112989379A (en) Key protection implementation method and device and electronic equipment
CA2804465C (en) Methods and systems for increasing the security of electronic messages

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518000 area a, 7th floor, building A1, Shenzhen digital technology park, 17 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Deyi Microelectronics Co.,Ltd.

Address before: 518000 area a, 7th floor, building A1, Shenzhen digital technology park, 17 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: YEESTOR MICROELECTRONICS Co.,Ltd.

CB02 Change of applicant information