CN113378216A - eMMC control method, system and storage medium thereof - Google Patents
eMMC control method, system and storage medium thereof Download PDFInfo
- Publication number
- CN113378216A CN113378216A CN202110595576.7A CN202110595576A CN113378216A CN 113378216 A CN113378216 A CN 113378216A CN 202110595576 A CN202110595576 A CN 202110595576A CN 113378216 A CN113378216 A CN 113378216A
- Authority
- CN
- China
- Prior art keywords
- password
- data
- hidden area
- user
- area
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000012795 verification Methods 0.000 claims abstract description 91
- 238000004590 computer program Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 2
- 230000006870 function Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000001815 facial effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Databases & Information Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
The invention relates to an eMMC control method, a system and a storage medium thereof, wherein the eMMC control method comprises the following steps: after the terminal is powered on, acquiring a power-on password of a user at the terminal; when the write operation of a user is acquired, writing data into a storage area; when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed. The method and the device have the effects that the terminal can be used by most people, and the privacy of partial data is guaranteed.
Description
Technical Field
The invention relates to the field of data storage, in particular to an eMMC control method and system with an encryption function and a storage medium thereof.
Background
When the current terminal protects data, a password is usually set when the terminal is started, and the data of the terminal can be browsed only through the verification of the start password.
The above prior art solutions have the following drawbacks: in some cases, only a small portion of the terminal is not shown to all, but only the person who enters the correct password can read the data in the terminal due to the power-on password, so that the number of users who can use the terminal is very limited.
Disclosure of Invention
In order to make a terminal usable by most people and to ensure privacy of part of data, the present application provides an eMMC control method having an encryption function.
In a first aspect, the eMMC control method provided in the present application adopts the following technical solution:
an eMMC control method, comprising: after the terminal is powered on, acquiring a power-on password of a user at the terminal; when the write operation of a user is acquired, writing data into a storage area; when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
By adopting the technical scheme, only when the input power-on password is the same as the preset verification password, the data to be hidden can be written into the hidden area, and other users who do not input the correct power-on password can only store the data into the conventional storage area. The data privacy of the user who inputs the power-on password correctly is ensured.
Optionally, the method further includes: when a user reads the operation, displaying the data of the storage area on the terminal;
when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, when the user enters the terminal after inputting the password correctly, the data in the hidden area can be directly seen, and the password does not need to be input additionally, so that the data reading is more convenient. And when the user inputs the password incorrectly, the hidden area is not displayed, so that the data in the hidden area is not acquired by the user, and the privacy of the data is improved.
Optionally, the method further includes: when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, after the user inputs the power-on password incorrectly, the terminal provides a way for determining whether the user can read the hidden data or not through the authentication information, and provides another way for reading the hidden data for the user.
Optionally, when the user resets the verification password, if the verification password is reset, the data in the hidden area is deleted, and if the verification password is not reset, the hidden area is not operated.
By adopting the technical scheme, after the verification password is modified, the data in the hidden area are directly deleted, so that the steps that the user needs to delete the data in the hidden area one by one are reduced, the operation flow of the user is reduced, and the operation efficiency is improved.
In a second aspect, the present application provides an eMMC control system, which adopts the following technical solution:
an eMMC control system, comprising: the terminal comprises a power-on password acquisition module, a power-on password acquisition module and a power-on password acquisition module, wherein the power-on password acquisition module is used for acquiring a power-on password input by a user in the terminal after the terminal is powered on; the writing module is used for writing data into the storage area when the user writing operation is acquired; the password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
By adopting the technical scheme, only when the input power-on password is the same as the preset verification password, the data to be hidden can be written into the hidden area, and other users who do not input the correct power-on password can only store the data into the conventional storage area. The data privacy of the user who inputs the power-on password correctly is ensured.
Optionally, the method includes: the reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data; the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, when the user enters the terminal after inputting the password correctly, the data in the hidden area can be directly seen, and the password does not need to be input additionally, so that the data reading is more convenient. And when the user inputs the password incorrectly, the hidden area is not displayed, so that the data in the hidden area is not acquired by the user, and the privacy of the data is improved.
Optionally, the method includes: the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
By adopting the technical scheme, after the user inputs the power-on password incorrectly, the terminal provides a way for determining whether the user can read the hidden data or not through the authentication information, and provides another way for reading the hidden data for the user.
Optionally, the method includes: and the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
By adopting the technical scheme, after the verification password is modified, the data in the hidden area are directly deleted, so that the steps that the user needs to delete the data in the hidden area one by one are reduced, the operation flow of the user is reduced, and the operation efficiency is improved.
In a third aspect, the present application provides a computer readable storage medium storing a computer program that is loadable by a processor and operable to execute one of the eMMC control methods described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. only the user who inputs the boot password and the verification password are the same can store the data into the hidden area;
2. the user who inputs the boot password and the verification password are the same can read the data in the hidden area, so that the privacy of the data is improved, and the operation of other users on the data in the storage area is not influenced;
3. when the authentication information is the same as the verification information, the data in the hidden area can be displayed, and another way for a user to read the data in the hidden area is provided.
Drawings
Fig. 1 is a schematic flow chart of an eMMC control method according to an embodiment of the present application;
fig. 2 is a block diagram of an eMMC control system according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.
An embodiment of the present invention provides an eMMC control method, which includes, in combination with fig. 1, the following steps:
s101: and after the terminal is powered on, acquiring a power-on password of the user at the terminal.
In the embodiment of the application, the terminal can be any device with a storage function, such as a mobile phone, a television box, a vehicle event recorder and the like. The boot password may be a character password or biometric information of a person, such as facial identification information, fingerprint identification information, and the like. The character password and the biological identification information can be used as the starting password together. Taking a mobile phone as an example, when the boot password is a character password, after the boot screen of the terminal is displayed, the password input box is displayed on the display screen to prompt the user to input the password, when the display screen is a touch screen, the soft keyboard is displayed on the display screen for the user to input the password, and when the display screen does not have a touch function, the user can input the password through the physical keyboard.
S102: and writing data into the storage area when the user writing operation is acquired.
In the embodiment of the application, after the user inputs the power-on password, the user can write the data into the storage area no matter whether the power-on password is correct or not. The memory area includes a memory area in the central control chip (for example, a read-only memory area ROM in the central control chip) and an embedded multimedia card eMMC built in the terminal.
S103: when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
In the embodiment of the present application, the authentication password may be stored in a Flash memory (a non-volatile memory) of the terminal in advance. When a user inputs a power-on password, the eMMC controller calls a verification password in the Flash memory, the power-on password is compared with the verification password, when the power-on password is the same as a preset verification password, a display screen of the terminal displays a prompt for inquiring whether a data prompt box written in a storage area is hidden or not, and the user selects whether a prompt is sent to the prompt box according to the requirement of the user. If the user selects yes, the data is copied to the hidden area after being encrypted, the data in the original storage area is deleted, and if the user selects no, the data is not moved and is reserved in the storage area. In some embodiments, the operation of encrypting and copying data from the storage area to the hidden area and deleting data in the original storage area may not be performed when the user performs the writing operation, that is, the user may perform the above operation on data already stored in the storage area to hide data originally displayed by all people. When the boot password is different from the preset verification password, the written data is not processed, specifically, the terminal does not display a data prompt box for inquiring whether to hide the written storage area on the display screen, so that a user who inputs the boot password incorrectly writes the data into the storage area normally without knowing that the hidden area exists.
The eMMC control method further comprises the following steps:
s201: and when the user reads the operation, displaying the data in the storage area on the terminal.
S202: when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
In the embodiment of the application, when the boot password is the same as the preset verification password, the terminal displays the specific representation form of the hidden area on the display screen as an icon corresponding to the data in the hidden area, or displays the icon corresponding to the folder by taking the folder as the hidden area for storing the data. The icon of the data in the hidden area or the folder corresponding to the hidden area may be displayed in the same manner as the icon of the data in the storage area, and in order to distinguish the data in the hidden area from the data in the storage area, the icon may be displayed in a semi-transparent state, or a pattern of the icon may be marked, or a name of the folder corresponding to the hidden area or a name of the data in the hidden area may be marked by adding characters. When the boot password is different from the preset verification password, the icons of the folders corresponding to the hidden area and the icons corresponding to the data in the hidden area are not displayed, so that users who input the boot password incorrectly do not know the existence of the hidden area.
The eMMC control method further comprises the following steps:
s301: when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
In the embodiment of the application, an authentication frame for authenticating user information is displayed on a display screen of the terminal, the authentication information may be fixed information, such as fixed characters, the user may be asked questions in the form of questions in the authentication frame, an input frame is provided below the questions for the user to input answers, and when the answers input by the user are the same as the passwords stored in the terminal, the authentication information is the same as the preset authentication information. In some embodiments, the verification information may also be dynamic information, for example, the terminal obtains a dynamic password from the server through the communication module, the server sends the dynamic password to the communication device of the user, and an input box for inputting the dynamic password is displayed in a display screen of the terminal, when the dynamic password input by the user is the same as the dynamic password obtained by the terminal, that is, the authentication information is the same as the preset verification information. When the authentication information is the same as the preset verification information, the hidden area is displayed, the data in the hidden area can be read, but the data can only be read and can not be written in because the power-on password input by the user is different from the verification password.
The eMMC control method further comprises the following steps:
s401: and when the operation of resetting the verification password by the user is obtained, if the verification password is reset, deleting the data in the hidden area, and if the verification password is not reset, not operating the hidden area.
In the embodiment of the application, a reset icon of the reset password is displayed on a display screen of the terminal, when a user clicks the reset icon, a reset frame is displayed on the display screen, the original verification password and the reset verification password need to be input into the reset frame, and when the original verification password is input correctly, the input reset verification password is used as a new verification password. After the password reset is verified, all data in the hidden area are deleted, the workload of a user for deleting the data in the hidden area can be reduced, and the efficiency is improved.
The embodiment of the application also provides an eMMC control system, and the eMMC control system corresponds to the eMMC control methods in the embodiment one to one. As shown in fig. 2, the eMMC control system includes a power-on password obtaining module, a writing module, a password verifying module, a reading module, an information verifying module, and a resetting module. The functional modules are explained in detail as follows:
and the power-on password acquisition module is used for acquiring the power-on password input by the user at the terminal after the terminal is powered on.
And the writing module is used for writing data into the storage area when the user writing operation is acquired.
The password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; when the boot password is different from the preset verification password, the written data is not processed;
the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
The reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data;
the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
And the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
The eMMC control system can be applied to equipment such as mobile phones, television boxes, automobile data recorders and the like, wherein two file systems are divided into the equipment for use, one file system is a file system of a normal storage area and can be seen by anyone; the other is a file system of the hidden area, which is visible only to those who know that the hidden area exists and know the power-on password.
In some embodiments, the present application further provides a computer-readable storage medium storing a computer program that is loadable by a processor and operable to perform one of the eMMC control methods described above.
The computer-readable storage medium includes, for example: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Claims (9)
1. An eMMC control method, comprising:
after the terminal is powered on, acquiring a power-on password of a user at the terminal;
when the write operation of a user is acquired, writing data into a storage area;
when the starting password is the same as the preset verification password, inquiring whether to hide the data written into the storage area, if so, copying the encrypted data to the hidden area and deleting the data of the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
2. The eMMC control method of claim 1, further comprising:
when a user reads the operation, displaying the data of the storage area on the terminal;
when the starting-up password is the same as the preset verification password, the hidden area is displayed, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
3. The eMMC control method of claim 1 or 2, further comprising:
when a user reading operation is acquired, when the starting password is different from a preset verification password, authentication information input by the user is acquired, when the authentication information is the same as the preset verification information, the hidden area is displayed, and data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
4. The eMMC control method of any one of claims 1-3, wherein when the user resets the authentication password, data in the hidden area is deleted if the authentication password is reset, and the hidden area is not operated if the authentication password is not reset.
5. An eMMC control system, comprising:
the terminal comprises a power-on password acquisition module, a power-on password acquisition module and a power-on password acquisition module, wherein the power-on password acquisition module is used for acquiring a power-on password input by a user in the terminal after the terminal is powered on;
the writing module is used for writing data into the storage area when the user writing operation is acquired;
the password verification module is used for inquiring whether the data written into the storage area is hidden or not when the starting password is the same as a preset verification password, if so, copying the encrypted data to the hidden area and deleting the data in the original storage area, and if not, not moving the data; and when the starting password is different from the preset verification password, the written data is not processed.
6. The eMMC control system of claim 5, comprising:
the reading module is used for acquiring data of a storage area displayed on the terminal when a user reads the data;
the password verification module is also used for displaying the hidden area when the starting password is the same as the preset verification password, and the data in the hidden area can be read; when the boot password is different from the preset verification password, the hidden area is not displayed, and the data in the hidden area cannot be read.
7. The eMMC control system of claim 5 or 6, comprising:
the information verification module is used for acquiring authentication information input by a user when a boot password is different from a preset verification password during reading operation of the user, and displaying the hidden area when the authentication information is the same as the preset verification information, wherein data in the hidden area can be read; and when the authentication information is different from the preset verification information, the hidden area is not displayed, and the data in the hidden area cannot be read.
8. The eMMC control system of any one of claims 5-7, comprising:
and the resetting module is used for deleting the data in the hidden area if the verification password is reset when the user resets the verification password, and not operating the hidden area if the verification password is not reset.
9. A computer-readable storage medium, in which a computer program is stored which can be loaded by a processor and which executes the method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110595576.7A CN113378216A (en) | 2021-05-29 | 2021-05-29 | eMMC control method, system and storage medium thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110595576.7A CN113378216A (en) | 2021-05-29 | 2021-05-29 | eMMC control method, system and storage medium thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113378216A true CN113378216A (en) | 2021-09-10 |
Family
ID=77574865
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110595576.7A Pending CN113378216A (en) | 2021-05-29 | 2021-05-29 | eMMC control method, system and storage medium thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113378216A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102201072A (en) * | 2010-03-22 | 2011-09-28 | 英属开曼群岛商康帝国际科技股份有限公司 | System and method for managing storage device |
CN103927652A (en) * | 2013-01-15 | 2014-07-16 | 周宏建 | Portable electronic transaction device |
CN103971719A (en) * | 2013-01-31 | 2014-08-06 | 山东先行电子信息技术有限公司 | Password memory protection UK disk |
CN104715207A (en) * | 2013-12-16 | 2015-06-17 | 航天信息股份有限公司 | Method for storing files through secret key on android platform |
CN106156573A (en) * | 2015-04-13 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of method controlling intelligent terminal and the device of control intelligent terminal |
CN107818028A (en) * | 2017-04-26 | 2018-03-20 | 西安航空学院 | A kind of computer data backup and restoring method |
CN108171025A (en) * | 2017-12-08 | 2018-06-15 | 深圳市金立通信设备有限公司 | Implementation method, terminal and the computer readable storage medium of multi-user login pattern |
CN108563933A (en) * | 2018-04-19 | 2018-09-21 | Oppo广东移动通信有限公司 | Control method, device, storage medium and the mobile terminal of application program |
CN109840435A (en) * | 2017-11-27 | 2019-06-04 | 深圳市朗科科技股份有限公司 | A kind of data guard method storing equipment |
CN110069934A (en) * | 2018-01-23 | 2019-07-30 | 群联电子股份有限公司 | Storage system, host system verification method and memory storage apparatus |
CN110807186A (en) * | 2019-11-06 | 2020-02-18 | 杭州华澜微电子股份有限公司 | Method, device, equipment and storage medium for safe storage of storage equipment |
-
2021
- 2021-05-29 CN CN202110595576.7A patent/CN113378216A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102201072A (en) * | 2010-03-22 | 2011-09-28 | 英属开曼群岛商康帝国际科技股份有限公司 | System and method for managing storage device |
CN103927652A (en) * | 2013-01-15 | 2014-07-16 | 周宏建 | Portable electronic transaction device |
CN103971719A (en) * | 2013-01-31 | 2014-08-06 | 山东先行电子信息技术有限公司 | Password memory protection UK disk |
CN104715207A (en) * | 2013-12-16 | 2015-06-17 | 航天信息股份有限公司 | Method for storing files through secret key on android platform |
CN106156573A (en) * | 2015-04-13 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of method controlling intelligent terminal and the device of control intelligent terminal |
CN107818028A (en) * | 2017-04-26 | 2018-03-20 | 西安航空学院 | A kind of computer data backup and restoring method |
CN109840435A (en) * | 2017-11-27 | 2019-06-04 | 深圳市朗科科技股份有限公司 | A kind of data guard method storing equipment |
CN108171025A (en) * | 2017-12-08 | 2018-06-15 | 深圳市金立通信设备有限公司 | Implementation method, terminal and the computer readable storage medium of multi-user login pattern |
CN110069934A (en) * | 2018-01-23 | 2019-07-30 | 群联电子股份有限公司 | Storage system, host system verification method and memory storage apparatus |
CN108563933A (en) * | 2018-04-19 | 2018-09-21 | Oppo广东移动通信有限公司 | Control method, device, storage medium and the mobile terminal of application program |
CN110807186A (en) * | 2019-11-06 | 2020-02-18 | 杭州华澜微电子股份有限公司 | Method, device, equipment and storage medium for safe storage of storage equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8566611B2 (en) | Electronic device, unlocking method, and program | |
CN108171025B (en) | Method for realizing multi-user login mode, terminal and computer readable storage medium | |
CN110659512B (en) | Picture management method, device, terminal and storage medium | |
CN105760737A (en) | Control method for applications and terminal | |
CN105701420B (en) | A kind of management method and terminal of user data | |
US20030145182A1 (en) | Data storage apparatus, data storing method, data verification apparatus, data access permission apparatus, and program and storage medium therefor | |
CN102968587A (en) | Electronic equipment and method for retrieving unlocking information of electronic equipment | |
US20060047783A1 (en) | Methods and apparatuses for automatically selecting a profile | |
CN107506721A (en) | A kind of more method for collecting iris and system | |
JP2001202484A (en) | Security management system and its program storage medium | |
US8190813B2 (en) | Terminal apparatus with restricted non-volatile storage medium | |
US20130174227A1 (en) | Computer-readable medium, information processing device, information processing method and information processing system | |
JP2022002103A (en) | Privacy protecting method and protecting device for mobile terminal and mobile terminal | |
KR20050063174A (en) | Personal terminal with multiple password system and control method thereof | |
JP2007528035A (en) | Smart card for storing invisible signatures | |
JP2006018848A (en) | Detachable device | |
JP2001117661A (en) | Portable information terminal equipment and program recording medium for the same | |
JP2009181218A (en) | Authentication device, authentication method and program | |
CN113378216A (en) | eMMC control method, system and storage medium thereof | |
CN105871840A (en) | Certificate management method and system | |
CN111614832B (en) | Operation mode switching method and device, storage medium and related equipment | |
CN110851881B (en) | Security detection method and device for terminal equipment, electronic equipment and storage medium | |
JP2005234809A (en) | Attachable/detachable external storage device and automatic start program | |
CN112989379A (en) | Key protection implementation method and device and electronic equipment | |
CA2804465C (en) | Methods and systems for increasing the security of electronic messages |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 518000 area a, 7th floor, building A1, Shenzhen digital technology park, 17 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Applicant after: Deyi Microelectronics Co.,Ltd. Address before: 518000 area a, 7th floor, building A1, Shenzhen digital technology park, 17 Gaoxin South 7th Road, high tech Zone community, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province Applicant before: YEESTOR MICROELECTRONICS Co.,Ltd. |
|
CB02 | Change of applicant information |