WO2015055141A1 - 终端设备的调试端口控制方法和装置 - Google Patents

终端设备的调试端口控制方法和装置 Download PDF

Info

Publication number
WO2015055141A1
WO2015055141A1 PCT/CN2014/088833 CN2014088833W WO2015055141A1 WO 2015055141 A1 WO2015055141 A1 WO 2015055141A1 CN 2014088833 W CN2014088833 W CN 2014088833W WO 2015055141 A1 WO2015055141 A1 WO 2015055141A1
Authority
WO
WIPO (PCT)
Prior art keywords
screen
port
terminal device
debug port
debug
Prior art date
Application number
PCT/CN2014/088833
Other languages
English (en)
French (fr)
Inventor
沈金华
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP14853688.1A priority Critical patent/EP3046043B1/en
Priority to KR1020167011908A priority patent/KR101870847B1/ko
Priority to US15/029,695 priority patent/US20160246957A1/en
Publication of WO2015055141A1 publication Critical patent/WO2015055141A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F13/00Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F13/38Information transfer, e.g. on bus
    • G06F13/382Information transfer, e.g. on bus using universal interface adapter
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/85Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2213/00Indexing scheme relating to interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
    • G06F2213/38Universal adapter
    • G06F2213/3812USB port controller

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for controlling a debug port of a terminal device.
  • a terminal device such as a smartphone or tablet with an operating system such as the Andriod system
  • the user cannot directly operate through the terminal device or through USB (Universal Serial BUS).
  • the bus port is connected to the computer to access user data such as contacts, confidential files, and the like stored on the terminal device. If the user needs to access user data, they need to unlock the screen first. After the unlocking is successful, the user can directly operate on the terminal device to access the user data.
  • UMS United Message Service
  • MTP Media Transfer Protocol
  • PTP picture transfer protocol
  • Protocol mode to access user data; after the user confirms the authorization debugging and allows debugging, open the debugging port of the terminal device such as ADB (Andriod Debug Bridge) port to access user data.
  • the third party can connect the terminal device to the computer through a third-party tool software (eg, DDMS, 360 mobile assistant, etc.) to access the user data.
  • a third-party tool software eg, DDMS, 360 mobile assistant, etc.
  • the technical problem to be solved by the present invention is how to ensure the information security of the user.
  • the present invention provides a debug port control method for a terminal device, including: detecting a state of a universal serial bus port of the terminal device; and when the universal serial bus port is connected to a computer Detecting whether the screen of the terminal device is in a security lock screen state, wherein the security lock screen state is preset in an operating system of the terminal device, and only when the user inputs the correct on the locked screen After the information is unlocked, the screen can be successfully unlocked;
  • the debug port of the terminal device is controlled.
  • controlling a debug port of the terminal device includes: when the screen is in the security lock screen state When the debug port is closed.
  • the method when the screen is in the security lock screen state, after the debugging port is closed, the method includes: detecting whether the screen is Successfully unlocked; when the screen is successfully unlocked, the modulation port is opened; or when the screen is not successfully unlocked, the debug port is closed.
  • the method when the screen is successfully unlocked, the debug port is opened, or when the screen is not successfully unlocked, the method includes: generating a history of the debugging port according to an open or closed state of the debugging port.
  • the method includes: detecting whether the universal serial bus port and the computer are broken Opening a connection; clearing a history of the debug port when the universal serial bus port is disconnected from the computer; detecting the universal serial bus port when the computer is not disconnected from the computer Whether the screen is in a lock screen state; when the screen is in the lock screen state, the debug port is controlled according to the history of the debug port.
  • the present invention provides a debugging port control apparatus for a terminal device, including: a detecting unit, configured to detect a state of a universal serial bus USB port of the terminal device; When the universal serial bus port is connected to the computer, detecting whether the screen of the terminal device is in a security lock screen state, the security lock screen state is preset in the operating system of the terminal device, and only when After the user inputs the correct unlocking information on the screen that is locked, the screen can be successfully unlocked; and a control unit is connected to the detecting unit for when the screen is in the safe lock screen state, Controlling a debug port of the terminal device.
  • control unit when the screen is in the security lock screen state, the control unit is further configured to close the debug port.
  • the detecting unit is further configured to: detect whether the screen is successfully unlocked; when the screen is successfully unlocked, The control unit is further configured to: open the modulation port; or when the screen is not successfully unlocked, the control unit is further configured to close the debug port.
  • control unit is further configured to generate a history of the debug port according to an open or closed state of the debug port.
  • the detecting unit is further configured to detect whether the universal serial bus port is disconnected from the computer; When the universal serial bus port is disconnected from the computer, the control unit is further configured to clear a history of the debug port; when the universal serial bus port is not disconnected from the computer, The control unit is further configured to: detect whether the screen is in a lock screen state; when the screen is in the lock screen state, the control unit is further configured to: according to the history record of the debug port, control the Debug port.
  • the debug port control method and apparatus of the present invention can improve the completeness of the security policy of the terminal device, and effectively The user information on the terminal device is guaranteed to be secure.
  • FIG. 1 shows a flow chart of a method for controlling a debug port according to an embodiment of the present invention
  • FIG. 2 shows a flow chart of a debug port control method according to another embodiment of the present invention.
  • FIG. 3 is a block diagram showing a debug port control apparatus according to an embodiment of the present invention.
  • FIG. 4 shows a block diagram of a debug port control device in accordance with another embodiment of the present invention.
  • FIG. 1 is a flow chart showing a method for controlling a debug port of a terminal device according to an embodiment of the present invention.
  • the debug port control method mainly includes:
  • Step S110 detecting a state of a universal serial bus USB port of the terminal device
  • Step S120 When the USB port is connected to the computer, detecting whether the screen of the terminal device is in a security lock screen state;
  • Step S130 Control the debugging port of the terminal device when the screen is in the security lock screen state.
  • a security policy may be added in front of a debugging port of the terminal device such as an ADB (Andriod Debug Bridge) port.
  • the system can determine whether a USB event has occurred by listening to the terminal device's USB message, such as whether the terminal device's USB port is connected to the computer by plugging in a USB cable. If it is detected that the USB port is connected to the computer, it is determined that a USB event has occurred. And continue to detect whether the screen of the terminal device is in a safe lock screen state, and accordingly control the opening or closing of the debug port.
  • the security lock screen status is preset in the operating system of the terminal device, and the screen can be successfully unlocked only after the user inputs the correct unlock information on the locked screen.
  • the debug port can only be opened if the screen is successfully unlocked, and the user is prompted to confirm whether the debug is authorized and whether debugging is allowed.
  • the ADB port is a debugging port of the Andriod system.
  • USB Universal Serial Bus
  • the terminal device If the terminal device is lost, even if the third party cracks the terminal device through the third-party tool software, if the terminal device's USB port is connected to the computer, if the security policy is not successfully verified, the debug port control method will close the debug port. Therefore, the third person still cannot steal user data through the debug port.
  • the debug port control method can improve the completeness of the security policy of the terminal device, and effectively guarantees The security of user information on the terminal device.
  • debug port control method is described above with the Android system as an example, those skilled in the art can understand that the present invention is not limited thereto. In fact, the above debug port control method is also applicable to other operating systems having a debug port such as the WinPhone system.
  • FIG. 2 is a flow chart showing a method of controlling a debug port of a terminal device according to another embodiment of the present invention.
  • figure 2 The same components as those of FIG. 1 have the same functions, and a detailed description of these components is omitted for the sake of brevity.
  • the main difference between the method shown in FIG. 2 and the method shown in FIG. 1 is that when the screen is in the security lock screen state, the debug port is first closed, and the debug port can be opened only after the screen is successfully unlocked.
  • step S130 may specifically include:
  • Step S210 When the screen is in a safe lock screen state, the debug port is closed.
  • the lock screen state refers to a state in which the screen of the terminal device is locked.
  • the lock screen status may include a security lock screen status and a non-secure lock screen status.
  • the security lock screen status may include, but is not limited to, a pattern lock screen, a PIN (Personal Identification Number) lock screen, a password lock screen, and a face lock. Any one or more of the face locks; the non-secure lock screen state may include a 2D lock screen (such as a sliding lock screen) and a lock screen.
  • the unlock mode of the security lock screen state is more complicated, and the user needs to input the unlock information on the locked screen, and the screen can be successfully unlocked only after the unlock information is verified correctly.
  • the security lock screen state has a higher security level than the non-secure lock screen state. If the user sets the lock screen state of the terminal device to the security lock screen state, it indicates that the user wants to protect the security of the user information stored by the terminal device, and the third party is required to steal information.
  • the debug port can be automatically closed, so the third party cannot access the user through the debug port. data.
  • the method may include:
  • Step S220 detecting whether the screen is successfully unlocked
  • Step S230 if the screen is successfully unlocked, open the debug port; or
  • Step S240 If the screen is not successfully unlocked, the debug port is closed.
  • the debug port After detecting that the screen is in the security lock screen state and the debug port is closed, it is possible to detect whether the user inputs the unlock information on the screen, that is, determine that the user performs the unlock operation, and verify whether the unlock information is correct. If the unlock information is verified correctly, the screen will be successfully unlocked.
  • different security lock screen states need to be unlocked in different ways. For example, if the pattern lock screen state, the user needs to draw the correct pattern on the screen to successfully unlock; if it is a PIN (Personal Identification Number), the user needs to input the correct PIN code on the screen. In order to successfully unlock, if the password is locked, the user needs to input the correct password on the screen to unlock successfully. If the face lock is used, the terminal device needs to recognize the correct user facial features. In order to successfully unlock. Only The debug port can only be opened after the screen has been successfully unlocked; otherwise, the debug port will remain closed.
  • the debug port continues to be in the off state, so the third person cannot access the user data saved by the terminal device through the debug port.
  • the method may include:
  • Step S250 Generate a history record of the debug port according to the open or closed state of the debug port.
  • the history of the debug port is set to the open state. If the screen is not successfully unlocked and the debug port is closed, the history of the debug port is set to off. According to the history of the debug port, it can be known whether the screen is successfully unlocked, thereby knowing whether the terminal device may be hijacked by a third person.
  • the method may include:
  • Step S260 detecting whether the USB port is disconnected from the computer
  • Step S270 clearing the history record of the debug port when the USB port is disconnected from the computer
  • Step S280 When the USB port is not disconnected from the computer, detecting whether the screen is in a lock screen state;
  • Step S290 When the screen is in a lock screen state, control the debug port according to the history record of the debug port.
  • the system can determine whether the USB event is ended by listening to the USB message of the terminal device, such as whether the USB port of the terminal device is disconnected from the computer by pulling out the USB cable. If the USB port is disconnected from the computer, it determines that the current USB event is over and clears the history of the debug port. If the USB port is not disconnected from the computer, it is determined that the current USB event has not ended.
  • the debug port can be opened or closed according to the history of the debug port, including the following cases:
  • Case 1 If the developer uses the debug port to connect the terminal device to the computer, after the developer successfully unlocks the screen and opens the debug port, the terminal device can be developed and debugged. Thereafter, if the screen is in the lock screen state again, for example, because the developer does not operate the terminal device for a long time, causing its standby lock screen, and the USB port is not disconnected from the computer at this time, the debug port can be kept open. Therefore, the developer can continue to use the debug port, which avoids the need for the developer to frequently unlock the screen during the development and debugging process, thereby improving the developer's body. Test.
  • Case 2 If the terminal device is lost, the third party uses the debug port to connect the terminal device to the computer. Since the third person did not successfully unlock the screen, the debug port was closed, so the third person could not read the user data saved by the terminal device through the debug port. Thereafter, if the screen is again in a lock screen state and the USB port is not disconnected from the computer at this time, the debug port can be kept off, so that the third person still cannot access the user data through the debug port.
  • FIG. 3 is a block diagram showing a debug port control apparatus of a terminal device according to an embodiment of the present invention.
  • the debug port control device mainly includes a detecting unit 310 and a control unit 320.
  • the detecting unit 310 is mainly configured to detect a state of a USB port of the terminal device, and when the universal serial bus port is connected to the computer, detecting whether the screen of the terminal device is in a security lock screen state, wherein the security
  • the lock screen state is preset in the operating system of the terminal device, and the screen can be successfully unlocked only after the user inputs the correct unlock information on the screen that is locked.
  • the control unit 320 is connected to the detecting unit 310 and is mainly used to control the debugging port of the terminal device when the screen is in the security lock screen state.
  • the control unit 320 when the screen is in the safe lock screen state, the control unit 320 is further configured to close the debug port.
  • the detecting unit 310 is further configured to detect whether the screen is successfully unlocked.
  • the control unit 320 is further configured to: when the screen is not successfully unlocked, the control unit 320 is further configured to: close the debug port.
  • control unit 320 is further configured to generate a history record of the debug port according to an open or closed state of the debug port.
  • the detecting unit 310 is further configured to detect whether the USB port is disconnected from the computer.
  • the control unit 320 is further configured to clear the history of the debug port.
  • the control unit 320 is further configured to detect whether the screen is in a lock screen state.
  • the control unit 320 is further configured to control the debug port according to the history of the debug port.
  • the debugging port control device is configured to detect the status of the USB port of the terminal device and the state of the screen, and control the specific mechanism of the debugging port of the terminal device. Reference may be made to FIG. 1 to FIG. 2 and related descriptions.
  • the debug port control device of the above embodiment of the present invention can improve the completeness of the security policy of the terminal device, and effectively guarantees The security of user information on the terminal device.
  • debug port control device is described above with the Android system as an example, those skilled in the art can understand that the present invention is not limited thereto. In fact, the above debug port control device is also applicable to other operating systems having a debug port such as the WinPhone system.
  • the debug port control device 1100 may be a host server having a computing capability, a personal computer PC, or a portable computer or terminal that can be carried.
  • the specific embodiments of the present invention do not limit the specific implementation of the computing node.
  • the debug port control device 1100 includes a processor 1110, a communication interface 1120, a memory array 1130, and a bus 1140.
  • the processor 1110, the communication interface 1120, and the memory 1130 complete communication with each other through the bus 1140.
  • Communication interface 1120 is for communicating with network devices, including, for example, a virtual machine management center, shared storage, and the like.
  • the processor 1110 is configured to execute a program.
  • the processor 1110 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement the embodiments of the present invention.
  • ASIC Application Specific Integrated Circuit
  • the memory 1130 is used to store files.
  • the memory 1130 may include a high speed RAM memory and may also include a non-volatile memory such as at least one disk memory.
  • Memory 1130 can also be a memory array.
  • the memory 1130 may also be partitioned, and the blocks may be combined into a virtual volume according to certain rules.
  • the above program may be program code including a computer operation instruction.
  • the program is specifically configured to: detect a status of a universal serial bus USB port of the terminal device; and when the universal serial bus port is connected to the computer, detecting whether the screen of the terminal device is in a safe lock screen state, wherein the The security lock screen status is preset in the operating system of the terminal device, and the screen can be successfully unlocked only after the user inputs the correct unlock information on the screen being locked; when the screen is in the In the security lock screen state, the debug port of the terminal device is controlled.
  • the program is further configured to close the debug port when the screen is in the safe lock screen state.
  • the program is further configured to detect whether the screen is successfully unlocked; when the screen is successfully unlocked, the modulation port is opened; or when the screen is Not When successfully unlocked, the debug port is closed.
  • the program is further configured to generate a history record of the debug port according to an open or closed state of the debug port.
  • the program is further configured to: after detecting the history record of the debug port, detecting whether the universal serial bus port is disconnected from the computer; Clearing a history of the debug port when the universal serial bus port is disconnected from the computer; detecting whether the screen is in a state when the universal serial bus port is not disconnected from the computer a lock screen state, when the screen is in a lock screen state, the debug port is controlled according to the history of the debug port.
  • the debugging port control device is configured to detect the status of the USB port of the terminal device and the state of the screen, and control the specific mechanism of the debugging port of the terminal device. Reference may be made to FIG. 1 to FIG. 2 and related descriptions. According to the debug port control device of the above embodiment of the present invention, the completeness of the security policy of the terminal device can be improved, and the security of the user information on the terminal device is effectively ensured.
  • debug port control device is described above with the Android system as an example, those skilled in the art can understand that the present invention is not limited thereto. In fact, the above debug port control device is also applicable to other operating systems having a debug port such as the WinPhone system.
  • the function is implemented in the form of computer software and sold or used as a stand-alone product, it is considered to some extent that all or part of the technical solution of the present invention (for example, a part contributing to the prior art) is It is embodied in the form of computer software products.
  • the computer software product is typically stored in a computer readable storage medium and includes instructions for causing a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk.

Abstract

一种终端设备的调试端口控制方法和装置。调试端口控制方法包括:检测终端设备的通用串行总线端口的状态;当通用串行总线端口与计算机连接时,检测终端设备的屏幕是否处于安全锁屏状态;当屏幕处于安全锁屏状态时,控制终端设备的调试端口。根据本方案能够提高终端设备的安全策略的完备性,保证终端设备上用户信息的安全。

Description

终端设备的调试端口控制方法和装置
本申请要求于2013年10月17日提交中国专利局、申请号为CN 201310489021.X、发明名称为“终端设备的调试端口控制方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及通信技术领域,尤其涉及一种终端设备的调试端口控制方法和装置。
背景技术
在安装有操作系统如Andriod系统的终端设备如智能手机或平板电脑中,当终端设备的屏幕处于锁定状态时,用户无法通过在终端设备上的直接操作或通过USB(Universal Serial BUS,通用串行总线)端口与计算机连接,来访问终端设备上存储的用户数据如联系人、机密文件等信息。如果用户需要访问用户数据,则需要先解锁屏幕。在解锁成功后,用户可以在终端设备上直接操作,来访问用户数据。在解锁成功后,如果终端设备通过USB端口与计算机连接,则用户可以使能UMS(United Message Service,统一消息服务)、MTP(Media Transfer Protocol,媒体传输协议)和PTP(picture transfer protocol,媒体传输协议)模式,以访问用户数据;也可以在用户确认授权调试和允许调试后,打开终端设备的调试端口如ADB(Andriod Debug Bridge,安卓调试桥)端口,以访问用户数据。
如果终端设备丢失,并且第三人破解(root)了该终端设备,则第三人可以通过第三方工具软件(如:DDMS、360手机助手等)将该终端设备与计算机连接,从而访问用户数据,无法保证用户的信息安全。
发明内容
有鉴于此,本发明要解决的技术问题是,如何保证用户的信息安全。
为了解决上述问题,在第一方面,本发明提供了一种终端设备的调试端口控制方法,包括:检测终端设备的通用串行总线端口的状态;当所述通用串行总线端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态,其中,所述安全锁屏状态在所述终端设备的操作系统中预先设置、并且仅当用户在被锁定的所述屏幕上输入正确的解锁信息后、所述屏幕才能被成功解锁;
当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口。
结合第一方面,在第一种可能的实现方式中,当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口,包括:当所述屏幕处于所述安全锁屏状态时,关闭所述调试端口。
结合第一方面的第一种可能的实现方式,在第二种可能的实现方式中,当所述屏幕处于所述安全锁屏状态时,关闭所述调试端口之后,包括:检测所述屏幕是否被成功解锁;当所述屏幕被成功解锁时,打开所述调制端口;或当所述屏幕未被成功解锁时,关闭所述调试端口。
结合第一方面的第二种可能的实现方式,在第三种可能的实现方式中,在当所述屏幕被成功解锁时,打开所述调试端口,或当所述屏幕未被成功解锁时,关闭所述调试端口之后,包括:根据所述调试端口的打开或关闭状态,生成所述调试端口的历史记录。
结合第一方面的第三种可能的实现方式,在第四种可能的实现方式中,在生成所述调试端口的历史记录之后,包括:检测所述通用串行总线端口与所述计算机是否断开连接;当所述通用串行总线端口与所述计算机断开连接时,清除所述调试端口的历史记录;当所述通用串行总线端口与所述计算机未断开连接时,检测所述屏幕是否处于锁屏状态;当所述屏幕处于所述锁屏状态时,根据所述调试端口的历史记录,控制所述调试端口。
为了解决上述问题,在第二方面,本发明提供了一种终端设备的调试端口控制装置,包括:检测单元,用于检测终端设备的通用串行总线USB端口的状态;所述检测单元还用于,当所述通用串行总线端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态,所述安全锁屏状态在所述终端设备的操作系统中预先设置、并且仅当用户在被锁定的所述屏幕上输入正确的解锁信息后、所述屏幕才能被成功解锁;以及控制单元,与所述检测单元连接,用于当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口。
结合第二方面,在第一种可能的实现方式中,当所述屏幕处于所述安全锁屏状态时,所述控制单元还用于,关闭所述调试端口。
结合第一方面的第一种可能的实现方式,在第二种可能的实现方式中,所述检测单元还用于,检测所述屏幕是否被成功解锁;当所述屏幕被成功解锁时,所述控制单元还用于,打开所述调制端口;或当所述屏幕未被成功解锁时,所述控制单元还用于,关闭所述调试端口。
结合第一方面的第二种可能的实现方式,在第三种可能的实现方式中,所述控制单元还用于,根据所述调试端口的打开或关闭状态,生成所述调试端口的历史记录。
结合第一方面的第三种可能的实现方式,在第四种可能的实现方式中,所述检测单元还用于,检测所述通用串行总线端口与所述计算机是否断开连接;当所述通用串行总线端口与所述计算机断开连接时,所述控制单元还用于,清除所述调试端口的历史记录;当所述通用串行总线端口与所述计算机未断开连接时,所述控制单元还用于,检测所述屏幕是否处于锁屏状态;当所述屏幕处于所述锁屏状态时,所述控制单元还用于,根据所述调试端口的历史记录,控制所述调试端口。
通过检测终端设备的通用串行总线端口端口的状态和屏幕的状态,并据此控制终端设备的调试端口,本发明的调试端口控制方法和装置,能够提高终端设备的安全策略的完备性,有效保证了终端设备上的用户信息安全。
根据下面参考附图对示例性实施例的详细说明,本发明的其它特征及方面将变得清楚。
附图说明
包含在说明书中并且构成说明书的一部分的附图与说明书一起示出了本发明的示例性实施例、特征和方面,并且用于解释本发明的原理。
图1示出根据本发明一实施例的调试端口控制方法的流程图;
图2示出根据本发明另一实施例的调试端口控制方法的流程图;
图3示出根据本发明一实施例的调试端口控制装置的框图;
图4示出根据本发明另一实施例的调试端口控制装置的框图。
具体实施方式
以下将参考附图详细说明本发明的各种示例性实施例、特征和方面。附图中相同的附图标记表示功能相同或相似的元件。尽管在附图中示出了实施例的各种方面,但是除非特别指出,不必按比例绘制附图。
在这里专用的词“示例性”意为“用作例子、实施例或说明性”。这里作为“示例性”所说明的任何实施例不必解释为优于或好于其它实施例。
另外,为了更好的说明本发明,在下文的具体实施方式中给出了众多的具体细节。本领域技术人员应当理解,没有这些具体细节,本发明同样可以实施。在另外一些实例 中,对于大家熟知的方法、手段、元件和电路未作详细描述,以便于凸显本发明的主旨。
实施例1
图1示出根据本发明一实施例的终端设备的调试端口控制方法的流程图。如图1所示,该调试端口控制方法主要包括:
步骤S110、检测终端设备的通用串行总线USB端口的状态;
步骤S120、当所述USB端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态;
步骤S130、当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口。
具体地,在安装有操作系统如Andriod系统的设备例如智能手机或平板电脑上,可以在终端设备的调试端口如ADB(Andriod Debug Bridge)端口前增加了一套安全策略。系统可以通过监听该终端设备的USB消息,如终端设备的USB端口是否通过插入USB电缆与计算机连接,从而判定是否发生了USB事件。如果检测到所述USB端口与计算机连接,则判定发生了USB事件。并继续检测终端设备的屏幕是否处于安全锁屏状态,并据此控制调试端口的打开或关闭。其中,安全锁屏状态在终端设备的操作系统中预先设置、并且仅当用户在被锁定的屏幕上输入正确的解锁信息后、屏幕才能被成功解锁。只有在屏幕被成功解锁的情况下,才能打开调试端口,并提示用户确认是否授权调试以及是否允许调试。其中,ADB端口是Andriod系统的调试端口,在USB(Universal Serial Bus,通用串行总线)端口与计算机连接的情况下,用户通过该端口管理终端设备并访问终端设备上存储的用户数据,例如联系人、机密文件等数据。
如果终端设备丢失,即使第三人通过第三方工具软件破解了终端设备,在终端设备的USB端口与计算机连接后,如果未成功通过安全策略的验证,则该调试端口控制方法会关闭调试端口,因此第三人仍然无法通过调试端口窃取用户数据。
通过检测终端设备的USB端口的状态和屏幕的状态,并据此控制终端设备的调试端口,根据本发明上述实施例的调试端口控制方法,能够提高终端设备的安全策略的完备性,有效保证了终端设备上的用户信息的安全性。
需要说明的是,尽管以Android系统作为示例介绍了调试端口控制方法如上,但本领域技术人员能够理解,本发明应不限于此。事实上,上述调试端口控制方法也适用于具有调试端口的其他操作系统例如WinPhone系统。
实施例2
图2示出根据本发明另一实施例的终端设备的调试端口控制方法的流程图。图2 中标号与图1相同的组件具有相同的功能,为简明起见,省略对这些组件的详细说明。
如图2所示,图2所示的方法与图1所示的方法的主要区别在于:当屏幕处于安全锁屏状态时,先关闭调试端口,直到屏幕被成功解锁后,才能打开调试端口。
具言之,步骤S130可以具体包括:
步骤S210、当所述屏幕处于安全锁屏状态时,关闭所述调试端口。
具体地,锁屏状态是指终端设备的屏幕被锁定的状态。锁屏状态可以包括安全锁屏状态和非安全锁屏状态。例如:在Andriod系统的J版本中,安全锁屏状态可以包括但不限于如图案(Pattern)锁屏、PIN(Personal Identification Number,个人识别码)锁屏、密码(Password)锁屏以及人脸锁屏(face lock)中的任意一种或多种;非安全锁屏状态可以包括2D锁屏(如滑动锁屏)和不锁屏等。与非安全锁屏状态相比,安全锁屏状态的解锁方式更加复杂,需要用户在在被锁定的屏幕上输入解锁信息,并且只有在该解锁信息被验证正确后,屏幕才能被成功解锁,因此,与非安全锁屏状态相比,安全锁屏状态的安全级别更高。如果用户将终端设备的锁屏状态设置为安全锁屏状态,则表示用户希望保护终端设备存储的用户信息的安全,需防止第三人窃取信息。
如果终端设备丢失,在第三人将终端设备的USB端口与计算机连接时,如果检测到终端设备的屏幕处于安全锁屏状态,则可以自动关闭调试端口,因此第三人无法通过调试端口访问用户数据。
对于上述调试端口控制方法,在一种可能的实现方式中,在步骤S220之后,可以包括:
步骤S220、检测所述屏幕是否被成功解锁;
步骤S230、若所述屏幕被成功解锁,打开所述调试端口;或
步骤S240、若所述屏幕未被成功解锁,关闭所述调试端口。
具体地,在检测到屏幕处于安全锁屏状态并关闭了所述调试端口之后,可以检测用户是否在屏幕上输入了解锁信息,即判定用户执行了解锁操作,并验证该解锁信息是否正确。若解锁信息被验证正确,屏幕将被成功解锁。其中,不同的安全锁屏状态,需要使用不同方式进行解锁。例如:若是图案(Pattern)锁屏状态,则需要用户在屏幕上绘制正确的图案后才能成功解锁;若是PIN(Personal Identification Number,个人识别码),则需要用户在屏幕上输入正确的PIN码后才能成功解锁;若是密码(Password)锁屏,则需要用户在屏幕上输入正确的密码后才能成功解锁;若是人脸锁屏(Face lock),则需要终端设备识别到正确的用户脸部特征后才能成功解锁。只有 在屏幕被成功解锁后,才能打开调试端口;否则,继续将调试端口保持在关闭状态。
如果终端设备丢失,由于第三人通常无法输入正确的解锁信息,即解锁信息会被验证错误,则调试端口继续保持在关闭状态,因此第三人无法通过调试端口访问终端设备保存的用户数据。
对于上述调试端口控制方法,在一种可能的实现方式中,在步骤S230或步骤S240之后,可以包括:
步骤S250、根据所述调试端口的打开或关闭状态,生成所述调试端口的历史记录。
具体地,如果屏幕被成功解锁并打开了调试端口,则将调试端口的历史记录设置为打开状态。如果屏幕未被成功解锁并关闭了调试端口,则将调试端口的历史记录设置为关闭状态。根据调试端口的历史记录,能够得知屏幕是否被成功解锁,从而得知终端设备是否可能被第三人劫持。
对于上述调试端口控制方法,在一种可能的实现方式中,在步骤S250之后,可以包括:
步骤S260、检测所述USB端口与所述计算机是否断开连接;
步骤S270、当所述USB端口与所述计算机断开连接时,清除所述调试端口的历史记录;
步骤S280、当所述USB端口与所述计算机未断开连接时,检测所述屏幕是否处于锁屏状态;
步骤S290、当所述屏幕处于锁屏状态时,根据所述调试端口的历史记录,控制所述调试端口。
具体地,系统可以通过监听该终端设备的USB消息,如终端设备的USB端口是否通过拔出USB电缆与计算机断开连接,从而判定该USB事件是否结束。如果USB端口与计算机断开连接,则判定当前USB事件结束,并清除调试端口的历史记录。如果USB端口与计算机未断开连接,则判定当前USB事件未结束,可以根据调试端口的历史记录,打开或关闭调试端口,具体包括以下情况:
情况一、如果开发者使用调试端口将终端设备与计算机连接,在开发者将屏幕成功解锁并打开调试端口之后,可以对终端设备进行开发调试。此后,如果屏幕再次处于锁屏状态,例如由于开发者长时间不操作终端设备、导致其待机锁屏,并且此时USB端口与计算机未断开连接,则可以将调试端口继续保持在打开状态。从而开发者可以继续使用调试端口,避免了开发者在开发调试过程中需要频繁解锁屏幕,提升了开发者的体 验。
情况二、如果终端设备丢失,第三人使用调试端口将终端设备与计算机连接。由于第三人未将屏幕成功解锁,导致调试端口关闭,因此第三人无法通过调试端口读取终端设备保存的用户数据。此后,如果屏幕再次处于锁屏状态,并且此时USB端口与计算机未断开连接,则可以将调试端口继续保持在关闭状态,从而第三人仍然无法通过调试端口访问用户数据。
实施例3
图3示出根据本发明一实施例的终端设备的调试端口控制装置的框图。如图3所示,所述调试端口控制装置主要包括检测单元310和控制单元320。其中,检测单元310,主要用于检测终端设备的USB端口的状态,当所述通用串行总线端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态,其中,所述安全锁屏状态在所述终端设备的操作系统中预先设置、并且仅当用户在被锁定的所述屏幕上输入正确的解锁信息后、所述屏幕才能被成功解锁。控制单元320,与检测单元310连接,主要用于当所述屏幕处于所述安全锁屏状态时,控制终端设备的调试端口。
对于上述调试端口控制装置,在一种可能的实现方式中,当所述屏幕处于所述安全锁屏状态时,控制单元320还用于,关闭调试端口。
对于上述调试端口控制装置,在一种可能的实现方式中,检测单元310还用于,检测屏幕是否成功解锁。当所述屏幕被成功解锁时,控制单元320还用于,打开调制端口当所述屏幕未被成功解锁时,控制单元320还用于,关闭调试端口。
对于上述调试端口控制装置,在一种可能的实现方式中,控制单元320还用于,根据调试端口的打开或关闭状态,生成调试端口的历史记录。
对于上述调试端口控制装置,在一种可能的实现方式中,检测单元310还用于,检测USB端口与计算机是否断开连接。当所述通用串行总线端口与所述计算机断开连接时,控制单元320还用于,清除调试端口的历史记录。当所述通用串行总线端口与所述计算机未断开连接时,控制单元320还用于,检测所述屏幕是否处于锁屏状态。当所述屏幕处于所述锁屏状态时,控制单元320还用于,根据调试端口的历史记录,控制调试端口。
其中,上述调试端口控制装置用于检测终端设备的USB端口的状态和屏幕的状态并据此控制终端设备的调试端口的具体机制,可以参考图1~图2及其相关描述。本发明上述实施例的调试端口控制装置,能够提高终端设备的安全策略的完备性,有效保证了 终端设备上的用户信息的安全。
需要说明的是,尽管以Android系统作为示例介绍了调试端口控制装置如上,但本领域技术人员能够理解,本发明应不限于此。事实上,上述调试端口控制装置也适用于具有调试端口的其他操作系统例如WinPhone系统。
实施例4
图4示出了本发明的又一个实施例的一种调试端口控制装置的框图。所述调试端口控制装置1100可以是具备计算能力的主机服务器、个人计算机PC、或者可携带的便携式计算机或终端等。本发明具体实施例并不对计算节点的具体实现做限定。
所述调试端口控制装置1100包括处理器(processor)1110、通信接口(Communications Interface)1120、存储器(memory array)1130和总线1140。其中,处理器1110、通信接口1120、以及存储器1130通过总线1140完成相互间的通信。
通信接口1120用于与网络设备通信,其中网络设备包括例如虚拟机管理中心、共享存储等。
处理器1110用于执行程序。处理器1110可能是一个中央处理器CPU,或者是专用集成电路ASIC(Application Specific Integrated Circuit),或者是被配置成实施本发明实施例的一个或多个集成电路。
存储器1130用于存放文件。存储器1130可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。存储器1130也可以是存储器阵列。存储器1130还可能被分块,并且所述块可按一定的规则组合成虚拟卷。
对于上述调试端口控制装置,在一种可能的实施方式中,上述程序可为包括计算机操作指令的程序代码。该程序具体可用于:检测终端设备的通用串行总线USB端口的状态;当所述通用串行总线端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态,其中,所述安全锁屏状态在所述终端设备的操作系统中预先设置、并且仅当用户在被锁定的所述屏幕上输入正确的解锁信息后、所述屏幕才能被成功解锁;当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口。
对于上述调试端口控制装置,在一种可能的实现方式中,该程序还用于,当所述屏幕处于所述安全锁屏状态时,关闭所述调试端口。
对于上述调试端口控制装置,在一种可能的实现方式中,该程序还用于,检测所述屏幕是否成功解锁;当所述屏幕被成功解锁时,打开所述调制端口;或当所述屏幕未 被成功解锁时,关闭所述调试端口。
对于上述调试端口控制装置,在一种可能的实现方式中,该程序还用于,根据所述调试端口的打开或关闭状态,生成所述调试端口的历史记录。
对于上述调试端口控制装置,在一种可能的实现方式中,该程序还用于,在生成所述调试端口的历史记录之后,检测所述通用串行总线端口与所述计算机是否断开连接;当所述通用串行总线端口与所述计算机断开连接时,清除所述调试端口的历史记录;当所述通用串行总线端口与所述计算机未断开连接时,检测所述屏幕是否处于锁屏状态,当所述屏幕处于锁屏状态时,根据所述调试端口的历史记录,控制所述调试端口。
其中,上述调试端口控制装置用于检测终端设备的USB端口的状态和屏幕的状态并据此控制终端设备的调试端口的具体机制,可以参考图1~图2及其相关描述。根据本发明上述实施例的调试端口控制装置,能够提高终端设备的安全策略的完备性,有效保证了终端设备上的用户信息的安全性。
需要说明的是,尽管以Android系统作为示例介绍了调试端口控制装置如上,但本领域技术人员能够理解,本发明应不限于此。事实上,上述调试端口控制装置也适用于具有调试端口的其他操作系统例如WinPhone系统。
本领域普通技术人员可以意识到,本文所描述的实施例中的各示例性单元及算法步骤,能够以电子硬件、或者计算机软件和电子硬件的结合来实现。这些功能究竟以硬件还是软件形式来实现,取决于技术方案的特定应用和设计约束条件。专业技术人员可以针对特定的应用选择不同的方法来实现所描述的功能,但是这种实现不应认为超出本发明的范围。
如果以计算机软件的形式来实现所述功能并作为独立的产品销售或使用时,则在一定程度上可认为本发明的技术方案的全部或部分(例如对现有技术做出贡献的部分)是以计算机软件产品的形式体现的。该计算机软件产品通常存储在计算机可读取的存储介质中,包括若干指令用以使得计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各实施例方法的全部或部分步骤。而前述的存储介质包括U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应所述以权利要求的保护范 围为准。

Claims (10)

  1. 一种终端设备的调试端口控制方法,其特征在于,包括:
    检测终端设备的通用串行总线端口的状态;
    当所述通用串行总线端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态,其中,所述安全锁屏状态在所述终端设备的操作系统中预先设置、并且仅当用户在被锁定的所述屏幕上输入正确的解锁信息后、所述屏幕才能被成功解锁;
    当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口。
  2. 根据权利要求1所述的方法,其特征在于,当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口,包括:
    当所述屏幕处于所述安全锁屏状态时,关闭所述调试端口。
  3. 根据权利要求2所述的方法,其特征在于,在当所述屏幕处于所述安全锁屏状态时,关闭所述调试端口之后,包括:
    检测所述屏幕是否被成功解锁;
    当所述屏幕被成功解锁时,打开所述调试端口;或
    当所述屏幕未被成功解锁时,关闭所述调试端口。
  4. 根据权利要求3所述的方法,其特征在于,在当所述屏幕被成功解锁时,打开所述调试端口,或当所述屏幕未被成功解锁时,关闭所述调试端口之后,包括:
    根据所述调试端口的打开或关闭状态,生成所述调试端口的历史记录。
  5. 根据权利要求4所述的方法,其特征在于,在生成所述调试端口的历史记录之后,包括:
    检测所述通用串行总线端口与所述计算机是否断开连接;
    当所述通用串行总线端口与所述计算机断开连接时,清除所述调试端口的历史记录;
    当所述通用串行总线端口与所述计算机未断开连接时,检测所述屏幕是否处于锁屏状态,
    当所述屏幕处于锁屏状态时,根据所述调试端口的历史记录,控制所述调试端口。
  6. 一种终端设备的调试端口控制装置,其特征在于,包括:
    检测单元,用于检测终端设备的通用串行总线端口的状态;
    所述检测单元还用于,当所述通用串行总线端口与计算机连接时,检测所述终端设备的屏幕是否处于安全锁屏状态,其中,所述安全锁屏状态在所述终端设备的操作系统中预先设置、并且仅当用户在被锁定的所述屏幕上输入正确的解锁信息后、所述屏幕才 能被成功解锁;以及
    控制单元,与所述检测单元连接,用于当所述屏幕处于所述安全锁屏状态时,控制所述终端设备的调试端口。
  7. 根据权利要求6所述的装置,其特征在于,当所述屏幕处于所述安全锁屏状态时,所述控制单元还用于,关闭所述调试端口。
  8. 根据权利要求7所述的装置,其特征在于,
    所述检测单元还用于,检测所述屏幕是否被成功解锁;
    当所述屏幕被成功解锁时,所述控制单元还用于,打开所述调试端口;或
    当所述屏幕未被成功解锁时,所述控制单元还用于,关闭所述调试端口。
  9. 根据权利要求8所述的装置,其特征在于,所述控制单元还用于,
    根据所述调试端口的打开或关闭状态,生成所述调试端口的历史记录。
  10. 根据权利要求9所述的装置,其特征在于,
    所述检测单元还用于,检测所述通用串行总线端口与所述计算机是否断开连接;
    当所述通用串行总线端口与所述计算机断开连接时,所述控制单元还用于,清除所述调试端口的历史记录;
    当所述通用串行总线端口与所述计算机未断开连接时,所述控制单元还用于,检测所述屏幕是否处于锁屏状态;
    当所述屏幕处于所述锁屏状态时,所述控制单元还用于,根据所述调试端口的历史记录,控制所述调试端口。
PCT/CN2014/088833 2013-10-17 2014-10-17 终端设备的调试端口控制方法和装置 WO2015055141A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP14853688.1A EP3046043B1 (en) 2013-10-17 2014-10-17 Method and device for controlling debug port of terminal device
KR1020167011908A KR101870847B1 (ko) 2013-10-17 2014-10-17 단말 디바이스의 디버그 포트 제어 방법 및 장치
US15/029,695 US20160246957A1 (en) 2013-10-17 2014-10-17 Method and Apparatus for Controlling Debug Port of Terminal Device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310489021.X 2013-10-17
CN201310489021.XA CN103559435B (zh) 2013-10-17 2013-10-17 终端设备的调试端口控制方法和装置

Publications (1)

Publication Number Publication Date
WO2015055141A1 true WO2015055141A1 (zh) 2015-04-23

Family

ID=50013681

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/088833 WO2015055141A1 (zh) 2013-10-17 2014-10-17 终端设备的调试端口控制方法和装置

Country Status (5)

Country Link
US (1) US20160246957A1 (zh)
EP (1) EP3046043B1 (zh)
KR (1) KR101870847B1 (zh)
CN (1) CN103559435B (zh)
WO (1) WO2015055141A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103559435B (zh) * 2013-10-17 2017-07-07 华为技术有限公司 终端设备的调试端口控制方法和装置
US10445711B1 (en) * 2014-01-24 2019-10-15 Jp Morgan Chase Bank, N.A. Remote controlled ATM system and method
CN105227521A (zh) * 2014-06-09 2016-01-06 中兴通讯股份有限公司 通信终端及其安全管理方法、装置
CN104134026B (zh) * 2014-07-30 2017-10-17 广东欧珀移动通信有限公司 一种应用于移动终端的深度安全解锁方法及装置
CN104182370B (zh) * 2014-08-07 2017-07-25 广州金山网络科技有限公司 一种数据传输方法、装置及移动终端
CN104216840B (zh) * 2014-09-11 2018-03-23 青岛海信移动通信技术股份有限公司 一种usb设置和对外部设备进行操作的方法及装置
CN104298903B (zh) * 2014-09-29 2018-02-02 小米科技有限责任公司 访问移动终端的方法及装置
CN105550568B (zh) * 2015-12-25 2019-03-15 小米科技有限责任公司 移动终端数据保护的方法及装置
CN107026764B (zh) * 2016-02-02 2020-01-14 腾讯科技(深圳)有限公司 一种远程调试方法、设备、服务器及系统
CN107329865B (zh) * 2017-06-29 2021-06-15 努比亚技术有限公司 打开调试桥adb功能方法、移动终端和计算机可读介质
CN109413010B (zh) * 2017-08-18 2021-01-05 深圳兆日科技股份有限公司 终端的认证方法、装置和系统
CN108304738B (zh) * 2018-01-04 2022-04-22 捷开通讯(深圳)有限公司 一种管理usb调试模式的方法、移动终端及存储装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102331976A (zh) * 2011-09-13 2012-01-25 珠海市魅族科技有限公司 一种终端usb存储功能的控制方法及终端
CN102411692A (zh) * 2010-09-25 2012-04-11 中国移动通信有限公司 一种运行终端的方法、系统及设备
CN103559435A (zh) * 2013-10-17 2014-02-05 华为技术有限公司 终端设备的调试端口控制方法和装置

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030005335A1 (en) * 2001-06-28 2003-01-02 Hidekazu Watanabe Protecting secured codes and circuits in an integrated circuit
JP2003187596A (ja) * 2001-12-14 2003-07-04 Mitsubishi Electric Corp 半導体記憶装置
KR20070121264A (ko) * 2006-06-21 2007-12-27 주식회사 엘티전자 유에스비 메모리 도난 방지 시스템 및 방법
US7587536B2 (en) * 2006-07-28 2009-09-08 Icron Technologies Corporation Method and apparatus for distributing USB hub functions across a network
US20140026188A1 (en) * 2012-07-23 2014-01-23 Justin L. Gubler Systems, methods, and devices for restricting use of electronic devices based on proximity to wireless devices
CN102929536B (zh) * 2012-10-11 2016-03-16 百度在线网络技术(北京)有限公司 移动终端的解锁及验证方法与解锁及验证装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102411692A (zh) * 2010-09-25 2012-04-11 中国移动通信有限公司 一种运行终端的方法、系统及设备
CN102331976A (zh) * 2011-09-13 2012-01-25 珠海市魅族科技有限公司 一种终端usb存储功能的控制方法及终端
CN103559435A (zh) * 2013-10-17 2014-02-05 华为技术有限公司 终端设备的调试端口控制方法和装置

Also Published As

Publication number Publication date
KR101870847B1 (ko) 2018-07-20
US20160246957A1 (en) 2016-08-25
KR20160065202A (ko) 2016-06-08
EP3046043A4 (en) 2016-08-03
EP3046043B1 (en) 2023-08-30
CN103559435A (zh) 2014-02-05
CN103559435B (zh) 2017-07-07
EP3046043A1 (en) 2016-07-20

Similar Documents

Publication Publication Date Title
WO2015055141A1 (zh) 终端设备的调试端口控制方法和装置
Parno Bootstrapping Trust in a" Trusted" Platform.
US20210192090A1 (en) Secure data storage device with security function implemented in a data security bridge
EP3332372B1 (en) Apparatus and method for trusted execution environment based secure payment transactions
US9921978B1 (en) System and method for enhanced security of storage devices
US10778661B2 (en) Secure distribution of secret key using a monotonic counter
CN112513857A (zh) 可信执行环境中的个性化密码安全访问控制
JP2012530967A (ja) 記憶装置のリモートアクセス制御
CN106687980A (zh) 管理程序和虚拟机保护
CN109492370B (zh) 终端启动方法、终端及签名设备
KR102240181B1 (ko) 저장 디바이스들에 대한 케이블-스왑 보안 공격의 방지
WO2022126644A1 (zh) 模型保护装置及方法、计算装置
EP2429226B1 (en) Mobile terminal and method for protecting its system data
CN104680055A (zh) 一种u盘接入工业控制系统网络后接受管理的控制方法
US20220027520A1 (en) Methods And Apparatus For In-Memory Device Access Control
CN111414605A (zh) 嵌入式安全单元的解锁方法、装置、电子设备及存储介质
WO2022052665A1 (zh) 无线终端及无线终端在Uboot模式下的接口访问鉴权方法
US9076002B2 (en) Stored authorization status for cryptographic operations
CN104361280B (zh) 一种通过smi中断实现对usb存储设备进行可信认证的方法
CN112636914A (zh) 一种身份验证方法、身份验证装置及智能卡
KR102615474B1 (ko) 블록체인에 기반한 로그인 이상징후 감지 및 로그인 관련 로그 데이터 관리 방법, 및 이를 수행하기 위한 장치
CN107850973B (zh) 触摸设备解锁方法和装置
CN205596141U (zh) 一种带有ic卡加密认证的交换机
JP5126530B2 (ja) コンピュータの環境を測定する機能を備えた外部記憶デバイス
CN114861173A (zh) Jtag接口的安全防护方法、装置、系统、设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14853688

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2014853688

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014853688

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 15029695

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 20167011908

Country of ref document: KR

Kind code of ref document: A