WO2015117332A1 - Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal - Google Patents

Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal Download PDF

Info

Publication number
WO2015117332A1
WO2015117332A1 PCT/CN2014/087152 CN2014087152W WO2015117332A1 WO 2015117332 A1 WO2015117332 A1 WO 2015117332A1 CN 2014087152 W CN2014087152 W CN 2014087152W WO 2015117332 A1 WO2015117332 A1 WO 2015117332A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication
debugging mode
usb debugging
usb
terminal
Prior art date
Application number
PCT/CN2014/087152
Other languages
English (en)
Chinese (zh)
Inventor
李军
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015117332A1 publication Critical patent/WO2015117332A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a terminal for starting a USB debug mode interface.
  • the current Android operating system smart terminals such as mobile phones
  • the security guard installed on the computer will prompt the user to open the USB debugging mode in order to access the terminal and obtain browsing rights.
  • the USB debugging mode is turned on, the user often forgets to turn off the USB debugging mode after disconnecting the security guard. In this case, if the terminal is lost, although the power-on password is blocked, the non-terminal user can easily debug through the USB.
  • the mode accesses the terminal, thereby causing the leakage of the personal information of the terminal holder.
  • the embodiments of the present invention are directed to a method, a device, and a terminal for starting a USB debugging mode interface, which are used to solve the problem that the terminal in the prior art uses the USB debugging interface opened by the terminal to obtain information in the terminal, thereby causing the terminal to hold The problem of disclosure of personal information of the others.
  • the embodiment of the present invention provides a method for starting a USB debugging mode interface, where the method includes:
  • USB debugging mode After the USB debugging mode is enabled, the authentication is judged. After the authentication is passed, the USB debugging mode interface is started.
  • the step of presetting the authentication judgment for starting the USB debugging mode interface comprises:
  • USB debug mode After the USB debug mode is enabled, set the authentication judgment of the USB debug mode interface.
  • the type of the authentication judgment comprises: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition.
  • the method further comprises: after the authentication error, prompting to re-authenticate multiple times, and after multiple authentication errors, the USB debugging mode is turned off.
  • Another aspect of the embodiment of the present invention further provides a device for starting a USB debug mode interface, the device comprising:
  • Setting the unit set to: set the authentication judgment for starting the USB debugging mode interface;
  • the authentication unit is set to: after the USB debugging mode is enabled, the authentication is judged, and after the authentication is passed, the USB debugging mode interface is started.
  • the setting unit is configured to: after the USB debugging mode is turned on, set an authentication judgment for starting the USB debugging mode interface.
  • the type of the authentication judgment comprises: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition.
  • the device further comprises:
  • the authentication unit is further configured to: after the authentication error, multiple prompts to re-authenticate, and after multiple authentication errors, the USB debugging mode is turned off.
  • a further aspect of the embodiments of the present invention provides a terminal, where the terminal includes any one of the foregoing devices.
  • the authentication judgment is performed, and after the authentication is passed, the USB debugging mode interface is started, thereby effectively solving the problem that the other party in the prior art uses the USB debugging mode opened by the terminal to acquire the terminal.
  • the information in the message causes the disclosure of the personal information of the terminal holder.
  • FIG. 1 is a flowchart of a method for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention
  • FIG. 2 is a flowchart of another method for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of an apparatus for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention.
  • the main purpose of the embodiment of the present invention is to provide a USB debugging mode interface startup method and device terminal.
  • USB universal serial bus
  • the authentication judgment is performed, and after the authentication is passed, Restart the USB debugging mode interface to ensure that no matter whether the default USB debugging mode of the terminal is enabled or disabled, no one can log in to the terminal system, thereby effectively preventing others from entering the terminal system through the USB debugging mode enabled by the terminal, and acquiring the terminal system.
  • FIG. 1 is a flowchart of a method for implementing a USB debugging mode interface of a terminal according to an embodiment of the present invention.
  • the startup of the USB debugging mode interface of the terminal according to the embodiment of the present invention is not limited to the application only in the mobile phone.
  • the method can also be applied to other terminals that use the Android operating system, such as a notebook, a computer, and the like.
  • the present invention will be mainly described by taking a mobile phone as an example.
  • a method for implementing a terminal USB debugging mode interface startup according to an embodiment of the present invention, as shown in FIG. 1, includes:
  • the step specifically includes: after the USB debugging mode is enabled, setting an authentication judgment for starting the USB debugging mode interface;
  • the user can access the terminal through the security guard application software on the server, and perform corresponding operations, that is, access the terminal through the Android Debug Bridge (adb) command.
  • the security guard application software on the server
  • perform corresponding operations that is, access the terminal through the Android Debug Bridge (adb) command.
  • the step may also be: after the USB debugging mode is enabled, the authentication judgment is performed. After the authentication error occurs, the user is prompted to re-authenticate multiple times. After multiple authentication errors, the USB debugging mode is turned off, and if the authentication is passed, Then start the USB debug mode interface.
  • the number of re-authentication can be arbitrarily set according to actual needs. By re-authentication, it can effectively avoid the problem that the terminal USB debugging mode interface cannot be opened due to improper operation of the user (for example, the wrong password is input).
  • the time interval for each authentication prompt is set to 2 minutes, and the number of authentication prompts is up to 10 times within one day, thereby more effectively preventing others from stealing the personal information of the terminal holder.
  • the types of authentication judgments in the embodiments of the present invention include: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition, and the like.
  • the combination key recognition is specifically: encrypting by a combination of keys on the keyboard; for example, encrypting by "up, down, up, down, up and down” in the order of upper and lower combinations of side keys;
  • the motion gesture recognition is specifically: setting a waving trajectory of a specific gesture, such as: a finger swiping the trajectory letter D in the air, and the like.
  • the step of setting the authentication content specifically includes:
  • the authentication setting option is popped up, and the security setting of the USB debugging mode interface is enabled;
  • FIG. 2 is a flowchart of a method for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention.
  • the steps for enabling a USB debugging mode interface include:
  • Step S201 The terminal is powered on, and enters the unlocking interface or the main interface, and may be an unlocking interface or a main interface that has been unlocked;
  • Step S202 inserting a USB data line, prompting to open the USB debugging mode. If the default USB debugging mode function is turned on, inserting a USB data line, an android robot prompt icon appears at the top of the terminal desktop, indicating that the default USB debugging mode is enabled, but The communication transmission function is not turned on;
  • Step S203 the system prompts the user to require authentication through a specific icon or menu, the user inputs the preset authentication content, if the authentication determination result is correct, proceeds to step S205, otherwise, proceeds to step S204;
  • Step S204 the system prompts to request to output again, if the authentication determination result is correct, proceeds to step S204, otherwise, proceeds to step S206;
  • Step S205 entering a USB debugging mode interface startup process
  • Step S206 The terminal automatically turns off the USB debugging mode.
  • the terminal is powered on and enters the main interface
  • the android robot prompt icon will appear at the top of the mobile phone desktop, indicating that the default USB debugging mode is enabled, but the communication transmission function of the USB debugging mode interface is not open in this state. ;
  • the state of the android robot icon is used to distinguish the state; the example uses a green icon to indicate that the usb debugging mode is turned on, but the communication function is temporarily turned off, and authentication is required to be enabled;
  • the user inputs the preset authentication content, and uses the side volume button to input: “up and down up and down up and down”;
  • the authentication result is correct, enter the USB debugging mode interface startup process, the android robot icon turns gray and white, indicating that the USB debugging mode port communication function is turned on, and the server side security guard software prompt can be connected to the terminal;
  • the android robot icon turns into a yellow flashing icon, indicating that the output is required to be output again. After determining the error several times, the mobile phone automatically turns off the USB debugging mode;
  • the method of the embodiment of the invention can effectively control the opening of the USB debugging mode interface, thereby ensuring user information security. Especially after the user's mobile phone is lost, if the USB debugging mode is turned on, other people have no way to obtain information through the open USB debugging mode without unlocking, thereby effectively preventing the data running in the mobile phone system from being stolen and protected. Mobile phone holders' information security.
  • the embodiment of the present invention further provides a device for starting a USB debugging mode interface of the terminal
  • FIG. 3 is a schematic structural diagram of an apparatus for starting a USB debugging mode interface of the terminal according to an embodiment of the present invention, and FIG. 3 only shows some modules of the terminal, which are convenient for description.
  • the terminal of the present invention may be a mobile phone, or may be another terminal that can be applied to the Android system.
  • the device according to the present invention will be described in detail below by taking a mobile phone as an example.
  • the terminal of the present invention may further include other functional modules that should be provided when the mobile phone is used, such as a communication module, an operation module, and the like.
  • the device includes a setting unit 31 and an authentication unit 32 coupled to each other;
  • the setting unit 31 is configured to set an authentication judgment for starting the USB debugging mode interface
  • the authentication unit 32 is configured to perform an authentication judgment after the USB debugging mode is enabled. After the authentication is passed, the USB debugging mode interface is started.
  • the setting unit 31 of the embodiment of the present invention is specifically configured to: after the USB debugging mode is enabled, set an authentication judgment for starting the USB debugging mode interface;
  • the authentication unit 32 is further configured to: after the authentication error, multiple times prompting to re-authenticate, and after multiple authentication errors, the USB debugging mode is turned off, and after the authentication is passed, the USB debugging mode interface is started.
  • the types of authentication judgments in the embodiments of the present invention include: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition, and the like.
  • the combination key recognition is specifically: encrypting by a combination of keys on the keyboard; for example, encrypting by "up, down, up, down, up and down” in the order of upper and lower combinations of side keys;
  • the gesture recognition is specifically: a specific trajectory, such as: the air trajectory letter D and so on.
  • the content of the device in the embodiment of the present invention can be understood by referring to related content in the method part, and details are not described herein again.
  • the embodiment of the present invention further provides a terminal, and the terminal includes any one of the foregoing devices.
  • the terminal includes any one of the foregoing devices.
  • the authentication judgment is performed. After the authentication is passed, the USB debugging mode interface is started, thereby ensuring that no one can log in to the terminal system regardless of whether the default USB debugging mode of the terminal is enabled or disabled. Therefore, the USB debugging mode opened by the terminal is effectively prevented from entering the terminal system, and the information in the terminal system is acquired, which causes the leakage of the personal information of the terminal holder.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

L'invention concerne un procédé et un dispositif pour activer une interface en mode de débogage USB, et un terminal. Le procédé comprend les étapes consistant à : prédéfinir une détermination d'authentification pour activer une interface dans un mode de débogage USB, effectuer la détermination d'authentification après que le mode de débogage USB a été activé, et activer l'interface dans le mode de débogage USB après que l'authentification a réussi. Au moyen des modes de réalisation de la présente invention, une détermination d'authentification est effectuée avant qu'une fonction d'une interface en mode de débogage USB ne soit activée, et l'interface en mode de débogage USB est activée à nouveau après que l'authentification a réussi, ce qui permet de résoudre efficacement le problème de la fuite d'informations personnelles appartenant au détenteur d'un terminal, dû au fait que les informations présentes dans un terminal sont acquises par d'autres personnes utilisant le mode de débogage USB activé par le terminal, comme cela se produit dans l'art antérieur.
PCT/CN2014/087152 2014-07-24 2014-09-23 Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal WO2015117332A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410354642.1A CN105279460A (zh) 2014-07-24 2014-07-24 一种usb调试模式接口启动的方法、装置及终端
CN201410354642.1 2014-07-24

Publications (1)

Publication Number Publication Date
WO2015117332A1 true WO2015117332A1 (fr) 2015-08-13

Family

ID=53777163

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/087152 WO2015117332A1 (fr) 2014-07-24 2014-09-23 Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal

Country Status (2)

Country Link
CN (1) CN105279460A (fr)
WO (1) WO2015117332A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701373A (zh) * 2015-12-28 2016-06-22 东软集团股份有限公司 打开adb接口的方法和装置
CN108304738A (zh) * 2018-01-04 2018-07-20 捷开通讯(深圳)有限公司 一种管理usb调试模式的方法、移动终端及存储装置

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107402876A (zh) * 2016-05-18 2017-11-28 中兴通讯股份有限公司 一种启动adb调试的方法及终端
CN106055492A (zh) * 2016-05-27 2016-10-26 维沃移动通信有限公司 启动usb调试模式的方法及移动终端
CN107798224A (zh) * 2016-09-07 2018-03-13 中兴通讯股份有限公司 一种终端控制方法及装置、用户终端
CN108388402A (zh) * 2018-01-31 2018-08-10 华勤通讯技术有限公司 Usb调试端口的操作方法及电子设备
CN109101450A (zh) * 2018-06-27 2018-12-28 努比亚技术有限公司 一种终端控制方法、终端及计算机可读存储介质
CN110046514B (zh) * 2019-04-12 2023-05-26 深圳Tcl新技术有限公司 调试数据保护方法、装置、服务器及存储介质
CN110928467B (zh) * 2019-11-19 2021-07-27 广东欢太科技有限公司 一种连接选项显示方法、装置及计算机可读存储介质
CN110928822B (zh) * 2019-11-19 2022-04-08 广东欢太科技有限公司 一种连接选项显示方法、装置及计算机可读存储介质
CN114169018B (zh) * 2021-11-08 2022-07-05 广芯微电子(广州)股份有限公司 一种防止mcu嵌入式闪存数据泄露的电路

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493867A (zh) * 2008-01-25 2009-07-29 希姆通信息技术(上海)有限公司 手机与电脑之间安全互传共享数据的方法及系统
CN103218318A (zh) * 2013-04-08 2013-07-24 浪潮集团有限公司 一种高安全性加密移动硬盘及其使用方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438056A (zh) * 2011-11-08 2012-05-02 华为终端有限公司 利用触摸屏控制非触摸设备的方法、触摸装置和手持设备
CN103324506A (zh) * 2013-06-24 2013-09-25 上海天奕达电子科技有限公司 一种控制Android应用程序安装的方法及手机
CN103440467B (zh) * 2013-08-30 2016-06-15 广东欧珀移动通信有限公司 利用adb连接控制移动终端的方法

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101493867A (zh) * 2008-01-25 2009-07-29 希姆通信息技术(上海)有限公司 手机与电脑之间安全互传共享数据的方法及系统
CN103218318A (zh) * 2013-04-08 2013-07-24 浪潮集团有限公司 一种高安全性加密移动硬盘及其使用方法

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105701373A (zh) * 2015-12-28 2016-06-22 东软集团股份有限公司 打开adb接口的方法和装置
CN105701373B (zh) * 2015-12-28 2019-08-30 东软集团股份有限公司 打开adb接口的方法和装置
CN108304738A (zh) * 2018-01-04 2018-07-20 捷开通讯(深圳)有限公司 一种管理usb调试模式的方法、移动终端及存储装置

Also Published As

Publication number Publication date
CN105279460A (zh) 2016-01-27

Similar Documents

Publication Publication Date Title
WO2015117332A1 (fr) Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal
KR101654778B1 (ko) 하드웨어 강제 액세스 보호
US20170193212A1 (en) Screen Interface Unlocking Method And Screen Interface Unlocking Device
US20150033364A1 (en) Method and Apparatus for the Protection of Application Software
WO2016106989A1 (fr) Procédé et appareil d'authentification de sécurité multi-système ainsi que terminal
CN103813334A (zh) 权限控制方法和权限控制装置
US20150067829A1 (en) Electronic Device and Method for Unlocking Screen of Electronic Device
WO2017166689A1 (fr) Procédé et dispositif de protection de la confidentialité
WO2017118315A1 (fr) Procédé et dispositif de vérification de sécurité pour application de carte à puce
WO2019101096A1 (fr) Procédé et dispositif de vérification de sécurité et terminal mobile
CN103455740B (zh) 一种密码处理方法、装置及终端
WO2019047148A1 (fr) Procédé de vérification de mot de passe, terminal, et support de stockage lisible par ordinateur
US20140347161A1 (en) Authorizing system and method of portable electronic device
WO2018000509A1 (fr) Procédé de fonctionnement sans danger, dispositif de fonctionnement et terminal
WO2016165245A1 (fr) Procédé et terminal de commande d'interface utilisateur
WO2016127448A1 (fr) Procédé de changement de système, appareil de changement de système et terminal
CN103226680A (zh) 关机保护方法及其装置
WO2017071498A1 (fr) Procédé et dispositif d'authentification d'identité
WO2017193517A1 (fr) Procédé et système de déchiffrement destinés à un terminal
US11409853B2 (en) System and method for authenticating before waking an information handling system
WO2017166359A1 (fr) Procédé d'accès à un domaine utilisateur, dispositif d'accès et terminal mobile
WO2016180234A1 (fr) Procédé et appareil de construction d'environnement sécurisé
CN106446629A (zh) 智能移动终端的安全加密方法及系统
CN107154999B (zh) 终端及其基于环境信息的解锁方法、存储装置
KR102248132B1 (ko) 생체정보를 이용한 로그인방법, 장치 및 프로그램

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14881753

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14881753

Country of ref document: EP

Kind code of ref document: A1