WO2015117332A1 - Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal - Google Patents
Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal Download PDFInfo
- Publication number
- WO2015117332A1 WO2015117332A1 PCT/CN2014/087152 CN2014087152W WO2015117332A1 WO 2015117332 A1 WO2015117332 A1 WO 2015117332A1 CN 2014087152 W CN2014087152 W CN 2014087152W WO 2015117332 A1 WO2015117332 A1 WO 2015117332A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- debugging mode
- usb debugging
- usb
- terminal
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, and a terminal for starting a USB debug mode interface.
- the current Android operating system smart terminals such as mobile phones
- the security guard installed on the computer will prompt the user to open the USB debugging mode in order to access the terminal and obtain browsing rights.
- the USB debugging mode is turned on, the user often forgets to turn off the USB debugging mode after disconnecting the security guard. In this case, if the terminal is lost, although the power-on password is blocked, the non-terminal user can easily debug through the USB.
- the mode accesses the terminal, thereby causing the leakage of the personal information of the terminal holder.
- the embodiments of the present invention are directed to a method, a device, and a terminal for starting a USB debugging mode interface, which are used to solve the problem that the terminal in the prior art uses the USB debugging interface opened by the terminal to obtain information in the terminal, thereby causing the terminal to hold The problem of disclosure of personal information of the others.
- the embodiment of the present invention provides a method for starting a USB debugging mode interface, where the method includes:
- USB debugging mode After the USB debugging mode is enabled, the authentication is judged. After the authentication is passed, the USB debugging mode interface is started.
- the step of presetting the authentication judgment for starting the USB debugging mode interface comprises:
- USB debug mode After the USB debug mode is enabled, set the authentication judgment of the USB debug mode interface.
- the type of the authentication judgment comprises: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition.
- the method further comprises: after the authentication error, prompting to re-authenticate multiple times, and after multiple authentication errors, the USB debugging mode is turned off.
- Another aspect of the embodiment of the present invention further provides a device for starting a USB debug mode interface, the device comprising:
- Setting the unit set to: set the authentication judgment for starting the USB debugging mode interface;
- the authentication unit is set to: after the USB debugging mode is enabled, the authentication is judged, and after the authentication is passed, the USB debugging mode interface is started.
- the setting unit is configured to: after the USB debugging mode is turned on, set an authentication judgment for starting the USB debugging mode interface.
- the type of the authentication judgment comprises: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition.
- the device further comprises:
- the authentication unit is further configured to: after the authentication error, multiple prompts to re-authenticate, and after multiple authentication errors, the USB debugging mode is turned off.
- a further aspect of the embodiments of the present invention provides a terminal, where the terminal includes any one of the foregoing devices.
- the authentication judgment is performed, and after the authentication is passed, the USB debugging mode interface is started, thereby effectively solving the problem that the other party in the prior art uses the USB debugging mode opened by the terminal to acquire the terminal.
- the information in the message causes the disclosure of the personal information of the terminal holder.
- FIG. 1 is a flowchart of a method for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention
- FIG. 2 is a flowchart of another method for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention
- FIG. 3 is a schematic structural diagram of an apparatus for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention.
- the main purpose of the embodiment of the present invention is to provide a USB debugging mode interface startup method and device terminal.
- USB universal serial bus
- the authentication judgment is performed, and after the authentication is passed, Restart the USB debugging mode interface to ensure that no matter whether the default USB debugging mode of the terminal is enabled or disabled, no one can log in to the terminal system, thereby effectively preventing others from entering the terminal system through the USB debugging mode enabled by the terminal, and acquiring the terminal system.
- FIG. 1 is a flowchart of a method for implementing a USB debugging mode interface of a terminal according to an embodiment of the present invention.
- the startup of the USB debugging mode interface of the terminal according to the embodiment of the present invention is not limited to the application only in the mobile phone.
- the method can also be applied to other terminals that use the Android operating system, such as a notebook, a computer, and the like.
- the present invention will be mainly described by taking a mobile phone as an example.
- a method for implementing a terminal USB debugging mode interface startup according to an embodiment of the present invention, as shown in FIG. 1, includes:
- the step specifically includes: after the USB debugging mode is enabled, setting an authentication judgment for starting the USB debugging mode interface;
- the user can access the terminal through the security guard application software on the server, and perform corresponding operations, that is, access the terminal through the Android Debug Bridge (adb) command.
- the security guard application software on the server
- perform corresponding operations that is, access the terminal through the Android Debug Bridge (adb) command.
- the step may also be: after the USB debugging mode is enabled, the authentication judgment is performed. After the authentication error occurs, the user is prompted to re-authenticate multiple times. After multiple authentication errors, the USB debugging mode is turned off, and if the authentication is passed, Then start the USB debug mode interface.
- the number of re-authentication can be arbitrarily set according to actual needs. By re-authentication, it can effectively avoid the problem that the terminal USB debugging mode interface cannot be opened due to improper operation of the user (for example, the wrong password is input).
- the time interval for each authentication prompt is set to 2 minutes, and the number of authentication prompts is up to 10 times within one day, thereby more effectively preventing others from stealing the personal information of the terminal holder.
- the types of authentication judgments in the embodiments of the present invention include: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition, and the like.
- the combination key recognition is specifically: encrypting by a combination of keys on the keyboard; for example, encrypting by "up, down, up, down, up and down” in the order of upper and lower combinations of side keys;
- the motion gesture recognition is specifically: setting a waving trajectory of a specific gesture, such as: a finger swiping the trajectory letter D in the air, and the like.
- the step of setting the authentication content specifically includes:
- the authentication setting option is popped up, and the security setting of the USB debugging mode interface is enabled;
- FIG. 2 is a flowchart of a method for starting a USB debugging mode interface of a terminal according to an embodiment of the present invention.
- the steps for enabling a USB debugging mode interface include:
- Step S201 The terminal is powered on, and enters the unlocking interface or the main interface, and may be an unlocking interface or a main interface that has been unlocked;
- Step S202 inserting a USB data line, prompting to open the USB debugging mode. If the default USB debugging mode function is turned on, inserting a USB data line, an android robot prompt icon appears at the top of the terminal desktop, indicating that the default USB debugging mode is enabled, but The communication transmission function is not turned on;
- Step S203 the system prompts the user to require authentication through a specific icon or menu, the user inputs the preset authentication content, if the authentication determination result is correct, proceeds to step S205, otherwise, proceeds to step S204;
- Step S204 the system prompts to request to output again, if the authentication determination result is correct, proceeds to step S204, otherwise, proceeds to step S206;
- Step S205 entering a USB debugging mode interface startup process
- Step S206 The terminal automatically turns off the USB debugging mode.
- the terminal is powered on and enters the main interface
- the android robot prompt icon will appear at the top of the mobile phone desktop, indicating that the default USB debugging mode is enabled, but the communication transmission function of the USB debugging mode interface is not open in this state. ;
- the state of the android robot icon is used to distinguish the state; the example uses a green icon to indicate that the usb debugging mode is turned on, but the communication function is temporarily turned off, and authentication is required to be enabled;
- the user inputs the preset authentication content, and uses the side volume button to input: “up and down up and down up and down”;
- the authentication result is correct, enter the USB debugging mode interface startup process, the android robot icon turns gray and white, indicating that the USB debugging mode port communication function is turned on, and the server side security guard software prompt can be connected to the terminal;
- the android robot icon turns into a yellow flashing icon, indicating that the output is required to be output again. After determining the error several times, the mobile phone automatically turns off the USB debugging mode;
- the method of the embodiment of the invention can effectively control the opening of the USB debugging mode interface, thereby ensuring user information security. Especially after the user's mobile phone is lost, if the USB debugging mode is turned on, other people have no way to obtain information through the open USB debugging mode without unlocking, thereby effectively preventing the data running in the mobile phone system from being stolen and protected. Mobile phone holders' information security.
- the embodiment of the present invention further provides a device for starting a USB debugging mode interface of the terminal
- FIG. 3 is a schematic structural diagram of an apparatus for starting a USB debugging mode interface of the terminal according to an embodiment of the present invention, and FIG. 3 only shows some modules of the terminal, which are convenient for description.
- the terminal of the present invention may be a mobile phone, or may be another terminal that can be applied to the Android system.
- the device according to the present invention will be described in detail below by taking a mobile phone as an example.
- the terminal of the present invention may further include other functional modules that should be provided when the mobile phone is used, such as a communication module, an operation module, and the like.
- the device includes a setting unit 31 and an authentication unit 32 coupled to each other;
- the setting unit 31 is configured to set an authentication judgment for starting the USB debugging mode interface
- the authentication unit 32 is configured to perform an authentication judgment after the USB debugging mode is enabled. After the authentication is passed, the USB debugging mode interface is started.
- the setting unit 31 of the embodiment of the present invention is specifically configured to: after the USB debugging mode is enabled, set an authentication judgment for starting the USB debugging mode interface;
- the authentication unit 32 is further configured to: after the authentication error, multiple times prompting to re-authenticate, and after multiple authentication errors, the USB debugging mode is turned off, and after the authentication is passed, the USB debugging mode interface is started.
- the types of authentication judgments in the embodiments of the present invention include: voice recognition, combined key recognition, motion gesture recognition, fingerprint recognition or face recognition, and the like.
- the combination key recognition is specifically: encrypting by a combination of keys on the keyboard; for example, encrypting by "up, down, up, down, up and down” in the order of upper and lower combinations of side keys;
- the gesture recognition is specifically: a specific trajectory, such as: the air trajectory letter D and so on.
- the content of the device in the embodiment of the present invention can be understood by referring to related content in the method part, and details are not described herein again.
- the embodiment of the present invention further provides a terminal, and the terminal includes any one of the foregoing devices.
- the terminal includes any one of the foregoing devices.
- the authentication judgment is performed. After the authentication is passed, the USB debugging mode interface is started, thereby ensuring that no one can log in to the terminal system regardless of whether the default USB debugging mode of the terminal is enabled or disabled. Therefore, the USB debugging mode opened by the terminal is effectively prevented from entering the terminal system, and the information in the terminal system is acquired, which causes the leakage of the personal information of the terminal holder.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
L'invention concerne un procédé et un dispositif pour activer une interface en mode de débogage USB, et un terminal. Le procédé comprend les étapes consistant à : prédéfinir une détermination d'authentification pour activer une interface dans un mode de débogage USB, effectuer la détermination d'authentification après que le mode de débogage USB a été activé, et activer l'interface dans le mode de débogage USB après que l'authentification a réussi. Au moyen des modes de réalisation de la présente invention, une détermination d'authentification est effectuée avant qu'une fonction d'une interface en mode de débogage USB ne soit activée, et l'interface en mode de débogage USB est activée à nouveau après que l'authentification a réussi, ce qui permet de résoudre efficacement le problème de la fuite d'informations personnelles appartenant au détenteur d'un terminal, dû au fait que les informations présentes dans un terminal sont acquises par d'autres personnes utilisant le mode de débogage USB activé par le terminal, comme cela se produit dans l'art antérieur.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410354642.1A CN105279460A (zh) | 2014-07-24 | 2014-07-24 | 一种usb调试模式接口启动的方法、装置及终端 |
CN201410354642.1 | 2014-07-24 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2015117332A1 true WO2015117332A1 (fr) | 2015-08-13 |
Family
ID=53777163
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2014/087152 WO2015117332A1 (fr) | 2014-07-24 | 2014-09-23 | Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105279460A (fr) |
WO (1) | WO2015117332A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701373A (zh) * | 2015-12-28 | 2016-06-22 | 东软集团股份有限公司 | 打开adb接口的方法和装置 |
CN108304738A (zh) * | 2018-01-04 | 2018-07-20 | 捷开通讯(深圳)有限公司 | 一种管理usb调试模式的方法、移动终端及存储装置 |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107402876A (zh) * | 2016-05-18 | 2017-11-28 | 中兴通讯股份有限公司 | 一种启动adb调试的方法及终端 |
CN106055492A (zh) * | 2016-05-27 | 2016-10-26 | 维沃移动通信有限公司 | 启动usb调试模式的方法及移动终端 |
CN107798224A (zh) * | 2016-09-07 | 2018-03-13 | 中兴通讯股份有限公司 | 一种终端控制方法及装置、用户终端 |
CN108388402A (zh) * | 2018-01-31 | 2018-08-10 | 华勤通讯技术有限公司 | Usb调试端口的操作方法及电子设备 |
CN109101450A (zh) * | 2018-06-27 | 2018-12-28 | 努比亚技术有限公司 | 一种终端控制方法、终端及计算机可读存储介质 |
CN110046514B (zh) * | 2019-04-12 | 2023-05-26 | 深圳Tcl新技术有限公司 | 调试数据保护方法、装置、服务器及存储介质 |
CN110928467B (zh) * | 2019-11-19 | 2021-07-27 | 广东欢太科技有限公司 | 一种连接选项显示方法、装置及计算机可读存储介质 |
CN110928822B (zh) * | 2019-11-19 | 2022-04-08 | 广东欢太科技有限公司 | 一种连接选项显示方法、装置及计算机可读存储介质 |
CN114169018B (zh) * | 2021-11-08 | 2022-07-05 | 广芯微电子(广州)股份有限公司 | 一种防止mcu嵌入式闪存数据泄露的电路 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101493867A (zh) * | 2008-01-25 | 2009-07-29 | 希姆通信息技术(上海)有限公司 | 手机与电脑之间安全互传共享数据的方法及系统 |
CN103218318A (zh) * | 2013-04-08 | 2013-07-24 | 浪潮集团有限公司 | 一种高安全性加密移动硬盘及其使用方法 |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102438056A (zh) * | 2011-11-08 | 2012-05-02 | 华为终端有限公司 | 利用触摸屏控制非触摸设备的方法、触摸装置和手持设备 |
CN103324506A (zh) * | 2013-06-24 | 2013-09-25 | 上海天奕达电子科技有限公司 | 一种控制Android应用程序安装的方法及手机 |
CN103440467B (zh) * | 2013-08-30 | 2016-06-15 | 广东欧珀移动通信有限公司 | 利用adb连接控制移动终端的方法 |
-
2014
- 2014-07-24 CN CN201410354642.1A patent/CN105279460A/zh not_active Withdrawn
- 2014-09-23 WO PCT/CN2014/087152 patent/WO2015117332A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101493867A (zh) * | 2008-01-25 | 2009-07-29 | 希姆通信息技术(上海)有限公司 | 手机与电脑之间安全互传共享数据的方法及系统 |
CN103218318A (zh) * | 2013-04-08 | 2013-07-24 | 浪潮集团有限公司 | 一种高安全性加密移动硬盘及其使用方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105701373A (zh) * | 2015-12-28 | 2016-06-22 | 东软集团股份有限公司 | 打开adb接口的方法和装置 |
CN105701373B (zh) * | 2015-12-28 | 2019-08-30 | 东软集团股份有限公司 | 打开adb接口的方法和装置 |
CN108304738A (zh) * | 2018-01-04 | 2018-07-20 | 捷开通讯(深圳)有限公司 | 一种管理usb调试模式的方法、移动终端及存储装置 |
Also Published As
Publication number | Publication date |
---|---|
CN105279460A (zh) | 2016-01-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2015117332A1 (fr) | Procédé et dispositif pour activer une interface en mode de débogage usb, et terminal | |
KR101654778B1 (ko) | 하드웨어 강제 액세스 보호 | |
US20170193212A1 (en) | Screen Interface Unlocking Method And Screen Interface Unlocking Device | |
US20150033364A1 (en) | Method and Apparatus for the Protection of Application Software | |
WO2016106989A1 (fr) | Procédé et appareil d'authentification de sécurité multi-système ainsi que terminal | |
CN103813334A (zh) | 权限控制方法和权限控制装置 | |
US20150067829A1 (en) | Electronic Device and Method for Unlocking Screen of Electronic Device | |
WO2017166689A1 (fr) | Procédé et dispositif de protection de la confidentialité | |
WO2017118315A1 (fr) | Procédé et dispositif de vérification de sécurité pour application de carte à puce | |
WO2019101096A1 (fr) | Procédé et dispositif de vérification de sécurité et terminal mobile | |
CN103455740B (zh) | 一种密码处理方法、装置及终端 | |
WO2019047148A1 (fr) | Procédé de vérification de mot de passe, terminal, et support de stockage lisible par ordinateur | |
US20140347161A1 (en) | Authorizing system and method of portable electronic device | |
WO2018000509A1 (fr) | Procédé de fonctionnement sans danger, dispositif de fonctionnement et terminal | |
WO2016165245A1 (fr) | Procédé et terminal de commande d'interface utilisateur | |
WO2016127448A1 (fr) | Procédé de changement de système, appareil de changement de système et terminal | |
CN103226680A (zh) | 关机保护方法及其装置 | |
WO2017071498A1 (fr) | Procédé et dispositif d'authentification d'identité | |
WO2017193517A1 (fr) | Procédé et système de déchiffrement destinés à un terminal | |
US11409853B2 (en) | System and method for authenticating before waking an information handling system | |
WO2017166359A1 (fr) | Procédé d'accès à un domaine utilisateur, dispositif d'accès et terminal mobile | |
WO2016180234A1 (fr) | Procédé et appareil de construction d'environnement sécurisé | |
CN106446629A (zh) | 智能移动终端的安全加密方法及系统 | |
CN107154999B (zh) | 终端及其基于环境信息的解锁方法、存储装置 | |
KR102248132B1 (ko) | 생체정보를 이용한 로그인방법, 장치 및 프로그램 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 14881753 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 14881753 Country of ref document: EP Kind code of ref document: A1 |