CN106203035B - A kind of data access control method and mobile terminal - Google Patents
A kind of data access control method and mobile terminal Download PDFInfo
- Publication number
- CN106203035B CN106203035B CN201610506431.4A CN201610506431A CN106203035B CN 106203035 B CN106203035 B CN 106203035B CN 201610506431 A CN201610506431 A CN 201610506431A CN 106203035 B CN106203035 B CN 106203035B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- data
- cipher authentication
- instruction message
- permission
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
- G06F21/85—Protecting input, output or interconnection devices interconnection devices, e.g. bus-connected or in-line devices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a kind of data access control method and mobile terminals, it include: to detect that mobile terminal connect with terminal equipment in communication, and the USB debugging permission of mobile terminal is when opening, the pressing operation that detection is combined for the physical button of mobile terminal;Detecting for physical button combination pressing operation, and the pressing duration of pressing operation be greater than preset duration when, open mobile terminal USB debugging permission;Cipher authentication instruction message is sent to terminal device, cipher authentication instruction message is used to indicate the prompting message that terminal device output carries out cipher authentication for the reading permission of the data of mobile terminal;The cipher authentication information of the reading permission of the data for mobile terminal is obtained, and when detecting that cipher authentication information is matched with preset password information, reading permission of the opening terminal apparatus to the data of mobile terminal.The embodiment of the present invention is conducive to the data that user conveniently shifts mobile terminal, promotes the property easy to use of mobile terminal.
Description
Technical field
The present invention relates to technical field of mobile terminals, and in particular to a kind of data access control method and mobile terminal.
Background technique
Mobile phone is all capacitance touch screen now, and many operation buttons all eliminate, the only remaining power key retained substantially and
Volume key, as being all placed in the operation pages of mobile phone screen in return key, home key, many Cell Phone Designs of Menu key.And mesh
Preceding more and more mobile phones use OLED display screen, it is easy to which inside is broken, and the glass outside mobile phone screen is broken not yet, interior
Because screen generates crack, liquid crystal leakage, entire screen does not all work, can not show the display screen in portion.Although cell phone mainboard and behaviour
Make system there is no bad, touch screen is also without bad, but display screen is broken, and can not show, be exactly one bad for a user
Machine.Machine is broken very normally, and user can encounter, but for bad machine, user has used a very long time, and the inside saves
Many precious data, such as photograph video, phone information etc. data.Many data are all stored in built-in storage mould
Block, if display screen can be shown, user can operate the transfer for carrying out data with self, but this display screen occur without Faxian
Machine after showing, user can not carry out content operation.
Computer can not be connected to carry out data transmission and shift, because of connection computer, computer reads data and needs to carry out mobile phone
Content system operation, display screen can not show that user can not carry out blind operation.Some mobile phone connection computer directs tap into row driving peace
Dress, which can not need USB permission, can read cellphone information, but having to mobile phone does not have screen-lock password or energy Xie Kaisuo
Shield password.When screen can not be lighted completely, screen lock can not be unlocked, unless mobile phone has unlocked by fingerprint, otherwise cannot be introduced into mobile phone
Read information.Data can not shift, and conventional method is exactly after sale, display screen to be changed, or mainboard is put into other one
Data copy is carried out in a machine, it is clear that be very troublesome and high-cost.
Summary of the invention
The embodiment of the invention provides a kind of data access control method and mobile terminals, to promote the sound of mobile terminal
The configuration speed of parameter is imitated, memory optimization resource management promotes user experience.
The embodiment of the present invention provides a kind of data access control method, comprising:
Detecting that mobile terminal connect with terminal equipment in communication, and the general-purpose serial bus USB tune of the mobile terminal
When examination permission is not opened, pressing operation of the detection for the physical button combination of the mobile terminal;
Detecting the pressing operation for physical button combination, and the pressing duration of the pressing operation is greater than in advance
If when duration, opening the USB debugging permission of the mobile terminal;
Cipher authentication instruction message is sent to the terminal device, the cipher authentication instruction message is used to indicate the end
End equipment output carries out the prompting message of cipher authentication for the reading permission of the data of the mobile terminal;
The cipher authentication information of the reading permission of the data for the mobile terminal is obtained, and is detecting the password
When authentication information is matched with preset password information, the terminal device is opened to the reading permission of the data of the mobile terminal.
As can be seen from the above technical solutions, compared with the existing technology in mobile terminal screen damage can not normal operating
When touch screen, display screen can only be replaced or mainboard is put into the scheme for carrying out data copy in another machine, the present invention is real
It applies example and has the advantage that mobile terminal is detecting the pressing operation for physical button combination, and the pressing of pressing operation
When duration is greater than preset duration, the USB debugging permission of mobile terminal is opened, and sends cipher authentication instruction to terminal device and disappears
Breath, and obtaining cipher authentication information, after detecting that cipher authentication information is matched with preset password information, opening terminal apparatus pair
The reading permission of the data of mobile terminal.To realize mobile terminal screen damage can not normal operating touch screen the case where
Under, without operate touch screen can opening terminal apparatus to the reading permissions of the data of mobile terminal, be conducive to user facilitate it is fast
The data of prompt transfer mobile terminal, promote the property easy to use of mobile terminal.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of data access control system being made of mobile terminal and terminal device provided in an embodiment of the present invention
System architecture diagram;
Fig. 2 is a kind of flow diagram of data access control method disclosed by the embodiments of the present invention;
Fig. 2 .1 is the exemplary diagram that a kind of terminal device disclosed by the embodiments of the present invention shows prompting message;
Fig. 2 .2 is the exemplary diagram that another terminal device disclosed by the embodiments of the present invention shows prompting message
Fig. 2 .3 is the exemplary diagram that another terminal device disclosed by the embodiments of the present invention shows prompting message
Fig. 3 is the flow diagram of another data access control method disclosed by the embodiments of the present invention;
Fig. 4 is a kind of unit composition block diagram of data access control device disclosed by the embodiments of the present invention;
Fig. 5 is a kind of structural schematic diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 6 is the structural schematic diagram of another mobile terminal disclosed by the embodiments of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
In order to be best understood from a kind of data access control method and mobile terminal disclosed by the embodiments of the present invention, figure is please referred to
1, Fig. 1 is a kind of system of data access control system being made of mobile terminal and terminal device provided in an embodiment of the present invention
Architecture diagram.Wherein, it is electric for example to can be smart phone, tablet computer, desktop computer, notebook etc. for mobile terminal and terminal device
Sub- equipment, mobile terminal can be identical with terminal device, are such as smart phone, mobile terminal and terminal device can not also
Together, as mobile terminal be smart phone, terminal device is desktop computer, and the embodiment of the present invention does not do unique restriction.
It describes in detail below to the embodiment of the present invention.
Referring to Fig. 2, Fig. 2 is that the embodiment of the invention provides a kind of flow diagrams of data access control method, such as
Shown in figure, notebook data access control method includes:
S201, mobile terminal is detecting that mobile terminal connect with terminal equipment in communication, and the mobile terminal is general
When universal serial bus (Universal Serial Bus, USB) debugging permission is not opened, detection is directed to the physics of the mobile terminal
The pressing operation of key combination;
Wherein, the physical button combination is including at least any two in following physical button: power key, volume+press
Key, volume-key, Home key.
Wherein, the mobile terminal and the terminal device are communicated to connect by charge cable.
S202, the mobile terminal is detecting the pressing operation for physical button combination, and the pressing is grasped
When the pressing duration of work is greater than preset duration, the USB debugging permission of the mobile terminal is opened;
Wherein, the pressing duration for example can be 3s, 4s, 5s etc..
S203, the mobile terminal send cipher authentication instruction message, the cipher authentication instruction to the terminal device
Message is used to indicate the terminal device output and carries out mentioning for cipher authentication for the reading permission of the data of the mobile terminal
Show message;
Wherein, the data of the mobile terminal include at least image data or video data.
Wherein, the cipher authentication instruction message includes that finger-print cipher certification instruction message or numerical ciphers certification instruction disappear
Breath or graphical passwords authenticate instruction message.
Optionally, described in the case where the cipher authentication instruction message is that the finger-print cipher authenticates instruction message
Acquisition for mobile terminal may is that logical for the implementation of the cipher authentication information of the reading permission of the data of the mobile terminal
The fingerprint recognition mould group for crossing the mobile terminal obtains the finger print data of user's finger, and the finger print data is for the movement
The cipher authentication information of the reading permission of the data of terminal.
It optionally, is that the numerical ciphers authenticate instruction message or graphical passwords certification in the cipher authentication instruction message
In the case where indicating information, cipher authentication letter of the acquisition for mobile terminal for the reading permission of the data of the mobile terminal
The implementation of breath may is that obtaining the user that carries that the terminal device is sent passes through the number of the terminal device typing
Encrypted message or graphical passwords information, the numerical ciphers information or the graphical passwords information are for the mobile terminal
The cipher authentication information of the reading permission of data.
In the specific implementation, the terminal device receive mobile terminal send cipher authentication instruction message after, the end
End equipment can export prompting message by the modes such as text and/or figure displaying, voice broadcast, video playing, to prompt to use
Cipher authentication information of the family input for the reading permission of the data of mobile terminal.
For example, the prompting message for example can be as shown in Fig. 2 .1 " please by mobile phone typing finger print information with
Reading permission of the activation pin to the data of mobile terminal ".
Again for example, the prompting message for example can be " asks typing mobile phone to unlock digital close as shown in Fig. 2 .2
Code is with activation pin to the reading permission of the data of mobile terminal ".
Again for example, the prompting message for example can be " asks the figure of typing mobile phone unlock close as shown in Fig. 2 .3
Code is with activation pin to the reading permission of the data of mobile terminal ".
S204, the acquisition for mobile terminal are directed to the cipher authentication information of the reading permission of the data of the mobile terminal,
And when detecting that the cipher authentication information is matched with preset password information, the terminal device is opened to the mobile terminal
Data reading permission.
As can be seen that compared with the existing technology in mobile terminal screen damage can not normal operating touch screen when, can only
Mainboard is put into the scheme that data copy is carried out in another machine by replacement display screen, and the embodiment of the present invention has following excellent
Point: mobile terminal is detecting the pressing operation for physical button combination, and when the pressing duration of pressing operation is greater than default
When long, the USB debugging permission of mobile terminal is opened, and send cipher authentication instruction message to terminal device, and obtaining password
Authentication information, after detecting that cipher authentication information is matched with preset password information, data of the opening terminal apparatus to mobile terminal
Reading permission.To realize the screen damage of mobile terminal can not normal operating touch screen in the case where, without operate touching
Control screen can opening terminal apparatus to the reading permissions of the data of mobile terminal, be conducive to user and conveniently shift mobile end
The data at end promote the property easy to use of mobile terminal.
It is consistent with above-mentioned embodiment shown in FIG. 1, referring to Fig. 3, Fig. 3 is another number provided in an embodiment of the present invention
According to the flow diagram of access control method.As shown, notebook data access control method includes:
S301, mobile terminal is detecting that mobile terminal connect with terminal equipment in communication, and the mobile terminal is general
When serial bus USB debugging permission is not opened, pressing operation of the detection for the physical button combination of the mobile terminal;
S302, the mobile terminal is detecting the pressing operation for physical button combination, and the pressing is grasped
When the pressing duration of work is greater than preset duration, the USB debugging permission of the mobile terminal is opened;
S303, the mobile terminal send cipher authentication instruction message, the cipher authentication instruction to the terminal device
Message is used to indicate the terminal device output and carries out mentioning for cipher authentication for the reading permission of the data of the mobile terminal
Show message;The cipher authentication instruction message is that the finger-print cipher authenticates instruction message;
S304, the mobile terminal obtain the fingerprint number of user's finger by the fingerprint recognition mould group of the mobile terminal
According to the finger print data is the cipher authentication information for the reading permission of the data of the mobile terminal.
S305, the mobile terminal open institute when detecting that the cipher authentication information is matched with preset password information
Terminal device is stated to the reading permission of the data of the mobile terminal.
As can be seen that compared with the existing technology in mobile terminal screen damage can not normal operating touch screen when, can only
Mainboard is put into the scheme that data copy is carried out in another machine by replacement display screen, and the embodiment of the present invention has following excellent
Point: mobile terminal is detecting the pressing operation for physical button combination, and when the pressing duration of pressing operation is greater than default
When long, the USB debugging permission of mobile terminal is opened, and send cipher authentication instruction message to terminal device, and obtaining password
Authentication information, after detecting that cipher authentication information is matched with preset password information, data of the opening terminal apparatus to mobile terminal
Reading permission.To realize the screen damage of mobile terminal can not normal operating touch screen in the case where, without operate touching
Control screen can opening terminal apparatus to the reading permissions of the data of mobile terminal, be conducive to user and conveniently shift mobile end
The data at end promote the property easy to use of mobile terminal.
The following is an embodiment of the apparatus of the present invention, and apparatus of the present invention embodiment is realized for executing embodiment of the present invention method
Method.As shown in figure 4, the data access control device may include detection unit 401, permission opening unit 402 and hair
Send unit 403, in which:
The detection unit 401, for detecting that mobile terminal connect with terminal equipment in communication, and the mobile terminal
USB debugging permission when not opening, the pressing operation that detection is combined for the physical button of the mobile terminal;
The permission opening unit 402, for detecting the pressing operation for physical button combination, and it is described
When the pressing duration of pressing operation is greater than preset duration, the USB debugging permission of the mobile terminal is opened;
The transmission unit 403, for sending cipher authentication instruction message to the terminal device, the cipher authentication refers to
Show that message is used to indicate the terminal device output and carries out cipher authentication for the reading permission of the data of the mobile terminal
Prompting message;
The permission opening unit 402 is also used to obtain the reading permission of the data for the mobile terminal
Cipher authentication information, and when detecting that the cipher authentication information is matched with preset password information, open the terminal device
To the reading permission of the data of the mobile terminal.
Optionally, the physical button combination includes at least any two in following physical button:
Power key, volume+key, volume-key, Home key.
Optionally, the cipher authentication instruction message includes finger-print cipher certification instruction message or numerical ciphers certification instruction
Message or graphical passwords authenticate instruction message.
Optionally, described in the case where the cipher authentication instruction message is that the finger-print cipher authenticates instruction message
In the cipher authentication message context for the reading permission for obtaining the data for the mobile terminal, the permission opening unit 402
For:
The finger print data of user's finger is obtained by the fingerprint recognition mould group of the mobile terminal, the finger print data is needle
To the cipher authentication information of the reading permission of the data of the mobile terminal.
It optionally, is that the numerical ciphers authenticate instruction message or graphical passwords certification in the cipher authentication instruction message
In the case where indicating information, the cipher authentication information side in the reading permission for obtaining the data for the mobile terminal
Face, the permission opening unit 402 are used for:
Obtain that the terminal device sends carry user by the numerical ciphers information of the terminal device typing or
Graphical passwords information, the numerical ciphers information or the graphical passwords information are the reading for the data of the mobile terminal
The cipher authentication information of permission.
Optionally, the mobile terminal and the terminal device are communicated to connect by charge cable.
It should be noted that data access control device described in apparatus of the present invention embodiment is the shape with functional unit
Formula is presented.Term " unit " used herein above should be understood as meaning as widest as possible, for realizing each " unit " institute
The object of representation function for example can be integrated circuit ASIC, single circuit, for executing one or more softwares or firmware journey
The processor (shared, dedicated or chipset) and memory of sequence, combinational logic circuit, and/or provide and realize above-mentioned function
Other suitable components.
For example, the function of above-mentioned detection unit 401 can mobile terminal as shown in Figure 5 realize, specifically can be with
By processor 101 by calling the executable program code in memory 102, detecting that mobile terminal and terminal device are logical
Letter connection, and the USB debugging permission of the mobile terminal, when not opening, detection is combined for the physical button of the mobile terminal
Pressing operation.
As can be seen that compared with the existing technology in mobile terminal screen damage can not normal operating touch screen when, can only
Mainboard is put into the scheme that data copy is carried out in another machine by replacement display screen, and the embodiment of the present invention has following excellent
Point: data access control device is detecting the pressing operation for physical button combination, and grows up when the pressing of pressing operation
When preset duration, the USB debugging permission of mobile terminal is opened, and to terminal device transmission cipher authentication instruction message, and
Cipher authentication information is obtained, after detecting that cipher authentication information is matched with preset password information, opening terminal apparatus is to mobile whole
The reading permission of the data at end.To realize the screen damage of mobile terminal can not normal operating touch screen in the case where, nothing
Need to operate touch screen can opening terminal apparatus to the reading permission of the data of mobile terminal, be conducive to user and conveniently turn
The data for moving mobile terminal, promote the property easy to use of mobile terminal.
The embodiment of the invention also provides a kind of mobile terminals, as shown in Figure 5, comprising: processor 101, memory 102,
Communication interface 103, communication bus 104;Wherein, processor 101, memory 102 and communication interface 103 pass through communication bus 104
It connects and completes mutual communication;The wireless communication that processor 101 passes through communication interface 103 control and External cell net;It is logical
Believe that interface 103 includes but is not limited to antenna, amplifier, transceiver, coupler, LNA (Low Noise Amplifier, low noise
Acoustic amplifier), duplexer etc..Memory 102 comprises at least one of the following: random access memory, nonvolatile memory with
And external memory, executable program code is stored in memory 102, which being capable of bootstrap processor
The data access control method specifically disclosed in 101 execution embodiment of the present invention method, comprising the following steps:
The processor 101 is detecting that mobile terminal connect with terminal equipment in communication, and the mobile terminal is general
When serial bus USB debugging permission is not opened, pressing operation of the detection for the physical button combination of the mobile terminal;
The processor 101 is detecting the pressing operation for physical button combination, and the pressing operation
When pressing duration greater than preset duration, the USB debugging permission of the mobile terminal is opened;
The processor 101 sends cipher authentication instruction message, institute to the terminal device by the communication interface 104
State cipher authentication instruction message be used to indicate terminal device output for the data of the mobile terminal reading permission into
The prompting message of row cipher authentication;
The processor 101 obtains the cipher authentication information of the reading permission of the data for the mobile terminal, and
When detecting that the cipher authentication information is matched with preset password information, the terminal device is opened to the number of the mobile terminal
According to reading permission.
As can be seen that compared with the existing technology in mobile terminal screen damage can not normal operating touch screen when, can only
Mainboard is put into the scheme that data copy is carried out in another machine by replacement display screen, and the embodiment of the present invention has following excellent
Point: mobile terminal is detecting the pressing operation for physical button combination, and when the pressing duration of pressing operation is greater than default
When long, the USB debugging permission of mobile terminal is opened, and send cipher authentication instruction message to terminal device, and obtaining password
Authentication information, after detecting that cipher authentication information is matched with preset password information, data of the opening terminal apparatus to mobile terminal
Reading permission.To realize the screen damage of mobile terminal can not normal operating touch screen in the case where, without operate touching
Control screen can opening terminal apparatus to the reading permissions of the data of mobile terminal, be conducive to user and conveniently shift mobile end
The data at end promote the property easy to use of mobile terminal.
In addition, the executable program code stored in above-mentioned memory 102 is also used to execute above-mentioned Fig. 2 and shown in Fig. 3
The correlation step of data access control method.Terminal device is to the reading permission of the data of the mobile terminal as described in opening
Step, etc..
The embodiment of the invention also provides another mobile terminals, as shown in fig. 6, for ease of description, illustrate only with
The relevant part of the embodiment of the present invention, it is disclosed by specific technical details, please refer to present invention method part.The movement
Terminal can be include mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS
Any terminal device such as (Point of Sales, point-of-sale terminal), vehicle-mounted computer, by taking mobile terminal is mobile phone as an example:
Fig. 6 shows the block diagram of the part-structure of mobile phone relevant to mobile terminal provided in an embodiment of the present invention.Ginseng
Fig. 6 is examined, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 910, memory 920, input unit 930, display unit
940, sensor 950, voicefrequency circuit 960, Wireless Fidelity (Wireless Fidelity, WiFi) module 970, processor 980,
And the equal components of power supply 990.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted to mobile phone
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 910 can be used for sending and receiving for information.In general, RF circuit 910 includes but is not limited to antenna, at least one
A amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition,
RF circuit 910 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile
Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more
Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division
Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service
(Short Messaging Service, SMS) etc..
Memory 920 can be used for storing software program and module, and processor 980 is stored in memory 920 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 920 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (pressing operation detection function etc.) etc.;Storage data area can be stored uses created data (such as default according to mobile phone
Duration, preset password information etc.) etc..In addition, memory 920 may include high-speed random access memory, it can also include non-
Volatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Input unit 930 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 930 may include fingerprint recognition mould group 931 and other are defeated
Enter equipment 932.Fingerprint recognition mould group 931 can acquire the finger print data of user on it.Optionally, fingerprint recognition mould group 931 can
Including optical fingerprint module, capacitance type fingerprint module and RF type fingerprint module.In addition to fingerprint recognition mould group 931, input
Unit 930 can also include other input equipments 932.Specifically, other input equipments 932 can include but is not limited to secondary or physical bond
One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 940 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 940 may include display screen 941, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Display screen 941.Although fingerprint recognition mould group 931 and display screen 941 are to realize mobile phone as two independent components in Fig. 6
Input and input function, but it is in some embodiments it is possible to fingerprint recognition mould group 931 and display screen 941 is integrated and real
The input and playing function of existing mobile phone.
Mobile phone may also include at least one sensor 950, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display screen 941, proximity sensor can when mobile phone is moved in one's ear, close display screen 941 and/or
Backlight.As a kind of motion sensor, accelerometer sensor can detect all directions on (generally three axis) acceleration it is big
It is small, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, phase
Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 961, be converted to sound by loudspeaker 961 by road 960
Signal plays;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, is turned after being received by voicefrequency circuit 960
It is changed to audio data, then by after the processing of audio data playback process device 980, such as another mobile phone is sent to through RF circuit 910,
Or audio data is played to memory 920 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 970
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown
WiFi module 970, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 980 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 920, and call and be stored in memory 920
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 980 can wrap
Include one or more processing units;Preferably, processor 980 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Mobile phone further includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 980 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In earlier figures 2 and embodiment shown in Fig. 3, each step method process can be realized based on the structure of the mobile phone.
In aforementioned embodiment shown in Fig. 4, each unit function can be realized based on the structure of the mobile phone.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey
Sequence, the program include some or all of any data access control method recorded in above method embodiment when executing
Step.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit,
It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory
May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English:
Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present invention has been described in detail above, specific case used herein to the principle of the present invention and
Embodiment is expounded, and the above description of the embodiment is only used to help understand the method for the present invention and its core ideas;
At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the present invention
There is change place, in conclusion the contents of this specification are not to be construed as limiting the invention.
Claims (11)
1. a kind of data access control method characterized by comprising
Detecting that mobile terminal connect with terminal equipment in communication, and the general-purpose serial bus USB of the mobile terminal debugs power
When limit is not opened, pressing operation of the detection for the physical button combination of the mobile terminal;
Detecting the pressing operation for physical button combination, and when the pressing duration of the pressing operation is greater than default
When long, the USB debugging permission of the mobile terminal is opened;
Cipher authentication instruction message is sent to the terminal device, the cipher authentication instruction message is used to indicate the terminal and sets
Standby output carries out the prompting message of cipher authentication for the reading permission of the data of the mobile terminal;Wherein, the password is recognized
Card instruction message includes that finger-print cipher certification instruction message or numerical ciphers certification instruction message or graphical passwords certification instruction disappear
Breath;
The prompting message is to prompt user's input for the cipher authentication letter of the reading permission of the data of the mobile terminal
Breath;Wherein, for the terminal device after receiving the cipher authentication instruction message that the mobile terminal is sent, the terminal device is logical
The mode for crossing text and/or figure displaying, voice broadcast or video playing exports prompting message;
The cipher authentication information of the reading permission of the data for the mobile terminal is obtained, and is detecting the cipher authentication
When information is matched with preset password information, the terminal device is opened to the reading permission of the data of the mobile terminal.
2. the method according to claim 1, wherein physical button combination includes at least following physical button
In any two:
Power key, volume+key, volume-key, Home key.
3. the method according to claim 1, wherein being the finger-print cipher in the cipher authentication instruction message
In the case where authenticating instruction message, the cipher authentication information of the reading permission for obtaining the data for the mobile terminal,
Include:
The finger print data of user's finger is obtained by the fingerprint recognition mould group of the mobile terminal, the finger print data is for institute
State the cipher authentication information of the reading permission of the data of mobile terminal.
4. the method according to claim 1, wherein being the numerical ciphers in the cipher authentication instruction message
In the case where authenticating instruction message or graphical passwords certification instruction information, the reading for obtaining the data for the mobile terminal
The cipher authentication information of weighting limit, comprising:
Obtain the numerical ciphers information or figure for carrying user by the terminal device typing that the terminal device is sent
Encrypted message, the numerical ciphers information or the graphical passwords information are the reading permission for the data of the mobile terminal
Cipher authentication information.
5. according to the described in any item methods of claim 3 or 4, which is characterized in that
The mobile terminal and the terminal device are communicated to connect by charge cable.
6. a kind of data access control device characterized by comprising
Detection unit, for detecting that mobile terminal connect with terminal equipment in communication, and the USB of the mobile terminal debugs power
When limit is not opened, pressing operation of the detection for the physical button combination of the mobile terminal;
Permission opening unit, for detecting the pressing operation for physical button combination, and the pressing operation
When pressing duration greater than preset duration, the USB debugging permission of the mobile terminal is opened;
Transmission unit, for sending cipher authentication instruction message to the terminal device, the cipher authentication instruction message is used for
Indicate that the terminal device output carries out the prompting message of cipher authentication for the reading permission of the data of the mobile terminal;Institute
Prompting message is stated to prompt user's input for the cipher authentication information of the reading permission of the data of the mobile terminal;Its
In, the cipher authentication instruction message includes that finger-print cipher certification instruction message or numerical ciphers certification instruction message or figure are close
Code authentication instruction message, the terminal device is after receiving the cipher authentication instruction message that the mobile terminal is sent, the end
End equipment is shown text and/or figure, exports prompting message by way of voice broadcast or video playing;
The permission opening unit is also used to obtain the cipher authentication letter of the reading permission of the data for the mobile terminal
Breath, and when detecting that the cipher authentication information is matched with preset password information, the terminal device is opened to the movement
The reading permission of the data of terminal.
7. device according to claim 6, which is characterized in that the physical button combination includes at least following physical button
In any two:
Power key, volume+key, volume-key, Home key.
8. device according to claim 6, which is characterized in that the cipher authentication instruction message be the finger-print cipher
In the case where authenticating instruction message, the cipher authentication information in the reading permission for obtaining the data for the mobile terminal
Aspect, the permission opening unit are used for:
The finger print data of user's finger is obtained by the fingerprint recognition mould group of the mobile terminal, the finger print data is for institute
State the cipher authentication information of the reading permission of the data of mobile terminal.
9. device according to claim 6, which is characterized in that the cipher authentication instruction message be the numerical ciphers
It is described to obtain the data for being directed to the mobile terminal in the case where authenticating instruction message or graphical passwords certification instruction information
The cipher authentication message context of permission is read, the permission opening unit is used for:
Obtain the numerical ciphers information or figure for carrying user by the terminal device typing that the terminal device is sent
Encrypted message, the numerical ciphers information or the graphical passwords information are the reading permission for the data of the mobile terminal
Cipher authentication information.
10. according to the described in any item devices of claim 8 or 9, which is characterized in that
The mobile terminal and the terminal device are communicated to connect by charge cable.
11. a kind of mobile terminal characterized by comprising
Processor, memory, communication interface and communication bus, the processor, the memory and the communication interface pass through
The communication bus connects and completes mutual communication;
The memory is stored with executable program code, and the communication interface is for wirelessly communicating;
The processor is used to call the executable program code in the memory, executes as claim 1-5 is any
Method described in.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610506431.4A CN106203035B (en) | 2016-06-28 | 2016-06-28 | A kind of data access control method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610506431.4A CN106203035B (en) | 2016-06-28 | 2016-06-28 | A kind of data access control method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106203035A CN106203035A (en) | 2016-12-07 |
CN106203035B true CN106203035B (en) | 2019-04-02 |
Family
ID=57463296
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610506431.4A Active CN106203035B (en) | 2016-06-28 | 2016-06-28 | A kind of data access control method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106203035B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11222104B2 (en) * | 2017-01-22 | 2022-01-11 | Huawei Technologies Co., Ltd. | Verification method, mobile terminal, device, and system |
CN106951756B (en) * | 2017-02-07 | 2019-08-09 | Oppo广东移动通信有限公司 | A kind of method for authenticating and mobile terminal of data migration |
CN106657158B (en) * | 2017-02-13 | 2019-09-24 | 北京安云世纪科技有限公司 | A kind of system and method in equipment room progress data security transmission |
CN108573177A (en) * | 2017-03-13 | 2018-09-25 | 上海传英信息技术有限公司 | A kind of terminal interface control method, control system and mobile terminal |
CN108572749A (en) * | 2017-03-14 | 2018-09-25 | 中兴通讯股份有限公司 | A kind of terminal control method and system, setting adaptive device and mobile terminal |
CN108307035A (en) * | 2017-12-07 | 2018-07-20 | 深圳依偎控股有限公司 | The method and system of control data transfer when a kind of smart machine cannot be started up |
WO2019127043A1 (en) * | 2017-12-26 | 2019-07-04 | 深圳达闼科技控股有限公司 | Terminal device control method and terminal device |
CN108763893A (en) * | 2018-04-26 | 2018-11-06 | 上海闻泰电子科技有限公司 | Read-write equipment, method based on recognition of face and electronic equipment |
CN109101450A (en) * | 2018-06-27 | 2018-12-28 | 努比亚技术有限公司 | A kind of terminal control method, terminal and computer readable storage medium |
CN109597552A (en) * | 2018-11-27 | 2019-04-09 | 维沃移动通信有限公司 | A kind of device management method and terminal device |
CN110290526B (en) * | 2019-06-26 | 2023-10-24 | 北京小米移动软件有限公司 | Data access method, device and medium |
CN114095295B (en) * | 2021-11-18 | 2023-07-14 | 歌尔科技有限公司 | Intelligent doorbell information inheritance method, intelligent doorbell and computer readable storage medium |
CN114741677B (en) * | 2022-03-18 | 2023-05-02 | 深圳技师学院 | Method and device for distributing data access rights based on user behavior fingerprints |
CN114973518A (en) * | 2022-04-21 | 2022-08-30 | 杭州小电科技股份有限公司 | Shared charging equipment operation and maintenance method, shared charging equipment, terminal equipment and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104601799A (en) * | 2014-12-18 | 2015-05-06 | 广东欧珀移动通信有限公司 | Data transmission method and mobile terminal |
CN105426742A (en) * | 2015-11-30 | 2016-03-23 | 广东小天才科技有限公司 | Method and apparatus for connecting mobile terminal with computer |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2628133B1 (en) * | 2010-10-15 | 2019-07-31 | Hewlett-Packard Development Company, L.P. | Authenticate a fingerprint image |
-
2016
- 2016-06-28 CN CN201610506431.4A patent/CN106203035B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104601799A (en) * | 2014-12-18 | 2015-05-06 | 广东欧珀移动通信有限公司 | Data transmission method and mobile terminal |
CN105426742A (en) * | 2015-11-30 | 2016-03-23 | 广东小天才科技有限公司 | Method and apparatus for connecting mobile terminal with computer |
Also Published As
Publication number | Publication date |
---|---|
CN106203035A (en) | 2016-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106203035B (en) | A kind of data access control method and mobile terminal | |
CN106055962B (en) | A kind of solution lock control method and mobile terminal | |
CN106447836B (en) | A kind of door control terminal binding method and relevant device | |
JP5960926B2 (en) | Electronic device, battery protection method, facility, program, and recording medium | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN107194324A (en) | Fingerprint recognition region display methods and Related product | |
CN106469028B (en) | A kind of data migration method and mobile terminal | |
CN107172266A (en) | Method for controlling fingerprint identification and Related product | |
CN106302653A (en) | The control authority sharing method of a kind of door control terminal and relevant device | |
CN104217172B (en) | Privacy content inspection method and device | |
CN107590375A (en) | Unlocking method and related product | |
CN107609379B (en) | A kind of solution lock control method and mobile terminal | |
CN106886702B (en) | A kind of unlocked by fingerprint method and relevant device | |
CN106022071A (en) | Fingerprint unlocking method and terminal | |
CN107071147A (en) | A kind of parameter regulation means and equipment | |
CN106454805A (en) | Data migration method and mobile terminal | |
CN108307529A (en) | A kind of hotspot connection method and its mobile terminal | |
CN107679410A (en) | Possess the mobile terminal and Related product of certain privacy protection function | |
CN107369017A (en) | Quick payment implementation method and Related product | |
CN107256380A (en) | Fingerprint register method and Related product | |
CN110147186A (en) | A kind of control method and terminal device of application | |
CN106529256B (en) | A kind of terminal unlock method and mobile terminal | |
CN105868598A (en) | Method and terminal for fingerprint unlocking | |
CN106249992A (en) | A kind of webpage control method and mobile terminal | |
CN110084009B (en) | Digital unlocking method and device, storage medium and mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |