A method for realizing power-on protection of a mobile terminal
A mobile terminal and power-on password technology, applied in the field of information security, can solve the problems of unusable mobile terminals and leakage of users' private information, and achieve the effect of facilitating after-sales maintenance and avoiding leakage.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] In order to facilitate the understanding of those skilled in the art, the present invention will be further described below in conjunction with the accompanying drawings.
[0026] A method for realizing power-on protection of a mobile terminal, as attached figure 1 As shown, the method includes:
[0027] Step 001, receiving and storing the preset power-on password input by the user;
[0028] Step 002, when the mobile terminal enters the boot interface, load and execute the boot protection program, prompting the user to input the boot password;
[0029] Step 003, verify the power-on password input by the user, when the input password is consistent with the preset power-on password, load and execute the boot program, that is, start the operating system, otherwise go to step 004;
[0030] Step 004: Detect whether the number of consecutive input of the power-on password has reached the preset limited number of times, if not, prompt the user to continue to enter the power-...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 