Method and device for controlling debugging ports of terminal equipment

A technology for debugging ports and terminal equipment, applied in the field of communication, can solve the problem of inability to guarantee user information security, and achieve the effect of ensuring security and improving completeness

Active Publication Date: 2014-02-05
HUAWEI TECH CO LTD
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] If the terminal device is lost and a third party cracks (roots) the terminal device, the third party can connect the terminal device to the computer through a third-party tool software (such as: DDMS, 360 mobile assistant, etc.) to access user data , the user's information security cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling debugging ports of terminal equipment
  • Method and device for controlling debugging ports of terminal equipment
  • Method and device for controlling debugging ports of terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] figure 1 A flowchart showing a method for controlling a debugging port of a terminal device according to an embodiment of the present invention. Such as figure 1 As shown, the debugging port control method mainly includes:

[0028] Step S110, detecting the state of the Universal Serial Bus USB port of the terminal device;

[0029] Step S120, when the USB port is connected to a computer, detect whether the screen of the terminal device is in a secure lock screen state;

[0030] Step S130, when the screen is in the security lock screen state, control the debugging port of the terminal device.

[0031] Specifically, on a device installed with an operating system such as an Andriod system, such as a smart phone or a tablet computer, a set of security policies may be added in front of a debugging port of the terminal device such as an ADB (Andriod Debug Bridge) port. The system can determine whether a USB event occurs by monitoring the USB message of the terminal device,...

Embodiment 2

[0036] figure 2 A flowchart showing a method for controlling a debugging port of a terminal device according to another embodiment of the present invention. figure 2 Winning mark and figure 1 The same components have the same functions, and detailed descriptions of these components are omitted for brevity.

[0037] Such as figure 2 as shown, figure 2 The method shown with figure 1 The main difference of the methods shown is that when the screen is in a security lock state, the debug port is closed first, and the debug port cannot be opened until the screen is successfully unlocked.

[0038] Specifically, step S130 may specifically include:

[0039] Step S210, when the screen is in a security lock state, close the debugging port.

[0040] Specifically, the locked screen status refers to a status in which the screen of the terminal device is locked. The screen lock state may include a secure screen lock state and a non-secure screen lock state. For example: in the J ...

Embodiment 3

[0060] image 3 A block diagram of an apparatus for controlling a debugging port of a terminal device according to an embodiment of the present invention is shown. Such as image 3 As shown, the debug port control device mainly includes a detection unit 310 and a control unit 320 . Wherein, the detection unit 310 is mainly used to detect the state of the USB port of the terminal device, and when the USB port of the terminal device is connected to a computer, detect whether the screen of the terminal device is in a security lock screen state, wherein the security The lock screen state is preset in the operating system of the terminal device, and the screen can be successfully unlocked only after the user inputs correct unlock information on the locked screen. The control unit 320 is connected with the detection unit 310 and is mainly used for controlling the debugging port of the terminal device when the screen is in the security lock state.

[0061] Regarding the above debu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for controlling debugging ports of terminal equipment. The method for controlling the debugging ports includes the steps: detecting the state of a universal serial bus port of the terminal equipment; detecting whether a screen of the terminal equipment is in a safety screen locking state or not when the universal serial bus port is connected with a computer; controlling the debugging ports of the terminal equipment when the screen is in the safety screen locking state. By the aid of the method and the device for controlling the debugging ports, the completeness of safety strategies of the terminal equipment can be improved, and safety of user information on the terminal equipment is effectively ensured.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method and device for controlling a debugging port of a terminal device. Background technique [0002] In a terminal device such as a smart phone or a tablet computer with an operating system such as an Andriod system, when the screen of the terminal device is locked, the user cannot directly operate on the terminal device or pass a USB (Universal Serial BUS, bus) port to connect with the computer to access the user data stored on the terminal device such as contacts, confidential files and other information. If the user needs to access user data, the screen needs to be unlocked first. After unlocking successfully, the user can directly operate on the terminal device to access user data. After the unlocking is successful, if the terminal device is connected to the computer through the USB port, the user can enable UMS (United Message Service, unified message se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/85G06F3/0481
CPCG06F21/44G06F21/85G06F13/382G06F2213/3812
Inventor 沈金华
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products