A system reset method and device
A system reset and operating system technology, applied in data reset devices, digital data authentication, etc., can solve the problem of low information security of intelligent terminals, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] This embodiment will be described from the perspective of a terminal, and the system reset method can be applied to electronic devices such as mobile terminals.
[0029] see figure 1 , which is a schematic flow chart of a system reset method provided in Embodiment 1 of the present invention. The system reset methods include:
[0030] Step 101, receiving a reset command for resetting an operating system of a first terminal.
[0031] Wherein, step 101 may specifically include: receiving a reset command triggered by a user through a display screen of the first terminal.
[0032] In practical applications, the first terminal can display an interface, and set a system reset command acquisition interface on the interface, so that the subsequent first terminal can receive the reset command through the command interface, that is, the step "receiving the user through the first A reset command triggered by a terminal display screen" may specifically include:
[0033] Displayi...
Embodiment 2
[0064] This embodiment will be further described on the basis of the system reset method described in the first embodiment.
[0065] see figure 2 , is a schematic flowchart of a system reset method provided in Embodiment 2 of the present invention. The system reset methods include:
[0066] Step 201, receiving a reset command for resetting an operating system of a first terminal.
[0067] For example, a reset command triggered by the user through the display screen of the first terminal may be received.
[0068] Step 202, acquiring the first eyeball identification information of the current first user of the first terminal.
[0069] For example, the iris information of the eyeball of the first user is obtained by calling an infrared camera.
[0070] Step 203, match the first eyeball identification information with the eyeball identification information in the first information set, if the matching is successful, go to step 205, if the first eyeball identification informat...
Embodiment 3
[0083] On the basis of Embodiment 1 or Embodiment 2, optionally, in order to enable the owner to remotely authorize the system reset for non-owner users, refer to image 3 , after the first eyeball identification information fails to match all the eyeball identification information in the information set, the method of this embodiment may further include:
[0084] Step 301, sending a system reset permission request to a second terminal according to a preset communication identifier.
[0085] Specifically, the first terminal sends the system reset authority request to the second terminal through the wireless network according to the preset communication identifier. The communication identifier may be: an instant messaging account, a mobile phone number, an email address, and the like.
[0086] Preferably, in order to enable the second terminal user to determine whether to authorize the requesting user to reset the system, the method of this embodiment may further include befor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


