Terminal equipment and its booting method

A technology of terminal equipment and status, which is applied in computer security devices, instruments, computing, etc., and can solve problems such as user data partition encryption failure and failure to boot

Active Publication Date: 2020-05-26
QINGDAO HISENSE MOBILE COMM TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, an object of the present invention is to provide a method for booting a terminal device, which is used to solve the problem in the prior art that the terminal device cannot be powered on due to failure to encrypt the user data partition
[0006] In addition, another object of the present invention is to provide a terminal device, which is used to solve the problem in the prior art that the terminal device cannot be powered on due to the failure to encrypt the user data partition

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal equipment and its booting method
  • Terminal equipment and its booting method
  • Terminal equipment and its booting method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0023] As mentioned above, once the terminal device fails to encrypt the user data partition, the user data partition will not be able to be mounted during startup, and the terminal device will not be able to boot normally.

[0024] At present, in order to avoid the problem of user data partition encryption failure, the terminal device usually prompts the user before performing the encryption proces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to terminal equipment and a starting method thereof. The starting method of the terminal equipment comprises the steps that the encryption status of the terminal equipment is monitored, wherein the encryption status is used for indicating the status of user data partitions of the terminal equipment at each stage of the encryption process, and the encryption status comprises unencrypted status and encryption failure status; when it is monitored that the encryption status of the terminal equipment is the encryption failure status, a preset recovery program runs, and the user data partitions are recovered through running of the preset recovery program; when recovery of the user data partitions is finished, the encryption status of the terminal equipment is updated into the unencrypted status from the encryption failure status, and the starting process is executed. By means of the terminal equipment and the starting method thereof, the problem that terminal equipment cannot be started as user data partition encryption fails can be avoided.

Description

technical field [0001] The present invention relates to the technical field of terminal equipment, in particular to a terminal equipment and a booting method thereof. Background technique [0002] With the rapid development of terminal equipment, its application scope is more and more extensive, no longer limited to traditional functions such as calling and sending text messages, but also has emerging functions such as mobile payment and mobile office, which makes terminal equipment more and more secure. By the major terminal equipment manufacturers attention. [0003] One of the security factors that needs to be prioritized is how to protect user data, which includes the user's personal photos, contacts, phone numbers, text messages, and even some important account passwords. In order to avoid the leakage of user data due to the loss of the terminal, Full Disk Encryption (FDE, Full Disk Encryption) technology came into being, that is, the user can use the full disk encrypt...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/07G06F21/60G06F9/4401
CPCG06F9/4401G06F11/0706G06F21/604
Inventor 朱晓亮
Owner QINGDAO HISENSE MOBILE COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products