Operation system recovery method and electronic equipment
A technology of an electronic device and a recovery method, applied in the field of communications, can solve problems such as inability to enter the recovery mode, damage to key images, and inconvenience in operating system recovery.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0061] Example 1: Taking the first electronic device 101 and the second electronic device 102 as devices such as smartphones and tablet computers as an example (ie, scenario 1), when the first electronic device 101 and the second electronic device 102 are both in normal use, Both the first electronic device 101 and the second electronic device 102 can register the unique identification information of the first electronic device 101 and the second electronic device 102, such as an encrypted product serial number (SN) or device chip ID, by logging into the same account. Go to the server 103 (for example, a Huawei mobile phone can register a Huawei account to the server of the Huawei website; for example, a Xiaomi mobile phone can register a Xiaomi account to the server of the Xiaomi website). That is to say, when the first electronic device 101 and the second electronic device 102 log in to the same account, the server 103 can record the unique identification information of each ...
example 2
[0064] Example 2: Take the first electronic device 101 as a smartphone or tablet computer, and the second electronic device 102 as an electronic device that cannot log in to the server 103 through a registered account, such as a smart watch (ie, scenario 4), when the first electronic device 101 and When the second electronic device 102 is in a normal use state, the first electronic device 101 and the second electronic device 102 can be connected wirelessly, such as through Bluetooth. When the first electronic device 101 and the second electronic device 102 are interconnected through Bluetooth, a Bluetooth pairing relationship is formed, files can be transferred between them, and information can be shared. Therefore, the first electronic device 101 and the second electronic device 102 belong to trusted devices, and the second electronic device 102 can be added to the trusted device list of the first electronic device 101; and the trusted device of the first electronic device 101...
example 3
[0066] Example 3: Take the first electronic device 101 as a smartphone or tablet computer, and the second electronic device 102 as a smart TV, etc. which are often connected to the same wireless network (WiFi) with the smartphone or tablet as an example (ie, scenario 3), when the first When both the electronic device 101 and the second electronic device 102 are in normal use, the first electronic device 101 and the second electronic device 102 can be connected to the same WiFi network at the same time, and the first electronic device 101 and the second electronic device 102 will be recorded in the network server. unique identification information. In this scenario, the WiFi network server may record the electronic devices connected to the WiFi network in the list of trusted devices under the WiFi network; and the WiFi network server may synchronize the list of trusted devices under the WiFi network to Corresponding electronic devices, for example, are synchronized to the first...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


