Disclosure of Invention
In view of the foregoing problems, in order to solve the foregoing problem of low security during data resetting, embodiments of the present invention provide a method for processing an equipment system during data resetting and a corresponding apparatus for processing the equipment system during data resetting.
In order to solve the above problem, an embodiment of the present invention discloses a method for processing an equipment system during data resetting, including:
locking the device system when the reset device data is detected;
acquiring first check data in the locked equipment system;
carrying out validity check through the first check data;
and when the verification result of the validity verification is legal, unlocking the locked equipment system.
Preferably, the step of locking the device system when detecting that the device data has been reset comprises:
when the equipment system is started, judging whether equipment data is reset or not according to specified target data, wherein the target data is stored in an erasable storage area of the equipment;
if so, displaying a screen locking interface;
and forbidding to respond to operations except for the screen locking interface.
Preferably, the step of determining whether the device data is reset according to the designated target data includes:
searching specified target data in an erasable storage area of the equipment;
when the target data is found, carrying out data verification on the target data;
when the data verification is successful, determining that the device data is not reset;
and when the target data is not found or the data verification fails, determining that the equipment data is reset.
Preferably, the first verification data includes first account information;
the step of obtaining first verification data in the locked device system comprises:
receiving first account information input in the screen locking interface;
or,
the first verification data comprises equipment information and account information;
the step of obtaining first verification data in the locked device system comprises:
reading first device information of a device;
and receiving first account information input in the screen locking interface.
Preferably, the step of checking the validity through the first check data includes:
sending the first check data to a server, and requesting the server to match the first check data with second check data extracted in the equipment system in advance;
receiving a matching result returned by the server;
determining a verification result of validity verification according to the matching result;
and/or the presence of a gas in the gas,
reading second check-up data stored in an unerasable storage area of the device and extracted in the device system in advance;
matching the first check data and the second check data to obtain a matching result;
determining a verification result of validity verification according to the matching result;
if the matching is successful, the verification result of the validity verification is legal;
and if the matching fails, the verification result of the validity verification is illegal.
Preferably, the first verification data includes first account information, or the first verification data includes first device information and first account information;
the second check-up data comprises second account information, or the second check-up data comprises second equipment information and second account information;
the step of sending the first check data to a server and requesting the server to match the first check data with second check data extracted in the equipment system in advance comprises the following steps:
sending the first device information and the first account information to a server, and requesting the server to adopt the first device information and the first account information to match with the second device information and the second account information respectively;
if the first device information is successfully matched with the second device information and the first account information is successfully matched with the second account, the first verification data is successfully matched with the second verification data;
the step of matching the first check data and the second check data to obtain a matching result comprises:
matching the first account information with the second account information;
and when the first account information is successfully matched with the second account, determining that the first verification data is successfully matched with the second verification data.
Preferably, the step of unlocking the locked device system comprises:
canceling the screen locking interface to display an interface of the equipment system;
and restoring the response except for the operation of the screen locking interface.
Preferably, the method further comprises the following steps:
logging in a server by adopting account information;
when the login is successful, the account information and the equipment information of the equipment are sent to a server for binding;
when a message of successful binding returned by the server is received, at least the account information is stored in an unerasable storage area of the equipment;
specified target data is written in an erasable storage area of the device.
Preferably, the method further comprises the following steps:
requesting the server to release the binding between the account information and the equipment information based on the account information;
when receiving a message indication of successful release returned by the server, at least deleting the account information stored in an unerasable storage area of the equipment;
the specified target data is deleted in an erasable storage area of the device.
The embodiment of the invention also discloses a processing device of the equipment system during data resetting, which comprises:
the system locking module is used for locking the equipment system when the reset equipment data is detected;
the verification data acquisition module is used for acquiring first verification data in the locked equipment system;
the validity checking module is used for checking the validity through the first checking data;
and the system unlocking module is used for unlocking the locked equipment system when the verification result of the validity verification is legal.
Preferably, the system locking module comprises:
the target data detection submodule is used for judging whether the equipment data is reset according to specified target data when the equipment system is started, and the target data is stored in an erasable storage area of the equipment; if so, calling a screen locking interface display submodule;
the screen locking interface display submodule is used for displaying a screen locking interface;
and the operation inhibition submodule is used for inhibiting the response except for the operation of the screen locking interface.
Preferably, the target data detection sub-module includes:
the target data searching unit is used for searching specified target data in an erasable storage area of the equipment;
the data verification unit is used for performing data verification on the target data when the target data is found;
a first determining unit, configured to determine that the device data is not reset when the data verification is successful;
a second determining unit, configured to determine that the device data has been reset when the target data is not found or the data verification fails.
Preferably, the first verification data includes first account information;
the check data acquisition module includes:
the account information receiving submodule is used for receiving first account information input in the screen locking interface;
or,
the first verification data comprises equipment information and account information;
the check data acquisition module includes:
the device information reading submodule is used for reading first device information of the device;
and the account information receiving submodule is used for receiving the first account information input in the screen locking interface.
Preferably, the validity checking module includes:
the verification data sending submodule is used for sending the first verification data to the server and requesting the server to match the first verification data with second verification data extracted from the equipment system in advance;
the matching result receiving submodule is used for receiving the matching result returned by the server;
the first verification result determining submodule is used for determining a verification result of the validity verification according to the matching result;
and/or the presence of a gas in the gas,
the verification data reading submodule is used for reading second verification data which is stored in an unerasable storage area of the equipment and extracted in the equipment system in advance;
the verification data matching sub-module is used for matching the first verification data and the second verification data to obtain a matching result;
the second checking result determining submodule is used for determining the checking result of the validity check according to the matching result;
if the matching is successful, the verification result of the validity verification is legal;
and if the matching fails, the verification result of the validity verification is illegal.
Preferably, the first verification data includes first account information, or the first verification data includes first device information and first account information;
the second check-up data comprises second account information, or the second check-up data comprises second equipment information and second account information;
the check data sending submodule comprises:
an information sending unit, configured to send the first device information and the first account information to a server, and request the server to match the second device information and the second account information with the first device information and the first account information, respectively, using the first device information and the first account information;
if the first device information is successfully matched with the second device information and the first account information is successfully matched with the second account, the first verification data is successfully matched with the second verification data;
the check data matching sub-module may include the following units:
the account information matching unit is used for matching the first account information with the second account information;
and the matching success determining unit is used for determining that the first verification data and the second verification data are successfully matched when the first account information and the second account information are successfully matched.
Preferably, the system unlocking module includes:
the screen locking interface cancellation submodule is used for canceling the screen locking interface so as to display an interface of the equipment system;
and the operation recovery submodule is used for recovering the response of the operation except for the screen locking interface.
Preferably, the method further comprises the following steps:
the server login module is used for logging in the server by adopting the account information;
the information binding module is used for sending the account information and the equipment information of the equipment to a server for binding when the login is successful;
the information storage module is used for storing the account information into an unerasable storage area of the equipment at least when receiving a message of successful binding returned by the server;
and the target data writing module is used for writing the specified target data in the erasable storage area of the equipment.
Preferably, the method further comprises the following steps:
the information unbinding module is used for requesting the server to unbind the account information and the equipment information based on the account information;
the information deleting module is used for at least deleting the account information stored in the non-erasable storage area of the equipment when receiving a message indication that the release is successful returned by the server;
and the target data deleting module is used for deleting the specified target data in the erasable storage area of the equipment.
The embodiment of the invention has the following advantages:
when the reset equipment data is detected, the equipment system is locked, the related data is extracted for validity check, the locked equipment system is unlocked after the validity check is passed, and the illegal user generally cannot know the previously set data, so that correct data cannot be input, generally cannot pass the validity check, even if the electronic equipment is lost or stolen and the electronic equipment is erased, decryption information such as passwords, graphs and fingerprints set by the legal user, and the like, the illegal user still cannot unlock the equipment system, namely cannot use the electronic equipment, and cooperate with security measures such as generating alarm information, forcibly shutting down, positioning and notifying an account number bound by the equipment, and the safety of the electronic equipment can be effectively improved.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Referring to fig. 1, a flowchart illustrating steps of an embodiment of a processing method for an equipment system during data resetting according to the present invention is shown, and specifically, the method may include the following steps:
step 101, locking the equipment system when detecting that the equipment data is reset;
it should be noted that the embodiments of the present application can be applied to various electronic devices, for example, mobile devices such as mobile phones, tablet computers, personal digital assistants, wearable devices (such as glasses, watches, and the like).
The operating systems (also called device systems) of these electronic devices may include Android, IOS, Windows phone, Windows, and so on.
Data (also called device data) on these electronic devices, such as language, picture, ring tone, application or operating system, can be changed or replaced by a certain method to implement resetting, and in colloquial, it can be called as flashing.
Resetting the device data may improve the functionality of the electronic device and may restore the handset to its original state.
In general, resetting the device data causes system damage, which results in functional failure or power failure, and is usually solved by resetting the device data.
Of course, if the electronic device is lost or stolen, the illegal user may also obtain the right of use of the electronic device by resetting the device data.
In the embodiment of the present invention, to prevent the electronic device from being illegally used, the device system may be locked when detecting that the device data of the electronic device has been reset, that is, operations (such as adjusting the volume, entering the desktop, and the like) other than the specified operation (such as acquiring the first verification data, verifying the validity, and the like) are prohibited.
In one embodiment of the present invention, step 101 may comprise the following sub-steps:
a substep S11 of judging whether the device data has been reset according to the designated target data when the device system is started; if yes, go to substep S12;
in a particular implementation, the target DATA is stored in an erasable storage area of the device, which is an area where DATA can be erased when the DATA is reset, for example, a DATA area (i.e., an area where text is stored in the head of the hard disk).
Regardless of the manner of resetting the device data, the final operation is to erase the original data in the device and write the new data into the device, so that after the device data is reset, the data in the erasable storage area in the device is erased, that is, the target data in the erasable storage area is damaged, resulting in data error or erasure.
Thus, upon booting the system, the target data may be scanned to determine whether the device data has been reset.
Specifically, the specified target data may be searched in the erasable storage area of the device, and when the target data is found, the data verification is performed on the target data.
For example, if the target data is encrypted, the target data may be decrypted, and it is verified whether the decrypted target data is the same as the original target data, if so, the data verification is successful, and if not, the data verification is failed.
When the data verification is successful, the device data is determined not to be reset.
And when the check data is not found or the data check fails, determining that the equipment data is reset.
Substep S12, displaying a lock screen interface;
in the embodiment of the invention, if the data of the equipment is detected to be reset, a screen locking interface can be displayed, and the operation of entering a desktop of the system is forbidden.
For example, as shown in fig. 2A, a prompt message of "the mobile phone is locked" may be displayed in the lock screen interface, and the user is prompted to input account information such as an account number and a password to unlock the mobile phone.
And a substep S13 of inhibiting responses other than for the screen locking interface.
In a specific implementation, operations other than the screen locking interface, such as shielding event responses of physical keys (e.g., a Home key, a menu key, a return key, a search key, a volume key, a photographing key, etc.) of the electronic device, disabling drop-down of the notification bar, etc., may be shielded, so that the screen locking interface may not be eliminated, and locking of the device system is achieved.
Step 102, acquiring first check data in a locked equipment system;
in one case, the first verification data includes first account information, and the first account information input in the screen locking interface is received when the first verification data is acquired.
In another case, the first verification data includes device information and account information, and when the first verification data is acquired, the first device information of the device is read, and the first account information input in the screen locking interface is received.
If the device information is an IMEI (international mobile equipment identity) number, the device information may be acquired through a getDeviceId () interface opened in a TelephonyManager in an Android system.
103, carrying out validity check through the first check data;
in a specific implementation, validity check can be performed through the first check data, and whether the operation of resetting the device data by the electronic device is legal or not is detected.
By applying the embodiment of the invention, the second check data with the same type as the first check data can be extracted in the equipment system in advance and used as the check standard of the legality, and the check data is stored in the server and/or the local non-erasable storage area of the electronic equipment and can be matched with the server and/or the local non-erasable storage area of the electronic equipment to check the legality.
The non-erasable storage area is an area where data cannot be erased when the data is reset, and the area usually allows a system process to read and write, prohibits other processes from reading and writing, and prevents the data from being modified.
If the verification data includes account information and device information, a valid user (i.e., an owner) of the electronic device may log in to the server by using the account information (e.g., an account number and a password) when the device is normally used.
And when the login is successful, the account information and the equipment information of the equipment are sent to the server for binding.
The server can detect whether the device information is bound with other account information, if not, the current account information and the device information are allowed to be bound, otherwise, the current account information and the device information are refused to be bound.
When receiving a message of successful binding returned by the server, at least the account information is stored in the non-erasable storage area of the device, and of course, the device information may also be stored in the non-erasable storage area of the device.
And, writing the specified target data in the erasable storage area of the device, and starting to perform reset monitoring on the device data.
In order to ensure the security of the verification data (such as account information and device information) local to the device, a symmetric encryption algorithm such as AES (advanced encryption standard) may be used to encrypt the verification data (such as account information and device information).
In addition, in order to guarantee that the use right of the electronic equipment is legally transferred, the server can be requested to release the binding between the account information and the equipment information based on the account information.
The server can verify through short messages and the like, and if the verification is successful, the binding between the account information and the equipment information can be released.
When receiving a message indication of successful release returned by the server, at least the account information stored in the non-erasable storage area of the device is deleted.
And deleting the designated target data in the erasable storage area of the equipment, and stopping resetting and monitoring the equipment data.
In one embodiment of the present invention, step 103 may comprise the following sub-steps:
substep S21, sending the first verification data to a server, and requesting the server to match the first verification data with second verification data extracted in the device system in advance;
substep S22, receiving the matching result returned by the server;
substep S23, determining a verification result of the validity verification according to the matching result;
in the embodiment of the present invention, the first verification data includes first device information (e.g., an IMEI number) and first account information (e.g., an account number and a password), and the second verification data includes second device information (e.g., an IMEI number) and second account information (e.g., an account number and a password).
As shown in fig. 2A, if a valid user (i.e., an owner) of the electronic device can input first account information such as a correct account and a correct password in a screen locking interface and click a "confirm" control, the first device information of the electronic device is extracted, the first device information and the first account information are sent to a server, and the server is requested to use the first device information and the first account information to match with second device information and second account information, respectively.
Of course, if a legal user (i.e., an owner) of the electronic device cannot input the correct first account information such as the account and the password temporarily, the "power off" control may be clicked to turn off the electronic device.
And if the first equipment information is successfully matched with the second equipment information and the first account information is successfully matched with the second account, the first verification data is successfully matched with the second verification data.
On the contrary, if the first device information fails to be matched with the second device information, or the first account information fails to be matched with the second account, the first verification data fails to be matched with the second verification data.
If the first check data and the second check data are successfully matched, the check result of the validity check is legal;
and if the first check data and the second check data fail to be matched, the check result of the validity check is illegal.
In another embodiment of the present invention, step 103 may comprise the following sub-steps:
a substep S31 of reading second parity data stored in the non-erasable storage area of the device and previously extracted in the device system;
a substep S32, matching the first check data and the second check data to obtain a matching result;
and a substep S33 of determining a verification result of the validity check according to the matching result.
In the embodiment of the present invention, the first verification data includes first device information (e.g., an IMEI number) and first account information (e.g., an account number and a password), and the second verification data includes second device information (e.g., an IMEI number) and second account information (e.g., an account number and a password).
Alternatively, the first verification data includes first account information (e.g., account number, password), and the second verification data includes second account information (e.g., account number, password).
As shown in fig. 2A, if a valid user (i.e., an owner) of the electronic device can input first account information such as a correct account and a correct password in a screen lock interface and click a "confirm" control, the first account information is adopted to be matched with the second account information, or the first device information and the first account information are adopted to be matched with the second device information and the second account information, respectively.
If symmetric encryption algorithms such as AES (advanced encryption standard) are used to encrypt the verification data (such as account information and device information) in order to ensure the security of the verification data (such as account information and device information) in the local device, the corresponding decryption algorithm may be used to decrypt the verification data (such as account information and device information) in the local device before matching.
Of course, if a legal user (i.e., an owner) of the electronic device cannot input the correct first account information such as the account and the password temporarily, the "power off" control may be clicked to turn off the electronic device.
And when the first account information is successfully matched with the second account, determining that the first verification data is successfully matched with the second verification data, and otherwise, when the first account information is unsuccessfully matched with the second account, determining that the first verification data is unsuccessfully matched with the second verification data.
Or,
and if the first equipment information is successfully matched with the second equipment information and the first account information is successfully matched with the second account, the first verification data is successfully matched with the second verification data.
On the contrary, if the first device information fails to be matched with the second device information, or the first account information fails to be matched with the second account, the first verification data fails to be matched with the second verification data.
If the first check data and the second check data are successfully matched, the check result of the validity check is legal;
and if the first check data and the second check data fail to be matched, the check result of the validity check is illegal.
It should be noted that when the first verification data is obtained (for example, the first account information is received at the screen lock interface), whether the device is connected to the network may be detected, for example, in an Android system, getAllNetworkInfo () of a ConnectivityManager of the system may be called to obtain a state of the current network.
In one case, if a network is connected, the substeps S21-S23 may be performed to determine a check result of the validity check with the matching result of the server, and if a network is not connected, the substeps S31-S33 may be performed to determine a check result of the validity check with the matching result of the device.
Alternatively, if the network is connected, substeps S21-S23 and substeps 31-S33 may be performed to determine the verification result of the validity check according to the matching result between the server and the local device (i.e., when both are verified to be valid, the verification result of the validity check is verified to be valid, otherwise, the verification result is not verified), and if the network is not connected, substeps S31-S33 may be performed to determine the verification result of the validity check according to the matching result of the device.
In addition, the first verification data (including the first device information and the first account information) and the second verification data (including the second device information and the second account information) are relative to the current acquired and previously stored state, and the essence of the first verification data and the second verification data is verification data (including the device information and the account information).
And 104, unlocking the locked equipment system when the verification result of the validity verification is legal.
If the verification result of the validity verification is legal, the current user is a legal user of the electronic equipment, the locking of the equipment system can be released, and the equipment system is allowed to be operated (such as volume adjustment, desktop entering and the like).
In a specific implementation, as shown in fig. 2B, the screen-locking interface may be cancelled to display an interface of the device system, and a response to an operation other than the screen-locking interface, such as an event response of a physical key (e.g., Home key, menu key, return key, search key, volume key, photographing key, etc.) of the electronic device, a drop-down of a notification bar, and the like, may be resumed, so as to unlock the device system and resume a normal operation of the device system.
If the verification result of the validity verification is illegal, it indicates that the current user is an unauthorized user of the electronic device, and operations such as generating alarm information, forcibly shutting down, positioning, and notifying an account number bound to the device may be performed, which is not limited in the embodiment of the present invention.
Since an illegal user cannot input the correct first account information such as the account and the password in the screen locking interface, the first account information such as the account and the password cannot pass the validity check even if the first account information is input at will, and therefore, the locked device system cannot be unlocked, and the electronic device cannot be used.
When the reset equipment data is detected, the equipment system is locked, the related data is extracted for validity check, the locked equipment system is unlocked after the validity check is passed, and the illegal user generally cannot know the previously set data, so that correct data cannot be input, generally cannot pass the validity check, even if the electronic equipment is lost or stolen and the electronic equipment is erased, decryption information such as passwords, graphs and fingerprints set by the legal user, and the like, the illegal user still cannot unlock the equipment system, namely cannot use the electronic equipment, and cooperate with security measures such as generating alarm information, forcibly shutting down, positioning and notifying an account number bound by the equipment, and the safety of the electronic equipment can be effectively improved.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 3, a block diagram illustrating a structure of an embodiment of a processing device of an equipment system in data resetting according to the present invention may specifically include the following modules:
a system locking module 301, configured to lock the device system when detecting that the device data has been reset;
a verification data obtaining module 302, configured to obtain first verification data in the locked device system;
a validity checking module 303, configured to perform validity checking on the first checking data;
a system unlocking module 304, configured to unlock the locked device system when the verification result of the validity verification is valid.
In one embodiment of the present invention, the system lock module 301 includes the following sub-modules:
the target data detection submodule is used for judging whether the equipment data is reset according to specified target data when the equipment system is started, and the target data is stored in an erasable storage area of the equipment; if so, calling a screen locking interface display submodule;
the screen locking interface display submodule is used for displaying a screen locking interface;
and the operation inhibition submodule is used for inhibiting the response except for the operation of the screen locking interface.
In an example of the embodiment of the present invention, the target data detection sub-module may include the following units:
the target data searching unit is used for searching specified target data in an erasable storage area of the equipment;
the data verification unit is used for performing data verification on the target data when the target data is found;
a first determining unit, configured to determine that the device data is not reset when the data verification is successful;
a second determining unit, configured to determine that the device data has been reset when the target data is not found or the data verification fails.
In an example of the embodiment of the present invention, the first verification data may include first account information;
the verification data obtaining module 302 may include the following sub-modules:
the account information receiving submodule is used for receiving first account information input in the screen locking interface;
or,
the first verification data may include device information and account information;
the verification data obtaining module 302 may include the following sub-modules:
the device information reading submodule is used for reading first device information of the device;
and the account information receiving submodule is used for receiving the first account information input in the screen locking interface.
In an embodiment of the present invention, the validity checking module 303 may include the following sub-modules:
the verification data sending submodule is used for sending the first verification data to the server and requesting the server to match the first verification data with second verification data extracted from the equipment system in advance;
the matching result receiving submodule is used for receiving the matching result returned by the server;
the first verification result determining submodule is used for determining a verification result of the validity verification according to the matching result;
and/or the presence of a gas in the gas,
the verification data reading submodule is used for reading second verification data which is stored in an unerasable storage area of the equipment and extracted in the equipment system in advance;
the verification data matching sub-module is used for matching the first verification data and the second verification data to obtain a matching result;
the second checking result determining submodule is used for determining the checking result of the validity check according to the matching result;
if the matching is successful, the verification result of the validity verification is legal;
and if the matching fails, the verification result of the validity verification is illegal.
In an example of the embodiment of the present invention, the first verification data includes first account information, or the first verification data includes first device information and first account information;
the second check-up data comprises second account information, or the second check-up data comprises second equipment information and second account information;
the check data sending submodule may include the following units:
an information sending unit, configured to send the first device information and the first account information to a server, and request the server to match the second device information and the second account information with the first device information and the first account information, respectively, using the first device information and the first account information;
if the first device information is successfully matched with the second device information and the first account information is successfully matched with the second account, the first verification data is successfully matched with the second verification data;
the check data matching sub-module may include the following units:
the account information matching unit is used for matching the first account information with the second account information;
and the matching success determining unit is used for determining that the first verification data and the second verification data are successfully matched when the first account information and the second account information are successfully matched.
In one embodiment of the present invention, the system unlock module 304 may include the following sub-modules:
the screen locking interface cancellation submodule is used for canceling the screen locking interface so as to display an interface of the equipment system;
and the operation recovery submodule is used for recovering the response of the operation except for the screen locking interface.
In one embodiment of the present invention, the apparatus may further include the following modules:
the server login module is used for logging in the server by adopting the account information;
the information binding module is used for sending the account information and the equipment information of the equipment to a server for binding when the login is successful;
the information storage module is used for storing the account information into an unerasable storage area of the equipment at least when receiving a message of successful binding returned by the server;
and the target data writing module is used for writing the specified target data in the erasable storage area of the equipment.
In one embodiment of the present invention, the apparatus may further include the following modules:
the information unbinding module is used for requesting the server to unbind the account information and the equipment information based on the account information;
the information deleting module is used for at least deleting the account information stored in the non-erasable storage area of the equipment when receiving a message indication that the release is successful returned by the server;
and the target data deleting module is used for deleting the specified target data in the erasable storage area of the equipment.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The present invention provides a method for processing a device system during data resetting and a device for processing the device system during data resetting, which are introduced in detail above, and specific examples are applied in this text to illustrate the principles and embodiments of the present invention, and the above description of the embodiments is only used to help understanding the method and the core ideas of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.