-
公开(公告)号:US11832189B2
公开(公告)日:2023-11-28
申请号:US17312436
申请日:2019-11-01
发明人: Jinguo Zheng , Yanxiang Zhang
IPC分类号: H04W52/02 , H04M1/72454 , H04M1/72463
CPC分类号: H04W52/0264 , H04M1/72454 , H04M1/72463 , H04M2250/12
摘要: A control method for a doze mode of a mobile terminal includes: determining whether the mobile terminal conforms with a mode switch condition; detecting whether a virtual motion sensor is disposed in the mobile terminal when the mobile terminal conforms with the mode switch condition; determining whether a duration for which the mobile terminal conforms with the mode switch condition exceeds a predetermined time threshold value, when the virtual motion sensor is disposed in the mobile terminal; and entering the doze mode when the duration for which the mobile terminal conforms with the mode switch condition exceeds the predetermined time threshold value. A computer readable storage medium and a mobile terminal are also provided.
-
公开(公告)号:US11928450B2
公开(公告)日:2024-03-12
申请号:US17417930
申请日:2019-11-19
发明人: Jinguo Zheng , Yanxiang Zhang
摘要: The present application provides a mobile terminal, a method for uninstalling a pre-installed application therein, and a memory. The method comprises the following steps: obtaining an authorization file for uninstalling a pre-installed application; determining whether the authorization file is valid; if so, determining whether the pre-installed application is a user-level application; and if so, uninstalling the pre-installed application.
-
公开(公告)号:US11057216B2
公开(公告)日:2021-07-06
申请号:US16462551
申请日:2017-10-31
发明人: Xiaorong Ling , Yajiao Wei , Yunqing Huang , Jinguo Zheng , Zeming Huang , Haibo Zhong
IPC分类号: H04L9/32 , G06F16/901 , H04L9/30
摘要: Disclosed are a protection method and a protection system of system partition key data and a terminal. The protection method includes: obtaining a verification table corresponding to key data carried in a system partition file when a bootloader is started, and decrypting a digital signature by using a preset public key or a private key to obtain a first verification value; generating a second verification value according to a block address and a hash value, and comparing the first verification value with the second verification value; and starting a system if the first verification value is consistent with the second verification value.
-
-