CN102724350B - Terminal unlocking method, terminal and auxiliary equipment - Google Patents

Terminal unlocking method, terminal and auxiliary equipment Download PDF

Info

Publication number
CN102724350B
CN102724350B CN201210213288.1A CN201210213288A CN102724350B CN 102724350 B CN102724350 B CN 102724350B CN 201210213288 A CN201210213288 A CN 201210213288A CN 102724350 B CN102724350 B CN 102724350B
Authority
CN
China
Prior art keywords
auxiliary equipment
terminal
secret key
information
key file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210213288.1A
Other languages
Chinese (zh)
Other versions
CN102724350A (en
Inventor
成荣峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201210213288.1A priority Critical patent/CN102724350B/en
Publication of CN102724350A publication Critical patent/CN102724350A/en
Application granted granted Critical
Publication of CN102724350B publication Critical patent/CN102724350B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of terminal unlocking method, terminal and auxiliary equipment, relate to communication technical field, described method comprises: generate secret key file according to password instruction, and the password that described password instruction is arranged according to user generates; When after penetration depth lock-out state, send described secret key file to auxiliary equipment, so that according to the content of secret key file, remove preliminary latch state.The present invention is applicable to terminal unlocking.

Description

Terminal unlocking method, terminal and auxiliary equipment
Technical field
The present invention relates to communication technical field, particularly a kind of terminal unlocking method, terminal and auxiliary equipment.
Background technology
Along with the development of technology, the use of the terminal equipments such as mobile phone, pad and computer is more and more general, and people also more and more pay attention to the protection to data security when using these terminal equipments.The problem that the protection Ye Shi equipment manufacturers of data security must consider when producing product; in current data protection means; for mobile phone; the mode of encryption generally includes text password and pattern etc.; we are when wanting to check mobile phone, and needing can by verifying by inputting the text password of specifying or drawing the figure of specifying with finger on screen.
Inventor finds that in prior art, at least there are the following problems: in existing unlocking manner, the attempt repeatedly attempting carrying out unlocking is passed through in order to lawless person can be prevented, the unblock number of attempt of mobile phone generally only has 3 times, has three tries to unlock unsuccessfully to make mobile phone enter locked state; If user have forgotten the password of oneself setting, also there will be has three tries unlocks unsuccessfully, causes the situation that mobile phone is locked.The mobile phone that above-mentioned two situations cause is locked to be only had by reinstalling system or other extreme means just can make user reuse mobile phone, can cause the loss of data in mobile phone like this, for user brings unnecessary loss, greatly reduce Consumer's Experience.
Summary of the invention
Embodiments of the invention provide a kind of terminal unlocking method, terminal and auxiliary equipment, unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, improve Consumer's Experience.
The technical scheme that the embodiment of the present invention adopts is:
A kind of terminal unlocking method, comprising:
Generate secret key file according to password instruction, the password that described password instruction is arranged according to user generates;
When after penetration depth lock-out state, send described secret key file to auxiliary equipment, so that according to the content of described secret key file, remove preliminary latch state.
A kind of terminal unlocking method, comprising:
Open bluetooth and search terminal;
After searching terminal, send matching request to described terminal, mate with described terminal;
After the match is successful with described terminal, receive the secret key file that described terminal sends.
A kind of terminal, comprising:
Secret key generation module, for generating secret key file according to password instruction, the password that described password instruction is arranged according to user generates;
Secret key sending module, for when after penetration depth lock-out state, sends described secret key file to auxiliary equipment, so that according to the content of described secret key file, removes preliminary latch state.
A kind of auxiliary equipment, comprising:
Start search module, for opening bluetooth and search terminal;
Request sending module, after searching terminal, sends matching request to described terminal, mates with described terminal;
Receiver module, for after the match is successful with described terminal, receives the secret key file that described terminal sends.
Compared with prior art, unlocking pin by user being arranged in the embodiment of the present invention is stored in the terminal by the form of secret key file, when user unlocks the upper limit that number of times reaches default, after causing the terminal degree of depth to lock, the Status Change degree of depth locked is the state of preliminary latch, and by bluetooth, unlocking pin is sent to auxiliary equipment, help user to obtain unlocking pin by auxiliary equipment, and then complete the unblock of terminal.Unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, avoid user and remove unlock terminal by the mode of refitting system or other influences terminal inner user data, protect the data of user, improve Consumer's Experience.
Accompanying drawing explanation
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
The method flow diagram that Fig. 1 provides for the embodiment of the present invention one;
The method flow diagram that Fig. 2 provides for the embodiment of the present invention two;
The method flow diagram that Fig. 3 provides for the embodiment of the present invention three;
The terminal structure schematic diagram that Fig. 4, Fig. 5 provide for the embodiment of the present invention four;
The auxiliary equipment structural representation that Fig. 6 provides for the embodiment of the present invention five.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, belong to the scope of protection of the invention.
For making the advantage of technical solution of the present invention clearly, below in conjunction with drawings and Examples, the present invention is elaborated.
Embodiment one
The present embodiment provides a kind of terminal unlocking method, and as shown in Figure 1, described method comprises:
101, terminal generates secret key file according to password instruction, and the password that described password instruction is arranged according to user generates.
Further, described generate secret key file according to password instruction after, also comprise: open bluetooth and obtain secret key function, and configure the information of described auxiliary equipment, described information comprises bluetooth ID and the MAC(Media Access Control of described auxiliary equipment, medium access control) address.
102, when after terminal penetration depth lock-out state, terminal sends described secret key file to auxiliary equipment, so that according to the content of described secret key file, removes preliminary latch state.
Optionally, when described send described secret key file to auxiliary equipment time, described degree of depth lock-out state is changed to described preliminary latch state.
Optionally, described send described secret key file to auxiliary equipment before, also comprise: mated with described auxiliary equipment by bluetooth.Such as, describedly undertaken mating comprising by bluetooth and described auxiliary equipment: open bluetooth and receive the matching request that described auxiliary equipment sends, described matching request comprises the information of described auxiliary equipment; The information of the information of the described auxiliary equipment in described matching request with the described auxiliary equipment configured before is contrasted; If the information of the described auxiliary equipment in described matching request is consistent with the information of the described auxiliary equipment configured before, then complete coupling.Further, described complete coupling after to the described auxiliary equipment message that sends that the match is successful.
Wherein, after the lasting induction of terminal reaches setting-up time length less than user operation, terminal enters described preliminary latch state; When trial solution is except after the number of times of described preliminary latch state reaches pre-determined number, terminal enters described degree of depth lock-out state.
Compared with prior art, unlocking pin by user being arranged in the embodiment of the present invention is stored in the terminal by the form of secret key file, when user unlocks the upper limit that number of times reaches default, after causing the terminal degree of depth to lock, the Status Change degree of depth locked is the state of preliminary latch, and by bluetooth, unlocking pin is sent to auxiliary equipment, help user to obtain unlocking pin by auxiliary equipment, and then complete the unblock of terminal.Unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, avoid user and remove unlock terminal by the mode of refitting system or other influences terminal inner user data, protect the data of user, improve Consumer's Experience.
Embodiment two
The present embodiment provides a kind of terminal unlocking method, and as shown in Figure 2, described method comprises:
201, auxiliary equipment opens bluetooth and search terminal.
202, after searching terminal, auxiliary equipment sends matching request to described terminal, mates with described terminal.
203, auxiliary equipment is after the match is successful with described terminal, receives the secret key file that described terminal sends.
Wherein, described matching request comprises the information of auxiliary equipment, and described information comprises bluetooth ID and the medium access control MAC Address of auxiliary equipment.
Compared with prior art, in the embodiment of the present invention, auxiliary equipment is mated with terminal by bluetooth, the secret key file that after the match is successful, receiving terminal sends, and the content of described secret key file is shown, help user to obtain unlocking pin, and then complete the unblock of terminal.Unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, avoid user and remove unlock terminal by the mode of refitting system or other influences terminal inner user data, protect the data of user, improve Consumer's Experience.
Embodiment three
The present embodiment provides a kind of terminal unlocking method, and as shown in Figure 3, described method comprises:
301, terminal generates secret key file according to password instruction.
Wherein, the password that described password instruction is arranged according to user generates, and when user arranges password for terminal, automatically can generate a password instruction, include the code content set by user in password instruction, described code content can be text or pattern etc.
302, terminal is opened bluetooth and is obtained secret key function, and configures the relevant information of auxiliary equipment in the terminal.
Optionally, whether bluetooth obtains secret key function and opens and can decide in its sole discretion according to user, if user selects not open bluetooth obtain secret key function, then flow process conventionally processes.Wherein, the relevant information of the auxiliary equipment of configuration comprises: the bluetooth ID of auxiliary equipment and medium access control MAC Address.These information obtain from auxiliary equipment all in advance.
303, when after terminal penetration depth lock-out state, bluetooth is opened.
Wherein, the lock-out state of terminal is divided into preliminary latch state and degree of depth lock-out state, and after the lasting induction of terminal reaches setting-up time length less than user operation, terminal enters described preliminary latch state; When user's trial solution is except after the number of times of described preliminary latch state reaches pre-determined number, terminal enters described degree of depth lock-out state.
Now, user can open auxiliary equipment, obtains unlocking pin by auxiliary equipment.
304, auxiliary equipment opens bluetooth, and the terminal near search.
305, after searching terminal, send matching request to this terminal, mate with this terminal.
306, terminal receives matching request.
Whether information and the information of the auxiliary equipment configured before of the auxiliary equipment 307, in comparison match request carry out same, if identical, then perform step 308; If not identical, then process ends.Such as, whether these the two kinds of information of bluetooth ID and medium access control MAC Address comparing auxiliary equipment are identical.
308, terminal completes the coupling with auxiliary equipment, and sends to auxiliary equipment the match is successful message.
309, terminal sends secret key file to auxiliary equipment.
Further, in terminal to while auxiliary equipment, the degree of depth lock-out state of self is changed to preliminary latch state by terminal, so that unlock terminal after obtaining password.
310, after auxiliary equipment receives secret key file, the password that user is arranged shows by the content according to secret key file.Wherein, the password of auxiliary equipment display is consistent with the initial password that user is arranged, and such as, the password that user is arranged is text, then auxiliary equipment shows corresponding text, and the password that user is arranged is pattern, then auxiliary equipment shows corresponding pattern.
Compared with prior art, unlocking pin by user being arranged in the embodiment of the present invention is stored in the terminal by the form of secret key file, when user unlocks the upper limit that number of times reaches default, after causing the terminal degree of depth to lock, the Status Change degree of depth locked is the state of preliminary latch, and by bluetooth, unlocking pin is sent to auxiliary equipment, help user to obtain unlocking pin by auxiliary equipment, and then complete the unblock of terminal.Unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, avoid user and remove unlock terminal by the mode of refitting system or other influences terminal inner user data, protect the data of user, improve Consumer's Experience.
Embodiment four
The present embodiment provides a kind of terminal, and as shown in Figure 4, described terminal comprises:
Secret key generation module 41, for generating secret key file according to password instruction, the password that described password instruction is arranged according to user generates;
Secret key sending module 42, for when after penetration depth lock-out state, sends described secret key file to auxiliary equipment, so that according to the content of described secret key file, removes preliminary latch state.
Further, as shown in Figure 5, described terminal can also comprise:
Lock-out state change module 43, for when described send described secret key file to auxiliary equipment time, described degree of depth lock-out state is changed to described preliminary latch state.
Further, as shown in Figure 5, described terminal can also comprise:
Functional configuration module 44, obtain secret key function for opening bluetooth, and configure the information of described auxiliary equipment, described information comprises bluetooth ID and the medium access control MAC Address of described auxiliary equipment.
Further, as shown in Figure 5, described terminal can also comprise:
Start receiver module 45, for open bluetooth and receive described auxiliary equipment send matching request, described matching request comprises the information of described auxiliary equipment;
Comparison module 46, for contrasting the information of the information of the described auxiliary equipment in described matching request with the described auxiliary equipment configured before;
Mate module 47, for when the information of the described auxiliary equipment in described matching request is consistent with the information of the described auxiliary equipment configured before, complete coupling.
Further, as shown in Figure 5, described terminal can also comprise:
Preliminary latch module 48, for after lasting induction reaches setting-up time length less than user operation, enters described preliminary latch state;
Degree of depth locking module 49, after the number of times for removing described preliminary latch state when trial solution reaches pre-determined number, enters described degree of depth lock-out state.
Compared with prior art, unlocking pin by user being arranged in the embodiment of the present invention is stored in the terminal by the form of secret key file, when user unlocks the upper limit that number of times reaches default, after causing the terminal degree of depth to lock, the Status Change degree of depth locked is the state of preliminary latch, and by bluetooth, unlocking pin is sent to auxiliary equipment, help user to obtain unlocking pin by auxiliary equipment, and then complete the unblock of terminal.Unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, avoid user and remove unlock terminal by the mode of refitting system or other influences terminal inner user data, protect the data of user, improve Consumer's Experience.
Embodiment five
The present embodiment provides a kind of auxiliary equipment, and as shown in Figure 6, described auxiliary equipment comprises:
Start search module 51, for opening bluetooth and search terminal;
Request sending module 52, after searching terminal, sends matching request to described terminal, mates with described terminal;
Receiver module 53, for after the match is successful with described terminal, receives the secret key file that described terminal sends.
Wherein, described matching request comprises the information of auxiliary equipment, and described information comprises bluetooth ID and the medium access control MAC Address of auxiliary equipment.
Compared with prior art, in the embodiment of the present invention, auxiliary equipment is mated with terminal by bluetooth, the secret key file that after the match is successful, receiving terminal sends, and the content of described secret key file is shown, help user to obtain unlocking pin, and then complete the unblock of terminal.Unlocking pin can be forgotten when user and locked terminal realize the unblock of terminal, avoid user and remove unlock terminal by the mode of refitting system or other influences terminal inner user data, protect the data of user, improve Consumer's Experience.
The terminal that the embodiment of the present invention provides and auxiliary equipment can realize the above-mentioned embodiment of the method provided, and concrete function realizes the explanation referred in embodiment of the method, does not repeat them here.Terminal unlocking method, terminal and auxiliary equipment that the embodiment of the present invention provides go for terminal unlocking, but are not limited only to this.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
The above; be only the specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, is anyly familiar with those skilled in the art in the technical scope that the present invention discloses; the change that can expect easily or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claim.

Claims (8)

1. a terminal unlocking method, is characterized in that, comprising:
Generate secret key file according to password instruction, the password that described password instruction is arranged according to user generates;
When after penetration depth lock-out state, send described secret key file to auxiliary equipment, and described degree of depth lock-out state is changed to preliminary latch state, so that according to the content of described secret key file, remove preliminary latch state.
2. method according to claim 1, is characterized in that, described generate secret key file according to password instruction after, also comprise:
Open bluetooth and obtain secret key function, and configure the information of described auxiliary equipment, described information comprises bluetooth ID and the medium access control MAC Address of described auxiliary equipment.
3. method according to claim 1, is characterized in that, described send described secret key file to auxiliary equipment before, mated with described auxiliary equipment by bluetooth, comprising:
Open bluetooth and receive described auxiliary equipment send matching request, described matching request comprises the information of described auxiliary equipment;
The information of the information of the described auxiliary equipment in described matching request with the described auxiliary equipment configured before is contrasted;
If the information of the described auxiliary equipment in described matching request is consistent with the information of the described auxiliary equipment configured before, then complete coupling.
4. method according to claim 1, is characterized in that, after lasting induction reaches setting-up time length less than user operation, enters described preliminary latch state; When trial solution is except after the number of times of described preliminary latch state reaches pre-determined number, enter described degree of depth lock-out state.
5. a terminal, is characterized in that, comprising:
Secret key generation module, for generating secret key file according to password instruction, the password that described password instruction is arranged according to user generates;
Secret key sending module, for when after penetration depth lock-out state, sends described secret key file to auxiliary equipment, so that according to the content of described secret key file, removes preliminary latch state;
Lock-out state change module, for when described send described secret key file to auxiliary equipment time, described degree of depth lock-out state is changed to described preliminary latch state.
6. terminal according to claim 5, is characterized in that, also comprises:
Functional configuration module, obtain secret key function for opening bluetooth, and configure the information of described auxiliary equipment, described information comprises bluetooth ID and the medium access control MAC Address of described auxiliary equipment.
7. terminal according to claim 5, is characterized in that, also comprises:
Start receiver module, for open bluetooth and receive described auxiliary equipment send matching request, described matching request comprises the information of described auxiliary equipment;
Comparison module, for contrasting the information of the information of the described auxiliary equipment in described matching request with the described auxiliary equipment configured before;
Mate module, for when the information of the described auxiliary equipment in described matching request is consistent with the information of the described auxiliary equipment configured before, complete coupling.
8. terminal according to claim 5, is characterized in that, also comprises:
Preliminary latch module, for after lasting induction reaches setting-up time length less than user operation, enters described preliminary latch state;
Degree of depth locking module, after the number of times for removing described preliminary latch state when trial solution reaches pre-determined number, enters described degree of depth lock-out state.
CN201210213288.1A 2012-06-26 2012-06-26 Terminal unlocking method, terminal and auxiliary equipment Active CN102724350B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210213288.1A CN102724350B (en) 2012-06-26 2012-06-26 Terminal unlocking method, terminal and auxiliary equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210213288.1A CN102724350B (en) 2012-06-26 2012-06-26 Terminal unlocking method, terminal and auxiliary equipment

Publications (2)

Publication Number Publication Date
CN102724350A CN102724350A (en) 2012-10-10
CN102724350B true CN102724350B (en) 2015-09-02

Family

ID=46950009

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210213288.1A Active CN102724350B (en) 2012-06-26 2012-06-26 Terminal unlocking method, terminal and auxiliary equipment

Country Status (1)

Country Link
CN (1) CN102724350B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034417A (en) * 2012-12-28 2013-04-10 希姆通信息技术(上海)有限公司 Unlocking method for touch screen and terminal equipment
CN103902863B (en) * 2012-12-28 2017-07-21 联想(北京)有限公司 Encryption method, encryption device and the electronic equipment of a kind of electronic equipment
CN104349452B (en) * 2013-07-24 2018-09-14 中国电信股份有限公司 A kind of method and system of locating cellphone
CN103646217A (en) * 2013-11-27 2014-03-19 宇龙计算机通信科技(深圳)有限公司 Method and device for protecting security of data in terminal and terminal
CN105844125A (en) * 2015-07-08 2016-08-10 广东维沃软件技术有限公司 Method and device for terminal unlocking
CN105101060A (en) * 2015-07-28 2015-11-25 东莞酷派软件技术有限公司 Method and device for unlocking cryptographic object based on short-haul communication, and terminal equipment
CN105844122A (en) * 2016-01-26 2016-08-10 乐视致新电子科技(天津)有限公司 Unlocking password setting method, terminal equipment, and server
CN105868592B (en) * 2016-03-25 2019-05-21 Oppo广东移动通信有限公司 A kind of method, apparatus and intelligent terminal releasing the locking of intelligent terminal depth
CN115767025B (en) * 2022-11-10 2024-01-23 合芯科技有限公司 Method, device, electronic equipment and storage medium for preventing data leakage

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829255A (en) * 2006-03-30 2006-09-06 深圳市杰特电信控股有限公司 Remote locking method and device for mobile phone
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1829255A (en) * 2006-03-30 2006-09-06 深圳市杰特电信控股有限公司 Remote locking method and device for mobile phone
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network

Also Published As

Publication number Publication date
CN102724350A (en) 2012-10-10

Similar Documents

Publication Publication Date Title
CN102724350B (en) Terminal unlocking method, terminal and auxiliary equipment
CN105681328B (en) The method, apparatus and electronic equipment of controlling electronic devices
CN102936980B (en) Method and device for controlling electronic lock
CN101866409B (en) Method and device for locking and unlocking handheld equipment
EP2894584B1 (en) Screen unlocking method, device and terminal
CN108171831B (en) Bidirectional security authentication method based on NFC mobile phone and intelligent lock
CN103838494A (en) Unlocking method of terminal equipment and terminal equipment
CN203192055U (en) Electronic lock
CN103034417A (en) Unlocking method for touch screen and terminal equipment
CN104537291A (en) Screen interface unlocking method and screen interface unlocking device
CN103037370A (en) Portable storage device and identity authentication method
CN108541324A (en) A kind of unlocking method of electronic lock device, client and its electronic lock device
US9667412B2 (en) Key, system and method of unlocking electronic device using the key
CN106652117A (en) Method and system for enabling dynamic passwords to realize offline unlocking, mobile terminal and server
CN104670159A (en) Intelligent lock system and Bluetooth key configuration method thereof
CN109191629A (en) Unlocking method of vehicle, terminal and server
CN102833068B (en) Method for bidirectional authentication of terminal and smart card, protocol and smart card
CN109243017A (en) A kind of bluetooth method for unlocking, device and computer readable storage medium
CN104539806A (en) Mobile terminals and emergency unlocking method thereof
CN108447154A (en) Safe unlocking method and device, encryption and decryption method and device, lock and server
CN104700021A (en) Remote unlocking method and system
CN109658555A (en) Method for unlocking, equipment and house transaction based on bluetooth see room mode
CN104636682A (en) Password management system and method based on hardware device
CN103905191A (en) Verification method applied to mobile terminal, mobile terminal and system
CN105701896A (en) Fingerprint authorization unlocking method and device and terminals

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant