CN104093119B - unlocking method and device - Google Patents
unlocking method and device Download PDFInfo
- Publication number
- CN104093119B CN104093119B CN201410295498.9A CN201410295498A CN104093119B CN 104093119 B CN104093119 B CN 104093119B CN 201410295498 A CN201410295498 A CN 201410295498A CN 104093119 B CN104093119 B CN 104093119B
- Authority
- CN
- China
- Prior art keywords
- terminal
- data
- unblock
- pairing terminal
- pairing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure is directed to unlocking method and device, the unblock operation on the premise of safety unblock is ensured, to simplify user improves user experience.This method includes:Receive the unlocking request of input;Unblock data are obtained from pairing terminal;Whether the checking unblock data are legal;When the unblock data are legal, unlock.When being unlocked to terminal, the unblock data sent according to pairing terminal are unlocked operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, data such as password etc., simplifies user's operation, further, it is possible to ensure safe unblock, improves user experience needed for the technical scheme that the disclosure is provided does not need user to the complicated unblock of terminal input.
Description
Technical field
This disclosure relates to terminal unlocking technical field, more particularly to unlocking method and device.
Background technology
Related terminal device such as smart machine, its unlocking manner usually requires user and inputs solution to terminal device manually
Lock information needed such as password, pattern or fingerprint etc..Such unlocking manner needs user to be manually entered unblock information needed, user
It is cumbersome, and sometimes user forgets to unlock during unlocking pin, compromises Consumer's Experience.
Therefore, there is the problem of user is cumbersome, user experience is poor in the unlocking technology of related terminal device.
The content of the invention
To overcome problem present in correlation technique, the embodiment of the present disclosure provides unlocking method and device, to ensure
On the premise of safety unblock, simplify the unblock operation of user, improve user experience.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of unlocking method, for terminal, including:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock.
It is in one embodiment, described to obtain unblock data from pairing terminal, it may include:
A random number is generated, and the random number is sent to the pairing terminal;
The unblock data after the encryption that the pairing terminal is returned are received, the unblock data after the encryption are by the pairing
Terminal is using key to being generated after the random number encryption.
Whether the checking unblock data are legal, it may include:
The unblock data after the encryption are decrypted using the key, data after being decrypted;
When data are with the nonces match after the decryption, determine that the unblock data after the encryption are legal.
In one embodiment, methods described also includes:
Before the unlocking request for receiving input, the key is sent to the pairing terminal, by the pairing terminal
Store the key.
In one embodiment, methods described also includes:
Before the unlocking request for receiving input, matched, formed with the pairing terminal with the pairing terminal
Encrypted transmission passage for data transfer.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of unlocking method, for terminal, including:
Receive the unblock data acquisition request that pairing terminal is sent;
Unblock data are returned to the pairing terminal.
In one embodiment, it is described to return to unblock data to the pairing terminal, including:
Random number is obtained from the unblock data acquisition request;
Using key to the random number encryption, the unblock data after generation encryption;
The unblock data after the encryption are returned to the pairing terminal.
In one embodiment, methods described also includes:
Before the unblock data acquisition request that the receiving terminal is sent, the described close of the pairing terminal transmission is received
Key;
Store the key.
In one embodiment, methods described also includes:
Before the unblock data acquisition request for receiving pairing terminal transmission, matched with the pairing terminal, with
The pairing terminal forms the encrypted transmission passage for data transfer.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of tripper, including:
Request receiving module, the unlocking request for receiving input;
Data acquisition module, for obtaining unblock data from pairing terminal;
Authentication module, for verifying whether the unblock data are legal;
Unlocked state, for when the unblock data are legal, unlocking.
In one embodiment, the data acquisition module, it may include:
Random number transmitting element, the random number is sent for generating a random number, and to the pairing terminal;
Data receipt unit, for receiving the unblock data after the encryption that the pairing terminal is returned, after the encryption
Unlock data and key is used to being generated after the random number encryption by the pairing terminal.
In one embodiment, the authentication module, it may include:
Decryption unit, for the unblock data after the encryption to be decrypted using the key, number after being decrypted
According to;
Authentication unit, for when data are with the nonces match after the decryption, determining the unblock after the encryption
Data are legal.
In one embodiment, described device may also include:
Key sending module, for before the unlocking request that the request receiving module receives input, to the pairing
Terminal sends the key, the key as described in the pairing terminal storage.
In one embodiment, described device also includes:
First matching module, for before the unlocking request that the request receiving module receives input, with the pairing
Terminal is matched, and the encrypted transmission passage for data transfer is formed with the pairing terminal.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of tripper, including:
Request receiving module, for receiving the unblock data acquisition request that pairing terminal is sent;
Data return to module, for returning to unblock data to the pairing terminal.
In one embodiment, the data return to module, including:
Acquiring unit, for obtaining random number from the unblock data acquisition request;
Ciphering unit, for, to the random number encryption, generating the unblock data after encryption using key;
Returning unit, for returning to the unblock data after the encryption to the pairing terminal.
In one embodiment, described device also includes:
Key reception module, for receiving the unblock data acquisition request that pairing terminal is sent in the request receiving module
Before, the key that the pairing terminal is sent is received;
Cipher key storage block, for storing the key.
In one embodiment, described device also includes:
Second matching module, for receiving the unblock data acquisition request that pairing terminal is sent in the request receiving module
Before, matched with the pairing terminal, the encrypted transmission passage for data transfer is formed with the pairing terminal.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of tripper, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of tripper, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Receive the unblock data acquisition request that pairing terminal is sent;
Unblock data are returned to the pairing terminal.
The technical scheme provided by this disclosed embodiment can include the following benefits:When being unlocked to terminal,
The unblock data sent according to pairing terminal are unlocked operation, and the unblock data only sent in pairing terminal are closed
During method, could successfully it unlock;Compared with correlation technique, the technical scheme that the embodiment of the present disclosure is provided does not need user defeated to terminal
Data such as password etc. needed for entering the unblock of complexity, simplifies user's operation, further, it is possible to ensure safe unblock, improves use
Family usage experience.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not
Can the limitation present invention.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention
Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of unlocking method according to an exemplary embodiment.
Fig. 2 is the flow chart of another unlocking method according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of unlocking method according to an exemplary embodiment one.
Fig. 4 is the flow chart of another unlocking method according to an exemplary embodiment two.
Fig. 5 is the block diagram of the first tripper according to an exemplary embodiment.
Fig. 6 is the block diagram of data acquisition module in Fig. 5.
Fig. 7 is the block diagram of authentication module in Fig. 5.
Fig. 8 is the block diagram of second of tripper according to an exemplary embodiment.
Fig. 9 is the block diagram of the third tripper according to an exemplary embodiment.
Figure 10 is the block diagram of data return module in Fig. 9.
Figure 11 is the block diagram of the 4th kind of tripper according to an exemplary embodiment.
Figure 12 is a kind of block diagram suitable for tripper according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended
The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
The embodiment of the present disclosure provides two kinds of unlocking methods, and a kind of unlocking method is (as shown in Figure 1) for terminal, another
Unlocking method another terminal (as shown in Figure 2) for being used to be formed the encrypted transmission passage for data transfer with terminal is (i.e. eventually
The pairing terminal at end, in the disclosed embodiments, terminal and another terminal are mutually referred to as respective pairing terminal, the two terminals
Between can carry out radio communication).When being unlocked to terminal, it is unlocked according to the unblock data that pairing terminal is sent
Operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, this
Data such as password etc., simplifies needed for the technical scheme that open embodiment is provided does not need user to the complicated unblock of terminal input
User's operation, further, it is possible to ensure safe unblock, improves user experience.
Fig. 1 is a kind of flow chart of unlocking method according to an exemplary embodiment, as shown in figure 1, the unblock side
Method is used for terminal, and the terminal can be any terminal equipment such as mobile phone, tablet personal computer etc., comprise the following steps S101-S104.
In step S101, the unlocking request of input is received.
Unlocking request is that the user of terminal inputs to terminal, for example can be on terminal screen set one unblock by
Key, user triggers the release tab, so that terminal have received unlocking request;Can also be one hardkey of setting, example in terminal
Such as the power key in terminal, when user presses the hardware, terminal, which is considered as, have received unlocking request.
In step s 102, unblock data are obtained from pairing terminal.
In one embodiment, before step S101 is performed, the above method may also include:Matched somebody with somebody with pairing terminal
It is right, the encrypted transmission passage for data transfer is formed with pairing terminal.The pairing terminal is used for unlocking terminal.
In one embodiment, step S102 can be embodied as:Unblock data acquisition request is sent to pairing terminal;Reception is matched somebody with somebody
The unblock data returned to terminal.In one embodiment, unblock data acquisition request can be a default request, and this is preset
Request is only used to refer to pairing terminal and returns to unblock data to terminal;The default request is sent to after pairing terminal, and pairing is eventually
Hold to terminal and return to unblock data, terminal receives the unblock data that pairing terminal is returned.Unblock data now can be eventually
One that is sent to pairing terminal in advance before step S101 is performed simple default unblock data A is held, such as is one group of number
Word, one group of word etc., the default unblock data A are sent to after pairing terminal, pairing terminal-pair its without any processing;When
When pairing terminal receives default request, pairing terminal returns to default unblock data A to terminal, terminal is received the default solution
Lock data A.Specifically refer to subsequent embodiment one.
In another embodiment, step S102 can be embodied as:A random number is generated, and random number is sent to pairing terminal
(step is considered as have sent unblock data acquisition request to pairing terminal);Receive the solution after the encryption that pairing terminal is returned
Data are locked, the unblock data after encryption are by pairing terminal using key to being generated after random number encryption.Specifically refer to follow-up reality
Apply example two.Now, before step S101 is performed, the above method may also include step S100:Key is sent to pairing terminal, by
Match terminal storage key.Wherein, step S100 can be embodied as:A secondary key only is sent to pairing terminal, is being solved every time
This key is all used during lock, this mode is more convenient simple.Or, step S100 may also be embodied for:According to default
The transmission cycle sends key to pairing terminal, and the key sent every time is differed, and this mode causes the unblock of terminal more
It is reliable and secure, it is to avoid key has unlocked terminal after being obtained by criminal.To pairing terminal send key when, can by with
Encrypted transmission passage between terminal is sent.
In step s 103, whether checking unblock data are legal, continue executing with step S104 when legal;When illegal
When, lock-out state is kept, flow is exited.
In one embodiment, when the unblock data got in step S102 are foregoing default unblock data A, holding
During row step S103, the data B for being used to verify of default unblock data A and terminal oneself storages can be compared, if
The default unblock data A then proves that foregoing default unblock data A is legal with comparing success for the data B verified;If
Comparison is unsuccessful, then proves that foregoing default unblock data A is illegal.The data B for being such as used to verify is exactly aforementioned terminals
It is sent to a simple default unblock data A of pairing terminal in advance before step S101 is performed, then terminal can judge
Go out the unblock data that it gets in step s 102 identical with the default unblock data A that it is stored, then show that unblock data are closed
The conclusion of method.Specifically refer to subsequent embodiment one.
In another embodiment, the unblock data after unblock data got in step S102 are foregoing encryptions
When, when performing step S103, the unblock data after encryption are decrypted using aforementioned key, data after being decrypted;Sentence
Data with being sent to whether the random number of pairing terminal matches before after disconnected decryption, upon a match, it is determined that the unblock number after encryption
According to being legal, step S104 is continued executing with;When mismatching, it is determined that the unblock data after encryption are illegal, lock is kept
Determine state, exit flow.Specifically refer to subsequent embodiment two.
S104, when unlock data it is legal when, unlock.
In the technical scheme that the embodiment of the present disclosure is provided, when being unlocked to terminal, sent according to pairing terminal
Unblock data are unlocked operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;With
Correlation technique is compared, and the technical scheme that the embodiment of the present disclosure is provided does not need user to input data needed for complicated unblock to terminal
Such as password etc., simplifies user's operation, further, it is possible to ensure safe unblock, improves user experience.
In one embodiment, in step s 102, it can be obtained by communication from pairing terminal and unlock data.
That is, radio communication can be realized between terminal and pairing terminal.Wherein, communication can be short-distance wireless communication mode ratio
Such as bluetooth approach or the mobile network communication mode of WIFI modes or other long distances.If using short-distance wireless
Communication mode, then matching terminal needs the unblock with the closer complete paired terminal of ability of distance of terminal.Such as, when terminal is tool
Have equipment such as mobile phone, tablet personal computer etc. of Bluetooth function, pairing terminal be for example another mobile phone of another equipment with Bluetooth function,
During another tablet personal computer etc., now, it can be communicated between terminal and pairing terminal using bluetooth to realize, terminal can utilize bluetooth work(
Unblock data can be got from pairing terminal, speed is fast, convenient acquisition.If using the mobile network communication side of other long distances
Formula, as long as no matter then how far terminal is with matching the distance between terminal, as long as can move network service between them, all
Can be with the unblock of complete paired terminal.Which kind of communication mode is specifically used, user can determine as needed.Such as father and mother think control
A smart mobile phone P1 can not arbitrarily be used by child in family, then short-distance wireless communication mode can be used, by the intelligence in family
Mobile phone P1 is as above-mentioned terminal, and the smart mobile phone P2 that father and mother are carried with is as pairing terminal, so, when father and mother carry intelligence
Mobile phone P2 leaves home after going out, because the distance between smart mobile phone P1 and smart mobile phone P2 is too remote, it is impossible to successfully carry out short distance
Radio communication, therefore, child at home just can not successfully unlock smart mobile phone P1, only father and mother go back home in after or away from
When leaving home closer, child at home just can successfully unlock smart mobile phone P1, so as to realize the same of safety unblock
When, also reach that control child can not at will play the purpose of mobile phone, it is to avoid child indulges mobile phone.A pair of men and wives have at home for another example
The smart mobile phone P3 of one amusement that is specifically used to be in, wife or husband want to play smart mobile phone P3 at any time, that
The mobile network communication mode of other long distances can be used, using smart mobile phone P3 as above-mentioned terminal, husband is carried with
Smart mobile phone P4 is as above-mentioned pairing terminal, and so, when wife, which stays at home, wants to play smart mobile phone P3, smart mobile phone P3 can profit
Communicated with the success of mobile network communication mode with smart mobile phone P4, so that wife can successfully unlock smart mobile phone P3 at any time,
Safe unblock is not only realized, and avoids wife from carrying out cumbersome operation, user experience is improved.
Corresponding to foregoing unlocking method, as shown in Fig. 2 being another unlocking method according to an exemplary embodiment
Flow chart, the unlocking method is used for terminal, and the terminal is the pairing terminal of the terminal in abovementioned steps S101-104, be with it is preceding
State the terminal in step S101-104 and carry out pairing, any terminal of the formed encrypted transmission passage for data transfer
Alleged pairing terminal refers to the terminal in abovementioned steps S101-104 in equipment such as mobile phone, tablet personal computer etc., the unlocking method,
The unlocking method comprises the following steps S201-S202:
In step s 201, the unblock data acquisition request that pairing terminal is sent is received.
Unblock data are returned in step S202, to pairing terminal.
It is whole according to pairing by terminal when being unlocked to pairing terminal in the technical scheme that the embodiment of the present disclosure is provided
The request at end returns to unblock data to pairing terminal, controls the unblock to matching terminal;Compared with correlation technique, the disclosure is implemented
Data such as password etc., simplifies user behaviour needed for the technical scheme that example is provided does not need user to the complicated unblock of terminal input
Make, further, it is possible to ensure safe unblock, improve user experience.
In one embodiment, unblock data acquisition request can be a simple default request, and terminal receives this
After default request, learn that pairing terminal wants unblock, then terminal will return to unblock data, solution now to pairing terminal
Lock data are to match the simple default unblock data A that terminal is sent to terminal in advance, such as are set of number, one group of word
Language etc., the terminal-pair default unblock data are without any processing;When terminal receive that pairing terminal sends it is above-mentioned default
During request, terminal returns to default unblock data A to pairing terminal, specifically refers to subsequent embodiment one.Match terminal such as afterwards
What is unlocked the respective description that processing refer to abovementioned steps S101-104, no longer redundant later here.
In another embodiment, the random number of pairing terminal generation, terminal can be included in unblock data acquisition request
Receive after unblock data acquisition request, random number is obtained from the unblock data acquisition request, then using key to this
Random number encryption, generates the unblock data after encryption, and then the unblock data after encrypting are returned to pairing terminal by terminal.Tool
Body refers to subsequent embodiment two.Now, before step S201 is performed, the above method may also include:Receive pairing terminal hair
The key sent, and store the key.
In one embodiment, the unblock number that pairing terminal is sent can be received by communication in step s 201
Asked according to obtaining;It can be returned in step S202 by communication to pairing terminal and unlock data.
In one embodiment, before step S201 is performed, the above method may also include:Matched somebody with somebody with pairing terminal
It is right, the encrypted transmission passage for data transfer is formed with pairing terminal.
Illustrate the technical scheme that the embodiment of the present disclosure is provided below with two embodiments.
Embodiment one
In embodiment one, unblock data be embodied as terminal in advance to pairing terminal send default unblock data, terminal with
Communication mode between pairing terminal is embodied as bluetooth approach, as shown in figure 3, embodiment one comprises the following steps:
In step S301, terminal X1 and another terminal X2 carries out Bluetooth pairing, terminal X2 is turned into pairing terminal.
In step s 302, terminal X1 sends default unblock data, such as set of number " 951642 " to terminal X2.
In step S303, terminal X2 is received to be stored in locally after the default unblock data that terminal X1 is sent.
In step s 304, terminal X1 is received after the unlocking request of user's input, is sent with bluetooth approach to terminal X2
Default request.
In step S305, terminal X2 is received after default request with bluetooth approach, the default unblock data stored
(i.e. one group data " 951642 ") is sent to terminal X1.
Wherein, when terminal X2 does not receive default request with bluetooth approach, then subsequent step is not performed, it is impossible to terminal
X1 is unlocked, and such case appears in terminal X2 and terminal X1 apart from distant, can not successfully realize that bluetooth is led to each other
In the case of letter.
In step S306, terminal X1 receives terminal X2 that group of data sent and presetting that terminal X1 itself is stored
Unblock data are compared, if comparison result is matching, illustrates that the unblock data that terminal X2 is sent are legal, then perform
Step S307;If comparison result illustrates that the unblock data that terminal X2 is sent are illegal, then keeps locking to mismatch
State, terminates flow.
In step S307, terminal X1 comparison results for matching, unlock.
The present embodiment one, when being unlocked to terminal X1, is unlocked according to the unblock data that pairing terminal is sent
Operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, this
Data such as password etc. needed for embodiment one does not need user to the complicated unblock of terminal X1 inputs, simplifies user's operation, and
And, safe unblock is ensure that, user experience is improved.
Embodiment two
In embodiment two, unblock data are embodied as matching the encryption generated after terminal is encrypted random number using key
Unblock data afterwards, the communication mode between terminal and pairing terminal is embodied as mobile network communication mode, as shown in figure 4, real
Example two is applied to comprise the following steps:
In step S401, terminal X3 and another terminal X4 carries out pairing and binding operation, terminal X4 is turned into pairing terminal.
In step S402, terminal X3 sends key to terminal X4.
In step S403, terminal X4 is received to be stored in locally after the key that terminal X3 is sent.
In step s 404, terminal X3 is received after the unlocking request of user's input, generates a random number such as " 88 ", and
The random number is sent to terminal X4 in mobile network communication mode.
In step S405, terminal X4 is received in mobile network communication mode after random number, is stored using terminal X4
Key the random number is encrypted, the unblock data after encrypting and are sent to end by the unblock data after generation encryption
Hold X3.
In step S406, terminal X3 is received after the unblock data after the encryption that terminal X4 is sent, and utilizes terminal
Unblock data after the key pair encryption of X3 storages are decrypted, data after being decrypted.
In step S 407, data after decryption and the random number of its generation previous are compared terminal X3, if compared
As a result it is matching, illustrates that the unblock data that terminal X4 is sent are legal, then perform step S408;If comparison result is not
Matching, illustrates that the unblock data that terminal X4 comes are illegal, then keeps lock-out state, terminate flow.
In step S408, terminal X3 comparison results are matching, are unlocked.
In embodiment two, when being unlocked to terminal X3, solved according to the unblock data that pairing terminal is sent
Lock operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique,
Data such as password etc., simplifies user's operation needed for the present embodiment two does not need user to the complicated unblock of terminal X3 inputs,
Further, it is possible to ensure safe unblock, user experience is improved.
Fig. 5 is a kind of unblock for corresponding to abovementioned steps S101-104 methods describeds according to an exemplary embodiment
The block diagram of device, the tripper is used in terminal, as shown in figure 5, the tripper includes:
Request receiving module 51, the unlocking request for receiving input;
Data acquisition module 52, for obtaining unblock data from pairing terminal;
Authentication module 53, for verifying whether unblock data are legal;
Unlocked state 54, for when unblock data are legal, unlocking.
In one embodiment, as shown in fig. 6, above-mentioned data acquisition module 52, it may include:
Random number transmitting element 61, random number is sent for generating a random number, and to pairing terminal;
Data receipt unit 62, for receiving the unblock data after the encryption that pairing terminal is returned, the unblock number after encryption
Key is used to being generated after random number encryption according to by pairing terminal.
In one embodiment, as shown in fig. 7, above-mentioned authentication module 53, it may include:
Decryption unit 71, for being decrypted using the unblock data after key pair encryption, data after being decrypted;
Authentication unit 72, for when data are with nonces match after decryption, it is determined that the unblock data after encryption are legal.
In one embodiment, as shown in figure 8, said apparatus may also include:
Key sending module 81, for before the unlocking request that request receiving module 51 receives input, to pairing terminal
Key is sent, by pairing terminal storage key.
In one embodiment, then as shown in figure 8, said apparatus may also include:
First matching module 82, for before the unlocking request that request receiving module 51 receives input, with pairing terminal
Matched, the encrypted transmission passage for data transfer is formed with pairing terminal.
The above-mentioned tripper that the embodiment of the present disclosure is provided, when being unlocked to terminal, sends according to pairing terminal
Unblock data be unlocked operation, and only match unblock data that terminal sends it is legal when, could successfully unlock;
Compared with correlation technique, the technical scheme that the embodiment of the present disclosure is provided does not need user to input number needed for complicated unblock to terminal
According to such as password etc., user's operation is simplified, further, it is possible to ensure safe unblock, user experience is improved.
Fig. 9 is a kind of unblock for corresponding to abovementioned steps S201-202 methods describeds according to an exemplary embodiment
The block diagram of device, the tripper is used in terminal (i.e. pairing terminals of the Fig. 5 into Fig. 8 shown devices), as shown in figure 9, should
Tripper includes:
Request receiving module 91, for receiving the unblock data acquisition request that pairing terminal is sent;
Data return to module 92, for returning to unblock data to pairing terminal.
In one embodiment, as shown in Figure 10, above-mentioned data return to module 92, it may include:
Acquiring unit 1001, for obtaining random number from unblock data acquisition request;
Ciphering unit 1002, for, to random number encryption, generating the unblock data after encryption using key;
Returning unit 1003, for returning to the unblock data after encryption to pairing terminal.
In one embodiment, as shown in figure 11, said apparatus may also include:
Key reception module 111, the unblock data acquisition for receiving pairing terminal transmission in request receiving module 91 please
Before asking, the key that pairing terminal is sent is received;
Cipher key storage block 112, for storing key.
In one embodiment, then as shown in figure 11, said apparatus may also include:
Second matching module 113, the unblock data acquisition for receiving pairing terminal transmission in request receiving module 91 please
Before asking, matched with pairing terminal, the encrypted transmission passage for data transfer is formed with pairing terminal.
The above-mentioned tripper that the embodiment of the present disclosure is provided, when being unlocked to pairing terminal, by terminal according to pairing
The request of terminal returns to unblock data to pairing terminal, controls the unblock to matching terminal;Compared with correlation technique, the disclosure is real
Apply example offer technical scheme do not need user complicated unblock is inputted to terminal needed for data such as password etc., simplify user
Operation, further, it is possible to ensure safe unblock, improves user experience.
Figure 12 is a kind of block diagram of means for unlocking 1200 according to an exemplary embodiment, and the device is applicable
In terminal device.For example, device 1200 can be mobile phone, computer, digital broadcast terminal, messaging devices, game
Console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 12, device 1200 can include following one or more assemblies:Processing assembly 1202, memory 1204,
Power supply module 1206, multimedia groupware 1208, audio-frequency assembly 1210, the interface 1212 of input/output (I/O), sensor cluster
1214, and communication component 1216.
The integrated operation of the usual control device 1200 of processing assembly 1202, such as with display, call, data communication,
The camera operation operation associated with record operation.Treatment element 1202 can include one or more processors 1220 to perform
Instruction, with all or part of step for the method for completing above-mentioned terminal or its pairing end side.In addition, processing assembly 1202 can be with
Including one or more modules, it is easy to the interaction between processing assembly 1202 and other assemblies.For example, processing component 1202 can be with
Including multi-media module, to facilitate the interaction between multimedia groupware 1208 and processing assembly 1202.
Memory 1204 is configured as storing various types of data supporting the operation in equipment 1200.These data
Example includes the instruction of any application program or method for being used to operate on device 1200, contact data, telephone book data,
Message, picture, video etc..Memory 1204 can by any kind of volatibility or non-volatile memory device or they
Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can
Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory
Reservoir, disk or CD.
Electric power assembly 1206 provides electric power for the various assemblies of device 1200.Electric power assembly 1206 can include power management
System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 1200.
Multimedia groupware 1208 is included in the screen of one output interface of offer between described device 1200 and user.
In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel,
Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch and passed
Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic
The border of work, but also the detection duration related to the touch or slide and pressure.In certain embodiments, it is many
Media component 1208 includes a front camera and/or rear camera.When equipment 1200 is in operator scheme, mould is such as shot
When formula or video mode, front camera and/or rear camera can receive the multi-medium data of outside.Each preposition shooting
Head and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 1210 is configured as output and/or input audio signal.For example, audio-frequency assembly 1210 includes a wheat
Gram wind (MIC), when device 1200 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone quilt
It is configured to receive external audio signal.The audio signal received can be further stored in memory 1204 or via communication
Component 1216 is sent.In certain embodiments, audio-frequency assembly 1210 also includes a loudspeaker, for exports audio signal.
I/O interfaces 1212 are that interface, above-mentioned peripheral interface module are provided between processing assembly 1202 and peripheral interface module
Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and
Locking press button.
Sensor cluster 1214 includes one or more sensors, and the state for providing various aspects for device 1200 is commented
Estimate.For example, sensor cluster 1214 can detect opening/closed mode of equipment 1200, the relative positioning of component, such as institute
Display and keypad that component is device 1200 are stated, sensor cluster 1214 can be with detection means 1200 or device 1,200 1
The position of individual component changes, the existence or non-existence that user contacts with device 1200, the orientation of device 1200 or acceleration/deceleration and dress
Put 1200 temperature change.Sensor cluster 1214 can include proximity transducer, be configured in not any physics
The presence of object nearby is detected during contact.Sensor cluster 1214 can also include optical sensor, such as CMOS or ccd image sensing
Device, for being used in imaging applications.In certain embodiments, the sensor cluster 1214 can also include acceleration sensing
Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1216 is configured to facilitate the communication of wired or wireless way between device 1200 and other equipment.Dress
The wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof can be accessed by putting 1200.It is exemplary at one
In embodiment, communication component 1216 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel
Information.In one exemplary embodiment, the communication component 1216 also includes near-field communication (NFC) module, to promote short distance
Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module
(UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1200 can be by one or more application specific integrated circuits (ASIC), numeral
Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided
Such as include instruction memory 1204, above-mentioned instruction can be performed by the processor 820 of device 1200 with complete above-mentioned terminal or its
Match all or part of step of the method for end side.For example, the non-transitorycomputer readable storage medium can be
ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal
When device is performed so that mobile terminal is able to carry out a kind of unlocking method, and methods described includes:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether checking unblock data are legal;
When unblock data are legal, unlock.
Another non-transitorycomputer readable storage medium, when the instruction in the storage medium is by mobile terminal
When managing device execution so that mobile terminal is able to carry out another unlocking method, and methods described includes:
Receive the unblock data acquisition request that pairing terminal is sent;
Unblock data are returned to pairing terminal.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice disclosure disclosed herein
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or
Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and
And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (9)
1. a kind of unlocking method, for terminal, it is characterised in that including:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock;
It is described, it is described to obtain unblock data from pairing terminal, including:
A random number is generated, and the random number is sent to the pairing terminal;
The unblock data after the encryption that the pairing terminal is returned are received, the unblock data after the encryption are by the pairing terminal
Using key to being generated after the random number encryption;
The unlocking method is additionally operable to the pairing terminal, to cause the terminal and the pairing terminal mutually to unlock.
2. the method as described in claim 1, it is characterised in that whether the checking unblock data are legal, including:
The unblock data after the encryption are decrypted using the key, data after being decrypted;
When data are with the nonces match after the decryption, determine that the unblock data after the encryption are legal.
3. the method as described in claim 1, it is characterised in that methods described also includes:
Before the unlocking request for receiving input, the key is sent to the pairing terminal, by the pairing terminal storage
The key.
4. the method as described in claims 1 to 3 is any, it is characterised in that methods described also includes:
Before the unlocking request for receiving input, matched with the pairing terminal, being formed with the pairing terminal is used for
The encrypted transmission passage of data transfer.
5. a kind of tripper, for terminal, it is characterised in that including:
Request receiving module, the unlocking request for receiving input;
Data acquisition module, for obtaining unblock data from pairing terminal;
Authentication module, for verifying whether the unblock data are legal;
Unlocked state, for when the unblock data are legal, unlocking;
The data acquisition module, including:
Random number transmitting element, the random number is sent for generating a random number, and to the pairing terminal;
Data receipt unit, for receiving the unblock data after the encryption that the pairing terminal is returned, the unblock after the encryption
Data are by the pairing terminal using key to being generated after the random number encryption;
The tripper is additionally operable to the pairing terminal, to cause the terminal and the pairing terminal mutually to unlock.
6. device as claimed in claim 5, it is characterised in that the authentication module, including:
Decryption unit, for the unblock data after the encryption to be decrypted using the key, data after being decrypted;
Authentication unit, for when data are with the nonces match after the decryption, determining the unblock data after the encryption
It is legal.
7. device as claimed in claim 5, it is characterised in that described device also includes:
Key sending module, for before the unlocking request that the request receiving module receives input, to the pairing terminal
The key is sent, the key as described in the pairing terminal storage.
8. the device as described in any in claim 5 to 7, it is characterised in that described device also includes:
First matching module, for before the unlocking request that the request receiving module receives input, with the pairing terminal
Matched, the encrypted transmission passage for data transfer is formed with the pairing terminal.
9. a kind of tripper, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock;
It is described, it is described to obtain unblock data from pairing terminal, including:
A random number is generated, and the random number is sent to the pairing terminal;
The unblock data after the encryption that the pairing terminal is returned are received, the unblock data after the encryption are by the pairing terminal
Using key to being generated after the random number encryption;
The unlocking method is additionally operable to the pairing terminal, to cause the terminal and the pairing terminal mutually to unlock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410295498.9A CN104093119B (en) | 2014-06-26 | 2014-06-26 | unlocking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410295498.9A CN104093119B (en) | 2014-06-26 | 2014-06-26 | unlocking method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104093119A CN104093119A (en) | 2014-10-08 |
CN104093119B true CN104093119B (en) | 2017-10-13 |
Family
ID=51640791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410295498.9A Active CN104093119B (en) | 2014-06-26 | 2014-06-26 | unlocking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104093119B (en) |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10437981B2 (en) | 2015-01-07 | 2019-10-08 | Htc Corporation | Electronic system and device unlock method of the same |
CN104539806A (en) * | 2015-01-12 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Mobile terminals and emergency unlocking method thereof |
CN104951408B (en) * | 2015-05-25 | 2018-02-06 | 小米科技有限责任公司 | Data guard method, storage device and terminal device |
CN104951703B (en) * | 2015-05-27 | 2019-01-18 | 小米科技有限责任公司 | terminal control method and device |
CN105070004A (en) * | 2015-07-15 | 2015-11-18 | 泰凌微电子(上海)有限公司 | Intelligent equipment, as well as remote control system and remote control pairing method of intelligent equipment |
CN105471890A (en) * | 2015-12-24 | 2016-04-06 | 小米科技有限责任公司 | Unlocking method based on wearable device, apparatus and system |
CN105956452A (en) * | 2016-04-20 | 2016-09-21 | 上海斐讯数据通信技术有限公司 | Method and system for unlocking device |
CN112767577B (en) * | 2020-12-23 | 2022-05-27 | 广州技象科技有限公司 | Access control unlocking method and device based on narrowband Internet of things |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
CN102708324A (en) * | 2012-05-16 | 2012-10-03 | 惠州Tcl移动通信有限公司 | Screen locker unlocking system and method |
CN102883050A (en) * | 2012-09-05 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Mobile terminal and unlocking method thereof |
CN102930188A (en) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
KR20130081910A (en) * | 2012-01-10 | 2013-07-18 | 엘지전자 주식회사 | Mobile terminal and method for controlling thereof |
-
2014
- 2014-06-26 CN CN201410295498.9A patent/CN104093119B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
KR20130081910A (en) * | 2012-01-10 | 2013-07-18 | 엘지전자 주식회사 | Mobile terminal and method for controlling thereof |
CN102708324A (en) * | 2012-05-16 | 2012-10-03 | 惠州Tcl移动通信有限公司 | Screen locker unlocking system and method |
CN102883050A (en) * | 2012-09-05 | 2013-01-16 | 东莞宇龙通信科技有限公司 | Mobile terminal and unlocking method thereof |
CN102930188A (en) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104093119A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104093119B (en) | unlocking method and device | |
CN104219058B (en) | Authentication, identification authorization method and device | |
CN104243484B (en) | Information interacting method and device, electronic equipment | |
CN108269334A (en) | Method for unlocking, terminal device and smart lock | |
CN104391870B (en) | Logistics information acquisition methods and device | |
CN104283876A (en) | Operation authorization method and device | |
CN106097494A (en) | The method for unlocking of smart lock and device | |
CN104573550A (en) | Method and device for protecting data | |
CN104091376A (en) | Intelligent lock control method and apparatus thereof | |
CN104216742A (en) | Upgrade control method and device based on password | |
WO2020259026A1 (en) | Access control method and apparatus, and electronic device and storage medium | |
CN104484799A (en) | Payment method and device | |
CN104331228A (en) | Screen locking method and device | |
CN104468581B (en) | The method and device of login application program | |
CN105407070A (en) | Logging-in authorization method and device | |
CN104950838A (en) | Network account binding method and device | |
CN105471890A (en) | Unlocking method based on wearable device, apparatus and system | |
CN104217328A (en) | Multi-verification payment method and multi-verification payment device | |
CN104158665A (en) | Method and device of verification | |
CN106682463A (en) | Unlocking method and device | |
CN106127062A (en) | unlocking method and device | |
CN105631254A (en) | Unlocking method and unlocking device | |
CN106126986A (en) | Lock unlocking processing method and the device of data partition | |
CN105681261A (en) | Security authentication method and apparatus | |
CN106789070A (en) | The decryption method of data, device and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |