CN111581630B - Computer unlocking method, device, equipment and medium - Google Patents

Computer unlocking method, device, equipment and medium Download PDF

Info

Publication number
CN111581630B
CN111581630B CN202010397266.XA CN202010397266A CN111581630B CN 111581630 B CN111581630 B CN 111581630B CN 202010397266 A CN202010397266 A CN 202010397266A CN 111581630 B CN111581630 B CN 111581630B
Authority
CN
China
Prior art keywords
computer
identity information
intelligent terminal
unlocking
computer user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010397266.XA
Other languages
Chinese (zh)
Other versions
CN111581630A (en
Inventor
顾磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wingtech Information Technology Co Ltd
Original Assignee
Shanghai Wingtech Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wingtech Information Technology Co Ltd filed Critical Shanghai Wingtech Information Technology Co Ltd
Priority to CN202010397266.XA priority Critical patent/CN111581630B/en
Publication of CN111581630A publication Critical patent/CN111581630A/en
Application granted granted Critical
Publication of CN111581630B publication Critical patent/CN111581630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The embodiment of the application discloses a computer unlocking method, a device, equipment and a medium. The method comprises the following steps: receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user; verifying identity information of a computer user according to a pre-stored identity database; if the identity information of the computer user passes the verification, the computer is indicated to enter the login page from the unlocking page, and an unlocking response is sent to the intelligent terminal. By operating the technical scheme provided by the application, the problem that the traditional login process needs to manually input the password, so that the login process is complicated can be solved, and the efficiency of unlocking and login of the computer can be effectively improved.

Description

Computer unlocking method, device, equipment and medium
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a computer unlocking method, a device, equipment and a medium.
Background
With the development of information technology, computers are widely applied, so that the life of users is greatly facilitated; users often store a plurality of important files or data information in a computer, so that people have stronger and stronger security consciousness on a computer system, and the current common encryption mode of Windows10 is a static password; unlocking and logging are carried out by setting numbers, letters or special characters.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art:
at present, a static password used needs to be manually input during login, and the problem of easiness in cracking exists, and the password needs to be manually input during login, so that the login process is complicated, and the high efficiency of computer unlocking and login is difficult to realize.
Disclosure of Invention
The embodiment of the application provides a computer unlocking method, a computer unlocking device, computer unlocking equipment and a computer unlocking medium, which can realize the effect of quickly unlocking a computer by scanning an identification pattern through an intelligent terminal.
In one embodiment, the embodiment of the application provides a computer unlocking method, which comprises the following steps:
receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
verifying identity information of a computer user according to a pre-stored identity database;
if the identity information of the computer user passes the verification, the computer is indicated to enter the login page from the unlocking page, and an unlocking response is sent to the intelligent terminal.
Optionally, the computer user identity information storage process of the identity database includes:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an association relationship between identity information of a computer user and an identification pattern;
and storing the association relation into an identity database.
Optionally, verifying the identity information of the computer user according to a pre-stored identity database includes:
if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
Optionally, verifying that the binding relationship exists between the identity information of the computer user and the identity information of the intelligent terminal includes:
acquiring identity information of an intelligent terminal;
if the identity information of the computer user is the same as the identity information of the intelligent terminal, the binding relationship is determined to exist.
Optionally, the method further comprises:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating that the state to be awakened of the computer is switched to a working state based on the awakening request; the wake-up request is sent out in response to a wake-up pattern recognition instruction of a user based on a wake-up pattern generated by the intelligent terminal.
In one embodiment, an embodiment of the present application provides a computer unlocking device, including:
the receiving module is used for receiving a login request sent by the intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
the verification module is used for verifying the identity information of the computer user according to a pre-stored identity database;
and the sending module is used for indicating the computer to enter the login page from the unlocking page and sending an unlocking response to the intelligent terminal if the identity information of the computer user passes the verification.
Optionally, the method further comprises:
the receiving module is also used for receiving the identity information and the identification pattern of the computer user uploaded by the intelligent terminal;
the building module is used for building the association relation between the identity information of the computer user and the identification pattern;
and the storage module is used for storing the association relation into the identity database.
Optionally, the verification module is specifically configured to:
if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
Optionally, the verification module is further specifically configured to:
acquiring identity information of an intelligent terminal;
if the identity information of the computer user is the same as the identity information of the intelligent terminal, the binding relationship is determined to exist.
Optionally, the method further comprises:
the indication module is used for receiving a wake-up request sent by the intelligent terminal if the computer is in a state to be woken up, and indicating the state to be woken up of the computer to be switched to a working state based on the wake-up request; the wake-up request is sent out in response to a wake-up pattern recognition instruction of a user based on a wake-up pattern generated by the intelligent terminal.
In one embodiment, the present application further provides a computer device, including:
one or more processors;
storage means for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the computer unlocking method according to any one of the embodiments of the present application.
In one embodiment, the present application further provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the method for unlocking a computer according to any one of the embodiments of the present application.
According to the embodiment of the application, the login request of the intelligent terminal is received, the identity information of the user of the login computer is verified according to the identity information stored in the identity database in advance, and the computer is instructed to jump from the unlocking page to the login page after the verification is passed, so that the computer is safely unlocked. According to the embodiment, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the traditional login process needs to manually input a password, so that the login process is complicated is solved, and the efficiency of unlocking and login of the computer can be effectively improved.
Drawings
FIG. 1 is a flowchart of a computer unlocking method according to an embodiment of the present application;
FIG. 2 is a flowchart of another method for unlocking a computer according to an embodiment of the application;
FIG. 3 is a schematic diagram of a computer unlocking device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a computer device in an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all of the structures related to the present application are shown in the drawings.
Fig. 1 is a flowchart of a computer unlocking method according to an embodiment of the application. The embodiment can be suitable for the situation of unlocking the computer through unlocking the intelligent terminal. The method can be executed by a computer unlocking device, and the device can be realized in a hardware/software mode and can be configured in computer equipment. The method specifically comprises the following steps:
s110, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user.
In the embodiment, the unlocking method for logging in the computer system by adopting the preset static password in the past is modified; the intelligent terminal scans the identification pattern pre-generated by the computer to send a login request, and the login request is used for unlocking the computer according to the identification pattern. The intelligent terminal is a type of mobile equipment with a scanning function; such as a smart phone or tablet computer, etc.
The identification pattern can be a two-dimensional code generated based on the identity information of the computer user; specifically, the computer end can generate the two-dimension code based on the identity information of the computer user according to a third party tool installed in the system. The identification information of the computer user is an account number and a password corresponding to the computer; the account number and the password can be automatically generated by the server according to the received account creation request. Specifically, the two-dimensional code generated based on the identity information of the computer user may include URL (Uniform Resource Locator ) information and a unique login identification ID (Identity Document, identity information code); the URL or the login identification ID can enable the intelligent terminal for scanning the two-dimensional code to be connected to the server side; the login identification ID may be a preset backup account login password. According to the embodiment, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the traditional login process needs to manually input a password, so that the login process is complicated is solved, and the efficiency of unlocking and login of the computer is effectively improved.
S120, verifying identity information of the computer user according to a pre-stored identity database.
In this embodiment, the user identity information of all the computers associated with the server is stored in the identity database of the server in advance, and the user identity information of the logged-in computer is verified by the user identity information of each computer stored in the identity database, so that the validity of the user identity information logged-in the computer can be effectively ensured, and the harm caused by the login of the computer by an illegal login user can be avoided.
Specifically, in this embodiment, a function of periodically querying the server is provided, so as to detect whether a person scans the identification pattern to log in the computer; when the identification pattern is detected to be scanned, acquiring the identity information of the computer user sent by the intelligent terminal which has scanned the identification pattern, and verifying the identity information; if the identity information of the computer user passes the verification, the identity information of the login user is matched with the user information stored in the identity database, and S130 is executed; if the identity information of the computer user fails verification, indicating that the identity information of the login user is not matched with the corresponding user information stored in the identity database, prompting that the account login fails, and continuing login verification only by changing the account again.
S130, indicating the computer to enter the login page from the unlocking page, and sending an unlocking response to the intelligent terminal.
In this embodiment, after the user identity information of the login computer passes the verification, the server invokes an API (Application Programming Interface, application program interface) of the computer to be unlocked through the corresponding computer user identity information stored in the database, and performs the unlocking operation of the computer to be unlocked, so that the computer to be unlocked enters the login page from the unlocking page, and the login of the computer system through the intelligent terminal is realized.
According to the embodiment of the application, the login request of the intelligent terminal is received, the identity information of the user of the login computer is verified according to the identity information stored in the identity database in advance, and the computer is instructed to jump from the unlocking page to the login page after the verification is passed, so that the computer is safely unlocked. According to the embodiment, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the traditional login process needs to manually input a password, so that the login process is complicated is solved, and the efficiency of unlocking and login of the computer can be effectively improved.
Fig. 2 is a flowchart of another method for unlocking a computer according to an embodiment of the application. The embodiment of the application further provides another computer unlocking method based on the further expansion and optimization of the embodiment, and the method can be combined with any optional scheme in the technical scheme. As shown in fig. 2, the method includes:
s210, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user.
S220, if the identity information of the computer user is stored in the identity database, and the binding relation exists between the identity information of the computer user and the identity information of the intelligent terminal, the identity information of the computer user passes verification.
In this embodiment, the intelligent terminal transmits the identity information of the computer user to the server for verification, so that in order to ensure the security when logging in through the intelligent terminal, it is required to verify whether the intelligent terminal for unlocking the computer has relevance with the computer to be unlocked; if the computer user identity information and the intelligent terminal identity information have a binding relationship, the intelligent terminal and the computer to be unlocked can be indicated to be related; by the method, the reliability of the identity information of the intelligent terminal logging in the computer can be effectively ensured.
And S230, if the identity information of the computer user passes the verification, indicating the computer to enter the login page from the unlocking page, and sending an unlocking response to the intelligent terminal.
In this technical scheme, optionally, the computer user identity information storage process of the identity database includes:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an association relationship between identity information of a computer user and an identification pattern;
and storing the association relation into an identity database.
In this embodiment, the identity database of the server stores identity information of each computer user, and the identity information is uploaded through an intelligent terminal bound with the computer; meanwhile, the intelligent terminal uploads the identification pattern generated according to the identity information of the computer user to the identity database, establishes the association relation between the identity information of the computer user and the identification pattern, and is used for verifying the received identity information of the computer user according to the association relation stored in the identity database.
In this technical scheme, optionally, verify that there is binding relation between computer user identity information and intelligent terminal identity information, include:
acquiring identity information of an intelligent terminal;
if the identity information of the computer user is the same as the identity information of the intelligent terminal, the binding relationship is determined to exist.
In this embodiment, to unlock a computer, a certain intelligent terminal needs to verify whether the identity information of the intelligent terminal is matched with the user identity information of the computer to be unlocked, and only if the two are successfully matched, the effective identity of the intelligent terminal for unlocking the computer can be ensured.
In this technical solution, optionally, the method may further include:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating that the state to be awakened of the computer is switched to a working state based on the awakening request; the wake-up request is sent out in response to a wake-up pattern recognition instruction of a user based on a wake-up pattern generated by the intelligent terminal.
In this embodiment, the state to be awakened is that the current working state of the computer is screen extinction; when the computer is in a screen-off state, the intelligent terminal can be used for directly unlocking and logging in when the computer is in the screen-off state. Specifically, the intelligent terminal can generate a wake-up pattern corresponding to the computer according to the input computer account number and password information, wake up the computer system and execute login operation by scanning the wake-up pattern; the method can realize the efficient login of the computer by directly executing corresponding operation on the intelligent terminal without waking up the computer, and greatly enriches the variety of unlocking the computer in different states.
Fig. 3 is a schematic structural diagram of a computer unlocking device in an embodiment of the present application, where the embodiment is applicable to a case of unlocking a computer by unlocking an intelligent terminal. The device is configured in computer equipment, and can realize the computer unlocking method according to any embodiment of the application. As shown in fig. 3, the apparatus specifically includes:
a receiving module 310, configured to receive a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
the verification module 320 is configured to verify identity information of a computer user according to a pre-stored identity database;
and the sending module 330 is configured to instruct the computer to enter the login page from the unlock page and send an unlock response to the intelligent terminal if the identity information of the computer user passes the verification.
Optionally, on the basis of the device, the device further comprises:
the receiving module 310 is further configured to receive the identity information and the identification pattern of the computer user uploaded by the intelligent terminal;
the building module is used for building the association relation between the identity information of the computer user and the identification pattern;
and the storage module is used for storing the association relation into the identity database.
Optionally, based on the above device, the verification module 320 is specifically configured to:
if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
Optionally, based on the above device, the verification module 320 is further specifically configured to:
acquiring identity information of an intelligent terminal;
if the identity information of the computer user is the same as the identity information of the intelligent terminal, the binding relationship is determined to exist.
Optionally, on the basis of the device, the device further comprises:
the indication module is used for receiving a wake-up request sent by the intelligent terminal if the computer is in a state to be woken up, and indicating the state to be woken up of the computer to be switched to a working state based on the wake-up request; the wake-up request is sent out in response to a wake-up pattern recognition instruction of a user based on a wake-up pattern generated by the intelligent terminal.
According to the computer unlocking device provided by the embodiment of the application, the intelligent terminal can be used for scanning the identification pattern to unlock the computer, so that the problem that the traditional login process needs to manually input a password, which causes complicated login process is solved, and the efficiency of unlocking and login of the computer can be effectively improved.
The computer unlocking device provided by the embodiment of the application can execute the computer unlocking method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program performs the steps of:
step A, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
step B, verifying identity information of the computer user according to a pre-stored identity database;
and C, if the identity information of the computer user passes the verification, indicating the computer to enter the login page from the unlocking page, and sending an unlocking response to the intelligent terminal.
In one embodiment, the processor, when executing the computer program, may further implement the steps of:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an association relationship between identity information of a computer user and an identification pattern;
and storing the association relation into an identity database.
In one embodiment, the processor, when executing the computer program, may further implement the steps of:
if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
In one embodiment, the processor, when executing the computer program, may further implement the steps of:
acquiring identity information of an intelligent terminal;
if the identity information of the computer user is the same as the identity information of the intelligent terminal, the binding relationship is determined to exist.
In one embodiment, the processor, when executing the computer program, may further implement the steps of:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating that the state to be awakened of the computer is switched to a working state based on the awakening request; the wake-up request is sent out in response to a wake-up pattern recognition instruction of a user based on a wake-up pattern generated by the intelligent terminal.
According to the embodiment, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the traditional login process needs to manually input a password, so that the login process is complicated is solved, and the efficiency of unlocking and login of the computer can be effectively improved.
FIG. 4 is a schematic diagram of a computer device in an embodiment of the present application, as shown in FIG. 4, the computer device includes a processor 410, a memory 420, an input device 430, and an output device 440; the number of processors 410 in the computer device may be one or more, one processor 410 being taken as an example in fig. 4; the processor 410, memory 420, input device 430, and output device 440 in the computer device may be connected by a bus or other means, for example in fig. 4.
The memory 420 is used as a computer readable storage medium for storing software programs, computer executable programs and modules, such as program instructions/modules corresponding to the computer unlocking method in the embodiment of the present application. The processor 410 executes various functional applications and data processing of the computer device by running software programs, instructions and modules stored in the memory 420, i.e. implements the computer unlocking method provided by the embodiments of the present application.
Memory 420 may include primarily a program storage area and a data storage area, wherein the program storage area may store an operating system, at least one application program required for functionality; the storage data area may store data created according to the use of the terminal, etc. In addition, memory 420 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some examples, memory 420 may further include memory remotely located relative to processor 410, which may be connected to the computer device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 430 may be used to receive entered numeric or character information and to generate key signal inputs related to user settings and function control of the computer device, which may include a keyboard, mouse, etc. The output 440 may include a display device such as a display screen.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
step A, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
step B, verifying identity information of the computer user according to a pre-stored identity database;
and C, if the identity information of the computer user passes the verification, indicating the computer to enter the login page from the unlocking page, and sending an unlocking response to the intelligent terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an association relationship between identity information of a computer user and an identification pattern;
and storing the association relation into an identity database.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring identity information of an intelligent terminal;
if the identity information of the computer user is the same as the identity information of the intelligent terminal, the binding relationship is determined to exist.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating that the state to be awakened of the computer is switched to a working state based on the awakening request; the wake-up request is sent out in response to a wake-up pattern recognition instruction of a user based on a wake-up pattern generated by the intelligent terminal.
According to the embodiment, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the traditional login process needs to manually input a password, so that the login process is complicated is solved, and the efficiency of unlocking and login of the computer can be effectively improved.
The present embodiments provide a storage medium containing computer executable instructions that, when executed by a computer processor, are used to implement the computer unlocking method provided by the embodiments of the present application.
Of course, the storage medium containing the computer executable instructions provided in the embodiments of the present application is not limited to the above-mentioned method operations, and may also perform the related operations in the computer unlocking method provided in any embodiment of the present application.
From the above description of embodiments, it will be clear to a person skilled in the art that the present application may be implemented by means of software and necessary general purpose hardware, but of course also by means of hardware, although in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, etc., and include several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the embodiments of the present application.
It should be noted that, in the above-mentioned embodiments of the search apparatus, each unit and module included are only divided according to the functional logic, but not limited to the above-mentioned division, as long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the present application.
Note that the above is only a preferred embodiment of the present application and the technical principle applied. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, while the application has been described in connection with the above embodiments, the application is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the application, which is set forth in the following claims.

Claims (9)

1. A method for unlocking a computer, the method comprising:
receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
verifying the identity information of the computer user according to a pre-stored identity database;
if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal;
the method further comprises the steps of:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating the state to be awakened of the computer to be switched to a working state based on the awakening request; the wake-up request is sent out based on a wake-up pattern generated by the intelligent terminal and in response to a wake-up pattern identification instruction of a user;
the state to be awakened is that the current working state of the computer is screen extinction;
the wake-up pattern is generated according to the input computer account number and password information.
2. The method of claim 1, wherein the computer user identity information storage process of the identity database comprises:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an association relationship between the identity information of the computer user and the identification pattern;
and storing the association relation into an identity database.
3. The method of claim 1, wherein said verifying said computer user identity information from a pre-stored identity database comprises:
if the computer user identity information is stored in the identity database, and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes verification.
4. A method according to claim 3, wherein verifying that the computer user identity information has a binding relationship with the intelligent terminal identity information comprises:
acquiring identity information of an intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
5. A computer unlocking device, the device comprising:
the receiving module is used for receiving a login request sent by the intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
the verification module is used for verifying the identity information of the computer user according to a pre-stored identity database;
the sending module is used for indicating the computer to enter the login page from the unlocking page and sending an unlocking response to the intelligent terminal if the identity information of the computer user passes the verification;
the apparatus further comprises:
the indication module is used for receiving a wake-up request sent by the intelligent terminal if the computer is in a state to be woken up, and indicating the state to be woken up of the computer to be switched to a working state based on the wake-up request; the wake-up request is sent out based on a wake-up pattern generated by the intelligent terminal and in response to a wake-up pattern identification instruction of a user;
the state to be awakened is that the current working state of the computer is screen extinction;
the wake-up pattern is generated according to the input computer account number and password information.
6. The apparatus of claim 5, wherein the apparatus further comprises:
the receiving module is also used for receiving the identity information and the identification pattern of the computer user uploaded by the intelligent terminal;
the establishing module is used for establishing the association relation between the identity information of the computer user and the identification pattern;
and the storage module is used for storing the association relation into an identity database.
7. The apparatus of claim 5, wherein the verification module is specifically configured to:
if the computer user identity information is stored in the identity database, and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes verification.
8. A computer device, comprising:
one or more processors;
storage means for storing one or more programs,
when executed by the one or more processors, causes the one or more processors to implement the computer unlocking method of any one of claims 1-4.
9. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements a computer unlocking method according to any one of claims 1 to 4.
CN202010397266.XA 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium Active CN111581630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010397266.XA CN111581630B (en) 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010397266.XA CN111581630B (en) 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN111581630A CN111581630A (en) 2020-08-25
CN111581630B true CN111581630B (en) 2023-12-15

Family

ID=72113481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010397266.XA Active CN111581630B (en) 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN111581630B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113504749B (en) * 2021-06-25 2022-11-22 上海闻泰信息技术有限公司 UWB-based device control method and apparatus, control device, and storage medium
CN114422236B (en) * 2021-10-27 2023-12-01 珠海奔图电子有限公司 Intelligent device access method and device and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
WO2019061219A1 (en) * 2017-09-29 2019-04-04 华为技术有限公司 Screen unlocking method and terminal
CN111031539A (en) * 2019-09-30 2020-04-17 武汉信安珞珈科技有限公司 Method and system for enhancing login security of Windows operating system based on mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019061219A1 (en) * 2017-09-29 2019-04-04 华为技术有限公司 Screen unlocking method and terminal
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN111031539A (en) * 2019-09-30 2020-04-17 武汉信安珞珈科技有限公司 Method and system for enhancing login security of Windows operating system based on mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
江超 ; 龙毅宏 ; .基于移动终端的系统登录方法的研究与开发.软件.2017,(03),全文. *

Also Published As

Publication number Publication date
CN111581630A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
CN110463161B (en) Password state machine for accessing protected resources
US20160373428A1 (en) Smart phone login using qr code
CN108989291B (en) Login verification method, automatic login verification method, server side and client side
CN107528858B (en) Login method, device and equipment based on webpage and storage medium
CN111581630B (en) Computer unlocking method, device, equipment and medium
CN110768968A (en) Authorization method, device, equipment and system based on verifiable statement
US20160261582A1 (en) System for secure login, and method and apparatus for same
CN109684873B (en) Data access control method and device, computer equipment and storage medium
CN110322599B (en) Door lock management method and device, electronic equipment and storage medium
JP2003295969A (en) Automatic information input program
US20090210938A1 (en) Utilizing Previous Password to Determine Authenticity to Enable Speedier User Access
CN105450405A (en) Password setting and authentication method and system
WO2016115759A1 (en) Method for logging in website, server, client and peripheral
WO2018140172A1 (en) Determining computer ownership
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
CN110442582B (en) Scene detection method, device, equipment and medium
US20180039771A1 (en) Method of and server for authorizing execution of an application on an electronic device
CN113778590A (en) Remote assistance method, device, electronic equipment and medium
CN111222153B (en) Application program authority management method and device and storage medium
CN112365267A (en) Operation behavior-based crawler-resisting method and device
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
JP2010079900A (en) Key protecting method and apparatus
CN105376067A (en) Method and system for digital signatures
CN113850938B (en) Intelligent door lock control method and device, storage medium and electronic equipment
CN115174122A (en) Verification code generation method, verification code verification method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant