CN104093119B - unlocking method and device - Google Patents

unlocking method and device Download PDF

Info

Publication number
CN104093119B
CN104093119B CN201410295498.9A CN201410295498A CN104093119B CN 104093119 B CN104093119 B CN 104093119B CN 201410295498 A CN201410295498 A CN 201410295498A CN 104093119 B CN104093119 B CN 104093119B
Authority
CN
China
Prior art keywords
terminal
data
unblock
pairing terminal
pairing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410295498.9A
Other languages
Chinese (zh)
Other versions
CN104093119A (en
Inventor
高承星
孙鹏
王滢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410295498.9A priority Critical patent/CN104093119B/en
Publication of CN104093119A publication Critical patent/CN104093119A/en
Application granted granted Critical
Publication of CN104093119B publication Critical patent/CN104093119B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The disclosure is directed to unlocking method and device, the unblock operation on the premise of safety unblock is ensured, to simplify user improves user experience.This method includes:Receive the unlocking request of input;Unblock data are obtained from pairing terminal;Whether the checking unblock data are legal;When the unblock data are legal, unlock.When being unlocked to terminal, the unblock data sent according to pairing terminal are unlocked operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, data such as password etc., simplifies user's operation, further, it is possible to ensure safe unblock, improves user experience needed for the technical scheme that the disclosure is provided does not need user to the complicated unblock of terminal input.

Description

Unlocking method and device
Technical field
This disclosure relates to terminal unlocking technical field, more particularly to unlocking method and device.
Background technology
Related terminal device such as smart machine, its unlocking manner usually requires user and inputs solution to terminal device manually Lock information needed such as password, pattern or fingerprint etc..Such unlocking manner needs user to be manually entered unblock information needed, user It is cumbersome, and sometimes user forgets to unlock during unlocking pin, compromises Consumer's Experience.
Therefore, there is the problem of user is cumbersome, user experience is poor in the unlocking technology of related terminal device.
The content of the invention
To overcome problem present in correlation technique, the embodiment of the present disclosure provides unlocking method and device, to ensure On the premise of safety unblock, simplify the unblock operation of user, improve user experience.
According to the first aspect of the embodiment of the present disclosure there is provided a kind of unlocking method, for terminal, including:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock.
It is in one embodiment, described to obtain unblock data from pairing terminal, it may include:
A random number is generated, and the random number is sent to the pairing terminal;
The unblock data after the encryption that the pairing terminal is returned are received, the unblock data after the encryption are by the pairing Terminal is using key to being generated after the random number encryption.
Whether the checking unblock data are legal, it may include:
The unblock data after the encryption are decrypted using the key, data after being decrypted;
When data are with the nonces match after the decryption, determine that the unblock data after the encryption are legal.
In one embodiment, methods described also includes:
Before the unlocking request for receiving input, the key is sent to the pairing terminal, by the pairing terminal Store the key.
In one embodiment, methods described also includes:
Before the unlocking request for receiving input, matched, formed with the pairing terminal with the pairing terminal Encrypted transmission passage for data transfer.
According to the second aspect of the embodiment of the present disclosure there is provided a kind of unlocking method, for terminal, including:
Receive the unblock data acquisition request that pairing terminal is sent;
Unblock data are returned to the pairing terminal.
In one embodiment, it is described to return to unblock data to the pairing terminal, including:
Random number is obtained from the unblock data acquisition request;
Using key to the random number encryption, the unblock data after generation encryption;
The unblock data after the encryption are returned to the pairing terminal.
In one embodiment, methods described also includes:
Before the unblock data acquisition request that the receiving terminal is sent, the described close of the pairing terminal transmission is received Key;
Store the key.
In one embodiment, methods described also includes:
Before the unblock data acquisition request for receiving pairing terminal transmission, matched with the pairing terminal, with The pairing terminal forms the encrypted transmission passage for data transfer.
According to the third aspect of the embodiment of the present disclosure there is provided a kind of tripper, including:
Request receiving module, the unlocking request for receiving input;
Data acquisition module, for obtaining unblock data from pairing terminal;
Authentication module, for verifying whether the unblock data are legal;
Unlocked state, for when the unblock data are legal, unlocking.
In one embodiment, the data acquisition module, it may include:
Random number transmitting element, the random number is sent for generating a random number, and to the pairing terminal;
Data receipt unit, for receiving the unblock data after the encryption that the pairing terminal is returned, after the encryption Unlock data and key is used to being generated after the random number encryption by the pairing terminal.
In one embodiment, the authentication module, it may include:
Decryption unit, for the unblock data after the encryption to be decrypted using the key, number after being decrypted According to;
Authentication unit, for when data are with the nonces match after the decryption, determining the unblock after the encryption Data are legal.
In one embodiment, described device may also include:
Key sending module, for before the unlocking request that the request receiving module receives input, to the pairing Terminal sends the key, the key as described in the pairing terminal storage.
In one embodiment, described device also includes:
First matching module, for before the unlocking request that the request receiving module receives input, with the pairing Terminal is matched, and the encrypted transmission passage for data transfer is formed with the pairing terminal.
According to the fourth aspect of the embodiment of the present disclosure there is provided a kind of tripper, including:
Request receiving module, for receiving the unblock data acquisition request that pairing terminal is sent;
Data return to module, for returning to unblock data to the pairing terminal.
In one embodiment, the data return to module, including:
Acquiring unit, for obtaining random number from the unblock data acquisition request;
Ciphering unit, for, to the random number encryption, generating the unblock data after encryption using key;
Returning unit, for returning to the unblock data after the encryption to the pairing terminal.
In one embodiment, described device also includes:
Key reception module, for receiving the unblock data acquisition request that pairing terminal is sent in the request receiving module Before, the key that the pairing terminal is sent is received;
Cipher key storage block, for storing the key.
In one embodiment, described device also includes:
Second matching module, for receiving the unblock data acquisition request that pairing terminal is sent in the request receiving module Before, matched with the pairing terminal, the encrypted transmission passage for data transfer is formed with the pairing terminal.
According to the 5th of the embodiment of the present disclosure the aspect there is provided a kind of tripper, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock.
According to the 6th of the embodiment of the present disclosure the aspect there is provided a kind of tripper, including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Receive the unblock data acquisition request that pairing terminal is sent;
Unblock data are returned to the pairing terminal.
The technical scheme provided by this disclosed embodiment can include the following benefits:When being unlocked to terminal, The unblock data sent according to pairing terminal are unlocked operation, and the unblock data only sent in pairing terminal are closed During method, could successfully it unlock;Compared with correlation technique, the technical scheme that the embodiment of the present disclosure is provided does not need user defeated to terminal Data such as password etc. needed for entering the unblock of complexity, simplifies user's operation, further, it is possible to ensure safe unblock, improves use Family usage experience.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary and explanatory, not Can the limitation present invention.
Brief description of the drawings
Accompanying drawing herein is merged in specification and constitutes the part of this specification, shows the implementation for meeting the present invention Example, and for explaining principle of the invention together with specification.
Fig. 1 is a kind of flow chart of unlocking method according to an exemplary embodiment.
Fig. 2 is the flow chart of another unlocking method according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of unlocking method according to an exemplary embodiment one.
Fig. 4 is the flow chart of another unlocking method according to an exemplary embodiment two.
Fig. 5 is the block diagram of the first tripper according to an exemplary embodiment.
Fig. 6 is the block diagram of data acquisition module in Fig. 5.
Fig. 7 is the block diagram of authentication module in Fig. 5.
Fig. 8 is the block diagram of second of tripper according to an exemplary embodiment.
Fig. 9 is the block diagram of the third tripper according to an exemplary embodiment.
Figure 10 is the block diagram of data return module in Fig. 9.
Figure 11 is the block diagram of the 4th kind of tripper according to an exemplary embodiment.
Figure 12 is a kind of block diagram suitable for tripper according to an exemplary embodiment.
Embodiment
Here exemplary embodiment will be illustrated in detail, its example is illustrated in the accompanying drawings.Following description is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent and the consistent all embodiments of the present invention.On the contrary, they be only with it is such as appended The example of the consistent apparatus and method of some aspects be described in detail in claims, the present invention.
The embodiment of the present disclosure provides two kinds of unlocking methods, and a kind of unlocking method is (as shown in Figure 1) for terminal, another Unlocking method another terminal (as shown in Figure 2) for being used to be formed the encrypted transmission passage for data transfer with terminal is (i.e. eventually The pairing terminal at end, in the disclosed embodiments, terminal and another terminal are mutually referred to as respective pairing terminal, the two terminals Between can carry out radio communication).When being unlocked to terminal, it is unlocked according to the unblock data that pairing terminal is sent Operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, this Data such as password etc., simplifies needed for the technical scheme that open embodiment is provided does not need user to the complicated unblock of terminal input User's operation, further, it is possible to ensure safe unblock, improves user experience.
Fig. 1 is a kind of flow chart of unlocking method according to an exemplary embodiment, as shown in figure 1, the unblock side Method is used for terminal, and the terminal can be any terminal equipment such as mobile phone, tablet personal computer etc., comprise the following steps S101-S104.
In step S101, the unlocking request of input is received.
Unlocking request is that the user of terminal inputs to terminal, for example can be on terminal screen set one unblock by Key, user triggers the release tab, so that terminal have received unlocking request;Can also be one hardkey of setting, example in terminal Such as the power key in terminal, when user presses the hardware, terminal, which is considered as, have received unlocking request.
In step s 102, unblock data are obtained from pairing terminal.
In one embodiment, before step S101 is performed, the above method may also include:Matched somebody with somebody with pairing terminal It is right, the encrypted transmission passage for data transfer is formed with pairing terminal.The pairing terminal is used for unlocking terminal.
In one embodiment, step S102 can be embodied as:Unblock data acquisition request is sent to pairing terminal;Reception is matched somebody with somebody The unblock data returned to terminal.In one embodiment, unblock data acquisition request can be a default request, and this is preset Request is only used to refer to pairing terminal and returns to unblock data to terminal;The default request is sent to after pairing terminal, and pairing is eventually Hold to terminal and return to unblock data, terminal receives the unblock data that pairing terminal is returned.Unblock data now can be eventually One that is sent to pairing terminal in advance before step S101 is performed simple default unblock data A is held, such as is one group of number Word, one group of word etc., the default unblock data A are sent to after pairing terminal, pairing terminal-pair its without any processing;When When pairing terminal receives default request, pairing terminal returns to default unblock data A to terminal, terminal is received the default solution Lock data A.Specifically refer to subsequent embodiment one.
In another embodiment, step S102 can be embodied as:A random number is generated, and random number is sent to pairing terminal (step is considered as have sent unblock data acquisition request to pairing terminal);Receive the solution after the encryption that pairing terminal is returned Data are locked, the unblock data after encryption are by pairing terminal using key to being generated after random number encryption.Specifically refer to follow-up reality Apply example two.Now, before step S101 is performed, the above method may also include step S100:Key is sent to pairing terminal, by Match terminal storage key.Wherein, step S100 can be embodied as:A secondary key only is sent to pairing terminal, is being solved every time This key is all used during lock, this mode is more convenient simple.Or, step S100 may also be embodied for:According to default The transmission cycle sends key to pairing terminal, and the key sent every time is differed, and this mode causes the unblock of terminal more It is reliable and secure, it is to avoid key has unlocked terminal after being obtained by criminal.To pairing terminal send key when, can by with Encrypted transmission passage between terminal is sent.
In step s 103, whether checking unblock data are legal, continue executing with step S104 when legal;When illegal When, lock-out state is kept, flow is exited.
In one embodiment, when the unblock data got in step S102 are foregoing default unblock data A, holding During row step S103, the data B for being used to verify of default unblock data A and terminal oneself storages can be compared, if The default unblock data A then proves that foregoing default unblock data A is legal with comparing success for the data B verified;If Comparison is unsuccessful, then proves that foregoing default unblock data A is illegal.The data B for being such as used to verify is exactly aforementioned terminals It is sent to a simple default unblock data A of pairing terminal in advance before step S101 is performed, then terminal can judge Go out the unblock data that it gets in step s 102 identical with the default unblock data A that it is stored, then show that unblock data are closed The conclusion of method.Specifically refer to subsequent embodiment one.
In another embodiment, the unblock data after unblock data got in step S102 are foregoing encryptions When, when performing step S103, the unblock data after encryption are decrypted using aforementioned key, data after being decrypted;Sentence Data with being sent to whether the random number of pairing terminal matches before after disconnected decryption, upon a match, it is determined that the unblock number after encryption According to being legal, step S104 is continued executing with;When mismatching, it is determined that the unblock data after encryption are illegal, lock is kept Determine state, exit flow.Specifically refer to subsequent embodiment two.
S104, when unlock data it is legal when, unlock.
In the technical scheme that the embodiment of the present disclosure is provided, when being unlocked to terminal, sent according to pairing terminal Unblock data are unlocked operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;With Correlation technique is compared, and the technical scheme that the embodiment of the present disclosure is provided does not need user to input data needed for complicated unblock to terminal Such as password etc., simplifies user's operation, further, it is possible to ensure safe unblock, improves user experience.
In one embodiment, in step s 102, it can be obtained by communication from pairing terminal and unlock data. That is, radio communication can be realized between terminal and pairing terminal.Wherein, communication can be short-distance wireless communication mode ratio Such as bluetooth approach or the mobile network communication mode of WIFI modes or other long distances.If using short-distance wireless Communication mode, then matching terminal needs the unblock with the closer complete paired terminal of ability of distance of terminal.Such as, when terminal is tool Have equipment such as mobile phone, tablet personal computer etc. of Bluetooth function, pairing terminal be for example another mobile phone of another equipment with Bluetooth function, During another tablet personal computer etc., now, it can be communicated between terminal and pairing terminal using bluetooth to realize, terminal can utilize bluetooth work( Unblock data can be got from pairing terminal, speed is fast, convenient acquisition.If using the mobile network communication side of other long distances Formula, as long as no matter then how far terminal is with matching the distance between terminal, as long as can move network service between them, all Can be with the unblock of complete paired terminal.Which kind of communication mode is specifically used, user can determine as needed.Such as father and mother think control A smart mobile phone P1 can not arbitrarily be used by child in family, then short-distance wireless communication mode can be used, by the intelligence in family Mobile phone P1 is as above-mentioned terminal, and the smart mobile phone P2 that father and mother are carried with is as pairing terminal, so, when father and mother carry intelligence Mobile phone P2 leaves home after going out, because the distance between smart mobile phone P1 and smart mobile phone P2 is too remote, it is impossible to successfully carry out short distance Radio communication, therefore, child at home just can not successfully unlock smart mobile phone P1, only father and mother go back home in after or away from When leaving home closer, child at home just can successfully unlock smart mobile phone P1, so as to realize the same of safety unblock When, also reach that control child can not at will play the purpose of mobile phone, it is to avoid child indulges mobile phone.A pair of men and wives have at home for another example The smart mobile phone P3 of one amusement that is specifically used to be in, wife or husband want to play smart mobile phone P3 at any time, that The mobile network communication mode of other long distances can be used, using smart mobile phone P3 as above-mentioned terminal, husband is carried with Smart mobile phone P4 is as above-mentioned pairing terminal, and so, when wife, which stays at home, wants to play smart mobile phone P3, smart mobile phone P3 can profit Communicated with the success of mobile network communication mode with smart mobile phone P4, so that wife can successfully unlock smart mobile phone P3 at any time, Safe unblock is not only realized, and avoids wife from carrying out cumbersome operation, user experience is improved.
Corresponding to foregoing unlocking method, as shown in Fig. 2 being another unlocking method according to an exemplary embodiment Flow chart, the unlocking method is used for terminal, and the terminal is the pairing terminal of the terminal in abovementioned steps S101-104, be with it is preceding State the terminal in step S101-104 and carry out pairing, any terminal of the formed encrypted transmission passage for data transfer Alleged pairing terminal refers to the terminal in abovementioned steps S101-104 in equipment such as mobile phone, tablet personal computer etc., the unlocking method, The unlocking method comprises the following steps S201-S202:
In step s 201, the unblock data acquisition request that pairing terminal is sent is received.
Unblock data are returned in step S202, to pairing terminal.
It is whole according to pairing by terminal when being unlocked to pairing terminal in the technical scheme that the embodiment of the present disclosure is provided The request at end returns to unblock data to pairing terminal, controls the unblock to matching terminal;Compared with correlation technique, the disclosure is implemented Data such as password etc., simplifies user behaviour needed for the technical scheme that example is provided does not need user to the complicated unblock of terminal input Make, further, it is possible to ensure safe unblock, improve user experience.
In one embodiment, unblock data acquisition request can be a simple default request, and terminal receives this After default request, learn that pairing terminal wants unblock, then terminal will return to unblock data, solution now to pairing terminal Lock data are to match the simple default unblock data A that terminal is sent to terminal in advance, such as are set of number, one group of word Language etc., the terminal-pair default unblock data are without any processing;When terminal receive that pairing terminal sends it is above-mentioned default During request, terminal returns to default unblock data A to pairing terminal, specifically refers to subsequent embodiment one.Match terminal such as afterwards What is unlocked the respective description that processing refer to abovementioned steps S101-104, no longer redundant later here.
In another embodiment, the random number of pairing terminal generation, terminal can be included in unblock data acquisition request Receive after unblock data acquisition request, random number is obtained from the unblock data acquisition request, then using key to this Random number encryption, generates the unblock data after encryption, and then the unblock data after encrypting are returned to pairing terminal by terminal.Tool Body refers to subsequent embodiment two.Now, before step S201 is performed, the above method may also include:Receive pairing terminal hair The key sent, and store the key.
In one embodiment, the unblock number that pairing terminal is sent can be received by communication in step s 201 Asked according to obtaining;It can be returned in step S202 by communication to pairing terminal and unlock data.
In one embodiment, before step S201 is performed, the above method may also include:Matched somebody with somebody with pairing terminal It is right, the encrypted transmission passage for data transfer is formed with pairing terminal.
Illustrate the technical scheme that the embodiment of the present disclosure is provided below with two embodiments.
Embodiment one
In embodiment one, unblock data be embodied as terminal in advance to pairing terminal send default unblock data, terminal with Communication mode between pairing terminal is embodied as bluetooth approach, as shown in figure 3, embodiment one comprises the following steps:
In step S301, terminal X1 and another terminal X2 carries out Bluetooth pairing, terminal X2 is turned into pairing terminal.
In step s 302, terminal X1 sends default unblock data, such as set of number " 951642 " to terminal X2.
In step S303, terminal X2 is received to be stored in locally after the default unblock data that terminal X1 is sent.
In step s 304, terminal X1 is received after the unlocking request of user's input, is sent with bluetooth approach to terminal X2 Default request.
In step S305, terminal X2 is received after default request with bluetooth approach, the default unblock data stored (i.e. one group data " 951642 ") is sent to terminal X1.
Wherein, when terminal X2 does not receive default request with bluetooth approach, then subsequent step is not performed, it is impossible to terminal X1 is unlocked, and such case appears in terminal X2 and terminal X1 apart from distant, can not successfully realize that bluetooth is led to each other In the case of letter.
In step S306, terminal X1 receives terminal X2 that group of data sent and presetting that terminal X1 itself is stored Unblock data are compared, if comparison result is matching, illustrates that the unblock data that terminal X2 is sent are legal, then perform Step S307;If comparison result illustrates that the unblock data that terminal X2 is sent are illegal, then keeps locking to mismatch State, terminates flow.
In step S307, terminal X1 comparison results for matching, unlock.
The present embodiment one, when being unlocked to terminal X1, is unlocked according to the unblock data that pairing terminal is sent Operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, this Data such as password etc. needed for embodiment one does not need user to the complicated unblock of terminal X1 inputs, simplifies user's operation, and And, safe unblock is ensure that, user experience is improved.
Embodiment two
In embodiment two, unblock data are embodied as matching the encryption generated after terminal is encrypted random number using key Unblock data afterwards, the communication mode between terminal and pairing terminal is embodied as mobile network communication mode, as shown in figure 4, real Example two is applied to comprise the following steps:
In step S401, terminal X3 and another terminal X4 carries out pairing and binding operation, terminal X4 is turned into pairing terminal.
In step S402, terminal X3 sends key to terminal X4.
In step S403, terminal X4 is received to be stored in locally after the key that terminal X3 is sent.
In step s 404, terminal X3 is received after the unlocking request of user's input, generates a random number such as " 88 ", and The random number is sent to terminal X4 in mobile network communication mode.
In step S405, terminal X4 is received in mobile network communication mode after random number, is stored using terminal X4 Key the random number is encrypted, the unblock data after encrypting and are sent to end by the unblock data after generation encryption Hold X3.
In step S406, terminal X3 is received after the unblock data after the encryption that terminal X4 is sent, and utilizes terminal Unblock data after the key pair encryption of X3 storages are decrypted, data after being decrypted.
In step S 407, data after decryption and the random number of its generation previous are compared terminal X3, if compared As a result it is matching, illustrates that the unblock data that terminal X4 is sent are legal, then perform step S408;If comparison result is not Matching, illustrates that the unblock data that terminal X4 comes are illegal, then keeps lock-out state, terminate flow.
In step S408, terminal X3 comparison results are matching, are unlocked.
In embodiment two, when being unlocked to terminal X3, solved according to the unblock data that pairing terminal is sent Lock operation, and only could successfully be unlocked when the unblock data that pairing terminal is sent are legal;Compared with correlation technique, Data such as password etc., simplifies user's operation needed for the present embodiment two does not need user to the complicated unblock of terminal X3 inputs, Further, it is possible to ensure safe unblock, user experience is improved.
Fig. 5 is a kind of unblock for corresponding to abovementioned steps S101-104 methods describeds according to an exemplary embodiment The block diagram of device, the tripper is used in terminal, as shown in figure 5, the tripper includes:
Request receiving module 51, the unlocking request for receiving input;
Data acquisition module 52, for obtaining unblock data from pairing terminal;
Authentication module 53, for verifying whether unblock data are legal;
Unlocked state 54, for when unblock data are legal, unlocking.
In one embodiment, as shown in fig. 6, above-mentioned data acquisition module 52, it may include:
Random number transmitting element 61, random number is sent for generating a random number, and to pairing terminal;
Data receipt unit 62, for receiving the unblock data after the encryption that pairing terminal is returned, the unblock number after encryption Key is used to being generated after random number encryption according to by pairing terminal.
In one embodiment, as shown in fig. 7, above-mentioned authentication module 53, it may include:
Decryption unit 71, for being decrypted using the unblock data after key pair encryption, data after being decrypted;
Authentication unit 72, for when data are with nonces match after decryption, it is determined that the unblock data after encryption are legal.
In one embodiment, as shown in figure 8, said apparatus may also include:
Key sending module 81, for before the unlocking request that request receiving module 51 receives input, to pairing terminal Key is sent, by pairing terminal storage key.
In one embodiment, then as shown in figure 8, said apparatus may also include:
First matching module 82, for before the unlocking request that request receiving module 51 receives input, with pairing terminal Matched, the encrypted transmission passage for data transfer is formed with pairing terminal.
The above-mentioned tripper that the embodiment of the present disclosure is provided, when being unlocked to terminal, sends according to pairing terminal Unblock data be unlocked operation, and only match unblock data that terminal sends it is legal when, could successfully unlock; Compared with correlation technique, the technical scheme that the embodiment of the present disclosure is provided does not need user to input number needed for complicated unblock to terminal According to such as password etc., user's operation is simplified, further, it is possible to ensure safe unblock, user experience is improved.
Fig. 9 is a kind of unblock for corresponding to abovementioned steps S201-202 methods describeds according to an exemplary embodiment The block diagram of device, the tripper is used in terminal (i.e. pairing terminals of the Fig. 5 into Fig. 8 shown devices), as shown in figure 9, should Tripper includes:
Request receiving module 91, for receiving the unblock data acquisition request that pairing terminal is sent;
Data return to module 92, for returning to unblock data to pairing terminal.
In one embodiment, as shown in Figure 10, above-mentioned data return to module 92, it may include:
Acquiring unit 1001, for obtaining random number from unblock data acquisition request;
Ciphering unit 1002, for, to random number encryption, generating the unblock data after encryption using key;
Returning unit 1003, for returning to the unblock data after encryption to pairing terminal.
In one embodiment, as shown in figure 11, said apparatus may also include:
Key reception module 111, the unblock data acquisition for receiving pairing terminal transmission in request receiving module 91 please Before asking, the key that pairing terminal is sent is received;
Cipher key storage block 112, for storing key.
In one embodiment, then as shown in figure 11, said apparatus may also include:
Second matching module 113, the unblock data acquisition for receiving pairing terminal transmission in request receiving module 91 please Before asking, matched with pairing terminal, the encrypted transmission passage for data transfer is formed with pairing terminal.
The above-mentioned tripper that the embodiment of the present disclosure is provided, when being unlocked to pairing terminal, by terminal according to pairing The request of terminal returns to unblock data to pairing terminal, controls the unblock to matching terminal;Compared with correlation technique, the disclosure is real Apply example offer technical scheme do not need user complicated unblock is inputted to terminal needed for data such as password etc., simplify user Operation, further, it is possible to ensure safe unblock, improves user experience.
Figure 12 is a kind of block diagram of means for unlocking 1200 according to an exemplary embodiment, and the device is applicable In terminal device.For example, device 1200 can be mobile phone, computer, digital broadcast terminal, messaging devices, game Console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..
Reference picture 12, device 1200 can include following one or more assemblies:Processing assembly 1202, memory 1204, Power supply module 1206, multimedia groupware 1208, audio-frequency assembly 1210, the interface 1212 of input/output (I/O), sensor cluster 1214, and communication component 1216.
The integrated operation of the usual control device 1200 of processing assembly 1202, such as with display, call, data communication, The camera operation operation associated with record operation.Treatment element 1202 can include one or more processors 1220 to perform Instruction, with all or part of step for the method for completing above-mentioned terminal or its pairing end side.In addition, processing assembly 1202 can be with Including one or more modules, it is easy to the interaction between processing assembly 1202 and other assemblies.For example, processing component 1202 can be with Including multi-media module, to facilitate the interaction between multimedia groupware 1208 and processing assembly 1202.
Memory 1204 is configured as storing various types of data supporting the operation in equipment 1200.These data Example includes the instruction of any application program or method for being used to operate on device 1200, contact data, telephone book data, Message, picture, video etc..Memory 1204 can by any kind of volatibility or non-volatile memory device or they Combination realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), it is erasable can Program read-only memory (EPROM), programmable read only memory (PROM), read-only storage (ROM), magnetic memory, flash memory Reservoir, disk or CD.
Electric power assembly 1206 provides electric power for the various assemblies of device 1200.Electric power assembly 1206 can include power management System, one or more power supplys, and other components associated with generating, managing and distributing electric power for device 1200.
Multimedia groupware 1208 is included in the screen of one output interface of offer between described device 1200 and user. In some embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, Screen may be implemented as touch-screen, to receive the input signal from user.Touch panel includes one or more touch and passed Sensor is with the gesture on sensing touch, slip and touch panel.The touch sensor can not only sensing touch or slip be dynamic The border of work, but also the detection duration related to the touch or slide and pressure.In certain embodiments, it is many Media component 1208 includes a front camera and/or rear camera.When equipment 1200 is in operator scheme, mould is such as shot When formula or video mode, front camera and/or rear camera can receive the multi-medium data of outside.Each preposition shooting Head and rear camera can be a fixed optical lens systems or with focusing and optical zoom capabilities.
Audio-frequency assembly 1210 is configured as output and/or input audio signal.For example, audio-frequency assembly 1210 includes a wheat Gram wind (MIC), when device 1200 is in operator scheme, when such as call model, logging mode and speech recognition mode, microphone quilt It is configured to receive external audio signal.The audio signal received can be further stored in memory 1204 or via communication Component 1216 is sent.In certain embodiments, audio-frequency assembly 1210 also includes a loudspeaker, for exports audio signal.
I/O interfaces 1212 are that interface, above-mentioned peripheral interface module are provided between processing assembly 1202 and peripheral interface module Can be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and Locking press button.
Sensor cluster 1214 includes one or more sensors, and the state for providing various aspects for device 1200 is commented Estimate.For example, sensor cluster 1214 can detect opening/closed mode of equipment 1200, the relative positioning of component, such as institute Display and keypad that component is device 1200 are stated, sensor cluster 1214 can be with detection means 1200 or device 1,200 1 The position of individual component changes, the existence or non-existence that user contacts with device 1200, the orientation of device 1200 or acceleration/deceleration and dress Put 1200 temperature change.Sensor cluster 1214 can include proximity transducer, be configured in not any physics The presence of object nearby is detected during contact.Sensor cluster 1214 can also include optical sensor, such as CMOS or ccd image sensing Device, for being used in imaging applications.In certain embodiments, the sensor cluster 1214 can also include acceleration sensing Device, gyro sensor, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 1216 is configured to facilitate the communication of wired or wireless way between device 1200 and other equipment.Dress The wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof can be accessed by putting 1200.It is exemplary at one In embodiment, communication component 1216 receives broadcast singal or broadcast correlation from external broadcasting management system via broadcast channel Information.In one exemplary embodiment, the communication component 1216 also includes near-field communication (NFC) module, to promote short distance Communication.For example, radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band can be based in NFC module (UWB) technology, bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, device 1200 can be by one or more application specific integrated circuits (ASIC), numeral Signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for performing the above method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instructing, example are additionally provided Such as include instruction memory 1204, above-mentioned instruction can be performed by the processor 820 of device 1200 with complete above-mentioned terminal or its Match all or part of step of the method for end side.For example, the non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is by the processing of mobile terminal When device is performed so that mobile terminal is able to carry out a kind of unlocking method, and methods described includes:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether checking unblock data are legal;
When unblock data are legal, unlock.
Another non-transitorycomputer readable storage medium, when the instruction in the storage medium is by mobile terminal When managing device execution so that mobile terminal is able to carry out another unlocking method, and methods described includes:
Receive the unblock data acquisition request that pairing terminal is sent;
Unblock data are returned to pairing terminal.
Those skilled in the art will readily occur to its of the disclosure after considering specification and putting into practice disclosure disclosed herein Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modifications, purposes or Person's adaptations follow the general principle of the disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the precision architecture that the disclosure is not limited to be described above and is shown in the drawings, and And various modifications and changes can be being carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (9)

1. a kind of unlocking method, for terminal, it is characterised in that including:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock;
It is described, it is described to obtain unblock data from pairing terminal, including:
A random number is generated, and the random number is sent to the pairing terminal;
The unblock data after the encryption that the pairing terminal is returned are received, the unblock data after the encryption are by the pairing terminal Using key to being generated after the random number encryption;
The unlocking method is additionally operable to the pairing terminal, to cause the terminal and the pairing terminal mutually to unlock.
2. the method as described in claim 1, it is characterised in that whether the checking unblock data are legal, including:
The unblock data after the encryption are decrypted using the key, data after being decrypted;
When data are with the nonces match after the decryption, determine that the unblock data after the encryption are legal.
3. the method as described in claim 1, it is characterised in that methods described also includes:
Before the unlocking request for receiving input, the key is sent to the pairing terminal, by the pairing terminal storage The key.
4. the method as described in claims 1 to 3 is any, it is characterised in that methods described also includes:
Before the unlocking request for receiving input, matched with the pairing terminal, being formed with the pairing terminal is used for The encrypted transmission passage of data transfer.
5. a kind of tripper, for terminal, it is characterised in that including:
Request receiving module, the unlocking request for receiving input;
Data acquisition module, for obtaining unblock data from pairing terminal;
Authentication module, for verifying whether the unblock data are legal;
Unlocked state, for when the unblock data are legal, unlocking;
The data acquisition module, including:
Random number transmitting element, the random number is sent for generating a random number, and to the pairing terminal;
Data receipt unit, for receiving the unblock data after the encryption that the pairing terminal is returned, the unblock after the encryption Data are by the pairing terminal using key to being generated after the random number encryption;
The tripper is additionally operable to the pairing terminal, to cause the terminal and the pairing terminal mutually to unlock.
6. device as claimed in claim 5, it is characterised in that the authentication module, including:
Decryption unit, for the unblock data after the encryption to be decrypted using the key, data after being decrypted;
Authentication unit, for when data are with the nonces match after the decryption, determining the unblock data after the encryption It is legal.
7. device as claimed in claim 5, it is characterised in that described device also includes:
Key sending module, for before the unlocking request that the request receiving module receives input, to the pairing terminal The key is sent, the key as described in the pairing terminal storage.
8. the device as described in any in claim 5 to 7, it is characterised in that described device also includes:
First matching module, for before the unlocking request that the request receiving module receives input, with the pairing terminal Matched, the encrypted transmission passage for data transfer is formed with the pairing terminal.
9. a kind of tripper, it is characterised in that including:
Processor;
Memory for storing processor-executable instruction;
Wherein, the processor is configured as:
Receive the unlocking request of input;
Unblock data are obtained from pairing terminal;
Whether the checking unblock data are legal;
When the unblock data are legal, unlock;
It is described, it is described to obtain unblock data from pairing terminal, including:
A random number is generated, and the random number is sent to the pairing terminal;
The unblock data after the encryption that the pairing terminal is returned are received, the unblock data after the encryption are by the pairing terminal Using key to being generated after the random number encryption;
The unlocking method is additionally operable to the pairing terminal, to cause the terminal and the pairing terminal mutually to unlock.
CN201410295498.9A 2014-06-26 2014-06-26 unlocking method and device Active CN104093119B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410295498.9A CN104093119B (en) 2014-06-26 2014-06-26 unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410295498.9A CN104093119B (en) 2014-06-26 2014-06-26 unlocking method and device

Publications (2)

Publication Number Publication Date
CN104093119A CN104093119A (en) 2014-10-08
CN104093119B true CN104093119B (en) 2017-10-13

Family

ID=51640791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410295498.9A Active CN104093119B (en) 2014-06-26 2014-06-26 unlocking method and device

Country Status (1)

Country Link
CN (1) CN104093119B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10437981B2 (en) 2015-01-07 2019-10-08 Htc Corporation Electronic system and device unlock method of the same
CN104539806A (en) * 2015-01-12 2015-04-22 深圳市中兴移动通信有限公司 Mobile terminals and emergency unlocking method thereof
CN104951408B (en) * 2015-05-25 2018-02-06 小米科技有限责任公司 Data guard method, storage device and terminal device
CN104951703B (en) * 2015-05-27 2019-01-18 小米科技有限责任公司 terminal control method and device
CN105070004A (en) * 2015-07-15 2015-11-18 泰凌微电子(上海)有限公司 Intelligent equipment, as well as remote control system and remote control pairing method of intelligent equipment
CN105471890A (en) * 2015-12-24 2016-04-06 小米科技有限责任公司 Unlocking method based on wearable device, apparatus and system
CN105956452A (en) * 2016-04-20 2016-09-21 上海斐讯数据通信技术有限公司 Method and system for unlocking device
CN112767577A (en) * 2020-12-23 2021-05-07 广州技象科技有限公司 Access control unlocking method and device based on narrowband Internet of things

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102708324A (en) * 2012-05-16 2012-10-03 惠州Tcl移动通信有限公司 Screen locker unlocking system and method
CN102883050A (en) * 2012-09-05 2013-01-16 东莞宇龙通信科技有限公司 Mobile terminal and unlocking method thereof
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
KR20130081910A (en) * 2012-01-10 2013-07-18 엘지전자 주식회사 Mobile terminal and method for controlling thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
KR20130081910A (en) * 2012-01-10 2013-07-18 엘지전자 주식회사 Mobile terminal and method for controlling thereof
CN102708324A (en) * 2012-05-16 2012-10-03 惠州Tcl移动通信有限公司 Screen locker unlocking system and method
CN102883050A (en) * 2012-09-05 2013-01-16 东莞宇龙通信科技有限公司 Mobile terminal and unlocking method thereof
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal

Also Published As

Publication number Publication date
CN104093119A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN104093119B (en) unlocking method and device
CN104219058B (en) Authentication, identification authorization method and device
CN104243484B (en) Information interacting method and device, electronic equipment
CN106097494A (en) The method for unlocking of smart lock and device
CN104391870B (en) Logistics information acquisition methods and device
CN108269334A (en) Method for unlocking, terminal device and smart lock
CN104573550A (en) Method and device for protecting data
CN104468581B (en) The method and device of login application program
CN104484799A (en) Payment method and device
CN104091376A (en) Intelligent lock control method and apparatus thereof
CN104216742A (en) Upgrade control method and device based on password
CN104331228A (en) Screen locking method and device
CN104158665A (en) Method and device of verification
CN104217328A (en) Multi-verification payment method and multi-verification payment device
CN104950838A (en) Network account binding method and device
CN105631254A (en) Unlocking method and unlocking device
CN106682463A (en) Unlocking method and device
CN106127062A (en) unlocking method and device
CN105046127A (en) Encryption and decryption method and apparatus
CN106534083B (en) Brush machine Tool validation method and device
CN106126986A (en) Lock unlocking processing method and the device of data partition
CN105681261A (en) Security authentication method and apparatus
CN106535190A (en) Network connection method and apparatus
CN106062762A (en) Application encryption method and device
CN105471890A (en) Unlocking method based on wearable device, apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant