CN105790949B - Subscriber identification card unlocking method and subscriber identification card tripper - Google Patents
Subscriber identification card unlocking method and subscriber identification card tripper Download PDFInfo
- Publication number
- CN105790949B CN105790949B CN201510793800.8A CN201510793800A CN105790949B CN 105790949 B CN105790949 B CN 105790949B CN 201510793800 A CN201510793800 A CN 201510793800A CN 105790949 B CN105790949 B CN 105790949B
- Authority
- CN
- China
- Prior art keywords
- user
- identification card
- subscriber identification
- verification information
- interface
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000012795 verification Methods 0.000 claims abstract description 237
- 238000004590 computer program Methods 0.000 claims 2
- 230000015572 biosynthetic process Effects 0.000 claims 1
- 238000009933 burial Methods 0.000 claims 1
- VAYOSLLFUXYJDT-RDTXWAMCSA-N Lysergic acid diethylamide Chemical class C1=CC(C=2[C@H](N(C)C[C@@H](C=2)C(=O)N(CC)CC)C2)=C3C2=CNC3=C1 VAYOSLLFUXYJDT-RDTXWAMCSA-N 0.000 abstract description 2
- 238000005760 Tripper reaction Methods 0.000 abstract description 2
- 238000001514 detection method Methods 0.000 description 8
- 238000010200 validation analysis Methods 0.000 description 7
- 230000001413 cellular effect Effects 0.000 description 4
- 239000011159 matrix material Substances 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 235000013311 vegetables Nutrition 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 238000005034 decoration Methods 0.000 description 1
- 235000013399 edible fruits Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of subscriber identification card unlocking method, is unlocked for the subscriber identification card to unlock terminal comprising: receive the subscriber identification card unlocking request of user;According to subscriber identification card unlocking request, the first level verification interface is shown;Verification information is received, wherein the verification information passes through the first verifying interface input by user;According to the verification information that user inputs, the second level verification interface is shown;Personal identification number is received, wherein the personal identification number passes through the second verifying interface input by user;And according to personal identification number, subscriber identification card is unlocked.The present invention also provides a kind of subscriber identification card trippers.Subscriber identification card unlocking method and device of the invention increases the input of one-time authentication information before verifying PIN code is to SIM card unlock, and SIM card caused by can effectively avoiding because of maloperation fails, and improves anti-interference.
Description
Technical field
The present invention relates to the communications fields, more particularly to a kind of subscriber identification card unlocking method and user identity identification
Card tripper.
Background technique
In communication scenes, SIM (Subscriber Identity Module, client identification module) card is equivalent to user
" identity card ".SIM card stores the information of digital mobile phone client, in telephone directory of the key of encryption and user etc.
Voice messaging when holding, identified for GSM network client identity, and conversing client encrypts, and has of crucial importance
Effect.
Therefore PIN (Personal IdentificationNumber, personal identification number) code is provided with as SIM card
Password protects the safety of SIM card, prevents others from usurping SIM card.It, every time will after booting if being provided with SIM card to lock
Input PIN code.After PIN code inputs 3 times by mistake, SIM card can be automatic locking, only passes through input PUK (PIN at this time
UnlockingKey, unlock code) it could unlock.PUK code shares 10 input chances, and after inputing 10 times by mistake, SIM card can start automatically
Self-destruction program, makes SIM card fail.
There is the risk for causing SIM card to fail due to maloperation in above SIM card unlocking manner.Such as child is due to curiosity
The mobile phone for being provided with SIM card locking is played steathily, if PIN code input mistake, and PUK code also input error, then SIM card can be made to start
Self-destruction program, causes SIM card to fail.
Summary of the invention
The embodiment of the invention provides one kind to avoid user misoperation that subscriber identification card is caused to fail, to improve anti-
Interfering subscriber identification card unlocking method and subscriber identification card tripper, to solve existing user identity identification
Card unlocking method and subscriber identification card tripper are interfered vulnerable to extraneous factor, because user misoperation leads to user identity
The technical issues of identification card fails.
The embodiment of the invention provides a kind of subscriber identification card unlocking methods comprising:
Step 101, the subscriber identification card unlocking request of user is received;
Step 102, according to subscriber identification card unlocking request, the first level verification interface is shown;
Step 103, verification information is received, wherein the verification information passes through the first verifying interface input by user;
Step 104, the verification information inputted according to user shows the second level verification interface;
Step 105, personal identification number is received, wherein the personal identification number passes through the second verifying interface input by user;
Step 106, according to personal identification number, subscriber identification card is unlocked.
The embodiment of the invention also provides a kind of subscriber identification card trippers comprising:
Unlocking request receiving module, for receiving the subscriber identification card unlocking request of user;
First level verification interface display module, for showing the first level verification according to subscriber identification card unlocking request
Interface;
Verification information receiving module, for receiving verification information, wherein the verification information passes through the first verifying circle by user
Face input;
Second level verification interface display module, the verification information for being inputted according to user show the second level verification interface;
Personal identification number receiving module, for receiving personal identification number, wherein the personal identification number passes through second by user
Verify interface input;
Unlocked state, for being unlocked to subscriber identification card according to personal identification number.
Subscriber identification card unlocking method and subscriber identification card tripper compared with the existing technology, the present invention
In subscriber identification card unlocking method and subscriber identification card tripper verifying PIN code to SIM card unlock before,
The input for increasing one-time authentication information, SIM card caused by can effectively avoiding because of maloperation fail, and improve anti-interference;
Solve interfering vulnerable to extraneous factor for existing subscriber identification card unlocking method and subscriber identification card tripper, because
The technical issues of user misoperation causes subscriber identification card to fail.
Detailed description of the invention
Fig. 1 is the flow chart of the first preferred embodiment of subscriber identification card unlocking method of the invention;
Fig. 2 is that the first level verification interface of the first preferred embodiment of subscriber identification card unlocking method of the invention shows
It is intended to;
Fig. 3 is the flow chart of the second preferred embodiment of subscriber identification card unlocking method of the invention;
Fig. 4 is that the first level verification interface of the second preferred embodiment of subscriber identification card unlocking method of the invention shows
It is intended to;
Fig. 5 is the structure chart of the first preferred embodiment of subscriber identification card tripper of the invention;
Fig. 6 is the structure chart of the second preferred embodiment of subscriber identification card tripper of the invention;
Fig. 7 is the specific implementation of subscriber identification card unlocking method and subscriber identification card tripper of the invention
The schematic diagram of a scenario of example;
Fig. 8 is the specific implementation of subscriber identification card unlocking method and subscriber identification card tripper of the invention
First level verification interface schematic diagram of example.
Specific embodiment
Schema is please referred to, wherein identical component symbol represents identical component, the principle of the present invention is to implement one
It is illustrated in computing environment appropriate.The following description be based on illustrated by the specific embodiment of the invention, should not be by
It is considered as the limitation present invention other specific embodiments not detailed herein.
In the following description, specific embodiments of the present invention will refer to the operation as performed by one or multi-section computer
The step of and symbol illustrate, unless otherwise stating clearly.Therefore, these steps and operation be will appreciate that, mentioned for several times wherein having
It include by representing with the computer disposal list of the electronic signal of the data in a structuring pattern to be executed by computer
Member is manipulated.At this manipulation transforms data or the position being maintained in the memory system of the computer, it can match again
Set or in addition change in a manner familiar to those skilled in the art the running of the computer.The maintained data knot of the data
Structure is the provider location of the memory, has the specific feature as defined in the data format.But the principle of the invention is with above-mentioned
Text illustrates, is not represented as a kind of limitation, those skilled in the art will appreciate that plurality of step as described below and
Operation also may be implemented in hardware.
Term as used herein " module " can regard the software object to execute in the arithmetic system as.It is as described herein
Different components, module, engine and service can be regarded as the objective for implementation in the arithmetic system.And device as described herein and side
Method is preferably implemented in the form of software, can also be implemented on hardware certainly, within that scope of the present invention.
Embodiment one
Fig. 1 is please referred to, Fig. 1 is the process of the first preferred embodiment of subscriber identification card unlocking method of the invention
Figure.The subscriber identification card unlocking method of this preferred embodiment is used to solve the subscriber identification card of unlock terminal
Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card
Unlocking method specifically includes:
Step 101, the subscriber identification card unlocking request of user is received;
Step 102, according to subscriber identification card unlocking request, the first level verification interface is shown;
Step 103, verification information is received, wherein the verification information passes through the first verifying interface input by user;
Step 104, the verification information inputted according to user shows the second level verification interface;
Step 105, personal identification number is received, wherein the personal identification number passes through the second verifying interface input by user;
Step 106, according to personal identification number, subscriber identification card is unlocked.
The following detailed description of the detailed process of each step of the subscriber identification card unlocking method of this preferred embodiment.
In a step 101, unlock terminal receives the subscriber identification card unlocking request of user.For example, for setting
The mobile phone of SIM card locking is set, then PIN code will be inputted after booting every time.Therefore, when user's long-pressing cellular phone power supplies key is opened
When mobile phone, the instruction of subscriber identification card unlocking request will be triggered, then, unlock terminal receives the subscriber identification card
Unlocking request.Then continue at step 102.
In a step 102, unlock terminal shows the first level verification interface according to subscriber identification card unlocking request,
In the first level verification interface be the picture interface for including an at least picture.For example, which can be with
It is that a series of pictures arranges from left to right, is also possible to the picture array of plurality of pictures composition, such as the 3*3 of 9 pictures composition
Picture array.It enumerates and is not especially limited herein.Then continue at step 103.
In step 103, unlock terminal receives verification information, and wherein the verification information passes through the first verifying interface by user
Input.For example, the first row is from a left side as shown in Fig. 2, the first level verification interface is the picture matrix of the 2*2 comprising four pictures
To right arrangement picture a, picture b, the second row arranges picture c, picture d from left to right.User is successively clicked as shown in arrow in figure
Picture a, picture b, picture c and picture d, unlock terminal again record the click location and sequence, are verified information.
Since by picture validation information, the verification information of input is not easy to be stolen by others, the peace of verification information here
Full property is stronger.Then continue at step 104.
At step 104, it as verification information received in step 103 is identical as default verification information, unlocks terminal and shows
Second level verification interface.The second level verification interface inputs personal identification number for user.Then continue at step 105.
In step 105, unlock terminal receives personal identification number, and wherein the personal identification number passes through the second verifying by user
Interface input, for being unlocked to subscriber identification card.By the input of the verification information in the first level verification interface, user will
Personal identification number is inputted, more carefully so as to effectively avoid leading to the feelings of personal identification number input error because of maloperation
Condition.Then continue at step 106.
In step 106, as the personal identification number is identical as the personal identification number prestored, then terminal is unlocked to user identity
Identification card is unlocked.
The unlocking process of the subscriber identification card unlocking method of this preferred embodiment is completed in this way.
Subscriber identification card unlocking method in this preferred embodiment unlocks SIM card by inputting PIN code in user
Before, the input for increasing picture verification information, not only increases the safety that SIM card uses, and also eliminated the dry of extraneous factor
It disturbs, to effectively avoid the case where user misoperation causes SIM card to fail.
Embodiment two
Referring to figure 3., Fig. 3 is the process of the second preferred embodiment of subscriber identification card unlocking method of the invention
Figure.The subscriber identification card unlocking method of this preferred embodiment is used to solve the subscriber identification card of unlock terminal
Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card
Unlocking method specifically includes:
Step 301, the subscriber identification card unlocking request of user is received;
Step 302, according to subscriber identification card unlocking request, the first level verification interface is shown, wherein the first order is tested
Demonstrate,proving interface is the picture interface for including an at least picture;
Step 303, clicking operation of the detection user to the first level verification interface;
Step 304, according to the position at the position of clicking operation and clicking operation corresponding first verifying interface, the is generated
One verification information;
Step 305, judge whether verification information is identical as default verification information;
Step 306, as verification information is different from default verification information, then the input time of verification information in setting time is calculated
Number;Number is such as inputted equal to setting value, then stops receiving verification information within the set time;
Step 307, as verification information is identical as default verification information, then the second level verification interface is shown;
Step 308, personal identification number is received, wherein the personal identification number is inputted by user by the second level verification interface;
Step 309, according to personal identification number, subscriber identification card is unlocked.
The following detailed description of the detailed process of each step of the subscriber identification card unlocking method of this preferred embodiment.
In step 301, unlock terminal receives the subscriber identification card unlocking request of user.For example, for setting
The mobile phone of SIM card locking is set, then PIN code will be inputted after booting every time.Therefore, when user's long-pressing cellular phone power supplies key is opened
When mobile phone, the instruction of subscriber identification card unlocking request will be triggered, then, unlock terminal receives the subscriber identification card
Unlocking request.Then continue at step 302.
In step 302, unlock terminal shows the first level verification interface according to subscriber identification card unlocking request,
In the first level verification interface be the picture interface for including an at least picture.For example, which can be with
It is that a series of pictures arranges from left to right, is also possible to the picture array of plurality of pictures composition, such as the 3*3 of 9 pictures composition
Picture array.It enumerates and is not especially limited herein.Then continue at step 303.
In step 303, clicking operation of the unlock terminal detection user to the first level verification interface.For arranging from left to right
For four pictures of column, user can come the second from left, a left side three, the first from left and the picture of left four positions, solution by successively clicking
Lock terminal again detects the click location.It is safer that verification information is directly inputted according to the method ratio for clicking picture in this way.
In step 304, raw according to the position at the position of clicking operation and clicking operation corresponding first verifying interface
At the first verification information.For example, as shown in Fig. 2, the first level verification interface be the 2*2 comprising four pictures picture matrix,
The first row arranges picture a, picture b from left to right, and the second row arranges picture c, picture d from left to right.User is by arrow institute in figure
Show and successively click picture a, picture b, picture c and picture d, unlock terminal again records the click location and sequence, obtains
To verification information.Since by picture validation information, the verification information of input is not easy to be stolen by others, test here
The safety for demonstrate,proving information is stronger.Then continue at step 305.
In step 305, unlock terminal judges whether verification information is identical as default verification information, such as verification information and in advance
If verification information is different, it is transferred to step 306;If verification information is identical as default verification information, then step 307 is transferred to.
Within step 306, as step 305 obtains the verification information conclusion different from default verification information, then terminal is unlocked
Calculate the input number of verification information in setting time.Number is such as inputted equal to setting value, then unlocks terminal within the set time
Stop receiving verification information, and user is prompted to cross setting time validation information again, it is small which can be 1
When, 2 hours, 3 hours, enumerate and be not especially limited herein;Number is such as inputted less than setting value, then unlocks terminal notifying user and tests
The number demonstrate,proving the number of information input mistake and can also inputting reminds user to input with caution.If the maloperation of user is led
Cause the multiple mistake of verification information user can be forbidden to input again within the set time in order to avoid the subsequent maloperation of user
Verification information, to improve the safety and reliability of verification information input.
In step 307, as step 305 obtains verification information conclusion identical with default verification information, then terminal is unlocked
Show the second level verification interface.The second level verification interface inputs personal identification number for user.Then continue at step 308.
In step 308, unlock terminal receives personal identification number, and wherein the personal identification number is tested by user by the second level
Interface input is demonstrate,proved, for unlocking to subscriber identification card.Pass through the input of the verification information in the first level verification interface, user
Personal identification number will be inputted, more carefully so as to effectively avoid leading to the feelings of personal identification number input error because of maloperation
Condition.Then continue at step 309.
In a step 309, as the personal identification number is identical as the personal identification number prestored, then terminal is unlocked to user identity
Identification card is unlocked.
The unlocking process of the subscriber identification card unlocking method of this preferred embodiment is completed in this way.
Preferably, in step 302, since in actual life, there are many password that user needs to remember, therefore in order to mitigate
The memory of user is born, and the first level verification interface can also be the picture interface comprising the customized map of user.For example, first
First user selects the regional picture representative to user, which can be the behaviour area of user's daily life
Domain is also possible to the zone of action of work.It enumerates and is not especially limited herein.Then, user is right from the regionality picture again
Specific geographic coordinate is identified, such as the supermarket that user usually buys vegetables, the market etc. gone window-shopping.Material is thus formed include user
First level verification interface of customized map.
Next, user on seeing the first level verification interface it is known regionality map when, can to these mark ground
Reason coordinate is ranked up according to daily life or Working Life track.For example, as shown in figure 4, route is first to pass through if user goes to work
Cross place f, using place g, finally arrive at the destination h, then, user by successively clicked after arriving first place f, place g and
Place h.At this point, unlock terminal will detect the clicking operation of user.Uninteresting verification information is converted to just in this way
In the route information of memory, the accuracy of verification information input is further improved.
Finally, the order information that unlock terminal is formed according to these clicking operations, generates verification information.
Subscriber identification card unlocking method in this preferred embodiment on the basis of first preferred embodiment, by
User input PIN code to SIM card unlock before, also increase the customized map picture verification information of user input, not only into
One step improves the safety that SIM card uses, and also further eliminates the interference of extraneous factor, to effectively avoid user
The case where maloperation causes SIM card to fail.Meanwhile the customized map picture verification method of user can help user's memory close
Code improves the efficiency of verification information input.
Embodiment three
Referring to figure 5., Fig. 5 is the structure of the first preferred embodiment of subscriber identification card tripper of the invention
Figure.The subscriber identification card tripper of this preferred embodiment is used to solve the subscriber identification card of unlock terminal
Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card
Tripper 50 includes unlocking request receiving module 501, the first level verification interface display module 502, verification information receiving module
503, the second level verification interface display module 504, personal identification number receiving module 505 and unlocked state 506.Wherein, it unlocks
Request receiving module 501 is used to receive the subscriber identification card unlocking request of user;First level verification interface display module 502
For showing the first level verification interface according to subscriber identification card unlocking request;Verification information receiving module 503 is for receiving
Verification information, wherein the verification information passes through the first verifying interface input by user;Second level verification interface display module 504 is used
In the verification information inputted according to user, the second level verification interface is shown;Personal identification number receiving module 505 is for receiving individual
Identification code, wherein the personal identification number passes through the second verifying interface input by user;Unlocked state 506 is used to be identified according to individual
Code, is unlocked subscriber identification card.
Subscriber identification card tripper 50 when in use, first unlocking request receiving module 501 receive user use
Family identification card unlocking request.For example, the mobile phone locked for being provided with SIM card, then every time will be defeated after booting
Enter PIN code.Therefore, when user's long-pressing cellular phone power supplies key opens mobile phone, subscriber identification card unlocking request will be triggered
Instruction, then, unlocking request receiving module 501 receive the subscriber identification card unlocking request.Then call the first level verification
Interface display module 502.
Then, the first level verification interface display module 502 shows that the first order is tested according to subscriber identification card unlocking request
Interface is demonstrate,proved, wherein the first level verification interface is the picture interface for including an at least picture.For example, first level verification
Interface can be a series of pictures and arrange from left to right, be also possible to the picture array of plurality of pictures composition, such as 9 picture groups
At 3*3 picture array.It enumerates and is not especially limited herein.Then call verification information receiving module 503.
And then, verification information receiving module 503 receives verification information, and wherein the verification information is tested by user by first
Demonstrate,prove interface input.For example, as shown in Fig. 2, the first level verification interface be the 2*2 comprising four pictures picture matrix, first
Row arranges picture a, picture b from left to right, and the second row arranges picture c, picture d from left to right.User by shown in arrow in figure according to
Secondary click picture a, picture b, picture c and picture d, verification information receiving module 503 again carry out the click location and sequence
Record, is verified information.Since by picture validation information, the verification information of input is not easy by other people here
It steals, the safety of verification information is stronger.Then call the second level verification interface display module 504.
Then, as the received verification information of verification information receiving module 503 is identical as default verification information, then the second level is tested
It demonstrate,proves interface display module 504 and shows that the second level verification interface, the second level verification interface input personal identification number for user.With
Personal identification number receiving module 505 is called afterwards.
Subsequently, personal identification number receiving module 505 receives personal identification number, and wherein the personal identification number is passed through by user
Second verifying interface input, for being unlocked to subscriber identification card.Pass through the defeated of the verification information in the first level verification interface
Enter, user will more carefully input personal identification number, so as to effectively avoid causing personal identification number to input because of maloperation
The situation of mistake.Then call unlocked state 506.
Finally, then unlocked state 506 is to user identity identification as the personal identification number is identical as the personal identification number prestored
Card is unlocked.
The unlocking process of the subscriber identification card tripper of this preferred embodiment is completed in this way.
Subscriber identification card tripper in this preferred embodiment unlocks SIM card by inputting PIN code in user
Before, the input for increasing picture verification information, not only increases the safety that SIM card uses, and also eliminated the dry of extraneous factor
It disturbs, to effectively avoid the case where user misoperation causes SIM card to fail.
Example IV
Fig. 6 is please referred to, Fig. 6 is the structure of the second preferred embodiment of subscriber identification card tripper of the invention
Figure.The subscriber identification card tripper of this preferred embodiment is used to solve the subscriber identification card of unlock terminal
Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card
Tripper 60 includes unlocking request receiving module 601, the first level verification interface display module 602, verification information receiving module
603, the second level verification interface display module 604, personal identification number receiving module 605 and unlocked state 606.Wherein, it verifies
Information receiving module 603 includes clicking operation detection unit 6031, verification information generation unit 6032;Second level verification interface is aobvious
Show that module 604 includes judging unit 6041, the second level verification boundary element 6042, stops receiving verification information unit 6043.
On the basis of first preferred embodiment, the subscriber identification card tripper 60 of this preferred embodiment is carried out
Module refinement.Clicking operation detection unit 6031 is for detecting user to the clicking operation at the first level verification interface;Verifying letter
Generation unit 6032 is ceased to be used to be generated according to the position at the position of clicking operation and clicking operation corresponding first verifying interface
First verification information;Judging unit 6041 is for judging whether verification information is identical as default verification information;Second level verification circle
When face unit 6042 is identical as default verification information for verification information, the second level verification interface is shown;Stop receiving verifying letter
Interest statement member 6043 is in verification information and default verification information difference, calculating the input time of verification information in setting time
Number;Number is such as inputted equal to setting value, then stops receiving verification information within the set time.
When in use, unlocking request receiving module 601 receives user's to the subscriber identification card tripper 60 first
Subscriber identification card unlocking request.For example, the mobile phone locked for being provided with SIM card, then every time will after booting
Input PIN code.Therefore, when user's long-pressing cellular phone power supplies key opens mobile phone, subscriber identification card unlocking request will be triggered
Instruction, then, unlocking request receiving module 601 receive the subscriber identification card unlocking request.Then the first order is called to test
Demonstrate,prove interface display module 602.
Then, the first level verification interface display module 602 shows that the first order is tested according to subscriber identification card unlocking request
Interface is demonstrate,proved, wherein the first level verification interface is the picture interface for including an at least picture.For example, first level verification
Interface can be a series of pictures and arrange from left to right, be also possible to the picture array of plurality of pictures composition, such as 9 picture groups
At 3*3 picture array.It enumerates and is not especially limited herein.Then call the clicking operation in verification information receiving module 603
Detection unit 6031.
And then, clicking operation detection unit 6031 detects user to the clicking operation at the first level verification interface.For from
For four pictures of left-to-right arrangement, user can come the second from left, a left side three, the first from left and left four positions by successively clicking
Picture, clicking operation detection unit 6031 detect the click location.Then call in verification information receiving module 603
Verification information generation unit 6032.
Then, verification information generation unit 6032 is according to corresponding first verifying in the position of clicking operation and clicking operation
The position at interface generates the first verification information.For example, as shown in Fig. 2, the first level verification interface is the 2*2 comprising four pictures
Picture matrix, the first row arranges picture a, picture b from left to right, and the second row arranges picture c, picture d from left to right.User
By picture a, picture b, picture c and picture d is successively clicked shown in arrow in figure, verification information generation unit 6032 is again to the point
It hits position and sequence is recorded, be verified information.Due to passing through picture validation information, the verifying of input here
Information is not easy to be stolen by others, and the safety of verification information is stronger.Then call in the second level verification interface display module 604
Judging unit 6041.
Subsequently, judging unit 6041 judges whether verification information is identical as default verification information, such as verification information and in advance
If verification information is different, then the stopping in the second level verification interface display module 604 is called to receive verification information unit 6043;Such as
Verification information is identical as default verification information, then second level verification circle of the modulation in the second level verification interface display module 604
Face unit 6042.
If judging unit 6041 obtains the verification information conclusion different from default verification information, then stop receiving verification information
Unit 6043 calculates the input number of verification information in setting time.Number is such as inputted equal to setting value, then unlocks terminal and is setting
Interior stopping of fixing time receives verification information, and user is prompted to cross setting time validation information again, which can
To be 1 hour, 2 hours, 3 hours, enumerates and be not especially limited herein.This is less than setting value such as input number, then unlocks terminal
The number that prompts the number of user authentication information input error and can also input reminds user to input with caution.If user
Maloperation lead to the multiple mistake of verification information, in order to avoid the subsequent maloperation of user, can forbid using within the set time
Family validation information again, to improve the safety and reliability of verification information input.
If judging unit 6041 obtains verification information conclusion identical with default verification information, then the second level verification interface is single
Member 6042 shows the second level verification interface.The second level verification interface inputs personal identification number for user.It then calls personal
Identification code receiving module 605.
Then, personal identification number receiving module 605 receives personal identification number, and wherein the personal identification number passes through the by user
Second verification interface input, for being unlocked to subscriber identification card.Pass through the defeated of the verification information in the first level verification interface
Enter, user will more carefully input personal identification number, so as to effectively avoid causing personal identification number to input because of maloperation
The situation of mistake.Then call unlocked state 606.
Finally, then unlocked state 606 is to user identity identification as the personal identification number is identical as the personal identification number prestored
Card is unlocked.
The unlocking process of the subscriber identification card tripper of this preferred embodiment is completed in this way.
Preferably, since in actual life, there are many password that user needs to remember, thus it is negative in order to mitigate the memory of user
It carries on a shoulder pole, the first level verification interface shown in the first level verification interface display module 602 can also be comprising the customized map of user
Picture interface.For example, firstly, user selects the regional picture representative to user, which can
To be the zone of action of user's daily life, it is also possible to the zone of action of work.It enumerates and is not especially limited herein.Then,
User is again identified specific geographic coordinate from the regionality picture, such as the supermarket that user usually buys vegetables, the quotient to go window-shopping
Etc..Material is thus formed the first level verification interfaces comprising the customized map of user.
Next, user on seeing the first level verification interface it is known regionality map when, can to these mark ground
Reason coordinate is ranked up according to daily life or Working Life track.For example, route is to first pass through as shown in figure 4, user goes to work
Place f finally arrives at the destination h using place g, and then, user is by successively clicking place f, place g and ground after arriving first
Point h.At this point, clicking operation detection unit 6031 will detect the clicking operation of user.Uninteresting verifying is believed in this way
The route information that breath is converted to convenient for memory further improves the accuracy of verification information input.
Finally, it is verified that the order information that information generating unit 6032 is formed according to these clicking operations, generates verification information.
Subscriber identification card tripper in this preferred embodiment on the basis of first preferred embodiment, by
User input PIN code to SIM card unlock before, also increase the customized map picture verification information of user input, not only into
One step improves the safety that SIM card uses, and also further eliminates the interference of extraneous factor, to effectively avoid user
The case where maloperation causes SIM card to fail.Meanwhile the customized map picture verification method of user can help user's memory close
Code improves the efficiency of verification information input.
Embodiment five
Fig. 7 is the specific implementation of subscriber identification card unlocking method and subscriber identification card tripper of the invention
The schematic diagram of a scenario of example.
In step 701, user's long-pressing power key opens mobile phone, triggers SIM card unlocking request.
In a step 702, mobile phone receives SIM card unlocking request, shows that the first order including map picture is tested to user
Demonstrate,prove interface.As shown in figure 8, map denotation on the first level verification interface is user from the home to the image between school,
On the main road bridge B, C and loop D that user successively to be passed through from family A to school E is marked, place F, place is in addition also marked
The tri- unrelated places G and place H.Then mobile phone prompt user is ranked up the above place.Only when user inputs correctly
When point sequence, it could further input PIN code and SIM card is unlocked.
In step 703, user sees the map, understand be arranged by the sequence successively passed through from the home to school A, B,
C, five places D, E.Then user is successively clicked the place on map by sequence shown in arrow in Fig. 8, generates verifying
Information.
In step 704, mobile phone receives the verification information, it is compared with the verification information prestored, obtains comparing identical
Result.
In step 705, since the verification information is identical as the verification information prestored, then mobile phone shows to user and inputs
Second level verification interface of PIN code.
In step 706, user inputs PIN code in the second level verification interface.
In step 707, mobile phone receives the PIN code of user's input, compares with the PIN code prestored, discovery comparison knot
Fruit is identical, is then unlocked to SIM card.
The subscriber identification card unlocking method and subscriber identification card unlock of this specific embodiment are completed in this way
The process that device unlocks subscriber identification card.
Subscriber identification card unlocking method and subscriber identification card tripper in the present invention is in verifying PIN code pair
Before SIM card unlock, increase the input of one-time authentication information, SIM card caused by can effectively avoiding because of maloperation fails, and mentions
High anti-interference;Solve existing subscriber identification card unlocking method and subscriber identification card tripper vulnerable to outer
The technical issues of boundary's factor is interfered, and causes subscriber identification card to fail because of user misoperation.
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit list
It is solely physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module can both use
Formal implementation of hardware can also be realized in the form of software function module.If the integrated module is with software function
The form of module is realized and when sold or used as an independent product, also can store in computer-readable storage Jie
In matter.Storage medium mentioned above can be read-only memory, disk or CD etc..Above-mentioned each device or system, can be with
Execute the method in correlation method embodiment.
In conclusion although the present invention has been disclosed above in the preferred embodiment, but above preferred embodiment is not to limit
The system present invention, those skilled in the art can make various changes and profit without departing from the spirit and scope of the present invention
Decorations, therefore protection scope of the present invention subjects to the scope of the claims.
Claims (5)
1. a kind of subscriber identification card unlocking method is unlocked for the subscriber identification card to unlock terminal, special
Sign is, comprising:
For being provided with the terminal of subscriber identification card locking, need to input subscriber identification card after powering a accordingly
People's identification code can trigger the instruction of subscriber identification card unlocking request when user's long-pressing terminal supplying power key opens terminal, and
Receive the subscriber identification card unlocking request of user;
According to the subscriber identification card unlocking request, show that the first level verification interface, first level verification interface are to use
The picture interface of the customized map in family is identified specific geographic coordinate in the picture interface, and formation is made by oneself comprising user
First level verification interface of free burial ground for the destitute figure is verified information according to by arriving first the rear sequence place that successively record user clicks;
Verification information is received, wherein the verification information is inputted by the user by first level verification interface;
According to the verification information that the user inputs, the second level verification interface is shown;
Personal identification number is received, wherein the personal identification number is inputted by the user by second level verification interface;With
And
According to the personal identification number, subscriber identification card is unlocked.
2. subscriber identification card unlocking method according to claim 1, which is characterized in that described defeated according to the user
The verification information entered, show the second level verification interface the step of include:
Judge whether the verification information is identical as default verification information;
If the verification information is identical as default verification information, then second level verification interface is shown;
If the verification information is different from default verification information, then the input number of the verification information in setting time is calculated;
If the input number is equal to setting value, then stop receiving the verification information in the setting time.
3. a kind of subscriber identification card tripper is unlocked for the subscriber identification card to unlock terminal, special
Sign is, comprising:
Unlocking request receiving module needs to input after powering for the terminal for being provided with subscriber identification card locking
The corresponding personal identification number of subscriber identification card can trigger user identity when user's long-pressing terminal supplying power key opens terminal
The instruction of identification card unlocking request, and receive the subscriber identification card unlocking request of user;
First level verification interface display module, for showing the first level verification according to the subscriber identification card unlocking request
Interface, first level verification interface are the picture interface of the customized map of user, are sat to specific geographic in the picture interface
Mark is identified, and forms the first level verification interface comprising the customized map of user, according to by sequence after arriving first, successively record is used
The place that family is clicked, is verified information;
Verification information receiving module, for receiving verification information, wherein the verification information passes through described first by the user
The input of level verification interface;
Second level verification interface display module, the verification information for being inputted according to the user show the second level verification interface;
Personal identification number receiving module, for receiving personal identification number, wherein the personal identification number passes through institute by the user
State the input of the second level verification interface;And
Unlocked state, for being unlocked to subscriber identification card according to the personal identification number.
4. subscriber identification card tripper according to claim 3, which is characterized in that second level verification interface
Display module specifically includes:
Judging unit, for judging whether the verification information is identical as default verification information;
Second level verification boundary element shows that the second level is tested when identical as default verification information for the verification information
Demonstrate,prove interface;
Stop receiving verification information unit, for calculating setting time in the verification information and default verification information difference
The input number of the interior verification information;If the input number is equal to setting value, then stop receiving in the setting time
The verification information.
5. a kind of storage medium, is stored with computer program, which is characterized in that when the computer program is executed by processor
Realize the method as described in claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510793800.8A CN105790949B (en) | 2015-11-17 | 2015-11-17 | Subscriber identification card unlocking method and subscriber identification card tripper |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510793800.8A CN105790949B (en) | 2015-11-17 | 2015-11-17 | Subscriber identification card unlocking method and subscriber identification card tripper |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105790949A CN105790949A (en) | 2016-07-20 |
CN105790949B true CN105790949B (en) | 2019-09-13 |
Family
ID=56390239
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510793800.8A Expired - Fee Related CN105790949B (en) | 2015-11-17 | 2015-11-17 | Subscriber identification card unlocking method and subscriber identification card tripper |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105790949B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951604B (en) * | 2019-02-27 | 2021-10-15 | 维沃移动通信有限公司 | Message processing method, mobile terminal and user identity identification module |
CN110362988A (en) * | 2019-07-19 | 2019-10-22 | 深圳传音控股股份有限公司 | Unlocking method, intelligent terminal and the readable storage medium storing program for executing of intelligent terminal clamping lock |
WO2021114009A1 (en) * | 2019-12-09 | 2021-06-17 | Qualcomm Incorporated | Universal integrated circuit card (uicc) activation |
CN112019684A (en) * | 2020-08-10 | 2020-12-01 | Oppo(重庆)智能科技有限公司 | Control method and electronic device |
CN116484352B (en) * | 2023-04-21 | 2024-03-15 | 贵州电网有限责任公司 | Management method of power grid equipment information model library and design access network system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101018373A (en) * | 2007-01-22 | 2007-08-15 | 华为技术有限公司 | Method for locking the mobile station device, mobile station device and network device |
CN102360409A (en) * | 2011-09-29 | 2012-02-22 | 北京百度网讯科技有限公司 | Method for generating verification codes as well as method and detection for verification |
CN104023029A (en) * | 2014-06-19 | 2014-09-03 | 百度在线网络技术(北京)有限公司 | Method and device for verifying verification codes |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7992006B2 (en) * | 2007-08-06 | 2011-08-02 | Mitac International Corp. | Smart card data protection method and system thereof |
CN101645121A (en) * | 2008-08-06 | 2010-02-10 | 深圳富泰宏精密工业有限公司 | System and method for setting password protection by utilizing picture |
-
2015
- 2015-11-17 CN CN201510793800.8A patent/CN105790949B/en not_active Expired - Fee Related
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101018373A (en) * | 2007-01-22 | 2007-08-15 | 华为技术有限公司 | Method for locking the mobile station device, mobile station device and network device |
CN102360409A (en) * | 2011-09-29 | 2012-02-22 | 北京百度网讯科技有限公司 | Method for generating verification codes as well as method and detection for verification |
CN104023029A (en) * | 2014-06-19 | 2014-09-03 | 百度在线网络技术(北京)有限公司 | Method and device for verifying verification codes |
CN104660613A (en) * | 2015-03-16 | 2015-05-27 | 联想(北京)有限公司 | Authentication method of user identification module and electronic equipment |
Non-Patent Citations (1)
Title |
---|
拒绝恶作剧:Win10 Mobile启用防误触密码;IT之家;《IT之家/WP之家/Windows Phone新闻(https://m.ithome.com/html/162234.htm)》;20150712;1-2 * |
Also Published As
Publication number | Publication date |
---|---|
CN105790949A (en) | 2016-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105790949B (en) | Subscriber identification card unlocking method and subscriber identification card tripper | |
CN109255211B (en) | Mobile security countermeasure | |
CN109492378A (en) | A kind of auth method based on EIC equipment identification code, server and medium | |
CN104009977B (en) | A kind of method and system of information protection | |
Lee et al. | An empirical study of wireless carrier authentication for {SIM} swaps | |
US8387119B2 (en) | Secure application network | |
CN108183924A (en) | A kind of login validation method and terminal device | |
JP6310160B1 (en) | Multi-granular authentication technique | |
US10231124B2 (en) | Anti-theft method and client for a mobile terminal | |
CN109587110A (en) | A kind of weak passwurd detection method, device, computer equipment and service server | |
US8683563B1 (en) | Soft token posture assessment | |
CN109561085A (en) | A kind of auth method based on EIC equipment identification code, server and medium | |
TR201810890T4 (en) | A method and system that protects against identity theft or copy abuse. | |
Marforio et al. | Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications | |
CN107241192B (en) | A kind of method and device logged in using fingerprint key | |
CN105608359A (en) | Unlocking verification method, unlocking verification apparatus and terminal | |
CN106845181A (en) | The acquisition methods and electronic equipment of a kind of password | |
CN106161183B (en) | Method for message interaction and social interaction server device and communication system | |
CN109002733A (en) | A kind of pair of equipment carries out the method and device of reliability evaluation | |
CN110011953A (en) | Stolen password is prevented to use again | |
US8938805B1 (en) | Detection of tampering with software installed on a processing device | |
CN104853030B (en) | The method and mobile terminal of a kind of information processing | |
CN107612915A (en) | The method and apparatus of the anti-password cracking of double secure forms based on checking code conversion | |
CN107294981B (en) | Authentication method and equipment | |
Anbalagan et al. | Trusted application using biometrics for android environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18 Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190913 |
|
CF01 | Termination of patent right due to non-payment of annual fee |