CN105790949B - Subscriber identification card unlocking method and subscriber identification card tripper - Google Patents

Subscriber identification card unlocking method and subscriber identification card tripper Download PDF

Info

Publication number
CN105790949B
CN105790949B CN201510793800.8A CN201510793800A CN105790949B CN 105790949 B CN105790949 B CN 105790949B CN 201510793800 A CN201510793800 A CN 201510793800A CN 105790949 B CN105790949 B CN 105790949B
Authority
CN
China
Prior art keywords
user
identification card
subscriber identification
verification information
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510793800.8A
Other languages
Chinese (zh)
Other versions
CN105790949A (en
Inventor
蒋欣呈
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510793800.8A priority Critical patent/CN105790949B/en
Publication of CN105790949A publication Critical patent/CN105790949A/en
Application granted granted Critical
Publication of CN105790949B publication Critical patent/CN105790949B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of subscriber identification card unlocking method, is unlocked for the subscriber identification card to unlock terminal comprising: receive the subscriber identification card unlocking request of user;According to subscriber identification card unlocking request, the first level verification interface is shown;Verification information is received, wherein the verification information passes through the first verifying interface input by user;According to the verification information that user inputs, the second level verification interface is shown;Personal identification number is received, wherein the personal identification number passes through the second verifying interface input by user;And according to personal identification number, subscriber identification card is unlocked.The present invention also provides a kind of subscriber identification card trippers.Subscriber identification card unlocking method and device of the invention increases the input of one-time authentication information before verifying PIN code is to SIM card unlock, and SIM card caused by can effectively avoiding because of maloperation fails, and improves anti-interference.

Description

Subscriber identification card unlocking method and subscriber identification card tripper
Technical field
The present invention relates to the communications fields, more particularly to a kind of subscriber identification card unlocking method and user identity identification Card tripper.
Background technique
In communication scenes, SIM (Subscriber Identity Module, client identification module) card is equivalent to user " identity card ".SIM card stores the information of digital mobile phone client, in telephone directory of the key of encryption and user etc. Voice messaging when holding, identified for GSM network client identity, and conversing client encrypts, and has of crucial importance Effect.
Therefore PIN (Personal IdentificationNumber, personal identification number) code is provided with as SIM card Password protects the safety of SIM card, prevents others from usurping SIM card.It, every time will after booting if being provided with SIM card to lock Input PIN code.After PIN code inputs 3 times by mistake, SIM card can be automatic locking, only passes through input PUK (PIN at this time UnlockingKey, unlock code) it could unlock.PUK code shares 10 input chances, and after inputing 10 times by mistake, SIM card can start automatically Self-destruction program, makes SIM card fail.
There is the risk for causing SIM card to fail due to maloperation in above SIM card unlocking manner.Such as child is due to curiosity The mobile phone for being provided with SIM card locking is played steathily, if PIN code input mistake, and PUK code also input error, then SIM card can be made to start Self-destruction program, causes SIM card to fail.
Summary of the invention
The embodiment of the invention provides one kind to avoid user misoperation that subscriber identification card is caused to fail, to improve anti- Interfering subscriber identification card unlocking method and subscriber identification card tripper, to solve existing user identity identification Card unlocking method and subscriber identification card tripper are interfered vulnerable to extraneous factor, because user misoperation leads to user identity The technical issues of identification card fails.
The embodiment of the invention provides a kind of subscriber identification card unlocking methods comprising:
Step 101, the subscriber identification card unlocking request of user is received;
Step 102, according to subscriber identification card unlocking request, the first level verification interface is shown;
Step 103, verification information is received, wherein the verification information passes through the first verifying interface input by user;
Step 104, the verification information inputted according to user shows the second level verification interface;
Step 105, personal identification number is received, wherein the personal identification number passes through the second verifying interface input by user;
Step 106, according to personal identification number, subscriber identification card is unlocked.
The embodiment of the invention also provides a kind of subscriber identification card trippers comprising:
Unlocking request receiving module, for receiving the subscriber identification card unlocking request of user;
First level verification interface display module, for showing the first level verification according to subscriber identification card unlocking request Interface;
Verification information receiving module, for receiving verification information, wherein the verification information passes through the first verifying circle by user Face input;
Second level verification interface display module, the verification information for being inputted according to user show the second level verification interface;
Personal identification number receiving module, for receiving personal identification number, wherein the personal identification number passes through second by user Verify interface input;
Unlocked state, for being unlocked to subscriber identification card according to personal identification number.
Subscriber identification card unlocking method and subscriber identification card tripper compared with the existing technology, the present invention In subscriber identification card unlocking method and subscriber identification card tripper verifying PIN code to SIM card unlock before, The input for increasing one-time authentication information, SIM card caused by can effectively avoiding because of maloperation fail, and improve anti-interference; Solve interfering vulnerable to extraneous factor for existing subscriber identification card unlocking method and subscriber identification card tripper, because The technical issues of user misoperation causes subscriber identification card to fail.
Detailed description of the invention
Fig. 1 is the flow chart of the first preferred embodiment of subscriber identification card unlocking method of the invention;
Fig. 2 is that the first level verification interface of the first preferred embodiment of subscriber identification card unlocking method of the invention shows It is intended to;
Fig. 3 is the flow chart of the second preferred embodiment of subscriber identification card unlocking method of the invention;
Fig. 4 is that the first level verification interface of the second preferred embodiment of subscriber identification card unlocking method of the invention shows It is intended to;
Fig. 5 is the structure chart of the first preferred embodiment of subscriber identification card tripper of the invention;
Fig. 6 is the structure chart of the second preferred embodiment of subscriber identification card tripper of the invention;
Fig. 7 is the specific implementation of subscriber identification card unlocking method and subscriber identification card tripper of the invention The schematic diagram of a scenario of example;
Fig. 8 is the specific implementation of subscriber identification card unlocking method and subscriber identification card tripper of the invention First level verification interface schematic diagram of example.
Specific embodiment
Schema is please referred to, wherein identical component symbol represents identical component, the principle of the present invention is to implement one It is illustrated in computing environment appropriate.The following description be based on illustrated by the specific embodiment of the invention, should not be by It is considered as the limitation present invention other specific embodiments not detailed herein.
In the following description, specific embodiments of the present invention will refer to the operation as performed by one or multi-section computer The step of and symbol illustrate, unless otherwise stating clearly.Therefore, these steps and operation be will appreciate that, mentioned for several times wherein having It include by representing with the computer disposal list of the electronic signal of the data in a structuring pattern to be executed by computer Member is manipulated.At this manipulation transforms data or the position being maintained in the memory system of the computer, it can match again Set or in addition change in a manner familiar to those skilled in the art the running of the computer.The maintained data knot of the data Structure is the provider location of the memory, has the specific feature as defined in the data format.But the principle of the invention is with above-mentioned Text illustrates, is not represented as a kind of limitation, those skilled in the art will appreciate that plurality of step as described below and Operation also may be implemented in hardware.
Term as used herein " module " can regard the software object to execute in the arithmetic system as.It is as described herein Different components, module, engine and service can be regarded as the objective for implementation in the arithmetic system.And device as described herein and side Method is preferably implemented in the form of software, can also be implemented on hardware certainly, within that scope of the present invention.
Embodiment one
Fig. 1 is please referred to, Fig. 1 is the process of the first preferred embodiment of subscriber identification card unlocking method of the invention Figure.The subscriber identification card unlocking method of this preferred embodiment is used to solve the subscriber identification card of unlock terminal Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card Unlocking method specifically includes:
Step 101, the subscriber identification card unlocking request of user is received;
Step 102, according to subscriber identification card unlocking request, the first level verification interface is shown;
Step 103, verification information is received, wherein the verification information passes through the first verifying interface input by user;
Step 104, the verification information inputted according to user shows the second level verification interface;
Step 105, personal identification number is received, wherein the personal identification number passes through the second verifying interface input by user;
Step 106, according to personal identification number, subscriber identification card is unlocked.
The following detailed description of the detailed process of each step of the subscriber identification card unlocking method of this preferred embodiment.
In a step 101, unlock terminal receives the subscriber identification card unlocking request of user.For example, for setting The mobile phone of SIM card locking is set, then PIN code will be inputted after booting every time.Therefore, when user's long-pressing cellular phone power supplies key is opened When mobile phone, the instruction of subscriber identification card unlocking request will be triggered, then, unlock terminal receives the subscriber identification card Unlocking request.Then continue at step 102.
In a step 102, unlock terminal shows the first level verification interface according to subscriber identification card unlocking request, In the first level verification interface be the picture interface for including an at least picture.For example, which can be with It is that a series of pictures arranges from left to right, is also possible to the picture array of plurality of pictures composition, such as the 3*3 of 9 pictures composition Picture array.It enumerates and is not especially limited herein.Then continue at step 103.
In step 103, unlock terminal receives verification information, and wherein the verification information passes through the first verifying interface by user Input.For example, the first row is from a left side as shown in Fig. 2, the first level verification interface is the picture matrix of the 2*2 comprising four pictures To right arrangement picture a, picture b, the second row arranges picture c, picture d from left to right.User is successively clicked as shown in arrow in figure Picture a, picture b, picture c and picture d, unlock terminal again record the click location and sequence, are verified information. Since by picture validation information, the verification information of input is not easy to be stolen by others, the peace of verification information here Full property is stronger.Then continue at step 104.
At step 104, it as verification information received in step 103 is identical as default verification information, unlocks terminal and shows Second level verification interface.The second level verification interface inputs personal identification number for user.Then continue at step 105.
In step 105, unlock terminal receives personal identification number, and wherein the personal identification number passes through the second verifying by user Interface input, for being unlocked to subscriber identification card.By the input of the verification information in the first level verification interface, user will Personal identification number is inputted, more carefully so as to effectively avoid leading to the feelings of personal identification number input error because of maloperation Condition.Then continue at step 106.
In step 106, as the personal identification number is identical as the personal identification number prestored, then terminal is unlocked to user identity Identification card is unlocked.
The unlocking process of the subscriber identification card unlocking method of this preferred embodiment is completed in this way.
Subscriber identification card unlocking method in this preferred embodiment unlocks SIM card by inputting PIN code in user Before, the input for increasing picture verification information, not only increases the safety that SIM card uses, and also eliminated the dry of extraneous factor It disturbs, to effectively avoid the case where user misoperation causes SIM card to fail.
Embodiment two
Referring to figure 3., Fig. 3 is the process of the second preferred embodiment of subscriber identification card unlocking method of the invention Figure.The subscriber identification card unlocking method of this preferred embodiment is used to solve the subscriber identification card of unlock terminal Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card Unlocking method specifically includes:
Step 301, the subscriber identification card unlocking request of user is received;
Step 302, according to subscriber identification card unlocking request, the first level verification interface is shown, wherein the first order is tested Demonstrate,proving interface is the picture interface for including an at least picture;
Step 303, clicking operation of the detection user to the first level verification interface;
Step 304, according to the position at the position of clicking operation and clicking operation corresponding first verifying interface, the is generated One verification information;
Step 305, judge whether verification information is identical as default verification information;
Step 306, as verification information is different from default verification information, then the input time of verification information in setting time is calculated Number;Number is such as inputted equal to setting value, then stops receiving verification information within the set time;
Step 307, as verification information is identical as default verification information, then the second level verification interface is shown;
Step 308, personal identification number is received, wherein the personal identification number is inputted by user by the second level verification interface;
Step 309, according to personal identification number, subscriber identification card is unlocked.
The following detailed description of the detailed process of each step of the subscriber identification card unlocking method of this preferred embodiment.
In step 301, unlock terminal receives the subscriber identification card unlocking request of user.For example, for setting The mobile phone of SIM card locking is set, then PIN code will be inputted after booting every time.Therefore, when user's long-pressing cellular phone power supplies key is opened When mobile phone, the instruction of subscriber identification card unlocking request will be triggered, then, unlock terminal receives the subscriber identification card Unlocking request.Then continue at step 302.
In step 302, unlock terminal shows the first level verification interface according to subscriber identification card unlocking request, In the first level verification interface be the picture interface for including an at least picture.For example, which can be with It is that a series of pictures arranges from left to right, is also possible to the picture array of plurality of pictures composition, such as the 3*3 of 9 pictures composition Picture array.It enumerates and is not especially limited herein.Then continue at step 303.
In step 303, clicking operation of the unlock terminal detection user to the first level verification interface.For arranging from left to right For four pictures of column, user can come the second from left, a left side three, the first from left and the picture of left four positions, solution by successively clicking Lock terminal again detects the click location.It is safer that verification information is directly inputted according to the method ratio for clicking picture in this way.
In step 304, raw according to the position at the position of clicking operation and clicking operation corresponding first verifying interface At the first verification information.For example, as shown in Fig. 2, the first level verification interface be the 2*2 comprising four pictures picture matrix, The first row arranges picture a, picture b from left to right, and the second row arranges picture c, picture d from left to right.User is by arrow institute in figure Show and successively click picture a, picture b, picture c and picture d, unlock terminal again records the click location and sequence, obtains To verification information.Since by picture validation information, the verification information of input is not easy to be stolen by others, test here The safety for demonstrate,proving information is stronger.Then continue at step 305.
In step 305, unlock terminal judges whether verification information is identical as default verification information, such as verification information and in advance If verification information is different, it is transferred to step 306;If verification information is identical as default verification information, then step 307 is transferred to.
Within step 306, as step 305 obtains the verification information conclusion different from default verification information, then terminal is unlocked Calculate the input number of verification information in setting time.Number is such as inputted equal to setting value, then unlocks terminal within the set time Stop receiving verification information, and user is prompted to cross setting time validation information again, it is small which can be 1 When, 2 hours, 3 hours, enumerate and be not especially limited herein;Number is such as inputted less than setting value, then unlocks terminal notifying user and tests The number demonstrate,proving the number of information input mistake and can also inputting reminds user to input with caution.If the maloperation of user is led Cause the multiple mistake of verification information user can be forbidden to input again within the set time in order to avoid the subsequent maloperation of user Verification information, to improve the safety and reliability of verification information input.
In step 307, as step 305 obtains verification information conclusion identical with default verification information, then terminal is unlocked Show the second level verification interface.The second level verification interface inputs personal identification number for user.Then continue at step 308.
In step 308, unlock terminal receives personal identification number, and wherein the personal identification number is tested by user by the second level Interface input is demonstrate,proved, for unlocking to subscriber identification card.Pass through the input of the verification information in the first level verification interface, user Personal identification number will be inputted, more carefully so as to effectively avoid leading to the feelings of personal identification number input error because of maloperation Condition.Then continue at step 309.
In a step 309, as the personal identification number is identical as the personal identification number prestored, then terminal is unlocked to user identity Identification card is unlocked.
The unlocking process of the subscriber identification card unlocking method of this preferred embodiment is completed in this way.
Preferably, in step 302, since in actual life, there are many password that user needs to remember, therefore in order to mitigate The memory of user is born, and the first level verification interface can also be the picture interface comprising the customized map of user.For example, first First user selects the regional picture representative to user, which can be the behaviour area of user's daily life Domain is also possible to the zone of action of work.It enumerates and is not especially limited herein.Then, user is right from the regionality picture again Specific geographic coordinate is identified, such as the supermarket that user usually buys vegetables, the market etc. gone window-shopping.Material is thus formed include user First level verification interface of customized map.
Next, user on seeing the first level verification interface it is known regionality map when, can to these mark ground Reason coordinate is ranked up according to daily life or Working Life track.For example, as shown in figure 4, route is first to pass through if user goes to work Cross place f, using place g, finally arrive at the destination h, then, user by successively clicked after arriving first place f, place g and Place h.At this point, unlock terminal will detect the clicking operation of user.Uninteresting verification information is converted to just in this way In the route information of memory, the accuracy of verification information input is further improved.
Finally, the order information that unlock terminal is formed according to these clicking operations, generates verification information.
Subscriber identification card unlocking method in this preferred embodiment on the basis of first preferred embodiment, by User input PIN code to SIM card unlock before, also increase the customized map picture verification information of user input, not only into One step improves the safety that SIM card uses, and also further eliminates the interference of extraneous factor, to effectively avoid user The case where maloperation causes SIM card to fail.Meanwhile the customized map picture verification method of user can help user's memory close Code improves the efficiency of verification information input.
Embodiment three
Referring to figure 5., Fig. 5 is the structure of the first preferred embodiment of subscriber identification card tripper of the invention Figure.The subscriber identification card tripper of this preferred embodiment is used to solve the subscriber identification card of unlock terminal Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card Tripper 50 includes unlocking request receiving module 501, the first level verification interface display module 502, verification information receiving module 503, the second level verification interface display module 504, personal identification number receiving module 505 and unlocked state 506.Wherein, it unlocks Request receiving module 501 is used to receive the subscriber identification card unlocking request of user;First level verification interface display module 502 For showing the first level verification interface according to subscriber identification card unlocking request;Verification information receiving module 503 is for receiving Verification information, wherein the verification information passes through the first verifying interface input by user;Second level verification interface display module 504 is used In the verification information inputted according to user, the second level verification interface is shown;Personal identification number receiving module 505 is for receiving individual Identification code, wherein the personal identification number passes through the second verifying interface input by user;Unlocked state 506 is used to be identified according to individual Code, is unlocked subscriber identification card.
Subscriber identification card tripper 50 when in use, first unlocking request receiving module 501 receive user use Family identification card unlocking request.For example, the mobile phone locked for being provided with SIM card, then every time will be defeated after booting Enter PIN code.Therefore, when user's long-pressing cellular phone power supplies key opens mobile phone, subscriber identification card unlocking request will be triggered Instruction, then, unlocking request receiving module 501 receive the subscriber identification card unlocking request.Then call the first level verification Interface display module 502.
Then, the first level verification interface display module 502 shows that the first order is tested according to subscriber identification card unlocking request Interface is demonstrate,proved, wherein the first level verification interface is the picture interface for including an at least picture.For example, first level verification Interface can be a series of pictures and arrange from left to right, be also possible to the picture array of plurality of pictures composition, such as 9 picture groups At 3*3 picture array.It enumerates and is not especially limited herein.Then call verification information receiving module 503.
And then, verification information receiving module 503 receives verification information, and wherein the verification information is tested by user by first Demonstrate,prove interface input.For example, as shown in Fig. 2, the first level verification interface be the 2*2 comprising four pictures picture matrix, first Row arranges picture a, picture b from left to right, and the second row arranges picture c, picture d from left to right.User by shown in arrow in figure according to Secondary click picture a, picture b, picture c and picture d, verification information receiving module 503 again carry out the click location and sequence Record, is verified information.Since by picture validation information, the verification information of input is not easy by other people here It steals, the safety of verification information is stronger.Then call the second level verification interface display module 504.
Then, as the received verification information of verification information receiving module 503 is identical as default verification information, then the second level is tested It demonstrate,proves interface display module 504 and shows that the second level verification interface, the second level verification interface input personal identification number for user.With Personal identification number receiving module 505 is called afterwards.
Subsequently, personal identification number receiving module 505 receives personal identification number, and wherein the personal identification number is passed through by user Second verifying interface input, for being unlocked to subscriber identification card.Pass through the defeated of the verification information in the first level verification interface Enter, user will more carefully input personal identification number, so as to effectively avoid causing personal identification number to input because of maloperation The situation of mistake.Then call unlocked state 506.
Finally, then unlocked state 506 is to user identity identification as the personal identification number is identical as the personal identification number prestored Card is unlocked.
The unlocking process of the subscriber identification card tripper of this preferred embodiment is completed in this way.
Subscriber identification card tripper in this preferred embodiment unlocks SIM card by inputting PIN code in user Before, the input for increasing picture verification information, not only increases the safety that SIM card uses, and also eliminated the dry of extraneous factor It disturbs, to effectively avoid the case where user misoperation causes SIM card to fail.
Example IV
Fig. 6 is please referred to, Fig. 6 is the structure of the second preferred embodiment of subscriber identification card tripper of the invention Figure.The subscriber identification card tripper of this preferred embodiment is used to solve the subscriber identification card of unlock terminal Lock, wherein unlock terminal can be the equipment that mobile phone, tablet computer etc. are equipped with subscriber identification card.The subscriber identification card Tripper 60 includes unlocking request receiving module 601, the first level verification interface display module 602, verification information receiving module 603, the second level verification interface display module 604, personal identification number receiving module 605 and unlocked state 606.Wherein, it verifies Information receiving module 603 includes clicking operation detection unit 6031, verification information generation unit 6032;Second level verification interface is aobvious Show that module 604 includes judging unit 6041, the second level verification boundary element 6042, stops receiving verification information unit 6043.
On the basis of first preferred embodiment, the subscriber identification card tripper 60 of this preferred embodiment is carried out Module refinement.Clicking operation detection unit 6031 is for detecting user to the clicking operation at the first level verification interface;Verifying letter Generation unit 6032 is ceased to be used to be generated according to the position at the position of clicking operation and clicking operation corresponding first verifying interface First verification information;Judging unit 6041 is for judging whether verification information is identical as default verification information;Second level verification circle When face unit 6042 is identical as default verification information for verification information, the second level verification interface is shown;Stop receiving verifying letter Interest statement member 6043 is in verification information and default verification information difference, calculating the input time of verification information in setting time Number;Number is such as inputted equal to setting value, then stops receiving verification information within the set time.
When in use, unlocking request receiving module 601 receives user's to the subscriber identification card tripper 60 first Subscriber identification card unlocking request.For example, the mobile phone locked for being provided with SIM card, then every time will after booting Input PIN code.Therefore, when user's long-pressing cellular phone power supplies key opens mobile phone, subscriber identification card unlocking request will be triggered Instruction, then, unlocking request receiving module 601 receive the subscriber identification card unlocking request.Then the first order is called to test Demonstrate,prove interface display module 602.
Then, the first level verification interface display module 602 shows that the first order is tested according to subscriber identification card unlocking request Interface is demonstrate,proved, wherein the first level verification interface is the picture interface for including an at least picture.For example, first level verification Interface can be a series of pictures and arrange from left to right, be also possible to the picture array of plurality of pictures composition, such as 9 picture groups At 3*3 picture array.It enumerates and is not especially limited herein.Then call the clicking operation in verification information receiving module 603 Detection unit 6031.
And then, clicking operation detection unit 6031 detects user to the clicking operation at the first level verification interface.For from For four pictures of left-to-right arrangement, user can come the second from left, a left side three, the first from left and left four positions by successively clicking Picture, clicking operation detection unit 6031 detect the click location.Then call in verification information receiving module 603 Verification information generation unit 6032.
Then, verification information generation unit 6032 is according to corresponding first verifying in the position of clicking operation and clicking operation The position at interface generates the first verification information.For example, as shown in Fig. 2, the first level verification interface is the 2*2 comprising four pictures Picture matrix, the first row arranges picture a, picture b from left to right, and the second row arranges picture c, picture d from left to right.User By picture a, picture b, picture c and picture d is successively clicked shown in arrow in figure, verification information generation unit 6032 is again to the point It hits position and sequence is recorded, be verified information.Due to passing through picture validation information, the verifying of input here Information is not easy to be stolen by others, and the safety of verification information is stronger.Then call in the second level verification interface display module 604 Judging unit 6041.
Subsequently, judging unit 6041 judges whether verification information is identical as default verification information, such as verification information and in advance If verification information is different, then the stopping in the second level verification interface display module 604 is called to receive verification information unit 6043;Such as Verification information is identical as default verification information, then second level verification circle of the modulation in the second level verification interface display module 604 Face unit 6042.
If judging unit 6041 obtains the verification information conclusion different from default verification information, then stop receiving verification information Unit 6043 calculates the input number of verification information in setting time.Number is such as inputted equal to setting value, then unlocks terminal and is setting Interior stopping of fixing time receives verification information, and user is prompted to cross setting time validation information again, which can To be 1 hour, 2 hours, 3 hours, enumerates and be not especially limited herein.This is less than setting value such as input number, then unlocks terminal The number that prompts the number of user authentication information input error and can also input reminds user to input with caution.If user Maloperation lead to the multiple mistake of verification information, in order to avoid the subsequent maloperation of user, can forbid using within the set time Family validation information again, to improve the safety and reliability of verification information input.
If judging unit 6041 obtains verification information conclusion identical with default verification information, then the second level verification interface is single Member 6042 shows the second level verification interface.The second level verification interface inputs personal identification number for user.It then calls personal Identification code receiving module 605.
Then, personal identification number receiving module 605 receives personal identification number, and wherein the personal identification number passes through the by user Second verification interface input, for being unlocked to subscriber identification card.Pass through the defeated of the verification information in the first level verification interface Enter, user will more carefully input personal identification number, so as to effectively avoid causing personal identification number to input because of maloperation The situation of mistake.Then call unlocked state 606.
Finally, then unlocked state 606 is to user identity identification as the personal identification number is identical as the personal identification number prestored Card is unlocked.
The unlocking process of the subscriber identification card tripper of this preferred embodiment is completed in this way.
Preferably, since in actual life, there are many password that user needs to remember, thus it is negative in order to mitigate the memory of user It carries on a shoulder pole, the first level verification interface shown in the first level verification interface display module 602 can also be comprising the customized map of user Picture interface.For example, firstly, user selects the regional picture representative to user, which can To be the zone of action of user's daily life, it is also possible to the zone of action of work.It enumerates and is not especially limited herein.Then, User is again identified specific geographic coordinate from the regionality picture, such as the supermarket that user usually buys vegetables, the quotient to go window-shopping Etc..Material is thus formed the first level verification interfaces comprising the customized map of user.
Next, user on seeing the first level verification interface it is known regionality map when, can to these mark ground Reason coordinate is ranked up according to daily life or Working Life track.For example, route is to first pass through as shown in figure 4, user goes to work Place f finally arrives at the destination h using place g, and then, user is by successively clicking place f, place g and ground after arriving first Point h.At this point, clicking operation detection unit 6031 will detect the clicking operation of user.Uninteresting verifying is believed in this way The route information that breath is converted to convenient for memory further improves the accuracy of verification information input.
Finally, it is verified that the order information that information generating unit 6032 is formed according to these clicking operations, generates verification information.
Subscriber identification card tripper in this preferred embodiment on the basis of first preferred embodiment, by User input PIN code to SIM card unlock before, also increase the customized map picture verification information of user input, not only into One step improves the safety that SIM card uses, and also further eliminates the interference of extraneous factor, to effectively avoid user The case where maloperation causes SIM card to fail.Meanwhile the customized map picture verification method of user can help user's memory close Code improves the efficiency of verification information input.
Embodiment five
Fig. 7 is the specific implementation of subscriber identification card unlocking method and subscriber identification card tripper of the invention The schematic diagram of a scenario of example.
In step 701, user's long-pressing power key opens mobile phone, triggers SIM card unlocking request.
In a step 702, mobile phone receives SIM card unlocking request, shows that the first order including map picture is tested to user Demonstrate,prove interface.As shown in figure 8, map denotation on the first level verification interface is user from the home to the image between school, On the main road bridge B, C and loop D that user successively to be passed through from family A to school E is marked, place F, place is in addition also marked The tri- unrelated places G and place H.Then mobile phone prompt user is ranked up the above place.Only when user inputs correctly When point sequence, it could further input PIN code and SIM card is unlocked.
In step 703, user sees the map, understand be arranged by the sequence successively passed through from the home to school A, B, C, five places D, E.Then user is successively clicked the place on map by sequence shown in arrow in Fig. 8, generates verifying Information.
In step 704, mobile phone receives the verification information, it is compared with the verification information prestored, obtains comparing identical Result.
In step 705, since the verification information is identical as the verification information prestored, then mobile phone shows to user and inputs Second level verification interface of PIN code.
In step 706, user inputs PIN code in the second level verification interface.
In step 707, mobile phone receives the PIN code of user's input, compares with the PIN code prestored, discovery comparison knot Fruit is identical, is then unlocked to SIM card.
The subscriber identification card unlocking method and subscriber identification card unlock of this specific embodiment are completed in this way The process that device unlocks subscriber identification card.
Subscriber identification card unlocking method and subscriber identification card tripper in the present invention is in verifying PIN code pair Before SIM card unlock, increase the input of one-time authentication information, SIM card caused by can effectively avoiding because of maloperation fails, and mentions High anti-interference;Solve existing subscriber identification card unlocking method and subscriber identification card tripper vulnerable to outer The technical issues of boundary's factor is interfered, and causes subscriber identification card to fail because of user misoperation.
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit list It is solely physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module can both use Formal implementation of hardware can also be realized in the form of software function module.If the integrated module is with software function The form of module is realized and when sold or used as an independent product, also can store in computer-readable storage Jie In matter.Storage medium mentioned above can be read-only memory, disk or CD etc..Above-mentioned each device or system, can be with Execute the method in correlation method embodiment.
In conclusion although the present invention has been disclosed above in the preferred embodiment, but above preferred embodiment is not to limit The system present invention, those skilled in the art can make various changes and profit without departing from the spirit and scope of the present invention Decorations, therefore protection scope of the present invention subjects to the scope of the claims.

Claims (5)

1. a kind of subscriber identification card unlocking method is unlocked for the subscriber identification card to unlock terminal, special Sign is, comprising:
For being provided with the terminal of subscriber identification card locking, need to input subscriber identification card after powering a accordingly People's identification code can trigger the instruction of subscriber identification card unlocking request when user's long-pressing terminal supplying power key opens terminal, and Receive the subscriber identification card unlocking request of user;
According to the subscriber identification card unlocking request, show that the first level verification interface, first level verification interface are to use The picture interface of the customized map in family is identified specific geographic coordinate in the picture interface, and formation is made by oneself comprising user First level verification interface of free burial ground for the destitute figure is verified information according to by arriving first the rear sequence place that successively record user clicks;
Verification information is received, wherein the verification information is inputted by the user by first level verification interface;
According to the verification information that the user inputs, the second level verification interface is shown;
Personal identification number is received, wherein the personal identification number is inputted by the user by second level verification interface;With And
According to the personal identification number, subscriber identification card is unlocked.
2. subscriber identification card unlocking method according to claim 1, which is characterized in that described defeated according to the user The verification information entered, show the second level verification interface the step of include:
Judge whether the verification information is identical as default verification information;
If the verification information is identical as default verification information, then second level verification interface is shown;
If the verification information is different from default verification information, then the input number of the verification information in setting time is calculated; If the input number is equal to setting value, then stop receiving the verification information in the setting time.
3. a kind of subscriber identification card tripper is unlocked for the subscriber identification card to unlock terminal, special Sign is, comprising:
Unlocking request receiving module needs to input after powering for the terminal for being provided with subscriber identification card locking The corresponding personal identification number of subscriber identification card can trigger user identity when user's long-pressing terminal supplying power key opens terminal The instruction of identification card unlocking request, and receive the subscriber identification card unlocking request of user;
First level verification interface display module, for showing the first level verification according to the subscriber identification card unlocking request Interface, first level verification interface are the picture interface of the customized map of user, are sat to specific geographic in the picture interface Mark is identified, and forms the first level verification interface comprising the customized map of user, according to by sequence after arriving first, successively record is used The place that family is clicked, is verified information;
Verification information receiving module, for receiving verification information, wherein the verification information passes through described first by the user The input of level verification interface;
Second level verification interface display module, the verification information for being inputted according to the user show the second level verification interface;
Personal identification number receiving module, for receiving personal identification number, wherein the personal identification number passes through institute by the user State the input of the second level verification interface;And
Unlocked state, for being unlocked to subscriber identification card according to the personal identification number.
4. subscriber identification card tripper according to claim 3, which is characterized in that second level verification interface Display module specifically includes:
Judging unit, for judging whether the verification information is identical as default verification information;
Second level verification boundary element shows that the second level is tested when identical as default verification information for the verification information Demonstrate,prove interface;
Stop receiving verification information unit, for calculating setting time in the verification information and default verification information difference The input number of the interior verification information;If the input number is equal to setting value, then stop receiving in the setting time The verification information.
5. a kind of storage medium, is stored with computer program, which is characterized in that when the computer program is executed by processor Realize the method as described in claim 1.
CN201510793800.8A 2015-11-17 2015-11-17 Subscriber identification card unlocking method and subscriber identification card tripper Expired - Fee Related CN105790949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510793800.8A CN105790949B (en) 2015-11-17 2015-11-17 Subscriber identification card unlocking method and subscriber identification card tripper

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510793800.8A CN105790949B (en) 2015-11-17 2015-11-17 Subscriber identification card unlocking method and subscriber identification card tripper

Publications (2)

Publication Number Publication Date
CN105790949A CN105790949A (en) 2016-07-20
CN105790949B true CN105790949B (en) 2019-09-13

Family

ID=56390239

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510793800.8A Expired - Fee Related CN105790949B (en) 2015-11-17 2015-11-17 Subscriber identification card unlocking method and subscriber identification card tripper

Country Status (1)

Country Link
CN (1) CN105790949B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951604B (en) * 2019-02-27 2021-10-15 维沃移动通信有限公司 Message processing method, mobile terminal and user identity identification module
CN110362988A (en) * 2019-07-19 2019-10-22 深圳传音控股股份有限公司 Unlocking method, intelligent terminal and the readable storage medium storing program for executing of intelligent terminal clamping lock
WO2021114009A1 (en) * 2019-12-09 2021-06-17 Qualcomm Incorporated Universal integrated circuit card (uicc) activation
CN112019684A (en) * 2020-08-10 2020-12-01 Oppo(重庆)智能科技有限公司 Control method and electronic device
CN116484352B (en) * 2023-04-21 2024-03-15 贵州电网有限责任公司 Management method of power grid equipment information model library and design access network system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018373A (en) * 2007-01-22 2007-08-15 华为技术有限公司 Method for locking the mobile station device, mobile station device and network device
CN102360409A (en) * 2011-09-29 2012-02-22 北京百度网讯科技有限公司 Method for generating verification codes as well as method and detection for verification
CN104023029A (en) * 2014-06-19 2014-09-03 百度在线网络技术(北京)有限公司 Method and device for verifying verification codes
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7992006B2 (en) * 2007-08-06 2011-08-02 Mitac International Corp. Smart card data protection method and system thereof
CN101645121A (en) * 2008-08-06 2010-02-10 深圳富泰宏精密工业有限公司 System and method for setting password protection by utilizing picture

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101018373A (en) * 2007-01-22 2007-08-15 华为技术有限公司 Method for locking the mobile station device, mobile station device and network device
CN102360409A (en) * 2011-09-29 2012-02-22 北京百度网讯科技有限公司 Method for generating verification codes as well as method and detection for verification
CN104023029A (en) * 2014-06-19 2014-09-03 百度在线网络技术(北京)有限公司 Method and device for verifying verification codes
CN104660613A (en) * 2015-03-16 2015-05-27 联想(北京)有限公司 Authentication method of user identification module and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
拒绝恶作剧:Win10 Mobile启用防误触密码;IT之家;《IT之家/WP之家/Windows Phone新闻(https://m.ithome.com/html/162234.htm)》;20150712;1-2 *

Also Published As

Publication number Publication date
CN105790949A (en) 2016-07-20

Similar Documents

Publication Publication Date Title
CN105790949B (en) Subscriber identification card unlocking method and subscriber identification card tripper
CN109255211B (en) Mobile security countermeasure
CN109492378A (en) A kind of auth method based on EIC equipment identification code, server and medium
CN104009977B (en) A kind of method and system of information protection
Lee et al. An empirical study of wireless carrier authentication for {SIM} swaps
US8387119B2 (en) Secure application network
CN108183924A (en) A kind of login validation method and terminal device
JP6310160B1 (en) Multi-granular authentication technique
US10231124B2 (en) Anti-theft method and client for a mobile terminal
CN109587110A (en) A kind of weak passwurd detection method, device, computer equipment and service server
US8683563B1 (en) Soft token posture assessment
CN109561085A (en) A kind of auth method based on EIC equipment identification code, server and medium
TR201810890T4 (en) A method and system that protects against identity theft or copy abuse.
Marforio et al. Evaluation of personalized security indicators as an anti-phishing mechanism for smartphone applications
CN107241192B (en) A kind of method and device logged in using fingerprint key
CN105608359A (en) Unlocking verification method, unlocking verification apparatus and terminal
CN106845181A (en) The acquisition methods and electronic equipment of a kind of password
CN106161183B (en) Method for message interaction and social interaction server device and communication system
CN109002733A (en) A kind of pair of equipment carries out the method and device of reliability evaluation
CN110011953A (en) Stolen password is prevented to use again
US8938805B1 (en) Detection of tampering with software installed on a processing device
CN104853030B (en) The method and mobile terminal of a kind of information processing
CN107612915A (en) The method and apparatus of the anti-password cracking of double secure forms based on checking code conversion
CN107294981B (en) Authentication method and equipment
Anbalagan et al. Trusted application using biometrics for android environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190913

CF01 Termination of patent right due to non-payment of annual fee