CN105812539A - Unlocking device and unlocking method - Google Patents

Unlocking device and unlocking method Download PDF

Info

Publication number
CN105812539A
CN105812539A CN201610274449.6A CN201610274449A CN105812539A CN 105812539 A CN105812539 A CN 105812539A CN 201610274449 A CN201610274449 A CN 201610274449A CN 105812539 A CN105812539 A CN 105812539A
Authority
CN
China
Prior art keywords
formation
unblock
user
puk
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610274449.6A
Other languages
Chinese (zh)
Inventor
徐才茂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610274449.6A priority Critical patent/CN105812539A/en
Publication of CN105812539A publication Critical patent/CN105812539A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an unlocking method and an unlocking device. The unlocking method comprises the steps of setting an unlocking array and an unlocking code corresponding to the unlocking array; receiving an unlocking path input by a user and judging whether the unlocking path corresponds to the unlocking code; if the judgment result is positive, indicating that the unlocking is successful; and if the judgment result is negative, indicating that the unlocking is failed. Through the abovementioned method, the unlocking method and the unlocking device can realize relatively high safety at a relatively low cost.

Description

A kind of tripper and solution locking method
Technical field
The present invention relates to electronic product technical field of safety protection, especially relate to a kind of tripper and solve locking method.
Background technology
Mobile terminal, for instance mobile phone is as now the most popular, and has the communication tool of extremely popularity, plays irreplaceable effect in the life of people.The chat information that obtains, bank card password, identity card etc. personal information of user is all saved in mobile phone.Especially business people, trade secret also preserves typically by mobile phone.If mobile phone lost in the process used, then very likely it is acquired relevant information to carry out corresponding illegal activity, thus bringing loss to cellphone subscriber.
At present, above-mentioned phenomenon method is prevented usually by the method for screen locking.But, mobile phone screen locking generally includes: this several ways of fingerprint recognition, numerical ciphers and graphical passwords.The unlocking manner of corresponding mobile phone mainly has following several: fingerprint recognition unblock, numerical ciphers and graphical passwords.The safety order solving locking method of these several mobile phones is: fingerprint recognition unlocks > numerical ciphers > graphical passwords.But fingerprint recognition unlocks needs corresponding hardware unit, and higher cost structure, and this is for low-end product, is be beyond one's reach.
Summary of the invention
The technical problem that present invention mainly solves is to provide a kind of tripper and solves locking method, it is possible to realize higher safety by relatively low cost.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: providing one to solve locking method, this solution locking method comprises the following steps: arranges and unlocks formation and unlock the PUK that formation is corresponding;Receive the unblock path of user's input, and whether judge to unlock path corresponding with PUK;If the result judged is yes, then unlock successfully;If the result judged is no, then unlock failure.
Wherein, arrange to unlock formation and unlock the step of PUK corresponding to formation and include: receive the unblock formation that user selects to preset, and then the PUK of correspondence is set.
Wherein, arrange to unlock formation and unlock the step of PUK corresponding to formation and include: receive the unblock formation of user's input, and then the PUK of correspondence is set.
Wherein, also include before receiving the step unlocking path of user's input: receive the unblock formation that user selects.
Wherein, method also includes: judge that whether the unblock formation that user selects is correct, and when the result judged is as being, performs to receive the step unlocking path of user's input.
For solving above-mentioned technical problem, another technical solution used in the present invention is: provide a kind of tripper, it is characterised in that tripper includes: arrange module, unlocks formation for arranging and unlocks the PUK that formation is corresponding;Receiver module, for receiving the unblock path of user's input;Judge module, is used for judging to unlock path whether corresponding with PUK;Processing module, for when the result that judge module judges is as being, resolving to and unlock successfully, when the result that judge module judges is no, resolves to and unlocks unsuccessfully.
Wherein, module is set and includes: receive unit, the unblock formation preset for receiving user to select;Unit is set, the PUK corresponding for arranging the described unblock formation selecting to preset with received user.
Wherein, receiver module includes: receive unit, for receiving the unblock formation of user's input;Unit is set, for arranging the PUK corresponding with the described unblock formation of received user input.
Wherein, receiver module receives, the taking a step forward of path that unlock receiving user's input, the unblock formation that user selects.
Wherein, it is judged that module determines whether that whether the unblock formation that user selects is correct;Processing module, when the result that judge module judges is as being, controls receiver module and receives the unblock path of user's input.
The invention has the beneficial effects as follows: be different from the situation of prior art, the invention provides a kind of tripper and solve locking method, this solution locking method comprises the following steps: first arranges and unlocks formation and unlock the PUK that formation is corresponding, then the unblock path of user's input is received, and whether with PUK corresponding, if the result judged is yes, then unlock successfully if judging to unlock path, if the result judged is no, then unlock failure.Therefore, present invention incorporates unblock formation and two unlocking conditions of PUK are unlocked, it is achieved that the high security of code-locked, further, the present invention, without the hardware unit of high cost, therefore also achieves low-cost production.
Accompanying drawing explanation
Fig. 1 is a kind of flow chart solving locking method that the embodiment of the present invention provides;
The one that Fig. 2 is the method shown in corresponding diagram 1 unlocks path;
Fig. 3 is the structural representation of a kind of tripper that the embodiment of the present invention provides.
Detailed description of the invention
Referring to Fig. 1, Fig. 1 is a kind of flow chart solving locking method that the embodiment of the present invention provides.As it is shown in figure 1, the solution locking method of the present embodiment comprises the following steps:
Step S1: arrange and unlock formation and unlock the PUK that formation is corresponding.
Wherein, the unblock formation in the present embodiment refers to the formation of various game, sports or chess activity etc..The formation of such as sports, such as football formation, in order to adaptation zone is defended, mill pace control, the needs of off-the-ball running, whole team team member on the field carries out position arrangement and division of duty.The formation of current football world has 442,4231,433,4141 and 352 etc..Wherein, the title of formation is the shape of the arrangement according to team member and fixed, and the numeral in formation is number.Such as 4-4-2 formation refers to 4 rear guards of employing, the play of 4 midfields and two forwards.As in figure 2 it is shown, goalkeeper is No. 1, rear guard is No. 2-5, and midfield is No. 6-9, and forward is No. 10-11.In like manner, the principle of other formation 4231,433,4141 and 352 etc. is identical with 442, does not repeat them here.The present embodiment is arranged and is passed by goalkeeper, through upper several sportsmen transmission of going through the motions, send into the other side gate as unlocking Success Flag.
Described above be football in sports formation arrange.It arranges unblock formation mainly by the position queueing discipline of team member in football activity.In like manner, other unlock formation is utilize the ad hoc rule in this kind of campaign item to arrange unblock formation equally.Do not repeat them here.
Wherein, the method to set up in this step includes following two:
First method is: receives the unblock formation that user selects to preset, and then arranges the PUK of correspondence.
Specifically, first preset multiple unblock formation and select for user, after user chooses unblock formation, the PUK that prompting this unblock formation of user setup is corresponding further.Accept the example of previously described football formation 442.First provide 442,4231,433,4141 and 352 formations to select to user, after receiving the formation that user selects 442, receive user further and select the concrete path in this 4-4-2 formation.As shown in Figure 2, for instance user can select to serve a ball to right back No. 2 from goalkeeper No. 1, and then right back No. 2 is communicated to left center-forward 9, and then left center-forward 9 conveys to left forward No. 11, being shot by left forward No. 11, such a unblock path, namely corresponding PUK is 12911.In order to ensure the complexity unlocked, sportsman's number of the process arranging pass can freely set, and the sportsman of process can repeat.
Second method is: receives the unblock formation of user's input, and then arranges the PUK of correspondence.It is to say, the unblock formation of second method is also by user's self-defining, thus more meet the individual character of different user, improve the experience of user.Should be understood that the setting of the PUK of second method is identical with arranging of the PUK of first method, do not repeat them here.
Both the above method to set up is all arrange PUK by the set formation of activity engagement or project, and the advantage combining orientation password and graphical passwords, and orientation password is provided that the safety that relatively numerical ciphers is same, both the high security of numerical ciphers had been taken into account, achieve again graphical passwords interest, solve the dry as dust of numerical ciphers and the simple of graphical passwords easily cracks problem.The ABC of football can be deepened to understand by let us again by this unlocking manner simultaneously, is an absorbing thing for football fan.
Further, may be provided for the mode of association when decoding helps user to decode, namely first user can associate football is serve a ball to right back from goalkeeper, then right back is communicated to left center-forward, and then left center-forward conveys to left forward, by left forward shoot such a scene obtain correspondence PUK, which thereby enhance user memory.
Step S2: receive user and input the solution path of lock, and whether judge to unlock path corresponding with PUK.If the result judged is yes, then jump to step S3, if the result judged is no, then jump to step S4.
Wherein, before this step, still further comprise the unblock formation receiving user's selection.
Specifically, it is first provided to user at unblock interface and unlocks selection or the input of formation, and then judge that whether the unblock formation that user selects is correct, and when the result judged is as being, jump to the interface unlocking path input, whether and then receive the unblock path that user inputs, and it is corresponding with PUK to carry out judging to unlock path.Returning information when the unblock formation determining user's selection is incorrect, prompting user reselects unblock formation.
Step S3: unlock successfully.
In this step, jump to next interface after unlocking successfully, or open certain specific function.
Step S4: unlock unsuccessfully.
In this step, when unlocking unsuccessfully, return corresponding information further.Such as point out user: unblock formation is made mistakes or unlocked path and makes mistakes.
Described in brought forward, the locking method that solves of the present invention can by the relatively low safety becoming original realization higher.
Present invention also offers a kind of tripper, it is adaptable to previously described solution locking method, the tripper of the present invention is applied in the electronic device that be there is a need to be unlocked, for instance mobile phone, computer and antitheft door etc..
Specifically referring to Fig. 3, the tripper 30 of the present embodiment includes arranging module 31, receiver module 32, judge module 33 and processing module 34.
Wherein, arrange module 31 unlock formation for arranging and unlock the PUK that formation is corresponding.
Wherein, the unblock formation in the present embodiment refers to the formation of various game, sports or chess activity etc..The football formation of the sports such as illustrated above.
Concrete, module 31 is set and includes receiving unit 311 and arranging unit 312, wherein, the setting of the present embodiment includes following two method:
First method is: receives unit 311 and receives the unblock formation that user selects to preset, arranges unit 312 and arrange the PUK of correspondence.
Specifically, first preset multiple unblock formation and select for user, after user chooses unblock formation, the PUK that prompting this unblock formation of user setup is corresponding further.Accept the example of previously described football formation 442.First 442,4231,433 are provided, 4141 and 352 formations select to user, after receiving the formation that user selects 442, receive user further and select the concrete path in this 4-4-2 formation, shown in Fig. 2, such as user can select to serve a ball to right back No. 2 from goalkeeper No. 1, then right back No. 2 is communicated to left center-forward 9, and then left center-forward 9 conveys to left forward No. 11, left forward No. 11 shoot, such a unblock path, namely corresponding PUK is 12911.In order to ensure the complexity unlocked, sportsman's number of the process arranging pass can freely set, and the sportsman of process can repeat.
Second method is: receives unit 311 and receives the unblock formation of user's input, arranges unit 312 for arranging the PUK corresponding with the described unblock formation of received user input.It is to say, the unblock formation of second method is also by user's self-defining, thus more meet the individual character of different user, improve the experience of user.Should be understood that the setting of the PUK of second method is identical with arranging of the PUK of first method, do not repeat them here.
Both the above method to set up is all arrange PUK by the set formation of activity engagement or project, and the advantage combining orientation password and graphical passwords, and orientation password is provided that the safety that relatively numerical ciphers is same, both the high security of numerical ciphers had been taken into account, achieve again graphical passwords interest, the ABC of football can be deepened to understand by let us again by this unlocking manner simultaneously, is an absorbing thing for football fan.
Further, may be provided for the mode of association when decoding helps user to decode, namely first user can associate football is serve a ball to right back from goalkeeper, then right back is communicated to left center-forward, and then left center-forward conveys to left forward, by left forward shoot such a scene obtain correspondence PUK, which thereby enhance user memory.
Receiver module 32 connects the unblock path for receiving user's input.Whether judge module 33 judges to unlock path corresponding with PUK.Processing module 34, for when the result that judge module 33 judges is as being, resolving to and unlock successfully, when the result that judge module 33 judges is no, resolves to and unlocks unsuccessfully.Further, control jumps to next interface in the post-processing module 34 unlocked successfully, or open certain specific function, when unlocking unsuccessfully, processing module 34 returns corresponding information further.
Wherein, receiver module 32 receives, the taking a step forward of path that unlock receiving user's input, the unblock formation that user selects.Specifically, it is first provided to user at unblock interface and unlocks selection or the input of formation, judge module 33 judges that whether the unblock formation that receiver module 32 receives is correct, processing module 34 determines user at judge module 33 and correctly selects to unlock formation or input unlocks after formation, jump to the interface unlocking path input, and then control receiver module 32 receives the unblock path of user's input, returning information when the unblock formation that judge module 33 determines user's selection is incorrect, prompting user reselects unblock formation.
In sum, the present invention can become originally to realize higher safety by relatively low.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention and accompanying drawing content to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, all in like manner include in the scope of patent protection of the present invention.

Claims (10)

1. one kind solves locking method, it is characterised in that described solution locking method comprises the following steps:
Arrange and unlock formation and PUK corresponding to described unblock formation;
Receive the unblock path of user's input, and judge that whether described unblock path is corresponding with described PUK;
If the result judged is yes, then unlock successfully;
If the result judged is no, then unlock failure.
2. solution locking method according to claim 1, it is characterised in that the described step unlocking formation and PUK corresponding to described unblock formation that arranges includes:
Receive the unblock formation that user selects to preset, and then the PUK of described correspondence is set.
3. solution locking method according to claim 1, it is characterised in that the described step unlocking formation and PUK corresponding to described unblock formation that arranges includes:
Receive the unblock formation of user's input, and then the PUK of described correspondence is set.
4. solution locking method according to claim 1, it is characterised in that also include before the step unlocking path of described reception user input:
Receive the unblock formation that user selects.
5. solution locking method according to claim 4, it is characterised in that described method also includes:
Judge that whether the unblock formation that user selects is correct, and when the result judged is as being, perform the step unlocking path of the described user of reception input.
6. a tripper, it is characterised in that described tripper includes:
Module is set, unlocks formation and PUK corresponding to described unblock formation for arranging;
Receiver module, for receiving the unblock path of user's input;
Judge module, is used for judging that whether described unblock path is corresponding with described PUK;
Processing module, for when the result that described judge module judges is as being, resolving to and unlock successfully, when the result that described judge module judges is no, resolves to and unlock unsuccessfully.
7. tripper according to claim 6, it is characterised in that the described module that arranges includes:
Receive unit, the unblock formation preset for receiving user to select;
Unit is set, the PUK corresponding for arranging the described unblock formation selecting to preset with received user.
8. tripper according to claim 6, it is characterised in that described receiver module includes:
Receive unit, for receiving the unblock formation of user's input;
Unit is set, for arranging the PUK corresponding with the described unblock formation of received user input.
9. tripper according to claim 6, it is characterised in that described receiver module receives, the taking a step forward of path that unlock receiving user's input, the unblock formation that user selects.
10. tripper according to claim 9, it is characterised in that described judge module determines whether that whether the unblock formation that user selects is correct;
Described processing module, when the result that described judge module judges is as being, controls receiver module and receives the unblock path of user's input.
CN201610274449.6A 2016-04-28 2016-04-28 Unlocking device and unlocking method Pending CN105812539A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610274449.6A CN105812539A (en) 2016-04-28 2016-04-28 Unlocking device and unlocking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610274449.6A CN105812539A (en) 2016-04-28 2016-04-28 Unlocking device and unlocking method

Publications (1)

Publication Number Publication Date
CN105812539A true CN105812539A (en) 2016-07-27

Family

ID=56458977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610274449.6A Pending CN105812539A (en) 2016-04-28 2016-04-28 Unlocking device and unlocking method

Country Status (1)

Country Link
CN (1) CN105812539A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480505A (en) * 2017-07-11 2017-12-15 广州视源电子科技股份有限公司 Equipment unlocking path generation method and device, unlocking method and device, and terminal
CN112198958A (en) * 2020-09-04 2021-01-08 上海硬通网络科技有限公司 Interaction method and device based on virtual path and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120108715A (en) * 2011-03-25 2012-10-05 세종대학교산학협력단 System and method for controling locking of touch screen
CN104536686A (en) * 2014-12-23 2015-04-22 北京元心科技有限公司 Screen unlocking method and device
CN104660786A (en) * 2013-11-21 2015-05-27 上海斐讯数据通信技术有限公司 Mobile terminal, setting method of unlocking password and unlocking method
CN104885049A (en) * 2014-03-12 2015-09-02 华为终端有限公司 A lock screen method and mobile terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120108715A (en) * 2011-03-25 2012-10-05 세종대학교산학협력단 System and method for controling locking of touch screen
CN104660786A (en) * 2013-11-21 2015-05-27 上海斐讯数据通信技术有限公司 Mobile terminal, setting method of unlocking password and unlocking method
CN104885049A (en) * 2014-03-12 2015-09-02 华为终端有限公司 A lock screen method and mobile terminal
CN104536686A (en) * 2014-12-23 2015-04-22 北京元心科技有限公司 Screen unlocking method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107480505A (en) * 2017-07-11 2017-12-15 广州视源电子科技股份有限公司 Equipment unlocking path generation method and device, unlocking method and device, and terminal
CN107480505B (en) * 2017-07-11 2019-09-03 广州视源电子科技股份有限公司 Equipment unlocking path generation method and device, unlocking method and device, and terminal
CN112198958A (en) * 2020-09-04 2021-01-08 上海硬通网络科技有限公司 Interaction method and device based on virtual path and electronic equipment

Similar Documents

Publication Publication Date Title
CN109389727A (en) Method for unlocking, system and computer readable storage medium
US8670709B2 (en) Near-field communication (NFC) system providing mobile wireless communications device operations based upon timing and sequence of NFC sensor communication and related methods
JP2006189999A (en) Security management method, program, and information apparatus
Chong et al. GesturePIN: using discrete gestures for associating mobile devices
CN104270741A (en) Terminal locking method and device
CN102460451A (en) Method and apparatus for preventing unauthorized use of computing devices
CN110406414A (en) Vehicular charging method, mobile terminal and server based on household charging pile
CN102968275A (en) Unlocking method and system of mobile terminal
CN103995994A (en) Touch screen password setting and unlocking method and device
CN105812539A (en) Unlocking device and unlocking method
CN105334970A (en) Terminal application locking method and system as well as terminal
CN103024135A (en) Mobile terminal unlocking device and unlocking method thereof
CN104539320A (en) Pairing method for Bluetooth devices
CN109559415A (en) A kind of intelligent door lock control method and intelligent door lock
CN106228655B (en) A kind of method of user account binding smart lock
CN106372468A (en) Mobile terminal operation method and mobile terminal
Safkhani et al. On the security of Tan et al. serverless RFID authentication and search protocols
CN101651861A (en) Method and device for encrypting mobile phone programs
CN101398951B (en) Electronic card verification method and electronic card service platform
CN106254942A (en) A kind of control the method for television system, television system and mobile terminal
CN101277183A (en) Input method and system for logging information as well as method for implementing system
Crossman et al. Two-factor authentication through near field communication
CN104660786B (en) The method to set up and unlocking method of a kind of mobile terminal, unlocking pin
CN105512526A (en) Quick unlocking method and device of terminal device
US11494480B2 (en) Authentication method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160727