CN106126986B - Unlocking processing method and device for locked data partition - Google Patents

Unlocking processing method and device for locked data partition Download PDF

Info

Publication number
CN106126986B
CN106126986B CN201610425400.6A CN201610425400A CN106126986B CN 106126986 B CN106126986 B CN 106126986B CN 201610425400 A CN201610425400 A CN 201610425400A CN 106126986 B CN106126986 B CN 106126986B
Authority
CN
China
Prior art keywords
security code
server
input
verification
verification key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610425400.6A
Other languages
Chinese (zh)
Other versions
CN106126986A (en
Inventor
李明浩
赵建凯
张墅潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610425400.6A priority Critical patent/CN106126986B/en
Publication of CN106126986A publication Critical patent/CN106126986A/en
Application granted granted Critical
Publication of CN106126986B publication Critical patent/CN106126986B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosure relates to an unlocking processing method and device for a locked data partition. The method comprises the following steps: acquiring a set unlocking password, generating a first verification key according to the unlocking password, and storing the first verification key in a local terminal; generating a security code, generating a second verification key according to the security code, storing the second verification key in the local terminal, and storing the generated security code in the server; when the verification result of verifying the input unlocking password by using the first verification key is that the verification is not passed, receiving an input command of acquiring a security code; sending a request for acquiring a security code to a server, and sending the security code stored in the server to a preset object by the server; receiving an input security code, and verifying the input security code by using a second verification key; and when the input security code passes the verification, unlocking. When the user forgets the unlocking password, the unlocking can be completed by using the preset security code without formatting the data partition, and a security unlocking mechanism is provided.

Description

Unlocking processing method and device for locked data partition
Technical Field
The present disclosure relates to the field of unlocking technologies, and in particular, to an unlocking processing method and apparatus for a locked data partition.
Background
At present, the Android system forces the machine of M system to open the encrypted function of acquiescent full disk, and this has also brought the hidden danger for the user when bringing safety for the user, because encrypt the disk and need the support of user lock screen password, but present a lot of cell-phones have supported the more convenient unblock mode of fingerprint or bracelet, just so cause very easily that user's lock screen password forgets, in case the user forgets lock screen password, want to unblock again just can reformatting encrypted data partition.
Disclosure of Invention
The embodiment of the disclosure provides an unlocking processing method and device for a locked data partition. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided an unlocking processing method for a locked data partition, including:
acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
generating a security code, generating a second verification key according to the generated security code, storing the second verification key in a local terminal, and storing the generated security code in a server on a network side;
when the verification result of verifying the input unlocking password by using the first verification key is that the input unlocking password is not verified, receiving an input command for acquiring a security code;
sending a request for acquiring a security code to the server, and sending the security code stored in the server to a preset object by the server;
receiving an input security code, and verifying the input security code by using the second verification key;
and when the input security code passes the verification, unlocking the locked data partition.
In one embodiment, after the unlocking the locked data partition, the method further comprises:
outputting a prompt for resetting an unlocking password;
and acquiring the reset unlocking password.
In one embodiment, the generating a first verification key according to the set unlocking password includes:
generating the first verification key by using the set unlocking password, an encryption algorithm and a key stored in a local terminal;
the generating a second verification key according to the generated security code includes:
and generating the second verification key by using the generated security code, the encryption algorithm and a key.
In one embodiment, the preset object includes a binding object or an object currently provided to the server.
In one embodiment, when the preset object includes a binding object, after the generating the security code, the method further includes:
receiving an input identification of a first object;
and setting the identifier of the first object as the identifier of the binding object.
In one embodiment, when the preset object includes an object currently provided to the server, the sending the request for obtaining the security code to the server includes:
receiving an input identification of a second object;
and sending the identifier of the second object to the server while sending a request for acquiring the security code to the server.
In one embodiment, after receiving the input of the identification of the second object, the method further includes:
verifying the second object;
the sending the identifier of the second object to the server while sending the request for obtaining the security code to the server includes:
and when the second object passes the verification, sending a request for acquiring a security code to the server and sending the identification of the second object to the server.
In one embodiment, the receiving an input command to acquire a security code includes:
monitoring that a preset key of the local terminal is triggered in a preset mode; and/or
And monitoring that the touch screen of the local terminal is touched in a preset touch mode.
According to a second aspect of the embodiments of the present disclosure, there is provided an unlocking processing apparatus for a locked data partition, including:
the first processing module is used for acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
the second processing module is used for generating a security code, generating a second verification key according to the generated security code, storing the second verification key in a local terminal, and storing the generated security code in a server on a network side;
the first receiving module is used for receiving an input command for acquiring the security code when the verification result of verifying the input unlocking password by using the first verification key is that the input unlocking password is not verified;
the request module is used for sending a request for acquiring the security code to the server, and the server sends the stored security code to a preset object;
the first verification module is used for receiving an input security code and verifying the input security code by using the second verification key;
and the unlocking module is used for unlocking the locked data partition when the input security code passes the verification.
In one embodiment, the apparatus further comprises:
the prompting module is used for outputting a prompt of resetting an unlocking password after the unlocking module unlocks the locked data partition;
and the resetting module is used for acquiring the reset unlocking password.
In one embodiment, the first processing module comprises:
the first generation submodule is used for generating the first verification key by using the set unlocking password, the encryption algorithm and the key stored in the local terminal;
the second processing module comprises:
and the second generation submodule is used for generating the second verification key by using the generated security code, the encryption algorithm and the key.
In one embodiment, the preset object includes a binding object or an object currently provided to the server.
In one embodiment, the apparatus further comprises:
the second receiving module is used for receiving the input identification of the first object after the second processing module generates the security code when the preset object comprises the binding object;
and the setting module is used for setting the identifier of the first object as the identifier of the binding object.
In one embodiment, the request module includes:
the receiving submodule is used for receiving an input identification of a second object when the preset object comprises an object currently provided for the server;
and the request submodule is used for sending the identifier of the second object to the server while sending a request for acquiring the security code to the server.
In one embodiment, the apparatus further comprises:
the second verification module is used for verifying the second object after the receiving submodule receives the input identification of the second object;
the request submodule is further configured to send a request for obtaining a security code to the server and send an identifier of the second object to the server when the second object passes verification.
In one embodiment, the first receiving module includes:
the first monitoring submodule is used for monitoring that a preset key of the local terminal is triggered in a preset mode; and/or
And the second monitoring submodule is used for monitoring that the touch screen of the local terminal is touched in a preset touch mode.
According to a third aspect of the embodiments of the present disclosure, there is provided an unlocking processing apparatus for a locked data partition, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
generating a security code, generating a second verification key according to the generated security code, storing the second verification key in a local terminal, and storing the generated security code in a server on a network side;
when the verification result of verifying the input unlocking password by using the first verification key is that the input unlocking password is not verified, receiving an input command for acquiring a security code;
sending a request for acquiring a security code to the server, and sending the security code stored in the server to a preset object by the server;
receiving an input security code, and verifying the input security code by using the second verification key;
and when the input security code passes the verification, unlocking the locked data partition.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
according to the technical scheme, when the user forgets the unlocking password of the locked data partition, the unlocking can be completed by using the preset safety code without formatting the data partition, a safety unlocking mechanism is provided, the data in the data partition is protected, and the safety of the data in the data partition is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow diagram illustrating a method for unlocking a locked data partition, according to an example embodiment.
FIG. 2 is a flow diagram illustrating another method of unlocking a locked data partition, according to an example embodiment.
FIG. 3 is a flow diagram illustrating yet another method for unlocking a locked data partition, according to an example embodiment.
FIG. 4 is a flowchart illustrating yet another method of unlocking a locked data partition, in accordance with an exemplary embodiment.
FIG. 5 is a flow diagram illustrating yet another method for unlocking a locked data partition, according to an example embodiment.
FIG. 6 is a block diagram illustrating an unlock processing device for locking a data partition, according to an example embodiment.
FIG. 7 is a block diagram illustrating another apparatus for unlocking a locked data partition, in accordance with an illustrative embodiment.
FIG. 8 is a block diagram illustrating yet another apparatus for unlocking a locked data partition in accordance with an illustrative embodiment.
FIG. 9 is a block diagram illustrating yet another apparatus for unlocking a locked data partition in accordance with an illustrative embodiment.
FIG. 10 is a block diagram illustrating yet another apparatus for unlocking a locked data partition in accordance with an illustrative embodiment.
FIG. 11 is a block diagram illustrating yet another apparatus for unlocking a locked data partition in accordance with an illustrative embodiment.
FIG. 12 is a block diagram illustrating yet another apparatus for unlocking a locked data partition in accordance with an illustrative embodiment.
FIG. 13 is a block diagram illustrating an unlock processing device suitable for locking a data partition, according to an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
The embodiment of the present disclosure provides an unlocking processing method for a locked data partition, which may be used in a terminal where the data partition is located, i.e., a local terminal, as shown in fig. 1, and the method includes steps S11-S16:
in step S11, the set unlocking password is acquired, the first verification key is generated according to the set unlocking password, and the first verification key is stored in the local terminal.
In one embodiment, the unlocking password is set by a user, or may be set by a system, and then the user is notified, so that the user can know the set unlocking password, and the user can conveniently use the unlocking password in a subsequent unlocking mode.
In one embodiment, the local terminal may store an encryption algorithm and a key in advance, and the encryption algorithm and the key are used to generate verification information, i.e., a first verification key, for verifying whether the unlocking password input by the user matches the set unlocking password. The encryption algorithms and keys described above may be implemented in any implementation that achieves the functionality described above. At this time, the above-mentioned "generating the first authentication key according to the set unlocking password" may be implemented as follows: and generating a first verification key by using the set unlocking password, the encryption algorithm and the key stored in the local terminal. The first verification key can be used for verifying whether the unlocking password input by the user is legal or not in the subsequent process.
In step S12, a security code is generated, a second verification key is generated from the generated security code, the second verification key is stored in the local terminal, and the generated security code is stored in the server on the network side.
In one embodiment, the generating the security code may be implemented as: the security code is randomly generated, and the advantage is that anyone can not know the specific content of the randomly generated security code, so that the generated security code can not be easily leaked, and the information security can be ensured. In addition, the generated security code may also be generated according to a certain rule, where the rule may be generated according to preset information, and the preset information may be, for example, one or more items of information such as a current date and personal information of a legal user, so that the generated security code has a certain complexity and cannot be easily cracked.
In one embodiment, the above-mentioned "generating the second verification key according to the generated security code" may be implemented by generating the second verification key by using the generated security code, the aforementioned encryption algorithm and key used when generating the first verification key. The method has the advantages that the local terminal only needs to store the encryption algorithm and the key to complete the generation of the first verification key and the second verification key, the storage space is saved, and the method is simple and convenient. Of course, the encryption algorithm and the key (e.g., the first encryption algorithm and the first key) used when the first authentication key is generated may be different from the encryption algorithm and the key (e.g., the second encryption algorithm and the second key) used when the second authentication key is generated, so that the difficulty in breaking the first authentication key and the second authentication key may be increased, and the security may be improved.
In step S13, when the verification result of verifying the input unlock password with the first verification key is non-verification, the input command to acquire the security code is received.
In one embodiment, the authentication key corresponding to the input unlocking password may be generated using the input unlocking password, the encryption algorithm and the key used in generating the first authentication key, and the same operation as that used in generating the first authentication key. Comparing the first verification key with a verification key corresponding to the input unlocking password, and if the first verification key and the verification key are matched, the input unlocking password passes the verification; if the two are not matched, the input authentication password is not authenticated.
When the input unlocking password is not verified, an option can be output, and when the option is selected by a user, the command for acquiring the security code is received. Or, the input form of the command may be predefined, where it is defined that the command is received when a preset key of the local terminal is triggered by a user in a preset manner, for example, when a power key of the local terminal is continuously pressed at least twice, the command is received; it may also be specified that the command is received when the touch screen of the local terminal is touched in a preset touch manner, for example, the command is received when a user continuously draws a circle on the touch screen of the local terminal; the above two types of input commands may be implemented separately or both, and other illegal persons may not easily know the commands except the legal user who locks the data partition, so that the security may be increased and the illegal person may not easily start step S14.
In step S14, a request for acquiring a security code is sent to the server, and the server sends the stored security code to a preset object.
In one embodiment, the preset object may be a binding object previously bound with the locked data partition or the local terminal, or an object currently provided to the server. The preset object can be a mobile device such as a mobile phone, and can also be any object capable of communicating information, such as communication software such as an email box, an instant messaging client and the like.
When the preset object is a binding object, the method requires a binding operation, and in this case, as shown in fig. 2, the method may further include a binding operation after generating the security code, including steps S21-S22:
in step S21, an input identification of the first object is received.
In step S22, the identification of the first object is set as the identification of the binding object.
The identifier is used to uniquely identify the first object, and may be, for example, a communication number or name of the first object. For example, when the first object is a mobile phone, the first object is identified as a mobile phone number; when the first object is a mailbox, the first object is identified as the mailbox address of the mailbox. Preferably, the first object may be an identifier of another terminal except the local terminal, so that if the local terminal is acquired by an illegal person, even if the illegal person wants to acquire the security code, the illegal person does not acquire the other terminal at the same time, and therefore, the illegal person does not acquire the security code and successfully unlock the data partition, thereby ensuring the security of the data in the data partition.
When the preset objects include objects currently provided to the server, as shown in fig. 3, the above-mentioned step S14 may be implemented as steps S31-S32:
in step S31, an input identification of the second object is received. An input box may be displayed in which the user enters an identification of the second object. The identifier is used to uniquely identify the second object, and may be, for example, a communication number or name of the second object. For example, when the second object is a mobile phone, it is identified as a mobile phone number; when the second object is a mailbox, the second object is identified as the mailbox address of the mailbox. In step S32, the identification of the second object is sent to the server at the same time as the request to obtain the security code is sent to the server.
In one embodiment, as shown in fig. 4, after the step S31, the method may further include: in step S41, the second object is verified. In one embodiment, verifying the second object may be implemented as: presetting an identifier of one or more past objects which can be sent by a server through a security code in a local terminal; judging whether the identification of the second object exists in the identification of the one or more objects, if so, the second object passes the verification; otherwise the second object is not verified. At this time, step S32 may be implemented as step S42: when the second object passes the verification, the identification of the second object is sent to the server while a request for obtaining the security code is sent to the server. The verification operation of the second object can prevent an illegal person from easily obtaining the security code after obtaining the local terminal, and the security of the data in the data partition is improved.
In step S15, the input security code is received and verified using the second verification key.
If the user is a legal user, the legal user can acquire the security code sent by the server from the preset object, so that the user can input a correct security code, and the input security code can pass the verification; if the user is an illegal user, the illegal user cannot easily acquire the security code sent by the server from the preset object, so that the illegal user cannot input a correct security code, and the input security code cannot pass the verification.
In one embodiment, the authentication key corresponding to the input security code may be generated using the input security code, the encryption algorithm and the key used in generating the second authentication key, and the same operations as used in generating the second authentication key. Comparing the second verification key with a verification key corresponding to the input security code, and if the second verification key is matched with the verification key corresponding to the input security code, the input security code passes verification; if the two do not match, the entered security code is not verified.
In step S16, when the input security code passes the verification, the lock on the locked data partition is released.
When the entered security code is not validated, the lock on the locked data partition is maintained.
According to the method provided by the embodiment of the disclosure, when the user forgets the unlocking password of the locked data partition, the unlocking can be completed by using the preset security code without formatting the data partition, so that a security unlocking mechanism is provided, the data in the data partition is protected, and the security of the data in the data partition is improved.
In one embodiment, after unlocking the locked data partition, as shown in fig. 5, the method may further include step S17-18:
in step S17, a prompt to reset the unlock password is output.
In step S18, the reset unlock password is acquired.
In this embodiment, the unlock password may be reset after the data partition is unlocked, facilitating the user to subsequently continue to securely use the data partition.
Corresponding to the method for unlocking a locked data partition provided in the embodiment of the present disclosure, an embodiment of the present disclosure provides an unlocking processing apparatus for a locked data partition, as shown in fig. 6, including:
the first processing module 61 is configured to acquire a set unlocking password, generate a first verification key according to the set unlocking password, and store the first verification key in the local terminal;
a second processing module 62 configured to generate a security code, generate a second verification key according to the generated security code, store the second verification key in the local terminal, and store the generated security code in a server on the network side;
a first receiving module 63 configured to receive an input command to acquire a security code when a verification result of verifying the input unlock password by using the first verification key is not verified;
a request module 64 configured to send a request for obtaining the security code to the server, and the server sends the stored security code to a preset object;
a first authentication module 65 configured to receive the input security code, authenticate the input security code using a second authentication key;
and the unlocking module 66 is configured to unlock the locked data partition when the input security code is verified.
In one embodiment, as shown in fig. 7, the apparatus may further include:
a prompt module 71 configured to output a prompt to reset the unlocking password after the unlocking module unlocks the locked data partition;
a reset module 72 configured to obtain a reset unlock password.
In one embodiment, as shown in fig. 8, the first processing module 61 may further include:
a first generation submodule 81 configured to generate a first verification key using the set unlocking password, the encryption algorithm and the key stored in the local terminal;
at this time, the second processing module 62 may include:
a second generation submodule 82 configured to generate a second verification key using the generated security code, encryption algorithm and key.
In one embodiment, the preset object includes a binding object, or an object currently provided to the server.
In one embodiment, as shown in fig. 9, the apparatus may further include:
a second receiving module 91 configured to receive an input identification of the first object after the second processing module 62 generates the security code when the preset object includes the binding object;
a setting module 92 configured to set the identity of the first object as the identity of the binding object.
In one embodiment, as shown in FIG. 10, the request module 64 may include:
a receiving sub-module 1001 configured to receive an inputted identification of a second object when the preset object includes an object currently provided to the server;
a request submodule 1002 configured to send an identification of the second object to the server while sending a request for obtaining the security code to the server.
In one embodiment, as shown in fig. 11, the above apparatus further comprises:
a second verification module 111 configured to verify the second object after the receiving sub-module 1001 receives the inputted identification of the second object;
the request sub-module 1002 is further configured to send, when the second object passes the verification, an identification of the second object to the server while sending a request to obtain the security code to the server.
In one embodiment, as shown in fig. 12, the first receiving module 63 may include:
a first monitoring submodule 121 configured to monitor that a preset key of the local terminal is triggered in a preset manner; and/or
And a second monitoring sub-module 122 configured to monitor that the touch screen of the local terminal is touched in a preset touch manner.
An embodiment of the present disclosure provides an unlocking processing apparatus for a locked data partition, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
generating a security code, generating a second verification key according to the generated security code, storing the second verification key in the local terminal, and storing the generated security code in a server on the network side;
when the verification result of verifying the input unlocking password by using the first verification key is that the verification is not passed, receiving an input command of acquiring a security code;
sending a request for acquiring a security code to a server, and sending the security code stored in the server to a preset object by the server;
receiving an input security code, and verifying the input security code by using a second verification key;
and when the input security code passes the verification, unlocking the locked data partition.
In one embodiment, the processor may be further configured to: after the locked data partition is unlocked, outputting a prompt for resetting an unlocking password;
and acquiring the reset unlocking password.
In one embodiment, the processor may be further configured to: generating a first verification key according to the set unlocking password, comprising the following steps:
generating a first verification key by using the set unlocking password, an encryption algorithm and a key stored in the local terminal;
generating a second verification key from the generated security code, comprising:
and generating a second verification key by using the generated security code, the encryption algorithm and the key.
In one embodiment, the processor may be further configured to: the preset object includes a binding object, or an object currently provided to the server.
In one embodiment, the processor may be further configured to: when the preset object comprises the binding object, after the security code is generated, the method further comprises:
receiving an input identification of a first object;
and setting the identifier of the first object as the identifier of the binding object.
In one embodiment, the processor may be further configured to: when the preset object comprises an object currently provided for the server, sending a request for acquiring a security code to the server, wherein the request comprises:
receiving an input identification of a second object;
and sending the identification of the second object to the server at the same time of sending the request for obtaining the security code to the server.
In one embodiment, the processor may be further configured to: after receiving the inputted identification of the second object, the method further comprises:
verifying the second object;
sending the identifier of the second object to the server while sending a request for obtaining the security code to the server, comprising:
when the second object passes the verification, the identification of the second object is sent to the server while a request for obtaining the security code is sent to the server.
In one embodiment, the processor may be further configured to: receiving an input command for acquiring a security code, comprising:
monitoring that a preset key of a local terminal is triggered in a preset mode; and/or
And monitoring that the touch screen of the local terminal is touched in a preset touch mode.
FIG. 13 is a block diagram illustrating an apparatus 800 for unlocking processing of locked data partitions, according to an example embodiment. For example, the apparatus 800 may be a mobile device, such as a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and so forth.
Referring to fig. 13, the apparatus 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the apparatus 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power components 806 provide power to the various components of device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the apparatus 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and a user, in some embodiments, the screen may include a liquid crystal display (L CD) and a Touch Panel (TP). if the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed status of the device 800, the relative positioning of the components, such as a display and keypad of the device 800, the sensor assembly 814 may also detect a change in the position of the device 800 or a component of the device 800, the presence or absence of user contact with the device 800, the orientation or acceleration/deceleration of the device 800, and a change in the temperature of the device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), programmable logic devices (P L D), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the methods described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a processor of a mobile terminal, enable the mobile terminal to perform a method of unlocking a locked data partition, comprising:
acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
generating a security code, generating a second verification key according to the generated security code, storing the second verification key in the local terminal, and storing the generated security code in a server on the network side;
when the verification result of verifying the input unlocking password by using the first verification key is that the verification is not passed, receiving an input command of acquiring a security code;
sending a request for acquiring a security code to a server, and sending the security code stored in the server to a preset object by the server;
receiving an input security code, and verifying the input security code by using a second verification key;
and when the input security code passes the verification, unlocking the locked data partition.
In one embodiment, after unlocking the locked data partition, the method further comprises:
outputting a prompt for resetting an unlocking password;
and acquiring the reset unlocking password.
In one embodiment, generating the first authentication key according to the set unlocking password comprises:
generating a first verification key by using the set unlocking password, an encryption algorithm and a key stored in the local terminal;
generating a second verification key from the generated security code, comprising:
and generating a second verification key by using the generated security code, the encryption algorithm and the key.
In one embodiment, the preset object includes a binding object, or an object currently provided to the server.
In one embodiment, when the preset object includes the binding object, after generating the security code, the method further includes:
receiving an input identification of a first object;
and setting the identifier of the first object as the identifier of the binding object.
In one embodiment, when the preset object includes an object currently provided to the server, sending a request for acquiring a security code to the server includes:
receiving an input identification of a second object;
and sending the identification of the second object to the server at the same time of sending the request for obtaining the security code to the server.
In one embodiment, after receiving the inputted identification of the second object, the method further comprises:
verifying the second object;
sending the identifier of the second object to the server while sending a request for obtaining the security code to the server, comprising:
when the second object passes the verification, the identification of the second object is sent to the server while a request for obtaining the security code is sent to the server.
In one embodiment, receiving an input command to obtain a security code includes:
monitoring that a preset key of a local terminal is triggered in a preset mode; and/or
And monitoring that the touch screen of the local terminal is touched in a preset touch mode.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (8)

1. An unlocking processing method for a locked data partition is characterized by comprising the following steps:
acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
generating a security code, generating a second verification key according to the generated security code, storing the second verification key in a local terminal, and storing the generated security code in a server at a network side;
when the verification result of verifying the input unlocking password by using the first verification key is that the input unlocking password is not verified, receiving an input command for acquiring a security code;
sending a request for acquiring a security code to the server, and sending the security code stored in the server to a preset object by the server;
receiving an input security code, and verifying the input security code by using the second verification key;
when the input security code passes verification, unlocking the locked data partition;
the generating a first verification key according to the set unlocking password comprises:
generating the first verification key by using the set unlocking password, an encryption algorithm and a key stored in a local terminal;
the generating a second verification key according to the generated security code includes:
generating the second verification key using the generated security code, the encryption algorithm and a key;
the preset object comprises a binding object or an object currently provided for the server;
when the preset object comprises a binding object, after the generating the security code, the method further comprises:
receiving an input identification of a first object;
setting the identification of the first object as the identification of the binding object;
when the preset object comprises an object currently provided for the server, the sending a request for acquiring a security code to the server comprises:
receiving an input identification of a second object;
sending the identifier of the second object to the server while sending a request for acquiring a security code to the server;
after receiving the inputted identification of the second object, the method further comprises:
verifying the second object;
the sending the identifier of the second object to the server while sending the request for obtaining the security code to the server includes:
and when the second object passes the verification, sending a request for acquiring a security code to the server and sending the identification of the second object to the server.
2. The method of claim 1, wherein after the unlocking the locked data partition, the method further comprises:
outputting a prompt for resetting an unlocking password;
and acquiring the reset unlocking password.
3. The method of claim 1, wherein receiving an input command to obtain a security code comprises:
monitoring that a preset key of the local terminal is triggered in a preset mode; and/or
And monitoring that the touch screen of the local terminal is touched in a preset touch mode.
4. An unlock processing apparatus for a locked data partition, comprising:
the first processing module is used for acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
the second processing module is used for generating a security code, generating a second verification key according to the generated security code, storing the second verification key in the local terminal, and storing the generated security code in a server on a network side;
the first receiving module is used for receiving an input command for acquiring the security code when the verification result of verifying the input unlocking password by using the first verification key is that the input unlocking password is not verified;
the request module is used for sending a request for acquiring the security code to the server, and the server sends the stored security code to a preset object;
the first verification module is used for receiving an input security code and verifying the input security code by using the second verification key;
the unlocking module is used for unlocking the locked data partition when the input security code passes verification;
the first processing module comprises:
the first generation submodule is used for generating the first verification key by using the set unlocking password, the encryption algorithm and the key stored in the local terminal;
the second processing module comprises:
a second generation submodule, configured to generate the second verification key by using the generated security code, the encryption algorithm, and a key;
the preset object comprises a binding object or an object currently provided for the server;
the device further comprises:
the second receiving module is used for receiving the input identification of the first object after the second processing module generates the security code when the preset object comprises the binding object;
the setting module is used for setting the identification of the first object as the identification of the binding object;
the request module comprises:
the receiving submodule is used for receiving an input identification of a second object when the preset object comprises an object currently provided for the server;
the request submodule is used for sending a request for acquiring a security code to the server and sending the identifier of the second object to the server;
the device further comprises:
the second verification module is used for verifying the second object after the receiving submodule receives the input identification of the second object;
the request submodule is further configured to send a request for obtaining a security code to the server and send an identifier of the second object to the server when the second object passes verification.
5. The apparatus of claim 4, wherein the apparatus further comprises:
the prompting module is used for outputting a prompt of resetting an unlocking password after the unlocking module unlocks the locked data partition;
and the resetting module is used for acquiring the reset unlocking password.
6. The apparatus of claim 4, wherein the first receiving module comprises:
the first monitoring submodule is used for monitoring that a preset key of the local terminal is triggered in a preset mode; and/or
And the second monitoring submodule is used for monitoring that the touch screen of the local terminal is touched in a preset touch mode.
7. An unlock processing apparatus for a locked data partition, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring a set unlocking password, generating a first verification key according to the set unlocking password, and storing the first verification key in a local terminal;
generating a security code, generating a second verification key according to the generated security code, storing the second verification key in a local terminal, and storing the generated security code in a server at a network side;
when the verification result of verifying the input unlocking password by using the first verification key is that the input unlocking password is not verified, receiving an input command for acquiring a security code;
sending a request for acquiring a security code to the server, and sending the security code stored in the server to a preset object by the server;
receiving an input security code, and verifying the input security code by using the second verification key;
when the input security code passes verification, unlocking the locked data partition;
the generating a first verification key according to the set unlocking password comprises:
generating the first verification key by using the set unlocking password, an encryption algorithm and a key stored in a local terminal;
the generating a second verification key according to the generated security code includes:
generating the second verification key using the generated security code, the encryption algorithm and a key;
the preset object comprises a binding object or an object currently provided for the server;
when the preset object comprises a binding object, after the generating the security code, the processor is further configured to:
receiving an input identification of a first object;
setting the identification of the first object as the identification of the binding object;
when the preset object comprises an object currently provided for the server, the sending a request for acquiring a security code to the server comprises:
receiving an input identification of a second object;
sending the identifier of the second object to the server while sending a request for acquiring a security code to the server;
after said receiving the entered identification of the second object, the processor is further configured to:
verifying the second object;
the sending the identifier of the second object to the server while sending the request for obtaining the security code to the server includes:
and when the second object passes the verification, sending a request for acquiring a security code to the server and sending the identification of the second object to the server.
8. A non-transitory computer readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3.
CN201610425400.6A 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition Active CN106126986B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610425400.6A CN106126986B (en) 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610425400.6A CN106126986B (en) 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition

Publications (2)

Publication Number Publication Date
CN106126986A CN106126986A (en) 2016-11-16
CN106126986B true CN106126986B (en) 2020-07-10

Family

ID=57469854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610425400.6A Active CN106126986B (en) 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition

Country Status (1)

Country Link
CN (1) CN106126986B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789070A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The decryption method of data, device and terminal
CN109308417B (en) * 2017-07-27 2022-11-01 阿里巴巴集团控股有限公司 Unlocking method and device based on trusted computing
CN110719341B (en) * 2018-07-12 2023-05-12 中兴通讯股份有限公司 Data processing method and device, DHCP server and storage medium
CN110020515A (en) * 2019-03-29 2019-07-16 联想(北京)有限公司 Data guard method, data protecting device, electronic equipment and medium
CN115935401B (en) * 2023-03-13 2023-05-12 中诚华隆计算机技术有限公司 SOC safety debugging method

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8738908B2 (en) * 2011-05-10 2014-05-27 Softlayer Technologies, Inc. System and method for web-based security authentication
CN102708328A (en) * 2012-06-18 2012-10-03 施建辉 Authenticity code input-type password coding-decoding system
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal

Also Published As

Publication number Publication date
CN106126986A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
EP3657370B1 (en) Methods and devices for authenticating smart card
CN106126986B (en) Unlocking processing method and device for locked data partition
CN106778222B (en) Unlocking method and device
CN109146470B (en) Method and device for generating payment code
CN108269334A (en) Method for unlocking, terminal device and smart lock
KR101259546B1 (en) Method for smart-key service
CN109039860B (en) Method and device for sending and displaying message and method and device for identity authentication
RU2636686C2 (en) Method and device for sending information in voice service
WO2020259026A1 (en) Access control method and apparatus, and electronic device and storage medium
EP3367286A1 (en) Methods, apparatuses, computer program and recording medium for protecting information
US20180341953A1 (en) Method and apparatus for reporting loss of card or device associated with account number or stolen of account number
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN106066763B (en) Terminal unlocking method and device
CN107145771B (en) Application program unlocking method and device and terminal
US9667784B2 (en) Methods and devices for providing information in voice service
CN111917728A (en) Password verification method and device
US20220114247A1 (en) Biometric Authenticated Content
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
CN114221764A (en) Public key updating method, device and equipment based on block chain
JP2020004424A (en) Method and device for protecting privacy of mobile terminal and mobile terminal
CN106534083A (en) Root tool verification method and apparatus
US11551496B1 (en) Access control systems, devices, and methods therefor
CN106485151B (en) Method and device for controlling flashing
CN106408304B (en) Account security management method and device
CN110795710B (en) Unlocking method of electronic device, electronic device and computer-readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant