CN110418331B - Unlocking method, unlocking device, mobile terminal and server - Google Patents

Unlocking method, unlocking device, mobile terminal and server Download PDF

Info

Publication number
CN110418331B
CN110418331B CN201910710856.0A CN201910710856A CN110418331B CN 110418331 B CN110418331 B CN 110418331B CN 201910710856 A CN201910710856 A CN 201910710856A CN 110418331 B CN110418331 B CN 110418331B
Authority
CN
China
Prior art keywords
random code
code
identification code
unlocking
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910710856.0A
Other languages
Chinese (zh)
Other versions
CN110418331A (en
Inventor
龚敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910710856.0A priority Critical patent/CN110418331B/en
Publication of CN110418331A publication Critical patent/CN110418331A/en
Application granted granted Critical
Publication of CN110418331B publication Critical patent/CN110418331B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/183Processing at user equipment or user record carrier

Abstract

The application is applicable to the technical field of communication, and provides an unlocking method, an unlocking device, a mobile terminal and a server, which comprise the following steps: acquiring a first random code input by a user; acquiring a first identification code of the mobile terminal; sending the first random code and the first identification code to a server; and when unlocking data are received, unlocking the mobile terminal according to the unlocking data, wherein the unlocking data are fed back by the server after the first random code and the first identification code are received. Through the method and the device, the problem that the mobile terminal is unlocked by mistake easily due to the fact that the prior art is used can be solved.

Description

Unlocking method, unlocking device, mobile terminal and server
Technical Field
The application belongs to the technical field of communication, and particularly relates to an unlocking method, an unlocking device, a mobile terminal and a server.
Background
A contracting machine generally refers to a legitimate handset type that a communications carrier (e.g., mobile, unicom, telecom, etc.) has partnered with a handset manufacturer to order, and a user has to contract with a given carrier using the handset. And the contract machine can only use the mobile phone card of the specified operator and cannot use the mobile phone cards of other operators within the contract time limit, and the user can use the mobile phone cards of other operators after unlocking.
At present, when a contract machine needs to be unlocked, generally, after sale or a manufacturer checks an International Mobile Equipment Identity (IMEI) of a Mobile phone needing to be unlocked, the IMEI of the Mobile phone to be unlocked is recorded through an unlocking management system, and the specified Mobile phone is unlocked. However, the IMEI number is long, and when the IMEI is recorded, a wrong IMEI may be recorded, so that other mobile phones are unlocked, and the benefit of an operator is damaged.
Disclosure of Invention
The embodiment of the application provides an unlocking method, an unlocking device, a mobile terminal and a server, and can solve the problem that the prior art easily causes mistaken unlocking of the mobile terminal.
In a first aspect, an embodiment of the present application provides an unlocking method, where the unlocking method includes:
acquiring a first random code input by a user;
acquiring a first identification code of the mobile terminal;
sending the first random code and the first identification code to a server;
and when unlocking data are received, unlocking the mobile terminal according to the unlocking data, wherein the unlocking data are fed back by the server after the first random code and the first identification code are received.
In a second aspect, an embodiment of the present application provides an unlocking method, where the unlocking method includes:
when a first random code and a first identification code are received, a second random code corresponding to the first identification code is obtained;
comparing the first random code and the second random code;
and if the first random code is the same as the second random code, unlocking data is sent to the mobile terminal corresponding to the first identification code.
In a third aspect, an embodiment of the present application provides an unlocking device, where the unlocking device includes:
the first acquisition module is used for acquiring a first random code input by a user;
the second acquisition module is used for acquiring the first identification code of the mobile terminal;
the data sending module is used for sending the first random code and the first identification code to a server;
and the unlocking module is used for unlocking the mobile terminal according to the unlocking data when the unlocking data is received, wherein the unlocking data is fed back by the server after the first random code and the first identification code are received.
In a fourth aspect, an embodiment of the present application provides an unlocking device, where the unlocking device includes:
the random code acquisition module is used for acquiring a second random code corresponding to the first identification code when the first random code and the first identification code are received;
a random code comparison module for comparing the first random code and the second random code;
and the unlocking data sending module is used for sending unlocking data to the mobile terminal corresponding to the first identification code if the first random code is the same as the second random code.
In a fifth aspect, an embodiment of the present application provides a mobile terminal, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor, when executing the computer program, implements the unlocking method according to the first aspect.
In a sixth aspect, an embodiment of the present application provides a server, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor executes the computer program to implement the unlocking method according to the second aspect.
In a seventh aspect, the present application provides a computer-readable storage medium, where a computer program is stored, and the computer program, when executed by a processor, implements the unlocking method according to the first aspect, or the computer program, when executed by the processor, implements the unlocking method according to the second aspect.
In an eighth aspect, an embodiment of the present application provides a computer program product, which, when running on a mobile terminal, causes the mobile terminal to execute the unlocking method according to the first aspect, or, when running on a server, causes the server to execute the unlocking method according to the second aspect.
According to the scheme, the first random code input by the user at the mobile terminal is acquired, the first identification code of the mobile terminal is acquired, the first random code and the first identification code are sent to the server, the first identification code and the first identification code are verified doubly, whether the mobile terminal corresponding to the first identification code is a correct unlocking object or not is determined, and the mobile terminal is unlocked when the mobile terminal is the correct unlocking object, so that mistaken unlocking can be prevented, and loss of cooperative operators is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a schematic view of an unlocking system provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of an unlocking method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of an unlocking method according to another embodiment of the present application;
fig. 4 is a schematic flowchart of an unlocking method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of an unlocking device provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of an unlocking device according to another embodiment of the present application;
fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a server according to an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
In particular implementations, the mobile terminals described in embodiments of the present application include, but are not limited to, other portable devices such as mobile phones, laptop computers, or tablet computers having touch sensitive surfaces (e.g., touch screen displays and/or touch pads). It should also be understood that in some embodiments, the device is not a portable communication device, but is a desktop computer having a touch-sensitive surface (e.g., a touch screen display and/or touchpad).
In the discussion that follows, a mobile terminal that includes a display and a touch-sensitive surface is described. However, it should be understood that the mobile terminal may include one or more other physical user interface devices such as a physical keyboard, mouse, and/or joystick.
The mobile terminal supports various applications, such as one or more of the following: a drawing application, a presentation application, a word processing application, a website creation application, a disc burning application, a spreadsheet application, a gaming application, a telephone application, a video conferencing application, an email application, an instant messaging application, an exercise support application, a photo management application, a digital camera application, a web browsing application, a digital music player application, and/or a digital video player application.
Various applications that may be executed on the mobile terminal may use at least one common physical user interface device, such as a touch-sensitive surface. One or more functions of the touch-sensitive surface and corresponding information displayed on the terminal can be adjusted and/or changed between applications and/or within respective applications. In this way, a common physical architecture (e.g., touch-sensitive surface) of the terminal can support various applications with user interfaces that are intuitive and transparent to the user.
It should be understood that, the sequence numbers of the steps in this embodiment do not mean the execution sequence, and the execution sequence of each process should be determined by the function and the inherent logic of the process, and should not constitute any limitation to the implementation process of the embodiment of the present application.
In order to explain the technical solution described in the present application, the following description will be given by way of specific examples.
Referring to fig. 1, a schematic network architecture of an unlocking system provided in an embodiment of the present application is shown, and for convenience of description, only portions related to the embodiment of the present application are shown.
As shown in fig. 1, the unlocking system includes a mobile terminal 11 and a server 12, and the mobile terminal 11 and the server 12 may be connected and communicated in a wired or wireless manner. The server 12 may be a single server or a server composed of a plurality of functional servers.
In order to solve the problem that the prior art easily leads to carrying out the mistake unblock to mobile terminal. According to the embodiment of the application, the mobile terminal 11 acquires a first random code input by a user and acquires a first identification code of the mobile terminal 11, the first random code and the first identification code are sent to the server 12, the server 12 receives the first random code and the first identification code, a second random code corresponding to the first identification code is acquired, the first random code and the second random code are compared, if the first random code and the second random code are the same, unlocking data are sent to the mobile terminal 11, and the mobile terminal 11 unlocks according to the unlocking data.
Optionally, the server 12 is further configured to:
acquiring a second identification code input by a user; generating a second random code; establishing a corresponding relation between the second random code and the second identification code, and storing the corresponding relation between the second random code and the second identification code; and displaying the second random code.
Optionally, the server 12 is further configured to:
setting an effective time aiming at the corresponding relation between the second random code and the second identification code;
and if the storage time of the corresponding relation between the second random code and the second identification code exceeds the valid time, deleting the corresponding relation between the second random code and the second identification code.
Optionally, the server 12 is further configured to:
and if the first random code is different from the second random code, sending random code error information to the mobile terminal 11.
Optionally, the mobile terminal 11 is further configured to:
and when receiving the random code error information, prompting the user that the first random code has an error.
For better understanding of the embodiments of the present application, the following describes the embodiments of the present application through a specific application scenario:
the server 12 obtains the second identification code IMEI2 input by the user, generates a second random code R2, stores the generated second random code R2 in association with the second identification code IMEI2, displays the second random code R2, so that after the user views the second random code R2, the user inputs the random code into the mobile terminal 11, the random code input by the user in the mobile terminal can be called as a first random code R1, obtains the identification code of the mobile terminal (i.e. the first identification code IMEI1), searches the server 12 for a second identification code 2 identical to the first identification code IMEI1, if the second identification code 2 identical to the first identification code IMEI1 is found, determines that the mobile terminal 11 is a mobile terminal to be unlocked, that is, the mobile terminal 11 can be changed from a card locking state to a card unlocking state, and at this time, in order to improve the accuracy of unlocking, the second random code R2 corresponding to the first IMEI1 can be searched from the server 12, comparing the first random code R1 with the second random code R2, if the first random code R1 is the same as the second random code R2, determining that the first random code R1 input by the user is correct, unlocking the mobile terminal 11 at the moment, if the first random code R1 is different from the second random code R2, determining that the first random code R1 input by the user is wrong, and prompting the user to input the first random code R1 again; if the second identification code IMEI2 which is the same as the first identification code IMEI1 is not found, the mobile terminal 11 is determined not to be the mobile terminal to be unlocked and cannot be unlocked. The card locking state may be a state in which the mobile terminal is restricted from using a network of a specified operator, that is, a state in which the mobile terminal is restricted from using a SIM card of the specified operator. The unlocked state may refer to a state in which the restriction on the operator network is released, that is, a state in which the mobile terminal may use other operator networks in addition to the designated operator network.
It can be seen from the above application scenario that in the embodiment of the present application, by searching for the second random code corresponding to the second identification code that is the same as the first identification code in the server, and comparing the first random code corresponding to the first identification code with the second random code corresponding to the second identification code, it can be verified whether the mobile terminal corresponding to the first identification code is the mobile terminal to be unlocked (i.e., whether the mobile terminal is a correct unlocking object), so that the mobile terminal can be prevented from being unlocked by mistake.
In addition, the application scenarios provided in the embodiments of the present application are used to explain the present application, and do not limit the scope of protection of the present application.
Referring to fig. 2, which is a schematic flowchart of an unlocking method provided in an embodiment of the present application, the unlocking method is applied to a mobile terminal, and as shown in the figure, the unlocking method may include the following steps:
step S201, a first random code input by a user is acquired.
Step S202, a first identification code of the mobile terminal is obtained.
The first random code is a random code input by a user in the mobile terminal. The first identification code is the identification code of the mobile terminal, and the identification code of the mobile terminal is identity information of the mobile terminal, including but not limited to IMEI, and the identification codes of different mobile terminals are different.
In this embodiment, a preset application may be installed on a mobile terminal, the preset application is started, a first random code may be input on a display interface of the preset application, and when a confirmation instruction of a user on the input first random code is received (for example, when a click operation of the user on a certain button in the display interface is detected, it is determined that the confirmation instruction of the user on the input first random code is received), an identification code of the mobile terminal itself (that is, the first identification code) is acquired. The preset application program may be an application program applied to contract machine unlocking, and a random code for unlocking may be input in the application program.
Step S203, the first random code and the first identification code are sent to a server.
In the embodiment of the application, a first random code and a first identification code are sent to a server to request to inquire whether a mobile terminal corresponding to the first identification code is a mobile terminal to be unlocked or not, and if a second identification code identical to the first identification code is inquired in the server (namely the server stores the second identification code), the mobile terminal corresponding to the first identification code is determined to be the mobile terminal to be unlocked; if the second identification code which is the same as the first identification code is not inquired in the server, it is determined that the mobile terminal corresponding to the first identification code is not the mobile terminal to be unlocked (namely, the server does not apply for unlocking the mobile terminal corresponding to the first identification code). And the mobile terminals corresponding to the second identification codes stored in the server are all the mobile terminals to be unlocked. It should be noted that the mobile terminal to be unlocked may refer to a mobile terminal that has requested to be unlocked, and the mobile terminal to be unlocked executes an unlocking operation when acquiring the correct first random code.
And step S204, when unlocking data is received, unlocking the mobile terminal according to the unlocking data.
Wherein the unlocking data is fed back by the server after receiving the first random code and the first identification code.
Optionally, when receiving the random code error information, prompting the user that the first random code has an error.
In the embodiment of the application, the mobile terminal sends the first random code and the first identification code to the server, and the server can verify whether the mobile terminal corresponding to the first identification code is a mobile terminal to be unlocked (namely a correct unlocking object), if the mobile terminal corresponding to the first identification code is the mobile terminal to be unlocked, whether the first random code input by the user is the random code corresponding to the first identification code is judged, if the first random code input by the user is the random code corresponding to the first identification code, unlocking data is sent to the mobile terminal, and the mobile terminal unlocks according to the unlocking data after receiving the unlocking data; and if the first random code input by the user is not the random code corresponding to the first identification code, sending a random code error message to the mobile terminal to prompt the user that the first random code input by the user has errors.
The server may refer to a server of a manufacturer of the mobile terminal corresponding to the first identification code. The random code error information is information indicating that the first random code input by the user has an error. The mobile terminal may prompt the user in any manner, such as voice, short message, or tag, which is not limited herein.
According to the method and the device, the first random code input by the user at the mobile terminal and the first identification code of the mobile terminal are obtained, the first random code and the first identification code are sent to the server, whether the mobile terminal corresponding to the first identification code is the mobile terminal to be unlocked can be verified through the server, the mobile terminal is unlocked when the mobile terminal corresponding to the first identification code is the mobile terminal to be unlocked and the first random code is correct, unlocking of other mobile terminals can be avoided, mistaken unlocking is prevented, and loss of cooperative operators is reduced.
Referring to fig. 3, a flowchart of an unlocking method provided in another embodiment of the present application is shown, where the unlocking method is applied to a server, and as shown in the drawing, the unlocking method may include the following steps:
step S301, when receiving a first random code and a first identification code, acquiring a second random code corresponding to the first identification code.
In the embodiment of the application, a corresponding relationship between a second random code and a second identification code may be prestored in a server, when receiving a first random code and a first identification code sent by a mobile terminal, the server may search for the second identification code that is the same as the first identification code from the corresponding relationship (i.e., search for whether the first identification code exists from the corresponding relationship), and if the second identification code that is the same as the first identification code is searched from the corresponding relationship, determine that the mobile terminal corresponding to the first identification code is a mobile terminal to be unlocked, and may search for the second random code corresponding to the second identification code from the corresponding relationship, so as to further verify whether the first random code is correct; if the second identification code identical to the first identification code is not found from the corresponding relation, it is determined that the mobile terminal corresponding to the first identification code is not the mobile terminal to be unlocked, at this time, the mobile terminal corresponding to the first identification code can be sent with the unlocking unsolicited information, and when the mobile terminal receives the unlocking unsolicited information, the mobile terminal prompts the user that the mobile terminal is not requested to be unlocked. The unsolicited unlocking information is information indicating that the mobile terminal is unsolicited or unsolicited for unlocking.
Step S302, comparing the first random code and the second random code.
In this embodiment of the application, if the server finds the second identification code identical to the first identification code in the corresponding relationship, the first random code is compared with the second random code corresponding to the first identification code (i.e., the second random code corresponding to the second identification code identical to the first identification code), so as to verify whether the first random code input by the user is correct by comparing whether the first random code is identical to the second random code.
Step S303, if the first random code is the same as the second random code, unlocking data is sent to the mobile terminal corresponding to the first identification code.
The unlocking data may refer to a password for unlocking the mobile terminal.
Optionally, the embodiment of the present application further includes:
and if the first random code is different from the second random code, sending random code error information to the mobile terminal.
In the embodiment of the application, if the first random code is the same as the second random code, it is determined that the first random code input by the user at the mobile terminal is correct, and the unlocking data can be sent to the mobile terminal corresponding to the first identification code so as to unlock the mobile terminal; if the first random code is different from the second random code, the first random code input by the user in the mobile terminal is determined to be incorrect, the random code is generated to have error information, and the random code error information is sent to the mobile terminal to prompt the user that the first random code input by the user has errors.
According to the embodiment of the application, the mobile terminal corresponding to the first identification code is subjected to double verification in the server, whether the mobile terminal is a correct unlocking object or not can be detected, unlocking is carried out when the mobile terminal is the correct unlocking object, and unlocking is not carried out when the mobile terminal is not the correct unlocking object, so that mistaken unlocking can be prevented, the unlocking accuracy of the mobile terminal is improved, and the loss of a cooperative operator is reduced.
Referring to fig. 4, a flowchart of an unlocking method provided in another embodiment of the present application is shown, where the unlocking method is applied to a server, and as shown in the drawing, the unlocking method may include the following steps:
step S401, acquiring a second identification code input by a user.
The second identification code may be an identification code input by the user in the server, and may be an identification code of any mobile terminal to be unlocked. The "first" and the "second" in the first identification code and the second identification code are used for distinguishing the acquisition mode of the identification codes, and specifically: the first identification code is acquired by the mobile terminal from the mobile terminal (for example, the identification code of the mobile terminal is pre-stored in a memory of the mobile terminal, and the identification code of the mobile terminal is acquired by the mobile terminal from the memory of the mobile terminal), the second identification code is input by a user in the server, and the mobile terminal corresponding to the second identification code is the mobile terminal to be unlocked. The server may refer to a server of a manufacturer of the mobile terminal.
In this embodiment, an unlocking management system may be installed on a server, the unlocking management system may be started, a second identification code may be input on a display interface of the unlocking management system, the second identification code input by a user may be acquired when a confirmation instruction of the input second identification code is received (for example, when a click operation of the user on a confirmation button in the display interface is detected, the confirmation instruction of the input second identification code by the user is determined to be received), and a random code (i.e., a second random code) may be generated. The unlocking management system is used for managing the state of the mobile terminal, and locking and unlocking the mobile terminal can be completed through the unlocking management system. The "first" and the "second" of the first random code and the second random code are used for distinguishing the acquisition mode of the random code, specifically: the first random code is transmitted by the mobile terminal and the second random code is generated by the server upon receipt of the second identification code.
Step S402, a second random code is generated.
Step S403, establishing a corresponding relationship between the second random code and the second identification code, and storing the corresponding relationship between the second random code and the second identification code.
Optionally, after the corresponding relationship between the second random code and the second identification code is established, the method further includes:
setting an effective time aiming at the corresponding relation between the second random code and the second identification code;
and if the storage time of the corresponding relation between the second random code and the second identification code exceeds the valid time, deleting the corresponding relation between the second random code and the second identification code.
In this embodiment of the application, when the corresponding relationship between the second random code and the second identification code is established, an effective time may be set for the corresponding relationship, and when the storage time of the corresponding relationship in the server exceeds the effective time, the corresponding relationship is deleted in the server, so that the occupation of the storage space of the server may be reduced. The user can set the effective time by himself according to actual needs, which is not limited herein.
And S404, displaying the second random code.
In the embodiment of the application, the server can facilitate the user to view the second random code by displaying the second random code, so that the user can unlock the mobile terminal by inputting the viewed second random code (i.e. the first random code entered by the user) into the mobile terminal.
Step S405, when a first random code and a first identification code are received, a second random code corresponding to the first identification code is obtained according to the corresponding relation between the second random code and the second identification code.
In the embodiment of the application, when a first random code and a first identification code are received, whether a second identification code which is the same as the first identification code exists in the corresponding relation is detected; if the first random code exists, acquiring a second random code corresponding to the second identification code from the corresponding relation, and determining the second random code as the second random code corresponding to the first identification code; if the unlocking request does not exist, the mobile terminal corresponding to the first identification code is determined not to be the mobile terminal to be unlocked, and at the moment, the unlocking request information can be sent to the mobile terminal corresponding to the first identification code.
Step S406, comparing the first random code and the second random code.
The step is the same as step S302, and reference may be specifically made to the related description of step S302, which is not described herein again.
Step S407, if the first random code is the same as the second random code, unlocking data is sent to the mobile terminal corresponding to the first identification code.
The step is the same as step S303, and reference may be specifically made to the related description of step S303, which is not described herein again.
Taking unlocking the mobile phone 1 with the identification code of 111 as an example, the identification code input by the user in the server is obtained. In the first situation, the identification code input by the user is correct, namely the input identification code is 111, a random code 809 is generated, the identification code 111 and the random code 809 are stored in a correlated manner, the random code 809 is displayed, the user inputs a random code for unlocking in the mobile phone 1 after seeing the random code 809, the input random code and the identification code 111 are sent to a server, the random code correlated with the identification code 111 is 809 searched in the server, and if the random code input by the user is 809, the mobile phone 1 is unlocked; if the random code input by the user is not 809, determining that the random code input is wrong, and not unlocking the mobile phone 1. In the second case, the identification code input by the user is incorrect, the mobile phone 1 with the identification code 111 is desired to be unlocked, but the input identification code 112 (i.e. the identification code of the mobile phone 2) generates a random code 606, the identification code 112 and the random code 606 are stored in association, the random code 606 is displayed, the user inputs the random code for unlocking in the mobile phone 1 after seeing the random code 606, the input random code and the identification code 111 are sent to the server, because the identification code input by the user in the server is 112, and the identification code of the mobile phone to be unlocked is 111, the identification code identical to the identification code 111 cannot be found in the server, the mobile phone 1 cannot be unlocked, and because the random code generated by the server is used for unlocking the mobile phone 1, other mobile phone users cannot know the random code, i.e. the mobile phone 2 user cannot know the random code 606, the mobile phone 2 cannot be unlocked, therefore, although the identification code input by the user is wrong, the mobile phone corresponding to the wrong identification code cannot be unlocked, and therefore mistaken unlocking can be prevented.
According to the embodiment of the application, the corresponding relation between the second random code and the second identification code is prestored in the server, and the second random code is displayed, so that a user can conveniently input the random code corresponding to the mobile terminal to be unlocked in the mobile terminal, and double verification is carried out according to the input random code and the identification code of the mobile terminal, and therefore mistaken unlocking can be prevented, and loss of a cooperative operator is reduced.
Referring to fig. 5, a schematic structural diagram of an unlocking device provided in an embodiment of the present application is shown, and for convenience of description, only portions related to the embodiment of the present application are shown.
The unlocking device includes:
a first obtaining module 51, configured to obtain a first random code input by a user;
a second obtaining module 52, configured to obtain the first identification code of the mobile terminal;
a data sending module 53, configured to send the first random code and the first identification code to a server;
and the unlocking module 54 is configured to unlock the mobile terminal according to the unlocking data when the unlocking data is received, wherein the unlocking data is fed back by the server after the server receives the first random code and the first identification code.
Optionally, the unlocking device further includes:
and the prompting module 55 is configured to prompt the user that the first random code is wrong when receiving the random code wrong information.
The unlocking device provided by the embodiment of the application can be applied to the method embodiments, and for details, reference is made to the description of the method embodiments, and details are not repeated here.
Referring to fig. 6, a schematic structural diagram of an unlocking device according to another embodiment of the present application is shown, and for convenience of description, only the portions related to the embodiment of the present application are shown.
The unlocking device includes:
a random code obtaining module 60, configured to obtain a second random code corresponding to the first identification code when the first random code and the first identification code are received;
a random code comparison module 61, configured to compare the first random code with the second random code;
and an unlocking data sending module 62, configured to send unlocking data to the mobile terminal corresponding to the first identification code if the first random code is the same as the second random code.
Optionally, the unlocking device further includes:
an identification code obtaining module 63, configured to obtain a second identification code input by a user;
a random code generation module 64 for generating a second random code;
a relationship establishing module 65, configured to establish a corresponding relationship between the second random code and the second identification code, and store the corresponding relationship between the second random code and the second identification code;
and a random code display module 66 for displaying the second random code.
Optionally, the unlocking device further includes:
a time setting module 67, configured to set an effective time according to a correspondence between the second random code and the second identification code;
a relationship deleting module 68, configured to delete the correspondence between the second random code and the second identification code if the storage time of the correspondence between the second random code and the second identification code exceeds the valid time.
Optionally, the unlocking device further includes:
and an information sending module 69, configured to send a random code error message to the mobile terminal if the first random code is different from the second random code.
The unlocking device provided by the embodiment of the application can be applied to the method embodiments, and for details, reference is made to the description of the method embodiments, and details are not repeated here.
Fig. 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present application. The mobile terminal as shown in the figure may include: one or more processors 701 (only one shown); one or more input devices 702 (only one shown), one or more output devices 703 (only one shown), and memory 704. The processor 701, the input device 702, the output device 703, and the memory 704 are connected by a bus 705. The memory 704 is used for storing instructions and the processor 701 is used for executing the instructions stored by the memory 704. Wherein:
the processor 701 is configured to obtain a first random code input by a user; acquiring a first identification code of the mobile terminal; sending the first random code and the first identification code to a server; and when unlocking data are received, unlocking the mobile terminal according to the unlocking data, wherein the unlocking data are fed back by the server after the first random code and the first identification code are received.
Optionally, the processor 701 is further configured to:
and when receiving the random code error information, prompting the user that the first random code has an error.
It should be understood that, in the embodiment of the present Application, the Processor 701 may be a Central Processing Unit (CPU), and the Processor may also be other general processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 702 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, a data receiving interface, and the like. The output devices 703 may include a display (LCD, etc.), speakers, a data transmission interface, and so forth.
The memory 704 may include both read-only memory and random-access memory, and provides instructions and data to the processor 701. A portion of the memory 704 may also include non-volatile random access memory. For example, the memory 704 may also store device type information.
In a specific implementation, the processor 701, the input device 702, the output device 703, and the memory 704 described in this embodiment of the present application may execute the implementation described in the embodiment of the unlocking method provided in this embodiment of the present application, and may also execute the implementation described in the unlocking apparatus provided in this embodiment of the present application, which is not described herein again.
Fig. 8 is a schematic structural diagram of a server according to an embodiment of the present application. The server as shown may include: one or more processors 801 (only one shown); one or more input devices 802 (only one shown), one or more output devices 803 (only one shown), and a memory 804. The processor 801, the input device 802, the output device 803, and the memory 804 described above are connected by a bus 805. The memory 804 is used for storing instructions and the processor 801 is used for executing the instructions stored by the memory 804. Wherein:
the processor 801 is configured to, when receiving a first random code and a first identification code, acquire a second random code corresponding to the first identification code; comparing the first random code and the second random code; and if the first random code is the same as the second random code, unlocking data is sent to the mobile terminal corresponding to the first identification code.
Optionally, the processor 801 is further configured to:
acquiring a second identification code input by a user;
generating a second random code;
establishing a corresponding relation between the second random code and the second identification code, and storing the corresponding relation between the second random code and the second identification code;
and displaying the second random code.
Optionally, the processor 801 is further configured to:
setting an effective time aiming at the corresponding relation between the second random code and the second identification code;
and if the storage time of the corresponding relation between the second random code and the second identification code exceeds the valid time, deleting the corresponding relation between the second random code and the second identification code.
Optionally, the processor 801 is further configured to:
and if the first random code is different from the second random code, sending random code error information to the mobile terminal.
It should be understood that in the embodiment of the present application, the processor 801 may be a CPU, and the processor may also be other general processors, DSPs, ASICs, FPGAs (field programmable gate arrays) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 802 may include a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of the fingerprint), a microphone, a data receiving interface, and the like. The output devices 803 may include a display (LCD, etc.), speakers, a data transmission interface, and the like.
The memory 804 may include both read-only memory and random access memory, and provides instructions and data to the processor 801. A portion of the memory 804 may also include non-volatile random access memory. For example, the memory 804 may also store device type information.
In a specific implementation, the processor 801, the input device 802, the output device 803, and the memory 804 described in this embodiment of the present application may execute the implementation described in the embodiment of the unlocking method provided in this embodiment of the present application, and may also execute the implementation described in the unlocking apparatus provided in this embodiment of the present application, which is not described herein again.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The embodiments of the present application further provide a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps in the above-mentioned method embodiments.
The embodiments of the present application provide a computer program product, which when running on a mobile terminal, enables the mobile terminal to implement the steps in the above method embodiments when executed.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the processes in the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the embodiments of the methods described above when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer readable medium may include at least: any entity or device capable of carrying computer program code to a photographing apparatus/terminal apparatus, a recording medium, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), an electrical carrier signal, a telecommunications signal, and a software distribution medium. Such as a usb-disk, a removable hard disk, a magnetic or optical disk, etc. In certain jurisdictions, computer-readable media may not be an electrical carrier signal or a telecommunications signal in accordance with legislative and patent practice.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/mobile terminal/server and method may be implemented in other ways. For example, the above-described apparatus/mobile terminal/server embodiments are merely illustrative, and for example, the division of the modules or units is only one logical division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present application and are intended to be included within the scope of the present application.

Claims (6)

1. An unlocking method, characterized in that the unlocking method comprises:
when a first random code and a first identification code are received, a second random code corresponding to the first identification code is obtained;
comparing the first random code and the second random code;
if the first random code is the same as the second random code, unlocking data are sent to the mobile terminal corresponding to the first identification code;
the unlocking method further comprises the following steps:
acquiring a second identification code input by a user;
generating a second random code;
establishing a corresponding relation between the second random code and the second identification code, and storing the corresponding relation between the second random code and the second identification code;
and displaying the second random code.
2. The unlocking method according to claim 1, further comprising, after establishing the correspondence between the second random code and the second identification code:
setting an effective time aiming at the corresponding relation between the second random code and the second identification code;
and if the storage time of the corresponding relation between the second random code and the second identification code exceeds the valid time, deleting the corresponding relation between the second random code and the second identification code.
3. The unlocking method according to claim 1, characterized in that the unlocking method further comprises:
and if the first random code is different from the second random code, sending random code error information to the mobile terminal.
4. An unlocking device, characterized in that it comprises:
the random code acquisition module is used for acquiring a second random code corresponding to the first identification code when the first random code and the first identification code are received;
a random code comparison module for comparing the first random code and the second random code;
the unlocking data sending module is used for sending unlocking data to the mobile terminal corresponding to the first identification code if the first random code is the same as the second random code;
the unlocking device further includes:
the identification code acquisition module is used for acquiring a second identification code input by a user;
the random code generating module is used for generating a second random code;
the relation establishing module is used for establishing the corresponding relation between the second random code and the second identification code and storing the corresponding relation between the second random code and the second identification code;
and the random code display module is used for displaying the second random code.
5. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the unlocking method according to any one of claims 1 to 3 when executing the computer program.
6. A computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the unlocking method according to any one of claims 1 to 3.
CN201910710856.0A 2019-08-02 2019-08-02 Unlocking method, unlocking device, mobile terminal and server Active CN110418331B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910710856.0A CN110418331B (en) 2019-08-02 2019-08-02 Unlocking method, unlocking device, mobile terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910710856.0A CN110418331B (en) 2019-08-02 2019-08-02 Unlocking method, unlocking device, mobile terminal and server

Publications (2)

Publication Number Publication Date
CN110418331A CN110418331A (en) 2019-11-05
CN110418331B true CN110418331B (en) 2022-04-12

Family

ID=68365366

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910710856.0A Active CN110418331B (en) 2019-08-02 2019-08-02 Unlocking method, unlocking device, mobile terminal and server

Country Status (1)

Country Link
CN (1) CN110418331B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112770319A (en) * 2020-12-31 2021-05-07 宇龙计算机通信科技(深圳)有限公司 Terminal locking and unlocking method and device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004213358A (en) * 2002-12-27 2004-07-29 Sogo Keibi Hosho Co Ltd Monitoring method and monitoring system
CN101043327A (en) * 2007-03-16 2007-09-26 中兴通讯股份有限公司 Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
CN103596164A (en) * 2013-11-15 2014-02-19 华为终端有限公司 Terminal network locking control method and mobile terminal
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN104660401A (en) * 2013-11-15 2015-05-27 深圳市腾讯计算机系统有限公司 Authentication method, authentication system and terminal
CN105577931A (en) * 2015-12-25 2016-05-11 深圳市财富之舟科技有限公司 International mobile equipment identifier (IMEI) code based anti-theft method
CN105827563A (en) * 2015-01-04 2016-08-03 中国移动通信集团江西有限公司 Information verification method, intermediate platform and business support system
CN107623907A (en) * 2016-07-14 2018-01-23 中兴通讯股份有限公司 ESIM clamping locks network method, terminal and lock network certificate server

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001088720A2 (en) * 2000-05-15 2001-11-22 Superspeed Software, Inc. System and method for high-speed substitute cache
US20070288394A1 (en) * 2000-12-01 2007-12-13 Carrott Richard F Transactional security over a network
US9172493B2 (en) * 2006-12-18 2015-10-27 International Business Machines Corporation Caller-identity based security
US8649335B2 (en) * 2009-12-01 2014-02-11 At&T Intellectual Property I, L.P. Service models for roaming mobile device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004213358A (en) * 2002-12-27 2004-07-29 Sogo Keibi Hosho Co Ltd Monitoring method and monitoring system
CN101043327A (en) * 2007-03-16 2007-09-26 中兴通讯股份有限公司 Anti-symmetric algorithmic based mobile terminal security lock network locking card protection and unlocking method
CN103596164A (en) * 2013-11-15 2014-02-19 华为终端有限公司 Terminal network locking control method and mobile terminal
CN104660401A (en) * 2013-11-15 2015-05-27 深圳市腾讯计算机系统有限公司 Authentication method, authentication system and terminal
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN105827563A (en) * 2015-01-04 2016-08-03 中国移动通信集团江西有限公司 Information verification method, intermediate platform and business support system
CN105577931A (en) * 2015-12-25 2016-05-11 深圳市财富之舟科技有限公司 International mobile equipment identifier (IMEI) code based anti-theft method
CN107623907A (en) * 2016-07-14 2018-01-23 中兴通讯股份有限公司 ESIM clamping locks network method, terminal and lock network certificate server

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
C-Terminal End-Directed Protein Elimination by CRL2 Ubiquitin Ligases;Hsiu-Chuan Lin;《Molecular Cell》;20180517;全文 *
换手机号应当及时解除所有绑定;钱婉;《百姓生活》;20150501;全文 *

Also Published As

Publication number Publication date
CN110418331A (en) 2019-11-05

Similar Documents

Publication Publication Date Title
CN112771826B (en) Application program login method, application program login device and mobile terminal
US7203481B2 (en) Radio communication system with high security level, and communication unit and portable terminal used therefor
US20090298468A1 (en) System and method for deleting data in a communication device
EP3541098B1 (en) Processing method for communication identifier binding and terminal
CN104902028A (en) Onekey registration authentication method, device and system
KR20160077071A (en) Authentication for application
CN104901925A (en) End-user identity authentication method, device and system and terminal device
WO2019237542A1 (en) Application login method and apparatus for electronic device, and electronic device and medium
EP4174689A1 (en) Blockchain-based user information processing method and system
WO2019033840A1 (en) Password authentication method for shared device, shared device, cloud server, and system
CN110474864B (en) Method for registering and logging in mobile application program and electronic equipment
US20080160960A1 (en) Remote processing device management
CN105101205A (en) One-click login authentication method, device and system
CN112738046A (en) One-key login method, terminal and system server
CN110418331B (en) Unlocking method, unlocking device, mobile terminal and server
CN105187412A (en) Login authentication method, device and system based on gesture recognition
CN108540591B (en) Address book management method, address book management device and electronic equipment
CN112215025B (en) Radio frequency card function calling method and device
CN109858235B (en) Portable equipment and password obtaining method and device thereof
CN104519553B (en) Access point selection system and method
CN110602700B (en) Seed key processing method and device and electronic equipment
CN111400684B (en) Electronic license information acquisition method, system, device, equipment and storage medium
CN110719590B (en) One-key login method, device, equipment and storage medium based on mobile phone number
CN107135075B (en) Authorization method and device for user operation
CN115943623A (en) Techniques for managing telephone number-based user accounts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant