CN110505295B - Unlocking information setting method, device and equipment - Google Patents

Unlocking information setting method, device and equipment Download PDF

Info

Publication number
CN110505295B
CN110505295B CN201910769005.3A CN201910769005A CN110505295B CN 110505295 B CN110505295 B CN 110505295B CN 201910769005 A CN201910769005 A CN 201910769005A CN 110505295 B CN110505295 B CN 110505295B
Authority
CN
China
Prior art keywords
information
biological information
terminal device
user
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910769005.3A
Other languages
Chinese (zh)
Other versions
CN110505295A (en
Inventor
徐海钻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN201910769005.3A priority Critical patent/CN110505295B/en
Publication of CN110505295A publication Critical patent/CN110505295A/en
Application granted granted Critical
Publication of CN110505295B publication Critical patent/CN110505295B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the specification discloses an unlocking information setting method, device and equipment. The scheme comprises the following steps: when a user sets unlocking information for a first terminal device, the first terminal device generates a biological information acquisition request carrying account information based on the triggering operation of the user, sends the biological information acquisition request to a server, and sets the biological information of the user corresponding to the account information fed back by the server as the unlocking information of the first terminal device.

Description

Unlocking information setting method, device and equipment
The present application relates to the field of computer data processing technologies, and in particular, to a method, an apparatus, and a device for setting unlocking information.
Background
With the continuous development of science and technology, the functions supported by various terminal devices are more and more abundant, and the relationship between users and the terminal devices is more and more compact, so that many users begin to use the coded lock software to protect the privacy of personal terminal devices. At present, the frequency of replacing personal terminal equipment by a user is higher and higher, and the user needs to input personal biological information on new terminal equipment every time the user replaces the personal terminal equipment so as to set unlocking information of the new terminal equipment, so that the user operation is more complicated.
Based on this, it is necessary to provide a more convenient unlocking information setting method for the user.
Disclosure of Invention
In view of this, embodiments of the present application provide an unlocking information setting method, an unlocking information setting device, and an unlocking information setting apparatus, which are used to solve the problem that a more convenient unlocking information setting method needs to be provided for a user.
In order to solve the above technical problem, the embodiments of the present specification are implemented as follows:
an unlocking information setting method provided in an embodiment of the present specification is applied to a first terminal device, and includes:
acquiring a trigger operation of a user on the first terminal device;
generating a biological information acquisition request according to the trigger operation, wherein the biological information acquisition request carries account information;
sending the biological information acquisition request to a server;
receiving biological information fed back by the server, wherein the biological information is the biological information of the user corresponding to the account information;
and setting the biological information as unlocking information of the first terminal equipment, wherein the unlocking information is used for identifying a user for unlocking the first terminal equipment.
An unlocking information setting method provided in an embodiment of the present specification, applied to a server, includes:
acquiring a biological information acquisition request sent by first terminal equipment, wherein the biological information acquisition request carries account information;
responding to the biological information acquisition request, and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information;
and sending the biological information to be fed back to the first terminal equipment so that the first terminal equipment can conveniently set unlocking information according to the biological information to be fed back.
An unlocking information setting method provided in an embodiment of the present specification is applied to a second terminal device, and includes:
obtaining uploading operation input by a user based on an application interface displayed on the second terminal device, wherein the second terminal device logs in a registered account of an application corresponding to the application interface;
and responding to the uploading operation, sending the biological information acquired by the second terminal equipment to a server so that the first terminal equipment can acquire the biological information from the server as unlocking information of the first terminal equipment based on the account information of the registered account.
An unlocking information setting device provided in an embodiment of the present specification is applied to a first terminal device, and includes:
the acquisition module is used for acquiring the trigger operation of the user on the first terminal equipment;
a biological information acquisition request generation module, configured to generate a biological information acquisition request according to the trigger operation, where the biological information acquisition request carries account information;
the sending module is used for sending the biological information acquisition request to a server;
the receiving module is used for receiving the biological information fed back by the server, and the biological information is the biological information of the user corresponding to the account information;
the setting module is used for setting the biological information as unlocking information of the first terminal device, and the unlocking information is used for identifying a user unlocking the first terminal device.
An unlocking information setting device provided in an embodiment of the present specification is applied to a server, and includes:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a biological information acquisition request sent by first terminal equipment, and the biological information acquisition request carries account information;
the determining module is used for responding to the biological information acquisition request and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information;
and the sending module is used for sending the biological information to be fed back to the first terminal equipment so as to facilitate the first terminal equipment to set unlocking information according to the biological information to be fed back.
An unlocking information setting device provided in an embodiment of the present specification is applied to a second terminal device, and includes:
the acquisition module is used for acquiring uploading operation input by a user based on an application interface displayed on the second terminal device, and the second terminal device is logged with a registered account of an application corresponding to the application interface;
and the sending module is used for responding to the uploading operation and sending the biological information acquired by the second terminal equipment to a server so that the first terminal equipment can acquire the biological information from the server based on the account information of the registered account as the unlocking information of the first terminal equipment.
An unlocking information setting device provided in an embodiment of the present specification includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring the trigger operation of the user on the unlocking information setting equipment;
generating a biological information acquisition request according to the trigger operation, wherein the biological information acquisition request carries account information;
sending the biological information acquisition request to a server;
receiving biological information fed back by the server, wherein the biological information is the biological information of the user corresponding to the account information;
and setting the biological information as unlocking information of the unlocking information setting equipment, wherein the unlocking information is used for identifying a user unlocking the unlocking information setting equipment.
An unlocking information setting device provided in an embodiment of the present specification includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring a biological information acquisition request sent by first terminal equipment, wherein the biological information acquisition request carries account information;
responding to the biological information acquisition request, and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information;
and sending the biological information to be fed back to the first terminal equipment so that the first terminal equipment can conveniently set unlocking information according to the biological information to be fed back.
An unlocking information setting device provided in an embodiment of the present specification includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring uploading operation input by a user based on an application interface displayed on the unlocking information setting equipment, wherein the registered account of the application corresponding to the application interface is logged on the unlocking information setting equipment;
and responding to the uploading operation, and sending the biological information acquired by the unlocking information setting equipment to a server so that the first terminal equipment can acquire the biological information from the server based on the account information of the registered account as the unlocking information of the first terminal equipment.
The embodiment of the present specification provides a computer readable medium, on which computer readable instructions are stored, and the computer readable instructions can be executed by a processor to implement the unlocking information setting method.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
when a user sets unlocking information for a first terminal device, the first terminal device generates a biological information acquisition request carrying account information based on the triggering operation of the user, sends the biological information acquisition request to a server, sets the biological information of the user, which is fed back by the server and corresponds to the account information, as the unlocking information of the first terminal device, and the user can finish the setting of the unlocking information of the first terminal device without inputting personal biological information on the first terminal device, so that the method is convenient and fast.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of an unlocking information setting method provided in an embodiment of the present specification;
fig. 2 is a schematic view of an application scenario of an unlocking information setting method provided in an embodiment of the present specification;
fig. 3 is a schematic flowchart of an unlocking information setting method provided in an embodiment of the present specification;
fig. 4 is a schematic flowchart of an unlocking information setting method provided in an embodiment of the present specification;
fig. 5 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 1, provided in an embodiment of the present specification;
fig. 6 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 3, provided in an embodiment of the present specification;
fig. 7 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 4, provided in an embodiment of the present specification;
fig. 8 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 1 provided in an embodiment of the present specification.
Fig. 9 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 3 provided in an embodiment of the present specification.
Fig. 10 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 4 provided in an embodiment of the present specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
With the development of technology, people gradually realize that unique biological information of each person is the most safe and convenient 'password', and therefore, the technology of the coded lock based on biological identification is rapidly popularized. And the terminal equipment with the function of acquiring the biological information of the user provides possibility for popularization of the coded lock technology based on biological identification.
At present, when a user uses a biometric unlocking function on a terminal device, the user needs to enter personal biometric information on the terminal device, and the entered personal biometric information is set as unlocking information of the terminal device, so that the user can unlock the terminal device by inputting the personal biometric information when the terminal device is locked by a coded lock. When the unlocking information setting method is adopted, the user needs to input the personal biological information once on the new terminal equipment every time the user changes the personal terminal equipment, so that the unlocking information of the new terminal equipment is set, and the user operation is complicated.
To solve the above problem, embodiments of the present specification provide an unlocking information setting method, an unlocking information setting device, and an unlocking information setting apparatus, which are used to solve the problem that when a user sets unlocking information for a terminal device, the operation is complicated.
Fig. 1 is a method for setting unlocking information according to an embodiment of the present specification, and from a program perspective, an execution subject of a flow may be a program loaded on a terminal device to be set with unlocking information.
As shown in fig. 1, the process applied to the first terminal device may include:
step 101: and acquiring the trigger operation of the user on the first terminal equipment.
In an embodiment of the present specification, the first terminal device is a terminal device to be configured with unlocking information, and the first terminal device supports a biometric unlocking function. Wherein the biometric unlocking function means: the user can use the biometric information of the individual to implement the unlocked function. Specifically, the biometric unlocking function is: the preset unlocking information of the first terminal equipment is compared with the biological information of the user who executes the unlocking action and is collected by the first terminal equipment, and if the preset unlocking information of the first terminal equipment is matched with the biological information of the user, the locking function of the first terminal equipment is released. The biometric unlocking function can be applied to the process of unlocking the screen of the first terminal device or unlocking a locked file in the first terminal device.
In practical application, if a user needs to use the biometric unlocking function supported by the first terminal device, the user needs to perform a trigger operation on the first terminal device first to set the unlocking information of the first terminal device, and after the setting of the unlocking information of the first terminal device is completed, the user can unlock the first terminal device by using the biometric unlocking function of the first terminal device.
Step 102: and generating a biological information acquisition request according to the trigger operation, wherein the biological information acquisition request carries account information.
In an embodiment of the present specification, after obtaining a trigger operation of a user, a first terminal device generates a biological information obtaining request carrying account information, where the biological information obtaining request is used to request a server for biological information having an association relationship with the account information, and the account information carried in the biological information obtaining request depends on an account adopted when the user uploads personal biological information to the server by using the terminal device.
Step 103: and sending the biological information acquisition request to a server.
Step 104: and receiving the biological information fed back by the server, wherein the biological information is the biological information of the user corresponding to the account information.
In an embodiment of the present specification, the server stores in advance biometric information of an individual who the user uploads based on an application account, and the server also stores an association relationship between the biometric information and account information of an account on which the biometric information is uploaded.
Fig. 2 is a schematic view of an application scenario corresponding to the unlocking information setting method in fig. 1 provided in an embodiment of this specification, and as shown in fig. 2, when receiving a biological information acquisition request carrying account information sent by a first terminal device 203, a server 202 may determine, according to biological information and an association relationship stored in advance in the server 202, biological information having an association relationship with the account information carried in the biological information acquisition request, and feed back the determined biological information to the first terminal device 203. Since the biometric information fed back to the first terminal device 203 by the server 202 is the biometric information of the individual uploaded by the user based on the application account logged in on the second terminal device 201, the biometric information fed back by the server 202 can be used as the unlocking information of the first terminal device 203.
Specifically, the biometric information fed back by the server may be unlocking information set by the user for the second terminal device, or user authentication information set by the user for a registered account logged in the second terminal device, where the user authentication information may be information used to log in, unlock, or modify an account password for the registered account. The biological information may include fingerprint information, face information, voice information, blood flow information, iris information, body temperature information, infrared imaging information, or the like of the user collected by the second terminal device, and of course, the biological information may further include biological characteristic data generated after the fingerprint information, face information, voice information, blood flow information, iris information, body temperature information, infrared imaging information, or the like of the user collected by the second terminal device is processed.
Step 105: and setting the biological information as unlocking information of the first terminal equipment, wherein the unlocking information is used for identifying a user for unlocking the first terminal equipment.
In the embodiments of the present specification, the unlock information means a biometric key set by the user to the biometric function of the first terminal device. Subsequently, if there is a user who needs to unlock the first terminal device based on the biometric unlocking function, the first terminal device needs to acquire the personal biometric information of the current user, and compare the biometric key (i.e., the unlocking information) set in step 105 with the personal biometric information of the current user, if the biometric key and the personal biometric information are matched, the first terminal device is unlocked, and if the biometric key and the personal biometric information are not matched, the first terminal device is locked, so that the data in the first terminal device is protected. In practical application, according to actual needs, the biological information may be set as the screen unlocking information of the first terminal device, or may be set as the unlocking information of the locked file in the first terminal device.
In the embodiment of the present specification, the server stores personal biological information of the user in advance, when the user needs to set unlocking information for the first terminal device, the biological information of the user fed back by the server may be set as the unlocking information of the first terminal device, and the setting of the biological unlocking information of the first terminal device may be completed without the user entering the personal biological information again, which is convenient and fast.
Based on the method in fig. 1, the present specification also provides some specific embodiments of the method, which are described below.
In this embodiment of the present specification, there may be multiple implementations of the user performing the trigger operation on the first terminal device in step 101, where one implementation is: the user clicks a function button in a designated application of a registered account in the first terminal device to complete the triggering operation; the other realization mode is as follows: and the user sends the appointed application account information and the corresponding account verification information to the server through the first terminal equipment to complete the triggering operation.
In the first implementation manner of the user performing the trigger operation, step 101 in fig. 1: acquiring a trigger operation of the first terminal device by the user, which may specifically include:
and acquiring biological information acquisition operation input by a user based on an application interface displayed on the first terminal equipment, wherein the registered account of the application corresponding to the application interface is logged on the first terminal equipment.
Correspondingly, step 102: generating a biological information acquisition request according to the trigger operation, which may specifically include:
and generating a biological information acquisition request according to the biological information acquisition operation, wherein the biological information acquisition request carries account information of the registered account.
In this implementation manner, the first terminal device is loaded with a specific application, and a user can input a trigger operation based on an application interface of the specific application. For example, a user may log in a registered account at a specific application on a first terminal device, and manipulate the first terminal device to display an application interface of the specific application including a specific function button, and the user may click the function button to perform a trigger operation on the first terminal device.
Correspondingly, after recognizing that the user clicks a specified function button in an application interface of a specified application, the first terminal device may generate a biological information acquisition request, where the biological information acquisition request carries account information of a registered account at the specified application logged in the first terminal device. The account information may be used to determine a registered account at only one designated application, for example, the account information may be a unique identifier of the registered account, and the like.
Correspondingly, the server in step 103 may be a server of the specified application, that is, the server in step 103 may be a server of an application to which the account information carried in the biological information acquisition request belongs. Before the user performs the triggering operation in step 101, the user needs to upload the personal biometric information to the server in step 103 based on the registered account corresponding to the account information carried in the biometric information acquisition request.
In the second implementation manner of the user performing the trigger operation, step 101 in fig. 1: acquiring a trigger operation of the first terminal device by the user, which may specifically include:
the method comprises the steps of obtaining information sending operation input by a user based on an interface of a first application displayed on the first terminal device, wherein the information sending operation is used for sending registered account information and registered account verification information of a second application input by the user in the interface, and the first application and the second application are different applications.
Correspondingly, step 102: generating a biological information acquisition request according to the trigger operation, which may specifically include:
and generating a biological information acquisition request according to the information sending operation, wherein the biological information acquisition request carries the registered account information and the registered account verification information.
In this implementation, the first application may include, but is not limited to, an application for sending a short message, a fax, or an email. The second application is an application used when the user uploads the biometric information of the individual to the server.
The registered account information of the second application input by the user refers to: and when the user uploads the personal biological information to the server, the account information of the registered account at the second application is adopted, and the registered account at the second application can be determined according to the registered account information of the second application input by the user.
The registered account verification information input by the user refers to: and the information is used for verifying whether the user has the use authority of the account corresponding to the registered account information of the second application input by the user. For example, the registered account authentication information may be a preset service password of an account corresponding to the registered account information of the second application input by the user. The server may determine whether to feed back the biometric information to the first terminal device by verifying the registered account information of the second application and the registered account verification information input by the user.
For example, when the first application is a short message application, the user may input the registered account information (i.e., the account identifier AAA) and the registered account authentication information (i.e., the preset service password abc) at the second application in the short message application interface of the first terminal device, and input the communication address (e.g., the number 123) used by the server to receive the short message, and the user may execute an information sending operation on the first terminal device by clicking an information sending button in the short message application interface. The first terminal device responds to the information sending operation of the user, and sends the account identifier AAA and the preset service password abc to the number 123, so that the server receives the information input by the user in the first application interface. The server can verify whether the account identifier AAA is matched with the preset service password abc, and if so, the biological information having an association relation with the account identifier AAA is fed back to the first terminal equipment.
In the embodiment of the specification, various selectable implementation modes are provided when the user executes the trigger operation on the first terminal device, and the user can select a more convenient mode to execute the trigger operation according to actual conditions, so that the user experience is improved.
In this embodiment of the present specification, the biometric information fed back to the first terminal device by the server may be encrypted information, and after step 104, the method may further include: and decrypting the biological information to obtain plaintext biological information.
Correspondingly, step 105: setting the biological information as the unlocking information of the first terminal device may specifically include: setting the plaintext bio-information as unlocking information of the first terminal device
In this embodiment of the present specification, when the user adopts the first implementation manner of executing the trigger operation, since the biological information fed back by the server is uploaded to the server after the user has been encrypted based on the specified application, when the user acquires the biological information based on the specified application loaded on the first terminal device, the biological information may be decrypted by using the specified application, so as to obtain plaintext biological information.
When the user adopts the second implementation mode of executing the trigger operation, because the user acquires the biological information based on the first application on the first terminal device, the biological information fed back by the server is uploaded to the server based on the second application after the user is encrypted, and the first application and the second application are different applications, the server needs to feed back the encryption mode of the biological information in addition to the feedback of the biological information, so that the user can decrypt the biological information according to the encryption mode fed back by the server to obtain the plaintext biological information. In practical application, the biological information and the encryption mode fed back by the server can be separately sent, so that the data security is improved.
In the embodiment of the present specification, by enabling the server to feed back the encrypted biological information, adverse effects caused by leakage of the biological information in the data transmission process can be reduced, and the security of the unlocking information setting method can be improved.
In the present illustrative embodiment, at step 105: before the setting the biological information as the unlocking information of the first terminal device, the method may further include:
and judging whether the user has the set authority of the unlocking information of the first terminal equipment. And if so, setting the biological information as the unlocking information of the first terminal equipment. And if not, determining that the setting of the unlocking information of the first terminal equipment fails.
In the embodiment of the present specification, in order to avoid that a lawbreaker illegally tampers with the unlocking information of the terminal devices of other users, before setting the biological information fed back by the server as the unlocking information of the first terminal device, it is further necessary to determine that the user performing the unlocking information setting has the unlocking information right for the first terminal device.
Specifically, when the first terminal device has the preset unlocking information setting password, before performing step 105, the method may further include:
acquiring an unlocking information setting password input by the user; judging whether the unlocking information setting password is matched with a preset unlocking information setting password of the first terminal equipment or not; if yes, go to step 105; and if not, determining that the setting of the unlocking information of the first terminal equipment fails.
When the unlocking information setting password is not set in the first terminal device, whether the user has the unlocking information authority of the first terminal device or not can be judged by judging whether the user has the legal use right of the first terminal device or not. Specifically, before performing step 105, the method may further include:
acquiring a purchase certificate input by a user into first terminal equipment; judging whether the purchase voucher is matched with the sales information of the first terminal equipment aiming at the manufacturer of the first terminal equipment; if yes, go to step 105; and if not, determining that the setting of the unlocking information of the first terminal equipment fails.
In the embodiment of the present specification, after it is determined that the user performing the unlocking information setting has the unlocking information authority for the first terminal device, the biological information acquired by the user from the server is set as the unlocking information of the first terminal device, so that the risk that lawbreakers illegally tamper with the unlocking information on the terminal devices of other users can be reduced, and the security of the unlocking information setting method can be improved.
Fig. 3 is a method for setting unlocking information according to an embodiment of the present disclosure. From a procedural perspective, the execution body of the method may be the server of a given application. As shown in fig. 3, the process may include the following steps:
step 301: the method comprises the steps of obtaining a biological information obtaining request sent by a first terminal device, wherein the biological information obtaining request carries account information.
Step 302: and responding to the biological information acquisition request, and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information.
In the embodiment of the present specification, the server stores in advance personal biometric information uploaded by the user based on a registered account at a designated application, and also stores in the server an association between the biometric information of the user and account information of the registered account from which the biometric information is uploaded. When the server receives the biological information acquisition request, the server can determine the account information carried in the biological information acquisition request, determine the biological information which has an association relationship with the account information carried in the biological information acquisition request based on the association relationship stored in the server, and feed back the determined biological information as the information to be fed back.
Step 303: and sending the biological information to be fed back to the first terminal equipment so that the first terminal equipment can conveniently set unlocking information according to the biological information to be fed back.
In the embodiment of the description, the server is enabled to pre-store the personal biological information of the user and the association relationship between the biological information of the user and the corresponding account information, so that when the server receives a biological information acquisition request which is sent by the first terminal device and carries the account information, the biological information of the user corresponding to the account information in the biological information acquisition request is fed back to the first terminal device, and therefore the user can complete the setting of the biological unlocking information of the first terminal device without inputting the personal biological information into the first terminal device, and the method and the device are convenient and fast.
In the embodiment of the present specification, in step 301: before acquiring the biological information acquisition request sent by the first terminal device, the method may further include:
and acquiring and storing biological information sent by a second terminal device, wherein the biological information is sent by a user based on a registered account logged in on the second terminal device.
In this embodiment of the present specification, when receiving biometric information sent by a user based on a registered account logged in by a second terminal device, a server stores the biometric information sent by the second terminal device, and establishes an association relationship between the biometric information and account information of the registered account that sent the biometric information, so that when the user requests the server to acquire biometric information based on the account information of the registered account, the server feeds back corresponding biometric information to the user.
Fig. 4 is a method for setting unlocking information according to an embodiment of the present disclosure. From a program perspective, the execution subject of the method may be a program loaded on a terminal device for uploading the biological information to a server. As shown in fig. 4, the process may include the following steps:
step 401: and acquiring uploading operation input by a user based on an application interface displayed on the second terminal equipment, wherein the registered account of the application corresponding to the application interface is logged on the second terminal equipment.
Step 402: and responding to the uploading operation, sending the biological information acquired by the second terminal equipment to a server so that the first terminal equipment can acquire the biological information from the server as unlocking information of the first terminal equipment based on the account information of the registered account.
In the embodiment of the present specification, the second terminal device is provided with a specified application, and the user can upload the personal biometric information to the server of the specified application based on the registered account at the specified application registered on the second terminal device. Specifically, the user may log in a registered account at a designated application on the second terminal device, operate the second terminal device to display an application interface of the designated application including a designated function button, and the user may input an upload operation by clicking the designated function button. And after identifying the uploading operation input by the user, the second terminal equipment uploads the biological information acquired by the second terminal equipment to the server side of the specified application. Correspondingly, the application interface of the designated application is the application interface of the user input upload operation in step 401. The server of the specified application is the server mentioned in step 402.
In the embodiment of the specification, the user can upload the personal biological information to the server based on the registered account at the specified application logged in the terminal device, so that the user can acquire the personal biological information from the server without logging in the personal information again when the user sets the unlocking information for the terminal device, and the method is convenient and fast.
In this embodiment of the present specification, there may be multiple implementations for step 402, where one implementation is: the unlocking information set by the user on the second terminal equipment or the application program carried by the second terminal equipment is uploaded to the server as biological information; the other realization mode is as follows: and uploading the currently acquired biological information of the user to a server.
In the first implementation manner, step 402 in fig. 4 may specifically include:
in response to the uploading operation, calling biological information acquired in advance by the second terminal equipment; the biological information is collected by the second terminal equipment when the user sets unlocking information for the second terminal equipment; or the biological information is collected by the second terminal device when the user sets user authentication information for the registered account logged on the second terminal device; the user authentication information may be biometric information used to log in, unlock, or modify an account password for the registered account. And sending the biological information to a server.
In this implementation manner, the biological information may include fingerprint information, face information, voice information, blood flow information, iris information, body temperature information, infrared imaging information, or the like of the user, which is acquired by the second terminal device. The biological information may further include biological feature data generated by processing information such as fingerprint information, face information, voice information, blood flow information, iris information, body temperature information, infrared imaging information, and the like of the collected user by the second terminal device.
In practical applications, in response to the uploading operation, the called biological information may be further: and the user sets the unlocking information for the biological identification unlocking function of the second terminal equipment, and at the moment, the first terminal equipment and the second terminal equipment which acquire the biological information from the server are set differently. Or, in response to the uploading operation, the called biological information may also be user authentication information set by the user for a registered account at a designated application logged in the second terminal device, and at this time, the first terminal device and the second terminal device that acquire the biological information from the server may be the same device or different devices.
In the second implementation manner, step 402 in fig. 4 may specifically include:
collecting biological information of the user in response to the uploading operation; and sending the biological information to a server.
In this implementation manner, after recognizing that the user inputs the uploading operation based on the application interface, the second terminal device may display a prompt message on the application interface to prompt the user to enter personal biological information into the second terminal device, and after acquiring the biological information of the user, the second terminal device may send the currently acquired biological information to the server.
In the embodiment of the specification, multiple selectable implementation modes are provided when the user uploads the biological information to the server, and the user can select a more convenient mode to upload the biological information according to actual conditions, so that the user experience is improved.
In this illustrative embodiment, for the method of FIG. 4, at step 402: before sending the biological information to the server, the method may further include: and encrypting the biological information to obtain ciphertext biological information.
Step 402 may specifically include: and sending the ciphertext biological information to a server.
In this embodiment of the present specification, an application corresponding to the application interface in the second terminal device may encrypt the biological information, and send ciphertext biological information obtained by the encryption to the server, so as to improve the use security of the method in fig. 4.
In this illustrative embodiment, for the method of FIG. 4, at step 402: before sending the biological information collected by the second terminal device to a server, the method may further include:
and if the user has the uploading authority of the biological information acquired by the second terminal equipment, sending the biological information acquired by the second terminal equipment to a server. If not, the biological information collected by the second terminal equipment is refused to be sent to the server.
In the embodiment of the present specification, after it is determined that the user has the right to upload the biological information acquired by the second terminal device, the biological information acquired by the second terminal device is uploaded to the server, so that the risk that a lawbreaker illegally acquires the biological information of other users can be reduced, and thus the use safety of the method in fig. 4 is improved.
Based on the same idea, the embodiment of the present specification further provides an apparatus corresponding to the method in fig. 1. Fig. 5 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 1 provided in an embodiment of the present specification. As shown in fig. 5, the apparatus is applied to a first terminal device, and may include:
an obtaining module 501, configured to obtain a trigger operation of the first terminal device by a user.
A biological information obtaining request generating module 502, configured to generate a biological information obtaining request according to the triggering operation, where the biological information obtaining request carries account information.
A sending module 503, configured to send the biological information obtaining request to a server.
A receiving module 504, configured to receive biological information fed back by the server, where the biological information is biological information of a user corresponding to the account information.
A setting module 505, configured to set the biological information as unlocking information of the first terminal device, where the unlocking information is used to identify a user who unlocks the first terminal device.
The obtaining module 501 may be specifically configured to: and acquiring biological information acquisition operation input by a user based on an application interface displayed on the first terminal equipment, wherein the registered account of the application corresponding to the application interface is logged on the first terminal equipment.
Correspondingly, the biological information obtaining request generating module 502 may be specifically configured to: and generating a biological information acquisition request according to the biological information acquisition operation, wherein the biological information acquisition request carries account information of the registered account.
Alternatively, the obtaining module 501 may specifically be configured to: the method comprises the steps of obtaining information sending operation input by a user based on an interface of a first application displayed on the first terminal device, wherein the information sending operation is used for sending registered account information and registered account verification information of a second application input by the user in the interface, and the first application and the second application are different applications.
Correspondingly, the biological information obtaining request generating module 502 may be specifically configured to: and generating a biological information acquisition request according to the information sending operation, wherein the biological information acquisition request carries the registered account information and the registered account verification information.
The apparatus in fig. 5 may further include a determining module, configured to determine whether the user has a set permission for the unlocking information of the first terminal device; correspondingly, the setting module 505 is configured to set the biological information as the unlocking information of the first terminal device when the determination module obtains a determination result indicating that the user has the setting authority for the unlocking information of the first terminal device.
Based on the same idea, the embodiment of the present specification further provides an apparatus corresponding to the method in fig. 3. Fig. 6 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 3 provided in an embodiment of the present specification. As shown in fig. 6, the apparatus, applied to the server, may include:
the obtaining module 601 is configured to obtain a biological information obtaining request sent by a first terminal device, where the biological information obtaining request carries account information.
A determining module 602, configured to determine, in response to the biological information obtaining request, to-be-fed back biological information, where the to-be-fed back biological information is pre-stored biological information of a user corresponding to the account information.
A sending module 603, configured to send the to-be-fed back biological information to the first terminal device, so that the first terminal device sets unlocking information according to the to-be-fed back biological information.
The apparatus in fig. 6 may further include: and the biological information acquisition module is used for acquiring and storing biological information sent by second terminal equipment, and the biological information is sent by a user based on a registered account logged in on the second terminal equipment.
Based on the same idea, the embodiment of the present specification further provides an apparatus corresponding to the method in fig. 4. Fig. 7 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 4 provided in an embodiment of the present specification. As shown in fig. 7, the apparatus, applied to the second terminal device, may include:
an obtaining module 701, configured to obtain an upload operation input by a user based on an application interface displayed on the second terminal device, where a registered account of an application corresponding to the application interface is logged in the second terminal device.
A sending module 702, configured to send, in response to the uploading operation, the biological information collected by the second terminal device to a server, so that the first terminal device obtains the biological information from the server based on the account information of the registered account as unlocking information of the first terminal device.
The sending module 702 may be specifically configured to: in response to the uploading operation, calling biological information acquired in advance by the second terminal equipment; the biological information is collected by the second terminal equipment when the user sets unlocking information for the second terminal equipment; or the biological information is collected by the second terminal device when the user sets user authentication information for the registered account logged on the second terminal device; and sending the biological information to a server.
Alternatively, the sending module 702 may specifically be configured to: collecting biological information of the user in response to the uploading operation; and sending the biological information to a server.
The apparatus in fig. 7, may further include: the encryption module is used for encrypting the biological information to obtain ciphertext biological information; correspondingly, the sending module 702 may be specifically configured to send the ciphertext biological information to a server.
The apparatus in fig. 7, may further include: and the judging module is used for judging whether the user has the uploading authority of the biological information acquired by the second terminal equipment. Correspondingly, the sending module 702 may be specifically configured to: and when the judgment module obtains a judgment result for indicating that the user has the uploading authority of the biological information acquired by the second terminal equipment, the biological information acquired by the second terminal equipment is sent to the server.
Based on the same idea, the embodiment of the present specification further provides an apparatus corresponding to the method in fig. 1. Fig. 8 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 1 provided in an embodiment of the present specification. As shown in fig. 8, the apparatus 800 may include:
at least one processor 810; and the number of the first and second groups,
a memory 830 communicatively coupled to the at least one processor; wherein,
the memory stores instructions 820 executable by the at least one processor 810 to enable the at least one processor 810 to:
and acquiring the trigger operation of the user on the unlocking information setting equipment.
And generating a biological information acquisition request according to the trigger operation, wherein the biological information acquisition request carries account information.
And sending the biological information acquisition request to a server.
And receiving the biological information fed back by the server, wherein the biological information is the biological information of the user corresponding to the account information.
And setting the biological information as unlocking information of the unlocking information setting equipment, wherein the unlocking information is used for identifying a user unlocking the unlocking information setting equipment.
Based on the same idea, the embodiment of the present specification further provides an apparatus corresponding to the method in fig. 3. Fig. 9 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 3 provided in an embodiment of the present specification. As shown in fig. 9, the apparatus 900 may include:
at least one processor 910; and the number of the first and second groups,
a memory 930 communicatively coupled to the at least one processor; wherein,
the memory stores instructions 920 executable by the at least one processor 910 to cause the at least one processor 910 to:
the method comprises the steps of obtaining a biological information obtaining request sent by a first terminal device, wherein the biological information obtaining request carries account information.
And responding to the biological information acquisition request, and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information.
And sending the biological information to be fed back to the first terminal equipment so that the first terminal equipment can conveniently set unlocking information according to the biological information to be fed back.
Based on the same idea, the embodiment of the present specification further provides an apparatus corresponding to the method in fig. 4. Fig. 10 is a schematic structural diagram of an unlocking information setting device corresponding to the method in fig. 4 provided in an embodiment of the present specification. As shown in fig. 10, the apparatus 1000 may include:
at least one processor 1010; and the number of the first and second groups,
a memory 1030 communicatively coupled to the at least one processor; wherein,
the memory stores instructions 1020 executable by the at least one processor 1010 to enable the at least one processor 1010 to:
and acquiring uploading operation input by a user based on an application interface displayed on the unlocking information setting equipment, wherein the registered account of the application corresponding to the application interface is logged on the unlocking information setting equipment.
And responding to the uploading operation, and sending the biological information acquired by the unlocking information setting equipment to a server so that the first terminal equipment can acquire the biological information from the server based on the account information of the registered account as the unlocking information of the first terminal equipment.
Based on the same idea, the embodiments of the present specification provide a computer readable medium, on which computer readable instructions are stored, and the computer readable instructions can be executed by a processor to implement the unlocking information setting method described above.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical modules. For example, a Programmable Logic Device (PLD), such as a Field Programmable Gate Array (FPGA), is an integrated circuit whose Logic functions are determined by programming the Device by a user. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually making an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as abel (advanced Boolean Expression Language), ahdl (alternate Hardware Description Language), traffic, pl (core universal Programming Language), HDCal (jhdware Description Language), lang, Lola, HDL, laspam, hardward Description Language (vhr Description Language), vhal (Hardware Description Language), and vhigh-Language, which are currently used in most common. It will also be apparent to those skilled in the art that hardware circuitry that implements the logical method flows can be readily obtained by merely slightly programming the method flows into an integrated circuit using the hardware description languages described above.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the units may be implemented in one or more software and/or hardware when implementing the present application.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of claims of the present application.

Claims (19)

1. An unlocking information setting method is applied to first terminal equipment and comprises the following steps:
acquiring a trigger operation of a user on the first terminal device;
generating a biological information acquisition request according to the trigger operation, wherein the biological information acquisition request carries account information;
sending the biological information acquisition request to a server;
receiving biological information fed back by the server, wherein the biological information is the biological information of the user corresponding to the account information; the biological information is information sent to the server by the user based on a registered account corresponding to the account information logged in on the second terminal device;
and setting the biological information as unlocking information of the first terminal equipment, wherein the unlocking information is used for identifying a user for unlocking the first terminal equipment.
2. The method of claim 1, wherein the obtaining of the trigger operation of the user on the first terminal device specifically includes:
acquiring biological information acquisition operation input by a user based on an application interface displayed on the first terminal device, wherein a registered account of an application corresponding to the application interface is logged on the first terminal device;
generating a biological information acquisition request according to the trigger operation specifically comprises:
and generating a biological information acquisition request according to the biological information acquisition operation, wherein the biological information acquisition request carries account information of the registered account.
3. The method of claim 1, wherein the obtaining of the trigger operation of the user on the first terminal device specifically includes:
acquiring information sending operation input by a user based on an interface of a first application displayed on the first terminal device, wherein the information sending operation is used for sending registered account information and registered account verification information of a second application input by the user in the interface, and the first application and the second application are different applications;
generating a biological information acquisition request according to the trigger operation specifically comprises:
and generating a biological information acquisition request according to the information sending operation, wherein the biological information acquisition request carries the registered account information and the registered account verification information.
4. The method of claim 1, wherein prior to setting the biometric information as unlock information for the first terminal device, further comprising:
judging whether the user has a set authority for unlocking information of the first terminal equipment;
and if so, setting the biological information as the unlocking information of the first terminal equipment.
5. The method of claim 1, after receiving the biometric information fed back by the server, further comprising:
decrypting the biological information to obtain plaintext biological information;
the setting the biological information as the unlocking information of the first terminal device specifically includes:
and setting the plaintext biological information as unlocking information of the first terminal equipment.
6. An unlocking information setting method is applied to a server and comprises the following steps:
acquiring a biological information acquisition request sent by first terminal equipment, wherein the biological information acquisition request carries account information;
responding to the biological information acquisition request, and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information; the biological information to be fed back is information sent to the server by the user based on a registered account corresponding to the account information logged in on the second terminal device;
and sending the biological information to be fed back to the first terminal equipment so that the first terminal equipment can conveniently set unlocking information according to the biological information to be fed back.
7. The method according to claim 6, wherein before the acquiring the biometric information acquisition request sent by the first terminal device, the method further comprises:
and acquiring and storing biological information sent by a second terminal device, wherein the biological information is sent by a user based on a registered account logged in on the second terminal device.
8. An unlocking information setting method is applied to a second terminal device and comprises the following steps:
obtaining uploading operation input by a user based on an application interface displayed on the second terminal device, wherein the second terminal device logs in a registered account of an application corresponding to the application interface;
and responding to the uploading operation, sending the biological information acquired by the second terminal equipment to a server so that the first terminal equipment can acquire the biological information from the server as unlocking information of the first terminal equipment based on the account information of the registered account.
9. The method according to claim 8, wherein the sending the biological information collected by the second terminal device to a server in response to the uploading operation specifically includes:
in response to the uploading operation, calling biological information acquired in advance by the second terminal equipment; the biological information is collected by the second terminal equipment when the user sets unlocking information for the second terminal equipment; or the biological information is collected by the second terminal device when the user sets user authentication information for the registered account logged on the second terminal device;
and sending the biological information to a server.
10. The method according to claim 8, wherein the sending the biological information collected by the second terminal device to a server in response to the uploading operation specifically includes:
collecting biological information of the user in response to the uploading operation;
and sending the biological information to a server.
11. The method of claim 9 or 10, before sending the biometric information to a server, further comprising:
encrypting the biological information to obtain ciphertext biological information;
the sending the biological information to a server specifically includes:
and sending the ciphertext biological information to a server.
12. The method of claim 8, before sending the biological information collected by the second terminal device to a server, further comprising:
judging whether the user has the uploading authority of the biological information collected by the second terminal equipment;
and if so, sending the biological information acquired by the second terminal equipment to a server.
13. An unlocking information setting device applied to a first terminal device includes:
the acquisition module is used for acquiring the trigger operation of the user on the first terminal equipment;
a biological information acquisition request generation module, configured to generate a biological information acquisition request according to the trigger operation, where the biological information acquisition request carries account information;
the sending module is used for sending the biological information acquisition request to a server;
the receiving module is used for receiving the biological information fed back by the server, and the biological information is the biological information of the user corresponding to the account information; the biological information is information sent to the server by the user based on a registered account corresponding to the account information logged in on the second terminal device;
the setting module is used for setting the biological information as unlocking information of the first terminal device, and the unlocking information is used for identifying a user unlocking the first terminal device.
14. An unlocking information setting device applied to a server includes:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring a biological information acquisition request sent by first terminal equipment, and the biological information acquisition request carries account information;
the determining module is used for responding to the biological information acquisition request and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information; the biological information to be fed back is information sent to the server by the user based on a registered account corresponding to the account information logged in on the second terminal device;
and the sending module is used for sending the biological information to be fed back to the first terminal equipment so as to facilitate the first terminal equipment to set unlocking information according to the biological information to be fed back.
15. An unlocking information setting device applied to a second terminal device includes:
the acquisition module is used for acquiring uploading operation input by a user based on an application interface displayed on the second terminal device, and the second terminal device is logged with a registered account of an application corresponding to the application interface;
and the sending module is used for responding to the uploading operation and sending the biological information acquired by the second terminal equipment to a server so that the first terminal equipment can acquire the biological information from the server based on the account information of the registered account as the unlocking information of the first terminal equipment.
16. An unlock information setting device comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring the trigger operation of the user on the unlocking information setting equipment;
generating a biological information acquisition request according to the trigger operation, wherein the biological information acquisition request carries account information;
sending the biological information acquisition request to a server;
receiving biological information fed back by the server, wherein the biological information is the biological information of the user corresponding to the account information; the biological information is information sent to the server by the user based on a registered account corresponding to the account information logged in on the second terminal device;
and setting the biological information as unlocking information of the unlocking information setting equipment, wherein the unlocking information is used for identifying a user unlocking the unlocking information setting equipment.
17. An unlock information setting device comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring a biological information acquisition request sent by first terminal equipment, wherein the biological information acquisition request carries account information;
responding to the biological information acquisition request, and determining biological information to be fed back, wherein the biological information to be fed back is pre-stored biological information of the user corresponding to the account information; the biological information to be fed back is information sent to the server by the user based on a registered account corresponding to the account information logged in on the second terminal device;
and sending the biological information to be fed back to the first terminal equipment so that the first terminal equipment can conveniently set unlocking information according to the biological information to be fed back.
18. An unlock information setting device comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
acquiring uploading operation input by a user based on an application interface displayed on the unlocking information setting equipment, wherein the registered account of the application corresponding to the application interface is logged on the unlocking information setting equipment;
and responding to the uploading operation, and sending the biological information acquired by the unlocking information setting equipment to a server so that the first terminal equipment can acquire the biological information from the server based on the account information of the registered account as the unlocking information of the first terminal equipment.
19. A computer-readable medium having stored thereon computer-readable instructions executable by a processor to implement the unlocking information setting method of any one of claims 1 to 12.
CN201910769005.3A 2019-08-20 2019-08-20 Unlocking information setting method, device and equipment Active CN110505295B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910769005.3A CN110505295B (en) 2019-08-20 2019-08-20 Unlocking information setting method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910769005.3A CN110505295B (en) 2019-08-20 2019-08-20 Unlocking information setting method, device and equipment

Publications (2)

Publication Number Publication Date
CN110505295A CN110505295A (en) 2019-11-26
CN110505295B true CN110505295B (en) 2022-04-29

Family

ID=68588775

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910769005.3A Active CN110505295B (en) 2019-08-20 2019-08-20 Unlocking information setting method, device and equipment

Country Status (1)

Country Link
CN (1) CN110505295B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114973428A (en) * 2021-02-24 2022-08-30 华为技术有限公司 Biological information sharing method, electronic device and medium thereof

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN205721792U (en) * 2014-09-30 2016-11-23 苹果公司 Electronic equipment
CN106789833A (en) * 2015-11-20 2017-05-31 北京奇虎科技有限公司 The account logon method and device of the unblock based on mobile terminal
CN106789835A (en) * 2015-11-20 2017-05-31 北京奇虎科技有限公司 The account logon method and device of mobile terminal
CN107451550B (en) * 2016-03-15 2020-12-04 Oppo广东移动通信有限公司 Fingerprint unlocking method and related product
CN107480495B (en) * 2017-07-24 2020-12-01 Oppo广东移动通信有限公司 Unlocking method of mobile terminal and related product
CN107715449B (en) * 2017-10-25 2021-04-02 Oppo广东移动通信有限公司 Account login method and related equipment
WO2019090498A1 (en) * 2017-11-08 2019-05-16 深圳传音通讯有限公司 Fingerprint unlock method and fingerprint unlock system of intelligent terminal
CN107862194B (en) * 2017-11-22 2019-10-18 维沃移动通信有限公司 A kind of method, device and mobile terminal of safety verification
CN108470117A (en) * 2018-03-12 2018-08-31 珠海格力电器股份有限公司 Terminal safety control method, device and system
CN109684806A (en) * 2018-08-31 2019-04-26 深圳壹账通智能科技有限公司 Auth method, device, system and medium based on physiological characteristic information
CN109410398A (en) * 2018-10-19 2019-03-01 珠海格力电器股份有限公司 Unlocking method and device, door lock and storage medium
CN109376519B (en) * 2018-10-24 2021-01-08 维沃移动通信有限公司 Fingerprint unlocking method and terminal equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Android环境下基于人脸识别的手机解锁技术研究与软件开发";齐萌;《中国优秀硕士学位论文全文数据库 信息科技辑》;20170331;全文 *
"Unlocking the Value of Open Data with a Process-based Information Platform";Xavi Masip-Bruin, Guang-Jie Ren;《2013 IEEE 15th Conference on Business Informatics》;20131024;全文 *

Also Published As

Publication number Publication date
CN110505295A (en) 2019-11-26

Similar Documents

Publication Publication Date Title
KR102328725B1 (en) Method of using one device to unlock another device
US10735196B2 (en) Password-less authentication for access management
US10205711B2 (en) Multi-user strong authentication token
CN108055132B (en) Method, device and equipment for service authorization
JP6166749B2 (en) Context-based data access control
US20180082050A1 (en) Method and a system for secure login to a computer, computer network, and computer website using biometrics and a mobile computing wireless electronic communication device
CN107103245B (en) File authority management method and device
CN110222531B (en) Method, system and equipment for accessing database
US11328080B2 (en) Cryptographic key management
CN110378091A (en) A kind of auth method, device and equipment
US10867056B2 (en) Method and system for data protection
TW201743234A (en) Identity authentication method and device
US8875263B1 (en) Controlling a soft token running within an electronic apparatus
CN105429761A (en) Key generation method and device
KR101809974B1 (en) A system for security certification generating authentication key combinating multi-user element and a method thereof
CN113704826A (en) Privacy protection-based business risk detection method, device and equipment
CN110995410A (en) Method, device, equipment and medium for generating public key and private key
CN110505295B (en) Unlocking information setting method, device and equipment
KR101809976B1 (en) A method for security certification generating authentication key combinating multi-user element
JP2016116203A (en) Authentication device, information terminal device, program, and authentication method
CN115640589A (en) Security protection equipment, service execution method, device and storage medium
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN110830252B (en) Data encryption method, device, equipment and storage medium
CN113497710A (en) Data decryption method and device
Ussatova et al. Two-factor authentication algorithm implementation with additional security parameter based on mobile application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant