CN111400694B - Unlocking method, first terminal, second terminal and storage medium - Google Patents

Unlocking method, first terminal, second terminal and storage medium Download PDF

Info

Publication number
CN111400694B
CN111400694B CN202010250348.1A CN202010250348A CN111400694B CN 111400694 B CN111400694 B CN 111400694B CN 202010250348 A CN202010250348 A CN 202010250348A CN 111400694 B CN111400694 B CN 111400694B
Authority
CN
China
Prior art keywords
terminal
password
account
manufacturer
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010250348.1A
Other languages
Chinese (zh)
Other versions
CN111400694A (en
Inventor
吴恒刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202010250348.1A priority Critical patent/CN111400694B/en
Publication of CN111400694A publication Critical patent/CN111400694A/en
Application granted granted Critical
Publication of CN111400694B publication Critical patent/CN111400694B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses an unlocking method applied to a first terminal, wherein the first terminal is logged in a first manufacturer account, and the method comprises the following steps: under the condition that a correct unlocking password is not received, scanning a password modification image generated by a second manufacturer account registered on the second terminal; performing data verification according to the password modified image to obtain a verification result; and under the condition that the verification result is reasonable, unlocking and starting an unlocking password modification function.

Description

Unlocking method, first terminal, second terminal and storage medium
Technical Field
The embodiment of the application relates to the technical field of electronics, in particular to an unlocking method, a first terminal, a second terminal and a storage medium.
Background
With the continuous development of electronic technology, terminals such as mobile phones and tablet computers can provide more and more unlocking modes for users, for example, biological password modes including fingerprint unlocking, face unlocking and sound unlocking, so as to meet different demands of users.
At present, the terminal can be unlocked by using the biological password only when the strong password is set. The password strength of the strong password is proportional to the password complexity, and the password complexity must be increased in order to increase the security of the strong password. In view of terminal safety, under the condition that the terminal is restarted or a strong password is not input for a long time, a user is required to unlock the terminal by using the strong password, if the user forgets the strong password, the factory setting can only be restored by adopting a machine refreshing mode, and the system is reset, so that the data stored in the terminal is lost.
Disclosure of Invention
The embodiment of the application provides an unlocking method, a first terminal, a second terminal and a storage medium, wherein under the condition that a user forgets a correct unlocking password, the terminal utilizes a manufacturer account mechanism to realize unlocking and opens an unlocking password modification function, so that the flexibility of terminal unlocking is improved.
The technical scheme of the embodiment of the application is realized as follows:
the embodiment of the application provides an unlocking method applied to a first terminal, wherein a first manufacturer account is logged in on the first terminal, and the method comprises the following steps:
under the condition that a correct unlocking password is not received, scanning a password modification image generated by a second manufacturer account registered on the second terminal; the second manufacturer account is associated with the first manufacturer account and belongs to the same terminal manufacturer;
performing data verification according to the password modified image to obtain a verification result;
and under the condition that the verification result is reasonable, unlocking and starting an unlocking password modification function.
In the above method, before the step of scanning the password modification image generated by the account number of the second vendor logged on the second terminal in the case that the correct unlocking password is not received, the method further includes:
and outputting password prompt information corresponding to the correct unlocking password under the condition that the number of times of receiving the incorrect unlocking password reaches the preset number of times.
In the above method, after outputting the password prompt information corresponding to the correct unlocking password when the number of times of receiving the incorrect unlocking password reaches the preset number of times, the method further includes:
and under the condition that the correct unlocking password is received based on the password prompt information, unlocking according to the correct unlocking password.
In the above method, before the step of scanning the password modification image generated by the account number of the second vendor logged on the second terminal in the case that the correct unlocking password is not received, the method further includes:
acquiring the account number of the second manufacturer;
and associating the second manufacturer account with the first manufacturer account.
The embodiment of the application provides an unlocking method applied to a second terminal, wherein a second manufacturer account is logged in on the second terminal, and the method comprises the following steps:
receiving a password modification request sent by a first manufacturer account logged on a third terminal by using the second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer;
confirming the password modification request by using the account number of the second manufacturer;
and under the condition that the password modification request is confirmed to be successful, generating a password modification image by using the second manufacturer account so that the first terminal which has logged in the first manufacturer account can unlock by using the password modification image and start an unlocking password modification function.
The embodiment of the application provides a first terminal, on which a first manufacturer account is logged in, the first terminal comprising:
the scanning module is used for scanning a password modification image generated by a second manufacturer account logged on the second terminal under the condition that a correct unlocking password is not received; the second manufacturer account is associated with the first manufacturer account and belongs to the same terminal manufacturer;
the verification module is used for carrying out data verification according to the password modified image to obtain a verification result;
and the unlocking module is used for unlocking and starting an unlocking password modification function under the condition that the verification result is reasonable.
The first terminal further includes: the output module is used for outputting the output signals,
the output module is used for outputting password prompt information corresponding to the correct unlocking password under the condition that the number of times of receiving the incorrect unlocking password reaches the preset number of times.
In the above first terminal, the unlocking module is further configured to unlock according to the correct unlocking password when the correct unlocking password is received based on the password prompt information.
In the first terminal, the first terminal further comprises an association module,
the association module is used for obtaining the account number of the second manufacturer; and associating the second manufacturer account with the first manufacturer account.
The embodiment of the application provides a second terminal, on which a second vendor account is logged in, the second terminal includes:
the receiving module is used for receiving a password modification request sent by a first manufacturer account logged in on a third terminal by utilizing the second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer;
the confirmation module is used for confirming the password modification request by using the account number of the second manufacturer;
and the generation module is used for generating a password modification image by using the second manufacturer account under the condition that the password modification request is confirmed to be successful, so that the first terminal which is logged in the first manufacturer account can unlock by using the password modification image and start an unlocking password modification function.
The embodiment of the application provides a first terminal, which comprises: a first processor, a first memory, and a first communication bus;
the first communication bus is used for realizing communication connection between the first processor and the first memory;
the first processor is configured to execute a first unlocking program stored in the first memory, so as to implement the unlocking method applied to the first terminal.
The embodiment of the application provides a second terminal, which comprises: a second processor, a second memory, and a second communication bus;
the second communication bus is used for realizing communication connection between the second processor and the second memory;
the second processor is configured to execute a second unlocking program stored in the second memory, so as to implement the unlocking method applied to the second terminal.
An embodiment of the present application provides a computer readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the above-mentioned unlocking method applied to a first terminal.
An embodiment of the present application provides a computer readable storage medium having a computer program stored thereon, where the computer program when executed by a processor implements the above-mentioned unlocking method applied to a second terminal.
The embodiment of the application provides an unlocking method applied to a first terminal, wherein the first terminal is logged in a first manufacturer account, and the method comprises the following steps: under the condition that a correct unlocking password is not received, scanning a password modification image generated by a second manufacturer account registered on the second terminal; performing data verification according to the password modified image to obtain a verification result; and under the condition that the verification result is reasonable, unlocking and starting an unlocking password modification function. According to the technical scheme provided by the embodiment of the application, under the condition that a user forgets to correctly unlock the password, the terminal utilizes the manufacturer account mechanism to unlock and start the unlocking password modification function, so that the flexibility of unlocking the terminal is improved.
Drawings
Fig. 1 is a schematic flow chart of an unlocking method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart of an exemplary password preset according to an embodiment of the present application;
fig. 3 is a second flowchart of an unlocking method according to an embodiment of the present application;
FIG. 4 is a process schematic diagram of an exemplary unlocking method provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present application;
fig. 6 is a second schematic structural diagram of a first terminal according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a second terminal according to an embodiment of the present application;
fig. 8 is a second schematic structural diagram of a second terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The embodiment of the application provides an unlocking method, which is applied to a first terminal, wherein a first manufacturer account is logged on the first terminal, the first terminal can be specifically an electronic device such as a mobile phone, a tablet personal computer and the like, and the embodiment of the application is not limited. Fig. 1 is a schematic flow chart of an unlocking method according to an embodiment of the present application. As shown in fig. 1, the method mainly comprises the following steps:
s101, under the condition that a correct unlocking password is not received, scanning a password modification image generated by a second manufacturer account registered on a second terminal; the second vendor account is associated with the first vendor account and is assigned to the same terminal vendor.
In the embodiment of the application, the first terminal can scan the password modification image generated by the account number of the second manufacturer logged on the second terminal under the condition that the first terminal does not receive the correct unlocking password; the second vendor account is associated with the first vendor account and is assigned to the same terminal vendor.
It should be noted that, in the embodiment of the present application, when the user performs unlocking of the first terminal, a situation may occur in which the user cannot remember the correct unlocking password, so the first terminal cannot receive the correct unlocking password, and at this time, the password modification image generated by the account number of the second manufacturer logged on the second terminal may be scanned.
It should be noted that, in the embodiment of the present application, a second vendor account is logged on the second terminal, the second vendor account is an associated account of the first vendor account, and the second vendor account and the first vendor account belong to the same terminal vendor. In fact, the first terminal and the second terminal are manufactured by the same terminal manufacturer, and therefore, the first terminal and the second terminal can log in a manufacturer account belonging to the terminal manufacturer. Specific second vendor account numbers are not limited in this embodiment.
It should be noted that, in the embodiment of the present application, a user may log in a first vendor account on a third terminal different from the first terminal, so that a password modification request is sent to an associated second vendor account by using the first vendor account, and the second vendor account logged in on the second terminal may confirm after receiving the password modification request, so that a password modification image is generated under the condition that confirmation is successful. The first terminal also has basic functions such as scanning images under the condition that the first terminal is not unlocked, so that the password modification image generated by the account number of the second manufacturer on the second terminal can be scanned.
In the embodiment of the present application, the password-modified image may be a two-dimensional code or an image containing specific information, and the embodiment of the present application is not limited to the specific password-modified image.
It should be noted that, in the embodiment of the present application, before the first terminal scans the password modification image generated by the account number of the second vendor registered on the second terminal, the following steps may be further executed: and outputting password prompt information corresponding to the correct unlocking password under the condition that the number of times of receiving the incorrect unlocking password reaches the preset number of times.
It should be noted that, in the embodiment of the present application, the incorrect unlocking password is a password different from the correct unlocking password. The first terminal cannot unlock under the condition that an error unlocking password is received, and can unlock under the condition that a correct unlocking password is received. The correct unlocking password can be preset on the first terminal by a user according to actual requirements. Specific correct unlocking passwords and incorrect unlocking passwords are not limited in the embodiment of the application.
It should be noted that, in the embodiment of the present application, the preset number of times is stored in the first terminal, after the first terminal locks the screen, the first terminal accumulates once every time the error unlocking password is received, and after the accumulated number of times reaches the preset number of times, the prompt of the correct unlocking password is performed, that is, the password prompt information associated with the correct unlocking password is output. The specific preset times can be the times set by the first terminal in a factory, or can be the times preset by the user according to actual demands, and the embodiment of the application is not limited.
It should be noted that, in the embodiment of the present application, the first terminal stores the password prompt information corresponding to the correct unlocking password, which is used for prompting the correct unlocking password when receiving the incorrect unlocking password for a plurality of times, that is, the preset number of times. The password prompt information can be text, image, audio or video related to the correct unlocking password, so that when the user sees and/or hears the password prompt information, the user can strengthen the recall of the correct unlocking password. The specific password hint information may be predetermined by the user, and embodiments of the present application are not limited.
It should be noted that, in the embodiment of the present application, after outputting the password prompt information corresponding to the correct unlocking password when the number of times of receiving the incorrect unlocking password reaches the preset number of times, the first terminal may further execute the following steps: and under the condition that the correct unlocking password is received based on the password prompt information, unlocking according to the correct unlocking password.
It can be understood that in the embodiment of the application, after the first terminal outputs the password prompt information associated with the correct unlocking password, the user may recall the correct unlocking password under the influence of the password prompt information and input the correct unlocking password into the first terminal, so that the first terminal can receive the correct unlocking password and unlock according to the correct unlocking password.
It should be noted that, in the embodiment of the present application, the first terminal may output the password prompt information associated with the correct unlocking password, but the user may still want to not want the correct unlocking password, so the first terminal may still not receive the correct unlocking password to unlock, and for this case, the first terminal may scan the password modification image generated by the account number of the second vendor logged on the second terminal.
S102, carrying out data verification according to the password modified image to obtain a verification result.
In the embodiment of the application, after the first terminal scans the password-modified image, the first terminal can perform data verification according to the password-modified image, so that a verification result is obtained.
It can be understood that in the embodiment of the present application, after the first terminal obtains the password modified image, the bottom layer may check the rationality of the data, so that unlocking is performed when the check result is reasonable, and unlocking is not performed when the check result is unreasonable. For example, the first terminal obtains the password modification image from the second manufacturer account according to the password modification image, so as to find out whether the second manufacturer account is related to the first manufacturer account logged in by itself, if so, the verification result is determined to be reasonable, and if not, the verification result is determined to be unreasonable. Of course, the first terminal may also perform verification at the bottom layer according to other specific verification manners after obtaining the password modification image, which is not limited in the embodiment of the present application.
And S103, unlocking and starting an unlocking password modification function under the condition that the verification result is reasonable.
In the embodiment of the application, after the first terminal performs data verification on the password modification image to obtain a verification result, the first terminal can unlock and start the unlocking password modification function under the condition that the verification result is reasonable.
It can be understood that in the embodiment of the application, the first terminal characterizes that the first terminal meets the unlocking requirement under the condition that the verification result is reasonable, so that the first terminal can automatically unlock, and in addition, the first terminal can jump to an unlocking password modification interface after unlocking so as to enable a user to modify the unlocking password in time.
It should be noted that, in the embodiment of the present application, before the first terminal scans the password modification image generated by the account number of the second vendor registered on the second terminal, i.e. before step S101, in the case that the correct unlocking password is not received, the following steps may be further executed: acquiring a second manufacturer account; and associating the second manufacturer account with the first manufacturer account.
It may be appreciated that in the embodiment of the present application, when the first terminal has logged in to the first vendor account, the user may input the second vendor account on the first terminal, that is, indicate the second vendor account, and the first terminal may associate the first vendor account with the second vendor account.
Fig. 2 is a schematic flow chart of an exemplary password preset according to an embodiment of the present application. As shown in fig. 2, after logging in the account of the first manufacturer, the first terminal may perform setting of the correct unlocking password, and then prompt whether to set password prompt information corresponding to the correct unlocking password and whether to set an associated account of the second manufacturer, so as to allow the user to select to complete the setting.
The embodiment of the application provides an unlocking method applied to a first terminal, wherein a first manufacturer account is logged in on the first terminal, and the method comprises the following steps: under the condition that a correct unlocking password is not received, scanning a password modification image generated by a second manufacturer account registered on the second terminal; performing data verification according to the password modified image to obtain a verification result; and under the condition that the verification result is reasonable, unlocking and starting an unlocking password modification function. According to the technical scheme provided by the embodiment of the application, under the condition that a user forgets to correctly unlock the password, the terminal utilizes the manufacturer account mechanism to unlock and start the unlocking password modification function, so that the flexibility of unlocking the terminal is improved.
The embodiment of the application provides an unlocking method which is applied to a second terminal, wherein a second manufacturer account is logged in on the second terminal. Fig. 3 is a second flowchart of an unlocking method according to an embodiment of the present application. As shown in fig. 3, the method mainly comprises the following steps:
s301, receiving a password modification request sent by a first manufacturer account which is not logged in by a third terminal by using a second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer.
In the embodiment of the application, a second manufacturer account is logged on a second terminal, and the second terminal receives a password modification request sent by a first manufacturer account logged on a third terminal by using the second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer.
In the embodiment of the present application, the first terminal has already logged in to the first vendor account, and at this time, since the user forgets the correct unlocking password of the first terminal, the first vendor account may be logged in to a third terminal different from the first terminal, so that the password modification request is sent to the second vendor account by using the first vendor account at the third terminal. Correspondingly, the second terminal can receive the password modification request by using the logged-in account number of the second manufacturer.
It should be noted that, in the embodiment of the present application, the third terminal is a terminal different from the first terminal, but the third terminal may be the same terminal or different from the second terminal, and the second terminal may be used as the third terminal before the second vendor account is currently logged in, log in the first vendor account and send a password modification request to the second vendor account, and then log out of the first vendor account and log in the second vendor account, where the second vendor account is used as the second terminal to receive the password modification request. The specific third terminal embodiment of the present application is not limited.
It may be understood that, in the embodiment of the present application, the second vendor account registered on the second terminal is an associated account of the first vendor account, and in addition, the first vendor account and the second vendor account belong to the terminal vendor to which the first terminal and the second terminal belong. The first terminal and the second terminal belong to the same terminal manufacturer, so that the first manufacturer account number and the second manufacturer account number provided by the terminal manufacturer can be logged in.
S302, confirming the password modification request by using a second manufacturer account.
In the embodiment of the application, after receiving the password modification request by using the account of the second vendor, the second terminal may confirm the password modification request.
It should be noted that, in the embodiment of the present application, the confirmation of the password modification request by the second terminal using the second vendor account may be implemented according to a specific preset logic, for example, according to information carried in the password modification request, whether the password modification request is actually sent by the first vendor account is judged, so as to confirm, and of course, it may also be that the second vendor account receives a confirmation instruction for the password modification request. The specific password modification request confirmation method is not limited in this embodiment.
S303, under the condition that the password modification request is confirmed to be successful, a password modification image is generated by using the account of the second manufacturer, so that the first terminal which has logged in the account of the first manufacturer can unlock by using the password modification image and unlock the password modification function.
In the embodiment of the application, when the password modification request is confirmed to be successful, the second terminal generates the password modification image by using the account number of the second manufacturer, so that the first terminal which has logged in the account number of the first manufacturer can unlock by using the password modification image and start the unlocking password modification function.
It can be understood that in the embodiment of the present application, the second terminal confirms the password modification request successfully by using the second vendor account, and characterizes the second vendor account to allow the first terminal logged in to the first vendor account to modify the unlocking password, so that the second terminal can generate a corresponding password modification image by using the second vendor account.
In the embodiment of the present application, the password-modified image may be an image including specific information, such as a two-dimensional code. The specific password-modified image embodiments of the present application are not limited.
It can be understood that in the embodiment of the present application, the first terminal that has logged in the account of the first vendor may use the function of scanning the image under the condition that the first terminal is not unlocked, so the user only needs to open the scanning function of the first terminal, scan the password modification image, and thus the first terminal can unlock by using the password modification image and open the unlock password modification function.
The embodiment of the application provides an unlocking method applied to a second terminal, wherein a second manufacturer account is logged in on the second terminal, and the method comprises the following steps: receiving a password modification request sent by a first manufacturer account logged on a third terminal by using a second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer; confirming the password modification request by using a second manufacturer account; and under the condition that the password modification request is successfully confirmed, generating a password modification image by using the account of the second manufacturer, so that the first terminal which has logged in the account of the first manufacturer can unlock by using the password modification image and start an unlocking password modification function. According to the technical scheme provided by the embodiment of the application, under the condition that a user forgets to correctly unlock the password, the terminal utilizes the manufacturer account mechanism to unlock and start the unlocking password modification function, so that the flexibility of unlocking the terminal is improved.
Fig. 4 is a process schematic diagram of an exemplary unlocking method according to an embodiment of the present application. As shown in fig. 4, in the embodiment of the present application, when the number of times of receiving the wrong unlocking password reaches the preset number of times N, the first terminal logged in the first vendor account outputs the password prompt information, and then if the correct unlocking password is received, the first terminal is normally unlocked, and if the correct unlocking password is not received yet, the password modification image generated by the second vendor account on the second terminal is scanned, so as to implement unlocking and unlocking password modification.
The embodiment of the application provides a first terminal, and a first manufacturer account is logged in on the first terminal. Fig. 5 is a schematic structural diagram of a first terminal according to an embodiment of the present application. As shown in fig. 5, the first terminal includes:
the scanning module 501 is configured to scan a password modification image generated by a second vendor account logged on the second terminal when the correct unlocking password is not received; the second manufacturer account is associated with the first manufacturer account and belongs to the same terminal manufacturer;
the verification module 502 is configured to perform data verification according to the password-modified image, so as to obtain a verification result;
and the unlocking module 503 is configured to unlock and start the unlock password modification function when the verification result is reasonable.
Optionally, the first terminal further includes: the output module is used for outputting the output signals,
the output module is used for outputting password prompt information corresponding to the correct unlocking password under the condition that the number of times of receiving the incorrect unlocking password reaches the preset number of times.
Optionally, the unlocking module 503 is further configured to unlock according to the correct unlocking password when the correct unlocking password is received based on the password prompt information.
Optionally, the first terminal further comprises an association module,
the association module is used for obtaining the account number of the second manufacturer; and associating the second manufacturer account with the first manufacturer account.
Fig. 6 is a second schematic structural diagram of a first terminal according to an embodiment of the present application. As shown in fig. 6, the first terminal includes: a first processor 601, a first memory 602, and a first communication bus 603;
the first communication bus 603 is configured to implement a communication connection between the first processor 601 and the first memory 602;
the first processor 601 is configured to execute a first unlocking program stored in the first memory 602, so as to implement the unlocking method applied to the first terminal.
The embodiment of the application provides a first terminal, wherein a first manufacturer account is logged in the first terminal, and a password modification image generated by a second manufacturer account logged in the second terminal is scanned under the condition that a correct unlocking password is not received; performing data verification according to the password modified image to obtain a verification result; and under the condition that the verification result is reasonable, unlocking and starting an unlocking password modification function.
The embodiment of the application provides a second terminal, and a second manufacturer account is logged on the second terminal. Fig. 7 is a schematic structural diagram of a second terminal according to an embodiment of the present application. As shown in fig. 7, the second terminal includes:
a receiving module 701, configured to receive, by using the second vendor account, a password modification request sent by a first vendor account logged in on a third terminal; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer;
a confirmation module 702, configured to confirm the password modification request by using the second vendor account;
and the generating module 703 is configured to generate a password modification image by using the second vendor account when the password modification request is successfully confirmed, so that the first terminal that has logged in the first vendor account can unlock by using the password modification image and start an unlock password modification function.
Fig. 8 is a second schematic structural diagram of a second terminal according to an embodiment of the present application. As shown in fig. 8, the second terminal includes: a second processor 801, a second memory 802, and a second communication bus 803;
the second communication bus 803 is configured to implement a communication connection between the second processor 801 and the second memory 802;
the second processor 801 is configured to execute a second unlocking program stored in the second memory 802, so as to implement the unlocking method applied to the second terminal.
The embodiment of the application provides a second terminal, wherein a second manufacturer account is logged in the second terminal, and a password modification request sent by a first manufacturer account logged in a third terminal is received by using the second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer; confirming the password modification request by using a second manufacturer account; and under the condition that the password modification request is successfully confirmed, generating a password modification image by using the account of the second manufacturer, so that the first terminal which has logged in the account of the first manufacturer can unlock by using the password modification image and start an unlocking password modification function.
The embodiment of the application provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the above-mentioned unlocking method applied to a first terminal. The embodiment of the application also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the above unlocking method applied to the second terminal. The computer readable storage medium may be a volatile Memory (RAM), such as a Random-Access Memory (RAM); or a nonvolatile Memory (non-volatile Memory), such as a Read-Only Memory (ROM), a flash Memory (flash Memory), a Hard Disk (HDD) or a Solid State Drive (SSD); but may be a respective device, such as a mobile phone, a computer, a tablet device, a personal digital assistant, etc., comprising one or any combination of the above memories.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of implementations of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block and/or flow of the flowchart illustrations and/or block diagrams, and combinations of blocks and/or flow diagrams in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks and/or block diagram block or blocks.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions easily conceivable by those skilled in the art within the technical scope of the present application are intended to be covered in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. An unlocking method is applied to a first terminal, wherein a first manufacturer account is logged in on the first terminal, and the method comprises the following steps:
under the condition that a correct unlocking password is not received, scanning a password modification image generated by a second manufacturer account registered on the second terminal; the second manufacturer account is associated with the first manufacturer account and belongs to the same terminal manufacturer; the password modification image is generated after the second manufacturer account successfully confirms the received password modification request; the password modification request is sent to the associated second manufacturer account by the first manufacturer account logged on the third terminal; the third terminal is different from the first terminal;
performing data verification according to the password modified image to obtain a verification result;
and under the condition that the verification result is reasonable, unlocking and starting an unlocking password modification function.
2. The method of claim 1, wherein, in the event that a correct unlock code is not received, prior to scanning a code modification image generated by a second vendor account number logged on a second terminal, the method further comprises:
and outputting password prompt information corresponding to the correct unlocking password under the condition that the number of times of receiving the incorrect unlocking password reaches the preset number of times.
3. The method according to claim 2, wherein after outputting the password hint information corresponding to the correct unlock password when the number of times of receiving the incorrect unlock password reaches a preset number of times, the method further comprises:
and under the condition that the correct unlocking password is received based on the password prompt information, unlocking according to the correct unlocking password.
4. The method of claim 1, wherein, in the event that a correct unlock code is not received, prior to scanning a code modification image generated by a second vendor account number logged on a second terminal, the method further comprises:
acquiring the account number of the second manufacturer;
and associating the second manufacturer account with the first manufacturer account.
5. An unlocking method is applied to a second terminal, wherein a second manufacturer account is logged in on the second terminal, and the method comprises the following steps:
receiving a password modification request sent by a first manufacturer account logged on a third terminal by using the second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer;
confirming the password modification request by using the account number of the second manufacturer;
under the condition that the password modification request is confirmed to be successful, generating a password modification image by using the account of the second manufacturer so that a first terminal which has logged in the account of the first manufacturer can unlock by using the password modification image and start an unlocking password modification function; the first terminal and the third terminal are different.
6. A first terminal, wherein a first vendor account number is registered on the first terminal, the first terminal comprising:
the scanning module is used for scanning a password modification image generated by a second manufacturer account logged on the second terminal under the condition that a correct unlocking password is not received; the second manufacturer account is associated with the first manufacturer account and belongs to the same terminal manufacturer; the password modification image is generated after the second manufacturer account successfully confirms the received password modification request; the password modification request is sent to the associated second manufacturer account by the first manufacturer account logged on the third terminal; the third terminal is different from the first terminal;
the verification module is used for carrying out data verification according to the password modified image to obtain a verification result;
and the unlocking module is used for unlocking and starting an unlocking password modification function under the condition that the verification result is reasonable.
7. A second terminal, wherein a second vendor account number is registered on the second terminal, the second terminal comprising:
the receiving module is used for receiving a password modification request sent by a first manufacturer account logged in on a third terminal by utilizing the second manufacturer account; the first manufacturer account is associated with the second manufacturer account and belongs to the same terminal manufacturer;
the confirmation module is used for confirming the password modification request by using the account number of the second manufacturer;
the generation module is used for generating a password modification image by using the second manufacturer account under the condition that the password modification request is confirmed to be successful, so that a first terminal which is logged in the first manufacturer account can unlock by using the password modification image and start an unlocking password modification function; the first terminal and the third terminal are different.
8. A first terminal, the first terminal comprising: a first processor, a first memory, and a first communication bus;
the first communication bus is used for realizing communication connection between the first processor and the first memory;
the first processor is configured to execute a first unlocking program stored in the first memory, so as to implement the unlocking method according to any one of claims 1 to 4.
9. A second terminal, the second terminal comprising: a second processor, a second memory, and a second communication bus;
the second communication bus is used for realizing communication connection between the second processor and the second memory;
the second processor is configured to execute a second unlocking program stored in the second memory, so as to implement the unlocking method of claim 5.
10. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements an unlocking method according to any one of claims 1-4.
11. A computer-readable storage medium, on which a computer program is stored, which computer program, when being executed by a processor, implements the unlocking method according to claim 5.
CN202010250348.1A 2020-04-01 2020-04-01 Unlocking method, first terminal, second terminal and storage medium Active CN111400694B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010250348.1A CN111400694B (en) 2020-04-01 2020-04-01 Unlocking method, first terminal, second terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010250348.1A CN111400694B (en) 2020-04-01 2020-04-01 Unlocking method, first terminal, second terminal and storage medium

Publications (2)

Publication Number Publication Date
CN111400694A CN111400694A (en) 2020-07-10
CN111400694B true CN111400694B (en) 2023-07-21

Family

ID=71429418

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010250348.1A Active CN111400694B (en) 2020-04-01 2020-04-01 Unlocking method, first terminal, second terminal and storage medium

Country Status (1)

Country Link
CN (1) CN111400694B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320873A (en) * 2014-07-02 2016-02-10 中国移动通信集团公司 Unlocking method and device for terminal application, terminal and SIM card
CN110830262A (en) * 2019-10-29 2020-02-21 维沃移动通信有限公司 Authorization management method and electronic equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110419042B (en) * 2017-09-29 2021-10-15 华为技术有限公司 Screen unlocking method and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320873A (en) * 2014-07-02 2016-02-10 中国移动通信集团公司 Unlocking method and device for terminal application, terminal and SIM card
CN110830262A (en) * 2019-10-29 2020-02-21 维沃移动通信有限公司 Authorization management method and electronic equipment

Also Published As

Publication number Publication date
CN111400694A (en) 2020-07-10

Similar Documents

Publication Publication Date Title
WO2015165423A1 (en) Account login method, apparatus, and system
CN104182666A (en) Password resetting method and device
CN102025506A (en) User authentication method and device
US20070086049A1 (en) Image forming system and method using authentication information, image forming apparatus, authentication information providing device and method of using image forming apparatus
JP5003749B2 (en) Information processing apparatus, information processing method, and information processing program
CN102368230A (en) Mobile memory and access control method thereof as well as system
EP4033383A1 (en) Image forming apparatus having multi-factor authentication function
US8782737B2 (en) Image forming apparatus, image forming method, and authentication program product
CN112907788A (en) Door lock control method and device, door lock and storage medium
CN109388928B (en) Screen locking control method, device, system, equipment and medium for computer equipment
US8422048B2 (en) Image forming apparatus and method
CN111917728A (en) Password verification method and device
CN110708364B (en) Electronic equipment unlocking method and device, electronic equipment and storage medium
CN105451038A (en) Code generation method, code authentication method, related device and system
CN102971739A (en) Protecting account security settings using strong proofs
CN114861158A (en) Security authentication method, device, system, electronic equipment and storage medium
CN111400694B (en) Unlocking method, first terminal, second terminal and storage medium
JP4910313B2 (en) Authentication server and authentication program
CN111211898B (en) Method for setting control authority of electronic equipment, electronic equipment and readable storage medium
CN109344581B (en) Verification method and device
CN111818376A (en) Password setting method, smart television, electronic equipment and readable storage medium
CN115943623A (en) Techniques for managing telephone number-based user accounts
CN109145572A (en) User authen method, device and storage medium and electronic equipment
CN114125850B (en) Terminal locking method, terminal unlocking method, mobile terminal and server
CN113268775B (en) Photo processing method, device and system and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant