CN111581630A - Computer unlocking method, device, equipment and medium - Google Patents

Computer unlocking method, device, equipment and medium Download PDF

Info

Publication number
CN111581630A
CN111581630A CN202010397266.XA CN202010397266A CN111581630A CN 111581630 A CN111581630 A CN 111581630A CN 202010397266 A CN202010397266 A CN 202010397266A CN 111581630 A CN111581630 A CN 111581630A
Authority
CN
China
Prior art keywords
computer
identity information
intelligent terminal
unlocking
computer user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010397266.XA
Other languages
Chinese (zh)
Other versions
CN111581630B (en
Inventor
顾磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wentai Information Technology Co Ltd
Original Assignee
Shanghai Wentai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wentai Information Technology Co Ltd filed Critical Shanghai Wentai Information Technology Co Ltd
Priority to CN202010397266.XA priority Critical patent/CN111581630B/en
Publication of CN111581630A publication Critical patent/CN111581630A/en
Application granted granted Critical
Publication of CN111581630B publication Critical patent/CN111581630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/107License processing; Key processing
    • G06F21/1078Logging; Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation

Abstract

The embodiment of the application discloses a computer unlocking method, a computer unlocking device, computer unlocking equipment and a computer unlocking medium. The method comprises the following steps: receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user; verifying the identity information of the computer user according to a pre-stored identity database; and if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal. Through the technical scheme who provides of this application of operation, can solve traditional login process and need manual input password, lead to the loaded down with trivial details problem of login process, efficiency when can effectively improve the computer unblock and log in.

Description

Computer unlocking method, device, equipment and medium
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a computer unlocking method, device, equipment and medium.
Background
With the development of information technology, computers are widely applied, and great convenience is brought to the life of users; users usually store many important files or data information in computers, so people are more and more aware of the security of computer systems, and the common encryption mode of Windows10 is static password; and unlocking and logging in are carried out by setting numbers, letters or special characters.
In the process of implementing the present application, the inventor finds that at least the following problems exist in the prior art:
the static password used at present needs to be manually input during login, and the problem that the static password is easy to break exists.
Disclosure of Invention
The embodiment of the application provides a computer unlocking method, a computer unlocking device, computer unlocking equipment and a computer unlocking medium, wherein an intelligent terminal scans identification patterns to achieve the effect of quickly unlocking a computer.
In one embodiment, an embodiment of the present application provides a computer unlocking method, including:
receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
verifying the identity information of the computer user according to a pre-stored identity database;
and if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal.
Optionally, the process of storing the identity information of the computer user in the identity database includes:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an incidence relation between the identity information of the computer user and the identification pattern;
and storing the association relation in an identity database.
Optionally, verifying the identity information of the computer user according to a pre-stored identity database includes:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
Optionally, verifying that the computer user identity information and the intelligent terminal identity information have a binding relationship, including:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
Optionally, the method further includes:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating the state to be awakened of the computer to be switched to a working state based on the awakening request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
In one embodiment, an embodiment of the present application provides a computer unlocking device, including:
the receiving module is used for receiving a login request sent by the intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
the verification module is used for verifying the identity information of the computer user according to a pre-stored identity database;
and the sending module is used for indicating the computer to enter a login page from an unlocking page if the identity information of the computer user passes the verification, and sending an unlocking response to the intelligent terminal.
Optionally, the method further includes:
the receiving module is also used for receiving the computer user identity information and the identification pattern uploaded by the intelligent terminal;
the establishing module is used for establishing the incidence relation between the identity information of the computer user and the identification pattern;
and the storage module is used for storing the association relation into the identity database.
Optionally, the verification module is specifically configured to:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
Optionally, the verification module is further specifically configured to:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
Optionally, the method further includes:
the indication module is used for receiving a wake-up request sent by the intelligent terminal if the computer is in a state to be woken up, and indicating the state to be woken up of the computer to be switched to a working state based on the wake-up request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
In one embodiment, an embodiment of the present application further provides a computer device, including:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors implement the computer unlocking method according to any one of the embodiments of the present application.
In one embodiment, the present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the computer unlocking method according to any one of the embodiments of the present application.
According to the method and the device, the login request of the intelligent terminal is received, the identity information of the user logging in the computer is verified according to the identity information stored in the identity database in advance, the computer is indicated to jump from the unlocking page to the login page after the verification is passed, and the safe unlocking of the computer is achieved. According to the computer unlocking method and device, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the login process is complicated due to the fact that a password needs to be manually input in the traditional login process is solved, and the efficiency of unlocking and logging in the computer can be effectively improved.
Drawings
Fig. 1 is a schematic flowchart of a computer unlocking method in an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating another computer unlocking method according to an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a computer unlocking device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a computer device in an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures.
Fig. 1 is a schematic flowchart of a computer unlocking method in an embodiment of the present application. The embodiment can be suitable for the situation of unlocking the computer through unlocking the intelligent terminal. The method can be executed by a computer unlocking device, can be realized in a hardware/software mode, and can be configured in computer equipment. The method specifically comprises the following steps:
s110, receiving a login request sent by the intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user.
In the embodiment, the unlocking method of logging in the computer system by adopting the preset static password is modified; and scanning an identification pattern generated in advance by the computer through the intelligent terminal to send a login request for unlocking the computer according to the identification pattern. The intelligent terminal is a mobile device with a scanning function; such as a smart phone or tablet computer.
The identification pattern can be a two-dimensional code generated based on identity information of a computer user; specifically, the computer terminal can generate the two-dimensional code based on the identity information of the computer user according to a third-party tool installed in the system. The identification information of the computer user is an account number and a password corresponding to the computer; the account and the password can be automatically generated by the server according to the received account creating request. Specifically, the two-dimensional code generated based on the Identity information of the computer user may include URL (uniform resource Locator) information and a unique login identification ID (Identity Document); the URL or the login identification ID can enable the intelligent terminal for scanning the two-dimensional code to be connected to the server side; the login identification ID may be a preset backup account login password. According to the computer unlocking method and device, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the login process is complicated due to the fact that a password needs to be manually input in the traditional login process is solved, and the efficiency of unlocking and logging in the computer is effectively improved.
And S120, verifying the identity information of the computer user according to a pre-stored identity database.
In this embodiment, the user identity information of all computers associated with the server is pre-stored in the identity database of the server, and the identity information of the logged-in computer user is verified through the identity information of each computer user stored in the identity database, so that the validity of the user identity information logged in the computer can be effectively ensured, and the harm caused by logging in the computer by an illegal logged-in user is avoided.
Specifically, in this embodiment, a function of periodically querying the server is provided, which is used to detect whether a person scans the identification pattern and logs in the computer; when the identification pattern is detected to be scanned, acquiring computer user identity information sent by the intelligent terminal which scans the identification pattern, and verifying the identity information; if the identity information of the computer user passes the verification, which indicates that the identity information of the login user is matched with the user information stored in the identity database, executing S130; if the identity information of the computer user is not verified, the fact that the identity information of the login user is not matched with the corresponding user information stored in the identity database is indicated, the account login is prompted to fail, and the login verification can be continued only by changing the account again.
And S130, indicating the computer to enter a login page from the unlocking page, and sending an unlocking response to the intelligent terminal.
In this embodiment, after the identity information of the computer user is verified, the server calls an Application Programming Interface (API) of the computer terminal to be unlocked through the corresponding computer user identity information stored in the database, and executes an unlocking operation of the computer to be unlocked, so that the computer to be unlocked enters the login page from the unlocking page, and the computer system is logged in through the intelligent terminal.
According to the method and the device, the login request of the intelligent terminal is received, the identity information of the user logging in the computer is verified according to the identity information stored in the identity database in advance, the computer is indicated to jump from the unlocking page to the login page after the verification is passed, and the safe unlocking of the computer is achieved. According to the computer unlocking method and device, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the login process is complicated due to the fact that a password needs to be manually input in the traditional login process is solved, and the efficiency of unlocking and logging in the computer can be effectively improved.
Fig. 2 is a schematic flowchart of another computer unlocking method in the embodiment of the present application. The computer unlocking method is further expanded and optimized on the basis of the embodiment, and the embodiment of the application also provides another computer unlocking method which can be combined with any optional option in the technical scheme. As shown in fig. 2, the method includes:
s210, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user.
S220, if the identity information of the computer user is stored in the identity database and the binding relationship exists between the identity information of the computer user and the identity information of the intelligent terminal, the identity information of the computer user is verified.
In the embodiment, the identity information of the computer user is transmitted to the server through the intelligent terminal for verification, and in order to ensure the security when the intelligent terminal logs in, whether the intelligent terminal for unlocking the computer is associated with the computer to be unlocked needs to be verified; if the computer user identity information and the intelligent terminal identity information have a binding relationship, the intelligent terminal can be indicated to be related to the computer to be unlocked; by the method, the reliability of the intelligent terminal identity information of the login computer can be effectively ensured.
And S230, if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal.
In this technical solution, optionally, the process of storing the identity information of the computer user in the identity database includes:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an incidence relation between the identity information of the computer user and the identification pattern;
and storing the association relation in an identity database.
In this embodiment, the identity database of the server stores the identity information of each computer user, and the identity information is uploaded through the intelligent terminal bound with the computer; meanwhile, the intelligent terminal uploads an identification pattern generated according to the identity information of the computer user to an identity database, establishes an incidence relation between the identity information of the computer user and the identification pattern, and is used for verifying the received identity information of the computer user according to the incidence relation stored in the identity database.
In this technical solution, optionally, verifying that the computer user identity information and the intelligent terminal identity information have a binding relationship includes:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
In this embodiment, to unlock the computer, it is necessary to verify whether the identity information of the intelligent terminal matches with the identity information of the user of the computer to be unlocked, and only if the identity information of the intelligent terminal matches with the identity information of the user of the computer to be unlocked, the valid identity of the intelligent terminal for unlocking the computer can be ensured.
In this technical solution, optionally, the method may further include:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating the state to be awakened of the computer to be switched to a working state based on the awakening request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
In this embodiment, the state to be awakened is the current working state of the computer is the screen-off state; when the computer is in the screen-off state, the intelligent terminal can enable the computer to directly unlock and log in when the screen is off. Specifically, the intelligent terminal can generate a wake-up pattern corresponding to the computer according to the input computer account and password information, and wake up the computer system and execute login operation by scanning the wake-up pattern; the method has the advantages that the computer can be efficiently logged in by directly executing corresponding operation on the intelligent terminal without waking up the computer, and the unlocking diversity of the computer in different states is greatly enriched.
Fig. 3 is a schematic structural diagram of a computer unlocking device in the embodiment of the present application, which is applicable to a case of unlocking a computer through unlocking of an intelligent terminal. The device is configured in computer equipment, and can realize the computer unlocking method in any embodiment of the application. As shown in fig. 3, the apparatus specifically includes:
a receiving module 310, configured to receive a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
the verification module 320 is used for verifying the identity information of the computer user according to a pre-stored identity database;
the sending module 330 is configured to, if the identity information of the computer user passes the verification, indicate that the computer enters the login page from the unlocking page, and send an unlocking response to the intelligent terminal.
Optionally, on the basis of the above apparatus, the apparatus further includes:
the receiving module 310 is further configured to receive the computer user identity information and the identification pattern uploaded by the intelligent terminal;
the establishing module is used for establishing the incidence relation between the identity information of the computer user and the identification pattern;
and the storage module is used for storing the association relation into the identity database.
Optionally, on the basis of the foregoing apparatus, the verification module 320 is specifically configured to:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
Optionally, on the basis of the foregoing apparatus, the verification module 320 is further specifically configured to:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
Optionally, on the basis of the above apparatus, the apparatus further includes:
the indication module is used for receiving a wake-up request sent by the intelligent terminal if the computer is in a state to be woken up, and indicating the state to be woken up of the computer to be switched to a working state based on the wake-up request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
Through the computer unlocking device provided by the embodiment of the application, the intelligent terminal can be utilized to scan the identification pattern to unlock the computer, the problem that the login process is complicated due to the fact that the password needs to be manually input in the traditional login process is solved, and the efficiency of unlocking and logging in the computer can be effectively improved.
The computer unlocking device provided by the embodiment of the application can execute the computer unlocking method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of the execution method.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program:
step A, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
b, verifying the identity information of the computer user according to a pre-stored identity database;
and step C, if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal.
In one embodiment, the processor when executing the computer program may further perform the steps of:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an incidence relation between the identity information of the computer user and the identification pattern;
and storing the association relation in an identity database.
In one embodiment, the processor when executing the computer program may further perform the steps of:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
In one embodiment, the processor when executing the computer program may further perform the steps of:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
In one embodiment, the processor when executing the computer program may further perform the steps of:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating the state to be awakened of the computer to be switched to a working state based on the awakening request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
According to the computer unlocking method and device, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the login process is complicated due to the fact that a password needs to be manually input in the traditional login process is solved, and the efficiency of unlocking and logging in the computer can be effectively improved.
Fig. 4 is a schematic structural diagram of a computer apparatus in an embodiment of the present application, and as shown in fig. 4, the computer apparatus includes a processor 410, a memory 420, an input device 430, and an output device 440; the number of the processors 410 in the computer device may be one or more, and one processor 410 is taken as an example in fig. 4; the processor 410, the memory 420, the input device 430 and the output device 440 in the computer apparatus may be connected by a bus or other means, and the connection by the bus is exemplified in fig. 4.
The memory 420 serves as a computer-readable storage medium for storing software programs, computer-executable programs, and modules, such as program instructions/modules corresponding to the computer unlocking method in the embodiments of the present application. The processor 410 executes the software programs, instructions and modules stored in the memory 420, so as to execute various functional applications and data processing of the computer device, that is, implement the computer unlocking method provided in the embodiments of the present application.
The memory 420 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 420 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some examples, memory 420 may further include memory located remotely from processor 410, which may be connected to a computer device through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device 430 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the computer apparatus, and may include a keyboard, a mouse, and the like. The output device 440 may include a display device such as a display screen.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
step A, receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of the computer unlocking page based on the intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
b, verifying the identity information of the computer user according to a pre-stored identity database;
and step C, if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an incidence relation between the identity information of the computer user and the identification pattern;
and storing the association relation in an identity database.
In one embodiment, the computer program when executed by the processor further performs the steps of:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes the verification.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating the state to be awakened of the computer to be switched to a working state based on the awakening request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
According to the computer unlocking method and device, the intelligent terminal is used for scanning the identification pattern to unlock the computer, the problem that the login process is complicated due to the fact that a password needs to be manually input in the traditional login process is solved, and the efficiency of unlocking and logging in the computer can be effectively improved.
The present embodiment provides a storage medium containing computer-executable instructions, which are used to implement the computer unlocking method provided in the embodiments of the present application when executed by a computer processor.
Of course, the storage medium provided in the embodiments of the present application and containing computer-executable instructions is not limited to the method operations described above, and may also perform related operations in the computer unlocking method provided in any embodiments of the present application.
From the above description of the embodiments, it is obvious for those skilled in the art that the present application can be implemented by software and necessary general hardware, and certainly can be implemented by hardware, but the former is a better embodiment in many cases. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as a floppy disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a FLASH Memory (FLASH), a hard disk or an optical disk of a computer, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute the methods described in the embodiments of the present application.
It should be noted that, in the embodiment of the above search apparatus, each included unit and module are merely divided according to functional logic, but are not limited to the above division as long as the corresponding functions can be implemented; in addition, specific names of the functional units are only used for distinguishing one functional unit from another, and are not used for limiting the protection scope of the application.
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present application and the technical principles employed. It will be understood by those skilled in the art that the present application is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the application. Therefore, although the present application has been described in more detail with reference to the above embodiments, the present application is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present application, and the scope of the present application is determined by the scope of the appended claims.

Claims (10)

1. A method for unlocking a computer, the method comprising:
receiving a login request sent by an intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on an intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
verifying the identity information of the computer user according to a pre-stored identity database;
and if the identity information of the computer user passes the verification, indicating the computer to enter a login page from an unlocking page, and sending an unlocking response to the intelligent terminal.
2. The method of claim 1, wherein the computer user identity information storage process of the identity database comprises:
receiving computer user identity information and identification patterns uploaded by an intelligent terminal;
establishing an incidence relation between the computer user identity information and the identification pattern;
and storing the association relation into an identity database.
3. The method of claim 1, wherein said verifying said computer user identity information against a pre-stored identity database comprises:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes verification.
4. The method of claim 3, wherein verifying that the computer user identity information and the intelligent terminal identity information have a binding relationship comprises:
acquiring identity information of the intelligent terminal;
and if the identity information of the computer user is the same as the identity information of the intelligent terminal, determining that a binding relationship exists.
5. The method of claim 1, further comprising:
if the computer is in a state to be awakened, receiving an awakening request sent by the intelligent terminal, and indicating the state to be awakened of the computer to be switched to a working state based on the awakening request; the awakening request is sent out in response to an awakening pattern recognition instruction of a user based on an awakening pattern generated by the intelligent terminal.
6. A computer unlocking device, said device comprising:
the receiving module is used for receiving a login request sent by the intelligent terminal; the login request is obtained by scanning an identification pattern of a computer unlocking page based on an intelligent terminal, and the identification pattern is generated according to identity information of a computer user;
the verification module is used for verifying the identity information of the computer user according to a pre-stored identity database;
and the sending module is used for indicating the computer to enter a login page from an unlocking page if the identity information of the computer user passes the verification, and sending an unlocking response to the intelligent terminal.
7. The apparatus of claim 6, further comprising:
the receiving module is also used for receiving the computer user identity information and the identification pattern uploaded by the intelligent terminal;
the establishing module is used for establishing the incidence relation between the computer user identity information and the identification pattern;
and the storage module is used for storing the association relation into an identity database.
8. The apparatus according to claim 6, wherein the verification module is specifically configured to:
and if the computer user identity information is stored in the identity database and the binding relationship exists between the computer user identity information and the intelligent terminal identity information, the computer user identity information passes verification.
9. A computer device, comprising:
one or more processors;
a storage device for storing one or more programs,
when the one or more programs are executed by the one or more processors, the one or more processors are enabled to realize the computer unlocking method as claimed in any one of claims 1 to 5.
10. A computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the computer unlocking method according to any one of claims 1 to 5.
CN202010397266.XA 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium Active CN111581630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010397266.XA CN111581630B (en) 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010397266.XA CN111581630B (en) 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN111581630A true CN111581630A (en) 2020-08-25
CN111581630B CN111581630B (en) 2023-12-15

Family

ID=72113481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010397266.XA Active CN111581630B (en) 2020-05-12 2020-05-12 Computer unlocking method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN111581630B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113504749A (en) * 2021-06-25 2021-10-15 上海闻泰信息技术有限公司 UWB-based device control method and apparatus, control device, and storage medium
CN114422236A (en) * 2021-10-27 2022-04-29 珠海奔图电子有限公司 Intelligent device access method and device and electronic device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
WO2019061219A1 (en) * 2017-09-29 2019-04-04 华为技术有限公司 Screen unlocking method and terminal
CN111031539A (en) * 2019-09-30 2020-04-17 武汉信安珞珈科技有限公司 Method and system for enhancing login security of Windows operating system based on mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019061219A1 (en) * 2017-09-29 2019-04-04 华为技术有限公司 Screen unlocking method and terminal
CN109558718A (en) * 2018-11-30 2019-04-02 努比亚技术有限公司 Application program login method, computer end, mobile terminal, system and storage medium
CN111031539A (en) * 2019-09-30 2020-04-17 武汉信安珞珈科技有限公司 Method and system for enhancing login security of Windows operating system based on mobile terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
江超;龙毅宏;: "基于移动终端的系统登录方法的研究与开发" *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113504749A (en) * 2021-06-25 2021-10-15 上海闻泰信息技术有限公司 UWB-based device control method and apparatus, control device, and storage medium
CN113504749B (en) * 2021-06-25 2022-11-22 上海闻泰信息技术有限公司 UWB-based device control method and apparatus, control device, and storage medium
CN114422236A (en) * 2021-10-27 2022-04-29 珠海奔图电子有限公司 Intelligent device access method and device and electronic device
CN114422236B (en) * 2021-10-27 2023-12-01 珠海奔图电子有限公司 Intelligent device access method and device and electronic device

Also Published As

Publication number Publication date
CN111581630B (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US10050952B2 (en) Smart phone login using QR code
CN106330850B (en) Security verification method based on biological characteristics, client and server
EP3065074A1 (en) Fingerprint authentication method and device, intelligent terminal, and computer storage medium
US10063538B2 (en) System for secure login, and method and apparatus for same
US11349665B2 (en) Device attestation server and method for attesting to the integrity of a mobile device
CN107528858B (en) Login method, device and equipment based on webpage and storage medium
CN103336924A (en) Starting lock for mobile terminal application program
CN112822222A (en) Login verification method, automatic login verification method, server side and client side
CN111581630B (en) Computer unlocking method, device, equipment and medium
TWI668586B (en) Data communication method and system, client and server
CN111340987A (en) Internet of things door lock communication method, device and system and computer storage medium
CN107533598A (en) Input method, device and the terminal of the login password of application program
CN113031825B (en) Fingerprint event processing device and method
CN112966249A (en) Multi-user account switching method and device, computer equipment and medium
CN110990798B (en) Application program permission configuration method and device, electronic equipment and storage medium
JP2010079900A (en) Key protecting method and apparatus
CN108965335B (en) Method for preventing malicious access to login interface, electronic device and computer medium
CN111259371A (en) Internet of things equipment authentication method, electronic device and storage medium
CN111104653A (en) User operation processing method and device, electronic equipment and readable storage medium
CN110688632A (en) Application program login method, device, equipment and storage medium
EP3410332A1 (en) A system and method for transferring data to an authentication device
CN105376067A (en) Method and system for digital signatures
CN115622786A (en) Account login method and device, electronic equipment and storage medium
CN115174122A (en) Verification code generation method, verification code verification method, device, equipment and medium
CN113360868A (en) Application program login method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant