CN112422744A - Method for unlocking mobile phone, mobile phone and computer - Google Patents

Method for unlocking mobile phone, mobile phone and computer Download PDF

Info

Publication number
CN112422744A
CN112422744A CN202011045768.2A CN202011045768A CN112422744A CN 112422744 A CN112422744 A CN 112422744A CN 202011045768 A CN202011045768 A CN 202011045768A CN 112422744 A CN112422744 A CN 112422744A
Authority
CN
China
Prior art keywords
target
mobile phone
verification information
computer
target computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011045768.2A
Other languages
Chinese (zh)
Inventor
向湘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xiuyuan Cultural Creative Co Ltd
Original Assignee
Shenzhen Xiuyuan Cultural Creative Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xiuyuan Cultural Creative Co Ltd filed Critical Shenzhen Xiuyuan Cultural Creative Co Ltd
Priority to CN202011045768.2A priority Critical patent/CN112422744A/en
Publication of CN112422744A publication Critical patent/CN112422744A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Abstract

The embodiment of the application provides a method for unlocking a mobile phone, the mobile phone and a computer, which are used for unlocking the mobile phone under the conditions that a screen of the mobile phone is broken, no display is available on the screen, touch control is invalid or fingerprint identification is invalid. The method in the embodiment of the application comprises the following steps: generating a temporary file by the target mobile phone, wherein the temporary file carries an unlocking password of the target mobile phone; the target mobile phone receives a key backup instruction; the target mobile phone sends a verification information request to the target computer, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone; the target mobile phone receives verification information feedback sent by the target computer, wherein the verification information feedback carries verification information; fusing the verification information to a temporary file by the target mobile phone to generate a key file; and the target mobile phone sends the key file to the target computer, so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.

Description

Method for unlocking mobile phone, mobile phone and computer
Technical Field
The embodiment of the application relates to the field of data processing, in particular to a method for unlocking a mobile phone, the mobile phone and a computer.
Background
Data stored in the existing mobile phone is more and more important, and once the data cannot be used, great trouble is brought to a user.
In the prior art, a mobile phone can be connected to a computer through a data line, and related data can be read from the mobile phone through the computer.
However, in some special cases, such as when the screen of the mobile phone is broken, the screen is not displayed, the touch control is disabled, or the fingerprint identification is disabled, the user cannot input the password or the fingerprint, and the mobile phone is difficult to unlock, so that the data may not be read.
Disclosure of Invention
The embodiment of the application provides a method for unlocking a mobile phone, the mobile phone and a computer, and the mobile phone can still be unlocked through the computer under the conditions that a screen of the mobile phone is broken, no display exists on the screen, touch control is invalid or fingerprint identification is invalid, so that data of the mobile phone can be read out.
A first aspect of the embodiments of the present application provides a method for unlocking a mobile phone, including:
generating a temporary file by a target mobile phone, wherein the temporary file carries an unlocking password of the target mobile phone;
the target mobile phone receives a key backup instruction, wherein the key backup instruction is used for instructing the target mobile phone to backup the unlocking password to a target computer;
the target mobile phone sends a verification information request to the target computer, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
the target mobile phone receives verification information feedback sent by the target computer, wherein the verification information feedback carries the verification information;
the target mobile phone fuses the verification information to the temporary file to generate a key file;
and the target mobile phone sends the key file to the target computer, so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.
Optionally, after the target mobile phone sends the key file to the target computer, the method further includes:
the target mobile phone receives an unlocking request sent by the target computer, wherein the unlocking request carries the unlocking password;
the target mobile phone judges whether the unlocking password is matched with the unlocking password of the target mobile phone;
and if so, unlocking the target mobile phone.
Optionally, after the target mobile phone fuses the verification information to the temporary file and generates a key file, and before the target mobile phone sends the key file to the target computer, the method further includes:
and the target mobile phone sends a key file storage notice to the target computer, wherein the key file storage notice is used for indicating that the target mobile phone is to send the key file to the target computer.
A second aspect of the present application provides a method for unlocking a mobile phone, including:
a target computer receives a verification information request sent by a target mobile phone, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
the target computer sends verification information feedback to the target mobile phone, wherein the verification information feedback carries the verification information;
the target computer receives a key file sent by the target mobile phone, wherein the key file carries the verification information and an unlocking password of the target mobile phone;
the target computer judges whether the own computer name, MAC address and hardware model are matched with the verification information;
and if so, the target computer extracts the unlocking password of the target mobile phone from the key file.
Optionally, after the target computer receives the key file sent by the target mobile phone, the method further includes:
and the target computer sends an unlocking request to the target mobile phone, wherein the unlocking request carries the unlocking password.
Optionally, after the target computer sends verification information feedback to the target mobile phone and before the target computer receives the key file sent by the target mobile phone, the method further includes:
and the target computer receives a key file storage notice sent by the target mobile phone, wherein the key file storage notice is used for indicating that the target mobile phone is to send the key file to the target computer.
A third aspect of the embodiments of the present application provides a target mobile phone, including:
the first generating unit is used for generating a temporary file, and the temporary file carries an unlocking password of the target mobile phone;
the first receiving unit is used for receiving a key backup instruction, and the key backup instruction is used for commanding the target mobile phone to backup the unlocking password to a target computer;
a first sending unit, configured to send a verification information request to the target computer, where the verification information request is used to request the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information includes a computer name, an MAC address, and a hardware model of the target computer;
a second receiving unit, configured to receive verification information feedback sent by the target computer, where the verification information feedback carries the verification information;
the second generation unit is used for fusing the verification information to the temporary file to generate a key file;
and the second sending unit is used for sending the key file to the target computer so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.
Optionally, the target mobile phone further includes:
a third receiving unit, configured to receive an unlocking request sent by the target computer, where the unlocking request carries the unlocking password;
the first judgment unit is used for judging whether the unlocking password is matched with the unlocking password of the first judgment unit;
and the unlocking unit is used for unlocking the target mobile phone when the judging unit determines that the unlocking password is matched with the unlocking password of the target mobile phone.
Optionally, the target mobile phone further includes:
a third sending unit, configured to send a key file saving notification to the target computer, where the key file saving notification is used to indicate that the target mobile phone is to send the key file to the target computer.
A fourth aspect of embodiments of the present application provides a target computer, including:
a fourth receiving unit, configured to receive a verification information request sent by a target mobile phone, where the verification information request is used to request the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information includes a computer name, an MAC address, and a hardware model of the target computer;
a fourth sending unit, configured to send verification information feedback to the target mobile phone, where the verification information feedback carries the verification information;
a fifth receiving unit, configured to receive a key file sent by the target mobile phone, where the key file carries the verification information and an unlocking password of the target mobile phone;
a second judging unit, configured to judge whether the computer name, the MAC address, and the hardware model of the target computer match the verification information;
and the extracting unit is used for extracting the unlocking password of the target mobile phone from the key file when the second judging unit determines that the computer name, the MAC address and the hardware model of the target computer are matched with the verification information.
Optionally, the target computer further includes:
a fifth sending unit, configured to send, by the target computer, an unlocking request to the target mobile phone, where the unlocking request carries the unlocking password.
Optionally, the target computer further includes:
a sixth receiving unit, configured to receive a key file saving notification sent by the target mobile phone, where the key file saving notification is used to indicate that the target mobile phone is to send the key file to the target computer.
A fifth aspect of the embodiments of the present application provides a target mobile phone, including:
the device comprises a processor, a memory, an input and output unit and a bus;
the processor is connected with the memory, the input and output unit and the bus;
the processor specifically performs the following operations:
generating a temporary file, wherein the temporary file carries an unlocking password of the target mobile phone;
receiving a key backup instruction, wherein the key backup instruction is used for instructing the target mobile phone to backup the unlocking password to a target computer;
sending a verification information request to the target computer, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
receiving verification information feedback sent by the target computer, wherein the verification information feedback carries the verification information;
fusing the verification information to the temporary file to generate a key file;
and sending the key file to the target computer, so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.
Optionally, the processor is further configured to perform the method of the first aspect and the alternatives of the first aspect.
A sixth aspect of embodiments of the present application provides a target computer, including:
the device comprises a processor, a memory, an input and output unit and a bus;
the processor is connected with the memory, the input and output unit and the bus;
the processor specifically performs the following operations:
receiving a verification information request sent by a target mobile phone, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
sending verification information feedback to the target mobile phone, wherein the verification information feedback carries the verification information;
receiving a key file sent by the target mobile phone, wherein the key file carries the verification information and an unlocking password of the target mobile phone;
judging whether the computer name, the MAC address and the hardware model of the computer are matched with the verification information;
and if so, extracting the unlocking password of the target mobile phone from the key file.
Optionally, the processor is further configured to perform the method of the second aspect and the alternatives of the second aspect.
A seventh aspect of embodiments of the present application provides a computer-readable storage medium, including program instructions, which, when executed on a computer device, cause the computer device to perform any one of the optional implementation methods of the first aspect and the first aspect, and any one of the optional implementation methods of the second aspect and the second aspect.
According to the technical scheme, the embodiment of the application has the following advantages:
after the target mobile phone generates a temporary file containing an unlocking password, verification information including the computer name, the MAC address and the hardware model of a target computer is merged into the temporary file to generate a key file, the key file is sent to the target computer, and the target computer can extract the unlocking password and unlock the target mobile phone after passing the verification of the key file, so that a user can still unlock the target mobile phone through the target computer under the conditions that the screen of the target mobile phone is broken, the screen has no display, the touch is invalid or the fingerprint identification is invalid, and further the data of the target mobile phone is read out.
Drawings
Fig. 1 is a schematic flowchart of an embodiment of a method for unlocking a mobile phone in an embodiment of the present application;
fig. 2 is a schematic flowchart of another embodiment of a method for unlocking a mobile phone in the embodiment of the present application;
fig. 3 is a schematic structural diagram of an embodiment of a target mobile phone in the embodiment of the present application;
FIG. 4 is a schematic structural diagram of an embodiment of a target computer in the embodiment of the present application;
fig. 5 is a schematic structural diagram of another embodiment of a target mobile phone in the embodiment of the present application;
fig. 6 is a schematic structural diagram of another embodiment of a target computer in the embodiment of the present application.
Detailed Description
The embodiment of the application provides a method for unlocking a mobile phone, the mobile phone and a computer, which are used for unlocking the mobile phone under the conditions that a screen of the mobile phone is broken, no display is available on the screen, touch control is invalid or fingerprint identification is invalid.
Referring to fig. 1, an embodiment of a method for unlocking a mobile phone according to the embodiment of the present application includes:
101. generating a temporary file by the target mobile phone;
after the target mobile phone is not broken and the user sets the unlocking password of the target mobile phone, the target mobile phone can generate a temporary file by itself, and the file contains the unlocking password.
102. The target mobile phone receives a key backup instruction;
after the target mobile phone is connected with the target computer through the data line, a selection box can be popped up, a user can determine whether to back up the unlocking password to the target computer, if the user selects to back up the unlocking password to the target computer, the target mobile phone can receive a key backup instruction, and the key backup instruction is used for instructing the target mobile phone to back up the unlocking password to the target computer.
103. The target mobile phone sends a verification information request to the target computer;
after receiving the key backup instruction, the target mobile phone may send a verification information request to the target computer to obtain verification information of the target computer, where the verification information includes a computer name, a MAC address, and a hardware model of the target computer.
104. The target computer sends verification information feedback to the target mobile phone;
after receiving the verification information request sent by the target mobile phone, the target computer can package the computer name, the MAC address and the hardware model of the target computer to the verification information feedback in response to the verification information request, and then send the verification information feedback to the target mobile phone.
105. Generating a key file by the target mobile phone;
after receiving the verification information feedback sent by the target computer, the target mobile phone can extract the computer name, the MAC address and the hardware model carried by the verification information feedback, and then package the computer name, the MAC address and the hardware model into a temporary file to generate a key file.
106. The target mobile phone sends a key file to the target computer;
after the target mobile phone generates the key file, the key file can be sent to the target computer, so that the target computer can unlock the target mobile phone through the unlocking password carried by the key file.
The target computer may save the key file locally.
107. The target computer judges whether the computer name, the MAC address and the hardware model of the target computer are matched with the verification information, if so, step 108 is executed; if not, the flow is ended.
After receiving the key file from the target mobile phone, the target computer may send its own computer name, MAC address, and hardware model to the key file to match the verification information, and if the matching is passed, execute step 108; if the matching fails, the flow is ended.
In this embodiment, only when the computer name, the MAC address, and the hardware model of the target computer match the verification information, the target computer can extract the unlock password of the target mobile phone, which increases security.
108. The target computer extracts the unlock password.
When the target computer determines that the computer name, the MAC address and the hardware model of the target computer are matched with the verification information, the target computer can extract the unlocking password of the target mobile phone from the key file.
After generating a temporary file containing an unlocking password, the target mobile phone sends a verification information request to the target computer; and after receiving the request for sending the verification information, the target computer sends verification information feedback containing the verification information to the target mobile phone, so that the target mobile phone acquires the verification information of the target computer. And then the target mobile phone merges the verification information into the temporary file so as to generate a key file, and sends the key file to the target computer, and the target computer can extract the unlocking password and unlock the target mobile phone after passing the verification of the key file. Therefore, the user can still unlock the target mobile phone through the target computer under the conditions that the screen of the target mobile phone is broken, the screen is not displayed, the touch control is invalid or the fingerprint identification is invalid, and then the data of the target mobile phone is read out.
Referring to fig. 2, another embodiment of the method for unlocking a mobile phone according to the embodiment of the present invention includes:
201. generating a temporary file by the target mobile phone;
202. the target mobile phone receives a key backup instruction;
203. the target mobile phone sends a verification information request to the target computer;
204. the target computer sends verification information feedback to the target mobile phone;
205. generating a key file by the target mobile phone;
steps 201 to 205 in this embodiment are similar to steps 101 to 105 in the previous embodiment, and are not described again here.
206. The target mobile phone sends a key file storage notice to the target computer;
after the target handset generates the key file, before sending the key file to the target computer, a key file saving notification may be sent to the target computer, so that the target computer may prepare before receiving the key file.
After receiving the key file saving notification, the target computer may check the usage of the storage space of the local storage, and then reserve a suitable storage capacity for the key file to ensure that the key file can be normally received.
In this embodiment, the target computer may reserve storage capacity for the key file before receiving the key file, thereby reducing a failure in receiving the key file.
207. The target mobile phone sends a key file to the target computer;
208. the target computer judges whether the computer name, the MAC address and the hardware model of the target computer are matched with the verification information, if so, step 209 is executed;
209. extracting an unlocking password by the target computer;
steps 207 to 209 in this embodiment are similar to steps 106 to 108 in the previous embodiment, and are not described again here.
210. The target computer sends an unlocking request to the target mobile phone;
when the target mobile phone is connected with the target computer through the data line, the target computer can pack the extracted unlocking password into the unlocking request and then send the unlocking request to the target mobile phone, so that the target mobile phone releases the self-locking after receiving the unlocking request.
211. The target mobile phone judges whether the unlocking password in the unlocking request is matched with the unlocking password of the target mobile phone, if so, the step 212 is executed; if not, the flow is ended.
After receiving the unlocking request sent by the target computer, the target mobile phone may extract the unlocking password carried in the unlocking request, and then determine whether the unlocking password is matched with the own unlocking password, if so, execute step 212; if not, the flow is ended.
212. And unlocking the target mobile phone.
When the target mobile phone determines that the unlocking password in the unlocking request is matched with the self unlocking password, the locking can be released, and the user can read the data of the target mobile phone through the target computer at the moment.
In this embodiment, only when the unlocking password in the unlocking request matches the unlocking password of the target mobile phone, the target mobile phone is unlocked, and the security of the target mobile phone is increased.
The above describes the method for unlocking the mobile phone in the embodiment of the present application, and the following describes the target mobile phone and the target computer in the embodiment.
Referring to fig. 3, an embodiment of a target mobile phone in the embodiment of the present application includes:
the first generating unit is used for generating a temporary file, and the temporary file carries an unlocking password of the target mobile phone;
the first receiving unit is used for receiving a key backup instruction, and the key backup instruction is used for commanding the target mobile phone to backup the unlocking password to a target computer;
a first sending unit, configured to send a verification information request to the target computer, where the verification information request is used to request the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information includes a computer name, an MAC address, and a hardware model of the target computer;
a second receiving unit, configured to receive verification information feedback sent by the target computer, where the verification information feedback carries the verification information;
the second generation unit is used for fusing the verification information to the temporary file to generate a key file;
a third sending unit, configured to send a key file saving notification to the target computer, where the key file saving notification is used to indicate that the target mobile phone is to send the key file to the target computer;
a second sending unit, configured to send the key file to the target computer, so that the target computer can unlock the target mobile phone according to an unlocking password in the key file;
a third receiving unit, configured to receive an unlocking request sent by the target computer, where the unlocking request carries the unlocking password;
the first judgment unit is used for judging whether the unlocking password is matched with the unlocking password of the first judgment unit;
and the unlocking unit is used for unlocking the target mobile phone when the judging unit determines that the unlocking password is matched with the unlocking password of the target mobile phone.
In this embodiment, the functions of each unit correspond to the steps executed by the target mobile phone in the embodiments shown in fig. 1 to fig. 2, and are not described herein again.
Referring to fig. 4, an embodiment of a target computer in the embodiment of the present application includes:
a fourth receiving unit, configured to receive a verification information request sent by a target mobile phone, where the verification information request is used to request the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information includes a computer name, an MAC address, and a hardware model of the target computer;
a fourth sending unit, configured to send verification information feedback to the target mobile phone, where the verification information feedback carries the verification information;
a sixth receiving unit, configured to receive a key file saving notification sent by the target mobile phone, where the key file saving notification is used to indicate that the target mobile phone is to send the key file to the target computer;
a fifth receiving unit, configured to receive a key file sent by the target mobile phone, where the key file carries the verification information and an unlocking password of the target mobile phone;
a second judging unit, configured to judge whether the computer name, the MAC address, and the hardware model of the target computer match the verification information;
an extracting unit, configured to extract an unlocking password of the target mobile phone from the key file when the second determining unit determines that the computer name, the MAC address, and the hardware model of the target computer match the verification information;
a fifth sending unit, configured to send, by the target computer, an unlocking request to the target mobile phone, where the unlocking request carries the unlocking password.
In this embodiment, the functions of each unit correspond to the steps executed by the target computer in the embodiments shown in fig. 1 to fig. 2, and are not described herein again.
Referring to fig. 5, another embodiment of the target mobile phone in the embodiment of the present application includes:
a processor 501, a memory 502, an input-output unit 503, and a bus 504;
the processor 501 is connected with the memory 502, the input/output unit 503 and the bus 504;
the processor 501 specifically performs the following operations:
generating a temporary file, wherein the temporary file carries an unlocking password of the target mobile phone;
receiving a key backup instruction, wherein the key backup instruction is used for instructing the target mobile phone to backup the unlocking password to a target computer;
sending a verification information request to the target computer, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
receiving verification information feedback sent by the target computer, wherein the verification information feedback carries the verification information;
fusing the verification information to the temporary file to generate a key file;
and sending the key file to the target computer, so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.
In this embodiment, the functions of the processor 501 correspond to the steps executed by the target mobile phone in the embodiments shown in fig. 1 to fig. 2, and are not described herein again.
Referring to fig. 6, another embodiment of the target computer in the embodiment of the present application includes:
a processor 601, a memory 602, an input-output unit 603, and a bus 604;
the processor 601 is connected with the memory 602, the input/output unit 603 and the bus 604;
the processor 601 specifically performs the following operations:
receiving a verification information request sent by a target mobile phone, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
sending verification information feedback to the target mobile phone, wherein the verification information feedback carries the verification information;
receiving a key file sent by the target mobile phone, wherein the key file carries the verification information and an unlocking password of the target mobile phone;
judging whether the computer name, the MAC address and the hardware model of the computer are matched with the verification information;
and if so, extracting the unlocking password of the target mobile phone from the key file.
In this embodiment, the functions of the processor 601 correspond to the steps executed by the target computer in the embodiments shown in fig. 1 to fig. 2, and are not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like.

Claims (10)

1. A method for unlocking a mobile phone is characterized by comprising the following steps:
generating a temporary file by a target mobile phone, wherein the temporary file carries an unlocking password of the target mobile phone;
the target mobile phone receives a key backup instruction, wherein the key backup instruction is used for instructing the target mobile phone to backup the unlocking password to a target computer;
the target mobile phone sends a verification information request to the target computer, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
the target mobile phone receives verification information feedback sent by the target computer, wherein the verification information feedback carries the verification information;
the target mobile phone fuses the verification information to the temporary file to generate a key file;
and the target mobile phone sends the key file to the target computer, so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.
2. The method of claim 1, wherein after the target handset sends the key file to the target computer, the method further comprises:
the target mobile phone receives an unlocking request sent by the target computer, wherein the unlocking request carries the unlocking password;
the target mobile phone judges whether the unlocking password is matched with the unlocking password of the target mobile phone;
and if so, unlocking the target mobile phone.
3. The method according to any of claims 1 and 2, wherein after the target handset fuses the authentication information to the temporary file, generating a key file, and before the target handset sends the key file to the target computer, the method further comprises:
and the target mobile phone sends a key file storage notice to the target computer, wherein the key file storage notice is used for indicating that the target mobile phone is to send the key file to the target computer.
4. A method for unlocking a mobile phone is characterized by comprising the following steps:
a target computer receives a verification information request sent by a target mobile phone, wherein the verification information request is used for requesting the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information comprises a computer name, an MAC address and a hardware model of the target computer;
the target computer sends verification information feedback to the target mobile phone, wherein the verification information feedback carries the verification information;
the target computer receives a key file sent by the target mobile phone, wherein the key file carries the verification information and an unlocking password of the target mobile phone;
the target computer judges whether the own computer name, MAC address and hardware model are matched with the verification information;
and if so, the target computer extracts the unlocking password of the target mobile phone from the key file.
5. The method of claim 4, wherein after the target computer receives the key file sent by the target handset, the method further comprises:
and the target computer sends an unlocking request to the target mobile phone, wherein the unlocking request carries the unlocking password.
6. The method of any of claims 4 and 4, wherein after the target computer sends the authentication information feedback to the target handset, before the target computer receives the key file sent by the target handset, the method further comprises:
and the target computer receives a key file storage notice sent by the target mobile phone, wherein the key file storage notice is used for indicating that the target mobile phone is to send the key file to the target computer.
7. A target handset, comprising:
the first generating unit is used for generating a temporary file, and the temporary file carries an unlocking password of the target mobile phone;
the first receiving unit is used for receiving a key backup instruction, and the key backup instruction is used for commanding the target mobile phone to backup the unlocking password to a target computer;
a first sending unit, configured to send a verification information request to the target computer, where the verification information request is used to request the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information includes a computer name, an MAC address, and a hardware model of the target computer;
a second receiving unit, configured to receive verification information feedback sent by the target computer, where the verification information feedback carries the verification information;
the second generation unit is used for fusing the verification information to the temporary file to generate a key file;
and the second sending unit is used for sending the key file to the target computer so that the target computer can unlock the target mobile phone according to the unlocking password in the key file.
8. The target handset of claim 7, wherein the target handset further comprises:
a third receiving unit, configured to receive an unlocking request sent by the target computer, where the unlocking request carries the unlocking password;
the first judgment unit is used for judging whether the unlocking password is matched with the unlocking password of the first judgment unit;
and the unlocking unit is used for unlocking the target mobile phone when the judging unit determines that the unlocking password is matched with the unlocking password of the target mobile phone.
9. The target handset of any one of claims 7 and 8, further comprising:
a third sending unit, configured to send a key file saving notification to the target computer, where the key file saving notification is used to indicate that the target mobile phone is to send the key file to the target computer.
10. A target computer, comprising:
a fourth receiving unit, configured to receive a verification information request sent by a target mobile phone, where the verification information request is used to request the target computer to feed back verification information of the target computer to the target mobile phone, and the verification information includes a computer name, an MAC address, and a hardware model of the target computer;
a fourth sending unit, configured to send verification information feedback to the target mobile phone, where the verification information feedback carries the verification information;
a fifth receiving unit, configured to receive a key file sent by the target mobile phone, where the key file carries the verification information and an unlocking password of the target mobile phone;
a second judging unit, configured to judge whether the computer name, the MAC address, and the hardware model of the target computer match the verification information;
and the extracting unit is used for extracting the unlocking password of the target mobile phone from the key file when the second judging unit determines that the computer name, the MAC address and the hardware model of the target computer are matched with the verification information.
CN202011045768.2A 2020-09-28 2020-09-28 Method for unlocking mobile phone, mobile phone and computer Withdrawn CN112422744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011045768.2A CN112422744A (en) 2020-09-28 2020-09-28 Method for unlocking mobile phone, mobile phone and computer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011045768.2A CN112422744A (en) 2020-09-28 2020-09-28 Method for unlocking mobile phone, mobile phone and computer

Publications (1)

Publication Number Publication Date
CN112422744A true CN112422744A (en) 2021-02-26

Family

ID=74854253

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011045768.2A Withdrawn CN112422744A (en) 2020-09-28 2020-09-28 Method for unlocking mobile phone, mobile phone and computer

Country Status (1)

Country Link
CN (1) CN112422744A (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN103034417A (en) * 2012-12-28 2013-04-10 希姆通信息技术(上海)有限公司 Unlocking method for touch screen and terminal equipment
CN103366110A (en) * 2012-04-02 2013-10-23 鸿富锦精密工业(深圳)有限公司 System for encrypting and decrypting electronic device through external device, electronic device and external device
CN105224848A (en) * 2015-10-15 2016-01-06 京东方科技集团股份有限公司 A kind of equipment authentication method, Apparatus and system
CN105812140A (en) * 2014-12-31 2016-07-27 上海庆科信息技术有限公司 Authorization access method
CN105844125A (en) * 2015-07-08 2016-08-10 广东维沃软件技术有限公司 Method and device for terminal unlocking
CN106548060A (en) * 2016-10-18 2017-03-29 珠海市魅族科技有限公司 Electronic equipment unlocking method and device
CN107169326A (en) * 2017-05-19 2017-09-15 维沃移动通信有限公司 A kind of unlocking screen method and mobile terminal
CN108200081A (en) * 2018-01-24 2018-06-22 深圳市硅传科技有限公司 Smart machine networking method and smart machine system
CN108829539A (en) * 2018-06-08 2018-11-16 中国联合网络通信集团有限公司 Data backup, data reconstruction method and equipment
US20200036826A1 (en) * 2018-04-28 2020-01-30 Minsheng Wang Mobile terminal unlock method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN103366110A (en) * 2012-04-02 2013-10-23 鸿富锦精密工业(深圳)有限公司 System for encrypting and decrypting electronic device through external device, electronic device and external device
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN103034417A (en) * 2012-12-28 2013-04-10 希姆通信息技术(上海)有限公司 Unlocking method for touch screen and terminal equipment
CN105812140A (en) * 2014-12-31 2016-07-27 上海庆科信息技术有限公司 Authorization access method
CN105844125A (en) * 2015-07-08 2016-08-10 广东维沃软件技术有限公司 Method and device for terminal unlocking
CN105224848A (en) * 2015-10-15 2016-01-06 京东方科技集团股份有限公司 A kind of equipment authentication method, Apparatus and system
CN106548060A (en) * 2016-10-18 2017-03-29 珠海市魅族科技有限公司 Electronic equipment unlocking method and device
CN107169326A (en) * 2017-05-19 2017-09-15 维沃移动通信有限公司 A kind of unlocking screen method and mobile terminal
CN108200081A (en) * 2018-01-24 2018-06-22 深圳市硅传科技有限公司 Smart machine networking method and smart machine system
US20200036826A1 (en) * 2018-04-28 2020-01-30 Minsheng Wang Mobile terminal unlock method
CN108829539A (en) * 2018-06-08 2018-11-16 中国联合网络通信集团有限公司 Data backup, data reconstruction method and equipment

Similar Documents

Publication Publication Date Title
CN106488394A (en) A kind of method and device of equipment connection
US20180270050A1 (en) Communication apparatus, communication system, and communication control method
CN105809007A (en) Privacy protection method and device
CN106656985B (en) Backup account login method, device and system
CN103942121A (en) Data recovery system and mobile terminal
US8468596B2 (en) Work support apparatus for information processing device
CN111399993A (en) Cross-chain implementation method, device, equipment and medium for associated transaction request
CN105592459A (en) Security authentication device based on wireless communication
CN102411692B (en) Method, system and equipment for running terminal
CN100592317C (en) Peripheral apparatus and method for verifying authority thereof
CN112422744A (en) Method for unlocking mobile phone, mobile phone and computer
CN201489538U (en) Terminal safety and security equipment
CN106487884A (en) Data transmission method and client
CN105099773A (en) Method for achieving Web network management system of access controller and Web network management system
CN115129518A (en) Backup and recovery method, device, equipment and medium for TEE (trusted execution environment) stored data
CN112367339B (en) System security login management method and device
CN106327187B (en) Information processing method and device
CN110636493B (en) Information backup method, device and equipment of virtual SIM card and storage medium
CN110443325B (en) Graphic code generation method, graphic code processing method, device and storage medium
CN112560116A (en) Function control method, device and storage medium
CN115102771B (en) Data processing method, terminal device, system, device and storage medium
CN103457730B (en) Safety information interaction device and method and for the mutual IC-card of safety information
CN113541971B (en) Data hosting method, device and equipment based on key replacement and heartbeat check
CN110287265B (en) Login request processing method and device, server and readable storage medium
CN111242770B (en) Risk equipment identification method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210226

WW01 Invention patent application withdrawn after publication