CN112818304A - Unlocking method and device - Google Patents

Unlocking method and device Download PDF

Info

Publication number
CN112818304A
CN112818304A CN201911122070.3A CN201911122070A CN112818304A CN 112818304 A CN112818304 A CN 112818304A CN 201911122070 A CN201911122070 A CN 201911122070A CN 112818304 A CN112818304 A CN 112818304A
Authority
CN
China
Prior art keywords
unlocking
result
user
unit
successful
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911122070.3A
Other languages
Chinese (zh)
Inventor
蒙秀冠
李立旺
邝运彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebi Tianhai Electronic Information System Co Ltd
Original Assignee
Hebi Tianhai Electronic Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebi Tianhai Electronic Information System Co Ltd filed Critical Hebi Tianhai Electronic Information System Co Ltd
Priority to CN201911122070.3A priority Critical patent/CN112818304A/en
Publication of CN112818304A publication Critical patent/CN112818304A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • G06F9/4403Processor initialisation

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides an unlocking method and a device, wherein in the process of running a kernel bootstrap program, equipment hardware related to unlocking operation is initialized, the unlocking operation is executed based on the initialized equipment hardware, an unlocking result is obtained, the kernel bootstrap program can be continuously run and an operating system can be started only when the unlocking result shows that the unlocking is successful, namely, normal starting is carried out, otherwise, the starting cannot be carried out. Because the startup unlocking operation is completed in the kernel boot stage, and the operating system of the electronic equipment is not started to operate in the kernel boot stage, the condition that an illegal user acquires the root authority is avoided, and the safety of the electronic equipment is improved.

Description

Unlocking method and device
Technical Field
The invention belongs to the technical field of electronic equipment, and particularly relates to an unlocking method and device.
Background
Important information is stored in the electronic equipment and is leaked once being lost. In order to improve the safety of the electronic equipment, the unlocking operation is executed before starting up, and the electronic equipment can be normally started up only after the unlocking is successful; otherwise, the electronic device cannot be normally started, and the important information in the electronic device cannot be acquired.
In the method for starting and unlocking in the prior art, the electronic equipment needs to operate a starting interface after being started to execute the starting and unlocking operation. In this case, the operating system of the electronic device is already in a startup running state, so that many functions of the electronic device can be used, and thus, an illegal user can easily acquire root authority, control the electronic device to skip unlocking operation, or acquire important information in the electronic device. The starting-up unlocking method provided by the prior art is low in security.
Disclosure of Invention
In view of the above, the present invention provides an unlocking method and an unlocking device, which are used to solve the problem of low security of the startup unlocking method in the prior art.
The technical scheme is as follows:
the invention provides an unlocking method, which comprises the following steps:
the method comprises the steps that after the electronic equipment is started and powered on, a kernel bootstrap program is operated;
initializing equipment hardware related to unlocking operation in the running of a kernel bootstrap program;
executing unlocking operation based on the initialized equipment hardware to obtain an unlocking result;
judging whether the unlocking result is successful or not;
and if the unlocking result is judged to be successful, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
Preferably, the unlocking operation includes password unlocking, and initializing device hardware related to the unlocking operation includes:
initializing an input unit and a display unit;
displaying a password input interface through the display unit;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
receiving a touch operation of a user on the input unit;
determining password information input by a user based on an input operation;
judging whether the password information input by the user is the same as the unlocking password or not to obtain an unlocking result;
and if the password information input by the user is the same as the unlocking password, the unlocking result is successful.
Preferably, after receiving an input operation of a user on the input unit, the method further includes:
judging whether input operation of a preset number of times performed on an input unit by a user is received within a preset time;
and if the preset times of input operation executed on the input unit by the user is not received within the preset time, shutting down the computer.
Preferably, the unlocking operation includes a secret card and a secret bar unlocking, and the initializing device hardware related to the unlocking operation includes:
initializing a communication unit and a secret card, and supplying power to a secret stick;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
acquiring a data interaction result between the cipher rod and the cipher card through the communication unit;
judging whether the data interaction result is successful interaction or not to obtain an unlocking result;
and if the data interaction result is judged to be successful interaction, the unlocking result is successful unlocking.
Preferably, the unlocking operation includes fingerprint unlocking, and the initializing device hardware related to the unlocking operation includes:
initializing a fingerprint sensor;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
collecting fingerprint information of a user by using a fingerprint sensor;
judging whether the fingerprint information of the user is the same as the unlocking fingerprint information or not to obtain an unlocking result;
and if the fingerprint information of the user is the same as the unlocking fingerprint information, the unlocking result is successful.
Preferably, the unlocking operation includes face unlocking, and initializing device hardware related to the unlocking operation includes:
initializing a camera unit;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
collecting face information of a user by using a camera unit;
judging whether the face information of the user is the same as the unlocking face information or not to obtain an unlocking result;
and if the face information of the user is judged to be the same as the unlocking face information, the unlocking result is successful.
The invention also provides an unlocking device, comprising:
the running unit is used for running the kernel bootstrap program after the electronic equipment is powered on;
the device comprises an initialization unit, a processing unit and a processing unit, wherein the initialization unit is used for initializing device hardware related to unlocking operation in the running of a kernel bootstrap program;
the unlocking unit is used for executing unlocking operation based on the initialized equipment hardware to obtain an unlocking result;
the judging unit is used for judging whether the unlocking result is successful or not; and if the unlocking result is judged to be successful, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
Preferably, the unlocking operation includes password unlocking, and the initialization unit specifically includes:
initializing an input unit and a display unit; displaying a password input interface through the display unit;
the unlocking unit specifically includes:
receiving a touch operation of a user on the input unit; determining password information input by a user based on an input operation; judging whether the password information input by the user is the same as the unlocking password or not to obtain an unlocking result; and if the password information input by the user is the same as the unlocking password, the unlocking result is successful.
Preferably, the unlocking operation includes a secret card and a secret bar unlocking, and the initialization unit specifically includes:
initializing a communication unit and a secret card, and supplying power to a secret stick;
the unlocking unit specifically includes:
acquiring a data interaction result between the cipher rod and the cipher card through the communication unit; judging whether the data interaction result is successful interaction or not to obtain an unlocking result; and if the data interaction result is judged to be successful interaction, the unlocking result is successful unlocking.
Preferably, the unlocking operation includes fingerprint unlocking, and the initialization unit specifically includes:
initializing a fingerprint sensor;
the unlocking unit specifically includes:
collecting fingerprint information of a user by using a fingerprint sensor; judging whether the fingerprint information of the user is the same as the unlocking fingerprint information or not to obtain an unlocking result; and if the fingerprint information of the user is the same as the unlocking fingerprint information, the unlocking result is successful.
Preferably, the unlocking operation includes face unlocking, and the initialization unit specifically includes:
initializing a camera unit;
the unlocking unit specifically includes:
collecting face information of a user by using a camera unit; judging whether the face information of the user is the same as the unlocking face information or not to obtain an unlocking result; and if the face information of the user is judged to be the same as the unlocking face information, the unlocking result is successful.
Compared with the prior art, the technical scheme provided by the application has the following advantages:
according to the technical scheme, in the process of running the kernel bootstrap program, the device hardware related to the unlocking operation is initialized, the unlocking operation is executed based on the initialized device hardware, the unlocking result is obtained, the kernel bootstrap program can be continuously run and the operating system can be started only when the unlocking result shows that the unlocking is successful, namely, the normal starting is performed, otherwise, the starting cannot be performed. Because the startup unlocking operation is completed in the kernel boot stage, and the operating system of the electronic equipment is not started to operate in the kernel boot stage, the condition that an illegal user acquires the root authority is avoided, and the startup unlocking safety of the electronic equipment is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a method of unlocking in accordance with the present disclosure;
FIG. 2 is a flow chart of a password-unlocked unlocking method disclosed in the present invention;
FIG. 3 is a schematic diagram of a password entry interface disclosed herein;
FIG. 4 is a flow chart of a disclosed unlocking method for the secure card and the secure wand unlocking;
FIG. 5 is a flowchart of a fingerprint unlock unlocking method disclosed in the present invention;
FIG. 6 is a flowchart of an unlocking method for unlocking a human face according to the present invention;
fig. 7 is a schematic structural diagram of an unlocking device disclosed by the invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
An unlocking method provided in an embodiment of the present application is applied to an electronic device, and specifically, as shown in fig. 1, the unlocking method provided in the embodiment of the present application may include:
and S101, running a kernel bootstrap program after starting up and powering on.
The electronic equipment enters a kernel booting stage after being started and powered on, and a kernel boot program is operated in the kernel booting stage. The kernel bootstrap program refers to a program for booting and loading the kernel, such as uboot and lk. The Uboot is called a universalboot loader, and supports the boot loading of the kernels of embedded operating systems such as Linux and android. lk is called Little Kernel entirely and supports the boot loading of the Kernel of the android system.
The existing kernel bootstrap program does not include a starting-up unlocking program, the existing kernel bootstrap program is improved in the embodiment, and the starting-up unlocking program is added into the kernel bootstrap program, so that in the process of running the kernel bootstrap program in the kernel boot stage, the starting-up unlocking operation can be realized by running the starting-up unlocking program.
And S102, initializing equipment hardware related to unlocking operation in the running of the kernel bootstrap program.
The method comprises the steps of realizing starting unlocking operation based on equipment hardware on the electronic equipment, wherein different unlocking modes are different corresponding to the equipment hardware needing to be used.
For example, if the unlocking operation is password unlocking, a touch unit and a display unit are needed, a password input interface is displayed through the display unit, and a password is input on the password input interface through the touch unit to unlock the password;
the unlocking operation is unlocking of the secret card and the secret bar, a communication unit, the secret card and the secret bar are needed to be used, data interaction is carried out between the secret card and the secret bar, an interaction result of the data interaction between the secret card and the secret bar is obtained through the communication unit, and unlocking is achieved according to the interaction result;
if the unlocking operation is fingerprint unlocking, a fingerprint sensor is needed, and the fingerprint of the user is identified through the fingerprint sensor so as to realize unlocking according to the fingerprint;
the unlocking operation is face unlocking, a camera unit is needed, and the face is collected through the camera unit to unlock.
In the kernel boot stage, each device hardware of the electronic device is not initialized yet and cannot work normally, and in order to realize the startup unlocking operation in the kernel boot stage, the device hardware which needs to be utilized in the startup unlocking process needs to be initialized first, so that the device hardware can work normally.
And S103, executing an unlocking operation based on the initialized equipment hardware to obtain an unlocking result.
The device hardware can normally work after the initialization is finished, and different unlocking operations are executed by using different device hardware to obtain an unlocking result.
S104, judging whether the unlocking result is successful or not;
if the unlocking result is judged to be successful, executing the step S105;
if the unlocking result is judged to be unlocking failure, the electronic equipment is shut down or dormant, and the electronic equipment cannot be normally started, so that the problem of important information leakage caused by acquiring the important information from the electronic equipment is avoided, and the safety of the electronic equipment is improved.
And S105, continuing to run the kernel bootstrap program and starting the operating system.
And after the unlocking operation is completed and the unlocking is determined to be successful in the kernel boot stage, continuing to run the kernel boot program and starting the operating system so as to normally start the computer.
Through the technical scheme, in the process of running the kernel bootstrap program, the device hardware related to the unlocking operation is initialized, the unlocking operation is executed based on the initialized device hardware, the unlocking result is obtained, the kernel bootstrap program can be continuously run and the operating system can be started only when the unlocking result shows that the unlocking is successful, namely, the normal startup is carried out, otherwise, the startup cannot be carried out. Because the startup unlocking operation is completed in the kernel boot stage, and the operating system of the electronic equipment is not started to operate in the kernel boot stage, the condition that an illegal user acquires the root authority is avoided, and the startup unlocking safety of the electronic equipment is improved.
The unlocking method provided by the embodiment is described in the application scenario of password unlocking by using an unlocking operation, and as shown in fig. 2, the method includes the following steps:
s201, running a kernel bootstrap program after the electronic equipment is powered on.
The implementation manner of step S201 in this embodiment is similar to that of step S101 in the previous embodiment, and is not described here again.
S202, initializing an input unit and a display unit during the running of the kernel bootstrap program.
The password unlocking mode is that the received password input by the user on the password input interface is compared with a preset unlocking password, if the received password input by the user is the same as the unlocking password, the unlocking is successful, and if not, the unlocking is failed.
And initializing a display unit such as a liquid crystal display screen in the kernel boot stage for displaying a password input interface. The password input interface at least comprises a password input box, and the password input box is used for presenting a password input by a user.
The kernel boot phase also initializes the input unit for receiving user input. The input unit comprises a touch screen, a physical key, a keyboard and the like, and different electronic devices have different input units, so that the initialized input units are different for different electronic devices.
For example, an electronic device with a touch function initializes a liquid crystal display and a touch panel in a kernel boot phase. In addition to the password input frame and the virtual keys, the virtual keys may be numeric keys or character keys, for example, the virtual keys are presented by an input keyboard of an input method, and a user may switch the virtual keys according to actual needs. And the user directly touches the virtual key to realize the input of the unlocking password. As shown in fig. 3, a schematic view of a password input interface displayed on a liquid crystal display of the electronic device with a touch function in this embodiment is shown, where the password input interface includes a password input box, virtual number keys, and prompt information.
For another example, the electronic device without a touch function initializes the liquid crystal display and the physical key or the keyboard and other input units at the kernel boot stage, and only the password input box can be displayed in the liquid crystal display, so that the user can input the unlocking password through the physical key or the keyboard.
And S203, displaying a password input interface through the display unit.
In different types of electronic equipment, password input interfaces displayed by the display unit are different. The password input interface displayed by the electronic equipment with the touch function comprises a password input frame and virtual keys, and the password input interface displayed by the electronic equipment without the touch function only comprises the password input frame.
And S204, receiving the input operation of the user on the input unit.
If the input unit is a touch screen, the received input operation is touch operation; the input unit is an entity key or a keyboard, and the received input operation is a pressing operation of the entity key.
And S205, determining password information input by the user based on the input operation.
And if the input operation is a touch operation, respectively acquiring touch position information of each touch operation, and determining password information input by a user based on the touch position information.
The virtual keys corresponding to different touch positions are different, and the corresponding virtual keys can be determined according to the touch positions, so that the password input by the user can be determined.
It should be noted that the correspondence between the touch position and the virtual key may be fixed, that is, the position of the virtual key included in each password input interface is fixed.
After touch operations of a user are received, touch position information of each touch operation is obtained, virtual keys corresponding to each touch operation are determined according to the corresponding relation between the fixed touch positions and the virtual keys, and therefore passwords input by the user are determined.
The corresponding relationship between the touch position and the virtual key can also be changed, and the position of the virtual key included on the password input interface is changed each time. After touch operations of a user are received, touch position information of each touch operation is obtained, virtual keys corresponding to each touch operation are determined according to the corresponding relation between the current touch position and the virtual keys, and therefore the password input by the user is determined.
If the input operation is the pressing operation of the entity keys, key information of each pressed entity key is respectively obtained, and the key information is password information input by a user.
S206, judging whether the password information input by the user is the same as the unlocking password or not to obtain an unlocking result; if the password information input by the user is judged to be the same as the unlocking password, the unlocking result is successful; and if the password information input by the user is different from the unlocking password, the unlocking result is unlocking failure.
The unlocking password is a character string arranged according to a specific sequence, wherein the character string comprises numbers, letters, symbols and the like. And after the password information input by the user is determined, sequentially comparing whether each element in the character string is respectively the same as the element at the current position in the unlocking password. And if the password input by the user is the same as the unlocking password, determining that the unlocking is successful, otherwise, failing to unlock.
S207, judging whether the unlocking result is successful;
if the unlocking result is judged to be successful, executing step S208;
if the unlocking result is judged to be unlocking failure, the electronic equipment is shut down or dormant, and the electronic equipment cannot be normally started, so that the problem of important information leakage caused by acquiring the important information from the electronic equipment is avoided, and the safety of the electronic equipment is improved.
And S208, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
In other embodiments, after receiving an input operation of the user at the input unit, the method may further include:
judging whether input operation of a user for executing preset times on the input unit is received within preset time; the preset number of times may be the same as the total number of elements constituting the character string of the unlock password, or may be set in consideration of the number of times that the user can complete the input operation within a certain time.
If the unlock code is "8457", the predetermined time is set to 2 minutes and the preset number of times is 4. The setting mode can save the subsequent judging steps for judging the password input by the user and the unlocking password, and if the number of times of receiving the input operation of the user in 2 minutes is not equal to 4, the password input by the user is determined to be different from the unlocking password, so that the unlocking failure can be directly determined.
And only if the number of times of receiving the input operation of the user is equal to 2 within the confirmed 2 minutes, determining the password information input by the user according to the input operation, and judging whether the password information input by the user is the same as the preset unlocking password or not. If the password information input by the user is judged to be the same as the preset unlocking password, the kernel bootstrap program is continuously run and the operating system of the electronic equipment is started to realize normal startup by executing the step S208. And if the password information input by the user is different from the preset unlocking password, adding 1 to the error number of the input password, if the error number of the input password after adding 1 does not exceed the error threshold (for example, 5), returning to the step S204 and the subsequent steps, and if the error number of the input password after adding 1 exceeds the error threshold, shutting down the computer.
For example, the unlock password is "8457", and the preset time is 10 seconds and the preset number is 3, considering that the number of touch operations or physical key pressing operations that the user can complete within 10 seconds is generally 3. Considering that if the user is not the user of the electronic device but other users want to use the electronic device, there is a means for cracking the password when inputting the password, which inevitably results in that the input operation is not executed smoothly, so that the time for completing the input operation is long.
The unlocking method provided by the embodiment is described in the application scene of unlocking the secret card and the secret bar, and as shown in fig. 4, the unlocking method comprises the following steps:
s401, the electronic equipment runs a kernel bootstrap program after being powered on.
The implementation manner of step S401 in this embodiment is similar to the implementation manner of step S101 in the previous embodiment, and is not described here again.
S402, initializing the communication unit and the secret card and supplying power to the secret stick during the running of the kernel bootstrap program.
The method for unlocking the secret card and the secret bar comprises the steps of inserting the secret card into a card slot of the electronic equipment, inserting the secret bar into an external interface (such as a USB interface) of the electronic equipment, sending a card detection instruction, supplying power to the secret bar inserted into the USB interface by switching a USB pin, enabling the secret bar to work, controlling the secret bar to write authorization data into the secret card and controlling the secret card to write back data to the secret bar after the secret bar and the secret card are successfully shaken hands through a communication unit, finally determining whether the secret card and the secret bar are successfully interacted through the communication unit, determining that self-detection is successful, namely unlocking is successful if the secret card and the secret bar are successfully interacted, and otherwise, failing to unlock.
And initializing a communication unit in the kernel boot stage for realizing data interaction between the cipher bar and the cipher card through the communication unit.
And initializing the secret card and supplying power to the secret stick in the kernel boot stage to ensure that the secret card and the secret stick can work normally.
When the secret card and the secret stick work normally, data interaction is achieved between the secret stick and the secret card through the communication unit, specifically, the secret stick writes authorization data into the secret card, and then the secret card writes back the data to the secret stick.
And S403, acquiring a data interaction result between the cipher rod and the cipher card through the communication unit.
Initializing the communication unit and the secret card, and sending a query instruction to the communication unit through an application program processor (AP) at a certain interval after supplying power to the secret stick so as to query a data interaction result between the secret stick and the secret card. The polling command is typically sent to the communications unit by the Application Processor (AP) after a set interval of 11 seconds.
Optionally, in this embodiment, the communication unit is a satellite module.
S404, judging whether the data interaction result is successful interaction;
if the data interaction result is judged to be successful interaction, the unlocking result is successful unlocking;
and if the data interaction result is judged to be interaction failure, the unlocking result is unlocking failure.
S405, judging whether the unlocking result is successful;
if the unlocking result is judged to be successful, executing step S406;
and if the unlocking result is judged to be unlocking failure, controlling to close the power supply to the secret bar, and controlling the indicator light to flash for 2 seconds and then turning off or sleeping. The electronic equipment can not be normally started, the problem of important information leakage caused by the fact that important information is acquired from the electronic equipment is avoided, and the safety of the electronic equipment is improved.
S406, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
And controlling to close the power supply to the secret bar, continuously running the kernel bootstrap program and starting the operating system of the electronic equipment so as to normally start the electronic equipment.
The unlocking method provided by the embodiment is described in the application scenario of taking the unlocking operation as the fingerprint unlocking, and as shown in fig. 5, the method includes the following steps:
s501, running a kernel bootstrap program after the electronic equipment is powered on.
The implementation manner of step S501 in this embodiment is similar to the implementation manner of step S101 in the previous embodiment, and is not described here again.
And S502, initializing a fingerprint sensor during the running of the kernel bootstrap program.
The fingerprint unlocking mode is to compare the collected user fingerprint information with a preset unlocking fingerprint, if the collected user fingerprint information is the same as the preset unlocking fingerprint, the unlocking is successful, otherwise, the unlocking is failed.
And initializing the fingerprint sensor in a kernel boot stage to acquire user fingerprint information by using the fingerprint sensor.
Because the fingerprint sensor is in continuous operating condition when gathering user's fingerprint information to can in time gather user's fingerprint information when the user contacts fingerprint collection area, consequently lead to electronic equipment's consumption height. To this end, adopt to set up proximity sensor in electronic equipment, like capacitive sensor to whether utilize capacitive sensor to detect the fingerprint collection area that user's finger is close electronic equipment, just trigger fingerprint sensor collection user's fingerprint information when capacitive sensor detects that user's finger is close electronic equipment's fingerprint collection area.
Optionally, when a proximity sensor is disposed in the electronic device, the capacitive sensor is further initialized in the kernel booting stage, and is used for triggering the fingerprint sensor to acquire user fingerprint information.
S503, collecting the fingerprint information of the user by using the fingerprint sensor.
S504, judging whether the fingerprint information of the user is the same as the unlocking fingerprint information or not to obtain an unlocking result;
if the fingerprint information of the user is judged to be the same as the unlocking fingerprint information, the unlocking result is successful; and if the fingerprint information of the user is different from the unlocking fingerprint information, the unlocking result is unlocking failure.
S505, judging whether the unlocking result is successful;
if the unlocking result is judged to be successful, executing step S506;
if the unlocking result is judged to be unlocking failure, the electronic equipment is shut down or dormant, and the electronic equipment cannot be normally started, so that the problem of important information leakage caused by acquiring the important information from the electronic equipment is avoided, and the safety of the electronic equipment is improved.
S506, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
The following describes the unlocking method provided in this embodiment in an application scenario in which the unlocking operation is human face unlocking, and as shown in fig. 6, the method includes the following steps:
s601, running a kernel bootstrap program after the electronic equipment is powered on.
The implementation manner of step S601 in this embodiment is similar to the implementation manner of step S101 in the previous embodiment, and is not described here again.
And S602, initializing the camera unit during the running of the kernel bootstrap program.
The face unlocking mode is to compare the collected user face information with a preset unlocking face, if the collected user face information is the same as the preset unlocking face, the unlocking is successful, otherwise, the unlocking is failed.
And initializing the camera unit in a kernel boot stage so as to acquire the face information of the user by using the camera unit.
Optionally, the image pickup unit in this embodiment is a camera.
And S603, acquiring the face information of the user by using the camera unit.
And when the human face exists in the shooting range, triggering the shooting unit to collect the human face information.
S604, judging whether the face information of the user is the same as the unlocking face information or not to obtain an unlocking result;
if the face information of the user is judged to be the same as the unlocking face information, the unlocking result is successful; and if the face information of the user is different from the unlocking face information, the unlocking result is unlocking failure.
S605, judging whether the unlocking result is successful;
if the unlocking result is judged to be successful, executing the step S606;
if the unlocking result is judged to be unlocking failure, the electronic equipment is shut down or dormant, and the electronic equipment cannot be normally started, so that the problem of important information leakage caused by acquiring the important information from the electronic equipment is avoided, and the safety of the electronic equipment is improved.
And S606, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
Corresponding to the unlocking method disclosed in the foregoing embodiment, the present embodiment further provides an unlocking device, which may be integrated in an electronic device, as shown in fig. 7, and the unlocking device includes:
an operation unit 701, an initialization unit 702, an unlocking unit 703 and a judgment unit 704;
the running unit 701 is configured to run a kernel boot program after the electronic device is powered on;
an initialization unit 702, configured to initialize device hardware related to an unlocking operation during running of a kernel boot program;
an unlocking unit 703, configured to execute an unlocking operation based on the initialized device hardware, so as to obtain an unlocking result;
a judging unit 704, configured to judge whether an unlocking result is successful; and if the unlocking result is judged to be successful, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
If the unlocking operation is password unlocking, the initialization unit 702 specifically includes:
initializing an input unit and a display unit; displaying a password input interface through the display unit;
the unlocking unit 703 specifically includes:
receiving a touch operation of a user on the input unit; determining password information input by a user based on an input operation; judging whether the password information input by the user is the same as the unlocking password or not to obtain an unlocking result; and if the password information input by the user is the same as the unlocking password, the unlocking result is successful.
If the unlocking operation is the secret card and secret stick unlocking, the initialization unit 702 specifically includes:
initializing a communication unit and a secret card, and supplying power to a secret stick;
the unlocking unit 703 specifically includes:
acquiring a data interaction result between the cipher rod and the cipher card through the communication unit; judging whether the data interaction result is successful interaction or not to obtain an unlocking result; and if the data interaction result is judged to be successful interaction, the unlocking result is successful unlocking.
If the unlocking operation is fingerprint unlocking, the initialization unit 702 specifically includes:
initializing a fingerprint sensor;
the unlocking unit 703 specifically includes:
collecting fingerprint information of a user by using a fingerprint sensor; judging whether the fingerprint information of the user is the same as the unlocking fingerprint information or not to obtain an unlocking result; and if the fingerprint information of the user is the same as the unlocking fingerprint information, the unlocking result is successful.
If the unlocking operation is face unlocking, the initialization unit 702 specifically includes:
initializing a camera unit;
the unlocking unit 703 specifically includes:
collecting face information of a user by using a camera unit; judging whether the face information of the user is the same as the unlocking face information or not to obtain an unlocking result; and if the face information of the user is judged to be the same as the unlocking face information, the unlocking result is successful.
Through the technical scheme, in the process of running the kernel bootstrap program, the device hardware related to the unlocking operation is initialized, the unlocking operation is executed based on the initialized device hardware, the unlocking result is obtained, the kernel bootstrap program can be continuously run and the operating system can be started only when the unlocking result shows that the unlocking is successful, namely, the normal startup is carried out, otherwise, the startup cannot be carried out. Because the startup unlocking operation is completed in the kernel boot stage, and the operating system of the electronic equipment is not started to operate in the kernel boot stage, the condition that an illegal user acquires the root authority is avoided, and the startup unlocking safety of the electronic equipment is improved.
While, for purposes of simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present invention is not limited by the illustrated ordering of acts, as some steps may occur in other orders or concurrently with other steps in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
It should be noted that, in the present specification, the embodiments are all described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. For the device-like embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (10)

1. An unlocking method, comprising:
the method comprises the steps that after the electronic equipment is started and powered on, a kernel bootstrap program is operated;
initializing equipment hardware related to unlocking operation in the running of a kernel bootstrap program;
executing unlocking operation based on the initialized equipment hardware to obtain an unlocking result;
judging whether the unlocking result is successful or not;
and if the unlocking result is judged to be successful, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
2. The unlocking method of claim 1, wherein the unlocking operation comprises password unlocking, and wherein initializing device hardware associated with the unlocking operation comprises:
initializing an input unit and a display unit;
displaying a password input interface through the display unit;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
receiving a touch operation of a user on the input unit;
determining password information input by a user based on an input operation;
judging whether the password information input by the user is the same as the unlocking password or not to obtain an unlocking result;
and if the password information input by the user is the same as the unlocking password, the unlocking result is successful.
3. The unlocking method according to claim 1, wherein the unlocking operation comprises a cryptocard and cryptobar unlocking, and the initializing device hardware related to the unlocking operation comprises:
initializing a communication unit and a secret card, and supplying power to a secret stick;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
acquiring a data interaction result between the cipher rod and the cipher card through the communication unit;
judging whether the data interaction result is successful interaction or not to obtain an unlocking result;
and if the data interaction result is judged to be successful interaction, the unlocking result is successful unlocking.
4. The unlocking method according to claim 1, wherein the unlocking operation comprises fingerprint unlocking, and the initializing device hardware related to the unlocking operation comprises:
initializing a fingerprint sensor;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
collecting fingerprint information of a user by using a fingerprint sensor;
judging whether the fingerprint information of the user is the same as the unlocking fingerprint information or not to obtain an unlocking result;
and if the fingerprint information of the user is the same as the unlocking fingerprint information, the unlocking result is successful.
5. The unlocking method according to claim 1, wherein the unlocking operation comprises face unlocking, and the initializing device hardware related to the unlocking operation comprises:
initializing a camera unit;
wherein, the executing the unlocking operation based on the initialized device hardware and obtaining the unlocking result comprises:
collecting face information of a user by using a camera unit;
judging whether the face information of the user is the same as the unlocking face information or not to obtain an unlocking result;
and if the face information of the user is judged to be the same as the unlocking face information, the unlocking result is successful.
6. An unlocking device, comprising:
the running unit is used for running the kernel bootstrap program after the electronic equipment is powered on;
the device comprises an initialization unit, a processing unit and a processing unit, wherein the initialization unit is used for initializing device hardware related to unlocking operation in the running of a kernel bootstrap program;
the unlocking unit is used for executing unlocking operation based on the initialized equipment hardware to obtain an unlocking result;
the judging unit is used for judging whether the unlocking result is successful or not; and if the unlocking result is judged to be successful, continuing to run the kernel bootstrap program and starting the operating system of the electronic equipment.
7. The unlocking device according to claim 6, wherein the unlocking operation includes password unlocking, and the initialization unit specifically includes:
initializing an input unit and a display unit; displaying a password input interface through the display unit;
the unlocking unit specifically includes:
receiving a touch operation of a user on the input unit; determining password information input by a user based on an input operation; judging whether the password information input by the user is the same as the unlocking password or not to obtain an unlocking result; and if the password information input by the user is the same as the unlocking password, the unlocking result is successful.
8. The unlocking device according to claim 6, wherein the unlocking operation includes a fob and a fob unlocking, and the initialization unit specifically includes:
initializing a communication unit and a secret card, and supplying power to a secret stick;
the unlocking unit specifically includes:
acquiring a data interaction result between the cipher rod and the cipher card through the communication unit; judging whether the data interaction result is successful interaction or not to obtain an unlocking result; and if the data interaction result is judged to be successful interaction, the unlocking result is successful unlocking.
9. The unlocking device according to claim 6, wherein the unlocking operation includes fingerprint unlocking, and the initialization unit specifically includes:
initializing a fingerprint sensor;
the unlocking unit specifically includes:
collecting fingerprint information of a user by using a fingerprint sensor; judging whether the fingerprint information of the user is the same as the unlocking fingerprint information or not to obtain an unlocking result; and if the fingerprint information of the user is the same as the unlocking fingerprint information, the unlocking result is successful.
10. The unlocking device according to claim 6, wherein the unlocking operation includes face unlocking, and the initialization unit specifically includes:
initializing a camera unit;
the unlocking unit specifically includes:
collecting face information of a user by using a camera unit; judging whether the face information of the user is the same as the unlocking face information or not to obtain an unlocking result; and if the face information of the user is judged to be the same as the unlocking face information, the unlocking result is successful.
CN201911122070.3A 2019-11-15 2019-11-15 Unlocking method and device Pending CN112818304A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911122070.3A CN112818304A (en) 2019-11-15 2019-11-15 Unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911122070.3A CN112818304A (en) 2019-11-15 2019-11-15 Unlocking method and device

Publications (1)

Publication Number Publication Date
CN112818304A true CN112818304A (en) 2021-05-18

Family

ID=75851881

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911122070.3A Pending CN112818304A (en) 2019-11-15 2019-11-15 Unlocking method and device

Country Status (1)

Country Link
CN (1) CN112818304A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN102650944A (en) * 2011-02-28 2012-08-29 国民技术股份有限公司 Operation system security bootstrap device and bootstrap device
CN103823692A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Computer operating system starting method
CN105631259A (en) * 2015-04-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Power-on verification method, power-on verification device and terminal
CN106203124A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 Operational approach and operation device, terminal are installed

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101916348A (en) * 2010-08-16 2010-12-15 武汉天喻信息产业股份有限公司 Method and system for safely guiding operating system of user
CN102650944A (en) * 2011-02-28 2012-08-29 国民技术股份有限公司 Operation system security bootstrap device and bootstrap device
CN103823692A (en) * 2013-12-31 2014-05-28 北京华虹集成电路设计有限责任公司 Computer operating system starting method
CN105631259A (en) * 2015-04-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Power-on verification method, power-on verification device and terminal
CN106203124A (en) * 2016-06-29 2016-12-07 宇龙计算机通信科技(深圳)有限公司 Operational approach and operation device, terminal are installed

Similar Documents

Publication Publication Date Title
US10546178B2 (en) Fingerprint verification method and electronic device for performing the same
US9703941B2 (en) Electronic device with touch screen for fingerprint recognition
JP7018453B2 (en) How to start the device and the device
US8549317B2 (en) Authentication method, authentication apparatus and authentication program storage medium
US9384369B2 (en) Information processing method and electronic device
WO2016131283A1 (en) Terminal control method and device
JP4929804B2 (en) Authentication method, authentication apparatus, and authentication program
WO2019100368A1 (en) Launching method and display method for application program, and terminal
CN106445328B (en) Unlocking method of mobile terminal screen and mobile terminal
CN103164644A (en) Terminal device and starting machine controlling method thereof
CN100456313C (en) Information display device
TW201214201A (en) Method of keyboard simulation and module for simulated keyboard
KR20110074794A (en) Information processor, information processing method, and computer-readable storage medium on which program is recorded
TWI545495B (en) System and method for operating touch screens
CN109491825B (en) Method, device, storage medium and terminal for positioning abnormal starting problem
US9489319B1 (en) Operating time supervisory system
TW201305841A (en) Computer system, encryption apparatus and method for encryption
CN104573477B (en) Method for operating electronic device
TWI503697B (en) Portable computer and operating method thereof
CN112818304A (en) Unlocking method and device
CN111583462A (en) Digital password control method and device by utilizing fingerprint chip
JP5466955B2 (en) OS restart method, OS restart device, and computer executable program
CN110909344B (en) Control method and device
CN110688663A (en) Execution command protection method and device, android device and storage medium
TWI590142B (en) Mobile terminal and application starting method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210518