CN112905964A - Unlocking method for user equipment, storage medium, chip and related equipment - Google Patents

Unlocking method for user equipment, storage medium, chip and related equipment Download PDF

Info

Publication number
CN112905964A
CN112905964A CN202110129264.7A CN202110129264A CN112905964A CN 112905964 A CN112905964 A CN 112905964A CN 202110129264 A CN202110129264 A CN 202110129264A CN 112905964 A CN112905964 A CN 112905964A
Authority
CN
China
Prior art keywords
unlocking
event
type
data set
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110129264.7A
Other languages
Chinese (zh)
Other versions
CN112905964B (en
Inventor
王琼瑶
蔡进
李亚英
李潇婧
孟春芝
吴倩
任洪林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Original Assignee
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ziguang Zhanrui Communication Technology Co Ltd filed Critical Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority to CN202110129264.7A priority Critical patent/CN112905964B/en
Publication of CN112905964A publication Critical patent/CN112905964A/en
Application granted granted Critical
Publication of CN112905964B publication Critical patent/CN112905964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Computing Systems (AREA)
  • Medical Informatics (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Artificial Intelligence (AREA)
  • Computer Hardware Design (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application discloses a method for unlocking user equipment, a storage medium, a chip and related equipment, wherein the method comprises the following steps: acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode. By adopting the method and the device, the safety of the unlocking event can be accurately pre-judged, and the safety of unlocking treatment on the unlocking event is pertinently improved under the condition that the safety of the pre-judged unlocking event is lower.

Description

Unlocking method for user equipment, storage medium, chip and related equipment
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a method for unlocking a user equipment, a storage medium, a chip, and a related device.
Background
With the wide popularization of intelligent devices, the intelligent devices have become an inseparable part of people's lives. Unlocking a smart device is typically required before the smart device or smart device associated functionality is used. Currently, the unlocking method requires intelligent device based capabilities, such as: and force calculation can be realized. Under the condition of insufficient calculation force, the unlocking method with higher complexity is adopted, so that the unlocking speed is reduced, and the unlocking safety is reduced by adopting the unlocking method with lower complexity.
Disclosure of Invention
The embodiment of the application provides an unlocking method for user equipment, a storage medium, a chip and related equipment, which can accurately pre-judge the safety of an unlocking event, and can pertinently improve the safety of unlocking processing on the unlocking event under the condition of pre-judging the safety of the unlocking event to be lower.
In order to solve the foregoing technical problem, in a first aspect, an embodiment of the present application provides an unlocking method for a user equipment, where the method includes:
acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
In a second aspect, an embodiment of the present application provides an unlocking apparatus, where the unlocking apparatus includes: a storage device and a processor, wherein the processor is capable of,
the storage device is used for storing program codes;
the processor, when invoking the stored code, is configured to perform the method for unlocking a user equipment according to the first aspect.
In a third aspect, an embodiment of the present application further provides an unlocking device, where the unlocking device includes:
the unlocking module is used for acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the prejudgment module is used for inputting the unlocking data set into an unlocking prejudgment model to obtain a prejudgment unlocking type;
the unlocking module is further configured to, when a target unlocking event is detected, unlock the target unlocking event in a first unlocking mode if the predetermined unlocking type is an abnormal unlocking type.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium for storing a computer program, where the computer program causes a computer to execute the method for unlocking a user equipment according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip is configured to obtain an unlocking data set; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode;
wherein the set of unlocking data comprises unlocking data of historical unlocking events.
In a sixth aspect, an embodiment of the present application provides a module device, where the module device includes a storage module and a chip module, where:
the storage module is used for storing an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the chip module is used for inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
The embodiment of the application has the following beneficial effects:
inputting the acquired unlocking data set into an unlocking pre-judging model to pre-judge the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event, and when the target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode. Therefore, the safety of the unlocking event can be accurately judged in advance, and the safety of unlocking processing on the unlocking event is pertinently improved under the condition that the safety of the unlocking event is judged in advance to be lower.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a scene diagram of an unlocking method for a user equipment according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a method for unlocking a user equipment according to an embodiment of the present application;
fig. 3 is an interaction diagram of an unlocking method for a user equipment according to an embodiment of the present application;
fig. 4 is an interaction diagram of another unlocking method for a user equipment according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an unlocking apparatus according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another unlocking device provided in an embodiment of the present application;
fig. 7 is a schematic structural diagram of a module apparatus according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Referring to fig. 1, fig. 1 is a scene diagram of an unlocking method for a user equipment according to an embodiment of the present application, specifically, as shown in fig. 1, in the scene, a user equipment 101 detects an unlocking event and executes an unlocking process for the unlocking event; after the unlocking is successful, the user can normally use the user equipment 101 or the function associated with the user equipment 101.
In the embodiment of the present application, the unlocking event includes, but is not limited to, one or more combinations of password authentication information input by the user device 101 and biometric information acquired by the user device 101; the biological information includes, but is not limited to, one or more combinations of fingerprint information, face information, iris information, and other biological information of the user.
The user equipment 101 includes, but is not limited to, a Mobile phone, a tablet computer, a laptop, a palmtop computer, a Mobile Internet Device (MID), a vending machine, a self-service face-brushing checkout machine, a face-brushing express delivery machine, and other intelligent devices with an unlocking function.
The functions associated with the user equipment 101 include, but are not limited to, functions allowed to be implemented on the user equipment 101, functions allowed to be implemented on an application of the user equipment 101, functions allowed to be implemented on a smart device communicating with the user equipment 101, functions that need to be implemented by performing an unlocking operation on the user equipment 101, and the like. The smart device communicating with the user device 101 includes other user devices or servers. For example, the functions that are allowed to be implemented on the user equipment 101 include, but are not limited to, a screen capture function, a file deletion function, a file copy function, and the like; the functions that are allowed to be implemented on the application of the user equipment 101 include, but are not limited to, a function of displaying a specified page on the application, a function of entering a game mode of the application, a function of marking specified content on a page of the application, and the like; the functions allowed to be implemented on the smart device of the user device 101 include, but are not limited to, a function of viewing bank account information, a function of bank transfer, and a function of controlling a bluetooth speaker (other user device) to play music, and the functions associated with the user device 101 are not limited herein.
In the embodiment of the application, the server may establish an unlocking pre-judgment model, determine a pre-judgment unlocking type of the unlocking event detected by the user equipment 101 by using the unlocking pre-judgment model, and perform unlocking processing on the unlocking event by using an unlocking mode corresponding to the pre-judgment unlocking type of the unlocking event. The unlocking process for the user equipment 101 may be performed by the unlocking anticipation model in the server 102 based on the calculation power call of the user equipment 101, or may be performed using the unlocking anticipation model based on the calculation power of the server communicating with the user equipment 101.
Referring to fig. 2, fig. 2 is a schematic flowchart of a method for unlocking a user equipment according to an embodiment of the present application, specifically, as shown in fig. 2, the method may be applied to the user equipment, and the method includes:
s201: an unlock data set is obtained.
In an embodiment of the present application, the unlocking data set includes unlocking data of one or more historical unlocking events. The historical unlocking event is detected by the user equipment, and the user equipment unlocks the historical unlocking event to obtain an unlocking data set, or the user equipment sends the relevant information of the detected historical unlocking event to the server, and the server unlocks the relevant information of the historical unlocking event to obtain the unlocking data set and sends the unlocking data set to the user equipment.
Wherein the historical unlocking event includes but is not limited to one or more combination of password authentication information input by the user equipment and biological information acquired by the user equipment. The biological information includes, but is not limited to, one or more combinations of fingerprint information, face information, iris information, and other biological information of the user.
S202: and inputting the unlocking data set into an unlocking pre-judgment model to obtain a pre-judgment unlocking type.
In the embodiment of the application, the unlocking anticipation model can be obtained by modeling in a server in a hard coding or machine learning mode and the like. The unlocking pre-judging model can be sent to the user equipment by the server, or the user equipment calls the unlocking pre-judging model from the server in real time when the user equipment has the requirement of using the unlocking pre-judging model.
Wherein the historical unlocking event that has been detected may reflect to some extent the security of the target unlocking event that has not been detected or subsequently detected. For example, in an application scenario of a face unlocking system, an illegal party uses its own mobile phone to continuously perform an attack sample test, such as: and continuously executing face recognition unlocking for 9 times, searching for a hole of face unlocking, stealing face information of other people, and performing illegal face unlocking to improve the success rate of face unlocking, so that the 10 th face unlocking event has a higher probability of illegally attacking the user equipment.
S203: when a target unlocking event is detected, if the pre-judging type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
In the embodiment of the application, the abnormal unlocking type can correspond to an unlocking event which illegally attacks the user equipment. The first unlocking mode is an unlocking processing mode with a relatively high security level, and can have high unlocking processing complexity, and more time delay and cost are needed to ensure the security of executing the unlocking processing of the target unlocking event.
It should be noted that any one or more of steps S201 to S203 in this embodiment may also be executed by a server; if the step S202 is executed by the server, the server does not need to send the unlocking anticipation model to the user equipment; if step S203 is executed by the server, the server may send an unlocking result of the unlocking process performed on the target unlocking event to the user equipment, and the user equipment executes a corresponding unlocking operation according to the unlocking result.
In the embodiment of the application, the acquired unlocking data set is input into an unlocking pre-judging model so as to pre-judge the unlocking type of a target unlocking event according to the unlocking data of historical unlocking events, and when the target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, the target unlocking event is unlocked through a first unlocking mode. Therefore, the safety of the unlocking event can be accurately judged in advance, and the safety of unlocking processing on the unlocking event is pertinently improved under the condition that the safety of the unlocking event is judged in advance to be lower.
Referring to fig. 3, fig. 3 is an interaction diagram of an unlocking method for a user equipment according to an embodiment of the present application, specifically, as shown in fig. 3, the method includes:
s301: the user equipment detects a first associated unlocking event and a first unlocking event; a second associated unlock event and a second unlock event are detected.
In an embodiment of the present application, the first associated unlocking event is detected before a first unlocking event, and the type of the first unlocking event is an abnormal unlocking type; the second associated unlocking event is detected before a second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
The first associated unlocking event can reflect to some extent the security of the first unlocking event detected after the first associated unlocking event. The second associated unlocking event can reflect to some extent the security of a second unlocking event detected after the second associated unlocking event.
For example, in an application scenario of a face unlocking system, an illegal party uses its own mobile phone to continuously perform an attack sample test, such as: continuously executing face recognition unlocking for 9 times, searching for loopholes of face unlocking, stealing face information of other people, and carrying out illegal face unlocking to improve the success rate of face unlocking, so that the 10 th face unlocking event has a higher probability that the face unlocking event illegally attacks user equipment, such as: if the legal user successfully executes the unlocking process on the user equipment for 9 times, the 10 th unlocking event of the user equipment has a higher probability of being the unlocking event of the legal unlocking user equipment. Wherein, the abnormal unlocking type corresponds to an unlocking event of illegally attacking the user equipment; the non-abnormal unlocking type corresponds to an unlocking event for legally unlocking the user equipment.
It should be noted that, in the embodiment of the present application, a time sequence of detecting the first associated unlocking event or the second unlocking event and detecting the second associated unlocking event or the second unlocking event is not limited.
S302: the user equipment executes unlocking processing on the first associated unlocking event to obtain a first data set; and executing unlocking processing on the second associated unlocking event to obtain a second data set.
Wherein the first data set comprises unlock data for one or more first associated unlock events and the second data set comprises unlock data for one or more second associated unlock events. The first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In an embodiment of the present application, the unlocking data includes at least one of an unlocking result corresponding to execution of unlocking processing on an unlocking event or unlocking time information corresponding to execution of unlocking processing on an unlocking event. The unlocking result comprises a result of unlocking failure or a result of unlocking success. The result of the unlocking failure refers to the result that the unlocking event fails the unlocking verification after being subjected to the unlocking processing, and the result of the unlocking success refers to the result that the unlocking event passes the unlocking verification after being subjected to the unlocking processing. The unlocking time information includes time point information at which an unlocking process for an unlocking event is performed, such as: the time point information for executing the unlocking process for 5 consecutive unlocking events is, in order, 17:00:02 at 1 month and 25 days at 2021 year, 17:00:08 at 1 month and 25 days at 2021 year, 17:00:12 at 1 month and 25 days at 2021 month, 17:00:20 at 1 month and 25 days at 2021 month, 17:00:30 at 2021 month. The unlocking time information may also include time intervals for performing unlocking processes for adjacent unlocking events, such as: in the process of executing the unlocking process for 5 consecutive unlocking events, the time intervals for executing the unlocking process for the adjacent unlocking events are 6 seconds, 4 seconds, 8 seconds, and 10 seconds in this order.
Optionally, after obtaining the first data set and the second data set, the user equipment sends the first data set and the second data set to the server.
It should be noted that the present application does not limit the time sequence of obtaining the first data set by performing the unlocking process on the first associated unlocking event and obtaining the second data set by performing the unlocking process on the second associated unlocking event; the user equipment can also send the related information of the first associated unlocking event, the first unlocking event, the second associated unlocking event and the second unlocking event to the server, and the server executes the step S302.
S303: and the server establishes an unlocking prejudgment model according to the first data set and the second data set.
In the embodiment of the application, the unlocking anticipation model can be obtained by modeling in modes such as hard coding or machine learning. The unlocking pre-judging model can be sent to the user equipment by the server, or the user equipment calls the unlocking pre-judging model from the server in real time when the user equipment has the requirement of using the unlocking pre-judging model.
S304: the user device detects a historical unlocking event.
In an embodiment of the present application, the detecting a historical unlocking event includes: historical unlock information input through the user device is detected. The unlocking information includes, but is not limited to, one or more combination of face information, iris information, fingerprint information collected by the user equipment, and password authentication information input by the user equipment.
S305: the user equipment obtains an unlocking data set.
In the embodiment of the application, the user equipment may unlock the historical unlocking event to obtain the unlocking data set, or the user equipment sends the detected related information of the historical unlocking event to the server, and the server unlocks the historical unlocking event to obtain the unlocking data set and sends the unlocking data set to the user equipment.
In an embodiment of the present application, the unlocking data set includes unlocking data of one or more historical unlocking events. The unlocking data of the historical unlocking event comprises: and executing at least one of an unlocking result corresponding to the unlocking process of the historical unlocking event or unlocking time information corresponding to the unlocking process of the historical unlocking event. For a description of the unlocking data, refer to step S302, which is not described herein.
S306: and the user equipment inputs the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type.
In an embodiment of the present application, the historical unlocking event is detected before the target unlocking event. The historical unlocking events that have been detected may reflect to some extent the security of target unlocking events that have not been detected or subsequently detected. The pre-judging unlocking type is obtained by pre-judging the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event. The pre-judging unlocking type comprises an abnormal unlocking type and a non-abnormal unlocking type. The abnormal unlocking type and the non-abnormal unlocking type may refer to the description of step S301, and are not described herein again.
S307: when the user equipment detects a target unlocking event, the user equipment determines an unlocking mode according to the pre-judged unlocking type, and unlocks the target unlocking event through the determined unlocking mode to obtain an unlocking result.
In the embodiment of the application, when the user equipment detects a target unlocking event, if the predetermined unlocking type is an abnormal unlocking type, the user equipment performs unlocking processing on the target unlocking event through a first unlocking mode.
In an embodiment of the present application, the detecting a target unlocking event includes: unlock information input through the user device is detected. The unlocking information includes, but is not limited to, one or more combination of face information, iris information, fingerprint information collected by the user equipment, and password authentication information input by the user equipment.
In the embodiment of the present application, the abnormal unlocking type may be further refined into abnormal unlocking types with different severity degrees, such as: the abnormal unlocking types comprise a first abnormal unlocking type with higher severity, a second abnormal unlocking type with moderate severity, a third abnormal unlocking type with lower severity and the like.
In the embodiment of the application, when the user equipment detects a target unlocking event, if the predetermined unlocking type is a non-abnormal unlocking type, the user equipment performs unlocking processing on the target unlocking event through a second unlocking mode.
In the embodiment of the application, the security level of the first unlocking mode is higher than that of the second unlocking mode. The first unlocking mode is an unlocking processing mode with a relatively high security level, and may have a high complexity of unlocking processing, and need to spend much time delay and overhead to ensure the security of executing the unlocking processing of the target unlocking event. The second unlocking mode is an unlocking processing mode with a relatively low security level, and may have a low complexity of unlocking processing, and require less time delay and cost.
For example, in an application scenario of face unlocking, the first unlocking manner may be a face authentication algorithm with higher complexity, and has lower tolerance on the posture, the definition, and the illumination condition of the acquired face information; the second unlocking mode can be a face authentication algorithm with higher complexity, and has higher tolerance on the posture, the definition and the illumination condition of the collected face information; the calculation speed of unlocking the target unlocking event through the first unlocking mode is relatively low, but the accuracy and the safety of unlocking processing are higher, so that illegal attacks can be effectively prevented, the speed of processing the target unlocking event through the second unlocking mode is relatively high, and the user can have smooth unlocking experience.
In the embodiment of the application, if the unlocking type is judged to be the abnormal unlocking type in advance, other countermeasures can be taken according to the severity of the abnormal unlocking type. For example, if the predetermined unlocking type is the first abnormal unlocking type with a higher severity, the ue may further perform an early warning operation, such as: and generating abnormity prompt information and sending the abnormity prompt information to the monitoring management center so that the monitoring management center can make reasonable response treatment according to the abnormity prompt information.
It should be noted that one or more of steps S305 to S307 may be executed by the server, and if step S306 is executed by the server, the server does not need to send the unlocking anticipation model to the user equipment; if step S307 is executed by the server, the server may further feed back an unlocking result of the unlocking process performed on the target unlocking event to the user equipment.
S308: and the user equipment executes unlocking operation according to the unlocking result of executing unlocking processing on the target unlocking event.
For example, if the unlocking result of the unlocking process performed on the target unlocking event is a result of successful unlocking, the user equipment performs an unlocking operation, such as: and switching the interface of the user equipment from a screen locking state to an unlocking state, enabling the application program of the user equipment to enter a page allowed to execute touch operation, and enabling the account page of the user equipment to enter a page allowed to view private information.
If the unlocking result of the unlocking process performed on the target unlocking event is the unlocking success or failure result, the times of continuous unlocking success or failure can be accumulated, and when the accumulated times of continuous unlocking failure reach a preset threshold value, early warning operation is performed, such as: generating an abnormal prompt message, and sending the abnormal prompt message to the monitoring management center, so that the monitoring management center can make reasonable response processing according to the abnormal prompt message, such as: the user equipment generates and sends out early warning prompt information, wherein the early warning prompt information can be early warning voice or flickering early warning light; and when the unlocking is successful, clearing the accumulated times of continuous unlocking failure.
In the embodiment of the application, the acquired unlocking data set is input into an unlocking pre-judging model, the unlocking type of a target unlocking event is pre-judged according to the unlocking data of historical unlocking events, when the target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, the target unlocking event is unlocked through a first unlocking mode, and if the pre-judged unlocking type is a non-abnormal unlocking type, the target unlocking event is unlocked through a second unlocking mode with the security level lower than that of the first unlocking mode. Therefore, the method and the device can accurately pre-judge the safety of the unlocking event, adjust the unlocking mode of executing the unlocking treatment according to the pre-judging result, effectively balance the safety and efficiency of the unlocking treatment, pertinently improve the safety of the unlocking treatment of the unlocking event, and improve the capability of resisting illegal unlocking attack of the user equipment while not influencing the unlocking experience of the user.
Referring to fig. 4, fig. 4 is an interaction diagram of another unlocking method for a user equipment according to an embodiment of the present application, specifically, as shown in fig. 4, the method includes:
s401: the user equipment detects a first associated unlocking event and a first unlocking event; a second associated unlock event and a second unlock event are detected.
In an embodiment of the present application, the first associated unlocking event is detected before a first unlocking event, and the type of the first unlocking event is an abnormal unlocking type; the second associated unlocking event is detected before a second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
The first associated unlocking event can reflect to some extent the security of the first unlocking event detected after the first associated unlocking event. The second associated unlocking event can reflect to some extent the security of a second unlocking event detected after the second associated unlocking event.
For example, in an application scenario of a face unlocking system, an illegal party uses its own mobile phone to continuously perform an attack sample test, such as: continuously executing face recognition unlocking for 9 times, searching for loopholes of face unlocking, stealing face information of other people, and carrying out illegal face unlocking to improve the success rate of face unlocking, so that the 10 th face unlocking event has a higher probability that the face unlocking event illegally attacks user equipment, such as: if the legal user successfully executes the unlocking process on the user equipment for 9 times, the 10 th unlocking event of the user equipment has a higher probability of being the unlocking event of the legal unlocking user equipment. Wherein, the abnormal unlocking type corresponds to an unlocking event of illegally attacking the user equipment; the non-abnormal unlocking type corresponds to an unlocking event for legally unlocking the user equipment.
It should be noted that, in the embodiment of the present application, a time sequence of detecting the first associated unlocking event or the second unlocking event and detecting the second associated unlocking event or the second unlocking event is not limited.
S402: the server executes unlocking processing on the first associated unlocking event to obtain a first data set; and executing unlocking processing on the second associated unlocking event to obtain a second data set.
In the embodiment of the present application, the user equipment sends the relevant information of the first associated unlocking event, the first unlocking event, the second associated unlocking event, and the second unlocking event to the server, and the server executes step S402.
Wherein the first data set comprises unlock data for one or more first associated unlock events and the second data set comprises unlock data for one or more second associated unlock events. The first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In an embodiment of the present application, the unlocking data includes at least one of an unlocking result corresponding to execution of unlocking processing on an unlocking event or unlocking time information corresponding to execution of unlocking processing on an unlocking event. The unlocking result comprises an unlocking failure result or an unlocking success result, the unlocking failure result refers to a result that the unlocking event is not subjected to unlocking verification after being subjected to unlocking processing, and the unlocking success result refers to a result that the unlocking event is subjected to unlocking verification after being subjected to unlocking processing. The unlocking time information includes time point information at which an unlocking process for an unlocking event is performed, such as: the time point information for executing the unlocking process for 5 consecutive unlocking events is, in order, 17:00:02 at 1 month and 25 days at 2021 year, 17:00:08 at 1 month and 25 days at 2021 year, 17:00:12 at 1 month and 25 days at 2021 month, 17:00:20 at 1 month and 25 days at 2021 month, 17:00:30 at 2021 month. The unlocking time information may also include time intervals for performing unlocking processes for adjacent unlocking events, such as: in the process of executing the unlocking process for 5 consecutive unlocking events, the time intervals for executing the unlocking process for the adjacent unlocking events are 6 seconds, 4 seconds, 8 seconds, and 10 seconds in this order.
It should be noted that the present application does not limit the time sequence of obtaining the first data set by performing the unlocking process on the first associated unlocking event and obtaining the second data set by performing the unlocking process on the second associated unlocking event; the application may further execute step S402 by the user equipment, in which case, the user equipment does not need to execute sending the relevant information of the first associated unlocking event, the first unlocking event, the second associated unlocking event, and the second unlocking event to the server, but the user equipment needs to send the first data set and the second data set to the server.
S403: and the server establishes an unlocking prejudgment model according to the first data set and the second data set.
In the embodiment of the application, the unlocking anticipation model can be obtained by modeling in modes such as hard coding or machine learning.
S404: the user device detects a historical unlocking event.
In an embodiment of the present application, the detecting a historical unlocking event includes: historical unlock information input through the user device is detected. The unlocking information includes, but is not limited to, one or more combination of face information, iris information, fingerprint information collected by the user equipment, and password authentication information input by the user equipment.
S405: the user equipment sends the historical unlocking event to the server.
In an embodiment of the present application, the sending the target unlocking event to the server includes: and sending the detected historical unlocking information input by the user equipment to a server.
S406: the server obtains an unlocking data set.
In the embodiment of the application, the user equipment sends the detected related information of the historical unlocking event to the server, and the server unlocks the historical unlocking event to obtain the unlocking data set.
Wherein the set of unlocking data comprises unlocking data for one or more historical unlocking events; the unlocking data of the historical unlocking event comprises: and executing at least one of an unlocking result corresponding to the unlocking process of the historical unlocking event or unlocking time information corresponding to the unlocking process of the historical unlocking event. For a description of the unlocking data, reference may be made to step S402, which is not described herein again.
S407: and the server inputs the unlocking data set into an unlocking pre-judgment model to obtain a pre-judgment unlocking type.
In an embodiment of the present application, the historical unlocking event is detected before the target unlocking event. The historical unlocking events that have been detected may reflect to some extent the security that the target unlocking event has not been detected. The pre-judging unlocking type is obtained by pre-judging the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event. The pre-judging unlocking type comprises an abnormal unlocking type and a non-abnormal unlocking type. The abnormal unlocking type and the non-abnormal unlocking type may refer to the description of step S401, and are not described herein again.
S408: when the user equipment detects the target unlocking event, the user equipment sends the target unlocking event to the server.
In an embodiment of the present application, the detecting a target unlocking event includes: unlock information input through the user device is detected. The unlocking information includes, but is not limited to, one or more combination of face information, iris information, fingerprint information collected by the user equipment, and password authentication information input by the user equipment.
The sending the target unlocking event to the server comprises: and sending the detected unlocking information input by the user equipment to the server.
S409: and the server determines an unlocking mode according to the pre-judged unlocking type, and unlocks the target unlocking event through the determined unlocking mode to obtain an unlocking result.
In the embodiment of the application, if the pre-determined unlocking type is an abnormal unlocking type, the server unlocks the target unlocking event through a first unlocking mode. In the embodiment of the present application, the abnormal unlocking type may be further refined into abnormal unlocking types with different severity degrees, such as: the abnormal unlocking types comprise a first abnormal unlocking type with higher severity, a second abnormal unlocking type with moderate severity, a third abnormal unlocking type with lower severity and the like.
In the embodiment of the application, if the pre-determined unlocking type is a non-abnormal unlocking type, the server unlocks the target unlocking event through a second unlocking mode.
In the embodiment of the application, the security level of the first unlocking mode is higher than that of the second unlocking mode. The first unlocking mode is an unlocking processing mode with a relatively high security level, and may have a high complexity of unlocking processing, and need to spend much time delay and overhead to ensure the security of executing the unlocking processing of the target unlocking event. The second unlocking mode is an unlocking processing mode with a relatively low security level, and may have a low complexity of unlocking processing, and require less time delay and cost.
For example, in an application scenario of face unlocking, the first unlocking manner may be a face authentication algorithm with higher complexity, and has lower tolerance on the posture, the definition, and the illumination condition of the acquired face information; the second unlocking mode can be a face authentication algorithm with higher complexity, and has higher tolerance on the posture, the definition and the illumination condition of the collected face information; the calculation speed of unlocking the target unlocking event through the first unlocking mode is relatively low, but the accuracy and the safety of unlocking processing are higher, so that illegal attacks can be effectively prevented, the speed of processing the target unlocking event through the second unlocking mode is relatively high, and the user can have smooth unlocking experience.
In the embodiment of the application, if the unlocking type is judged to be the abnormal unlocking type in advance, other countermeasures can be taken according to the severity of the abnormal unlocking type. For example, if the predetermined unlocking type is the first abnormal unlocking type with a higher severity, the server may further perform an early warning operation, such as: and generating and sending abnormal prompt information to the monitoring management center so that the monitoring management center can make reasonable response processing according to the abnormal prompt information.
S410: and the server sends an unlocking result of unlocking the target unlocking event to the user equipment.
S411: and the user equipment executes unlocking operation according to the unlocking result of executing unlocking processing on the target unlocking event.
For example, if the unlocking result of the unlocking process performed on the target unlocking event is a result of successful unlocking, the user equipment performs an unlocking operation, such as: and switching the interface of the user equipment from a screen locking state to an unlocking state, enabling the application program of the user equipment to enter a page allowed to execute touch operation, and enabling the account page of the user equipment to enter a page allowed to view private information.
If the unlocking result of the unlocking process performed on the target unlocking event is the unlocking success or failure result, the times of continuous unlocking success or failure can be accumulated, and when the accumulated times of continuous unlocking failure reach a preset threshold value, early warning operation is performed, such as: generating an abnormal prompt message, and sending the abnormal prompt message to the monitoring management center, so that the monitoring management center can make reasonable response processing according to the abnormal prompt message, such as: the user equipment generates and sends out early warning prompt information, wherein the early warning prompt information can be early warning voice or flashing early warning light; and when the unlocking is successful, clearing the accumulated times of continuous unlocking failure.
It should be noted that one or more of steps S406, S407, and S409 may be executed by the user equipment, and if step S407 is executed by the user equipment, the server sends the unlocking anticipation model to the user equipment after establishing the unlocking anticipation model, or the user equipment calls the unlocking anticipation model from the server in real time when there is a need to use the unlocking anticipation model; if the user equipment executes step S409, steps S408 and S410 do not need to be executed.
In the embodiment of the application, the acquired unlocking data set is input into an unlocking pre-judging model, the unlocking type of a target unlocking event is pre-judged according to the unlocking data of historical unlocking events, when the target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, the target unlocking event is unlocked through a first unlocking mode, and if the pre-judged unlocking type is a non-abnormal unlocking type, the target unlocking event is unlocked through a second unlocking mode with the security level lower than that of the first unlocking mode. Therefore, the method and the device can accurately pre-judge the safety of the unlocking event, adjust the unlocking mode of executing the unlocking treatment according to the pre-judging result, effectively balance the safety and efficiency of the unlocking treatment, pertinently improve the safety of the unlocking treatment of the unlocking event, and improve the capability of resisting illegal unlocking attack of the user equipment while not influencing the unlocking experience of the user.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an unlocking apparatus according to an embodiment of the present application, specifically, as shown in fig. 5, the unlocking apparatus includes: a storage device 501 and a processor 502; and the unlocking device may further comprise a data interface 503, a user interface 504. Connections may also be made between the various pieces of hardware via various types of buses.
Through the data interface 503, the unlocking device can interact data with other devices such as a terminal and a server; the user interface 504 is used for realizing human-computer interaction between a user and the unlocking device; the user interface 504 may provide a touch screen, physical keys, etc. to enable human-machine interaction between the user and the unlocking device.
The Memory device 501 may include a Volatile Memory (Volatile Memory), such as a Random-Access Memory (RAM); the storage device 501 may also include a Non-Volatile Memory (Non-Volatile Memory), such as a Flash Memory (Flash Memory), a Solid-State Drive (SSD), etc.; the memory device 501 may also comprise a combination of memories of the kind described above.
The processor 502 may be a Central Processing Unit (CPU). The processor 502 may further include a hardware chip. The hardware chip may be an Application-Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), or the like. The PLD may be a Field-Programmable Gate Array (FPGA), a General Array Logic (GAL), or the like.
The storage device 501 is used for storing program codes;
the processor 502 is configured to obtain an unlocking data set when the storage code is called; the unlocking data set comprises unlocking data of historical unlocking events;
inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
In an embodiment, the processor 502 is further configured to, when a target unlocking event is detected, perform unlocking processing on the target unlocking event through a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking manner is higher than the security level of the second unlocking manner.
In one embodiment, the historical unlocking event is detected prior to the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking events comprises: and executing at least one of an unlocking result or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlocking anticipation model is established according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first set of data includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
In one embodiment, the detecting of the target unlock event includes:
unlock information input through the user device is detected.
Referring to fig. 6, fig. 6 is a schematic structural diagram of another unlocking device provided in an embodiment of the present application, specifically, as shown in fig. 6, the unlocking device includes:
an unlocking module 601, configured to obtain an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
a prejudgment module 602, configured to input the unlocking data set into an unlocking prejudgment model to obtain a prejudgment unlocking type;
the unlocking module 601 is further configured to, when a target unlocking event is detected, perform unlocking processing on the target unlocking event through a first unlocking manner if the predetermined unlocking type is an abnormal unlocking type.
In an embodiment, the unlocking module 601 is further configured to, when a target unlocking event is detected, unlock the target unlocking event in a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking manner is higher than the security level of the second unlocking manner.
In one embodiment, the historical unlocking event is detected prior to the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking events comprises: and executing at least one of an unlocking result or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlocking anticipation model is established according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first set of data includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
In one embodiment, the detecting of the target unlock event includes:
unlock information input through the user device is detected.
It should be noted that the unlocking device described in fig. 5 and fig. 6 may be a user device or a server.
Accordingly, an embodiment of the present invention further provides a computer-readable storage medium for storing a computer program, where the computer program causes a computer to execute the method described in any of embodiments S201 to S203, S301, S302, S304 to S308, S401, S404, S405, S408, and S411. It is understood that the computer storage medium herein may include a built-in storage medium in the smart terminal, and may also include an extended storage medium supported by the smart terminal. The computer storage medium provides a storage space storing an operating system of the smart terminal. Also, one or more instructions, which may be one or more computer programs (including program code), are stored in the memory space and are adapted to be loaded and executed by the processor. It should be noted that the computer storage medium may be a high-speed RAM Memory, or may be a Non-Volatile Memory (Non-Volatile Memory), such as at least one disk Memory; and optionally at least one computer storage medium located remotely from the processor.
Accordingly, the embodiment of the present invention further provides a computer-readable storage medium for storing a computer program, where the computer program causes a computer to execute the method described in any of embodiments S201 to S203, S303, S402, S403, S406, S407, S409, and S410. It is understood that the computer storage medium herein may include a built-in storage medium in the smart terminal, and may also include an extended storage medium supported by the smart terminal. The computer storage medium provides a storage space storing an operating system of the smart terminal. Also, one or more instructions, which may be one or more computer programs (including program code), are stored in the memory space and are adapted to be loaded and executed by the processor. It should be noted that the computer storage medium may be a high-speed RAM Memory, or may be a Non-Volatile Memory (Non-Volatile Memory), such as at least one disk Memory; and optionally at least one computer storage medium located remotely from the processor.
Correspondingly, the embodiment of the application provides a chip, which is used for acquiring an unlocking data set; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode;
wherein the set of unlocking data comprises unlocking data of historical unlocking events.
In an embodiment, the chip is further configured to, when a target unlocking event is detected, perform unlocking processing on the target unlocking event through a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking manner is higher than the security level of the second unlocking manner.
In one embodiment, the historical unlocking event is detected prior to the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking events comprises: and executing at least one of an unlocking result or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlocking anticipation model is established according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first set of data includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
In one embodiment, the detecting of the target unlock event includes:
unlock information input through the user device is detected.
It should be noted that, the chip may execute relevant steps of the user equipment or the server in the foregoing method embodiments, and specific reference may be made to implementation manners provided in the foregoing steps, which are not described herein again.
In one embodiment, the chip includes at least one processor, at least one first memory, and at least one second memory; the at least one first memory and the at least one processor are interconnected through a line, and instructions are stored in the first memory; the at least one second memory and the at least one processor are interconnected through a line, and the second memory stores the data required to be stored in the method embodiment.
For each device or product applied to or integrated in the chip, each module included in the device or product may be implemented by hardware such as a circuit, or at least a part of the modules may be implemented by a software program running on a processor integrated in the chip, and the rest (if any) part of the modules may be implemented by hardware such as a circuit.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a module apparatus according to an embodiment of the present disclosure, where the module apparatus includes a memory module 701 and a chip module 702, where:
the storage module 701 is configured to store an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the chip module 702 is configured to input the unlocking data set into an unlocking pre-judgment model to obtain a pre-judgment unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
In an embodiment, the chip module 702 is further configured to, when a target unlocking event is detected, unlock the target unlocking event in a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking manner is higher than the security level of the second unlocking manner.
In one embodiment, the historical unlocking event is detected prior to the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking events comprises: and executing at least one of an unlocking result or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlocking anticipation model is established according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first set of data includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
In one embodiment, the detecting of the target unlock event includes:
unlock information input through the user device is detected.
It should be noted that the module device may perform relevant steps of the user equipment or the server in the foregoing method embodiments, and specific reference may be made to implementation manners provided in the foregoing steps, which are not described herein again.
For each device and product applied to or integrated in the chip module, each module included in the device and product may be implemented by using hardware such as a circuit, and different modules may be located in the same component (e.g., a chip, a circuit module, etc.) or different components of the chip module, or at least some of the modules may be implemented by using a software program running on a processor integrated in the chip module, and the rest (if any) of the modules may be implemented by using hardware such as a circuit.
Those of ordinary skill in the art would appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on or transmitted over a computer-readable storage medium. The computer instructions may be transmitted from one website site, computer, server, or data center to another website site, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. A method of unlocking a user device, the method comprising:
acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
2. The method of claim 1, wherein the method further comprises:
when a target unlocking event is detected, if the pre-judged unlocking type is a non-abnormal unlocking type, unlocking the target unlocking event by a second unlocking mode.
3. The method of claim 2, wherein a security level of the first unlocking manner is higher than a security level of the second unlocking manner.
4. The method of claim 1, wherein the historical unlocking event is detected prior to the target unlocking event.
5. The method of any of claims 1-4, wherein the unlocking data for the historical unlocking events comprises: and executing at least one of an unlocking result or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
6. The method of claim 1, wherein the unlock anticipation model is built based on a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
7. The method of claim 6, wherein the first set of data includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
8. The method of claim 1, wherein the detecting a target unlock event comprises:
unlock information input through the user device is detected.
9. An unlocking apparatus, characterized in that the unlocking apparatus comprises: a storage device and a processor, wherein the processor is capable of,
the storage device is used for storing program codes;
the processor, when invoking the stored code, is configured to perform the method of unlocking a user equipment according to any of claims 1-8.
10. An unlocking apparatus, characterized in that the unlocking apparatus comprises:
the unlocking module is used for acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the prejudgment module is used for inputting the unlocking data set into an unlocking prejudgment model to obtain a prejudgment unlocking type;
the unlocking module is further configured to, when a target unlocking event is detected, unlock the target unlocking event in a first unlocking mode if the predetermined unlocking type is an abnormal unlocking type.
11. A computer-readable storage medium storing a computer program for causing a computer to execute the method of unlocking a user equipment according to any one of claims 1 to 8.
12. A chip, wherein the chip is configured to obtain an unlocking data set; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode;
wherein the set of unlocking data comprises unlocking data of historical unlocking events.
13. The utility model provides a module equipment, its characterized in that, module equipment includes storage module and chip module, wherein:
the storage module is used for storing an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the chip module is used for inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judged unlocking type is an abnormal unlocking type, unlocking the target unlocking event through a first unlocking mode.
CN202110129264.7A 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment Active CN112905964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110129264.7A CN112905964B (en) 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110129264.7A CN112905964B (en) 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment

Publications (2)

Publication Number Publication Date
CN112905964A true CN112905964A (en) 2021-06-04
CN112905964B CN112905964B (en) 2023-05-09

Family

ID=76121630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110129264.7A Active CN112905964B (en) 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment

Country Status (1)

Country Link
CN (1) CN112905964B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145212A (en) * 2017-04-12 2017-09-08 广东欧珀移动通信有限公司 Terminal unlock method, device and terminal
CN107194240A (en) * 2017-06-29 2017-09-22 中国联合网络通信集团有限公司 Unlocking screen method and device
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107451449A (en) * 2017-07-21 2017-12-08 广东欧珀移动通信有限公司 Bio-identification unlocking method and Related product
CN108363915A (en) * 2018-02-08 2018-08-03 广东欧珀移动通信有限公司 unlocking method, mobile terminal and computer readable storage medium
CN108537019A (en) * 2018-03-20 2018-09-14 努比亚技术有限公司 A kind of unlocking method and device, storage medium
WO2019015433A1 (en) * 2017-07-18 2019-01-24 Oppo广东移动通信有限公司 Unlocking processing method and related product
CN111708998A (en) * 2020-04-30 2020-09-25 华为技术有限公司 Face unlocking method and electronic equipment
CN111949963A (en) * 2020-08-04 2020-11-17 中国联合网络通信集团有限公司 Terminal device unlocking method, terminal device and computer readable storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145212A (en) * 2017-04-12 2017-09-08 广东欧珀移动通信有限公司 Terminal unlock method, device and terminal
CN107194240A (en) * 2017-06-29 2017-09-22 中国联合网络通信集团有限公司 Unlocking screen method and device
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product
WO2019015433A1 (en) * 2017-07-18 2019-01-24 Oppo广东移动通信有限公司 Unlocking processing method and related product
CN107451449A (en) * 2017-07-21 2017-12-08 广东欧珀移动通信有限公司 Bio-identification unlocking method and Related product
CN108363915A (en) * 2018-02-08 2018-08-03 广东欧珀移动通信有限公司 unlocking method, mobile terminal and computer readable storage medium
CN108537019A (en) * 2018-03-20 2018-09-14 努比亚技术有限公司 A kind of unlocking method and device, storage medium
CN111708998A (en) * 2020-04-30 2020-09-25 华为技术有限公司 Face unlocking method and electronic equipment
CN111949963A (en) * 2020-08-04 2020-11-17 中国联合网络通信集团有限公司 Terminal device unlocking method, terminal device and computer readable storage medium

Also Published As

Publication number Publication date
CN112905964B (en) 2023-05-09

Similar Documents

Publication Publication Date Title
JP7182924B2 (en) Mobile security measures
AU2019222729B2 (en) Asset management method and apparatus, and electronic device
CN110651270B (en) Data access method and device
US9569605B1 (en) Systems and methods for enabling biometric authentication options
WO2018019243A1 (en) Verification method, apparatus and device, and storage medium
CN107689936B (en) Security verification system, method and device for login account
CN109389727A (en) Method for unlocking, system and computer readable storage medium
US10102362B2 (en) Method and system of silent biometric security privacy protection for smart devices
US8661532B2 (en) Method and apparatus for authenticating password
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
CN111898124B (en) Process access control method and device, storage medium and electronic equipment
EP3022867B1 (en) Strong authentication method
CN107808127A (en) Face identification method and Related product
EP3198517A1 (en) Smartphone or tablet having a secure display
CN107862194A (en) A kind of method, device and mobile terminal of safety verification
GB2511054A (en) Protecting multi-factor authentication
CN112653679B (en) Dynamic identity authentication method, device, server and storage medium
Stockinger Implicit authentication on mobile devices
CN104937602B (en) Privacy protection method and electronic equipment
CN107786349B (en) Security management method and device for user account
CN114341843A (en) Safety protection method and device, mobile terminal and storage medium
CN112905964B (en) Unlocking method for user equipment, storage medium, chip and related equipment
CN107704737A (en) Method, apparatus, mobile terminal and the computer-readable recording medium of safety verification
CN111010478B (en) Mobile terminal protection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant