CN112905964B - Unlocking method for user equipment, storage medium, chip and related equipment - Google Patents

Unlocking method for user equipment, storage medium, chip and related equipment Download PDF

Info

Publication number
CN112905964B
CN112905964B CN202110129264.7A CN202110129264A CN112905964B CN 112905964 B CN112905964 B CN 112905964B CN 202110129264 A CN202110129264 A CN 202110129264A CN 112905964 B CN112905964 B CN 112905964B
Authority
CN
China
Prior art keywords
unlocking
event
type
data set
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110129264.7A
Other languages
Chinese (zh)
Other versions
CN112905964A (en
Inventor
王琼瑶
蔡进
李亚英
李潇婧
孟春芝
吴倩
任洪林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Original Assignee
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ziguang Zhanrui Communication Technology Co Ltd filed Critical Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority to CN202110129264.7A priority Critical patent/CN112905964B/en
Publication of CN112905964A publication Critical patent/CN112905964A/en
Application granted granted Critical
Publication of CN112905964B publication Critical patent/CN112905964B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Computer Hardware Design (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Telephone Function (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application discloses an unlocking method for user equipment, a storage medium, a chip and related equipment, wherein the method comprises the following steps: acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode. By adopting the method and the device, the safety of the unlocking event can be accurately pre-judged, and under the condition that the safety of the pre-judged unlocking event is lower, the safety of the unlocking event in unlocking processing is pertinently improved.

Description

Unlocking method for user equipment, storage medium, chip and related equipment
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a method for unlocking a user device, a storage medium, a chip, and related devices.
Background
With the widespread popularity of smart devices, smart devices have become an integral part of people's life. Unlocking the smart device is typically required before the smart device or the functionality associated with the smart device is used. Currently, unlocking methods need to be based on the performance of intelligent devices, such as: calculation force can be realized. Under the condition of insufficient calculation force, the unlocking speed can be reduced by adopting an unlocking method with higher complexity, and the unlocking safety can be reduced by adopting an unlocking method with lower complexity.
Disclosure of Invention
The embodiment of the application provides an unlocking method, a storage medium, a chip and related equipment for user equipment, which can accurately pre-judge the security of an unlocking event, and can pertinently improve the security of unlocking processing on the unlocking event under the condition that the security of pre-judging the unlocking event is lower.
In order to solve the above technical problems, in a first aspect, an embodiment of the present application provides a method for unlocking a user equipment, where the method includes:
acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode.
In a second aspect, an embodiment of the present application provides an unlocking apparatus, including: a memory device and a processor, wherein the memory device is configured to store data,
the storage device is used for storing program codes;
the processor is configured to perform the unlocking method for the user equipment according to the first aspect when the stored code is invoked.
In a third aspect, embodiments of the present application further provide an unlocking apparatus, where the unlocking apparatus includes:
the unlocking module is used for acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the pre-judging module is used for inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
and the unlocking module is also used for unlocking the target unlocking event in a first unlocking mode if the pre-judging unlocking type is an abnormal unlocking type when the target unlocking event is detected.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium, where the computer readable storage medium is configured to store a computer program, where the computer program causes a computer to execute the method for unlocking a user equipment according to the first aspect.
In a fifth aspect, an embodiment of the present application provides a chip, where the chip is configured to obtain an unlock data set; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode;
Wherein the unlocking data set comprises unlocking data of historical unlocking events.
In a sixth aspect, embodiments of the present application provide a module apparatus, the module apparatus including a memory module and a chip module, wherein:
the storage module is used for storing the unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the chip module is used for inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode.
The implementation of the embodiment of the application has the following beneficial effects:
and inputting the acquired unlocking data set into an unlocking pre-judging model to pre-judge the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event, and when the target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, carrying out unlocking treatment on the target unlocking event in a first unlocking mode. Therefore, the security of the unlocking event can be accurately pre-judged, and under the condition that the security of the pre-judging unlocking event is lower, the security of unlocking processing on the unlocking event is pertinently improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a scene diagram of an unlocking method for a user device according to an embodiment of the present application;
fig. 2 is a flow chart of an unlocking method for a user equipment according to an embodiment of the present application;
fig. 3 is an interaction schematic diagram of an unlocking method for a user device according to an embodiment of the present application;
fig. 4 is an interaction schematic diagram of another method for unlocking a user device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another unlocking device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a module device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
Referring to fig. 1, fig. 1 is a schematic diagram of an unlocking method for a user equipment according to an embodiment of the present application, and specifically as shown in fig. 1, in this scenario, a user equipment 101 detects an unlocking event and performs an unlocking process for the unlocking event; after successful unlocking, the user can normally use the user equipment 101 or the functions associated with the user equipment 101.
In the embodiment of the present application, the unlocking event includes, but is not limited to, one or more combinations of password authentication information input through the user device 101 and biometric information acquired through the user device 101; the biometric information includes, but is not limited to, one or more of fingerprint information, face information, iris information, and other biometric information of the user.
The user device 101 includes, but is not limited to, smart devices with unlocking functions, such as a mobile phone, a tablet computer, a notebook computer, a palm computer, a mobile internet device (Mobile Internet Device, MID), a vending machine, a self-service face-brushing checkout machine, a face-brushing express delivery machine, and the like.
The functions associated with the user device 101 include, but are not limited to, functions that are allowed to be implemented on the user device 101, functions that are allowed to be implemented on an application of the user device 101, functions that are allowed to be implemented on a smart device in communication with the user device 101, functions that require an unlocking operation to be performed on the user device 101, and so forth. Wherein the smart device in communication with the user device 101 comprises other user devices or servers. For example, functions that are allowed to be implemented on the user device 101 include, but are not limited to, a screen capture function, a file delete function, a file copy function, and the like; functions that are allowed to be implemented on the application of the user device 101 include, but are not limited to, a function of displaying a specified page on the application, a function of entering a game mode of the application, a function of marking specified content on the page of the application, and the like; functions that are allowed to be implemented on the smart device of the user device 101 include, but are not limited to, a function of viewing bank account information, a function of bank transfer, a function of controlling a bluetooth speaker (other user device) to play music, and the functions associated with the user device 101 are not limited herein.
In this embodiment of the present application, an unlock pre-determination model may be established by the server, the pre-determination unlock type of the unlock event detected by the user equipment 101 is determined by using the unlock pre-determination model, and the unlock event is unlocked by using an unlock mode corresponding to the pre-determination unlock type of the unlock event. The unlocking process of the user equipment 101 may be performed by the unlock pre-determination model in the server 102 based on the computational power call of the user equipment 101, or may be performed by the unlock pre-determination model based on the computational power of the server in communication with the user equipment 101.
Referring to fig. 2, fig. 2 is a flowchart of an unlocking method for a user equipment according to an embodiment of the present application, specifically as shown in fig. 2, the method may be applied to the user equipment, and the method includes:
s201: and obtaining an unlocking data set.
In this embodiment of the present application, the unlocking data set includes one or more unlocking data of a historical unlocking event. The method comprises the steps that a user device detects a historical unlocking event and performs unlocking processing on the historical unlocking event to obtain an unlocking data set, or the user device sends relevant information of the detected historical unlocking event to a server, and the server performs unlocking processing on relevant information of the historical unlocking event to obtain the unlocking data set and sends the unlocking data set to the user device.
Wherein the historical unlocking event includes, but is not limited to, one or more of password authentication information entered by the user device, biometric information obtained by the user device, and combinations thereof. The biometric information includes, but is not limited to, one or more of fingerprint information, face information, iris information, and other biometric information of the user.
S202: and inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type.
In this embodiment of the present application, the unlock prediction model may be obtained by modeling in a server in a hard-coded or machine learning manner. The unlocking pre-judgment model can be sent to the user equipment by the server, or can be called from the server in real time when the user equipment has the requirement of using the unlocking pre-judgment model.
Wherein, the detected historical unlocking event can reflect the security of the target unlocking event which is not detected or is detected subsequently to a certain extent. For example, in an application scenario of a face unlocking system, an illegal person first uses his mobile phone to continuously perform attack sample testing, such as: and continuously executing face recognition unlocking for 9 times, searching for a loophole of the face unlocking, then stealing face information of other people, and performing illegal face unlocking to improve the success rate of the face unlocking, wherein the 10 th face unlocking event has a high probability of being an unlocking event of illegal attack user equipment.
S203: when a target unlocking event is detected, if the pre-judging type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode.
In the embodiment of the present application, the abnormal unlocking type may correspond to an unlocking event of the illegal attack user equipment. The first unlocking mode is an unlocking processing mode with relatively higher security level, can have higher unlocking processing complexity, and needs to spend more time delay and expense so as to ensure the security of executing the unlocking processing of the target unlocking event.
It should be noted that any one or more of steps S201 to S203 in the embodiments of the present application may also be performed by the server; if step S202 is executed by the server, the server does not need to send the unlock pre-determination model to the user equipment; if step S203 is executed by the server, the server may send an unlocking result of the unlocking process for the target unlocking event to the user equipment, and the user equipment executes a corresponding unlocking operation according to the unlocking result.
In the embodiment of the application, the obtained unlocking data set is input into an unlocking pre-judging model to pre-judge the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event, and when the target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, the target unlocking event is unlocked in a first unlocking mode. Therefore, the security of the unlocking event can be accurately pre-judged, and under the condition that the security of the pre-judging unlocking event is lower, the security of unlocking processing on the unlocking event is pertinently improved.
Referring to fig. 3, fig. 3 is an interaction schematic diagram of an unlocking method for a user equipment according to an embodiment of the present application, and specifically as shown in fig. 3, the method includes:
s301: the user equipment detects a first associated unlocking event and a first unlocking event; a second associated unlock event is detected.
In this embodiment of the present application, the first associated unlocking event is detected before a first unlocking event, and a type of the first unlocking event is an abnormal unlocking type; the second associated unlocking event is detected before a second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
The first associated unlocking event can reflect to some extent the security of the first unlocking event detected after the first associated unlocking event. The second associated unlocking event can reflect to some extent the security of the second unlocking event detected after the second associated unlocking event.
For example, in an application scenario of a face unlocking system, an illegal person first uses his mobile phone to continuously perform attack sample testing, such as: and continuously executing face recognition unlocking for 9 times, searching for a loophole of the face unlocking, then stealing face information of other people, and performing illegal face unlocking to improve the success rate of the face unlocking, wherein the 10 th face unlocking event has a high probability of being an unlocking event of illegal attack on user equipment, and the method is as follows: and the legal user successfully executes the unlocking processing of the user equipment for 9 times continuously, and the 10 th unlocking event of the user equipment is the unlocking event of the legal unlocking user equipment with a high probability. The abnormal unlocking type corresponds to an unlocking event of the illegal attack user equipment; the non-abnormal unlocking type corresponds to an unlocking event of the legal unlocking user equipment.
It should be noted that, in the embodiments of the present application, the timing sequence of detecting the first associated unlocking event or the second unlocking event and detecting the second associated unlocking event or the second unlocking event is not limited.
S302: the user equipment executes unlocking processing on a first associated unlocking event to obtain a first data set; and executing unlocking processing of the second associated unlocking event to obtain a second data set.
Wherein the first data set comprises unlocking data of one or more first associated unlocking events and the second data set comprises unlocking data of one or more second associated unlocking events. The first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In this embodiment of the present application, the unlocking data includes at least one of an unlocking result corresponding to an unlocking process performed on the unlocking event or unlocking time information corresponding to an unlocking process performed on the unlocking event. The unlocking result comprises a result of unlocking failure or a result of successful unlocking. The unlocking failure result refers to a result that the unlocking verification is not passed after the unlocking event is executed, and the unlocking success result refers to a result that the unlocking verification is passed after the unlocking event is executed. The unlocking time information includes time point information for performing an unlocking process for an unlocking event, such as: the time point information at which the unlocking process for the continuous 5 unlocking events is executed is 2021 month 25 days 17:00:02, 2021 month 25 days 17:00:08, 2021 month 25 days 17:00:12, 2021 month 25 days 17:00:20, 2021 month 25 days 17:00:30 in this order. The unlocking time information may further include a time interval during which an unlocking process for an adjacent unlocking event is performed, such as: in executing the unlocking processes for consecutive 5 unlocking events, the time intervals for executing the unlocking processes for adjacent unlocking events are 6 seconds, 4 seconds, 8 seconds, and 10 seconds in order.
Optionally, the user equipment sends the first data set and the second data set to the server after obtaining the first data set and the second data set.
It should be noted that, the present application does not limit the time sequence of executing the unlocking process for the first associated unlocking event to obtain the first data set and executing the unlocking process for the second associated unlocking event to obtain the second data set; the user equipment may also send the relevant information of the first associated unlocking event, the first unlocking event, the second associated unlocking event and the second unlocking event to the server, and the server performs step S302, where the user equipment does not need to perform sending the first data set and the second data set to the server.
S303: and the server establishes an unlocking pre-judging model according to the first data set and the second data set.
In the embodiment of the application, the unlocking pre-judgment model can be obtained through modeling in a hard coding mode or a machine learning mode. The unlocking pre-judgment model can be sent to the user equipment by the server, or can be called from the server in real time when the user equipment has the requirement of using the unlocking pre-judgment model.
S304: the user device detects a historical unlocking event.
In this embodiment of the present application, the detecting a historical unlocking event includes: historical unlocking information entered by the user device is detected. The unlocking information comprises, but is not limited to, one or more of face information, iris information, fingerprint information acquired by the user equipment and password verification information input by the user equipment.
S305: the user equipment acquires an unlocking data set.
In the embodiment of the application, the user equipment can unlock the historical unlocking event to obtain the unlocking data set, or the user equipment sends the detected relevant information of the historical unlocking event to the server, and the server unlocks the historical unlocking event to obtain the unlocking data set and sends the unlocking data set to the user equipment.
In this embodiment of the present application, the unlocking data set includes one or more unlocking data of a historical unlocking event. The unlocking data of the historical unlocking event comprises: at least one of an unlocking result corresponding to the unlocking process of the historical unlocking event or unlocking time information corresponding to the unlocking process of the historical unlocking event is executed. The unlocking data may be described in step S302, which is not described herein.
S306: and the user equipment inputs the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type.
In this embodiment, the historical unlocking event is detected before the target unlocking event. The historical unlocking events that have been detected may reflect to some extent the security of the target unlocking event that has not been detected or subsequently detected. The pre-judging unlocking type is obtained by pre-judging the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event. The pre-determined unlocking type comprises an abnormal unlocking type and a non-abnormal unlocking type. The abnormal unlocking type and the non-abnormal unlocking type can be referred to the description of step S301, and will not be described here.
S307: when the user equipment detects a target unlocking event, the user equipment determines an unlocking mode according to the pre-judging unlocking type, and the target unlocking event is unlocked through the determined unlocking mode to obtain an unlocking result.
In this embodiment of the present application, when the user equipment detects a target unlocking event, if the pre-determined unlocking type is an abnormal unlocking type, the user equipment performs unlocking processing on the target unlocking event in a first unlocking manner.
In this embodiment of the present application, the detecting a target unlocking event includes: unlocking information input through the user equipment is detected. The unlocking information comprises, but is not limited to, one or more of face information, iris information, fingerprint information acquired by the user equipment and password verification information input by the user equipment.
In this embodiment of the present application, the abnormal unlocking type may be further subdivided into abnormal unlocking types with different severity degrees, for example: the abnormal unlocking types comprise a first abnormal unlocking type with higher severity, a second abnormal unlocking type with moderate severity, a third abnormal unlocking type with lower severity and the like.
In this embodiment of the present application, when the user equipment detects a target unlocking event, if the pre-determined unlocking type is a non-abnormal unlocking type, the user equipment performs unlocking processing on the target unlocking event in a second unlocking manner.
In this embodiment of the present application, the security level of the first unlocking mode is higher than the security level of the second unlocking mode. The first unlocking mode is an unlocking processing mode with relatively higher security level, possibly having higher complexity of unlocking processing, and needing more time delay and expense to ensure the security of executing the unlocking processing of the target unlocking event. The second unlocking mode is an unlocking processing mode with a relatively low security level, and may have low complexity of unlocking processing, and needs less time delay and cost.
For example, in an application scenario of face unlocking, the first unlocking mode may be a face authentication algorithm with higher complexity, and has lower tolerance to the gesture, definition and illumination condition of the collected face information; the second unlocking mode can be a face authentication algorithm with higher complexity, and the tolerance to the gesture, the definition degree and the illumination condition of the acquired face information is higher; the calculation speed of the unlocking processing of the target unlocking event is relatively slow through the first unlocking mode, but the accuracy and the safety of the unlocking processing are higher, illegal attacks can be effectively prevented, the speed of the processing of the target unlocking event through the second unlocking mode is relatively fast, and a user can have smoother unlocking experience.
In the embodiment of the present application, if the pre-determined unlocking type is an abnormal unlocking type, other countermeasures may be made according to the severity of the abnormal unlocking type. For example, if the pre-determined unlock type is a first abnormal unlock type with higher severity, the ue may perform early warning operations, such as: generating abnormal prompt information and sending the abnormal prompt information to the monitoring management center so that the monitoring management center can reasonably deal with the abnormal prompt information.
It should be noted that one or more of steps S305 to S307 may be executed by the server, and if step S306 is executed by the server, the server does not need to send the unlock pre-determination model to the user equipment; if step S307 is performed by the server, the server may further feed back an unlocking result of performing the unlocking process on the target unlocking event to the user equipment.
S308: and the user equipment executes unlocking operation according to an unlocking result of the unlocking processing executed on the target unlocking event.
For example, if the unlocking result of the unlocking process performed on the target unlocking event is a result of successful unlocking, the user equipment performs an unlocking operation, such as: and switching the interface of the user equipment from the screen locking state to the unlocking state, enabling an application program of the user equipment to enter a page allowed to execute touch operation, enabling an account page of the user equipment to enter a page allowed to view private information, and the like.
If the unlocking result of the unlocking process performed on the target unlocking event is the unlocking success or failure result, the number of continuous unlocking success or failure times can be accumulated, and when the accumulated number of continuous unlocking failure times reaches a preset threshold value, early warning operation is performed, for example: generating abnormal prompt information and sending the abnormal prompt information to the monitoring management center so that the monitoring management center can make reasonable coping according to the abnormal prompt information, for example: the user equipment generates and sends out early warning prompt information which can be early warning voice or flashing early warning lamplight; and when the unlocking is successful, resetting the accumulated times of continuous unlocking failure.
In the embodiment of the application, the obtained unlocking data set is input into an unlocking pre-judging model to pre-judge the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event, when the target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, the target unlocking event is unlocked through a first unlocking mode, and if the pre-judging unlocking type is a non-abnormal unlocking type, the target unlocking event is unlocked through a second unlocking mode with a security level lower than that of the first unlocking mode. Therefore, the security of the unlocking event can be accurately pre-judged, the unlocking mode for executing the unlocking process is adjusted according to the pre-judging result, the security and the efficiency of the unlocking process are effectively balanced, the security of the unlocking process on the unlocking event is pertinently improved, and the capability of the user equipment for resisting illegal unlocking attack is improved while the unlocking experience of the user is not influenced.
Referring to fig. 4, fig. 4 is an interaction schematic diagram of another method for unlocking a user equipment according to an embodiment of the present application, and specifically as shown in fig. 4, the method includes:
s401: the user equipment detects a first associated unlocking event and a first unlocking event; a second associated unlock event is detected.
In this embodiment of the present application, the first associated unlocking event is detected before a first unlocking event, and a type of the first unlocking event is an abnormal unlocking type; the second associated unlocking event is detected before a second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type.
The first associated unlocking event can reflect to some extent the security of the first unlocking event detected after the first associated unlocking event. The second associated unlocking event can reflect to some extent the security of the second unlocking event detected after the second associated unlocking event.
For example, in an application scenario of a face unlocking system, an illegal person first uses his mobile phone to continuously perform attack sample testing, such as: and continuously executing face recognition unlocking for 9 times, searching for a loophole of the face unlocking, then stealing face information of other people, and performing illegal face unlocking to improve the success rate of the face unlocking, wherein the 10 th face unlocking event has a high probability of being an unlocking event of illegal attack on user equipment, and the method is as follows: and the legal user successfully executes the unlocking processing of the user equipment for 9 times continuously, and the 10 th unlocking event of the user equipment is the unlocking event of the legal unlocking user equipment with a high probability. The abnormal unlocking type corresponds to an unlocking event of the illegal attack user equipment; the non-abnormal unlocking type corresponds to an unlocking event of the legal unlocking user equipment.
It should be noted that, in the embodiments of the present application, the timing sequence of detecting the first associated unlocking event or the second unlocking event and detecting the second associated unlocking event or the second unlocking event is not limited.
S402: the server executes unlocking processing of a first associated unlocking event to obtain a first data set; and executing unlocking processing of the second associated unlocking event to obtain a second data set.
In the embodiment of the present application, the user equipment sends the first associated unlocking event, the first unlocking event, the second associated unlocking event, and related information of the second unlocking event to the server, and the server executes step S402.
Wherein the first data set comprises unlocking data of one or more first associated unlocking events and the second data set comprises unlocking data of one or more second associated unlocking events. The first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In this embodiment of the present application, the unlocking data includes at least one of an unlocking result corresponding to an unlocking process performed on the unlocking event or unlocking time information corresponding to an unlocking process performed on the unlocking event. The unlocking result comprises an unlocking failure result or an unlocking success result, wherein the unlocking failure result refers to a result that the unlocking verification is not passed after the unlocking event is executed, and the unlocking success result refers to a result that the unlocking verification is passed after the unlocking event is executed. The unlocking time information includes time point information for performing an unlocking process for an unlocking event, such as: the time point information at which the unlocking process for the continuous 5 unlocking events is executed is 2021 month 25 days 17:00:02, 2021 month 25 days 17:00:08, 2021 month 25 days 17:00:12, 2021 month 25 days 17:00:20, 2021 month 25 days 17:00:30 in this order. The unlocking time information may further include a time interval during which an unlocking process for an adjacent unlocking event is performed, such as: in executing the unlocking processes for consecutive 5 unlocking events, the time intervals for executing the unlocking processes for adjacent unlocking events are 6 seconds, 4 seconds, 8 seconds, and 10 seconds in order.
It should be noted that, the present application does not limit the time sequence of executing the unlocking process for the first associated unlocking event to obtain the first data set and executing the unlocking process for the second associated unlocking event to obtain the second data set; the present application may further perform step S402 by the user equipment, in which case the user equipment does not need to perform sending the first associated unlocking event, the first unlocking event, the second associated unlocking event, and the related information of the second unlocking event to the server, but the user equipment needs to send the first data set and the second data set to the server.
S403: and the server establishes an unlocking pre-judging model according to the first data set and the second data set.
In the embodiment of the application, the unlocking pre-judgment model can be obtained through modeling in a hard coding mode or a machine learning mode.
S404: the user device detects a historical unlocking event.
In this embodiment of the present application, the detecting a historical unlocking event includes: historical unlocking information entered by the user device is detected. The unlocking information comprises, but is not limited to, one or more of face information, iris information, fingerprint information acquired by the user equipment and password verification information input by the user equipment.
S405: the user device sends the historical unlocking event to the server.
In this embodiment of the present application, the sending the target unlocking event to the server includes: and sending the detected historical unlocking information input through the user equipment to a server.
S406: the server obtains an unlocking data set.
In the embodiment of the application, the user equipment sends the detected relevant information of the historical unlocking event to the server, and the server performs unlocking processing on the historical unlocking event to obtain the unlocking data set.
Wherein the unlocking data set comprises unlocking data of one or more historical unlocking events; the unlocking data of the historical unlocking event comprises: at least one of an unlocking result corresponding to the unlocking process of the historical unlocking event or unlocking time information corresponding to the unlocking process of the historical unlocking event is executed. The unlocking data may be described in step S402, which is not described herein.
S407: and the server inputs the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type.
In this embodiment, the historical unlocking event is detected before the target unlocking event. The historical unlocking events that have been detected may reflect, to some extent, the security that the target unlocking event has not been detected. The pre-judging unlocking type is obtained by pre-judging the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event. The pre-determined unlocking type comprises an abnormal unlocking type and a non-abnormal unlocking type. The abnormal unlocking type and the non-abnormal unlocking type can be referred to the description of step S401, and will not be described herein.
S408: and when the user equipment detects the target unlocking event, the user equipment sends the target unlocking event to the server.
In this embodiment of the present application, the detecting a target unlocking event includes: unlocking information input through the user equipment is detected. The unlocking information comprises, but is not limited to, one or more of face information, iris information, fingerprint information acquired by the user equipment and password verification information input by the user equipment.
The sending the target unlocking event to the server comprises the following steps: and sending the detected unlocking information input through the user equipment to a server.
S409: and the server determines an unlocking mode according to the pre-judging unlocking type, and performs unlocking treatment on the target unlocking event through the determined unlocking mode to obtain an unlocking result.
In this embodiment of the present application, if the predetermined unlocking type is an abnormal unlocking type, the server performs unlocking processing on the target unlocking event in a first unlocking manner. In this embodiment of the present application, the abnormal unlocking type may be further subdivided into abnormal unlocking types with different severity degrees, for example: the abnormal unlocking types comprise a first abnormal unlocking type with higher severity, a second abnormal unlocking type with moderate severity, a third abnormal unlocking type with lower severity and the like.
In this embodiment of the present application, if the predetermined unlocking type is a non-abnormal unlocking type, the server performs unlocking processing on the target unlocking event in a second unlocking manner.
In this embodiment of the present application, the security level of the first unlocking mode is higher than the security level of the second unlocking mode. The first unlocking mode is an unlocking processing mode with relatively higher security level, possibly having higher complexity of unlocking processing, and needing more time delay and expense to ensure the security of executing the unlocking processing of the target unlocking event. The second unlocking mode is an unlocking processing mode with a relatively low security level, and may have low complexity of unlocking processing, and needs less time delay and cost.
For example, in an application scenario of face unlocking, the first unlocking mode may be a face authentication algorithm with higher complexity, and has lower tolerance to the gesture, definition and illumination condition of the collected face information; the second unlocking mode can be a face authentication algorithm with higher complexity, and the tolerance to the gesture, the definition degree and the illumination condition of the acquired face information is higher; the calculation speed of the unlocking processing of the target unlocking event is relatively slow through the first unlocking mode, but the accuracy and the safety of the unlocking processing are higher, illegal attacks can be effectively prevented, the speed of the processing of the target unlocking event through the second unlocking mode is relatively fast, and a user can have smoother unlocking experience.
In the embodiment of the present application, if the pre-determined unlocking type is an abnormal unlocking type, other countermeasures may be made according to the severity of the abnormal unlocking type. For example, if the pre-determined unlock type is a first abnormal unlock type with higher severity, the server may perform early warning operations, such as: generating and sending abnormal prompt information to the monitoring management center so that the monitoring management center can make reasonable response treatment according to the abnormal prompt information.
S410: and the server sends an unlocking result of the unlocking processing of the target unlocking event to the user equipment.
S411: and the user equipment executes unlocking operation according to an unlocking result of the unlocking processing executed on the target unlocking event.
For example, if the unlocking result of the unlocking process performed on the target unlocking event is a result of successful unlocking, the user equipment performs an unlocking operation, such as: and switching the interface of the user equipment from the screen locking state to the unlocking state, enabling an application program of the user equipment to enter a page allowed to execute touch operation, enabling an account page of the user equipment to enter a page allowed to view private information, and the like.
If the unlocking result of the unlocking process performed on the target unlocking event is the unlocking success or failure result, the number of continuous unlocking success or failure times can be accumulated, and when the accumulated number of continuous unlocking failure times reaches a preset threshold value, early warning operation is performed, for example: generating abnormal prompt information and sending the abnormal prompt information to the monitoring management center so that the monitoring management center can make reasonable coping according to the abnormal prompt information, for example: the user equipment sends out generated and sent out early warning prompt information which can be early warning voice or flashing early warning lamplight; and when the unlocking is successful, resetting the accumulated times of continuous unlocking failure.
It should be noted that one or more of steps S406, S407, S409 may be executed by the user equipment, and if step S407 is executed by the user equipment, the server sends the unlock pre-determination model to the user equipment after the unlock pre-determination model is established, or the user equipment invokes the unlock pre-determination model from the server in real time when there is a need to use the unlock pre-determination model; if the user equipment performs step S409, steps S408 and S410 are not required to be performed.
In the embodiment of the application, the obtained unlocking data set is input into an unlocking pre-judging model to pre-judge the unlocking type of the target unlocking event according to the unlocking data of the historical unlocking event, when the target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, the target unlocking event is unlocked through a first unlocking mode, and if the pre-judging unlocking type is a non-abnormal unlocking type, the target unlocking event is unlocked through a second unlocking mode with a security level lower than that of the first unlocking mode. Therefore, the security of the unlocking event can be accurately pre-judged, the unlocking mode for executing the unlocking process is adjusted according to the pre-judging result, the security and the efficiency of the unlocking process are effectively balanced, the security of the unlocking process on the unlocking event is pertinently improved, and the capability of the user equipment for resisting illegal unlocking attack is improved while the unlocking experience of the user is not influenced.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an unlocking device provided in an embodiment of the present application, and specifically as shown in fig. 5, the unlocking device includes: a storage device 501 and a processor 502; and the unlocking device may further comprise a data interface 503, a user interface 504. Connections between the various hardware may also be made through various types of buses.
Through the data interface 503, the unlocking device can interact data with other devices such as terminals and servers; the user interface 504 is configured to enable human-machine interaction between a user and the unlocking device; the user interface 504 may provide a touch display screen, physical keys, etc. to enable human-machine interaction between a user and the unlocking device.
The storage device 501 may include a Volatile Memory (RAM), such as a Random-Access Memory (RAM); the storage device 501 may also include a Non-Volatile Memory (Non-Volatile Memory), such as a Flash Memory (Flash Memory), a Solid-State Drive (SSD), etc.; the storage means 501 may also comprise a combination of memories of the kind described above.
The processor 502 may be a central processing unit (Central Processing Unit, CPU). The processor 502 may further include a hardware chip. The hardware chip may be an Application-specific integrated circuit (ASIC), a programmable logic device (Programmable Logic Device, PLD), or the like. The PLD may be a Field programmable gate array (Field-Programmable Gate Array, FPGA), general array logic (Generic Array Logic, GAL), or the like.
The storage means 501 is used for storing program codes;
the processor 502 is configured to obtain an unlock data set when the stored code is called; the unlocking data set comprises unlocking data of historical unlocking events;
inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode.
In one embodiment, the processor 502 is further configured to, when detecting a target unlocking event, unlock the target unlocking event in a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking mode is higher than the security level of the second unlocking mode.
In one embodiment, the historical unlocking event is detected before the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking event includes: and executing at least one of unlocking results or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlock prejudgement model is built according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first data set includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set includes unlocking data for a second associated unlocking event, the second associated unlocking event detected prior to the second unlocking event, the second unlocking event being of a type other than an abnormal unlocking type.
In one embodiment, the detecting a target unlock event includes:
unlocking information input through the user equipment is detected.
Referring to fig. 6, fig. 6 is a schematic structural diagram of another unlocking device provided in an embodiment of the present application, and specifically as shown in fig. 6, the unlocking device includes:
an unlocking module 601, configured to obtain an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
The pre-judging module 602 is configured to input the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
the unlocking module 601 is further configured to, when a target unlocking event is detected, unlock the target unlocking event in a first unlocking manner if the pre-determined unlocking type is an abnormal unlocking type.
In one embodiment, the unlocking module 601 is further configured to, when a target unlocking event is detected, unlock the target unlocking event in a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking mode is higher than the security level of the second unlocking mode.
In one embodiment, the historical unlocking event is detected before the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking event includes: and executing at least one of unlocking results or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlock prejudgement model is built according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first data set includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set includes unlocking data for a second associated unlocking event, the second associated unlocking event detected prior to the second unlocking event, the second unlocking event being of a type other than an abnormal unlocking type.
In one embodiment, the detecting a target unlock event includes:
unlocking information input through the user equipment is detected.
It should be noted that, the unlocking device described in fig. 5 and fig. 6 may be a user device or a server.
Accordingly, the embodiment of the present invention also provides a computer-readable storage medium for storing a computer program that causes a computer to execute the method described in any of the embodiments S201 to S203, S301, S302, S304 to S308, S401, S404, S405, S408, and S411. It should be understood that the computer storage medium herein may include a built-in storage medium in the smart terminal, and may include an extended storage medium supported by the smart terminal. The computer storage medium provides a storage space that stores an operating system of the intelligent terminal. Also stored in the memory space are one or more instructions, which may be one or more computer programs (including program code), adapted to be loaded and executed by the processor. The computer storage medium may be a high-speed RAM Memory or a Non-Volatile Memory (Non-Volatile Memory), such as at least one magnetic disk Memory; optionally, at least one computer storage medium remote from the processor may be present.
Accordingly, the embodiment of the present invention also provides a computer-readable storage medium for storing a computer program that causes a computer to execute the method described in any of the embodiments S201 to S203, S303, S402, S403, S406, S407, S409, S410. It should be understood that the computer storage medium herein may include a built-in storage medium in the smart terminal, and may include an extended storage medium supported by the smart terminal. The computer storage medium provides a storage space that stores an operating system of the intelligent terminal. Also stored in the memory space are one or more instructions, which may be one or more computer programs (including program code), adapted to be loaded and executed by the processor. The computer storage medium may be a high-speed RAM Memory or a Non-Volatile Memory (Non-Volatile Memory), such as at least one magnetic disk Memory; optionally, at least one computer storage medium remote from the processor may be present.
Correspondingly, the embodiment of the application provides a chip which is used for acquiring the unlocking data set; inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode;
Wherein the unlocking data set comprises unlocking data of historical unlocking events.
In an embodiment, when the target unlocking event is detected, if the predetermined unlocking type is a non-abnormal unlocking type, the chip is further configured to unlock the target unlocking event in a second unlocking manner.
In one embodiment, the security level of the first unlocking mode is higher than the security level of the second unlocking mode.
In one embodiment, the historical unlocking event is detected before the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking event includes: and executing at least one of unlocking results or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlock prejudgement model is built according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first data set includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
The second data set includes unlocking data for a second associated unlocking event, the second associated unlocking event detected prior to the second unlocking event, the second unlocking event being of a type other than an abnormal unlocking type.
In one embodiment, the detecting a target unlock event includes:
unlocking information input through the user equipment is detected.
It should be noted that, the chip may execute the relevant steps of the user equipment or the server in the foregoing method embodiment, and specifically, the implementation manner provided by each step may be referred to, which is not described herein again.
In one embodiment, the chip includes at least one processor, at least one first memory, and at least one second memory; wherein the at least one first memory and the at least one processor are interconnected by a circuit, and instructions are stored in the first memory; the at least one second memory and the at least one processor are interconnected by a line, where the second memory stores data to be stored in the embodiment of the method.
For each device and product applied to or integrated in the chip, each module contained in the device and product can be realized in a hardware mode such as a circuit, or at least part of the modules can be realized in a software program, the software program runs on a processor integrated in the chip, and the rest (if any) of the modules can be realized in a hardware mode such as a circuit.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a module apparatus according to an embodiment of the present application, where the module apparatus includes a memory module 701 and a chip module 702, and the memory module includes:
the storage module 701 is configured to store an unlock data set; the unlocking data set comprises unlocking data of historical unlocking events;
the chip module 702 is configured to input the unlock data set into an unlock pre-judgment model to obtain a pre-judgment unlock type; when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode.
In one embodiment, the chip module 702 is further configured to, when detecting a target unlocking event, unlock the target unlocking event in a second unlocking manner if the predetermined unlocking type is a non-abnormal unlocking type.
In one embodiment, the security level of the first unlocking mode is higher than the security level of the second unlocking mode.
In one embodiment, the historical unlocking event is detected before the target unlocking event.
In one embodiment, the unlocking data of the historical unlocking event includes: and executing at least one of unlocking results or unlocking time information corresponding to the unlocking processing of the historical unlocking event.
In one embodiment, the unlock prejudgement model is built according to a first data set and a second data set;
the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type.
In one embodiment, the first data set includes unlock data for a first associated unlock event, the first associated unlock event detected prior to the first unlock event, the first unlock event being of an abnormal unlock type;
the second data set includes unlocking data for a second associated unlocking event, the second associated unlocking event detected prior to the second unlocking event, the second unlocking event being of a type other than an abnormal unlocking type.
In one embodiment, the detecting a target unlock event includes:
unlocking information input through the user equipment is detected.
It should be noted that, the module device may execute the relevant steps of the user device or the server in the foregoing method embodiment, and specifically, the implementation manner provided by each step may be referred to, which is not described herein again.
For each device and product applied to or integrated in the chip module, each module included in the device and product may be implemented by hardware such as a circuit, and different modules may be located in the same component (e.g. a chip, a circuit module, etc.) of the chip module or different components, or at least some modules may be implemented by using a software program, where the software program runs on a processor integrated in the chip module, and the remaining (if any) modules may be implemented by hardware such as a circuit.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in or transmitted across a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., DVDs), or semiconductor media (e.g., solid State Disks (SSDs)), among others.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes or substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (7)

1. A method of unlocking a user device, the method comprising:
acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode; if the pre-judging unlocking type is a non-abnormal unlocking type, unlocking the target unlocking event in a second unlocking mode, wherein the security level of the first unlocking mode is higher than that of the second unlocking mode;
the unlocking pre-judging model is established according to a first data set and a second data set, wherein the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type; the first data set comprises unlocking data of a first associated unlocking event, the first associated unlocking event is detected before the first unlocking event, and the type of the first unlocking event is an abnormal unlocking type; the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type; the target unlocking event comprises one or more of password verification information input by the user equipment and biological information acquired by the user equipment; the historical unlocking event is detected before the target unlocking event; the unlocking data of the historical unlocking event comprises: and executing at least one of unlocking results and unlocking time information corresponding to the unlocking processing of the historical unlocking event.
2. The method of claim 1, wherein the detecting a target unlock event comprises:
unlocking information input through the user equipment is detected.
3. An unlocking device, characterized in that the unlocking device comprises: a memory device and a processor, wherein the memory device is configured to store data,
the storage device is used for storing program codes;
the processor, when invoking the program code, is configured to perform the unlocking method of the user equipment according to claim 1 or 2.
4. An unlocking device, characterized in that the unlocking device comprises:
the unlocking module is used for acquiring an unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the pre-judging module is used for inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type;
the unlocking module is further used for unlocking the target unlocking event in a first unlocking mode if the pre-judging unlocking type is an abnormal unlocking type when the target unlocking event is detected; if the pre-judging unlocking type is a non-abnormal unlocking type, unlocking the target unlocking event in a second unlocking mode, wherein the security level of the first unlocking mode is higher than that of the second unlocking mode;
The unlocking pre-judging model is established according to a first data set and a second data set, wherein the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type; the first data set comprises unlocking data of a first associated unlocking event, the first associated unlocking event is detected before the first unlocking event, and the type of the first unlocking event is an abnormal unlocking type; the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type; the target unlocking event comprises one or more of password verification information input by the user equipment and biological information acquired by the user equipment; the historical unlocking event is detected before the target unlocking event; the unlocking data of the historical unlocking event comprises: and executing at least one of unlocking results and unlocking time information corresponding to the unlocking processing of the historical unlocking event.
5. A computer readable storage medium for storing a computer program which, when executed by a processor, causes the computer to perform the method of unlocking a user equipment according to claim 1 or 2.
6. The chip is characterized by comprising a processor and a memory, wherein the memory and the processor are interconnected through a circuit, and instructions are stored in the memory;
the processor, when invoking the instructions, is configured to perform the method of claim 1 or 2.
7. A modular device comprising a memory module and a chip module, wherein:
the storage module is used for storing the unlocking data set; the unlocking data set comprises unlocking data of historical unlocking events;
the chip module is used for inputting the unlocking data set into an unlocking pre-judging model to obtain a pre-judging unlocking type; when a target unlocking event is detected, if the pre-judging unlocking type is an abnormal unlocking type, unlocking the target unlocking event in a first unlocking mode; if the pre-judging unlocking type is a non-abnormal unlocking type, unlocking the target unlocking event in a second unlocking mode, wherein the security level of the first unlocking mode is higher than that of the second unlocking mode;
the unlocking pre-judging model is established according to a first data set and a second data set, wherein the first data set corresponds to an abnormal unlocking type, and the second data set corresponds to a non-abnormal unlocking type; the first data set comprises unlocking data of a first associated unlocking event, the first associated unlocking event is detected before the first unlocking event, and the type of the first unlocking event is an abnormal unlocking type; the second data set comprises unlocking data of a second associated unlocking event, the second associated unlocking event is detected before the second unlocking event, and the type of the second unlocking event is a non-abnormal unlocking type; the target unlocking event comprises one or more of password verification information input by the user equipment and biological information acquired by the user equipment; the historical unlocking event is detected before the target unlocking event; the unlocking data of the historical unlocking event comprises: and executing at least one of unlocking results and unlocking time information corresponding to the unlocking processing of the historical unlocking event.
CN202110129264.7A 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment Active CN112905964B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110129264.7A CN112905964B (en) 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110129264.7A CN112905964B (en) 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment

Publications (2)

Publication Number Publication Date
CN112905964A CN112905964A (en) 2021-06-04
CN112905964B true CN112905964B (en) 2023-05-09

Family

ID=76121630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110129264.7A Active CN112905964B (en) 2021-01-29 2021-01-29 Unlocking method for user equipment, storage medium, chip and related equipment

Country Status (1)

Country Link
CN (1) CN112905964B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107145212B (en) * 2017-04-12 2019-09-06 Oppo广东移动通信有限公司 Terminal unlock method, device and terminal
CN107194240B (en) * 2017-06-29 2020-01-31 中国联合网络通信集团有限公司 Screen unlocking method and device
CN107491672B (en) * 2017-07-18 2021-01-22 Oppo广东移动通信有限公司 Unlocking processing method and related product
CN107451449B (en) * 2017-07-21 2020-03-17 Oppo广东移动通信有限公司 Biometric unlocking method and related product
CN108363915A (en) * 2018-02-08 2018-08-03 广东欧珀移动通信有限公司 unlocking method, mobile terminal and computer readable storage medium
CN108537019A (en) * 2018-03-20 2018-09-14 努比亚技术有限公司 A kind of unlocking method and device, storage medium
CN111708998A (en) * 2020-04-30 2020-09-25 华为技术有限公司 Face unlocking method and electronic equipment
CN111949963A (en) * 2020-08-04 2020-11-17 中国联合网络通信集团有限公司 Terminal device unlocking method, terminal device and computer readable storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product

Also Published As

Publication number Publication date
CN112905964A (en) 2021-06-04

Similar Documents

Publication Publication Date Title
AU2019221570B2 (en) Asset management method and apparatus, and electronic device
AU2019222729B2 (en) Asset management method and apparatus, and electronic device
JP7182924B2 (en) Mobile security measures
US20210286870A1 (en) Step-Up Authentication
US11256793B2 (en) Method and device for identity authentication
CN110651270B (en) Data access method and device
KR101552587B1 (en) Location-based access control for portable electronic device
KR101637107B1 (en) Orientation aware authentication on mobile platforms
US20150040193A1 (en) Physical Interaction Style Based User Authentication for Mobile Computing Devices
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
CN107808127A (en) Face identification method and Related product
CN107862194A (en) A kind of method, device and mobile terminal of safety verification
WO2016046458A1 (en) Smartphone or tablet having a secure display
CN112653679B (en) Dynamic identity authentication method, device, server and storage medium
CN107786349B (en) Security management method and device for user account
CN112905964B (en) Unlocking method for user equipment, storage medium, chip and related equipment
CN114341843A (en) Safety protection method and device, mobile terminal and storage medium
CN107704737A (en) Method, apparatus, mobile terminal and the computer-readable recording medium of safety verification
CN108286387B (en) Method and device for preventing violent door opening
CN112671979A (en) Terminal anti-theft method and device
US20230134511A1 (en) Apparatus and methods for automating password generators
CN111010478B (en) Mobile terminal protection method, device and system
CN109800548A (en) A kind of method and apparatus preventing leakage of personal information
Dubey et al. A hybrid authentication system for websites on mobile browsers
CN116933236A (en) Application operation management and authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant