CN114158051A - Unlocking method and device, electronic equipment and computer readable storage medium - Google Patents

Unlocking method and device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN114158051A
CN114158051A CN202111443383.6A CN202111443383A CN114158051A CN 114158051 A CN114158051 A CN 114158051A CN 202111443383 A CN202111443383 A CN 202111443383A CN 114158051 A CN114158051 A CN 114158051A
Authority
CN
China
Prior art keywords
terminal
unlocking
password
preset
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111443383.6A
Other languages
Chinese (zh)
Other versions
CN114158051B (en
Inventor
吴蓓
邹仕洪
张广伟
周宏斌
张炯明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuanxin Information Technology Group Co ltd
Original Assignee
Yuanxin Information Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yuanxin Information Technology Group Co ltd filed Critical Yuanxin Information Technology Group Co ltd
Priority to CN202111443383.6A priority Critical patent/CN114158051B/en
Publication of CN114158051A publication Critical patent/CN114158051A/en
Application granted granted Critical
Publication of CN114158051B publication Critical patent/CN114158051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning

Abstract

The embodiment of the application provides an unlocking method, an unlocking device, electronic equipment and a computer-readable storage medium, and relates to the field of mobile communication. The method comprises the following steps: sending a remote unlocking request to a server, and receiving a first unlocking password fed back by the server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal; and then, according to a preset private key and a second preset random number, decrypting the first unlocking password to obtain a first unlocking password, and further carrying out unlocking processing according to the preset unlocking password and the first unlocking password. The embodiment of the application realizes remote unlocking of the terminal equipment, and is simple, quick and high in reliability.

Description

Unlocking method and device, electronic equipment and computer readable storage medium
Technical Field
The present application relates to the field of mobile communication technologies, and in particular, to an unlocking method, an unlocking apparatus, an electronic device, and a computer-readable storage medium.
Background
Mobile Device management, also known as mdm (mobile Device management), performs complete full-life cycle management on mobile devices from various links of Device registration, activation, use, and elimination. Mobile device management can implement user and device management, configuration management, security management, asset management, and other functions.
Remote control unlocking of the terminal device also belongs to the scope of mobile device management. Currently, in order to protect personal information and property security of a user, almost all terminal devices can be set with an unlocking password by the user in a self-defined manner. However, situations occur when the user forgets the password, especially for memory-impaired people, such as the elderly, which is more common.
In order to solve the problem of unlocking failure of the terminal device, for example, unlocking failure is caused by 'forgetting a password', in the prior art, unlocking is usually performed by setting a secondary password or short message verification and the like. The mode of setting the secondary password still depends on the memory of the user and is not friendly to the memory vulnerable group; and the short message verification and other modes require a large amount of prepositive verification operation, are relatively complicated, have poor use experience of a user, and even cannot be implemented in many scenes.
Disclosure of Invention
The purpose of the embodiment of the application is to solve the problem that the unlocking operation of the terminal equipment is complex under the condition that a user forgets a password.
According to an aspect of an embodiment of the present application, there is provided an unlocking method applied to a first terminal, the method including:
sending a remote unlocking request to a server;
receiving a first unlocking password fed back by a server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password;
and carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
Optionally, before sending the remote unlocking request to the server, the method includes:
sending first request information to a server, wherein the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, before sending the first request message to the server, the method includes:
acquiring identification information of a management group and generating a public and private key pair; the public and private key pair includes a preset public key and a preset private key.
According to another aspect of the embodiments of the present application, there is provided an unlocking method applied to a server, the method including:
receiving a remote unlocking request sent by a first terminal;
responding to a remote unlocking request, sending a password acquisition request to a second terminal, and instructing the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and receiving a first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal, and instructing the first terminal to perform unlocking processing according to the first unlocking password.
Optionally, before receiving the remote unlocking request sent by the first terminal, the method includes:
receiving first request information sent by a first terminal, sending the first request information to a second terminal, and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, before receiving the first request information sent by the first terminal, the method includes:
receiving second request information sent by a second terminal; the second request information indicates that the second terminal requests to create a management group;
and feeding back the management group creation indication information to the second terminal to indicate the second terminal to generate the identification information of the management group.
According to another aspect of the embodiments of the present application, there is provided an unlocking method applied to a second terminal, the method including:
receiving a password acquisition request sent by a server;
in response to the password acquisition request, encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and sending the first unlocking password to the server, and indicating the server to send the first unlocking password to the first terminal.
According to another aspect of embodiments of the present application, there is provided an unlocking apparatus including:
the first sending module is used for sending a remote unlocking request to the server;
the first receiving module is used for receiving a first unlocking password fed back by the server; the first unlocking password is obtained from a second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
the decryption module is used for decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password;
and the unlocking module is used for unlocking according to a preset unlocking password and the first unlocking password.
Optionally, the apparatus further comprises:
the first request module is used for sending first request information to the server, and the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the acquisition module is used for acquiring the identification information of the management group and generating a public and private key pair; the public and private key pair includes a preset public key and a preset private key.
According to another aspect of embodiments of the present application, there is provided an unlocking apparatus including:
the second receiving module is used for receiving a remote unlocking request sent by the first terminal;
the second sending module is used for responding to the remote unlocking request, sending a password obtaining request to a second terminal, and indicating the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and the indicating module is used for receiving the first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal and indicating the first terminal to carry out unlocking processing according to the first unlocking password.
Optionally, the apparatus further comprises:
the first request receiving module is used for receiving first request information sent by a first terminal, sending the first request information to a second terminal and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the second request receiving module is used for receiving second request information sent by a second terminal; the second request information indicates that the second terminal requests to create a management group;
and the creation indicating module is used for feeding back the management group creation indicating information to the second terminal and indicating the second terminal to generate the identification information of the management group.
According to another aspect of embodiments of the present application, there is provided an unlocking apparatus including:
the third receiving module is used for receiving a password obtaining request sent by the server;
the encryption module is used for responding to the password acquisition request, and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and the third sending module is used for sending the first unlocking password to the server and indicating the server to send the first unlocking password to the first terminal.
According to another aspect of embodiments of the present application, there is provided an electronic device, which includes a memory, a processor and a computer program stored on the memory, wherein the processor executes the computer program to implement the steps of the unlocking method of any one of the above aspects.
According to yet another aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the unlocking method of any of the above aspects.
According to an aspect of embodiments of the present application, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the steps of the unlocking method of any of the above aspects.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
the remote unlocking method has the advantages that the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are realized, and the reliability is high.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a flowchart illustrating an unlocking method applied to a first terminal according to an embodiment of the present disclosure;
fig. 2 is a second flowchart of an unlocking method applied to a first terminal according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of an unlocking method applied to a server according to an embodiment of the present application;
fig. 4 is a schematic flowchart of an unlocking method applied to a second terminal according to an embodiment of the present disclosure;
fig. 5 is a schematic view of an application scenario of an unlocking method according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an unlocking device according to an embodiment of the present disclosure;
fig. 7 is a second schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 8 is a third schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 9 is a schematic structural diagram of an unlocked electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below in conjunction with the drawings in the present application. It should be understood that the embodiments set forth below in connection with the drawings are exemplary descriptions for explaining technical solutions of the embodiments of the present application, and do not limit the technical solutions of the embodiments of the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be further understood that the terms "comprises" and/or "comprising," when used in this specification in connection with embodiments of the present application, specify the presence of stated features, information, data, steps, operations, elements, and/or components, but do not preclude the presence or addition of other features, information, data, steps, operations, elements, components, and/or groups thereof, as embodied in the art. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein indicates at least one of the items defined by the term, e.g., "a and/or B" may be implemented as "a", or as "B", or as "a and B".
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The technical solutions of the embodiments of the present application and the technical effects produced by the technical solutions of the present application will be described below through descriptions of several exemplary embodiments. It should be noted that the following embodiments may be referred to, referred to or combined with each other, and the description of the same terms, similar features, similar implementation steps and the like in different embodiments is not repeated.
First, a few terms are introduced and explained in relation to the embodiments of the present application:
password (password): the tool corresponding to the user name and used for verifying whether the user name has the corresponding authority can be in various forms such as numbers, characters, graphs and the like. Password is often called as "password" in daily life, but strictly speaking it should be called as "password". In the technical scheme of the application, if the password is encrypted, the password is called as a password.
Public and private key pair: a public-private key pair is a key pair obtained by an algorithm, and includes a public key and a private key. The key that is disclosed to the outside is called a public key, and the key that is reserved by the user is called a private key. The public and private key pair obtained by the algorithm can be guaranteed to be unique worldwide. If one of the keys is used to encrypt a piece of data, then the other key must be used for decryption. For example, encrypting data using a public key necessitates the use of a private key to decrypt the data, otherwise decryption will not succeed.
salt: in password protection techniques, salt is a random data string used to modify a password hash. The random value that the system uses to combine with the user password when the user registers is called the salt value, and is usually called the salt value. By processing the password by adding a salt value, even if the original password set by the user is the same, the ciphertext corresponding to the original password is different. Adding a salt to the password hash may also prevent an attacker from using dictionary words to verify the entire system, and thus may also make it difficult for an attacker attacking the system to implement a password hash matching strategy using the salt.
An embodiment of the present application provides an unlocking method, which is applied to a first terminal and includes:
step S101, a remote unlocking request is sent to a server.
The first terminal is an electronic device such as a mobile terminal device used by a user, for example, a notebook, a mobile phone, a tablet computer, and the like.
When the user forgets to unlock the password using the first terminal, a remote unlocking request may be transmitted to the server through a specific trigger operation. The unlocking password may be a screen locking password, a login password of an application program, or the like, and is not limited thereto.
Specifically, the remote unlocking request is sent to the server through a specific trigger operation, and it can be understood that if the number of errors of inputting the unlocking password by the user is too large, the remote unlocking request is automatically sent to the server through triggering, or the user manually clicks a key such as "forget password" to send the remote unlocking request to the server.
Step S102, receiving a first unlocking password fed back by a server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting the preset unlocking password of the first terminal by the second terminal according to the preset public key and the first preset random number of the first terminal.
After the user uses the first terminal to send a remote unlocking request to the server, the user waits for the server to return the first unlocking password. The first unlocking password is obtained from a second terminal corresponding to the first terminal after the server receives a remote unlocking request of the first terminal.
The second terminal is an electronic device such as a mobile terminal device for remotely controlling and unlocking the first terminal. The second terminal may be a mobile terminal device owned by the user itself, or may be a mobile terminal device owned by another person, such as a parent, a leader, or a friend of the user.
The remote control relationship between the first terminal and the second terminal needs to be established in advance. In the embodiment of the application, the first terminal and the second terminal can join the same remote management group, so that a remote control relationship is established.
The remote management group is an implementation form of mobile device management, and one remote management group comprises one manager terminal and at least one manager terminal. The manager terminal prestores preset unlocking passwords of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical applications, one mobile terminal device may also join a plurality of remote management groups, which is not limited to this.
It can be understood that, in the embodiment of the present application, the first terminal is a managed terminal, and the second terminal is a manager terminal.
After receiving the remote unlocking request of the first terminal, the server acquires the first unlocking password from the second terminal and forwards the first unlocking password to the first terminal.
Specifically, the second terminal encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key of the first terminal and the first preset random number to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The preset public key is generated by the first terminal, is prestored on the second terminal and is used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and is used for decrypting the unlocking password.
The first preset random number can be a salt value, and the second terminal adds the first preset random number when the preset public key is used for encrypting the preset unlocking password, so that the safety of the first unlocking password is improved, and the repeated prevention and cracking prevention are guaranteed.
And S103, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password.
After receiving the first unlocking password fed back by the server, the first terminal decrypts the first unlocking password according to the pre-stored preset private key and the second preset random number to obtain the first unlocking password.
And the preset private key is matched with a preset public key prestored in the second terminal. The second predetermined random number is also a salt value.
It should be noted that the process of decrypting the first unlock password is implemented inside the first device, and the whole decryption process is transparent to the user, and does not require any operation by the user.
And step S104, carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
And the first terminal matches the first unlocking password obtained by decryption with a pre-stored preset unlocking password, and if the first unlocking password is successfully matched with the pre-stored preset unlocking password, the first unlocking password is correct, so that the first terminal is unlocked.
The unlocking method provided by the embodiment of the application is applied, a remote unlocking request is sent to the server, and a first unlocking password fed back by the server is received; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and unlocking according to the preset unlocking password and the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
An unlocking method is provided in an embodiment of the present application, and as shown in fig. 2, the method is applied to a first terminal, and includes:
step 201, acquiring identification information of a management group, and generating a public and private key pair; the public and private key pair includes a preset public key and a preset private key.
The first terminal is an electronic device such as a mobile terminal device used by a user, for example, a notebook, a mobile phone, a tablet computer, and the like.
The management group is a remote management group of the mobile terminal equipment, and one remote management group comprises a manager terminal and at least one manager terminal. The manager terminal prestores preset unlocking passwords of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical applications, one mobile terminal device may also join a plurality of remote management groups, which is not limited to this.
It can be understood that, in the embodiment of the present application, the first terminal is a managed terminal, and the second terminal is a manager terminal.
The first terminal acquires the identification information of the remote management group and joins the corresponding remote management group based on the identification information.
Wherein, the identification information can be expressed as two-dimension code information. For example, in a case where the first terminal is close to the second terminal in physical distance, the user may use the first terminal to scan the two-dimensional code information of the remote management group displayed by the second terminal, so as to join the remote management group managed by the second terminal. Under the condition that the first terminal and the second terminal are far away from each other in physical distance, the user can also use the first terminal to scan the two-dimensional code information of the remote management group sent by the second terminal and join the remote management group. Obviously, the user may also use the first terminal to scan the two-dimensional code information of the remote management group provided by other managed terminals in the remote management group managed by the second terminal, which is not limited herein.
The first terminal determines to join the management group when acquiring the identification information of the management group, and automatically generates a public and private key pair, namely a preset public key and a preset private key. Each public-private key pair of mobile terminal devices joining the remote management group is unique.
Step S202, sending first request information to a server, wherein the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
The first terminal acquires identification information of a remote management group and generates a unique public and private key pair, and then sends first request information to the server. Wherein the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
The first request information carries a preset public key generated by the first terminal, and the server forwards the preset public key to the second terminal and indicates the second terminal to store the preset public key.
The first request information is illustratively:
{msgtype:joininGroup,remoteMngGroup:remoteMngGroupid,member:B,publickey:publickeyB}。
step S203, a remote unlocking request is sent to the server.
When the user forgets to unlock the password using the first terminal, a remote unlocking request may be sent to the server through a specific trigger operation. The unlocking password may be a screen locking password, a login password of an application program, or the like, and is not limited thereto.
In a preferred embodiment of the present application, step S203 includes:
and sending a remote unlocking request to the server when detecting that the input error times of the unlocking password exceed a preset threshold value.
Specifically, the remote unlocking request is sent to the server through a specific triggering operation, which can be understood as that when the first terminal detects that the number of errors of the unlocking password input by the user is too large and the number of errors exceeds a preset threshold value, the remote unlocking request is automatically triggered to be sent to the server, or a key for sending the remote unlocking request is displayed to the user. The preset threshold value can be customized and set on the first terminal by a user.
The remote unlocking request is illustratively:
{msgtype:remoteUnlockReq,remoteMngGroup:remoteMngGroupid,member:B}。
step S204, receiving a first unlocking password fed back by the server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting the preset unlocking password of the first terminal by the second terminal according to the preset public key and the first preset random number of the first terminal.
After the user uses the first terminal to send a remote unlocking request to the server, the user waits for the server to return the first unlocking password. The first unlocking password is obtained from the corresponding second terminal after the server receives the remote unlocking request of the first terminal.
The second terminal is an electronic device such as a mobile terminal device for remotely controlling and unlocking the first terminal. The second terminal may be a mobile terminal device owned by the user itself, or may be a mobile terminal device owned by another person, such as a parent, a leader, or a friend of the user.
The remote control relationship between the first terminal and the second terminal needs to be established in advance. In the embodiment of the application, the first terminal and the second terminal can join the same remote management group, so that a remote control relationship is established.
After receiving the remote unlocking request of the first terminal, the server indicates the second terminal to carry out remote control unlocking on the first terminal based on the remote unlocking request, obtains a first unlocking password from the second terminal and forwards the first unlocking password to the first terminal.
Specifically, the second terminal encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key of the first terminal and the first preset random number to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The preset public key is generated by the first terminal, is prestored on the second terminal and is used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and is used for decrypting the unlocking password.
The first preset random number can be a salt value, the second terminal encrypts the preset unlocking password by adopting the preset public key, and the first preset random number is added during encryption, so that the safety of the first unlocking password is improved, and repeated prevention and cracking prevention are guaranteed.
The second terminal sends the encrypted preset unlocking password, namely the first unlocking password, to the first terminal through the server instead of directly sending the preset unlocking password to the first terminal, so that the safety of the unlocking password in the transmission process is effectively ensured.
The server is only responsible for forwarding data for the first terminal and the second terminal in the remote control unlocking process, the specific encryption and decryption processes are completed on the mobile terminal equipment, and the password or the password cannot be analyzed on the server, so that the reliability of remote control unlocking is guaranteed to the greatest extent.
The first unlocking code is illustrated as:
{msgtype:remoteUnlockCmd,remoteMngGroup:remoteMngGroupid,member:B,salt:randomsalt,remoteKey:publickey(password+randomsalt)}。
step S205, according to the preset private key and the second preset random number, the first unlocking password is decrypted to obtain the first unlocking password.
After receiving the first unlocking password fed back by the server, the first terminal decrypts the first unlocking password according to the pre-stored preset private key and the second preset random number to obtain the first unlocking password.
The preset private key is matched with a preset public key prestored in the second terminal, and the second preset random number is also a salt value.
And step S206, carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
And the first terminal matches the first unlocking password obtained by decryption with a pre-stored preset unlocking password, and if the first unlocking password is successfully matched with the pre-stored preset unlocking password, the first unlocking password is correct, so that the first terminal is unlocked.
It should be noted that the process of decrypting the first unlock password is implemented inside the first device, and the whole decryption process is transparent to the user, and does not require any operation by the user.
By applying the unlocking method provided by the embodiment of the application, the identification information of the management group is obtained, and a public and private key pair is generated; the public and private key pair comprises a preset public key and a preset private key, and first request information is sent to the server, wherein the preset public key is carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal, sends a remote unlocking request to the server, and receives a first unlocking password fed back by the server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and unlocking according to the preset unlocking password and the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
An unlocking method is provided in an embodiment of the present application, and as shown in fig. 3, the method is applied to a server, and includes:
step S301, receiving second request information sent by a second terminal; the second request information indicates that the second terminal requests creation of the management group.
And the server receives second request information sent by the second terminal, wherein the second request information indicates that the second terminal requests to create the management group.
The management group is a remote management group of the mobile terminal equipment, and one remote management group comprises a manager terminal and at least one manager terminal. The manager terminal prestores preset unlocking passwords of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical applications, one mobile terminal device may also join a plurality of remote management groups, which is not limited to this.
It can be understood that, in the embodiment of the present application, the first terminal is a managed terminal, and the second terminal is a manager terminal.
Step S302, feeding back the management group creation instruction information to the second terminal, and instructing the second terminal to create the identification information of the management group.
And after receiving the second request information, the server feeds back management group creation indication information to the second terminal. Wherein the management group creation instruction information instructs the second terminal to generate the identification information of the management group.
The management group creation indication information carries identity information of the management group, such as an identity identification number ID. And the second terminal generates the identification information of the management group based on the identity information carried in the management group creation indication information.
The management group creation instruction information is illustratively:
{msgtype:createGroup,remoteMngGroup:remoteMngGroupid,manager:A}。
step S303, receiving first request information sent by a first terminal, sending the first request information to a second terminal, and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
After the second terminal successfully creates the remote management group, any mobile terminal device can join the remote management group based on the identification information of the management group. For example, in this embodiment, the first terminal may obtain identification information of a management group managed by the second terminal, and send the first request information to the server based on the identification information.
Correspondingly, the server receives the first request information sent by the first terminal and forwards the first request information to the second terminal.
Wherein the first request information indicates that the first terminal requests to join a management group managed by the second terminal. The first request message carries a unique preset public key of the first terminal, and the preset public key is used for the second terminal to encrypt the unlocking password.
The first request information is illustratively:
{msgtype:joininGroup,remoteMngGrou:remoteMngGroupid,member:B,publickey:publickeyB}。
step S304, receiving a remote unlocking request sent by the first terminal.
The first terminal and the second terminal establish a remote control relationship based on a remote management group. And when the user forgets the unlocking password by using the first terminal, sending a remote unlocking request to the server. Accordingly, the server receives the remote unlocking request.
The remote unlocking request is illustratively:
{msgtype:remoteUnlockReq,remoteMngGroup:remoteMngGroupid,member:B}。
step S305, responding to the remote unlocking request, sending a password acquisition request to the second terminal, and instructing the second terminal to encrypt a preset unlocking password of the first terminal according to the preset public key and the first preset random number of the first terminal to obtain a first unlocking password.
The server responds to the remote unlocking request of the first terminal, sends a password obtaining request to the second terminal, and instructs the second terminal to feed back the first unlocking password.
Specifically, the password acquisition request instructs the second terminal to encrypt a pre-stored preset unlocking password according to a pre-stored preset public key corresponding to the first terminal.
The second terminal encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key of the first terminal and the first preset random number to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The preset public key is generated by the first terminal, is prestored on the second terminal and is used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and is used for decrypting the unlocking password.
The first preset random number can be a salt value, the second terminal encrypts the preset unlocking password by adopting the preset public key, and the first preset random number is added during encryption, so that the safety of the first unlocking password is improved, and repeated prevention and cracking prevention are guaranteed.
The first unlocking code is illustrated as:
{msgtype:remoteUnlockCmd,remoteMngGroup:remoteMngGroupid,member:B,salt:randomsalt,remoteKey:publickey(password+randomsalt)}。
and S306, receiving a first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal, and indicating the first terminal to perform unlocking processing according to the first unlocking password.
And the server receives the first unlocking password fed back by the second terminal, forwards the first unlocking password to the first terminal and instructs the first terminal to unlock.
The second terminal sends the encrypted preset unlocking password, namely the first unlocking password, to the first terminal through the server instead of directly sending the preset unlocking password to the first terminal, so that the safety of the unlocking password in the transmission process is effectively ensured.
The server is only responsible for forwarding data for the first terminal and the second terminal in the remote control unlocking process, the specific encryption and decryption processes are completed on the mobile terminal equipment, and the password or the password cannot be analyzed on the server, so that the reliability of remote control unlocking is guaranteed to the greatest extent.
Receiving second request information sent by a second terminal by applying the unlocking method provided by the embodiment of the application; the second request information indicates the second terminal to request to create the management group, the management group creation indication information is fed back to the second terminal, the second terminal is indicated to generate identification information of the management group, the first request information sent by the first terminal is received, the first request information is sent to the second terminal, and the second terminal is indicated to store a preset public key carried in the first request information; the first request information indicates that a first terminal requests to join a management group managed by a second terminal, receives a remote unlocking request sent by the first terminal, responds to the remote unlocking request, sends a password obtaining request to the second terminal, indicates that the second terminal encrypts a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password, receives the first unlocking password fed back by the second terminal, sends the first unlocking password to the first terminal, and indicates that the first terminal carries out unlocking processing according to the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
An unlocking method is provided in an embodiment of the present application, and as shown in fig. 4, the method is applied to a second device, and includes:
step S401, sending second request information to a server; the second request information indicates that the second terminal requests creation of the management group.
The second terminal sends second request information to the server, wherein the second request information indicates that the second terminal requests to create the management group.
The management group is a remote management group of the mobile terminal equipment, and one remote management group comprises a manager terminal and at least one manager terminal. The manager terminal prestores preset unlocking passwords of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical applications, one mobile terminal device may also join a plurality of remote management groups, which is not limited to this.
It can be understood that, in the embodiment of the present application, the first terminal is a managed terminal, and the second terminal is a manager terminal.
Step S402, receiving management group creation instruction information fed back by the server, and generating identification information of the management group.
And after the second terminal sends the second request information to the server, receiving management group creation indication information fed back by the server.
Wherein the management group creation instruction information instructs the second terminal to generate the identification information of the management group. The management group creation indication information carries identity information of the management group, such as an identity identification number ID. The second terminal generates identification information of the management group based on the identity information of the management group.
The management group creation instruction information is illustratively:
{msgtype:createGroup,remoteMngGroup:remoteMngGroupid,manager:A}。
in step S403, a password acquisition request sent by the server is received.
After the second terminal successfully creates the remote management group, any mobile terminal device can join the remote management group based on the identification information of the management group. For example, in this embodiment, the first terminal may obtain identification information of a management group managed by the second terminal, and send the first request information to the server based on the identification information.
And the server sends a password acquisition request to the second terminal based on the first request information, and instructs the second terminal to feed back the first unlocking password.
Correspondingly, the second terminal receives the password acquisition request of the server.
Step S404, responding to the password obtaining request, and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password.
And the second terminal responds to the password acquisition request, and encrypts a pre-stored preset unlocking password of the first terminal according to the pre-stored preset public key of the first terminal and the first preset random number to obtain a first unlocking password.
The preset public key is generated by the first terminal, is prestored on the second terminal and is used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and is used for decrypting the unlocking password.
The first preset random number can be a salt value, and the second terminal encrypts the preset unlocking password by adopting the preset public key and adds the first preset random number, so that the safety of the first unlocking password is improved, and the repeated prevention and cracking prevention are ensured.
The first unlocking code is illustrated as:
{msgtype:remoteUnlockCmd,remoteMngGroup:remoteMngGroupid,member:B”,salt:randomsalt,remoteKey:publickey(password+randomsalt)}。
step S405, sending the first unlocking password to the server, and indicating the server to send the first unlocking password to the first terminal.
And sending the first unlocking password to the server, and instructing the server to forward the first unlocking password to the first terminal. Further, the first terminal carries out unlocking processing according to the first unlocking password.
The unlocking method provided by the embodiment of the application is applied, and second request information is sent to the server; the second request information indicates a second terminal to request for creating a management group, receives management group creation indication information fed back by a server, generates identification information of the management group, receives a password acquisition request sent by the server, encrypts a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal in response to the password acquisition request to obtain a first unlocking password, sends the first unlocking password to the server, and indicates the server to send the first unlocking password to the first terminal.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
An application scenario of the unlocking method is provided in the embodiment of the present application, and as shown in fig. 5, the application scenario includes:
firstly, establishing a remote control relation between a first terminal and a second terminal.
The second terminal sends second request information to the server to request for establishing the remote management group of the mobile terminal equipment, and the server feeds back management group establishment indication information to the second terminal based on the second request information to indicate the second terminal to generate identification information of the management group.
The method comprises the steps that a first terminal obtains identification information of a management group, generates a corresponding public and private key pair, sends first request information carrying a preset public key to a server, requests to join a remote management group managed by a second terminal, and the server feeds back an establishment result of a remote control relation between the first terminal and the second terminal to the first terminal and the second terminal based on the first request information and sends the preset public key generated by the first terminal to the second terminal for pre-storage.
And secondly, the second terminal sets a preset unlocking password for the first terminal.
The second terminal sets a preset unlocking password for the first terminal, encrypts the preset unlocking password by adopting a pre-stored preset public key of the first terminal, adds a random number during encryption and sends the encrypted preset unlocking password to the server.
And the server forwards the encrypted preset unlocking password to the first terminal, the first terminal decrypts by adopting a preset private key, prestores the decrypted preset unlocking password, and simultaneously stores the mapping relation between the preset unlocking password and the second terminal.
And thirdly, the second terminal performs remote control unlocking for the first terminal.
The method comprises the steps that a first terminal sends a remote unlocking request to a server, the server receives the remote unlocking request, sends a password acquisition request to a second terminal based on the remote unlocking request, and indicates the second terminal to be a first terminal of the same remote management group to carry out remote control unlocking.
The second terminal inputs a preset unlocking password, encrypts the preset unlocking password by adopting a preset public key and a first preset random number to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The first terminal receives a first unlocking password acquired by the server from the second terminal, decrypts the first unlocking password by adopting a preset private key and a second preset random number to obtain a first unlocking password, matches the first unlocking password with a pre-stored preset unlocking password, and performs unlocking operation under the condition of successful matching.
An embodiment of the present application provides an unlocking device, and as shown in fig. 6, the unlocking device 60 may include:
a first sending module 601, configured to send a remote unlocking request to a server;
a first receiving module 602, configured to receive a first unlocking password fed back by a server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
the decryption module 603 is configured to decrypt the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password;
the unlocking module 604 is configured to perform unlocking processing according to a preset unlocking password and the first unlocking password.
Optionally, the apparatus further comprises:
the first request module is used for sending first request information to the server, and the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the acquisition module is used for acquiring the identification information of the management group and generating a public and private key pair; the public and private key pair includes a preset public key and a preset private key.
Optionally, the first sending module 601 is specifically configured to:
and sending a remote unlocking request to the server when detecting that the input error times of the unlocking password exceed a preset threshold value.
The unlocking device provided by the embodiment of the application is applied to obtain the identification information of the management group and generate a public and private key pair; the public and private key pair comprises a preset public key and a preset private key, and first request information is sent to the server, wherein the preset public key is carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal, sends a remote unlocking request to the server, and receives a first unlocking password fed back by the server; the first unlocking password is obtained from the second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and unlocking according to the preset unlocking password and the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, so that the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
An embodiment of the present application provides an unlocking device, and as shown in fig. 7, the unlocking device 70 may include:
a second receiving module 701, configured to receive a remote unlocking request sent by a first terminal;
a second sending module 702, configured to send, in response to the remote unlocking request, a password obtaining request to the second terminal, instruct the second terminal to encrypt a preset unlocking password of the first terminal according to the preset public key and the first preset random number of the first terminal to obtain a first unlocking password;
the indicating module 703 is configured to receive the first unlocking password fed back by the second terminal, send the first unlocking password to the first terminal, and instruct the first terminal to perform unlocking processing according to the first unlocking password.
Optionally, the apparatus further comprises:
the first request receiving module is used for receiving first request information sent by a first terminal, sending the first request information to a second terminal and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the second request receiving module is used for receiving second request information sent by a second terminal; the second request information indicates that the second terminal requests to create a management group;
and the creation indicating module is used for feeding back the management group creation indicating information to the second terminal and indicating the second terminal to generate the identification information of the management group.
The unlocking device provided by the embodiment of the application is used for receiving second request information sent by a second terminal; the second request information indicates the second terminal to request to create the management group, the management group creation indication information is fed back to the second terminal, the second terminal is indicated to generate identification information of the management group, the first request information sent by the first terminal is received, the first request information is sent to the second terminal, and the second terminal is indicated to store a preset public key carried in the first request information; the first request information indicates that a first terminal requests to join a management group managed by a second terminal, receives a remote unlocking request sent by the first terminal, responds to the remote unlocking request, sends a password obtaining request to the second terminal, indicates that the second terminal encrypts a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password, receives the first unlocking password fed back by the second terminal, sends the first unlocking password to the first terminal, and indicates that the first terminal carries out unlocking processing according to the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, so that the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
An embodiment of the present application provides an unlocking device, and as shown in fig. 8, the unlocking device 80 may include:
a third receiving module 801, configured to receive a password obtaining request sent by a server;
the encryption module 802 is configured to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password in response to the password obtaining request;
a third sending module 803, configured to send the first unlocking password to the server, and instruct the server to send the first unlocking password to the first terminal.
Optionally, the apparatus further comprises:
the second request sending module is used for sending second request information to the server; the second request information indicates that the second terminal requests to create a management group;
and the generating module is used for receiving the management group creation indication information fed back by the server and generating the identification information of the management group.
The unlocking device provided by the embodiment of the application is applied to send second request information to the server; the second request information indicates a second terminal to request for creating a management group, receives management group creation indication information fed back by a server, generates identification information of the management group, receives a password acquisition request sent by the server, encrypts a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal in response to the password acquisition request to obtain a first unlocking password, sends the first unlocking password to the server, and indicates the server to send the first unlocking password to the first terminal.
According to the embodiment of the application, the terminal equipment is remotely unlocked without inputting a secondary password or other verification operations, so that the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
The embodiment of the application provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory, wherein the processor executes the computer program to realize the steps of the unlocking method, and compared with the related art, the method can realize the following steps: by remotely unlocking the terminal equipment, a secondary password or other verification operations do not need to be input, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
In an alternative embodiment, an electronic device is provided, as shown in fig. 9, an electronic device 9000 shown in fig. 9 comprising: a processor 9001 and a memory 9003. Among other things, the processor 9001 and memory 9003 are coupled, such as via a bus 9002. Optionally, the electronic device 9000 can further comprise a transceiver 9004, and the transceiver 9004 can be used for data interaction between the electronic device and other electronic devices, such as transmission of data and/or reception of data. Note that the transceiver 9004 is not limited to one in practical use, and the structure of the electronic device 9000 is not limited to the embodiment of the present application.
The Processor 9001 may be a CPU (Central Processing Unit), a general purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array), or other Programmable logic device, transistor logic, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 9001 may also be a combination of computing functions, e.g., comprising one or more microprocessors, a combination of DSPs and microprocessors, or the like.
The bus 9002 may include a pathway to transfer information between the aforementioned components. The bus 9002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 9002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 9, but this does not indicate only one bus or one type of bus.
The Memory 9003 may be a ROM (Read Only Memory) or other types of static storage devices that can store static information and instructions, a RAM (Random Access Memory) or other types of dynamic storage devices that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium, other magnetic storage devices, or any other medium that can be used to carry or store a computer program and that can be Read by a computer, which is not limited herein.
The memory 9003 is used for storing computer programs for executing the embodiments of the present application, and is controlled by the processor 9001 to execute the computer programs. The processor 9001 is arranged to execute a computer program stored in the memory 9003 to perform the steps shown in the previous method embodiments.
Embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, and when being executed by a processor, the computer program may implement the steps and corresponding contents of the foregoing method embodiments.
Embodiments of the present application further provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the steps and corresponding contents of the foregoing method embodiments can be implemented.
The terms "first," "second," "third," "fourth," "1," "2," and the like in the description and in the claims of the present application and in the above-described drawings (if any) are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in other sequences than illustrated or otherwise described herein.
It should be understood that, although each operation step is indicated by an arrow in the flowchart of the embodiment of the present application, the implementation order of the steps is not limited to the order indicated by the arrow. In some implementation scenarios of the embodiments of the present application, the implementation steps in the flowcharts may be performed in other sequences as desired, unless explicitly stated otherwise herein. In addition, some or all of the steps in each flowchart may include multiple sub-steps or multiple stages based on an actual implementation scenario. Some or all of these sub-steps or stages may be performed at the same time, or each of these sub-steps or stages may be performed at different times, respectively. In a scenario where execution times are different, an execution sequence of the sub-steps or the phases may be flexibly configured according to requirements, which is not limited in the embodiment of the present application.
The foregoing is only an optional implementation manner of a part of implementation scenarios in this application, and it should be noted that, for those skilled in the art, other similar implementation means based on the technical idea of this application are also within the protection scope of the embodiments of this application without departing from the technical idea of this application.

Claims (11)

1. An unlocking method is applied to a first terminal, and is characterized by comprising the following steps:
sending a remote unlocking request to a server;
receiving a first unlocking password fed back by the server; the first unlocking password is obtained from a second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password;
and carrying out unlocking processing according to a preset unlocking password and the first unlocking password.
2. The unlocking method according to claim 1, wherein before sending the remote unlocking request to the server, the method comprises:
sending first request information to the server, wherein the first request information carries the preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal;
before the sending of the first request information to the server, the method includes:
acquiring identification information of the management group and generating a public and private key pair; the public and private key pair comprises the preset public key and the preset private key.
3. An unlocking method is applied to a server and is characterized by comprising the following steps:
receiving a remote unlocking request sent by a first terminal;
responding to the remote unlocking request, sending a password acquisition request to a second terminal, and instructing the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and receiving the first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal, and indicating the first terminal to perform unlocking processing according to the first unlocking password.
4. The unlocking method according to claim 3, wherein before receiving the remote unlocking request sent by the first terminal, the method comprises:
receiving first request information sent by the first terminal, sending the first request information to the second terminal, and indicating the second terminal to store the preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal;
before the receiving of the first request message sent by the first terminal, the method includes:
receiving second request information sent by the second terminal; the second request information indicates that the second terminal requests to create a management group;
and feeding back management group creation indication information to the second terminal to indicate the second terminal to generate the identification information of the management group.
5. An unlocking method applied to a second terminal is characterized by comprising the following steps:
receiving a password acquisition request sent by a server;
responding to the password acquisition request, and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and sending the first unlocking password to the server, and indicating the server to send the first unlocking password to the first terminal.
6. An unlocking device applied to a first terminal is characterized by comprising:
the first sending module is used for sending a remote unlocking request to the server;
the first receiving module is used for receiving a first unlocking password fed back by the server; the first unlocking password is obtained from a second terminal by the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
the decryption module is used for decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password;
and the unlocking module is used for unlocking according to a preset unlocking password and the first unlocking password.
7. An unlocking device applied to a server is characterized by comprising:
the second receiving module is used for receiving a remote unlocking request sent by the first terminal;
the second sending module is used for responding to the remote unlocking request, sending a password obtaining request to a second terminal, and indicating the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and the indicating module is used for receiving the first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal and indicating the first terminal to carry out unlocking processing according to the first unlocking password.
8. An unlocking device applied to a second terminal is characterized by comprising:
the third receiving module is used for receiving a password obtaining request sent by the server;
the encryption module is used for responding to the password acquisition request, and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and the third sending module is used for sending the first unlocking password to the server and indicating the server to send the first unlocking password to the first terminal.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the unlocking method of any of claims 1 to 5.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the unlocking method according to any one of claims 1 to 5.
11. A computer program product comprising a computer program, characterized in that the computer program realizes the steps of the method of any one of claims 1 to 5 when executed by a processor.
CN202111443383.6A 2021-11-30 2021-11-30 Unlocking method, unlocking device, electronic equipment and computer readable storage medium Active CN114158051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111443383.6A CN114158051B (en) 2021-11-30 2021-11-30 Unlocking method, unlocking device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111443383.6A CN114158051B (en) 2021-11-30 2021-11-30 Unlocking method, unlocking device, electronic equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN114158051A true CN114158051A (en) 2022-03-08
CN114158051B CN114158051B (en) 2024-01-09

Family

ID=80784445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111443383.6A Active CN114158051B (en) 2021-11-30 2021-11-30 Unlocking method, unlocking device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114158051B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003138806A (en) * 2001-11-02 2003-05-14 Okamura Corp Appliance having remote locking/unlocking function
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
US20140025957A1 (en) * 2012-07-19 2014-01-23 Phison Electronics Corp. Method for entering password and portable electronic device and unlocking method and data authenticating method
CA2830341A1 (en) * 2012-10-12 2014-04-12 Roam Mobility Inc. Method for activating an unlocked, inactive mobile device using a universal integrated circuit card pre-provisioned with a service plan
CN104298901A (en) * 2014-09-12 2015-01-21 厦门美图移动科技有限公司 Unlocking method and device for mobile terminal
CN105160216A (en) * 2015-07-09 2015-12-16 小米科技有限责任公司 Unlocking method and apparatus and terminal
CN105915336A (en) * 2016-05-24 2016-08-31 珠海市魅族科技有限公司 Object cooperative decryption method and device thereof
US20170316197A1 (en) * 2016-04-29 2017-11-02 Nanning Fugui Precision Industrial Co., Ltd. User interface control method and electronic device
CN108768941A (en) * 2018-04-19 2018-11-06 北京信安世纪科技股份有限公司 A kind of method and device of remote de-locking safety equipment
US20200279039A1 (en) * 2017-09-27 2020-09-03 Shenzhen Heytap Technology Corp., Ltd. Method for Unlocking Electronic Device, Electronic Device, and Storage Medium
CN112115464A (en) * 2020-09-11 2020-12-22 北京小米移动软件有限公司 Unlocking processing method and device, electronic equipment and storage medium
CN112396738A (en) * 2020-12-01 2021-02-23 深圳市汇顶科技股份有限公司 Unlocking method of shared device and related device
CN113676474A (en) * 2021-08-19 2021-11-19 浙江大华技术股份有限公司 Equipment unlocking method and device, storage medium and electronic device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003138806A (en) * 2001-11-02 2003-05-14 Okamura Corp Appliance having remote locking/unlocking function
CN101997678A (en) * 2010-11-18 2011-03-30 东莞宇龙通信科技有限公司 Password acquisition method and terminal
US20140025957A1 (en) * 2012-07-19 2014-01-23 Phison Electronics Corp. Method for entering password and portable electronic device and unlocking method and data authenticating method
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CA2830341A1 (en) * 2012-10-12 2014-04-12 Roam Mobility Inc. Method for activating an unlocked, inactive mobile device using a universal integrated circuit card pre-provisioned with a service plan
CN104298901A (en) * 2014-09-12 2015-01-21 厦门美图移动科技有限公司 Unlocking method and device for mobile terminal
CN105160216A (en) * 2015-07-09 2015-12-16 小米科技有限责任公司 Unlocking method and apparatus and terminal
US20170316197A1 (en) * 2016-04-29 2017-11-02 Nanning Fugui Precision Industrial Co., Ltd. User interface control method and electronic device
CN105915336A (en) * 2016-05-24 2016-08-31 珠海市魅族科技有限公司 Object cooperative decryption method and device thereof
US20200279039A1 (en) * 2017-09-27 2020-09-03 Shenzhen Heytap Technology Corp., Ltd. Method for Unlocking Electronic Device, Electronic Device, and Storage Medium
CN108768941A (en) * 2018-04-19 2018-11-06 北京信安世纪科技股份有限公司 A kind of method and device of remote de-locking safety equipment
CN112115464A (en) * 2020-09-11 2020-12-22 北京小米移动软件有限公司 Unlocking processing method and device, electronic equipment and storage medium
CN112396738A (en) * 2020-12-01 2021-02-23 深圳市汇顶科技股份有限公司 Unlocking method of shared device and related device
CN113676474A (en) * 2021-08-19 2021-11-19 浙江大华技术股份有限公司 Equipment unlocking method and device, storage medium and electronic device

Also Published As

Publication number Publication date
CN114158051B (en) 2024-01-09

Similar Documents

Publication Publication Date Title
JP6571250B2 (en) How to use one device to unlock another
US9779224B2 (en) Methods and systems for client-enhanced challenge-response authentication
US10061914B2 (en) Account recovery protocol
ES2687191T3 (en) Network authentication method for secure electronic transactions
EP3324572B1 (en) Information transmission method and mobile device
US11501294B2 (en) Method and device for providing and obtaining graphic code information, and terminal
CN103152366B (en) Obtain the method for terminal authorization, terminal and server
US20230379327A1 (en) Mutual authentication system
CN110311787B (en) Authorization management method, system, device and computer readable storage medium
US20160021101A1 (en) Method for backing up a user secret and method for recovering a user secret
CN110505055B (en) External network access identity authentication method and system based on asymmetric key pool pair and key fob
CN104883255A (en) Password resetting method and device
EP4037250A1 (en) Message transmitting system with hardware security module
CN109088729B (en) Key storage method and device
CN112003697A (en) Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium
WO2016126151A1 (en) System for establishing secure communication between multiple electronic communication devices
CN114158051B (en) Unlocking method, unlocking device, electronic equipment and computer readable storage medium
US10181951B2 (en) Protected encryption key recovery
CN108769247B (en) Distributed networked storage and transmission method and device applied to monitoring camera equipment
CN107343276A (en) A kind of guard method of the SIM card lock data of terminal and system
KR101298216B1 (en) Authentication system and method using multiple category
CN116208419A (en) Gateway-based data processing method, device, computer and medium
CN113378146A (en) Method for quickly logging in user by using NFC
CN111178884A (en) Information processing method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant