CN114158051B - Unlocking method, unlocking device, electronic equipment and computer readable storage medium - Google Patents
Unlocking method, unlocking device, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN114158051B CN114158051B CN202111443383.6A CN202111443383A CN114158051B CN 114158051 B CN114158051 B CN 114158051B CN 202111443383 A CN202111443383 A CN 202111443383A CN 114158051 B CN114158051 B CN 114158051B
- Authority
- CN
- China
- Prior art keywords
- terminal
- preset
- unlocking
- password
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000012545 processing Methods 0.000 claims abstract description 13
- 238000004590 computer program Methods 0.000 claims description 19
- 238000010295 mobile communication Methods 0.000 abstract description 2
- 150000003839 salts Chemical class 0.000 description 15
- 238000012795 verification Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 6
- 230000004044 response Effects 0.000 description 6
- 238000005336 cracking Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000001771 impaired effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000037361 pathway Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/30—Security of mobile devices; Security of mobile applications
- H04W12/35—Protecting application or service provisioning, e.g. securing SIM application provisioning
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the application provides an unlocking method, an unlocking device, electronic equipment and a computer readable storage medium, and relates to the field of mobile communication. The method comprises the following steps: a remote unlocking request is sent to a server, and a first unlocking password fed back by the server is received; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal; and then decrypting the first unlocking password according to the preset private key and the second preset random number to obtain a first unlocking password, and further performing unlocking processing according to the preset unlocking password and the first unlocking password. The embodiment of the application realizes remote unlocking of the terminal equipment, and is simple, quick and high in reliability.
Description
Technical Field
The present application relates to the field of mobile communications technologies, and in particular, to an unlocking method, an unlocking device, an electronic device, and a computer readable storage medium.
Background
Mobile device management, also known as MDM (Mobile Device Management), performs complete full life cycle management on mobile devices from each link of device registration, activation, use, and elimination. The mobile equipment management can realize functions of user and equipment management, configuration management, security management, asset management and the like.
The remote control unlocking of the terminal device also belongs to the management range of the mobile device. Currently, in order to protect personal information and property security of users, almost all terminal devices can be custom set by users to unlock passwords. However, it happens that the user forgets the password, especially for the group of impaired memory, such as the elderly, which is more common.
In order to solve the problem of unlocking failure of the terminal device, for example, unlocking failure is caused by "forgetting a password", the prior art generally adopts a mode of setting a secondary password or short message authentication and the like to unlock. The mode of setting the secondary password still depends on the memory of the user, and is not friendly to the group with weak memory; the short message verification and other modes need a large number of front verification operations, are complex, have poor user experience, and can not be implemented even in many scenes.
Disclosure of Invention
The aim of the embodiment of the application is to solve the problem that the unlocking operation of the terminal equipment is complex under the condition that the user forgets the password.
According to an aspect of the embodiments of the present application, there is provided an unlocking method, applied to a first terminal, including:
Sending a remote unlocking request to a server;
receiving a first unlocking password fed back by a server; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
decrypting the first unlocking password according to the preset private key and the second preset random number to obtain a first unlocking password;
and carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
Optionally, before sending the remote unlocking request to the server, the method includes:
the method comprises the steps of sending first request information to a server, wherein the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, before sending the first request information to the server, the method includes:
acquiring identification information of a management group and generating a public-private key pair; the public-private key pair comprises a preset public key and a preset private key.
According to another aspect of the embodiments of the present application, there is provided an unlocking method, applied to a server, including:
receiving a remote unlocking request sent by a first terminal;
Responding to a remote unlocking request, sending a password acquisition request to a second terminal, and indicating the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key of the first terminal and a first preset random number to obtain a first unlocking password;
and receiving a first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal, and indicating the first terminal to unlock according to the first unlocking password.
Optionally, before receiving the remote unlocking request sent by the first terminal, the method includes:
receiving first request information sent by a first terminal, and sending the first request information to a second terminal, and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, before receiving the first request information sent by the first terminal, the method includes:
receiving second request information sent by a second terminal; the second request information indicates that the second terminal requests to create a management group;
and feeding back management group creation instruction information to the second terminal, and instructing the second terminal to generate identification information of the management group.
According to another aspect of the embodiments of the present application, there is provided an unlocking method applied to a second terminal, the method including:
Receiving a password acquisition request sent by a server;
responding to a password acquisition request, and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and sending the first unlocking password to the server, and indicating the server to send the first unlocking password to the first terminal.
According to another aspect of an embodiment of the present application, there is provided an unlocking device, including:
the first sending module is used for sending a remote unlocking request to the server;
the first receiving module is used for receiving a first unlocking password fed back by the server; the first unlocking password is obtained from a second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
the decryption module is used for decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password;
and the unlocking module is used for carrying out unlocking processing according to a preset unlocking password and the first unlocking password.
Optionally, the apparatus further comprises:
The first request module is used for sending first request information to the server, wherein the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the acquisition module is used for acquiring the identification information of the management group and generating a public-private key pair; the public-private key pair comprises a preset public key and a preset private key.
According to another aspect of an embodiment of the present application, there is provided an unlocking device, including:
the second receiving module is used for receiving a remote unlocking request sent by the first terminal;
the second sending module is used for responding to the remote unlocking request, sending a password acquisition request to a second terminal, and indicating the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
the indication module is used for receiving the first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal and indicating the first terminal to unlock according to the first unlocking password.
Optionally, the apparatus further comprises:
The first request receiving module is used for receiving first request information sent by the first terminal, sending the first request information to the second terminal and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the second request receiving module is used for receiving second request information sent by the second terminal; the second request information indicates that the second terminal requests to create a management group;
the creation instruction module is used for feeding back management group creation instruction information to the second terminal and instructing the second terminal to generate identification information of the management group.
According to another aspect of an embodiment of the present application, there is provided an unlocking device, including:
the third receiving module is used for receiving the password acquisition request sent by the server;
the encryption module is used for responding to the password acquisition request and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password;
and the third sending module is used for sending the first unlocking password to the server and indicating the server to send the first unlocking password to the first terminal.
According to another aspect of the embodiments of the present application, there is provided an electronic device including a memory, a processor, and a computer program stored on the memory, the processor executing the computer program to implement the steps of the unlocking method of any one of the above aspects.
According to a further aspect of embodiments of the present application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the unlocking method of any of the above aspects.
According to an aspect of the embodiments of the present application, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the steps of the unlocking method of any of the above aspects.
The beneficial effects that technical scheme that this application embodiment provided brought are:
the remote unlocking of the terminal equipment is carried out without inputting a secondary password or other verification operations, so that the problem of complex remote control unlocking operation of the mobile terminal is solved, and the method is simple, quick and high in reliability.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that are required to be used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is one of flow diagrams of an unlocking method applied to a first terminal according to an embodiment of the present application;
fig. 2 is a second flowchart of an unlocking method applied to a first terminal according to an embodiment of the present application;
fig. 3 is a flow chart of an unlocking method applied to a server according to an embodiment of the present application;
fig. 4 is a schematic flow chart of an unlocking method applied to a second terminal according to an embodiment of the present application;
fig. 5 is an application scenario schematic diagram of an unlocking method provided in an embodiment of the present application;
fig. 6 is a schematic structural diagram of an unlocking device according to an embodiment of the present application;
FIG. 7 is a second schematic structural diagram of an unlocking device according to an embodiment of the present disclosure;
FIG. 8 is a third schematic structural diagram of an unlocking device according to an embodiment of the present disclosure;
fig. 9 is a schematic structural diagram of an unlocked electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the drawings in the present application. It should be understood that the embodiments described below with reference to the drawings are exemplary descriptions for explaining the technical solutions of the embodiments of the present application, and the technical solutions of the embodiments of the present application are not limited.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and "comprising," when used in this application, specify the presence of stated features, information, data, steps, operations, elements, and/or components, but do not preclude the presence or addition of other features, information, data, steps, operations, elements, components, and/or groups thereof, all of which may be included in the present application. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein indicates that at least one of the items defined by the term, e.g., "a and/or B" may be implemented as "a", or as "B", or as "a and B".
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The technical solutions of the embodiments of the present application and technical effects produced by the technical solutions of the present application are described below by describing several exemplary embodiments. It should be noted that the following embodiments may be referred to, or combined with each other, and the description will not be repeated for the same terms, similar features, similar implementation steps, and the like in different embodiments.
First, several terms related to the embodiments of the present application are described and explained:
password (password): the tool corresponding to the user name and used for verifying whether the user name corresponds to the authority can be in various forms such as numbers, characters and figures. In daily life, the password is often called a password, but the password is strictly called a password. In the technical solution of the present application, if the password is encrypted, it is called "password".
Public-private key pair: the public-private key pair is a key pair obtained by an algorithm, and includes a public key and a private key. Wherein the secret key disclosed to the outside is called public key, and the secret key reserved by itself is called private key. The public and private key pairs obtained by this algorithm can be guaranteed to be unique worldwide. If one of the keys is used to encrypt a piece of data, then the other key must be used for decryption. For example, encrypting data using a public key must use a private key to decrypt the data, otherwise decryption will not succeed.
salt: in password protection technology, a salt is a random data string used to modify the password hash. At user enrollment, the random number generated by the system to be combined with the user password is referred to as the salt value, and is commonly referred to as the salified value. By adding the salt value to process the password, even if the original password set by the user is the same, the ciphertext corresponding to the original password is different. Adding a salt to the password hash also prevents an attacker from using dictionary words to verify the entire system, so that it is also possible to use a salt to implement a password hash matching policy to make it difficult for an attacker who attacks the system.
The embodiment of the application provides an unlocking method, as shown in fig. 1, which is applied to a first terminal and includes:
step S101, a remote unlocking request is sent to a server.
The first terminal is electronic equipment such as mobile terminal equipment used by a user, for example, a notebook, a mobile phone, a tablet computer and the like.
When the user forgets to unlock the password using the first terminal, a remote unlock request may be transmitted to the server through a specific trigger operation. The unlock password may be a lock screen password, or may be a login password of an application program, and the like, and is not limited thereto.
Specifically, the remote unlocking request is sent to the server through a specific triggering operation, and it can be understood that the user inputs the unlocking password for too many times, and then the remote unlocking request is automatically triggered to be sent to the server, or the user manually clicks a key such as "forget the password" and sends the remote unlocking request to the server.
Step S102, receiving a first unlocking password fed back by a server; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting the preset unlocking password of the first terminal by the second terminal according to the preset public key and the first preset random number of the first terminal.
After the user uses the first terminal to send a remote unlocking request to the server, the user waits for the server to return the first unlocking password. The first unlocking password is obtained from a second terminal corresponding to the first terminal after the server receives the remote unlocking request of the first terminal.
The second terminal is electronic equipment such as mobile terminal equipment for performing remote control unlocking for the first terminal. The second terminal may be a mobile terminal device owned by the user himself, or may be a mobile terminal device owned by another person, such as a parent, a leader or a friend of the user.
A remote control relationship needs to be established in advance between the first terminal and the second terminal. In the embodiment of the application, the first terminal and the second terminal can join the same remote management group, so that a remote control relationship is established.
A remote management group is an implementation of mobile device management, and a remote management group includes one manager terminal and at least one manager terminal. The manager terminal prestores a preset unlocking password of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical application, a mobile terminal device may also join a plurality of remote management groups, which is not limited.
It can be understood that in the embodiment of the present application, the first terminal is a manager terminal, and the second terminal is a manager terminal.
After receiving the remote unlocking request of the first terminal, the server acquires the first unlocking password from the second terminal and forwards the first unlocking password to the first terminal.
Specifically, the second terminal encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key and a first preset random number of the first terminal to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The preset public key is generated by the first terminal, the preset public key is prestored on the second terminal and used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and used for decrypting the unlocking password.
The first preset random number can be a salt value, and the second terminal adds the first preset random number when encrypting the preset unlocking password by adopting the preset public key, so that the safety of the first unlocking password is improved, and repeated anti-cracking is ensured.
And step S103, decrypting the first unlocking password according to the preset private key and the second preset random number to obtain a first unlocking password.
After receiving the first unlocking password fed back by the server, the first terminal decrypts the first unlocking password according to the prestored preset private key and the second preset random number to obtain a first unlocking password.
The preset private key is matched with a preset public key prestored in the second terminal. The second predetermined random number is also a salt value.
It should be noted that, the process of decrypting the first unlock code is implemented inside the first device, and the whole decryption process is transparent to the user, without any operation by the user.
Step S104, unlocking processing is carried out according to the preset unlocking password and the first unlocking password.
The first terminal matches the decrypted first unlocking password with a pre-stored preset unlocking password, if the matching is successful, the first unlocking password is correct, and then the first terminal is unlocked.
By applying the unlocking method provided by the embodiment of the application, a remote unlocking request is sent to a server, and a first unlocking password fed back by the server is received; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
According to the method and the device for remotely unlocking the terminal equipment, secondary passwords or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
The embodiment of the application provides an unlocking method, as shown in fig. 2, which is applied to a first terminal and includes:
step 201, obtaining identification information of a management group and generating a public-private key pair; the public-private key pair comprises a preset public key and a preset private key.
The first terminal is electronic equipment such as mobile terminal equipment used by a user, for example, a notebook, a mobile phone, a tablet computer and the like.
The management group is a remote management group of mobile terminal devices, and a remote management group includes one manager terminal and at least one managed terminal. The manager terminal prestores a preset unlocking password of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical application, a mobile terminal device may also join a plurality of remote management groups, which is not limited.
It can be understood that in the embodiment of the present application, the first terminal is a manager terminal, and the second terminal is a manager terminal.
The first terminal acquires the identification information of the remote management group and joins the corresponding remote management group based on the identification information.
Wherein, the identification information can be represented as two-dimensional code information. For example, in the case that the first terminal is physically closer to the second terminal, the user may use the first terminal to scan the two-dimensional code information of the remote management group displayed by the second terminal, thereby joining the remote management group managed by the second terminal. Under the condition that the first terminal and the second terminal are in a long physical distance, a user can also use the first terminal to scan the two-dimension code information of the remote management group sent by the second terminal and add the two-dimension code information into the remote management group. Obviously, the user may also use the first terminal to scan the two-dimensional code information of the remote management group provided by other managed terminals in the remote management group managed by the second terminal, which is not limited.
The first terminal determines to join the management group when acquiring the identification information of the management group, and automatically generates a public-private key pair, namely a preset public key and a preset private key. The public-private key pair of each mobile terminal device joining the remote management group is unique.
Step S202, first request information is sent to a server, and a preset public key is carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
And after the first terminal acquires the identification information of the remote management group and generates a unique public-private key pair, the first terminal sends first request information to the server. Wherein the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
The first request information carries a preset public key generated by the first terminal, and the server forwards the preset public key to the second terminal and instructs the second terminal to store.
The first request information is illustrated as:
{msgtype:joininGroup,remoteMngGroup:remoteMngGroupid,member:B,publickey:publickeyB}。
step S203, a remote unlocking request is sent to the server.
When the user forgets to unlock the password using the first terminal, a remote unlocking request may be transmitted to the server through a specific trigger operation. The unlock password may be a lock screen password, or may be a login password of an application program, and the like, and is not limited thereto.
In a preferred embodiment of the present application, step S203 includes:
and sending a remote unlocking request to the server under the condition that the unlocking password input error times exceed a preset threshold value.
Specifically, the remote unlocking request is sent to the server through a specific triggering operation, which can be understood as that when the first terminal detects that the error times of inputting the unlocking password by the user is excessive and the error times exceed a preset threshold, the remote unlocking request is automatically triggered to be sent to the server, or a key for sending the remote unlocking request is displayed to the user. The preset threshold may be user-defined by the user on the first terminal.
The remote unlock request is illustrated as:
{msgtype:remoteUnlockReq,remoteMngGroup:remoteMngGroupid,member:B}。
step S204, receiving a first unlocking password fed back by a server; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting the preset unlocking password of the first terminal by the second terminal according to the preset public key and the first preset random number of the first terminal.
After the user uses the first terminal to send a remote unlocking request to the server, the user waits for the server to return the first unlocking password. The first unlocking password is obtained from a corresponding second terminal after the server receives the remote unlocking request of the first terminal.
The second terminal is electronic equipment such as mobile terminal equipment for performing remote control unlocking for the first terminal. The second terminal may be a mobile terminal device owned by the user himself, or may be a mobile terminal device owned by another person, such as a parent, a leader or a friend of the user.
A remote control relationship needs to be established in advance between the first terminal and the second terminal. In the embodiment of the application, the first terminal and the second terminal can join the same remote management group, so that a remote control relationship is established.
After receiving the remote unlocking request of the first terminal, the server instructs the second terminal to perform remote control unlocking for the first terminal based on the remote unlocking request, acquires a first unlocking password from the second terminal, and forwards the first unlocking password to the first terminal.
Specifically, the second terminal encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key and a first preset random number of the first terminal to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The preset public key is generated by the first terminal, the preset public key is prestored on the second terminal and used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and used for decrypting the unlocking password.
The first preset random number can be a salt value, the second terminal encrypts the preset unlocking password by adopting the preset public key, and the first preset random number is added during encryption, so that the safety of the first unlocking password is improved, and repeated and cracking prevention is ensured.
The second terminal sends the encrypted preset unlocking password, namely the first unlocking password to the first terminal through the server, and the second terminal directly sends the preset unlocking password to the first terminal, so that the safety of the unlocking password in the transmission process is effectively ensured.
The server is only responsible for forwarding data for the first terminal and the second terminal in the remote control unlocking process, the specific encryption and decryption processes are completed on the mobile terminal equipment, the password or the password cannot be analyzed on the server, and the reliability of remote control unlocking is guaranteed to the greatest extent.
The first unlock code is illustrated as:
{msgtype:remoteUnlockCmd,remoteMngGroup:remoteMngGroupid,member:B,salt:randomsalt,remoteKey:publickey(password+randomsalt)}。
step S205, decrypting the first unlocking password according to the preset private key and the second preset random number to obtain a first unlocking password.
After receiving the first unlocking password fed back by the server, the first terminal decrypts the first unlocking password according to the prestored preset private key and the second preset random number to obtain a first unlocking password.
The preset private key is matched with a preset public key prestored in a second terminal, and the second preset random number is also a salt value.
Step S206, unlocking processing is carried out according to the preset unlocking password and the first unlocking password.
The first terminal matches the decrypted first unlocking password with a pre-stored preset unlocking password, if the matching is successful, the first unlocking password is correct, and then the first terminal is unlocked.
It should be noted that, the process of decrypting the first unlock code is implemented inside the first device, and the whole decryption process is transparent to the user, without any operation by the user.
By applying the unlocking method provided by the embodiment of the application, the identification information of the management group is obtained, and a public-private key pair is generated; the public-private key pair comprises a preset public key and a preset private key, first request information is sent to the server, and the first request information carries the preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal, a remote unlocking request is sent to the server, and a first unlocking password fed back by the server is received; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
According to the method and the device for remotely unlocking the terminal equipment, secondary passwords or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
The embodiment of the application provides an unlocking method, as shown in fig. 3, which is applied to a server and includes:
step S301, receiving second request information sent by a second terminal; the second request information indicates that the second terminal requests creation of the management group.
The server receives second request information sent by the second terminal, wherein the second request information indicates that the second terminal requests to create the management group.
The management group is a remote management group of mobile terminal devices, and a remote management group includes one manager terminal and at least one managed terminal. The manager terminal prestores a preset unlocking password of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical application, a mobile terminal device may also join a plurality of remote management groups, which is not limited.
It can be understood that in the embodiment of the present application, the first terminal is a manager terminal, and the second terminal is a manager terminal.
Step S302, feeding back management group creation instruction information to the second terminal, and instructing the second terminal to generate identification information of the management group.
After receiving the second request information, the server feeds back management group creation instruction information to the second terminal. Wherein the management group creation instruction information instructs the second terminal to generate the identification information of the management group.
The management group creation instruction information carries identity information of the management group, such as an identity number ID. The second terminal generates identification information of the management group based on the identification information carried in the management group creation instruction information.
The management group creation instruction information is illustrated as:
{msgtype:createGroup,remoteMngGroup:remoteMngGroupid,manager:A}。
step S303, receiving first request information sent by a first terminal, and sending the first request information to a second terminal, and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
After the second terminal creates the remote management group successfully, any mobile terminal device can join the remote management group based on the identification information of the management group. For example, in the embodiment of the present application, the first terminal may acquire the identification information of the management group managed by the second terminal, and send the first request information to the server based on the identification information.
Correspondingly, the server receives the first request information sent by the first terminal and forwards the first request information to the second terminal.
Wherein the first request information indicates that the first terminal requests to join a management group managed by the second terminal. The first request information carries a preset public key unique to the first terminal, and the preset public key is used for encrypting the unlocking password by the second terminal.
The first request information is illustrated as:
{msgtype:joininGroup,remoteMngGrou:remoteMngGroupid,member:B,publickey:publickeyB}。
step S304, a remote unlocking request sent by the first terminal is received.
The first terminal and the second terminal establish a remote control relationship based on the remote management group. And when the user forgets to unlock the password by using the first terminal, a remote unlocking request is sent to the server. Correspondingly, the server receives the remote unlocking request.
The remote unlock request is illustrated as:
{msgtype:remoteUnlockReq,remoteMngGroup:remoteMngGroupid,member:B}。
step S305, in response to the remote unlocking request, sends a password obtaining request to the second terminal, and instructs the second terminal to encrypt the preset unlocking password of the first terminal according to the preset public key of the first terminal and the first preset random number to obtain the first unlocking password.
And the server responds to the remote unlocking request of the first terminal, sends a password acquisition request to the second terminal, and instructs the second terminal to feed back the first unlocking password.
Specifically, the password acquisition request instructs the second terminal to encrypt a pre-stored preset unlocking password according to a pre-stored preset public key corresponding to the first terminal.
The second terminal encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key and a first preset random number of the first terminal to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The preset public key is generated by the first terminal, the preset public key is prestored on the second terminal and used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and used for decrypting the unlocking password.
The first preset random number can be a salt value, the second terminal encrypts the preset unlocking password by adopting the preset public key, and the first preset random number is added during encryption, so that the safety of the first unlocking password is improved, and repeated and cracking prevention is ensured.
The first unlock code is illustrated as:
{msgtype:remoteUnlockCmd,remoteMngGroup:remoteMngGroupid,member:B,salt:randomsalt,remoteKey:publickey(password+randomsalt)}。
step S306, a first unlocking password fed back by the second terminal is received, the first unlocking password is sent to the first terminal, and the first terminal is instructed to unlock according to the first unlocking password.
The server receives a first unlocking password fed back by the second terminal, forwards the first unlocking password to the first terminal, and instructs the first terminal to unlock.
The second terminal sends the encrypted preset unlocking password, namely the first unlocking password to the first terminal through the server, and the second terminal directly sends the preset unlocking password to the first terminal, so that the safety of the unlocking password in the transmission process is effectively ensured.
The server is only responsible for forwarding data for the first terminal and the second terminal in the remote control unlocking process, the specific encryption and decryption processes are completed on the mobile terminal equipment, the password or the password cannot be analyzed on the server, and the reliability of remote control unlocking is guaranteed to the greatest extent.
Receiving second request information sent by a second terminal by applying the unlocking method provided by the embodiment of the application; the second request information indicates the second terminal to request to create the management group, feeds back management group creation indication information to the second terminal, indicates the second terminal to generate identification information of the management group, receives first request information sent by the first terminal, sends the first request information to the second terminal, and indicates the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal, receives a remote unlocking request sent by the first terminal, responds to the remote unlocking request, sends a password acquisition request to the second terminal, indicates the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password, receives the first unlocking password fed back by the second terminal, sends the first unlocking password to the first terminal, and indicates the first terminal to unlock according to the first unlocking password.
According to the method and the device for remotely unlocking the terminal equipment, secondary passwords or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
The embodiment of the application provides an unlocking method, as shown in fig. 4, which is applied to a second device and includes:
step S401, sending second request information to a server; the second request information indicates that the second terminal requests creation of the management group.
The second terminal transmits second request information to the server, wherein the second request information indicates that the second terminal requests creation of the management group.
The management group is a remote management group of mobile terminal devices, and a remote management group includes one manager terminal and at least one managed terminal. The manager terminal prestores a preset unlocking password of the managed terminal and is responsible for remotely controlling and unlocking the managed terminal. In practical application, a mobile terminal device may also join a plurality of remote management groups, which is not limited.
It can be understood that in the embodiment of the present application, the first terminal is a manager terminal, and the second terminal is a manager terminal.
Step S402, receiving management group creation instruction information fed back by a server, and generating identification information of the management group.
And after the second terminal sends the second request information to the server, receiving management group creation instruction information fed back by the server.
Wherein the management group creation instruction information instructs the second terminal to generate the identification information of the management group. The management group creation instruction information carries identity information of the management group, such as an identity number ID. The second terminal generates identification information of the management group based on the identification information of the management group.
The management group creation instruction information is illustrated as:
{msgtype:createGroup,remoteMngGroup:remoteMngGroupid,manager:A}。
step S403, a password acquisition request sent by the server is received.
After the second terminal creates the remote management group successfully, any mobile terminal device can join the remote management group based on the identification information of the management group. For example, in the embodiment of the present application, the first terminal may acquire the identification information of the management group managed by the second terminal, and send the first request information to the server based on the identification information.
And the server sends a password acquisition request to the second terminal based on the first request information, and instructs the second terminal to feed back the first unlocking password.
Correspondingly, the second terminal receives a password acquisition request of the server.
Step S404, in response to the password acquisition request, the preset unlocking password of the first terminal is encrypted according to the preset public key of the first terminal and the first preset random number to obtain a first unlocking password.
The second terminal responds to the password acquisition request, and encrypts a pre-stored preset unlocking password of the first terminal according to a pre-stored preset public key of the first terminal and a first preset random number to obtain a first unlocking password.
The preset public key is generated by the first terminal, the preset public key is prestored on the second terminal and used for encrypting the unlocking password, and the corresponding preset private key is prestored on the first terminal and used for decrypting the unlocking password.
The first preset random number can be a salt value, the second terminal encrypts the preset unlocking password by adopting a preset public key and adds the first preset random number, so that the safety of the first unlocking password is improved, and repeated anti-cracking is ensured.
The first unlock code is illustrated as:
{msgtype:remoteUnlockCmd,remoteMngGroup:remoteMngGroupid,member:B”,salt:randomsalt,remoteKey:publickey(password+randomsalt)}。
step S405, a first unlock code is sent to a server, and the server is instructed to send the first unlock code to a first terminal.
And sending the first unlocking password to the server, and indicating the server to forward the first unlocking password to the first terminal. Further, the first terminal performs unlocking processing according to the first unlocking password.
The unlocking method provided by the embodiment of the application is applied to send second request information to the server; the second request information indicates the second terminal to request to create the management group, receives management group creation indication information fed back by the server, generates identification information of the management group, receives a password acquisition request sent by the server, encrypts a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password in response to the password acquisition request, sends the first unlocking password to the server, and instructs the server to send the first unlocking password to the first terminal.
According to the method and the device for remotely unlocking the terminal equipment, secondary passwords or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
An application scenario of an unlocking method is provided in an embodiment of the present application, as shown in fig. 5, including:
1. and establishing a remote control relationship between the first terminal and the second terminal.
The second terminal sends second request information to the server to request to establish a remote management group of the mobile terminal equipment, and the server feeds back management group creation instruction information to the second terminal based on the second request information to instruct the second terminal to generate identification information of the management group.
The method comprises the steps that a first terminal obtains identification information of a management group, a corresponding public key pair is generated, first request information carrying a preset public key is sent to a server to request to join a remote management group managed by a second terminal, the server feeds back an establishment result of a remote control relationship between the first terminal and the second terminal to the first terminal and the second terminal based on the first request information, and meanwhile the preset public key generated by the first terminal is sent to the second terminal to be prestored.
2. The second terminal sets a preset unlocking password for the first terminal.
The second terminal sets a preset unlocking password for the first terminal, encrypts the preset unlocking password by adopting a prestored preset public key of the first terminal, adds a random number during encryption, and sends the encrypted preset unlocking password to the server.
The server transmits the encrypted preset unlocking password to the first terminal, the first terminal decrypts the encrypted preset unlocking password by adopting the preset private key, prestores the decrypted preset unlocking password, and stores the mapping relation between the preset unlocking password and the second terminal.
3. The second terminal performs remote control unlocking for the first terminal.
The first terminal sends a remote unlocking request to the server, the server receives the remote unlocking request, and sends a password acquisition request to the second terminal based on the remote unlocking request, and the second terminal is instructed to perform remote control unlocking for the first terminal of the same remote management group.
The second terminal inputs a preset unlocking password, encrypts the preset unlocking password by adopting a preset public key and a first preset random number to obtain a first unlocking password, and forwards the first unlocking password to the first terminal through the server.
The first terminal receives a first unlocking password obtained from the second terminal by the server, decrypts the first unlocking password by adopting a preset private key and a second preset random number to obtain a first unlocking password, then matches the first unlocking password with a prestored preset unlocking password, and performs unlocking operation under the condition of successful matching.
An embodiment of the present application provides an unlocking device, as shown in fig. 6, the unlocking device 60 may include:
a first sending module 601, configured to send a remote unlocking request to a server;
the first receiving module 602 is configured to receive a first unlock code fed back by the server; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal;
the decryption module 603 is configured to decrypt the first unlock password according to the preset private key and the second preset random number to obtain a first unlock password;
and the unlocking module 604 is used for carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
Optionally, the apparatus further comprises:
the first request module is used for sending first request information to the server, wherein the first request information carries a preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the acquisition module is used for acquiring the identification information of the management group and generating a public-private key pair; the public-private key pair comprises a preset public key and a preset private key.
Optionally, the first sending module 601 is specifically configured to:
and sending a remote unlocking request to the server under the condition that the unlocking password input error times exceed a preset threshold value.
By applying the unlocking device provided by the embodiment of the application, the identification information of the management group is obtained, and a public-private key pair is generated; the public-private key pair comprises a preset public key and a preset private key, first request information is sent to the server, and the first request information carries the preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal, a remote unlocking request is sent to the server, and a first unlocking password fed back by the server is received; the first unlocking password is obtained from the second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal, decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and carrying out unlocking processing according to the preset unlocking password and the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked, a secondary password or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
An embodiment of the present application provides an unlocking device, as shown in fig. 7, the unlocking device 70 may include:
a second receiving module 701, configured to receive a remote unlocking request sent by the first terminal;
the second sending module 702 is configured to send a password obtaining request to the second terminal in response to the remote unlocking request, and instruct the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key of the first terminal and a first preset random number to obtain a first unlocking password;
the indication module 703 is configured to receive a first unlock code fed back by the second terminal, and send the first unlock code to the first terminal, and instruct the first terminal to perform an unlock process according to the first unlock code.
Optionally, the apparatus further comprises:
the first request receiving module is used for receiving first request information sent by the first terminal, sending the first request information to the second terminal and indicating the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal.
Optionally, the apparatus further comprises:
the second request receiving module is used for receiving second request information sent by the second terminal; the second request information indicates that the second terminal requests to create a management group;
The creation instruction module is used for feeding back management group creation instruction information to the second terminal and instructing the second terminal to generate identification information of the management group.
By applying the unlocking device provided by the embodiment of the application, the second request information sent by the second terminal is received; the second request information indicates the second terminal to request to create the management group, feeds back management group creation indication information to the second terminal, indicates the second terminal to generate identification information of the management group, receives first request information sent by the first terminal, sends the first request information to the second terminal, and indicates the second terminal to store a preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal, receives a remote unlocking request sent by the first terminal, responds to the remote unlocking request, sends a password acquisition request to the second terminal, indicates the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password, receives the first unlocking password fed back by the second terminal, sends the first unlocking password to the first terminal, and indicates the first terminal to unlock according to the first unlocking password.
According to the embodiment of the application, the terminal equipment is remotely unlocked, a secondary password or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
An embodiment of the present application provides an unlocking device, as shown in fig. 8, the unlocking device 80 may include:
a third receiving module 801, configured to receive a password acquisition request sent by a server;
the encryption module 802 is configured to encrypt a preset unlock password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlock password in response to a password acquisition request;
and a third sending module 803, configured to send the first unlock code to the server, and instruct the server to send the first unlock code to the first terminal.
Optionally, the apparatus further comprises:
the second request sending module is used for sending second request information to the server; the second request information indicates that the second terminal requests to create a management group;
the generation module is used for receiving the management group creation instruction information fed back by the server and generating the identification information of the management group.
The unlocking device provided by the embodiment of the application is applied to send second request information to the server; the second request information indicates the second terminal to request to create the management group, receives management group creation indication information fed back by the server, generates identification information of the management group, receives a password acquisition request sent by the server, encrypts a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password in response to the password acquisition request, sends the first unlocking password to the server, and instructs the server to send the first unlocking password to the first terminal.
According to the embodiment of the application, the terminal equipment is remotely unlocked, a secondary password or other verification operations are not required to be input, the problem that remote control unlocking operation of the mobile terminal is complex is solved, simplicity and rapidness are achieved, and reliability is high.
The embodiment of the application provides an electronic device, which comprises a memory, a processor and a computer program stored on the memory, wherein the processor executes the computer program to realize the steps of an unlocking method, and compared with the related art, the method can realize the following steps: by remotely unlocking the terminal equipment, a secondary password or other verification operations are not required to be input, the problem that the remote control unlocking operation of the mobile terminal is complex is solved, and the method is simple, quick and high in reliability.
In an alternative embodiment, an electronic device is provided, as shown in fig. 9, the electronic device 9000 shown in fig. 9 includes: a processor 9001 and a memory 9003. Wherein the processor 9001 is coupled to a memory 9003, such as via a bus 9002. Optionally, the electronic device 9000 may further comprise a transceiver 9004, the transceiver 9004 being operable for data interactions between the electronic device and other electronic devices, such as transmission of data and/or reception of data, etc. Note that, in practical applications, the transceiver 9004 is not limited to one, and the structure of the electronic device 9000 is not limited to the embodiment of the present application.
The processor 9001 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. The processor 9001 may also be a combination implementing computing functions, e.g. comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 9002 may include a pathway to transfer information between the components. The bus 9002 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The bus 9002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 9, but not only one bus or one type of bus.
The Memory 9003 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory ), a CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media, other magnetic storage devices, or any other medium that can be used to carry or store a computer program and that can be Read by a computer, without limitation.
The memory 9003 is used to store a computer program that executes an embodiment of the present application, and is controlled to be executed by the processor 9001. The processor 9001 is configured to execute a computer program stored in the memory 9003 to implement the steps shown in the foregoing method embodiments.
Embodiments of the present application provide a computer readable storage medium having a computer program stored thereon, where the computer program, when executed by a processor, may implement the steps and corresponding content of the foregoing method embodiments.
The embodiments of the present application also provide a computer program product, which includes a computer program, where the computer program can implement the steps of the foregoing method embodiments and corresponding content when executed by a processor.
The terms "first," "second," "third," "fourth," "1," "2," and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the present application described herein may be implemented in other sequences than those illustrated or otherwise described.
It should be understood that, although the flowcharts of the embodiments of the present application indicate the respective operation steps by arrows, the order of implementation of these steps is not limited to the order indicated by the arrows. In some implementations of embodiments of the present application, the implementation steps in the flowcharts may be performed in other orders as desired, unless explicitly stated herein. Furthermore, some or all of the steps in the flowcharts may include multiple sub-steps or multiple stages based on the actual implementation scenario. Some or all of these sub-steps or phases may be performed at the same time, or each of these sub-steps or phases may be performed at different times, respectively. In the case of different execution time, the execution sequence of the sub-steps or stages may be flexibly configured according to the requirement, which is not limited in the embodiment of the present application.
The foregoing is merely an optional implementation manner of the implementation scenario of the application, and it should be noted that, for those skilled in the art, other similar implementation manners based on the technical ideas of the application are adopted without departing from the technical ideas of the application, and also belong to the protection scope of the embodiments of the application.
Claims (8)
1. An unlocking method applied to a first terminal is characterized by comprising the following steps:
sending a remote unlocking request to a server;
receiving a first unlocking password fed back by the server; the first unlocking password is obtained from a second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal; the preset public key is stored on the second terminal;
decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password; the preset private key is stored on the first terminal, and the preset private key is matched with the preset public key;
carrying out unlocking treatment according to a preset unlocking password and the first unlocking password;
Before the remote unlocking request is sent to the server, the method comprises the following steps:
sending first request information to the server, wherein the first request information carries the preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal; the first terminal is a managed terminal; the second terminal is a manager terminal;
before the first request information is sent to the server, the method comprises the following steps:
acquiring the identification information of the management group and generating a public-private key pair; the public-private key pair comprises the preset public key and the preset private key.
2. An unlocking method applied to a server is characterized by comprising the following steps:
receiving a remote unlocking request sent by a first terminal;
responding to the remote unlocking request, sending a password acquisition request to a second terminal, and indicating the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key of the first terminal and a first preset random number to obtain a first unlocking password; the preset public key is stored on the second terminal;
receiving the first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal, indicating the first terminal to decrypt the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and carrying out unlocking processing according to the preset unlocking password and the first unlocking password; the preset private key is stored on the first terminal, and the preset private key is matched with the preset public key;
Before receiving a remote unlocking request sent by a first terminal, the method comprises the following steps:
receiving first request information sent by the first terminal, and sending the first request information to the second terminal, and indicating the second terminal to store the preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal; the first terminal is a managed terminal; the second terminal is a manager terminal;
before receiving the first request information sent by the first terminal, the method comprises the following steps:
receiving second request information sent by the second terminal; the second request information indicates that the second terminal requests creation of a management group;
feeding back management group creation instruction information to the second terminal, and instructing the second terminal to generate identification information of the management group;
the identification information of the management group is used for indicating the first terminal to generate a public-private key pair.
3. An unlocking method applied to a second terminal is characterized by comprising the following steps:
receiving a password acquisition request sent by a server;
responding to the password acquisition request, and encrypting a preset unlocking password of a first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password; the preset public key is stored on the second terminal;
Sending the first unlocking password to the server, and indicating the server to send the first unlocking password to the first terminal; the first unlocking password is decrypted through the first terminal according to a preset private key and a second preset random number, the preset private key is stored on the first terminal, and the preset private key is matched with the preset public key;
before receiving the password acquisition request sent by the server, the method comprises the following steps:
receiving first request information sent by the server, and storing the preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal; the first terminal is a managed terminal; the second terminal is a manager terminal;
before receiving the first request information sent by the server, the method comprises the following steps:
sending second request information to the server, wherein the second request information indicates that the second terminal requests to create a management group;
receiving management group creation indication information fed back by the server, and generating identification information of the management group;
The identification information of the management group is used for indicating the first terminal to generate a public-private key pair.
4. An unlocking device applied to a first terminal, comprising:
the first sending module is used for sending a remote unlocking request to the server;
the first receiving module is used for receiving a first unlocking password fed back by the server; the first unlocking password is obtained from a second terminal for the server; the first unlocking password is obtained by encrypting a preset unlocking password of the first terminal by the second terminal according to a preset public key and a first preset random number of the first terminal; the preset public key is stored on the second terminal;
the decryption module is used for decrypting the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password; the preset private key is stored on the first terminal, and the preset private key is matched with the preset public key;
the unlocking module is used for carrying out unlocking treatment according to a preset unlocking password and the first unlocking password;
the first request module is used for sending first request information to the server, wherein the first request information carries the preset public key; the first request information indicates that the first terminal requests to join a management group managed by the second terminal; the first terminal is a managed terminal; the second terminal is a manager terminal;
The acquisition module is used for acquiring the identification information of the management group and generating a public-private key pair; the public-private key pair comprises the preset public key and the preset private key.
5. An unlocking device applied to a server, comprising:
the second receiving module is used for receiving a remote unlocking request sent by the first terminal;
the second sending module is used for responding to the remote unlocking request, sending a password acquisition request to a second terminal, and indicating the second terminal to encrypt a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password; the preset public key is stored on the second terminal;
the indication module is used for receiving the first unlocking password fed back by the second terminal, sending the first unlocking password to the first terminal, indicating the first terminal to decrypt the first unlocking password according to a preset private key and a second preset random number to obtain a first unlocking password, and carrying out unlocking processing according to the preset unlocking password and the first unlocking password; the preset private key is stored on the first terminal, and the preset private key is matched with the preset public key;
The first request receiving module is used for receiving first request information sent by the first terminal, sending the first request information to the second terminal and indicating the second terminal to store the preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal; the first terminal is a managed terminal; the second terminal is a manager terminal;
the second request receiving module is used for receiving second request information sent by the second terminal; the second request information indicates that the second terminal requests creation of a management group;
feeding back management group creation instruction information to the second terminal, and instructing the second terminal to generate identification information of the management group;
the identification information of the management group is used for indicating the first terminal to generate a public-private key pair.
6. An unlocking device applied to a second terminal, comprising:
the third receiving module is used for receiving the password acquisition request sent by the server;
the encryption module is used for responding to the password acquisition request and encrypting a preset unlocking password of the first terminal according to a preset public key and a first preset random number of the first terminal to obtain a first unlocking password; the preset public key is stored on the second terminal;
The third sending module is used for sending the first unlocking password to the server and indicating the server to send the first unlocking password to the first terminal; the first unlocking password is decrypted through the first terminal according to a preset private key and a second preset random number, the preset private key is stored on the first terminal, and the preset private key is matched with the preset public key;
a fourth receiving module, configured to receive first request information sent by the server, and store the preset public key carried in the first request information; the first request information indicates that the first terminal requests to join a management group managed by the second terminal; the first terminal is a managed terminal; the second terminal is a manager terminal;
a fourth sending module, configured to send second request information to the server, where the second request information indicates that the second terminal requests to create a management group;
receiving management group creation indication information fed back by the server, and generating identification information of the management group;
the identification information of the management group is used for indicating the first terminal to generate a public-private key pair.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to carry out the steps of the unlocking method of any one of claims 1 to 3.
8. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the unlocking method of any one of claims 1 to 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111443383.6A CN114158051B (en) | 2021-11-30 | 2021-11-30 | Unlocking method, unlocking device, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111443383.6A CN114158051B (en) | 2021-11-30 | 2021-11-30 | Unlocking method, unlocking device, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114158051A CN114158051A (en) | 2022-03-08 |
CN114158051B true CN114158051B (en) | 2024-01-09 |
Family
ID=80784445
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111443383.6A Active CN114158051B (en) | 2021-11-30 | 2021-11-30 | Unlocking method, unlocking device, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114158051B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003138806A (en) * | 2001-11-02 | 2003-05-14 | Okamura Corp | Appliance having remote locking/unlocking function |
CN102930188A (en) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
CA2830341A1 (en) * | 2012-10-12 | 2014-04-12 | Roam Mobility Inc. | Method for activating an unlocked, inactive mobile device using a universal integrated circuit card pre-provisioned with a service plan |
CN104298901A (en) * | 2014-09-12 | 2015-01-21 | 厦门美图移动科技有限公司 | Unlocking method and device for mobile terminal |
CN105160216A (en) * | 2015-07-09 | 2015-12-16 | 小米科技有限责任公司 | Unlocking method and apparatus and terminal |
CN105915336A (en) * | 2016-05-24 | 2016-08-31 | 珠海市魅族科技有限公司 | Object cooperative decryption method and device thereof |
CN108768941A (en) * | 2018-04-19 | 2018-11-06 | 北京信安世纪科技股份有限公司 | A kind of method and device of remote de-locking safety equipment |
CN112115464A (en) * | 2020-09-11 | 2020-12-22 | 北京小米移动软件有限公司 | Unlocking processing method and device, electronic equipment and storage medium |
CN113676474A (en) * | 2021-08-19 | 2021-11-19 | 浙江大华技术股份有限公司 | Equipment unlocking method and device, storage medium and electronic device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101997678A (en) * | 2010-11-18 | 2011-03-30 | 东莞宇龙通信科技有限公司 | Password acquisition method and terminal |
TWI582682B (en) * | 2012-07-19 | 2017-05-11 | 群聯電子股份有限公司 | Method for entering password and portable electronic and unlocking method and method for data authentication |
CN107340960A (en) * | 2016-04-29 | 2017-11-10 | 南宁富桂精密工业有限公司 | User interface control method and system |
EP3667537B8 (en) * | 2017-09-27 | 2021-10-06 | Shenzhen Heytap Technology Corp., Ltd. | Method for unlocking electronic device, electronic device, storage medium, and program product |
CN112396738B (en) * | 2020-12-01 | 2022-11-04 | 深圳市汇顶科技股份有限公司 | Unlocking method of shared device and related device |
-
2021
- 2021-11-30 CN CN202111443383.6A patent/CN114158051B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003138806A (en) * | 2001-11-02 | 2003-05-14 | Okamura Corp | Appliance having remote locking/unlocking function |
CN102930188A (en) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
CA2830341A1 (en) * | 2012-10-12 | 2014-04-12 | Roam Mobility Inc. | Method for activating an unlocked, inactive mobile device using a universal integrated circuit card pre-provisioned with a service plan |
CN104298901A (en) * | 2014-09-12 | 2015-01-21 | 厦门美图移动科技有限公司 | Unlocking method and device for mobile terminal |
CN105160216A (en) * | 2015-07-09 | 2015-12-16 | 小米科技有限责任公司 | Unlocking method and apparatus and terminal |
CN105915336A (en) * | 2016-05-24 | 2016-08-31 | 珠海市魅族科技有限公司 | Object cooperative decryption method and device thereof |
CN108768941A (en) * | 2018-04-19 | 2018-11-06 | 北京信安世纪科技股份有限公司 | A kind of method and device of remote de-locking safety equipment |
CN112115464A (en) * | 2020-09-11 | 2020-12-22 | 北京小米移动软件有限公司 | Unlocking processing method and device, electronic equipment and storage medium |
CN113676474A (en) * | 2021-08-19 | 2021-11-19 | 浙江大华技术股份有限公司 | Equipment unlocking method and device, storage medium and electronic device |
Also Published As
Publication number | Publication date |
---|---|
CN114158051A (en) | 2022-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107251035B (en) | Account recovery protocol | |
US9779224B2 (en) | Methods and systems for client-enhanced challenge-response authentication | |
US10797879B2 (en) | Methods and systems to facilitate authentication of a user | |
CN110334503B (en) | Method for unlocking one device by using the other device | |
ES2687191T3 (en) | Network authentication method for secure electronic transactions | |
CN106104562B (en) | System and method for securely storing and recovering confidential data | |
EP2314090B1 (en) | Portable device association | |
US11057210B1 (en) | Distribution and recovery of a user secret | |
EP3247087B1 (en) | User-initiated migration of encryption keys | |
CN103152366B (en) | Obtain the method for terminal authorization, terminal and server | |
US9992017B2 (en) | Encrypting and storing data | |
US11757874B2 (en) | Mutual authentication system | |
JP2019530265A (en) | Method and apparatus for providing and acquiring graphic code information and terminal | |
US20160021101A1 (en) | Method for backing up a user secret and method for recovering a user secret | |
CN107920052B (en) | Encryption method and intelligent device | |
CN111723384B (en) | Data processing method, system and equipment | |
US10320774B2 (en) | Method and system for issuing and using derived credentials | |
CN113868684B (en) | Signature method, device, server, medium and signature system | |
CN109995739B (en) | Information transmission method, client, server and storage medium | |
CN103701596A (en) | Document access method, system and equipment and document access request response method, system and equipment | |
CN113411187A (en) | Identity authentication method and system, storage medium and processor | |
CN112003697A (en) | Encryption and decryption method and device for cryptographic module, electronic equipment and computer storage medium | |
CN111654503A (en) | Remote control method, device, equipment and storage medium | |
CN112425116B (en) | Intelligent door lock wireless communication method, intelligent door lock, gateway and communication equipment | |
CN114158051B (en) | Unlocking method, unlocking device, electronic equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |