WO2013182119A1 - 屏幕解锁的方法、装置及终端 - Google Patents
屏幕解锁的方法、装置及终端 Download PDFInfo
- Publication number
- WO2013182119A1 WO2013182119A1 PCT/CN2013/079224 CN2013079224W WO2013182119A1 WO 2013182119 A1 WO2013182119 A1 WO 2013182119A1 CN 2013079224 W CN2013079224 W CN 2013079224W WO 2013182119 A1 WO2013182119 A1 WO 2013182119A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- key information
- unlocking
- screen
- message
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/047—Key management, e.g. using generic bootstrapping architecture [GBA] without using a trusted network node as an anchor
- H04W12/0471—Key exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Definitions
- the present invention relates to the field of communications, and in particular to a method, apparatus, and terminal for unlocking a screen.
- the embodiment of the invention provides a method, a device and a terminal for unlocking a screen, so as to at least solve the related art, the user cannot unlock the screen because of forgetting the password, and then needs to upgrade the version to unlock the screen, but the method wastes time and causes The problem of losing important data in the terminal due to the upgraded version.
- a method for unlocking a screen including: a first terminal transmitting a message for acquiring key information to a second terminal, wherein the key information is used for the first terminal And performing unlocking; the first terminal performs screen unlocking on the first terminal according to key information from the second terminal.
- the sending, by the first terminal, the message for acquiring the key information to the second terminal includes: determining, by the first terminal, whether the current number of unlocking times reaches a preset number of unlocking times; if yes, sending the message of acquiring the key information To the second terminal.
- the first terminal performs screen unlocking on the first terminal according to the key information from the second terminal, where: the first terminal determines the key information from the second terminal and the first Whether the key information stored in a terminal matches; if yes, unlocking the screen of the first terminal.
- the method further includes: resetting the unlock password of the first terminal to a passwordless state.
- the method further includes: encrypting the message for acquiring the key information, and transmitting the message to the second terminal; decrypting the key information from the second terminal, and sending the message to the a terminal, the first terminal determines whether the decrypted key information matches the key information stored in the first terminal; if yes, unlocks the screen of the first terminal.
- a method for unlocking a screen including: after receiving a message for acquiring key information from a first terminal, the second terminal prompts the user to input an authentication code;
- the second terminal receives the verification code of the acquired key information input by the user, and determines whether the verification code matches the verification code preset in the second terminal;
- the key information is sent to the first terminal, where the key information is used to unlock the first terminal.
- the sending, by the second terminal, the key information to the first terminal, the second terminal, according to the message for acquiring the key information, extracting, pre-stored in the second terminal The key information is described, and the key information is sent to the first terminal.
- a device for unlocking a screen where the first terminal includes: a sending module, configured to send a message for acquiring key information to a second terminal, where the key information
- the unlocking module is configured to perform screen unlocking on the first terminal according to key information from the second terminal.
- the sending module includes: a first determining unit, configured to determine whether the current number of unlocking times reaches a preset number of unlocking times; and the sending unit is configured to send when the current number of unlocking times reaches a preset number of unlocking times And obtaining the message of the key information to the second terminal.
- a first determining unit configured to determine whether the current number of unlocking times reaches a preset number of unlocking times
- the sending unit is configured to send when the current number of unlocking times reaches a preset number of unlocking times And obtaining the message of the key information to the second terminal.
- the unlocking module includes: a second determining unit, configured to determine from the second Whether the key information of the terminal matches the key information stored in the first terminal; and the unlocking unit is configured to unlock the screen of the first terminal if the matching is performed.
- a terminal comprising: the device for unlocking a screen of any of the above.
- a terminal including:
- the first receiving module is configured to: after receiving the message of acquiring the key information from the first terminal, prompting the user to input the verification code;
- the authentication module is configured to receive a verification code of the obtained key information input by the user, determine whether the verification code matches the verification code preset in the second terminal, and send the determination result to the sending module;
- the sending module is configured to send the key information to the first terminal, if the result of the determination is a match, wherein the key information is used to unlock the first terminal.
- the terminal further includes:
- a storage module configured to pre-store the key information of the first terminal
- the sending module configured to send the key information to the first terminal, includes: the sending module, according to the message for acquiring the key information, extracting the key pre-stored in the storage module Information, and transmitting the key information to the first terminal.
- the embodiment of the present invention uses the following method: Obtain key information that can unlock the screen of the first terminal from the second terminal, and perform screen unlocking on the first terminal by using the key information.
- the user can solve the problem that the user cannot unlock the screen because of forgetting the password, and then needs to upgrade the version to unlock the screen, but the method wastes time and causes the loss of important data in the terminal due to the upgraded version.
- the terminal can be unlocked according to the spare key information, which avoids the situation that the terminal cannot be unlocked because the terminal unlock code is forgotten, thereby further improving the usability of the terminal.
- FIG. 1 is a flow chart of a method of unlocking a screen according to an embodiment of the present invention
- FIG. 2 is a schematic diagram 1 of an initialization setting interface according to a preferred embodiment of the present invention
- FIG. 3 is a schematic diagram 2 of an initialization setting interface according to a preferred embodiment of the present invention
- FIG. 4 is an initialization setting interface according to a preferred embodiment of the present invention.
- FIG. 5 is a flowchart of a method for unlocking a screen according to a preferred embodiment 1 of the present invention.
- FIG. 6 is a structural block diagram of an apparatus for unlocking a screen according to an embodiment of the present invention.
- FIG. 7 is a structural block diagram of a transmitting module of a device for unlocking a screen according to an embodiment of the present invention
- FIG. 8 is a structural block diagram of an unlocking module of a device for unlocking a screen according to an embodiment of the present invention
- FIG. 9 is a block diagram of an unlocking module according to an embodiment of the present invention. Block diagram of the second terminal;
- Figure 10 is a block diagram showing the structure of a system according to a preferred embodiment 2 of the present invention.
- the embodiment provides a method for unlocking the screen.
- the process of the process is as shown in FIG.
- Step S102 The first terminal sends a message for acquiring the key information to the second terminal, where the key information is used to unlock the first terminal.
- Step S104 The first terminal performs screen unlocking on the first terminal according to the key information from the second terminal.
- the following method is used:
- the key information that can unlock the screen of the first terminal is obtained from the second terminal, and the screen is unlocked by the first terminal by using the key information.
- the user can solve the problem that the user cannot unlock the screen because of forgetting the password, and then needs to upgrade the version to unlock the screen, but the method wastes time and causes the loss of important data in the terminal due to the upgraded version.
- the terminal is unlocked according to the spare key information, which avoids the situation that the terminal cannot be unlocked because the terminal unlock code is forgotten, thereby further improving the usability of the terminal.
- the sending, by the first terminal, the message for acquiring the key information to the second terminal may include the following process: the first terminal determines whether the current number of unlocking times reaches a preset number of unlocking times; Or, the preset number of unlocking times has been exceeded, and a message for obtaining the key information is sent to the second terminal.
- step 102 the method further includes:
- Step 202 After the second terminal receives the message for obtaining the key information, the second terminal pops up a prompt box for the user to input the verification code, and the user may input the previously agreed verification code.
- the process of inputting the verification code prevents others from maliciously stealing the first terminal information, thereby further ensuring the security of the first terminal user information.
- Step 204 The second terminal receives the verification code of the obtained key information input by the user, and determines whether the verification code matches the verification code preset in the second terminal. If the verification code matches, the step is performed.
- Step 206 If the verification code is correct, the second terminal sends the key information to the first terminal.
- the second terminal extracts the key information stored in the second terminal in advance according to the message of acquiring the key information from the first terminal, and then sends the key information to the first terminal.
- the process of transmitting the key information ends.
- the number of times the authentication code is input can also be limited. For example, three times, the verification code is still wrong at the third time, and the process is terminated.
- the first terminal After the first terminal receives the key information, the first terminal performs screen unlocking on the first terminal according to the key information from the second terminal, and the process may include the following process: the first terminal determines that the second terminal is from the second terminal. Whether the key information is matched with the key information stored in the first terminal; if the matching is performed, the screen of the first terminal is unlocked, that is, the screen unlocking of the first terminal is successful. Otherwise, the unlocking process ends.
- the unlocking password of the first terminal is reset to a passwordless state, and the user can select to set a new password or not to set again according to the need, wherein the password can be of various types, for example, voice. Password, numeric password, pattern password.
- the first terminal When the first terminal sends a message for acquiring key information to the second terminal, the first terminal or the network The message can be encrypted and then sent to the second terminal. Similarly, when receiving the key information, the first terminal or the network can decrypt it, and perform matching and the like.
- the user can still unlock by other means (sending the alternate unlock code), thereby saving the time for updating the version after sale and improving the efficiency.
- the embodiment provides a method for unlocking the screens between the terminals, that is, the key information (ie, the security code) is preset on another terminal, and the screen unlocking pattern is entered through the network encryption.
- the password or the password cannot be unlocked normally, which causes many unfavorable problems for the user operation.
- the process of this method is as follows:
- the terminal has a security unlock function after the preset security unlock code is preset. After forgetting the preset unlock pattern, the terminal can send its signature to another terminal through the network. The other terminal is retransmitted to the locked terminal over the network via the previously set alternate security code. The locked terminal receives the alternate unlock code transmitted through the network. After the matching, the unlocking takes effect, the screen can be unlocked smoothly, and the previous unlocking pattern is reset. That is, the current terminal defaults to no pattern and password unlocking.
- the background application can be automatically cleared according to the user's custom requirements, which not only saves the current memory used by the mobile terminal, but also avoids the long-term hanging of the background application.
- System performance has a large impact.
- FIG. 3 and FIG. 4 are respectively schematic diagrams of an initialization setting interface according to the embodiment, including:
- Figure 2 shows the unlocking code, also called the second power-on unlock code or security key, to the user before setting the power-on unlock password to the terminal.
- the user can select Yes or No to perform related subsequent operations.
- the user can set the number of times the unlocking fails and then activate the program to activate the alternate password.
- the default value can be set to 5 times or 3 times, according to the user's needs. To set it up, but setting the number less times works better.
- Figure 4 shows that after the user successfully sets the alternate unlock code, the user will also send a prompt to send the backup password to the XX terminal.
- Figure 5 is a flow chart of the method according to this embodiment, including steps S502 to S520.
- Step S502 determining whether the mobile terminal has set a backup password (the backup password here may be one of key information). If the alternate password has been set, the process proceeds to step S504, and if the alternate unlock password is not set, the process proceeds to step S520.
- the backup password here may be one of key information
- Step S504 further determining whether the mobile terminal user has forgotten the unlock password. If the unlock password initially set has been forgotten, the process proceeds to step S506. If the initial password is not forgotten, step S520 is performed, and then the normal password or pattern unlocking procedure is entered.
- Step S506 determining whether the mobile terminal meets the condition for starting the activation of the backup password at this time.
- the foregoing condition may be that the number of unlockings reaches or exceeds a preset number of times.
- step S508 is performed, and if the trigger condition is not met, step S520 is performed.
- the condition for starting the activation of the backup password is the same as the activation of the backup password after the number of unlock failures is set in FIG. 2.
- Step S508 sending a backup password unlocking request to the network server.
- the foregoing network server may be a network server of a communication carrier, a network server of the terminal manufacturer, or a network server for purchasing a third-party company, and there is no specific limitation, and only a specific function is required.
- the network here is also a generalized network, such as a mobile communication network, or a network connected by Bluetooth.
- Step S510 The network server encrypts by its own encryption unit and sends it to the terminal B to trigger the reminder of the backup password. During the implementation of this step, encrypting the sent alternate password unlock request can greatly improve the security of the transmitted data.
- Step S512 After receiving the reminder of triggering the backup password of the network server, the terminal B retrieves the previously stored spare unlock password information from the storage unit and feeds back to the network server.
- step S512 the pre-stored unlock password information is extracted.
- step S514 the network server then transmits the alternate unlock code fed back by the B terminal to the A terminal through the decryption unit.
- step S5166 the terminal A determines whether the alternate unlocking password transmitted from the terminal B matches the previously preset alternate unlocking password. If the matching is successful, step S518 is performed. If the match fails, step S520 is performed.
- step S5128 the terminal A successfully unlocks and gives a UI (User Interface) prompt.
- Step S520 ending the process.
- the terminals A and B can pop up various prompts according to different reasons. For example, if the matching in step S516 is unsuccessful, the "alternate unlock code unlocking failure" can be displayed on the terminal A.
- the embodiment of the present invention further provides a device for unlocking a screen, and the device may be located at the first terminal.
- the block diagram of the device is as shown in FIG. 6.
- the sending module 10 is configured to send a message for acquiring key information to the second terminal.
- the key information is set to unlock the first terminal;
- the unlocking module 20 is coupled to the sending module 10, and is configured to perform screen unlocking on the first terminal according to the key information from the second terminal.
- FIG. 7 is a block diagram showing the structure of the sending module 10, including: a first determining unit 102, configured to determine whether the current number of unlocking times reaches a preset number of unlocking times; the sending unit 104, coupled with the first determining unit 102, is set to be in When the current number of unlocks reaches the preset number of unlocks, the message of acquiring the key information is sent to the second terminal.
- the unlocking module 20 is further configured as shown in FIG. 8, and includes: a second determining unit 202, configured to determine whether the key information from the second terminal matches the key information stored in the first terminal; Coupling with the second judging unit 202, it is set to unlock the screen of the first terminal in the case of matching.
- the embodiment further provides a second terminal
- FIG. 9 shows a structural block diagram of the second terminal, which includes: a receiving module 301, configured to receive a message from the first terminal after acquiring the key information.
- the sending module 302 is configured to receive a verification code of the acquired key information input by the user, and determine whether the verification code matches the preset preset verification code of the second terminal; and the sending module 303 is configured to be in the A module that transmits key information to the first terminal when the verification code is correct.
- the second terminal further includes: a storage module 304, configured to pre-store the key information of the first terminal;
- the sending module 303 is configured to retrieve the key information stored in the storage module 304 according to the message for acquiring the key information from the first terminal, and send the key information to the first terminal.
- the terminal is an intelligent mobile terminal, wherein the naming of each module is slightly different from the above modules, but the same function can be achieved.
- FIG. 10 is a block diagram showing the structure of the mobile terminal A, the network, and the mobile terminal B according to the present embodiment.
- the terminal A includes the following units:
- the first sending unit is configured to send the unlocking request to the terminal B through the network after the mobile terminal meets the condition for starting the standby unlocking code.
- the first receiving unit corresponding to the first sending unit, is configured to receive the alternate unlocking code by the mobile terminal, and transfer the data to the storage unit.
- the comparison unit is mainly used for the judgment function of some trigger conditions and the comparison function when the backup code is unlocked. For example, it is determined whether the alternate unlock function is enabled, whether the condition for turning on the alternate unlock function is satisfied.
- the output unit provides a visual display between the user and the user that can be operated through the UI interface and feedback the results of the corresponding operation. For example, some initialization settings made by the user before the function is turned on, and some prompt information after the device is enabled.
- the network server of the network includes: an encryption unit, which is mainly used to perform an encryption setting operation on the alternate unlock code during transmission, so as to be more secure in the transmission process.
- the decryption unit corresponding to the encryption unit, is mainly used to perform the decryption setting operation of the unlock code during the transmission, so as to be unlocked.
- the terminal B includes the following unit:
- the second receiving unit is configured to receive a message for acquiring key information.
- a storage unit which additionally opens a storage space in the mobile terminal, and Save it up.
- the second sending unit is configured to send, by the terminal B, the key information to the terminal A to be unlocked through the unit.
- the authentication unit provides a protection against the identity after the activation of the alternate password condition is met, so as to prevent anyone from unlocking with the alternate unlock code.
- the user-defined manner is adopted, so that the user can freely set the backup password, including the condition for starting the backup password, which has strong security and convenient for the user to select to start the backup if the user forgets to unlock the password.
- the password is used to unlock the terminal, which eliminates the situation that the terminal cannot be unlocked because the terminal unlock code is forgotten, thereby improving the usability and user experience of the mobile terminal.
- the key information of the first terminal screen can be unlocked from the second terminal, and the first terminal is screen unlocked by the key information.
- the user can solve the problem that the user cannot unlock the screen because of forgetting the password, and then needs to upgrade the version to unlock the screen, but the method wastes time and causes the loss of important data in the terminal due to the upgraded version.
- the terminal is unlocked according to the spare key information, which avoids the situation that the terminal cannot be unlocked because the terminal unlock code is forgotten, thereby further improving the usability of the terminal.
- modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
- the invention is not limited to any particular combination of hardware and software.
- the embodiment of the present invention uses the following method: Obtain key information that can unlock the screen of the first terminal from the second terminal, and perform screen unlocking on the first terminal by using the key information.
- the user can solve the problem that the user cannot unlock the screen because of forgetting the password, and then needs to upgrade the version to unlock the screen, but the method wastes time and causes the loss of important data in the terminal due to the upgraded version.
- the terminal can be unlocked according to the spare key information, which avoids the situation that the terminal cannot be unlocked because the terminal unlock code is forgotten, thereby further improving the usability of the terminal.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Telephone Function (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/434,776 US9372977B2 (en) | 2012-10-12 | 2013-07-11 | Screen unlocking method, device and terminal |
EP13800093.0A EP2894584B1 (en) | 2012-10-12 | 2013-07-11 | Screen unlocking method, device and terminal |
JP2015535960A JP2016500170A (ja) | 2012-10-12 | 2013-07-11 | 画面ロック解除方法、装置及び端末 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210387777.9 | 2012-10-12 | ||
CN2012103877779A CN102930188A (zh) | 2012-10-12 | 2012-10-12 | 屏幕解锁的方法、装置及终端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013182119A1 true WO2013182119A1 (zh) | 2013-12-12 |
Family
ID=47644985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/079224 WO2013182119A1 (zh) | 2012-10-12 | 2013-07-11 | 屏幕解锁的方法、装置及终端 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9372977B2 (zh) |
EP (1) | EP2894584B1 (zh) |
JP (1) | JP2016500170A (zh) |
CN (1) | CN102930188A (zh) |
WO (1) | WO2013182119A1 (zh) |
Families Citing this family (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102930188A (zh) | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | 屏幕解锁的方法、装置及终端 |
CN103533180A (zh) * | 2013-10-30 | 2014-01-22 | 上海斐讯数据通信技术有限公司 | 基于与设定联系人通话实现解锁手机的方法 |
CN103645838A (zh) * | 2013-11-28 | 2014-03-19 | 宇龙计算机通信科技(深圳)有限公司 | 一种移动终端及其解锁方法 |
US10015153B1 (en) * | 2013-12-23 | 2018-07-03 | EMC IP Holding Company LLC | Security using velocity metrics identifying authentication performance for a set of devices |
CN103728894B (zh) * | 2014-01-22 | 2016-06-29 | 广东欧珀移动通信有限公司 | 一种终端设备的远程控制方法和系统 |
CN104541282B (zh) * | 2014-05-14 | 2018-06-26 | 华为技术有限公司 | 解锁方法、装置及设备 |
CN105227749B (zh) * | 2014-06-20 | 2018-08-03 | 鸿富锦精密工业(深圳)有限公司 | 屏幕解锁方法及系统 |
CN104093119B (zh) * | 2014-06-26 | 2017-10-13 | 小米科技有限责任公司 | 解锁方法及装置 |
CN104102864A (zh) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | 终端锁屏密码的重置方法、重置系统和终端 |
CN104298901B (zh) * | 2014-09-12 | 2017-12-15 | 厦门美图移动科技有限公司 | 一种移动终端的解锁方法及设备 |
CN105786303B (zh) * | 2014-12-24 | 2019-06-07 | 纬创资通(中山)有限公司 | 电子装置的屏幕解锁方法及电子装置 |
CN105550564B (zh) * | 2015-07-28 | 2019-06-11 | 宇龙计算机通信科技(深圳)有限公司 | 终端解锁方法及系统 |
CN105101060A (zh) * | 2015-07-28 | 2015-11-25 | 东莞酷派软件技术有限公司 | 基于短距离通信解锁加密对象的方法、装置及终端设备 |
CN106934511A (zh) * | 2015-12-30 | 2017-07-07 | 海能达通信股份有限公司 | 任务调度方法及系统、服务器、用户终端 |
CN105844122A (zh) * | 2016-01-26 | 2016-08-10 | 乐视致新电子科技(天津)有限公司 | 解锁密码设置方法、终端设备及服务器 |
CN105847522A (zh) * | 2016-01-26 | 2016-08-10 | 乐视致新电子科技(天津)有限公司 | 解锁方法、终端设备及服务器 |
CN107370602A (zh) * | 2016-05-13 | 2017-11-21 | 中兴通讯股份有限公司 | 一种用户终端的解密方法及系统 |
CN106067875B (zh) * | 2016-05-24 | 2020-04-17 | 珠海市魅族科技有限公司 | 智能终端加密方法与系统 |
CN105915336B (zh) * | 2016-05-24 | 2020-06-09 | 珠海市魅族科技有限公司 | 一种对象协同解密方法及其装置 |
CN107506632A (zh) * | 2016-06-14 | 2017-12-22 | 中兴通讯股份有限公司 | 一种移动终端的解锁方法和移动终端 |
CN106126986B (zh) * | 2016-06-15 | 2020-07-10 | 北京小米移动软件有限公司 | 加锁数据分区的解锁处理方法及装置 |
CN106254942A (zh) * | 2016-09-27 | 2016-12-21 | 珠海市魅族科技有限公司 | 一种控制电视系统的方法、电视系统和移动终端 |
CN107992728B (zh) * | 2016-10-27 | 2022-05-20 | 腾讯科技(深圳)有限公司 | 人脸验证方法及装置 |
CN106548052A (zh) * | 2016-11-22 | 2017-03-29 | 上海斐讯数据通信技术有限公司 | 一种移动终端解锁方法和系统 |
CN106656483A (zh) * | 2016-11-25 | 2017-05-10 | 宇龙计算机通信科技(深圳)有限公司 | 一种锁屏密码找回方法、服务器及锁屏密码找回系统 |
CN106789070A (zh) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | 数据的解密方法、装置及终端 |
CN108416197A (zh) * | 2017-02-09 | 2018-08-17 | 北京小米移动软件有限公司 | 解锁移动终端的方法及装置 |
US10726117B2 (en) | 2017-06-28 | 2020-07-28 | Motorola Solutions, Inc. | Method to recover data from a locked device for upload to a service |
CN107318055A (zh) * | 2017-08-16 | 2017-11-03 | 广东小天才科技有限公司 | 一种移动终端的屏幕解锁方法及装置 |
WO2019061069A1 (zh) * | 2017-09-27 | 2019-04-04 | 深圳市云中飞网络科技有限公司 | 电子设备解锁方法、电子设备、存储介质及程序产品 |
WO2019144357A1 (zh) * | 2018-01-25 | 2019-08-01 | 华为技术有限公司 | 通过紧急联系人和用户输入解锁的方法及终端 |
US11418434B2 (en) | 2018-10-02 | 2022-08-16 | Arista Networks, Inc. | Securing MPLS network traffic |
US11283733B2 (en) | 2018-10-02 | 2022-03-22 | Arista Networks, Inc. | Proxy ports for network device functionality |
CN111814125A (zh) * | 2019-04-12 | 2020-10-23 | 奇酷互联网络科技(深圳)有限公司 | 终端解锁的方法、处理终端及存储装置 |
CN111859367A (zh) * | 2020-07-28 | 2020-10-30 | 中移(杭州)信息技术有限公司 | 锁屏密码设置方法、终端及计算机可读存储介质 |
CN112422744A (zh) * | 2020-09-28 | 2021-02-26 | 深圳市修远文化创意有限公司 | 一种手机解锁的方法、手机及计算机 |
CN114158051B (zh) * | 2021-11-30 | 2024-01-09 | 元心信息科技集团有限公司 | 解锁方法、装置、电子设备及计算机可读存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096546A (zh) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | 一种操作系统的解锁方法及装置 |
CN102708324A (zh) * | 2012-05-16 | 2012-10-03 | 惠州Tcl移动通信有限公司 | 一种屏幕锁解锁系统及方法 |
CN102930188A (zh) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | 屏幕解锁的方法、装置及终端 |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3966233B2 (ja) * | 2003-06-11 | 2007-08-29 | 日本電気株式会社 | 端末利用認証システム |
JP2005223838A (ja) * | 2004-02-09 | 2005-08-18 | Kawasaki Microelectronics Kk | 通信システムおよび中継装置 |
FR2871007B1 (fr) * | 2004-05-27 | 2006-07-14 | Gemplus Sa | Deverrouillage securise d'un terminal mobile |
US20050286723A1 (en) * | 2004-06-28 | 2005-12-29 | Magiq Technologies, Inc. | QKD system network |
JP2006155189A (ja) * | 2004-11-29 | 2006-06-15 | Sony Corp | 情報処理システム、情報処理装置および方法、記録媒体、並びにプログラム |
JP4588646B2 (ja) * | 2006-02-14 | 2010-12-01 | 富士通株式会社 | 携帯通信装置、携帯通信装置制御プログラム、及び携帯通信装置制御方法 |
US8526616B2 (en) * | 2008-03-18 | 2013-09-03 | Christopher V. FEUDO | Method for payload encryption of digital voice or data communications |
US8718606B2 (en) * | 2009-12-28 | 2014-05-06 | Nokia Corporation | Method and apparatus for user interaction while device is locked |
EP2437198B1 (en) * | 2010-10-01 | 2020-12-30 | HID Global GmbH | Secure PIN reset process |
US8726371B2 (en) * | 2011-07-18 | 2014-05-13 | Cisco Technology, Inc. | Enhanced security for devices enabled for wireless communications |
-
2012
- 2012-10-12 CN CN2012103877779A patent/CN102930188A/zh active Pending
-
2013
- 2013-07-11 EP EP13800093.0A patent/EP2894584B1/en not_active Not-in-force
- 2013-07-11 US US14/434,776 patent/US9372977B2/en active Active
- 2013-07-11 JP JP2015535960A patent/JP2016500170A/ja active Pending
- 2013-07-11 WO PCT/CN2013/079224 patent/WO2013182119A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102096546A (zh) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | 一种操作系统的解锁方法及装置 |
CN102708324A (zh) * | 2012-05-16 | 2012-10-03 | 惠州Tcl移动通信有限公司 | 一种屏幕锁解锁系统及方法 |
CN102930188A (zh) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | 屏幕解锁的方法、装置及终端 |
Also Published As
Publication number | Publication date |
---|---|
US20150269374A1 (en) | 2015-09-24 |
CN102930188A (zh) | 2013-02-13 |
EP2894584B1 (en) | 2019-06-19 |
US9372977B2 (en) | 2016-06-21 |
JP2016500170A (ja) | 2016-01-07 |
EP2894584A4 (en) | 2015-07-22 |
EP2894584A1 (en) | 2015-07-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013182119A1 (zh) | 屏幕解锁的方法、装置及终端 | |
US10581850B2 (en) | Wireless firmware updates | |
JP6438113B2 (ja) | 認証のための無線鍵管理 | |
US8321916B2 (en) | Method, apparatus and system for remote management of mobile devices | |
CN101258505B (zh) | 安全的软件更新 | |
CN102708324B (zh) | 一种屏幕锁解锁系统及方法 | |
US9686399B2 (en) | Protection of a wireless communications device against unauthorized use | |
JP6717793B2 (ja) | カーシェアリングシステム及びカーシェア装置 | |
CN108605034B (zh) | 无线固件更新 | |
WO2013078796A1 (zh) | 手机及其通信方法 | |
EP2378414A2 (en) | Remote update method for firmware | |
CN101155212A (zh) | 一种限制移动终端使用的方法 | |
CN101163290A (zh) | 一种通过机卡相互认证限制移动终端使用的方法 | |
US11297176B2 (en) | Remotely controlling devices using short message service | |
WO2018000509A1 (zh) | 安全操作方法、操作装置及终端 | |
WO2013182103A2 (zh) | 加密、解密终端及应用于终端的加密和解密方法 | |
KR20130031435A (ko) | 휴대용 단말의 암호화 키 생성 및 관리 방법 및 그 장치 | |
WO2016072833A1 (en) | System and method to disable factory reset | |
CN1705263B (zh) | 移动终端用户的合法性验证方法及其移动终端 | |
JP2011108183A (ja) | 通信制御システム、中央装置、端末装置及びコンピュータプログラム | |
CN101350048A (zh) | 一种外围设备及其权限验证方法 | |
CN110431557B (zh) | 用于执行安全备份和恢复的方法和装置 | |
JP4894382B2 (ja) | セキュリティシステム、情報処理装置、情報保護方法、プログラム | |
CN114391134A (zh) | 刷机处理方法及相关装置 | |
KR20050096577A (ko) | 휴대폰을 이용한 컴퓨터 보안 시스템 및 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13800093 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 14434776 Country of ref document: US Ref document number: 2013800093 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2015535960 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |