WO2014169627A1 - Procédé et dispositif de déverrouillage d'application - Google Patents
Procédé et dispositif de déverrouillage d'application Download PDFInfo
- Publication number
- WO2014169627A1 WO2014169627A1 PCT/CN2013/086936 CN2013086936W WO2014169627A1 WO 2014169627 A1 WO2014169627 A1 WO 2014169627A1 CN 2013086936 W CN2013086936 W CN 2013086936W WO 2014169627 A1 WO2014169627 A1 WO 2014169627A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- application
- unlocking
- information
- picture
- terminal
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 238000010586 diagram Methods 0.000 description 8
- 230000002708 enhancing effect Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000015654 memory Effects 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000004793 poor memory Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
Definitions
- the present invention relates to the field of terminal applications, and in particular, to an application unlocking method and apparatus for unlocking a terminal application.
- the current terminal is provided with some privacy protection software, such as terminal lock screen software, privacy protection software, etc., which can require the user to input a password when the user uses it.
- the user will be provided with the service only if the password entered by the user is correct; for example, the terminal lock screen software will lock the terminal screen when the user is not using it, and can set the unlock password, etc., to protect the security of the user's private information.
- the embodiment of the invention provides an application unlocking method and device, which solves the problem that the application cannot be unlocked when the user loses the unlock password information in the related art.
- the present invention provides an application unlocking method.
- the method includes: the terminal determines an application to be unlocked; the terminal scans the picture to obtain picture information, parses the picture information to obtain the first unlocking information; and the terminal compares the first unlocking The information and the preset second unlocking information are unlocked if the comparison is passed.
- the method further includes: acquiring preset second unlocking information, and generating and saving the image according to the second unlocking information.
- the step of generating a picture according to the preset unlocking information comprises: generating a picture according to the second unlocking information by using a one-dimensional code or a two-dimensional code or a three-dimensional code generating program.
- the foregoing embodiment further includes: encrypting the second unlocking information by using an encryption algorithm, generating the image according to the encrypted second unlocking information; and acquiring the first unlocking information.
- the method further includes: decrypting the encrypted second unlocking information by using a decryption algorithm matched by the encryption algorithm.
- the step of determining, by the terminal, the application to be unlocked includes: determining whether an application is in an emergency state; if yes, using the application as an application to be unlocked; the emergency state includes the application cannot be normally unlocked The state of the time.
- the preset second unlocking information includes at least one of terminal identification information, user setting information, and application account information.
- the application is a terminal lock screen application.
- the present invention provides an application unlocking device.
- the application unlocking device includes a selection module, a processing module, and an unlocking module, wherein the selection module is configured to determine an application to be unlocked; and the processing module is configured to scan the image.
- the image information is obtained by parsing the image information to obtain the first unlocking information.
- the unlocking module is configured to compare the first unlocking information with the preset second unlocking information, and if the comparison is passed, the application is unlocked.
- the terminal scans the image to obtain the image information, and parses the image information to obtain the unlocking information.
- the unlocking information is compared with the preset unlocking information in the terminal, the unlocking application is solved.
- the related art requires the user to remember the unlocking password, and the application cannot unlock the application when the user loses the unlocking password, thereby enhancing the user experience.
- FIG. 1 is a schematic diagram of an application unlocking method according to a first embodiment of the present invention
- FIG. 2 is a schematic diagram of an application unlocking method according to a second embodiment of the present invention.
- FIG. 3 is a schematic diagram of an application unlocking apparatus according to a third embodiment of the present invention
- FIG. 4 is a schematic diagram of an application unlocking method according to a fourth embodiment of the present invention.
- FIG. 1 is a schematic diagram of an application unlocking method according to a first embodiment of the present invention. As shown in FIG. 1 , in the embodiment, the application unlocking method includes the following steps:
- S101 The terminal determines an application that needs to be unlocked
- terminal refers to a device that can scan a picture and parse the picture to obtain the password information carried by the picture, including but not limited to a mobile phone, a computer, a palmtop computer, etc.
- Applications supported by the terminal including but not limited to various applications that require the user to input correct password information, such as a lock screen application in a mobile phone, privacy protection software, etc., such as a computer power-on password program, information encryption and decryption software, etc.;
- the terminal scans the picture to obtain picture information; the picture is used to unlock at least one application in the terminal;
- the "picture” referred to in the present application may be a conventional picture, or may be a one-dimensional code, a two-dimensional code, a three-dimensional code, etc., and the “picture” may be a printed picture and stored on another terminal/service provider website. The picture may also be a specific picture or the like inside the terminal. The "picture” may be used only to unlock one application in the terminal, and correspondingly, unlock two or more applications, or unlock all applications in the terminal.
- the "picture information” referred to in the present application may be image information of the "picture” itself, and may also be parameter information carried by the "picture”;
- terminal in this application is assumed to be a mobile phone
- picture is assumed to be a two-dimensional code external to the terminal
- application is assumed to be a screen unlocking software.
- S103 The terminal parses the picture information to obtain the unlock information.
- the parameter information carried by the two-dimensional code is obtained, and then the parameter information is parsed to obtain the unlocking information, and the next operation is performed after the unlocking information is obtained;
- the "unlocking information" involved in the application includes a password parameter carried by the picture; for example, an unlocking code carried in the two-dimensional code;
- S104 The terminal compares the unlocking information with the preset unlocking information, and if the comparison passes, unlocking the selected application;
- the terminal compares the unlocking information obtained according to the two-dimensional code with the preset unlocking information stored in the terminal for unlocking the screen; if the comparison passes, the screen is unlocked, and if the comparison fails, the user is prompted to unlock the unlocking;
- the "preset unlocking information" involved in the application includes terminal identification information (such as mobile phone IMEI number, etc.), user setting information (such as a picture selected by the user, a field written by the user, etc.), and application account information (terminal At least one of a default/user-set application account/password, etc.);
- the “comparison pass” referred to in the present application may be that the "unlocking information" is identical to the "preset unlocking information", and the comparison is considered to be the same; or the “unlocking information” may be similar to the "preset unlocking information”.
- a preset value such as 80%
- the comparison is considered to pass; the comparison mode and the preset value can be selected by the terminal default or by the user.
- FIG. 2 is a schematic diagram of an application unlocking method according to a second embodiment of the present invention. As shown in FIG. 2, in the embodiment, the application unlocking method includes the following steps:
- the step may be performed by the terminal itself, and may be performed by other external devices.
- the preset unlocking information is acquired, and the image is generated and saved according to the preset unlocking information.
- the preset unlocking information involved in the present application may be Correct information such as identification information, user setting information, and application account information of the terminal;
- the method for generating a picture according to the preset unlocking information may be that the picture is generated according to the preset unlocking information by using a one-dimensional code or a two-dimensional code or a three-dimensional code generating program;
- S202-S205 The terminal determines the application that needs to be unlocked, and scans the image to obtain the unlocking information. The terminal compares the unlocking information with the preset unlocking information. If the comparison is passed, the application is unlocked; the same as FIG. 1, and details are not described herein.
- the application unlocking method shown in FIG. 2 further includes: encrypting the preset unlocking information by using an encryption algorithm before generating the image according to the preset unlocking information, according to the encryption After the unlocking information is acquired, before the unlocking information and the preset unlocking information are obtained, the method further includes: decrypting the unlocking information by using a decryption algorithm matched with the encryption algorithm; and encrypting and decrypting, only encrypting
- the terminal screen can be unlocked, and the information set by the user is not illegally stolen, and other users are prevented from illegally unlocking the terminal by using the terminal identification information such as the terminal IMEI that can be queried.
- the step of determining, by the terminal in the foregoing embodiment, the application to be unlocked includes: determining whether an application is in an emergency state; if yes, using the application as an application to be unlocked; The application can not perform the normal unlocking state; the "normal unlocking" referred to in the present application refers to the conventional unlocking method in the prior art, such as the user inputting the correct unlocking password to unlock the terminal and the like, based on this, "emergency state" This is the state when the user cannot enter the correct unlock password.
- the preset unlocking information in the foregoing embodiment includes at least one of terminal identification information, user setting information, and application account information.
- the application in the foregoing embodiment is a terminal lock screen application.
- FIG. 3 is a schematic diagram of an application unlocking apparatus according to a third embodiment of the present invention.
- the application unlocking apparatus 3 includes: a selection module 31, a processing module 32, and an unlocking module 33, wherein
- the selection module 31 is set to determine an application to be unlocked
- the processing module 32 is configured to scan the picture to obtain picture information, parse the picture information to obtain the unlock information, and transmit the unlock information to the unlocking module 33;
- the unlocking module 33 is set to compare the unlocking information with the preset unlocking information, and if the comparison is passed, the corresponding unlocking is performed.
- the application unlocking device 3 shown in FIG. 3 further includes a setting module, and the setting module is configured to set preset unlocking information; the preset unlocking information includes at least one of terminal identification information, user setting information, and application account information.
- the application unlocking device 3 further includes a storage module configured to store the preset unlocking information set by the setting module.
- the application unlocking device 3 shown in FIG. 3 further includes a generating module, the generating module is configured to acquire preset unlocking information, and generate and save the image according to the preset unlocking information.
- the generating module in the foregoing embodiment is configured to generate a picture according to the preset unlocking information by using a one-dimensional code or a two-dimensional code or a three-dimensional code generating program.
- the generating module in the foregoing embodiment is further configured to encrypt the preset unlocking information by using an encryption algorithm, and generate a picture according to the encrypted preset unlocking information; the processing module is further configured to use a decryption algorithm pair matched with the encryption algorithm. Unlock the information for decryption.
- the selection module 31 shown in FIG. 3 is configured to determine whether an application is in an emergency state, and if so, the application is used as an application to be unlocked; the emergency state includes a state when the application cannot perform normal unlocking.
- the application unlocking device 3 shown in FIG. 3 further includes a setting module, and the setting module is configured to set at least one of terminal identification information, user setting information, and application account information as preset information.
- the application unlocking device 3 of the present application may be located in the same terminal (such as a user's mobile phone, etc.), that is, the terminal may generate a picture and output it to other devices for storage; or may be located in multiple devices. If the generation module is located in the service provider device (the device is used to generate and print/upload pictures), the selection module, the processing module, and the unlocking module are located in the user terminal device.
- the service provider device the device is used to generate and print/upload pictures
- the selection module, the processing module, and the unlocking module are located in the user terminal device.
- FIG. 4 is a schematic diagram of an application unlocking method according to a fourth embodiment of the present invention. As shown in FIG. 4, in the embodiment, the application unlocking method includes the following steps:
- the method is set as a two-dimensional code picture, and the method for generating a picture may be as follows:
- the device generator and the service provider generate a two-dimensional code picture by using the two-dimensional code generating program according to the terminal identification information (such as ⁇ ), and send it to the terminal user with the terminal, or exist in the service website for the terminal user to query and use;
- the terminal identification information may be queried.
- the encryption identification software may be used to encrypt the terminal identification information, the encrypted terminal identification information is used to generate a two-dimensional code picture, and the decryption software corresponding to the encryption software is stored.
- the terminal it is used for decryption by the terminal; thus, the phenomenon that other users illegally generate the two-dimensional code picture by using the terminal identification information to steal the privacy information of the terminal user can be avoided; or
- the terminal user generates a two-dimensional code image according to the preset unlocking information such as the terminal identification information/user setting information/application account information, and saves the two-dimensional code image to other devices for use in unlocking the application;
- S402 Determine an application that needs to be unlocked, and invoke an application unlocking program
- S403 The terminal scans the image, and performs processing to obtain the unlocking information.
- the terminal scans the two-dimensional code picture by using the two-dimensional code scanning program, obtains the two-dimensional code picture information, parses and processes the two-dimensional code picture information, and extracts/acquires the password parameters carried by the two-dimensional code, such as the field "1234567";
- S404 The terminal compares the unlocking information with the preset unlocking information, and generates a comparison result.
- the comparison result is compared; if the preset unlocking information set by the terminal user is "12345678", the matching degree is greater than 80%.
- the comparison result is the comparison; if the preset unlocking information set by the terminal user is "abcdefg", if the matching is not completely matched or the matching degree is less than 80%, the comparison result is that the comparison fails;
- S405 The terminal performs a corresponding unlocking operation on the application according to the comparison result.
- the screen is unlocked. If the comparison result is not matched, the screen is not unlocked, and the user is reminded that the password is incorrect.
- the implementation of the embodiment of the present invention has at least the following beneficial effects: First, the terminal scans the picture, parses the picture to obtain the unlocking information, and unlocks the application when the unlocking information is compared with the preset unlocking information in the terminal.
- the problem that the user needs to memorize the unlock password causes the application to unlock the application when the user loses the unlock password, and the user experience is enhanced;
- the image is scanned by the image scanning method, which is compatible with most of the existing terminal devices; again, by encrypting the preset unlocking information, it is ensured that the preset unlocking information is not illegally stolen;
- the terminal user can select the type of the decrypted information by himself, thereby further enhancing the user's making. Use the experience.
- the embodiment of the invention solves the problem that the user needs to memorize the unlocking password, and the application cannot unlock the application when the user loses the unlocking password, thereby enhancing the user experience.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Human Computer Interaction (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
L'invention porte sur un procédé et un dispositif de déverrouillage d'application. Le procédé de déverrouillage d'application comprend les opérations suivantes : un terminal détermine une application à déverrouiller ; le terminal balaye une image pour obtenir des informations d'image et analyse les informations d'image pour acquérir des premières informations de déverrouillage ; et le terminal apparie les premières informations de déverrouillage à des secondes informations de déverrouillage préréglées, et si l'appariement réussit, déverrouille d'application.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310390250.6 | 2013-08-30 | ||
CN201310390250.6A CN104424409A (zh) | 2013-08-30 | 2013-08-30 | 一种应用解锁方法及装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2014169627A1 true WO2014169627A1 (fr) | 2014-10-23 |
Family
ID=51730752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2013/086936 WO2014169627A1 (fr) | 2013-08-30 | 2013-11-12 | Procédé et dispositif de déverrouillage d'application |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN104424409A (fr) |
WO (1) | WO2014169627A1 (fr) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104951678B (zh) * | 2015-06-08 | 2019-01-11 | 小米科技有限责任公司 | 解锁方法和装置 |
CN105303389A (zh) * | 2015-10-21 | 2016-02-03 | 珠海格力电器股份有限公司 | 一种设备防伪方法及装置 |
CN105653911A (zh) * | 2016-01-06 | 2016-06-08 | 上海斐讯数据通信技术有限公司 | 基于二维码的解锁方法及解锁系统 |
CN105631271B (zh) * | 2016-01-29 | 2019-08-02 | 宇龙计算机通信科技(深圳)有限公司 | 解锁方法、解锁装置及可穿戴智能设备和终端 |
CN105956452A (zh) * | 2016-04-20 | 2016-09-21 | 上海斐讯数据通信技术有限公司 | 设备解锁方法及系统 |
CN105897722B (zh) * | 2016-05-05 | 2019-11-26 | 广东小天才科技有限公司 | 通过客户端快速解锁的方法、系统和移动终端 |
CN106951770A (zh) * | 2017-05-12 | 2017-07-14 | 维沃移动通信有限公司 | 一种终端解锁方法及终端 |
CN107346387B (zh) * | 2017-06-23 | 2023-10-17 | 深圳传音通讯有限公司 | 解锁方法及装置 |
CN107315938A (zh) * | 2017-06-26 | 2017-11-03 | 上海斐讯数据通信技术有限公司 | 一种基于第三方设备的智能设备应急指纹解锁方法及系统 |
CN107391972B (zh) * | 2017-07-06 | 2020-11-10 | 北京小米移动软件有限公司 | 软件控制方法、装置和移动终端 |
CN107423655B (zh) * | 2017-09-07 | 2020-04-28 | 福州图腾易讯信息技术有限公司 | 一种设置码加密方法及终端 |
CN110419042B (zh) * | 2017-09-29 | 2021-10-15 | 华为技术有限公司 | 一种屏幕解锁的方法及终端 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102917132A (zh) * | 2012-10-23 | 2013-02-06 | 上海斐讯数据通信技术有限公司 | 具有图像识别解锁系统的移动终端及图像识别解锁方法 |
CN103067371A (zh) * | 2012-12-24 | 2013-04-24 | 广州杰赛科技股份有限公司 | 云终端身份认证方法和系统 |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009028018A1 (fr) * | 2007-08-24 | 2009-03-05 | Fujitsu Limited | Unite, programme et procede de gestion d'informations d'authentication, et unite, programme et procede d'authentication associes |
-
2013
- 2013-08-30 CN CN201310390250.6A patent/CN104424409A/zh active Pending
- 2013-11-12 WO PCT/CN2013/086936 patent/WO2014169627A1/fr active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102917132A (zh) * | 2012-10-23 | 2013-02-06 | 上海斐讯数据通信技术有限公司 | 具有图像识别解锁系统的移动终端及图像识别解锁方法 |
CN103067371A (zh) * | 2012-12-24 | 2013-04-24 | 广州杰赛科技股份有限公司 | 云终端身份认证方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
CN104424409A (zh) | 2015-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014169627A1 (fr) | Procédé et dispositif de déverrouillage d'application | |
KR102328725B1 (ko) | 하나의 장치를 이용하여 다른 장치를 언로크하는 방법 | |
US10469253B2 (en) | Methods and apparatus for migrating keys | |
US9015490B2 (en) | Secure credential unlock using trusted execution environments | |
WO2020215568A1 (fr) | Procédé, appareil et système de changement de numéro de communication, dispositif informatique et support d'enregistrement | |
CN106452770B (zh) | 一种数据加密方法、解密方法、装置和系统 | |
JP6927981B2 (ja) | パスコード検証のためのフォワードセキュア型暗号技術を使用した方法、システム、及び装置。 | |
JP2007503646A (ja) | セキュリティートークン | |
CN113221128B (zh) | 账号和密码的存储方法及注册管理系统 | |
CN103746801A (zh) | 一种智能手机或平板电脑上动态口令种子密钥保护方法 | |
WO2014169610A1 (fr) | Procédé et dispositif de chiffrement et de déchiffrement de données, et système de protection de terminal mobile | |
GB2556638A (en) | Protecting usage of key store content | |
JP4823704B2 (ja) | 認証システムおよび同システムにおける認証情報委譲方法ならびにセキュリティデバイス | |
TW201003451A (en) | Safety storage device with two-stage symmetrical encryption algorithm | |
US10397217B2 (en) | Authentication methods and authentication apparatuses | |
KR102171377B1 (ko) | 로그인 제어 방법 | |
CN112464265A (zh) | 一种私有数据的存储访问方法及系统 | |
KR101443309B1 (ko) | 접속 인증정보를 보호하는 장치 및 방법 | |
KR102291942B1 (ko) | 다차원 바코드 기반 임시 백업 otp 저장 방법 | |
WO2021044356A1 (fr) | Procédé et système mis en œuvre par ordinateur pour l'identification sécurisée d'objets déconnectés et de leurs emplacements |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13882341 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 13882341 Country of ref document: EP Kind code of ref document: A1 |