WO2016004777A1 - 一种终端、以及终端解密的方法、存储介质 - Google Patents

一种终端、以及终端解密的方法、存储介质 Download PDF

Info

Publication number
WO2016004777A1
WO2016004777A1 PCT/CN2015/076037 CN2015076037W WO2016004777A1 WO 2016004777 A1 WO2016004777 A1 WO 2016004777A1 CN 2015076037 W CN2015076037 W CN 2015076037W WO 2016004777 A1 WO2016004777 A1 WO 2016004777A1
Authority
WO
WIPO (PCT)
Prior art keywords
state
proximity
terminal
sequence
proximity state
Prior art date
Application number
PCT/CN2015/076037
Other languages
English (en)
French (fr)
Inventor
张慕辉
李云
赵金
Original Assignee
西安中兴新软件有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安中兴新软件有限责任公司 filed Critical 西安中兴新软件有限责任公司
Priority to EP15818622.1A priority Critical patent/EP3168731A4/en
Priority to US15/324,730 priority patent/US20170288864A1/en
Publication of WO2016004777A1 publication Critical patent/WO2016004777A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Definitions

  • the present invention relates to information security technologies for terminals, and in particular, to a terminal, a method for decrypting a terminal, and a storage medium.
  • an embodiment of the present invention is to provide a terminal and a method for decrypting a terminal, which can improve information security of the mobile terminal.
  • an embodiment of the present invention provides a method for decrypting a terminal, where the method includes:
  • the terminal When in an encrypted state, the terminal receives a first proximity state sequence of the first object within a first time threshold, wherein the first proximity state sequence includes a proximity state arranged according to the terminal acquisition order, and the proximity state corresponds to Duration of time;
  • the terminal compares the first proximity state sequence with a preset reference proximity state sequence, where the preset reference proximity state sequence includes a proximity state arranged in a preset order and a corresponding state of the proximity state duration;
  • the terminal is changed from the encrypted state to the decrypted state.
  • the proximity state in the first sequence of proximity states includes a state in which the distance between the first object and the terminal is less than a first distance threshold and/or the A state in which an object is at a distance from the terminal that is greater than a first distance threshold.
  • the terminal compares the first proximity state sequence with the preset reference proximity state sequence, including:
  • the terminal searches for the first mapping relationship according to the proximity state in the first sequence of proximity states and the duration corresponding to the proximity state, and obtains a cryptographic signal represented by the proximity state and the duration corresponding to the proximity state. And constituting the cipher signal into a first cipher signal stream according to an order of proximity states in the first sequence of proximity states; wherein the first mapping relationship is a duration corresponding to the proximity state and the proximity state Correspondence between cryptographic signals;
  • the method further includes:
  • the terminal confirms that the first proximity state sequence is received; wherein the terminal confirms that the first proximity state sequence is received, including:
  • the terminal prompts to acknowledge the receiving message; wherein the acknowledge receiving message is used to request to confirm that the first proximity state sequence is received;
  • the terminal After the terminal receives the acknowledgment response message, the terminal confirms that the first proximity status sequence is received; wherein the acknowledgment response message is used to receive the message in response to the acknowledgment.
  • the terminal is in an encrypted state, including: the terminal is in a lock screen state, any file in the terminal is in an encrypted state, and any one of the terminals The application is in an encrypted state;
  • the terminal is changed from the encrypted state to the decrypted state, including: the terminal unlocking screen, any file in the terminal is in a decrypted state, and any application in the terminal is in a decrypted state.
  • an embodiment of the present invention provides a terminal, where the terminal includes: a proximity sensor, a processor, and a memory, where
  • the proximity sensor is configured to receive a first proximity state sequence of the first object within a first time threshold set by the processor when in an encrypted state, and transmit the first proximity state sequence to the process
  • the first sequence of proximity states includes a proximity state arranged in the order in which the terminal is acquired and a duration corresponding to the proximity state;
  • the memory is configured to store a preset reference proximity state sequence, where the preset reference proximity state sequence includes a proximity state arranged in a preset order and a duration corresponding to the proximity state;
  • the processor configured to compare the first proximity state sequence transmitted by the proximity sensor with the reference proximity state sequence stored by the memory;
  • the terminal is changed from the encrypted state to a decrypted state.
  • the proximity state in the first proximity state sequence includes a state in which the distance between the first object and the terminal is less than a first distance threshold and/or the first A state in which an object is at a distance from the terminal that is greater than a first distance threshold.
  • the memory is further configured to store a first mapping relationship, wherein the first mapping relationship is a correspondence between the proximity state and a duration corresponding to the proximity state and a password signal system;
  • the processor is configured to search for a first mapping relationship according to a proximity state in the first sequence of proximity states and a duration corresponding to the proximity state, and obtain a duration corresponding to the proximity state and the proximity state.
  • a cryptographic signal and constituting the cryptographic signal into a first cryptographic signal stream according to an order of proximity in the first sequence of proximity states;
  • the processor is further configured to confirm that the first proximity state sequence is received
  • the terminal further includes a communication interface configured to perform communication interaction with the outside world;
  • the processor is configured to prompt acknowledgement of receiving a message by using the communication interface, where the acknowledgement receiving message is used to request to confirm that the first proximity state sequence is received;
  • the communication interface receives the acknowledgment response message, confirming that the first proximity status sequence is received; wherein the acknowledgment response message is used to receive the message in response to the acknowledgment.
  • a storage medium storing a computer program configured to perform the aforementioned method of terminal decryption.
  • the embodiment of the present invention provides a terminal, a method for decrypting a terminal, and a storage medium.
  • the proximity sensor is used to acquire the proximity and the distant state of the external object, and the encrypted terminal is performed according to the obtained proximity and distant state of the external object.
  • the decryption operation can improve the information security of the terminal.
  • FIG. 1 is a schematic flowchart of a method for decrypting a terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • FIG. 3 is a schematic structural diagram of another terminal according to an embodiment of the present invention.
  • Proximity sensors are widely used in smart terminals.
  • a proximity sensor located in the front panel portion of the smart terminal emits infrared light through an infrared emitter, and then detects the amount of reflected infrared light through an infrared detector inside the proximity sensor.
  • the infrared detector can determine that the object is close to or far from being determined by receiving the amount of reflected infrared light. status.
  • the basic idea of the embodiment of the present invention is to obtain the approaching and distant state of the external object through the proximity sensor, and perform the decryption operation on the encrypted terminal according to the obtained proximity and distant state of the external object.
  • the terminal in the embodiment of the present invention may include a smart phone, a tablet computer, an e-book reader, a personal digital assistant (PDA, Personal Digital Assistant), a sales terminal (POS, Point of Sales), a vehicle-mounted computer.
  • PDA Personal Digital Assistant
  • POS Point of Sales
  • vehicle-mounted computer a vehicle-mounted computer.
  • MP3 Motion Picture Experts Group Audio Layer III
  • MP4 Moving Picture Experts Group Audio Layer IV
  • laptop portable computer The embodiment of the present invention does not specifically limit this.
  • the method may include:
  • the first sequence of proximity states is arranged in the order in which the terminal is acquired.
  • a proximity state and a duration corresponding to the proximity state; and the proximity state in the first proximity state sequence may include a state in which the distance between the first object and the terminal is less than a first distance threshold and/or the first a state in which the distance between the object and the terminal is greater than the first distance threshold.
  • the state in which the distance between the first object and the terminal is less than the first distance threshold may also be referred to as the approach state of the first object;
  • the state in which the distance between the first object and the terminal is greater than the first distance threshold may be referred to as a far state of the first object.
  • the terminal may measure the approaching and distant state of the first object by using the proximity sensor of the terminal within the first time threshold, and may also separately measure the proximity of the first object. Keeping away from the duration of the state; then, the proximity and the distant state of the first object measured by the proximity sensor and the duration of the proximity and the distant state of the first object are arranged in the order measured by the proximity sensor, so that the first object can be obtained.
  • the first sequence of proximity states preferably, the proximity and departure states of the first object and the durations of the proximity and departure states of the first object may be represented by parameter pairs.
  • the first object may be a finger of the user
  • the proximity sensor of the terminal itself may measure the proximity and away state of the user's finger to the terminal and the duration of the two states, for example, the user is at 10
  • the tapping action can be simulated three times on the top of the terminal in seconds, wherein the second simulated tapping action lasts for 3 seconds while simulating the tapping; the first and third simulated tapping actions only last for 1 second; after each simulated tap action, the user lifts the finger away from the terminal for one second. Therefore, the sequence of the first proximity state that the proximity sensor can obtain is: ⁇ (close, 1 second), ( Far away, 1 second), (close, 3 seconds), (away, 1 second), (close, 1 second), (away, 1 second) ⁇ .
  • the first proximity state sequence replaces the password input step, and the password input is replaced by the capture of the user action by the proximity sensor, and the user action captured by the proximity sensor can usually be an inadvertent action, which is not easy to attract attention, thereby avoiding The leakage of the password improves the security of the terminal.
  • the terminal may also confirm the first proximity state sequence of the first object within the first time threshold.
  • the first proximity state sequence is received;
  • the terminal confirming that the first sequence of proximity states is received may include:
  • the terminal prompts to confirm the receiving message; wherein the acknowledge receiving message is used to request to confirm that the first proximity state sequence is received; for example, the terminal may display an acknowledgement receiving message on the display screen of the terminal for the user to Confirm whether the input is completed, to confirm that the first proximity status sequence has been received;
  • the terminal After the terminal receives the acknowledgment response message, the terminal confirms that the first proximity status sequence is received; wherein the acknowledgment response message is used to receive the message in response to the acknowledgment.
  • S102 The terminal compares the first proximity state sequence with a preset reference proximity state sequence.
  • the preset reference proximity state sequence includes a proximity state arranged in a preset order and a duration corresponding to the proximity state;
  • the comparing, by the terminal, the sequence of the first proximity state with the sequence of the preset reference proximity states may include:
  • the terminal searches for the first mapping relationship according to the proximity state in the first sequence of proximity states and the duration corresponding to the proximity state, and obtains a cryptographic signal represented by the proximity state and the duration corresponding to the proximity state. And constituting the cryptographic signal into a first cryptographic signal stream according to an order of proximity states in the first sequence of proximity states;
  • the first mapping relationship may be a correspondence between a duration corresponding to the proximity state and the proximity state and a cipher signal; for example, in this embodiment, the proximity state of the first object may be represented by a high level signal.
  • the high level signal is represented by "1”
  • the far state of the first object can be represented by a low level signal, usually the low level signal is represented by "0”
  • the close state continues
  • the time is less than 1 second, and can be represented by a single high level, which can be represented by "1” in this embodiment
  • the proximity state duration is greater than or equal to 3 seconds, which can be represented by a continuous high level, in this embodiment.
  • the middle may be represented by "111"; the state of the remote state does not exceed 1 second, and may be represented by a single low level, which may be represented by “0” in this embodiment; and the duration of the remote state is greater than or equal to 3 seconds, which may be A continuous low level representation, which may be represented by "000" in this embodiment;
  • the terminal searches for the first mapping relationship according to the proximity state in the first proximity state sequence and the duration corresponding to the proximity state, so that the first cipher signal stream of the first proximity state sequence is “10111010”.
  • the preset reference cipher signal stream may be obtained by the terminal by searching, according to the first mapping relationship, a reference proximity state in the preset reference proximity state sequence and a duration corresponding to the reference proximity state. of.
  • the reference cipher signal stream corresponds to the preset reference proximity state sequence through the first mapping relationship, and is stored in the terminal in advance for comparison with the first cipher signal stream to determine whether the same is true.
  • the pre-stored reference cipher signal stream may be “10111010”
  • the terminal can confirm that the first proximity state sequence is the same as the preset reference proximity state sequence. At this time, the terminal can change its own encryption state to the decrypted state.
  • the terminal is in an encrypted state, and may include: the terminal is in a lock screen state, any file in the terminal is in an encrypted state, and any application in the terminal is in an Encryption status
  • the terminal is changed from the encrypted state to the decrypted state, including: the terminal unlocking screen, any file in the terminal is in a decrypted state, and any application in the terminal The order is in the decrypted state.
  • the embodiment of the invention provides a method for decrypting a terminal, which acquires the approaching and distant state of an external object by using a proximity sensor, and decrypts the encrypted terminal according to the obtained proximity and distant state of the external object, thereby improving the terminal.
  • Information security is a method for decrypting a terminal, which acquires the approaching and distant state of an external object by using a proximity sensor, and decrypts the encrypted terminal according to the obtained proximity and distant state of the external object, thereby improving the terminal.
  • the terminal 20 includes: a proximity sensor 201, a processor 202, and a memory 203;
  • the proximity sensor 201 can be located in the front panel portion of the terminal 20, emit infrared light through the infrared emitter, and then detect the amount of reflected infrared light through the infrared detector inside the proximity sensor, when there is an object on the path of the infrared emission. At the time, most of the infrared rays are reflected back into the infrared detector near the inside of the sensor, and the infrared detector can determine the state of the object approaching or being far away by judging the amount of the reflected infrared light received;
  • the memory 203 may include more than one computer readable storage medium, which may include a high speed RAM memory, and may also include a non-volatile memory, such as at least one disk memory; and it may include not only internal memory but also internal memory. Includes external memory.
  • the proximity sensor 201 is configured to receive a first proximity state sequence of the first object within a first time threshold set by the processor 202 when the terminal 20 is in an encrypted state, and the first A sequence of proximity states is transmitted to the processor 202;
  • the memory 203 is configured to store a preset sequence of reference proximity states
  • the processor 202 is configured to compare the first proximity state sequence transmitted by the proximity sensor 201 with the reference proximity state sequence stored by the memory 203;
  • the terminal 20 is changed from the encrypted state to the decrypted state.
  • the first sequence of proximity states includes acquiring the proximity according to the terminal a sequence of proximity states and a duration corresponding to the proximity states;
  • the predetermined reference proximity state sequence includes a proximity state arranged in a predetermined order and a duration corresponding to the proximity state;
  • the proximity state in a sequence of proximity states may include a state in which the distance between the first object and the terminal is less than a first distance threshold and/or a state in which the distance between the first object and the terminal is greater than a first distance threshold;
  • the memory 203 is further configured to store a first mapping relationship, where the first mapping relationship is a correspondence between a duration corresponding to the proximity state and the proximity state and a cipher signal;
  • the processor 202 is configured to search for a first mapping relationship according to a proximity state in the first sequence of proximity states and a duration corresponding to the proximity state, to obtain a duration corresponding to the proximity state and the proximity state.
  • a cryptographic signal and constituting the cryptographic signal into a first cryptographic signal stream according to an order of proximity in the first sequence of proximity states;
  • processor 202 is further configured to confirm that the first proximity state sequence is received
  • the terminal 20 further includes a communication interface 204 configured to perform communication interaction with the outside world;
  • the processor 202 is configured to prompt acknowledgement of receiving a message by using the communication interface 204, where the acknowledgement receiving message is used to request to confirm that the first proximity state sequence is received;
  • the communication interface 204 receives the acknowledgment response message, confirming that the first proximity status sequence is received; wherein the acknowledgment response message is used to receive the message in response to the acknowledgment.
  • the embodiment of the present invention further describes a terminal 20, which acquires the approaching and distant state of an external object through the proximity sensor 201, and decrypts the encrypted terminal according to the obtained proximity and distant state of the external object, thereby improving the terminal. 20 information security.
  • the embodiment of the invention further describes a storage medium in which a computer program is stored, the computer program being configured to perform the method of decrypting the terminal of the foregoing embodiments.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. Instructions are provided for implementation The steps of a function specified in a block or blocks of a flow or a flow and/or a block diagram of a flow chart.
  • the invention obtains the approaching and distant state of the external object by the proximity sensor, and decrypts the encrypted terminal according to the approaching and distant state of the obtained external object, thereby improving the information security of the terminal.

Abstract

本发明实施例公开了一种终端、以及终端解密的方法、存储介质,该方法包括:当终端处于加密状态时,终端在第一时间阈值内接收第一物体的第一接近状态序列;终端将所述第一接近状态序列与预设的参照接近状态序列进行比较;当所述第一接近状态序列与所述预设的参照接近状态序列相同时,终端由所述加密状态变更为解密状态。

Description

一种终端、以及终端解密的方法、存储介质 技术领域
本发明涉及终端的信息安全技术,尤其涉及一种终端、以及终端解密的方法、存储介质。
背景技术
随着通信技术的发展,移动终端也逐渐成为了人们生活中不可缺少的助手,移动终端的安全问题也日益突出,例如,通常用户需要在触摸屏上进行特意的操作来对锁屏状态的移动终端进行解锁,这样的操作容易引起注意,从而使得解锁的操作容易被他人获得;此外,对终端保存的加密文件进行解密的时候,通常也是通过输入与预设的密码相同的字符串进行解密,这样密码容易导致泄露,从而给移动终端的信息安全带来隐患。
发明内容
为了解决上述技术问题,本发明实施例期望提供一种终端、以及终端解密的方法,能够提高移动终端的信息安全。
本发明的技术方案是这样实现的:
第一方面,本发明实施例提供了一种终端解密的方法,所述方法包括:
当处于加密状态时,终端在第一时间阈值内接收第一物体的第一接近状态序列,其中,所述第一接近状态序列包括按照所述终端获取顺序排列的接近状态及所述接近状态对应的持续时间;
所述终端将所述第一接近状态序列与预设的参照接近状态序列进行比较,其中,所述预设的参照接近状态序列包括按照预设的顺序排列的接近状态及所述接近状态对应的持续时间;
当所述第一接近状态序列与所述预设的参照接近状态序列相同时,所述终端由所述加密状态变更为解密状态。
根据第一种可能的实现方式,结合第一方面,所述第一接近状态序列中的接近状态包括所述第一物体与所述终端的距离小于第一距离阈值的状态和/或所述第一物体与所述终端的距离大于第一距离阈值的状态。
根据第二种可能的实现方式,结合第一种可能的实现方式,所述终端将所述第一接近状态序列与所述预设的参照接近状态序列进行比较,包括:
所述终端根据所述第一接近状态序列中的接近状态及所述接近状态对应的持续时间查找第一映射关系,得出所述接近状态及所述接近状态对应的持续时间所表示的密码信号,并根据所述第一接近状态序列中接近状态的顺序将所述密码信号组成第一密码信号流;其中,所述第一映射关系为所述接近状态及所述接近状态对应的持续时间与密码信号之间的对应关系;
将所述第一密码信号流与预设的参照密码信号流进行比较,其中,所述预设的参照密码信号流是由所述终端按照所述第一映射关系查找所述参照接近状态序列中的参照接近状态及所述参照接近状态对应的持续时间得到的。
根据第三种可能的实现方式,结合第一方面,所述终端在第一时间阈值内接收第一物体的第一接近状态序列之后,所述方法还包括:
所述终端确认所述第一接近状态序列接收完毕;其中,所述终端确认所述第一接近状态序列接收完毕,包括:
所述终端提示确认接收消息;其中,所述确认接收消息用于请求确认所述第一接近状态序列接收完毕;
当所述终端接收到确认响应消息之后,所述终端确认所述第一接近状态序列接收完毕;其中,所述确认响应消息用于响应所述确认接收消息。
根据第四种可能的实现方式,结合第一方面,所述终端处于加密状态,包括:所述终端处于锁屏状态、所述终端中的任一文件处于加密状态以及所述终端中的任一应用程序处于加密状态;
相应地,所述终端由加密状态变更为解密状态,包括:所述终端解锁屏幕、所述终端中的任一文件处于解密状态以及所述终端中的任一应用程序处于解密状态。
第二方面,本发明实施例提供了一种终端,其中,所述终端包括:接近传感器、处理器、存储器,其中,
所述接近传感器,配置为当处于加密状态时,在所述处理器设置的第一时间阈值内接收第一物体的第一接近状态序列,并将所述第一接近状态序列传输至所述处理器;其中,所述第一接近状态序列包括按照所述终端获取顺序排列的接近状态及所述接近状态对应的持续时间;
所述存储器,配置为存储预设的参照接近状态序列,其中,所述预设的参照接近状态序列包括按照预设的顺序排列的接近状态及所述接近状态对应的持续时间;
所述处理器,配置为将所述接近传感器传输的所述第一接近状态序列与所述存储器存储的所述参照接近状态序列进行比较;以及,
当所述第一接近状态序列与所述预设的参照接近状态序列相同时,将所述终端由所述加密状态变更为解密状态。
根据第一种可能的实现方式,结合第二方面,所述第一接近状态序列中的接近状态包括所述第一物体与所述终端的距离小于第一距离阈值的状态和/或所述第一物体与所述终端的距离大于第一距离阈值的状态。
根据第二种可能的实现方式,结合第一种可能的实现方式,
所述存储器,还配置为存储第一映射关系,其中,所述第一映射关系为所述接近状态及所述接近状态对应的持续时间与密码信号之间的对应关 系;
所述处理器,配置为根据所述第一接近状态序列中的接近状态及所述接近状态对应的持续时间查找第一映射关系,得出所述接近状态及所述接近状态对应的持续时间所表示的密码信号,并根据所述第一接近状态序列中接近状态的顺序将所述密码信号组成第一密码信号流;
以及将所述第一密码信号流与预设的参照密码信号流进行比较,其中,所述预设的参照密码信号流是由所述处理器按照所述第一映射关系查找所述参照接近状态序列中的参照接近状态及所述参照接近状态对应的持续时间得到的。
根据第三种可能的实现方式,结合第二方面,所述处理器,还配置为确认所述第一接近状态序列接收完毕;
具体地,所述终端还包括通信接口,配置为与外界进行通信交互;
所述处理器,配置为通过所述通信接口提示确认接收消息;其中,所述确认接收消息用于请求确认所述第一接近状态序列接收完毕;
以及当所述通信接口接收到确认响应消息之后,确认所述第一接近状态序列接收完毕;其中,所述确认响应消息用于响应所述确认接收消息。
一种存储介质,所述存储介质中存储有计算机程序,所述计算机程序配置为执行前述的终端解密的方法。
本发明实施例提供了一种终端、以及终端解密的方法、存储介质,通过接近传感器来获取外界物体的接近和远离状态,并根据获取得到的外界物体的接近和远离状态来对加密的终端进行解密操作,能够提高终端的信息安全。
附图说明
图1为本发明实施例提供的一种终端解密的方法流程示意图;
图2为本发明实施例提供的一种终端的结构示意图;
图3为本发明实施例提供的另一种终端的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。
接近传感器被广泛地应用于智能终端中,通常,位于智能终端正面板部分的接近传感器通过红外线发射器发射红外光,然后再通过接近传感器内部的红外线检测器来检测反射回来的红外线光量,当有物体在红外线发射的通路上的时候,大部分的红外线被反射回到接近传感器内部的红外线检测器中,所述红外线检测器就能够通过判断接收到反射回来的红外线光量来确定物体接近或远离的状态。
本发明实施例的基本思想就是通过接近传感器来获取外界物体的接近和远离状态,并根据获取得到的外界物体的接近和远离状态来对加密的终端进行解密操作。
需要说明的是,本发明实施例中所述的终端可以包括智能手机、平板电脑、电子书阅读器、个人数字助理(PDA,Personal Digital Assistant)、销售终端(POS,Point of Sales)、车载电脑、动态影像专家压缩标准音频层面3播放器(MP3,Moving Picture Experts Group Audio Layer III)、动态影像专家压缩标准音频层面4(MP4,Moving Picture Experts Group Audio Layer IV)播放器、膝上型便携计算机、台式计算机等等,本发明实施例对此不作具体限定。
基于上述基本思想,参见图1,其示出了本发明实施例提供的一种终端解密的方法流程,该方法可以包括:
S101:当终端处于加密状态时,终端在第一时间阈值内接收第一物体的第一接近状态序列;
示例性地,所述第一接近状态序列包括按照所述终端获取顺序排列的 接近状态及所述接近状态对应的持续时间;而所述第一接近状态序列中的接近状态可以包括所述第一物体与所述终端的距离小于第一距离阈值的状态和/或所述第一物体与所述终端的距离大于第一距离阈值的状态,可以理解地,所述第一物体与所述终端的距离小于第一距离阈值的状态也可以称之为第一物体的接近状态;而所述第一物体与所述终端的距离大于第一距离阈值的状态可以称之为第一物体的远离状态。
具体在本实施例中,在第一时间阈值内,所述终端可以通过所述终端自身的接近传感器来测量第一物体的接近和远离状态,并且可以还能够分别测量得到第一物体的接近和远离状态的持续时间;然后将接近传感器测量得到的第一物体的接近和远离状态以及第一物体的接近和远离状态对应地持续时间按照接近传感器测量得到的顺序进行排列,从而可以得到第一物体的第一接近状态序列,优选地,第一物体的接近和远离状态以及第一物体的接近和远离状态对应地持续时间可以通过参数对进行表示。
例如,在本实施例中,第一物体可以是用户的手指,所述终端自身的接近传感器可以测量用户手指对终端的接近和远离状态以及这两个状态对应地持续时间,比如,用户在10秒内可以在所述终端上方模拟敲击动作三次,其中,第二次模拟敲击动作在模拟敲击的时候,持续了3秒;第一次和第三次模拟敲击的动作分别只持续了1秒;而每次模拟敲击动作完毕之后,用户抬起手指远离终端的时间均为一秒,因此,接近传感器可以得到的第一接近状态序列为:{(接近,1秒),(远离,1秒),(接近,3秒),(远离,1秒),(接近,1秒),(远离,1秒)}。
可以理解地,第一接近状态序列代替了密码输入步骤,通过接近传感器对用户动作的捕获来替代密码输入,而且接近传感器所捕获的用户动作通常可以是不经意的动作,不易引起注意,从而避免了密码的泄漏问题,提升了终端的安全性。
优选地,为了防止由于第一物体的误操作引发终端接收到错误的第一接近状态序列,所述终端在第一时间阈值内接收第一物体的第一接近状态序列之后,还可以确认所述第一接近状态序列接收完毕;
具体地,所述终端确认所述第一接近状态序列接收完毕,可以包括:
所述终端提示确认接收消息;其中,所述确认接收消息用于请求确认所述第一接近状态序列接收完毕;例如,所述终端可以在终端的显示屏幕上显示确认接收消息,用来让用户确认是否输入完毕,来确认第一接近状态序列接收完毕;
当所述终端接收到确认响应消息之后,所述终端确认所述第一接近状态序列接收完毕;其中,所述确认响应消息用于响应所述确认接收消息。
S102:终端将所述第一接近状态序列与预设的参照接近状态序列进行比较;
示例性地,所述预设的参照接近状态序列包括按照预设的顺序排列的接近状态及所述接近状态对应的持续时间;
所述终端将所述第一接近状态序列与所述预设的参照接近状态序列进行比较,可以包括:
所述终端根据所述第一接近状态序列中的接近状态及所述接近状态对应的持续时间查找第一映射关系,得出所述接近状态及所述接近状态对应的持续时间所表示的密码信号,并根据所述第一接近状态序列中接近状态的顺序将所述密码信号组成第一密码信号流;以及,
将所述第一密码信号流与预设的参照密码信号流进行比较;
具体地,所述第一映射关系可以为接近状态及接近状态对应的持续时间与密码信号之间的对应关系;例如,在本实施例中,第一物体的接近状态可以用高电平信号表示,通常高电平信号由“1”表示;第一物体的远离状态可以用低电平信号表示,通常低电平信号由“0”表示;接近状态持续 时间不超过1秒的,可以由单个高电平表示,在本实施例中可以由“1”表示;接近状态持续时间大于等于3秒的,可以由连续的高电平表示,在本实施例中可以由“111”表示;远离状态持续时间不超过1秒的,可以由单个低电平表示,在本实施例中可以由“0”表示;远离状态持续时间大于等于3秒的,可以由连续的低电平表示,在本实施例中可以由“000”表示;
所以,终端根据第一接近状态序列中的接近状态及接近状态对应的持续时间查找第一映射关系,可以得到第一接近状态序列的第一密码信号流为“10111010”。
具体地,所述预设的参照密码信号流可以由所述终端按照所述第一映射关系查找所述预设的参照接近状态序列中的参照接近状态及所述参照接近状态对应的持续时间得到的。
需要说明的是,参照密码信号流通过第一映射关系与预设的参照接近状态序列相对应,并预先存储在终端中,用于与第一密码信号流进行对照,以确定是否相同,在本实施例中,预先存储的参照密码信号流可以为“10111010”
S103:当第一接近状态序列与预设的参照接近状态序列相同时,终端由加密状态变更为解密状态。
具体地,在本实施例中,由于预先存储的参照密码信号流与第一密码信号流相同,因此,终端可以确认第一接近状态序列与预设的参照接近状态序列相同。此时,终端可以将自身的加密状态变更为解密状态。
可以理解地,在本实施例中,所述终端处于加密状态,可以包括:所述终端处于锁屏状态、所述终端中的任一文件处于加密状态以及所述终端中的任一应用程序处于加密状态;
相应地,所述终端由加密状态变更为解密状态,包括:所述终端解锁屏幕、所述终端中的任一文件处于解密状态以及所述终端中的任一应用程 序处于解密状态。
本发明实施例提供了一种终端解密的方法,通过接近传感器来获取外界物体的接近和远离状态,并根据获取得到的外界物体的接近和远离状态来对加密的终端进行解密操作,能够提高终端的信息安全。
参见图2,其示出了本发明实施例提供的一种终端20的结构,所述终端20包括:接近传感器201、处理器202、存储器203;
其中,接近传感器201可以位于终端20的正面板部分,通过红外线发射器发射红外光,然后再通过接近传感器内部的红外线检测器来检测反射回来的红外线光量,当有物体在红外线发射的通路上的时候大部分的红外线被反射回到接近传感器内部的红外线检测器中,所述红外线检测器就能够通过判断接收到反射回来的红外线光量来确定物体接近或在远离的状态;
存储器203可以包括一个以上计算机可读存储介质,可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器;而且其不但可以包括内部存储器,还可以包括外部存储器。
具体地,所述接近传感器201,配置为当所述终端20处于加密状态时,在所述处理器202设置的第一时间阈值内接收第一物体的第一接近状态序列,并将所述第一接近状态序列传输至所述处理器202;
所述存储器203,配置为存储预设的参照接近状态序列;
所述处理器202,配置为将所述接近传感器201传输的所述第一接近状态序列与所述存储器203存储的所述参照接近状态序列进行比较;以及,
当所述第一接近状态序列与所述预设的参照接近状态序列相同时,将所述终端20由所述加密状态变更为解密状态。
示例性地,所述第一接近状态序列包括按照所述终端获取所述接近状 态的顺序排列的接近状态及所述接近状态对应的持续时间;所述预设的参照接近状态序列包括按照预设的顺序排列的接近状态及所述接近状态对应的持续时间;而所述第一接近状态序列中的接近状态可以包括所述第一物体与所述终端的距离小于第一距离阈值的状态和/或所述第一物体与所述终端的距离大于第一距离阈值的状态;
示例性地,所述存储器203,还配置为存储第一映射关系,其中,所述第一映射关系为接近状态及接近状态对应的持续时间与密码信号之间的对应关系;
所述处理器202,配置为根据所述第一接近状态序列中的接近状态及所述接近状态对应的持续时间查找第一映射关系,得出所述接近状态及所述接近状态对应的持续时间所表示的密码信号,并根据所述第一接近状态序列中接近状态的顺序将所述密码信号组成第一密码信号流;
以及将所述第一密码信号流与预设的参照密码信号流进行比较,其中,所述预设的参照密码信号流是由所述处理器202按照所述第一映射关系查找所述参照接近状态序列中的参照接近状态及所述参照接近状态对应的持续时间得到的。
进一步地,所述处理器202,还配置为确认所述第一接近状态序列接收完毕;
具体地,如图3所示,所述终端20还包括通信接口204,配置为与外界进行通信交互;
所述处理器202,配置为通过所述通信接口204提示确认接收消息;其中,所述确认接收消息用于请求确认所述第一接近状态序列接收完毕;
以及当所述通信接口204接收到确认响应消息之后,确认所述第一接近状态序列接收完毕;其中,所述确认响应消息用于响应所述确认接收消息。
本发明实施例还记载了一种终端20,通过接近传感器201来获取外界物体的接近和远离状态,并根据获取得到的外界物体的接近和远离状态来对加密的终端进行解密操作,能够提高终端20的信息安全。
本发明实施例还记载了一种存储介质,所述存储介质中存储有计算机程序,所述计算机程序配置为执行前述各实施例的终端解密的方法。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现 在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。
工业实用性
本发明通过接近传感器来获取外界物体的接近和远离状态,并根据获取得到的外界物体的接近和远离状态来对加密的终端进行解密操作,能够提高终端的信息安全。

Claims (10)

  1. 一种终端解密的方法,包括:
    当处于加密状态时,终端在第一时间阈值内接收第一物体的第一接近状态序列,其中,所述第一接近状态序列包括按照所述终端获取顺序排列的接近状态及所述接近状态对应的持续时间;
    所述终端将所述第一接近状态序列与预设的参照接近状态序列进行比较,其中,所述预设的参照接近状态序列包括按照预设的顺序排列的接近状态及所述接近状态对应的持续时间;
    当所述第一接近状态序列与所述预设的参照接近状态序列相同时,所述终端由所述加密状态变更为解密状态。
  2. 根据权利要求1所述的方法,其中,所述第一接近状态序列中的接近状态包括所述第一物体与所述终端的距离小于第一距离阈值的状态和/或所述第一物体与所述终端的距离大于第一距离阈值的状态。
  3. 根据权利要求2所述的方法,其中,所述终端将所述第一接近状态序列与所述预设的参照接近状态序列进行比较,包括:
    所述终端根据所述第一接近状态序列中的接近状态及所述接近状态对应的持续时间查找第一映射关系,得出所述接近状态及所述接近状态对应的持续时间所表示的密码信号,并根据所述第一接近状态序列中接近状态的顺序将所述密码信号组成第一密码信号流;其中,所述第一映射关系为所述接近状态及所述接近状态对应的持续时间与密码信号之间的对应关系;
    将所述第一密码信号流与预设的参照密码信号流进行比较,其中,所述预设的参照密码信号流是由所述终端按照所述第一映射关系查找所述参照接近状态序列中的参照接近状态及所述参照接近状态对应的持续时间而得到的。
  4. 根据权利要求1所述的方法,其中,所述终端在第一时间阈值内接收第一物体的第一接近状态序列之后,所述方法还包括:
    所述终端提示确认接收消息;其中,所述确认接收消息用于请求确认所述第一接近状态序列接收完毕;
    当所述终端接收到确认响应消息之后,所述终端确认所述第一接近状态序列接收完毕;其中,所述确认响应消息用于响应所述确认接收消息。
  5. 根据权利要求1所述的方法,其中,所述终端处于加密状态,包括:所述终端处于锁屏状态、所述终端中的任一文件处于加密状态以及所述终端中的任一应用程序处于加密状态;
    相应地,所述终端由加密状态变更为解密状态,包括:所述终端解锁屏幕、所述终端中的任一文件处于解密状态以及所述终端中的任一应用程序处于解密状态。
  6. 一种终端,包括:接近传感器、处理器、存储器,其中,
    所述接近传感器,配置为当处于加密状态时,在所述处理器设置的第一时间阈值内接收第一物体的第一接近状态序列,并将所述第一接近状态序列传输至所述处理器;其中,所述第一接近状态序列包括按照所述终端获取顺序排列的接近状态及所述接近状态对应的持续时间;
    所述存储器,配置为存储预设的参照接近状态序列,其中,所述预设的参照接近状态序列包括按照预设的顺序排列的接近状态及所述接近状态对应的持续时间;
    所述处理器,配置为将所述接近传感器传输的所述第一接近状态序列与所述存储器存储的所述参照接近状态序列进行比较;以及,
    当所述第一接近状态序列与所述预设的参照接近状态序列相同时,将所述终端由所述加密状态变更为解密状态。
  7. 根据权利要求6所述的终端,其中,所述第一接近状态序列中的接 近状态包括所述第一物体与所述终端的距离小于第一距离阈值的状态和/或所述第一物体与所述终端的距离大于第一距离阈值的状态。
  8. 根据权利要求7所述的终端,其中,
    所述存储器,还配置为存储第一映射关系,其中,所述第一映射关系为所述接近状态及所述接近状态对应的持续时间与密码信号之间的对应关系;
    所述处理器,配置为根据所述第一接近状态序列中的接近状态及所述接近状态对应的持续时间查找第一映射关系,得出所述接近状态及所述接近状态对应的持续时间所表示的密码信号,并根据所述第一接近状态序列中接近状态的顺序将所述密码信号组成第一密码信号流;
    以及将所述第一密码信号流与预设的参照密码信号流进行比较,其中,所述预设的参照密码信号流是由所述处理器按照所述第一映射关系查找所述参照接近状态序列中的参照接近状态及所述参照接近状态对应的持续时间而得到的。
  9. 根据权利要求6所述的终端,其中,所述终端还包括通信接口,配置为与外界进行通信交互;
    所述处理器,配置为通过所述通信接口提示确认接收消息;其中,所述确认接收消息用于请求确认所述第一接近状态序列接收完毕;
    以及当所述通信接口接收到确认响应消息之后,确认所述第一接近状态序列接收完毕;其中,所述确认响应消息用于响应所述确认接收消息。
  10. 一种存储介质,所述存储介质中存储有计算机程序,所述计算机程序配置为执行权利要求1至5任一项所述的终端解密的方法。
PCT/CN2015/076037 2014-07-10 2015-04-08 一种终端、以及终端解密的方法、存储介质 WO2016004777A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP15818622.1A EP3168731A4 (en) 2014-07-10 2015-04-08 Terminal, terminal decryption method, and storage medium
US15/324,730 US20170288864A1 (en) 2014-07-10 2015-04-08 Terminal, Terminal Decryption Method, and Storage Medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410328813.3A CN105278844A (zh) 2014-07-10 2014-07-10 一种终端、以及终端解密的方法
CN201410328813.3 2014-07-10

Publications (1)

Publication Number Publication Date
WO2016004777A1 true WO2016004777A1 (zh) 2016-01-14

Family

ID=55063557

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/076037 WO2016004777A1 (zh) 2014-07-10 2015-04-08 一种终端、以及终端解密的方法、存储介质

Country Status (4)

Country Link
US (1) US20170288864A1 (zh)
EP (1) EP3168731A4 (zh)
CN (1) CN105278844A (zh)
WO (1) WO2016004777A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108573161B (zh) * 2017-03-13 2022-02-18 北京贝塔科技股份有限公司 加密方法、应用锁以及电子设备

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102207911A (zh) * 2010-03-31 2011-10-05 飞际控股有限公司 一种安全的加密移动储存设备
CN103491530A (zh) * 2013-09-11 2014-01-01 辽源市信长城信息技术研发有限公司 一种具有信息安全机制的智能pad

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102455842A (zh) * 2010-10-21 2012-05-16 北京创新方舟科技有限公司 一种根据用户的敲击操作实现屏幕解锁的方法与设备
TW201349017A (zh) * 2012-05-23 2013-12-01 Wistron Corp 使用節奏式點擊以觸控解鎖的方法及其相關電子裝置
KR20140047388A (ko) * 2012-10-12 2014-04-22 삼성전자주식회사 휴대 단말기의 잠금 해제 운용 방법 및 장치
CN102981737B (zh) * 2012-10-30 2016-09-07 北京小米科技有限责任公司 一种文件操作方法和装置
CN102957803A (zh) * 2012-11-15 2013-03-06 广东欧珀移动通信有限公司 一种移动终端程序操作方法及其移动终端
US20140143859A1 (en) * 2012-11-16 2014-05-22 Mario Linge Unlock touch screen using touch password

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102207911A (zh) * 2010-03-31 2011-10-05 飞际控股有限公司 一种安全的加密移动储存设备
CN103491530A (zh) * 2013-09-11 2014-01-01 辽源市信长城信息技术研发有限公司 一种具有信息安全机制的智能pad

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3168731A4 *

Also Published As

Publication number Publication date
CN105278844A (zh) 2016-01-27
EP3168731A1 (en) 2017-05-17
EP3168731A4 (en) 2017-05-31
US20170288864A1 (en) 2017-10-05

Similar Documents

Publication Publication Date Title
US11328079B2 (en) System and method of encrypting folder in device
KR102576809B1 (ko) 결제 수단 운용 지원 방법 및 이를 지원하는 전자 장치
US10374804B2 (en) Method of controlling electronic device using wearable device and method of operating electronic device
EP3028209B1 (en) Mobile computing device and wearable computing device having automatic access mode control
US8593419B2 (en) Using touches to transfer information between devices
ES2877506T3 (es) Método y aparato para visualizar información
KR102039219B1 (ko) 디바이스의 독립적인 프로세서들을 통한 데이터 검증
WO2017000350A1 (zh) 一种基于触摸屏终端的解锁方法、装置和触摸屏终端
US20150294103A1 (en) Method and Password Verifying Device for Verifying an Input Password, and Computer System including the Password Verifying Device
WO2017032128A1 (zh) 一种终端解锁的方法及终端
KR20150098002A (ko) 전자장치에서 생체 정보를 이용한 인증 방법 및 장치
US9727721B2 (en) Method and device for unlocking electronic equipment and unlocking key thereof
CN103914520B (zh) 数据查询方法、终端设备和服务器
CN104331668A (zh) 错误密码提示方法及装置
US20150281214A1 (en) Information processing apparatus, information processing method, and recording medium
US20180053006A1 (en) Primary device, an accessory device, and methods for processing operations on the primary device and the accessory device
WO2019114712A1 (zh) 数据加密或解密的方法、装置和终端设备
KR102180529B1 (ko) 어플리케이션 접근 제어 방법 및 이를 구현하는 전자 장치
KR20220033480A (ko) 결제 카드로 음성 거래 인증
WO2020073916A1 (zh) 一种存储设备的加密方法、装置及存储介质
CN105303096A (zh) 用于基于滑动的认证的符号选择
KR102375973B1 (ko) 사례기반 추론엔진을 이용한 보안 서버 및 보안 기능의 설치를 위한 저장 매체
WO2016004777A1 (zh) 一种终端、以及终端解密的方法、存储介质
WO2016183891A1 (zh) 一种信息处理方法、电子设备及计算机存储介质
WO2017000343A1 (zh) 一种指纹解锁的方法及终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15818622

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015818622

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2015818622

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 15324730

Country of ref document: US