WO2016131343A1 - 一种解密方法、装置及解密卡 - Google Patents
一种解密方法、装置及解密卡 Download PDFInfo
- Publication number
- WO2016131343A1 WO2016131343A1 PCT/CN2015/099831 CN2015099831W WO2016131343A1 WO 2016131343 A1 WO2016131343 A1 WO 2016131343A1 CN 2015099831 W CN2015099831 W CN 2015099831W WO 2016131343 A1 WO2016131343 A1 WO 2016131343A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- decryption
- card
- decryption card
- identification information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
Definitions
- This paper relates to the field of terminal decryption technology, and in particular to a decryption method, device and decryption card.
- An object of the present invention is to provide a decryption method, a device, and a decryption card, which can unlock the terminal and enter the terminal system without affecting the stored content in the terminal, if the user forgets the password that has been set by the terminal.
- a decryption card matched with a terminal, comprising a storage unit, a second interface, and a sending unit, wherein:
- the storage unit is configured to: store identity information of the decryption card and identification information of the terminal;
- the second interface is configured to: connect to the first interface of the terminal;
- the sending unit is configured to: when the first interface and the second interface are connected, send information stored in the storage unit to the terminal, and notify the terminal to unlock the self by using the information.
- the first interface of the terminal is a SIM card slot built in the terminal, and the decryption card matches the card slot.
- a decryption method for a terminal comprising:
- the terminal unlocks itself.
- the method before the step of receiving the identification information of the terminal sent by the decryption card, the method further includes:
- the terminal receives the identification information transmitted by the decryption card.
- the step of the terminal unlocking itself includes:
- the password that the terminal has set is deleted to enter the system of the terminal.
- the step of the terminal unlocking itself includes:
- the password that has been set by the terminal is reset to a preset password to enter the system of the terminal.
- a decryption device is disposed in a terminal, including: a first receiving module, a determining module, and an unlocking module, wherein
- the first receiving module is configured to: receive identification information of the terminal sent by a decryption card that matches the terminal;
- the determining module is configured to: determine whether the identification information matches the identification information previously stored in the terminal;
- the unlocking module is configured to: when the determining module determines that the identification information matches, The terminal performs unlocking.
- the decrypting device further includes:
- the second receiving module is configured to: receive identity information of the decryption card sent by the decryption card;
- the identification module is configured to: determine, by the identity information of the decryption card, whether the decryption card is a qualified decryption card;
- the first receiving module is configured to receive the identification information of the terminal sent by the decryption card matched with the terminal according to the following manner: when the identification module determines that the decryption card is a qualified decryption card, receive The identification information of the terminal sent by the decryption card.
- the unlocking module is configured to unlock the terminal if the determination result is a match as follows:
- the determining module determines that the identification information is a match, deleting the password that the terminal has set to enter the system of the terminal.
- the unlocking module is configured to unlock the terminal if the determination result is a match as follows:
- the determining module determines that the identification information is a match, the password that has been set by the terminal is reset to a preset password to enter the system of the terminal.
- a computer program comprising program instructions that, when executed by a terminal, cause the terminal to perform any of the above-described decryption methods.
- the decryption method of the technical solution of the present invention receives the identification information of the first terminal matched by the decryption card and determines whether the identification information matches the terminal information of the terminal, and if the judgment result is a match, directly
- the terminal unlocks to ensure that the user can enter the terminal system without forgetting the password that has been set by the terminal, and does not affect the storage content in the terminal.
- FIG. 1 shows a flow chart of a decryption method in accordance with an embodiment of the present invention.
- Fig. 2 is a flow chart showing the decryption apparatus of the embodiment of the present invention.
- FIG. 3 is a flow chart showing the use of a decryption card to enter a mobile phone system in accordance with an embodiment of the present invention.
- the embodiment of the invention provides a decryption card for use with a terminal matched thereto.
- the decryption card can unlock the terminal and directly enter the terminal system without affecting the stored content in the terminal.
- the decryption card of the embodiment of the present invention includes:
- a storage unit configured to: store identity information of the decryption card and identification information of a terminal that matches the decryption card;
- the identity information is a unique identification number of the decryption card, and is used by the terminal to identify the identity of the decryption card.
- a second interface configured to: connect to the first interface of the terminal
- the sending unit is configured to: when the first interface and the second interface are connected, send information stored in the storage unit to the terminal to unlock the terminal.
- the terminal when the user forgets the password that has been set, the terminal can be unlocked, directly enters the terminal system, and does not affect the storage content in the terminal.
- the identity information of the decryption card for the terminal identification is, for example, a unique identification number of the decryption card, similar to the IMEI number of the terminal mobile phone.
- the identification information of the terminal that matches the decryption card is, for example, a model specification of the terminal manufacturer, the terminal, an IMEI number, or the like, and is used for one-to-one correspondence with the identification information stored in advance in the terminal connected to the decryption card, and determines the two. Whether it matches, only when it matches, can it be unlocked.
- the first interface of the terminal is, for example, a SIM card slot built in the terminal, a charging interface of the terminal, a memory card interface, and the like, as long as the second interface of the decryption card can be connected thereto.
- the transmission of information between the terminal and the decryption card is guaranteed, and the invention does not limit it.
- the decryption card of the present invention will be described in detail by taking the first interface of the terminal as a SIM card slot built in the terminal as an example.
- the decryption card of the embodiment of the present invention has the same specifications as the SIM card, including but not limited to 2FF, 3FF and 4FF, so that the terminal does not need to add a new interface. .
- the decryption card is a chip with a microprocessor, including a control unit CPU, a storage unit, a second interface, and a sending unit; wherein the storage unit includes a program memory ROM, a working memory RAM, and a data memory EEPROM, mainly And storing identification information for identifying by the terminal and identification information of the terminal matching the decryption card; the sending unit adopts a serial communication unit; and when the second interface is connected to the first interface of the terminal, at least Guarantee 5 pin connections.
- the five pins are: power supply, clock, RET, GND, and I/O;
- the power supply pin ensures that the terminal supplies power to each component of the decryption card, and is divided into 5V, 5V, and 3V compatible, 3V, and 1.8V.
- the clock pin is used to obtain the reference clock of the card, for example, 3.25MHz
- the RET pin is used to decrypt the card reset
- the GND is grounded
- the I/O guarantees the serial data input and output.
- an embodiment of the present invention provides a decryption method for a terminal, including:
- S101 Receive identification information of a terminal that is matched by a decryption card and is matched with the terminal;
- S102 Determine whether the identification information matches the identification information stored in the terminal in advance
- the decryption method of the embodiment of the present invention by receiving the identification information of the terminal matched by the decryption card and determining whether the identification information matches the identification information stored in the terminal in advance, If the result of the determination is a match, the terminal is unlocked to ensure that if the user forgets the password that has been set by the terminal, the terminal system can be entered without affecting the stored content in the terminal.
- the step of receiving the identification information of the terminal matched by the decryption card and the terminal further includes:
- Identifying the identity information that is, determining, by the identity information of the decryption card, whether the decryption card is a qualified decryption card
- the identification is successful, that is, if the decryption card is a qualified decryption card, the identification information of the terminal matched by the decryption card is received.
- the password can be blocked in two ways: one is to directly delete the terminal that has been set. Another password is to reset the password that has been set by the terminal to a preset password.
- the step of unlocking the terminal includes:
- the password that has been set by the terminal is deleted to enter the terminal system.
- the terminal directly deletes the set password, so that the terminal performs a process of entering the terminal system without a password, that is, the user forgets the terminal by using the decryption method of the present invention.
- a password it is also possible to enter the terminal system.
- the step of unlocking the terminal includes:
- the password that has been set by the terminal is reset to a preset password to enter the terminal system.
- the terminal when the identification information received by the terminal matches the terminal information, the terminal will end the end
- the password that has been set is reset to the preset password, and the process of entering the terminal system is executed through the preset password, so that the user can enter the terminal system even if the user forgets the password that the terminal has set, and at the same time
- One way is to add a heavy protection to prevent illegal personnel from using the stolen decryption card to directly enter the terminal system.
- an embodiment of the present invention further provides a decryption apparatus, which is disposed in a terminal, and corresponds to the decryption method shown in FIG. 1.
- the decryption apparatus includes:
- the first receiving module 21 is configured to: receive identification information of the terminal sent by the decryption card matched by the terminal;
- the determining module 22 is configured to: determine whether the identification information matches the identification information previously stored in the terminal;
- the unlocking module 23 is configured to: when the determination result is a match, unlock the terminal.
- the decryption apparatus of the embodiment of the present invention receives the identification information of the terminal matched by the decryption card and determines whether the identification information matches the identification information stored in the terminal in advance, and the judgment result is a match.
- the terminal is unlocked to ensure that the user can enter the terminal system without forgetting the stored password in the terminal, and the storage content in the terminal is not affected.
- the decryption device further includes:
- the second receiving module is configured to: receive identity information sent by the decryption card for identification by the terminal;
- the identification module is configured to: identify the identity information, that is, determine, by the identity information of the decryption card, whether the decryption card is a qualified decryption card.
- the first receiving module is specifically configured to: when the identification is successful, that is, if the decryption card is a qualified decryption card by using the identity information of the decryption card, receive the decryption card and send the Identification information of the terminal.
- the password can be blocked in two ways: one is to directly delete the terminal that has been set. Password; the other is to reset the password that the terminal has set to the default password.
- the unlocking module is specifically configured to: when the determination result is a match, delete the password that the terminal has set to enter the terminal system.
- the unlocking module is further configured to reset the password that has been set by the terminal to a preset password to enter the terminal system if the determination result is a match.
- FIG. 3 is a flow chart of entering a mobile phone system by using a decryption card, wherein the user forgets the gesture password that has been set, and cannot enter the mobile phone system; the interface connected to the decryption card in the mobile phone A is a SIM card slot; see FIG. 3, the flow The diagram includes the following steps:
- the decryption card is placed in the SIM card slot of the mobile phone A; wherein, if the mobile phone is a dual card device, all the SIM cards need to be taken out, and the decryption card is placed in the main card slot;
- S304 Receiving, in the case that the identification is successful, the identification information of the mobile phone A that is matched in the decryption card and matched with the mobile phone A;
- S305 Determine whether the identification information of the mobile phone A sent by the decryption card matches the identification information stored in the mobile phone A in advance;
- S308 Replace the SIM card into the SIM card slot and enter the mobile phone system with the reset password.
- the decryption card of the present invention can directly enter the mobile phone system, without having to re-flash into the system, and has no influence on the existing content in the terminal, and Easy to operate, no need to add new interfaces.
- the embodiment of the invention also discloses a computer program, including program instructions, when the program instruction When executed by the terminal, the terminal is caused to perform any of the above decryption methods.
- the embodiment of the invention also discloses a carrier carrying the computer program.
- all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve. Thus, the invention is not limited to any specific combination of hardware and software.
- the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
- each device/function module/functional unit in the above embodiment When each device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
- the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
- the decryption method of the technical solution of the present invention receives the identification information of the terminal matched by the decryption card and determines whether the identification information matches the terminal information of the terminal, and if the determination result is a match, directly
- the terminal unlocks to ensure that the user can enter the terminal system without forgetting the password that has been set by the terminal, and does not affect the storage content in the terminal. Therefore, the present invention has strong industrial applicability.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Storage Device Security (AREA)
Abstract
一种解密方法、装置及解密卡,其中,所述解密方法包括:接收一解密卡发送的与其匹配的终端的识别信息(S101);判断所述识别信息与所述终端的终端信息是否匹配(S102);在判断结果为匹配的情况下,对所述终端进行解锁(S103)。该方法能够在用户忘记终端已设置的密码的情况下,对终端进行解锁,直接进入终端系统,且不对终端内的存储内容造成影响。
Description
本文涉及终端解密技术领域,特别是涉及一种解密方法、装置及解密卡。
随着智能终端的快速发展,智能终端的应用越来越多,成为人们生活必不可少的一部分。并且,智能终端中往往存储有用户的重要信息,所以,各种加密措施层出不穷,例如手势密码、数字字母组合密码等等,只有在密码正确的情况下,才能进入终端系统。
而在用户忘记密码的情况下,如果想进入终端系统,只能通过重新刷机升级版本等进入终端系统,但这种方式会导致丢失存储在智能终端内的信息。
发明内容
本发明的目的在于提供一种解密方法、装置及解密卡,能够在用户忘记终端已设置的密码的情况下,对所述终端进行解锁,进入终端系统,且不对终端内的存储内容造成影响。
为了实现上述的目的,采用如下技术方案:
一种解密卡,与一终端相匹配,包括存储单元、第二接口和发送单元,其中:
所述存储单元设置成:存储所述解密卡的身份信息和所述终端的识别信息;
所述第二接口设置成:和所述终端的第一接口连接;
所述发送单元设置成:当所述第一接口和第二接口连接时,发送所述存储单元中存储的信息到所述终端,并通知所述终端利用所述信息对自身进行解锁。
可选地,所述终端的第一接口是所述终端内置的SIM卡槽,所述解密卡与所述卡槽相匹配。
一种解密方法,用于一终端,该方法包括:
所述终端接收与该终端匹配的解密卡发送的识别信息;
所述终端判断所述识别信息与事先存储在所述终端中的识别信息是否匹配;
在判断结果为匹配的情况下,所述终端对自身进行解锁。
可选地,所述接收一解密卡发送的终端的识别信息的步骤之前,该方法还包括:
接收所述解密卡发送的所述解密卡的身份信息;
所述终端通过所述解密卡的身份信息判断所述解密卡是否是合格的解密卡;
在确定所述解密卡是合格的解密卡的情况下,所述终端接收所述解密卡发送的所述识别信息。
可选地,所述在判断结果为匹配的情况下,所述终端对自身进行解锁的步骤包括:
在判断结果为匹配的情况下,删除所述终端已设置的密码,以进入所述终端的系统。
可选地,所述在判断结果为匹配的情况下,所述终端对自身进行解锁的步骤包括:
在判断结果为匹配的情况下,将所述终端已设置的密码重置为预设的密码,以进入所述终端的系统。
一种解密装置,设置于一终端中,包括:第一接收模块、判断模块和解锁模块,其中
所述第一接收模块设置成:接收与所述终端匹配的解密卡发送的所述终端的识别信息;
所述判断模块设置成:判断所述识别信息与事先存储在所述终端中的识别信息是否匹配;
所述解锁模块设置成:在所述判断模块判定识别信息匹配的情况下,对
所述终端进行解锁。
可选地,所述解密装置还包括:
第二接收模块设置成:接收所述解密卡发送的所述解密卡的身份信息;
所述识别模块设置成:通过所述解密卡的身份信息判断所述解密卡是否是合格的解密卡;
所述第一接收模块设置成按照如下方式接收一与所述终端匹配的解密卡发送的所述终端的识别信息:在所述识别模块确定所述解密卡为合格的解密卡的情况下,接收所述解密卡发送的所述终端的识别信息。
可选地,所述解锁模块设置成按照如下方式在判断结果为匹配的情况下,对所述终端进行解锁:
在所述判断模块判定识别信息为匹配的情况下,删除所述终端已设置的密码,以进入所述终端的系统。
可选地,所述解锁模块设置成按照如下方式在判断结果为匹配的情况下,对所述终端进行解锁:
在所述判断模块判定识别信息为匹配的情况下,将所述终端已设置的密码重置为预设的密码,以进入所述终端的系统。
一种计算机程序,包括程序指令,当该程序指令被终端执行时,使得该终端可执行上述任意的解密方法。
一种载有所述的计算机程序的载体。
本发明技术方案的有益效果在于:
本发明技术方案的解密方法,通过接收一解密卡发送的与其匹配的第一终端的识别信息,并判断所述识别信息与终端的终端信息是否匹配,在判断结果为匹配的情况下,直接对所述终端进行解锁,保证在用户忘记终端已设置的密码的情况下,也能进入终端系统,且不对终端内的存储内容造成影响。
附图概述
图1表示本发明实施例的解密方法的流程图。
图2表示本发明实施例的解密装置的流程图。
图3表示本发明具体实施例的利用解密卡进入手机系统的流程图。
本发明的较佳实施方式
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
下面将结合附图对具体实施例进行详细描述。
本发明实施例提供一种解密卡,用于和与其匹配的终端配合使用。通过所述解密卡,能够在用户忘记已设置的密码的情况下,对所述终端进行解锁,直接进入终端系统,且不对终端内的存储内容造成影响。
具体的,本发明实施例的解密卡包括:
存储单元,设置成:存储所述解密卡的身份信息和与所述解密卡匹配的终端的识别信息;
其中,所述身份信息为解密卡的唯一识别号,用来供终端识别该解密卡的身份。
第二接口,设置成:和所述终端的第一接口连接;
发送单元,设置成:当所述第一接口和第二接口连接时,发送所述存储单元中存储的信息到所述终端,以对所述终端进行解锁。
通过本发明实施例的解密卡,能够在用户忘记已设置的密码的情况下,对所述终端进行解锁,直接进入终端系统,且不对终端内的存储内容造成影响。
具体的,解密卡的供终端识别的身份信息例如是所述解密卡的唯一识别号,类似于终端手机的IMEI号码。当终端成功识别到解密卡的身份信息后,即通过所述解密卡的身份信息判断所述解密卡是合格的解密卡后,就可以在
终端和解密卡之间进行信息的传输,以对所述终端进行解锁,进入终端系统。
而与所述解密卡匹配的终端的识别信息例如是终端厂家、终端的型号规格以及IMEI号码等,用于和与所述解密卡连接的终端中事先存储的识别信息一一对应,判断二者是否匹配,只有在匹配的情况下,才能进行解锁。
其中,在本发明具体实施例中,所述终端的第一接口例如是终端内置的SIM卡槽、终端的充电接口、内存卡接口等等,只要所述解密卡的第二接口能够与其连接,保证所述终端和解密卡之间信息的传输即可,本发明不对其进行限制。
下面,以所述终端的第一接口是所述终端内置的SIM卡槽为例,对本发明的解密卡进行详细的介绍。
为了保证与所述终端内置的SIM卡槽的连接,本发明具体实施例的解密卡具有和SIM卡相同的规格,包括但并不限于2FF、3FF和4FF,以使所述终端无需新增接口。
具体的,所述解密卡是带有微处理器的芯片,包括控制单元CPU、存储单元、第二接口和发送单元;其中所述存储单元包括程序存储器ROM、工作存储器RAM和数据存储器EEPROM,主要用于存储供终端识别的身份信息和与所述解密卡匹配的终端的识别信息;所述发送单元采用串行通信单元;而所述第二接口与所述终端的第一接口连接时,至少保证5个引脚的连接。
其中,所述5个引脚分别为:电源、时钟、RET、GND和I/O;电源引脚保证终端为解密卡的各组成部分供电,分为5V、5V与3V兼容、3V、1.8V等,时钟引脚用于获取读写卡的参考时钟,例如为3.25MHz,RET引脚用于解密卡复位,GND接地,而I/O保证串行数据输入输出。
参见图1所示,本发明实施例提供一种解密方法,用于一终端,包括:
S101:接收一解密卡发送的与其匹配的终端的识别信息;
S102:判断所述识别信息与所述终端中事先存储的识别信息是否匹配;
S103:在判断结果为匹配的情况下,对所述终端进行解锁。
本发明实施例的解密方法,通过接收一解密卡发送的与其匹配的终端的识别信息,并判断所述识别信息与终端中事先存储的识别信息是否匹配,在
判断结果为匹配的情况下,对所述终端进行解锁,保证在用户忘记终端已设置的密码的情况下,能够进入终端系统,且不对终端内的存储内容造成影响。
为了保证解密卡与终端的匹配,在本发明具体实施例中,所述接收一解密卡发送的与其匹配的终端的识别信息的步骤之前还包括:
接收一解密卡发送的供终端识别的身份信息;
识别所述身份信息,即通过所述解密卡的身份信息判断所述解密卡是否是合格的解密卡;
其中,在识别成功的情况下,即确定所述解密卡是合格的解密卡的情况下,接收所述解密卡发送的与其匹配的终端的识别信息。
通常情况下,如果不使用已设置的密码对终端进行解锁,就需要屏蔽所述终端已设置的密码;而屏蔽已设置的密码可采用两种方式:一种是直接删除所述终端已设置的密码;另一种是将所述终端已设置的密码重置为预设的密码。
下面,对这两种方式进行详细的介绍。
第一种方式
在本发明具体实施例中,所述在判断结果为匹配的情况下,对所述终端进行解锁的步骤包括:
在判断结果为匹配的情况下,删除所述终端已设置的密码,以进入终端系统。
具体的,当终端接收的识别信息与终端信息相匹配时,终端会直接删除已设置的密码,使所述终端执行无密码进入终端系统的流程,即通过本发明的解密方法,在用户忘记终端密码的情况下,也能进入终端系统。
第二种方式
在本发明具体实施例中,所述在判断结果为匹配的情况下,对所述终端进行解锁的步骤包括:
在判断结果为匹配的情况下,将所述终端已设置的密码重置为预设的密码,以进入终端系统。
具体的,当终端接收的识别信息与终端信息相匹配时,终端会将所述终
端已设置的密码重置为预设的密码,并通过预设的密码执行进入终端系统的流程,使得在用户忘记终端已设置的密码的情况下,也能进入终端系统,同时相较于第一种方式,增加了一重保护,避免非法人员利用盗取的解密卡直接进入终端系统。
参见图2所示,本发明实施例还提供一种解密装置,设置于一终端,与图1所示的解密方法相对应,所述解密装置包括:
第一接收模块21,设置成:接收与所述终端匹配的解密卡发送的所述终端的识别信息;
判断模块22,设置成:判断所述识别信息与事先存储在所述终端中的识别信息是否匹配;
解锁模块23,设置成:在判断结果为匹配的情况下,对所述终端进行解锁。
本发明实施例的解密装置,通过接收一解密卡发送的与其匹配的终端的识别信息,并判断所述识别信息与事先存储在所述终端中的识别信息是否匹配,在判断结果为匹配的情况下,对所述终端进行解锁,保证在用户忘记终端已设置的密码的情况下,能够进入终端系统,且不对终端内的存储内容造成影响。
为了保证解密卡与终端的匹配,在本发明具体实施例中,所述的解密装置还包括:
第二接收模块,设置成:接收一解密卡发送的供终端识别的身份信息;
识别模块,设置成:识别所述身份信息,即通过所述解密卡的身份信息判断所述解密卡是否是合格的解密卡。
所述第一接收模块具体设置成:在识别成功的情况下,即通过所述解密卡的身份信息确定所述解密卡是合格的解密卡的情况下,接收所述解密卡发送的与所述终端的识别信息。
通常情况下,如果不使用已设置的密码对终端进行解锁,就需要屏蔽所述终端已设置的密码;而屏蔽已设置的密码可采用两种方式:一种是直接删除所述终端已设置的密码;另一种是将所述终端已设置的密码重置为预设的
密码。
基于上述内容,在本发明具体实施例中,所述解锁模块具体设置成:在判断结果为匹配的情况下,删除所述终端已设置的密码,以进入终端系统。
此外,所述解锁模块还具体设置成:在判断结果为匹配的情况下,将所述终端已设置的密码重置为预设的密码,以进入终端系统。
为便于理解上述实施例的实现过程,以下结合图3,对本发明实施例提供的解密方法进行进一步的描述。
图3表示利用解密卡进入手机系统的流程图,其中,用户忘记已设置的手势密码,无法进入手机系统,手机A中与解密卡连接的接口是SIM卡槽;参见图3所示,该流程图包括以下步骤:
S301:解密卡放入手机A的SIM卡槽;其中,如果所述手机为双卡设备,需要取出全部的SIM卡,且所述解密卡放置到主卡卡槽中;
S302:接收解密卡的唯一识别号;
S303:识别所述识别号;
S304:在识别成功的情况下,接收解密卡中存储的与其匹配的手机A的识别信息;
S305:判断所述解密卡发送的手机A的识别信息与手机A中事先存储的识别信息是否匹配;
S306:在匹配的情况下,删除已设置的手势密码;
S307:直接进入手机A的手机系统,并重设密码;
S308:更换SIM卡至SIM卡槽,利用重设的密码进入手机系统。
通过上述具体实施例可以看出,在用户忘记已设置的密码的情况下,通过本发明的解密卡可以直接进入手机系统,不必通过重新刷机进入系统,对终端内已存内容无任何影响,且操作便捷,无需增加新的接口。
本发明实施例还公开了一种计算机程序,包括程序指令,当该程序指令
被终端执行时,使得该终端可执行上述任意的解密方法。
本发明实施例还公开了一种载有所述的计算机程序的载体。
在阅读并理解了附图和详细描述后,可以明白其他方面。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
上述实施例中的各装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的各装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
任何熟悉本技术领域的技术人员在本发明揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本发明的保护范围之内。因此,本发明的保护范围应以权利要求所述的保护范围为准。
本发明技术方案的解密方法,通过接收一解密卡发送的与其匹配的终端的识别信息,并判断所述识别信息与终端的终端信息是否匹配,在判断结果为匹配的情况下,直接对所述终端进行解锁,保证在用户忘记终端已设置的密码的情况下,也能进入终端系统,且不对终端内的存储内容造成影响。因此本发明具有很强的工业实用性。
Claims (12)
- 一种解密卡,与一终端相匹配,包括存储单元、第二接口和发送单元,其中:所述存储单元设置成:存储所述解密卡的身份信息和所述终端的识别信息;所述第二接口设置成:和所述终端的第一接口连接;所述发送单元设置成:当所述第一接口和第二接口连接时,发送所述存储单元中存储的信息到所述终端,并通知所述终端利用所述信息对自身进行解锁。
- 根据权利要求1所述的解密卡,其中,所述终端的第一接口是所述终端内置的SIM卡槽,所述解密卡与所述卡槽相匹配。
- 一种解密方法,用于一终端,该方法包括:所述终端接收与该终端匹配的解密卡发送的识别信息;所述终端判断所述识别信息与事先存储在所述终端中的识别信息是否匹配;在判断结果为匹配的情况下,所述终端对自身进行解锁。
- 根据权利要求3所述的解密方法,其中,所述接收一解密卡发送的终端的识别信息的步骤之前,该方法还包括:接收所述解密卡发送的所述解密卡的身份信息;所述终端通过所述解密卡的身份信息判断所述解密卡是否是合格的解密卡;在确定所述解密卡是合格的解密卡的情况下,所述终端接收所述解密卡发送的所述识别信息。
- 根据权利要求3所述的解密方法,其中,所述在判断结果为匹配的情况下,所述终端对自身进行解锁的步骤包括:在判断结果为匹配的情况下,删除所述终端已设置的密码,以进入所述终端的系统。
- 根据权利要求3所述的解密方法,其中,所述在判断结果为匹配的情况下,所述终端对自身进行解锁的步骤包括:在判断结果为匹配的情况下,将所述终端已设置的密码重置为预设的密 码,以进入所述终端的系统。
- 一种解密装置,设置于一终端中,包括:第一接收模块、判断模块和解锁模块,其中所述第一接收模块设置成:接收与所述终端匹配的解密卡发送的所述终端的识别信息;所述判断模块设置成:判断所述识别信息与事先存储在所述终端中的识别信息是否匹配;所述解锁模块设置成:在所述判断模块判定识别信息匹配的情况下,对所述终端进行解锁。
- 根据权利要求7所述的解密装置,所述解密装置还包括:第二接收模块设置成:接收所述解密卡发送的所述解密卡的身份信息;所述识别模块设置成:通过所述解密卡的身份信息判断所述解密卡是否是合格的解密卡;所述第一接收模块设置成按照如下方式接收一与所述终端匹配的解密卡发送的所述终端的识别信息:在所述识别模块确定所述解密卡为合格的解密卡的情况下,接收所述解密卡发送的所述终端的识别信息。
- 根据权利要求3所述的解密装置,其中,所述解锁模块设置成按照如下方式在判断结果为匹配的情况下,对所述终端进行解锁:在所述判断模块判定识别信息为匹配的情况下,删除所述终端已设置的密码,以进入所述终端的系统。
- 根据权利要求3所述的解密装置,其中,所述解锁模块设置成按照如下方式在判断结果为匹配的情况下,对所述终端进行解锁:在所述判断模块判定识别信息为匹配的情况下,将所述终端已设置的密码重置为预设的密码,以进入所述终端的系统。
- 一种计算机程序,包括程序指令,当该程序指令被终端执行时,使得该终端可执行如权利要求3-6中任一项所述的解密方法。
- 一种载有如权利要求11所述的计算机程序的载体。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510444051.8 | 2015-07-24 | ||
CN201510444051.8A CN106709312A (zh) | 2015-07-24 | 2015-07-24 | 一种解密方法、装置及解密卡 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016131343A1 true WO2016131343A1 (zh) | 2016-08-25 |
Family
ID=56688711
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/099831 WO2016131343A1 (zh) | 2015-07-24 | 2015-12-30 | 一种解密方法、装置及解密卡 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106709312A (zh) |
WO (1) | WO2016131343A1 (zh) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719295A (zh) * | 2008-10-09 | 2010-06-02 | 凹凸电子(武汉)有限公司 | 带射频识别(rfid)技术的电子设备及其防丢失方法 |
CN102883050A (zh) * | 2012-09-05 | 2013-01-16 | 东莞宇龙通信科技有限公司 | 移动终端及其解锁方法 |
CN103929525A (zh) * | 2013-01-10 | 2014-07-16 | 上海斐讯数据通信技术有限公司 | 移动终端、钥匙、隐私保护系统及方法 |
-
2015
- 2015-07-24 CN CN201510444051.8A patent/CN106709312A/zh active Pending
- 2015-12-30 WO PCT/CN2015/099831 patent/WO2016131343A1/zh active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719295A (zh) * | 2008-10-09 | 2010-06-02 | 凹凸电子(武汉)有限公司 | 带射频识别(rfid)技术的电子设备及其防丢失方法 |
CN102883050A (zh) * | 2012-09-05 | 2013-01-16 | 东莞宇龙通信科技有限公司 | 移动终端及其解锁方法 |
CN103929525A (zh) * | 2013-01-10 | 2014-07-16 | 上海斐讯数据通信技术有限公司 | 移动终端、钥匙、隐私保护系统及方法 |
Also Published As
Publication number | Publication date |
---|---|
CN106709312A (zh) | 2017-05-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI537765B (zh) | 板上小型應用程式移轉 | |
US9589160B2 (en) | Working method for smart card reader | |
US11539399B2 (en) | System and method for smart card based hardware root of trust on mobile platforms using near field communications | |
US20130207778A1 (en) | Accessory for a mobile device | |
US9307403B2 (en) | System and method for NFC peer-to-peer authentication and secure data transfer | |
CN104969180A (zh) | 与来自主机中央处理单元和操作系统的干扰和控制隔离的用户授权和存在检测 | |
CN107422838A (zh) | 一种穿戴式设备、解锁控制系统及解锁控制方法 | |
US20100095062A1 (en) | Data exchange between protected memory cards | |
US9489668B2 (en) | Electronic payment device | |
KR20080099117A (ko) | 임베디드 시스템에서 이동성 요소의 인증을 위한 방법 | |
CN106156701A (zh) | 一种指纹识别设备、指纹识别设备识别系统及识别方法 | |
CN104700020A (zh) | 一种设备解锁的方法及系统 | |
WO2016131343A1 (zh) | 一种解密方法、装置及解密卡 | |
KR200401587Y1 (ko) | 원 타임 패스워드 생성용 스마트카드 리더 장치 | |
US20100122323A1 (en) | Storage device management systems and methods | |
CN203206256U (zh) | 一种移动存储设备 | |
CN101790724A (zh) | 防篡改控制的系统和方法 | |
CN204990547U (zh) | 一种用于税控系统的发票开具装置 | |
CN105790946B (zh) | 建立数据通道的方法、系统及相关设备 | |
EP2996368B1 (en) | Mobile electronic device | |
CN109711177A (zh) | 基于生物信息识别的数据安全管理方法及终端设备 | |
KR101686631B1 (ko) | 스마트 보안 데이터 저장 장치 | |
JP6505893B2 (ja) | 携帯可能電子装置 | |
KR100727866B1 (ko) | 원 타임 패스워드 생성용 스마트카드 리더 장치 | |
KR20150074820A (ko) | 금융 마이크로 sd 카드를 구비한 보안 결제 장치 및 이의 실행 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15882482 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15882482 Country of ref document: EP Kind code of ref document: A1 |