WO2017193517A1 - 一种用户终端的解密方法及系统 - Google Patents

一种用户终端的解密方法及系统 Download PDF

Info

Publication number
WO2017193517A1
WO2017193517A1 PCT/CN2016/098802 CN2016098802W WO2017193517A1 WO 2017193517 A1 WO2017193517 A1 WO 2017193517A1 CN 2016098802 W CN2016098802 W CN 2016098802W WO 2017193517 A1 WO2017193517 A1 WO 2017193517A1
Authority
WO
WIPO (PCT)
Prior art keywords
user terminal
data information
user
verification code
content
Prior art date
Application number
PCT/CN2016/098802
Other languages
English (en)
French (fr)
Inventor
郭靖东
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017193517A1 publication Critical patent/WO2017193517A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key

Definitions

  • the present invention relates to the field of mobile communications, and in particular, to a method and system for decrypting a user terminal.
  • the technical problem to be solved by the embodiment of the present invention is to provide a decryption method for the user terminal, so as to solve the problem that the current user forgets the terminal password and the decryption is time-consuming and unsafe.
  • the embodiment of the invention further provides a decryption system for a user terminal.
  • a decryption method for a user terminal includes:
  • the user terminal When the user forgets the password of the user terminal, the user terminal prompts the user to decrypt, and receives the user's start decryption instruction to start decryption;
  • the user terminal internally generates verification code information, and prompts the user with the verification code information;
  • the user terminal detects the received data information, extracts the content of the data information, and checks whether the content of the data information and the verification code information are consistent;
  • the user terminal When detecting that the content of the data information matches the verification code information, the user terminal unlocks and Clear the password of the user terminal.
  • the user terminal prompts the user to decrypt, and receives the user's start of the decryption instruction to start decrypting, specifically,
  • the word "forgot password” is displayed on the lock screen of the user terminal to prompt the user to click, and the decryption is started after receiving the click command of the user.
  • the verification code information generated internally by the user terminal is a random digital verification code or a mathematical formula or a preset problem.
  • the prompting the verification code information to the user specifically includes,
  • the display is performed on the user terminal to prompt the user or to prompt the user by voice.
  • the data information is sent by the user using other terminals.
  • the user terminal detects the received data information, and extracting the data information content specifically includes:
  • the user terminal When the user terminal detects the received data information, it is determined whether the time when the user terminal receives the data information is within a set validity period, and if it is within the validity period, the content of the data information is continuously extracted.
  • the user terminal detects the received data information, and extracting the data information content specifically includes:
  • the user terminal When the user terminal detects the received data information, it determines whether the sending body number of the data information is a preset number, and if it is a preset number, proceeds to extract the data information content.
  • the user terminal detects the received data information, and extracting the data information content specifically includes:
  • the user terminal When the user terminal detects the received data information, it is determined whether the sending body number of the data information is the pre-stored number of the user terminal address book, and if yes, the content information is continuously extracted.
  • the method further includes
  • the user terminal When detecting that the content of the data information does not match the verification code information, the user terminal continues to monitor the received data information.
  • An embodiment of the present invention further provides a decryption system for a user terminal, including
  • the decryption triggering module is configured to prompt the user to decrypt when the user forgets the password of the user terminal, and receive a decryption instruction of the user to start decrypting;
  • a verification code prompting module configured to generate verification code information inside the user terminal, and prompt the user with the verification code information
  • a verification code detecting module configured to detect the received data information at the user terminal, extract the content of the data information, and check whether the content of the data information and the verification code information are consistent;
  • the unlocking module is configured to: when detecting that the content of the data information matches the verification code information, the user terminal unlocks and clears the password set by the user.
  • the verification code detection module specifically includes
  • the validity period detecting unit is configured to determine, when the user terminal detects the received data information, whether the time when the user terminal receives the data information is within a set validity period, and if it is within the validity period, continue to extract the data. information;
  • the preset number detecting unit is configured to: when the user terminal detects the received data information, determine whether the sending body number of the data information is a preset number, and if it is a preset number, continue to perform the extracting Data content;
  • the pre-stored number detecting unit is configured to: when the user terminal detects the received data information, determine whether the sending body number of the data information is a pre-stored number of the user terminal address book, and if yes, continue to extract the data information.
  • a computer storage medium is further provided, and the computer storage medium may store an execution instruction for performing the implementation of the decryption method of the user terminal in the foregoing embodiment.
  • Figure 1 is a flow chart of a first embodiment of the present invention
  • Figure 2 is a structural view of a second embodiment of the present invention.
  • Figure 3 is a structural view of a third embodiment of the present invention.
  • a first embodiment of the present invention provides a method for decrypting a user terminal, as shown in FIG.
  • Step S101 when the user forgets the password of the user terminal, the user terminal prompts the user to decrypt, and receives the user's start decryption instruction to start decryption;
  • the word “forgot password” is displayed on the lock screen of the user terminal to prompt the user to click, and the decryption is started after receiving the click command of the user.
  • Step S102 The user terminal internally generates verification code information, and prompts the user with the verification code information.
  • the verification code information generated internally by the user terminal is a random digital verification code
  • the verification code may be generated by using different algorithms, for example, using an MD5 random algorithm.
  • the user terminal may display the user terminal to prompt the user; or the user may be prompted by voice; the present invention is not limited to the two methods mentioned, as long as It is possible to implement human-computer interaction.
  • Step S103 the user terminal detects the received data information, extracts the content of the data information, and checks whether the content of the data information and the verification code information are consistent;
  • the data information is sent by the user by using another terminal.
  • the user terminal of a relative or a friend may be used to send the data information.
  • the user terminal when the user terminal detects the received data information, it is determined whether the time when the user terminal receives the data information is within a set validity period, and if it is within the validity period, the extraction is continued. The data information content; if the set validity period is exceeded, the detection process is automatically terminated.
  • the validity period of all settings is generally started from when the verification code is presented to the user, typically 10 minutes.
  • the user terminal when the user terminal detects the received data information, it is determined whether the sending body number of the data information is a preset number, and if it is a preset number, the extraction is continued. The data information content; if it is not a preset number, the detection process is automatically terminated.
  • the user terminal when the user terminal detects the received data information, it is determined whether the sending body number of the data information is a pre-stored number of the user terminal address book, and if yes, proceeding to extract the Data information content; if not, the detection process is automatically terminated.
  • the above detection process may be performed by three judgment processes in sequence, or may be performed in any two or one.
  • Step S104 when detecting that the data information content matches the verification code information, the user terminal unlocks and clears the password set by the user;
  • the user terminal detects that the received content of the data information meets the requirement of the verification code information, for example, if the verification code information is a random digital verification code, determining the content of the data information and the number The verification code is consistent; if the verification code information is a formula or a question, it is determined that the content of the data information meets the answer of the company or the question.
  • the verification code information is a random digital verification code, determining the content of the data information and the number The verification code is consistent; if the verification code information is a formula or a question, it is determined that the content of the data information meets the answer of the company or the question.
  • Step S105 When it is detected that the content of the data information does not match the verification code information, proceed to step S103 and step S104.
  • the technical solution of the embodiment can be used to unlock the password when the user forgets the password, which not only saves the unlocking time, has high efficiency, but also ensures data security; and adopts multiple security measures to prevent illegal unlocking, which effectively protects the user. safety.
  • a second embodiment of the present invention provides a decryption system for a user terminal, as shown in FIG. 2, which is a structural diagram of a second embodiment of the present invention, specifically including
  • the decryption triggering module 201 is configured to: when the user forgets the password of the user terminal, the user terminal prompts the user to decrypt, and receives the user's start decryption instruction to start decrypting;
  • the verification code prompting module 202 is configured to generate verification code information inside the user terminal, and prompt the user with the verification code information;
  • the verification code detection module 203 is configured to detect the received data information at the user terminal, extract the content of the data information, and check whether the content of the data information and the verification code information are consistent;
  • the unlocking module 204 is configured to detect the content of the data information and the verification code information identifier At the same time, the user terminal unlocks and clears the password set by the user.
  • the decryption trigger module 201 when the user forgets the password of the user terminal, the user displays a "forgot password" on the lock screen of the user terminal to prompt the user to click, and starts to receive the user's click command. Decrypt.
  • the verification code prompting module 202 is configured to generate verification code information inside the user terminal as a random digital verification code, and generate a verification code by using different algorithms, for example, using an MD5 random algorithm;
  • the verification code prompting module 202 is configured to prompt the user to display the verification code information, and may be displayed on the user terminal to prompt the user; or the user may be prompted by voice.
  • FIG. 3 it is a structural diagram of a third embodiment of the present invention, and provides a verification code detection module structure, specifically including
  • the validity period detecting unit 2031 is configured to determine, when the user terminal detects the received data information, whether the time when the user terminal receives the data information is within a set validity period, and if it is within the validity period, continue to extract the Data information content; if the set validity period is exceeded, the detection process is automatically terminated;
  • the preset number detecting unit 2032 is configured to: when the user terminal detects the received data information, determine whether the sending body number of the data information is a preset number, and if it is a preset number, continue to perform extraction. The data information content; if it is not a preset number, the detection process is automatically terminated;
  • the prestored number detecting unit 2033 is configured to detect the received data information at the user terminal. And determining whether the sending body number of the data information is the pre-stored number of the user terminal address book, and if yes, proceeding to extract the data information content; if not, the detection process is automatically terminated.
  • the unlocking module 204 is configured to: when the user terminal detects that the received content of the data information meets the requirement of the verification code information, specifically, if the verification code information is a random digital verification code, Determining that the data information content is consistent with the digital verification code; if the verification code information is a formula or a question, determining that the data information content meets the answer of the company or the question.
  • the technical solution of the embodiment can be used to unlock the password when the user forgets the password, which not only saves the unlocking time, has high efficiency, but also ensures data security; and adopts multiple security measures to prevent illegal unlocking, which effectively protects the user. safety.
  • the foregoing technical solution provided by the embodiment of the present invention can be applied to the decryption process of the user terminal, so that when the user forgets the password, the unlocking can be conveniently performed, which not only saves the unlocking time, but also has high efficiency and can ensure data security; And the use of multiple security measures to prevent illegal unlocking, can effectively ensure security.

Abstract

本发明提供了一种用户终端的解密方法,包括,在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;用户终端内部生成验证码信息,并将所述验证码信息提示用户;所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;在检测所述数据信息内容与所述验证码信息符合时,用户终端解锁并清除用户终端的密码。本发明还提供了一种用户终端的解密系统。采用本发明的技术方案,在用户忘记密码时,可以很方便地进行解锁,不仅节约了解锁时间,效率高,而且可以保证数据安全;并且采用了多道安全措施防止非法解锁,能够有效保障了安全性。

Description

一种用户终端的解密方法及系统 技术领域
本发明涉及移动通信领域,特别地涉及一种用户终端的解密方法及系统。
背景技术
目前人们在日常生活中使用用户终端,特别是移动终端越来越普遍,并且使用时间越来越长。随着智能终端的普及,为了确保终端的隐私安全,人们对用户终端的加密方式不仅局限于设定数字或字母密码,各种各样的屏幕锁定方式不断出现,如图案解锁、PIN解锁、密码解锁等。通常用户在终端上设置了解锁方式后,经常出现忘记解锁图案或解锁密码的情况。为了能够正常使用终端设备,用户需要到终端的售后服务机构接触锁定,不仅浪费了大量时间,而且在解锁时会导致终端中重要信息资料的丢失。
发明内容
本发明实施例解决的技术问题在于提供了一种用户终端的解密方法,以解决当前用户忘记终端密码后解密耗时费力不安全的问题。本发明实施例还提供了一种用户终端的解密系统。
为解决上述问题,本发明实施例一种用户终端的解密方法,包括,
在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;
用户终端内部生成验证码信息,并将所述验证码信息提示用户;
所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;
在检测所述数据信息内容与所述验证码信息符合时,用户终端解锁并 清除用户终端的密码。
作为一个示例,所述用户终端提示用户解密,并接收用户的开始解密指令开始进行解密具体包括,
在用户忘记用户终端密码时,在用户终端的锁屏界面显示“忘记密码”字样提示用户进行点击,在接收到用户的点击指令后开始进行解密。
作为一个示例,所述用户终端内部生成的验证码信息为随机的数字验证码或数学公式或预先设定的问题。
作为一个示例,所述将所述验证码信息提示用户具体包括,
采用在用户终端上进行显示以提示用户或通过语音方式提示用户。
作为一个示例,所述数据信息是用户采用其他终端进行发送。
作为一个示例,所述用户终端检测收到的数据信息,提取所述数据信息内容具体包括,
在所述用户终端检测收到的数据信息时,判断所述用户终端接收到数据信息时的时间是否处于设定的有效期内,如果处于有效期内,则继续提取所述数据信息内容。
作为一个示例,所述用户终端检测收到的数据信息,提取所述数据信息内容具体包括,
在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为预设的号码,如果是预设的号码,则继续进行提取所述数据信息内容。
作为一个示例,所述用户终端检测收到的数据信息,提取所述数据信息内容具体包括,
在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为用户终端通讯录的预存号码,如果是,则继续进行提取所述数据信息内容。
作为一个示例,所述方法还包括,
在检测所述数据信息内容与所述验证码信息不相符合时,则用户终端继续监测收到的数据信息。
本发明实施例还提供了一种用户终端的解密系统,包括,
解密触发模块,设置为在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;
验证码提示模块,设置为在用户终端内部生成验证码信息,并将所述验证码信息提示用户;
验证码检测模块,设置为在所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;
解锁模块,设置为在检测所述数据信息内容与所述验证码信息符合时,用户终端解锁并清除用户设置的密码。
作为一个示例,所述验证码检测模块,具体包括,
有效期检测单元,设置为在所述用户终端检测收到的数据信息时,判断所述用户终端接收到数据信息时的时间是否处于设定的有效期内,如果处于有效期内,则继续提取所述数据信息内容;
预设号码检测单元,设置为在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为预设的号码,如果是预设的号码,则继续进行提取所述数据信息内容;
预存号码检测单元,设置为在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为用户终端通讯录的预存号码,如果是,则继续进行提取所述数据信息内容。
在本发明实施例中,还提供了一种计算机存储介质,该计算机存储介质可以存储有执行指令,该执行指令用于执行上述实施例中的用户终端的解密方法的实现。
采用上述技术方案,在用户忘记密码时,可以很方便地进行解锁,不 仅节约了解锁时间,效率高,而且可以保证数据安全;并且采用了多道安全措施防止非法解锁,能够有效保障了安全性。
附图说明
此处所说明的附图用来提供对本发明的进一步理解,构成本发明的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是本发明第一实施例流程图;
图2是本发明第二实施例结构图;
图3是本发明第三实施例结构图。
具体实施方式
为了使本发明所要解决的技术问题、技术方案及有益效果更加清楚、明白,以下结合附图和实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例一提供了一种用户终端的解密方法,如图1所示,是本发明第一实施例流程图,具体包括,
步骤S101,在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;
作为一个实施例,在用户忘记用户终端密码时,在用户终端的锁屏界面显示“忘记密码”字样提示用户进行点击,在接收到用户的点击指令后开始进行解密。
步骤S102,用户终端内部生成验证码信息,并将所述验证码信息提示用户;
作为一个示例,用户终端内部生成的验证码信息是一个随机的数字验证码,产生验证码可以采用不同的算法,例如采用MD5随机算法。
作为一个示例,所述用户终端内部生成的验证码信息可以是一个数学公式,例如“2+3=?”,也可以是一个预先设定的问题,例如,“你的生日几月几日?”等。
作为一个示例,用户终端将所述验证码信息提供用户时,可以采用在用户终端上进行显示以提示用户;也可以通过语音方式提示用户;本发明并不局限所提到的两种方式,只要是能够实现人机交互的方式都可以实现。
步骤S103,所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;
作为一个示例,所述数据信息是用户采用另外一个终端进行发送的,例如可以采用亲人、朋友的用户终端进行数据信息的发送。
作为一个示例,可选的,在所述用户终端检测收到的数据信息时,判断所述用户终端接收到数据信息时的时间是否处于设定的有效期内,如果处于有效期内,则继续提取所述数据信息内容;如果超过了设定的有效期,则自动终止检测过程。
作为一个示例,所有设定的有效期一般从将所述验证码提示给用户时开始计时,通常时间为10分钟。
作为一个示例,可选地,在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为预设的号码,如果是预设的号码,则继续进行提取所述数据信息内容;如果不是预设的号码,则自动终止检测过程。
作为一个示例,可选地,在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为用户终端通讯录的预存号码,如果是,则继续进行提取所述数据信息内容;如果否,则自动终止检测过程。
上述检测过程可以是三个判断过程依次进行,也可以是进行任意两个或一个。
步骤S104,在检测所述数据信息内容与所述验证码信息符合时,用户终端解锁并清除用户设置的密码;
作为一个示例,在用户终端检测收到的所述数据信息内容符合所述验证码信息的要求时,比如,如果验证码信息是一个随机的数字验证码,则判断所述数据信息内容与该数字验证码一致;如果验证码信息是一个公式或一个问题时,则判断所述数据信息内容符合该公司或该问题的答案。
步骤S105,在检测所述数据信息内容与所述验证码信息不相符合时,则继续进行步骤S103和步骤S104。
采用本实施例的技术方案,在用户忘记密码时,可以很方便地进行解锁,不仅节约了解锁时间,效率高,而且可以保证数据安全;并且采用了多道安全措施防止非法解锁,有效保障了安全性。
本发明实施例二提供了一种用户终端的解密系统,如图2所示,是本发明第二实施例结构图,具体包括,
解密触发模块201,设置为在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;
验证码提示模块202,设置为在用户终端内部生成验证码信息,并将所述验证码信息提示用户;
验证码检测模块203,设置为在所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;
解锁模块204,设置为在检测所述数据信息内容与所述验证码信息符 合时,用户终端解锁并清除用户设置的密码。
作为一个示例,在上述解密触发模块201中,设置为在用户忘记用户终端密码时,在用户终端的锁屏界面显示“忘记密码”字样提示用户进行点击,在接收到用户的点击指令后开始进行解密。
作为一个示例,所述验证码提示模块202,设置为在用户终端内部生成验证码信息为,一个随机的数字验证码,产生验证码可以采用不同的算法,例如采用MD5随机算法;也可以是,一个数学公式,例如“2+3=?”,也可以是一个预先设定的问题,例如,“你的生日几月几日?”等。
作为一个示例,所述验证码提示模块202,设置为将所述验证码信息提示用户,可以采用在用户终端上进行显示以提示用户;也可以通过语音方式提示用户。
作为一个示例,如图3所示,是本发明第三实施例结构图,提供了一种验证码检测模块结构,具体包括,
有效期检测单元2031,设置为在所述用户终端检测收到的数据信息时,判断所述用户终端接收到数据信息时的时间是否处于设定的有效期内,如果处于有效期内,则继续提取所述数据信息内容;如果超过了设定的有效期,则自动终止检测过程;
预设号码检测单元2032,设置为在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为预设的号码,如果是预设的号码,则继续进行提取所述数据信息内容;如果不是预设的号码,则自动终止检测过程;
预存号码检测单元2033,设置为在所述用户终端检测收到的数据信息 时,判断发送所述数据信息的发送主体号码是否为用户终端通讯录的预存号码,如果是,则继续进行提取所述数据信息内容;如果否,则自动终止检测过程。
作为一个示例,所述解锁模块204,设置为在用户终端检测收到的所述数据信息内容符合所述验证码信息的要求时,具体包括,如果验证码信息是一个随机的数字验证码,则判断所述数据信息内容与该数字验证码一致;如果验证码信息是一个公式或一个问题时,则判断所述数据信息内容符合该公司或该问题的答案。
采用本实施例的技术方案,在用户忘记密码时,可以很方便地进行解锁,不仅节约了解锁时间,效率高,而且可以保证数据安全;并且采用了多道安全措施防止非法解锁,有效保障了安全性。
上述说明示出并描述了本发明的优选实施例,但如前所述,应当理解本发明并非局限于本文所披露的形式,不应看作是对其他实施例的排除,而可用于各种其他组合、修改和环境,并能够在本文所述发明构想范围内,通过上述教导或相关领域的技术或知识进行改动。而本领域人员所进行的改动和变化不脱离本发明的精神和范围,则都应在本发明所附权利要求的保护范围内。
工业实用性
本发明实施例提供的上述技术方案,可以应用于用户终端的解密过程中,实现了在用户忘记密码时,可以很方便地进行解锁,不仅节约了解锁时间,效率高,而且可以保证数据安全;并且采用了多道安全措施防止非法解锁,能够有效保障了安全性。

Claims (11)

  1. 一种用户终端的解密方法,所述方法包括,
    在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;
    用户终端内部生成验证码信息,并将所述验证码信息提示用户;
    所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;
    在检测所述数据信息内容与所述验证码信息符合时,用户终端解锁并清除用户终端的密码。
  2. 根据权利要求1所述的方法,其中,所述用户终端提示用户解密,并接收用户的开始解密指令开始进行解密具体包括,
    在用户忘记用户终端密码时,在用户终端的锁屏界面显示“忘记密码”字样提示用户进行点击,在接收到用户的点击指令后开始进行解密。
  3. 根据权利要求2所述的方法,其中,所述用户终端内部生成的验证码信息为随机的数字验证码或数学公式或预先设定的问题。
  4. 根据权利要求3所述的方法,其中,所述将所述验证码信息提示用户具体包括,
    采用在用户终端上进行显示以提示用户或通过语音方式提示用户。
  5. 根据权利要求1所述的方法,其中,所述数据信息是用户采用其他终端进行发送。
  6. 根据权利要求1至5任一所述的方法,其中,所述用户终端 检测收到的数据信息,提取所述数据信息内容具体包括,
    在所述用户终端检测收到的数据信息时,判断所述用户终端接收到数据信息时的时间是否处于设定的有效期内,如果处于有效期内,则继续提取所述数据信息内容。
  7. 根据权利要求1至5任一所述的方法,其中,所述用户终端检测收到的数据信息,提取所述数据信息内容具体包括,
    在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为预设的号码,如果是预设的号码,则继续进行提取所述数据信息内容。
  8. 根据权利要求1至5任一所述的方法,其中,所述用户终端检测收到的数据信息,提取所述数据信息内容具体包括,
    在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为用户终端通讯录的预存号码,如果是,则继续进行提取所述数据信息内容。
  9. 根据权利要求1所述的方法,其中,所述方法还包括,
    在检测所述数据信息内容与所述验证码信息不相符合时,则用户终端继续监测收到的数据信息。
  10. 一种用户终端的解密系统,所述系统包括,
    解密触发模块,设置为在用户忘记用户终端密码时,用户终端提示用户解密,并接收用户的开始解密指令开始进行解密;
    验证码提示模块,设置为在用户终端内部生成验证码信息,并将所述验证码信息提示用户;
    验证码检测模块,设置为在所述用户终端检测收到的数据信息,提取所述数据信息内容,并检验所述数据信息内容与所述验证码信息是否符合;
    解锁模块,设置为在检测所述数据信息内容与所述验证码信息符合时,用户终端解锁并清除用户设置的密码。
  11. 根据权利要求10所述的系统,其中,所述验证码检测模块,具体包括,
    有效期检测单元,设置为在所述用户终端检测收到的数据信息时,判断所述用户终端接收到数据信息时的时间是否处于设定的有效期内,如果处于有效期内,则继续提取所述数据信息内容;
    预设号码检测单元,设置为在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为预设的号码,如果是预设的号码,则继续进行提取所述数据信息内容;
    预存号码检测单元,设置为在所述用户终端检测收到的数据信息时,判断发送所述数据信息的发送主体号码是否为用户终端通讯录的预存号码,如果是,则继续进行提取所述数据信息内容。
PCT/CN2016/098802 2016-05-13 2016-09-13 一种用户终端的解密方法及系统 WO2017193517A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610316985.8 2016-05-13
CN201610316985.8A CN107370602A (zh) 2016-05-13 2016-05-13 一种用户终端的解密方法及系统

Publications (1)

Publication Number Publication Date
WO2017193517A1 true WO2017193517A1 (zh) 2017-11-16

Family

ID=60266241

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/098802 WO2017193517A1 (zh) 2016-05-13 2016-09-13 一种用户终端的解密方法及系统

Country Status (2)

Country Link
CN (1) CN107370602A (zh)
WO (1) WO2017193517A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019144357A1 (zh) * 2018-01-25 2019-08-01 华为技术有限公司 通过紧急联系人和用户输入解锁的方法及终端
CN110941810A (zh) * 2018-09-21 2020-03-31 杭州海康威视数字技术股份有限公司 一种重置密码方法、装置、终端设备、服务器及存储介质
CN111090852A (zh) * 2019-12-17 2020-05-01 成都锦胜雾森环保科技有限公司 一种电器控制系统自主锁机解锁方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096546A (zh) * 2010-12-29 2011-06-15 华为终端有限公司 一种操作系统的解锁方法及装置
CN102968587A (zh) * 2012-11-02 2013-03-13 深圳市金立通信设备有限公司 一种电子设备及找回电子设备解锁信息的方法
CN103338443A (zh) * 2013-05-29 2013-10-02 北京奇虎科技有限公司 一种终端安全保护方法和系统
CN104102864A (zh) * 2014-07-30 2014-10-15 宇龙计算机通信科技(深圳)有限公司 终端锁屏密码的重置方法、重置系统和终端
KR20150039955A (ko) * 2013-10-04 2015-04-14 한국성서대학교 산학협력단 무선통신을 이용한 원격 자물쇠 시스템

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246841A (zh) * 2012-02-09 2013-08-14 富泰华工业(深圳)有限公司 电子装置的解锁密码重置系统及方法
CN102930188A (zh) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 屏幕解锁的方法、装置及终端
CN104182666B (zh) * 2014-08-25 2017-05-24 广东欧珀移动通信有限公司 一种密码重置方法及装置
CN104298901B (zh) * 2014-09-12 2017-12-15 厦门美图移动科技有限公司 一种移动终端的解锁方法及设备
CN104767877A (zh) * 2015-03-03 2015-07-08 深圳市中兴移动通信有限公司 一种密码找回方法、系统、装置及移动终端
CN104836884A (zh) * 2015-04-12 2015-08-12 来安县新元机电设备设计有限公司 一种移动终端的备用解锁方法及移动终端
CN105100480A (zh) * 2015-07-29 2015-11-25 北京天宇朗通通信设备股份有限公司 终端的解锁方法和终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102096546A (zh) * 2010-12-29 2011-06-15 华为终端有限公司 一种操作系统的解锁方法及装置
CN102968587A (zh) * 2012-11-02 2013-03-13 深圳市金立通信设备有限公司 一种电子设备及找回电子设备解锁信息的方法
CN103338443A (zh) * 2013-05-29 2013-10-02 北京奇虎科技有限公司 一种终端安全保护方法和系统
KR20150039955A (ko) * 2013-10-04 2015-04-14 한국성서대학교 산학협력단 무선통신을 이용한 원격 자물쇠 시스템
CN104102864A (zh) * 2014-07-30 2014-10-15 宇龙计算机通信科技(深圳)有限公司 终端锁屏密码的重置方法、重置系统和终端

Also Published As

Publication number Publication date
CN107370602A (zh) 2017-11-21

Similar Documents

Publication Publication Date Title
EP3214563B1 (en) Apparatus and method for improving security of terminal
TWI543012B (zh) 一種移動終端的身份驗證方法和移動終端
US10298400B2 (en) Authentication method and system
WO2017020427A1 (zh) 一种应用程序访问方法及终端
US20200028836A1 (en) Network-based key distribution system, method, and apparatus
WO2016106989A1 (zh) 多系统安全验证方法、多系统安全验证装置和终端
TW201504840A (zh) 保護應用程式的方法和裝置
CN110502886B (zh) 多重身份验证方法、装置、终端及计算机存储介质
WO2015117332A1 (zh) 一种usb调试模式接口启动的方法、装置及终端
KR20130027571A (ko) 모바일 컴퓨팅 디바이스 보안화
EP2628133B1 (en) Authenticate a fingerprint image
US10277405B2 (en) Method for updating seed data in dynamic token
WO2017166689A1 (zh) 一种隐私保护的方法及装置
CN108259445B (zh) 基于智能手机的MS Windows桌面安全登录系统及其登录方法
US10474804B2 (en) Login mechanism for operating system
WO2018000509A1 (zh) 安全操作方法、操作装置及终端
WO2017193517A1 (zh) 一种用户终端的解密方法及系统
WO2017000351A1 (zh) 一种身份验证方法及装置
WO2020062974A1 (zh) 一种区块链私钥的获取方法、装置及电子设备
US11809540B2 (en) System and method for facilitating authentication via a short-range wireless token
TW201544983A (zh) 資料通訊方法和系統及客戶端和伺服器
WO2016050118A1 (zh) 信息处理方法和信息处理装置
WO2020073916A1 (zh) 一种存储设备的加密方法、装置及存储介质
TWI389539B (zh) 手持裝置的防護設定方法以及防護解除方法
US10009341B1 (en) External keyboard with OTP capability

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16901472

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16901472

Country of ref document: EP

Kind code of ref document: A1