WO2017201696A1 - 触摸设备解锁方法和装置 - Google Patents

触摸设备解锁方法和装置 Download PDF

Info

Publication number
WO2017201696A1
WO2017201696A1 PCT/CN2016/083360 CN2016083360W WO2017201696A1 WO 2017201696 A1 WO2017201696 A1 WO 2017201696A1 CN 2016083360 W CN2016083360 W CN 2016083360W WO 2017201696 A1 WO2017201696 A1 WO 2017201696A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
control chip
unlocking
touch screen
touch
Prior art date
Application number
PCT/CN2016/083360
Other languages
English (en)
French (fr)
Inventor
张平
Original Assignee
深圳市汇顶科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市汇顶科技股份有限公司 filed Critical 深圳市汇顶科技股份有限公司
Priority to CN201680000661.1A priority Critical patent/CN107850973B/zh
Priority to PCT/CN2016/083360 priority patent/WO2017201696A1/zh
Publication of WO2017201696A1 publication Critical patent/WO2017201696A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Definitions

  • the present invention relates to the field of information security technologies, and in particular, to a touch device unlocking method and apparatus.
  • the encryption of the touch device is implemented by software mainly by installing encryption software in the operating system of the touch device.
  • the encryption software is invalidated, so that the illegal user can completely control the touch device. Therefore, there is a need for a method for preventing an illegal user from using the touch device normally after the operating system of the touch device is cracked, so as to ensure the security of the user's personal information.
  • an object of the present invention is to provide a touch device unlocking method, which can effectively improve the security performance and security of the touch device.
  • a second object of the present invention is to provide a touch device unlocking device.
  • a first aspect of the present invention provides a touch device unlocking method, including: receiving an unlocking operation of a touch device by a user, the unlocking operation includes inputting unlocking information; and saving the unlocking information on a touch screen The encrypted information in the control chip is matched; and when the unlocking information is consistent with the encrypted information, the touch screen control chip is controlled to unlock the touch device.
  • the method for unlocking the touch device in the embodiment of the present invention can effectively prevent the illegal user from bypassing the system to encrypt and use the touch device by storing the encrypted information in the touch screen control chip, thereby ensuring the security of the user's personal information and improving the security of the touch device. .
  • a second embodiment of the present invention provides a touch device unlocking device, including: a receiving module, configured to receive an unlocking operation of a touch device by a user, where the unlocking operation includes inputting unlocking information; and a matching module, configured to unlock the The information is matched with the encrypted information stored in the touch screen control chip; and the control module is configured to control the touch screen control chip to unlock the touch device when the unlocking information matches the encrypted information.
  • the touch device unlocking device of the embodiment of the present invention can effectively prevent the illegal user from bypassing the system encryption and normal use of the touch device by saving the encrypted information in the touch screen control chip, thereby ensuring the personal information security of the user and improving the security of the touch device. .
  • FIG. 1 is a flow chart 1 of a method for unlocking a touch device according to an embodiment of the present invention
  • FIG. 2 is a second flowchart of a method for unlocking a touch device according to an embodiment of the present invention
  • FIG. 3 is a third flowchart of a method for unlocking a touch device according to an embodiment of the present invention.
  • FIG. 4 is a schematic structural diagram 1 of a touch device unlocking device according to an embodiment of the present invention.
  • FIG. 5 is a second schematic structural diagram of a touch device unlocking device according to an embodiment of the present invention.
  • FIG. 6 is a third schematic structural diagram of a touch device unlocking device according to an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram 4 of a touch device unlocking device according to an embodiment of the present invention.
  • FIG. 1 is a flow chart of a method of unlocking a touch device in accordance with one embodiment of the present invention.
  • the touch device unlocking method may include:
  • the unlocking operation may include inputting unlocking information.
  • the touch device is mainly encrypted by the encryption software, and the encrypted information is stored in the operating system, so it is easy to bypass the encryption software by means of cracking, ROOT, flashing, etc., so that the illegal user performs normal on the touch device. operating.
  • the user may first enter the encrypted information through the operating system and save the encrypted information to the touch screen control chip.
  • the encrypted information may be track information generated by the user sliding the touch screen, or may be a password.
  • the password can be a number or a character such as a letter.
  • the encrypted information is saved to the independent touch screen control chip. Even if the operating system of the touch device is cracked, the illegal user cannot touch the device for input operation, so that the available value of the touch device is reduced, and the personal information of the user is ensured.
  • the user can input the unlock information.
  • the unlock information can be matched with the encrypted information stored in the touch screen control chip. For example, if the encrypted information is to slide the track information generated by the touch screen, then the corresponding The unlock information should also be the track information generated by the sliding touch screen.
  • the touch screen control chip determines that the touch device is successfully unlocked. After the unlocking is successful, the user can control the touch device so that the master chip of the touch device can execute the corresponding instruction.
  • the touch device unlocking method of the embodiment of the present invention may further include step S4 and step S5.
  • the touch screen control chip can report the preset information to the main control chip of the touch device for the first preset time, such as every 1 second.
  • the preset information is response information returned by the main control chip to the touch screen control chip.
  • the preset information and the response information are mainly used to determine whether the operating system of the touch device is in an abnormal state. If the touch screen control chip receives the response information returned by the main control chip, the operating system is in a normal state; if the response information is not received, the operating system is in an abnormal state.
  • the abnormal state may be caused by a communication signal interruption of the main control chip and the touch screen control chip, a connection failure, or may be caused by an operating system being cracked or brushed.
  • the touch screen control chip does not receive the response information corresponding to the preset information returned by the main control chip of the touch device within the second preset time, such as 5 minutes, the operating system of the touch device is in an abnormal state. Unable to generate a response to the touch screen control chip. For example, since the touch screen control chip sends preset information to the main control chip every one second, if the operating system is in a normal state, the main control chip returns a response message to the touch screen control chip for each preset information.
  • the operating system may be cracked, or the machine has been flashed, or the communication signal of the main control chip and the touch screen control chip is interrupted, and the main control chip and the touch screen control chip are connected.
  • the operating system is in an abnormal state due to a failure or the like.
  • the touch device unlocking method of the embodiment of the present invention may further include step S6.
  • the touch screen control chip After determining that the operating system is in an abnormal state, for example, the operating system may be cracked, and the touch screen control chip does not unlock the touch device, if a user is detected to perform an input operation on the touch device, the touch screen control chip may be controlled.
  • the interference information is sent to the main control chip, so that the main control chip cannot execute the instruction corresponding to the input operation, thereby effectively preventing the illegal user from using the touch device normally.
  • the interference information may be other operational information that interferes with the input operation of the touch device, such as a continuous button touch. send Message.
  • the input operation may be an input operation by an external command mode such as a mouse or a keyboard. That is to say, if the operating system is cracked, the illegal user can operate the touch device through a non-touch manner such as a mouse or a keyboard. Since the encrypted information is stored in the touch screen control chip, even if the operating system is cracked, the encrypted information cannot be bypassed, and the unlocked information corresponding to the corresponding information can be used to unlock the screen, thereby normally using the touch device. Therefore, the encrypted information is saved in the touch screen control chip, which effectively improves the security of the touch device.
  • the touch device may be an electronic device including a touch screen such as a smart phone, a tablet computer, an all-in-one computer with a touch screen, and the like.
  • the secure touch screen control chip encrypts and sends the received password input interface image sent by the system processor to the display screen and converts the electrical signal generated by the touch screen containing the position information into a real password and encrypts and saves, and reads the system processor.
  • the password is automatically decrypted and sent when the password command is taken.
  • the password input interface image is encrypted by the secure touch screen control chip, such as the correspondence between the key value and the key coordinate information, thereby preventing the payment password from being intercepted by the malicious program.
  • the password is decrypted, a real password is generated, and sent to the system. Finally, the system completes the corresponding password verification operation, and if the password is correctly paid, the payment is successful. Therefore, it is not the same as the technical solution of the present invention.
  • the method for unlocking the touch device in the embodiment of the present invention can effectively prevent the illegal user from bypassing the system to encrypt and use the touch device by storing the encrypted information in the touch screen control chip, thereby ensuring the security of the user's personal information and improving the security of the touch device. .
  • the present invention also provides a touch device unlocking device.
  • FIG. 4 is a first schematic structural diagram of a touch device unlocking device according to an embodiment of the present invention.
  • the touch device unlocking device may include: a receiving module 110, a matching module 120, and a control module 130.
  • the receiving module 110 is configured to receive an unlocking operation of the touch device by the user.
  • the unlocking operation may include inputting unlocking information.
  • the matching module 120 is configured to match the unlocking information with the encrypted information stored in the touch screen control chip.
  • the unlock information can be matched with the encrypted information stored in the touch screen control chip. For example, if the encrypted information is to slide the track information generated by the touch screen, the corresponding unlock information should also be the track information generated by sliding the touch screen.
  • the control module 130 is configured to control the touch screen control chip to unlock the touch device when the unlocking information is consistent with the encrypted information.
  • the touch screen control chip determines that the touch device is successfully unlocked.
  • the control module 130 controls the touch screen control chip to unlock the touch device. After the unlocking is successful, the user can control the touch device so that the master chip of the touch device can execute the corresponding instruction.
  • the touch device unlocking device of the embodiment of the present invention may further include a saving module 140.
  • the saving module 140 is configured to input the encrypted information through the operating system and save the encrypted information to the touch screen control chip before the unlocking information is matched with the encrypted information.
  • the user may first enter the encrypted information through the operating system, and the saving module 140 may save the encrypted information to the touch screen control chip.
  • the encrypted information may be track information generated by the user sliding the touch screen, or may be a password.
  • the password can be a number or a character such as a letter.
  • the encrypted information is saved to the independent touch screen control chip. Even if the operating system of the touch device is cracked, the illegal user cannot touch the device for input operation, so that the available value of the touch device is reduced, and the personal information of the user is ensured.
  • the touch device unlocking device of the embodiment of the present invention may further include a reporting module 150 and a determining module 160.
  • the reporting module 150 is configured to control the touch screen control chip to report the preset information to the main control chip for a first preset time. Specifically, after the encrypted information is input to the touch screen control chip, and the corresponding encryption function is enabled, the reporting module 150 can control the touch screen control chip to report to the main control chip of the touch device for a first preset time, such as every 1 second. Set information. Corresponding to the preset information is response information returned by the main control chip to the touch screen control chip. The preset information and the response information are mainly used to determine whether the operating system of the touch device is in an abnormal state.
  • the touch screen control chip receives the response information returned by the main control chip, the operating system is in a normal state; if the response information is not received, the operating system is in an abnormal state.
  • the abnormal state may be caused by a communication signal interruption of the main control chip and the touch screen control chip, a connection failure, or may be caused by an operating system being cracked or brushed.
  • the determining module 160 is configured to determine that the operating system is in an abnormal state when the touch screen control chip does not receive the response information returned by the main control chip within the second preset time.
  • the touch screen control chip does not receive the response information corresponding to the preset information returned by the main control chip of the touch device within the second preset time, such as 5 minutes, the operating system of the touch device is in an abnormal state. Unable to generate a response to the touch screen control chip. For example, since the touch screen control chip sends preset information to the main control chip every one second, if the operating system is in a normal state, the main control chip returns a response message to the touch screen control chip for each preset information.
  • the operating system may be cracked, or the machine has been flashed, or the communication signal of the main control chip and the touch screen control chip is interrupted, and the main control chip and the touch screen control chip are connected.
  • the operating system is in an abnormal state due to a failure or the like.
  • the touch device unlocking device of the embodiment of the present invention may further include a sending module 170.
  • the sending module 170 is configured to: when the operating system of the touch device is in an abnormal state, and the touch device is in the lock screen state, if the touch device is detected to receive the input operation, control the touch screen control chip to send the interference information to the main control chip, so that the main The control chip cannot execute the instruction corresponding to the input operation.
  • the sending module 170 may control The touch screen control chip sends the interference information to the main control chip, so that the main control chip cannot execute the instruction corresponding to the input operation, thereby effectively preventing the illegal user from using the touch device normally.
  • the interference information may be other operational information that interferes with the input operation of the touch device, such as continuous key trigger information.
  • the input operation may be an input operation by an external command mode such as a mouse or a keyboard. That is to say, if the operating system is cracked, the illegal user can operate the touch device through a non-touch manner such as a mouse or a keyboard. Since the encrypted information is stored in the touch screen control chip, even if the operating system is cracked, the encrypted information cannot be bypassed, and the unlocked information corresponding to the corresponding information can be used to unlock the screen, thereby normally using the touch device. Therefore, the encrypted information is saved in the touch screen control chip, which effectively improves the security of the touch device.
  • the touch device may be an electronic device including a touch screen such as a smart phone, a tablet computer, an all-in-one computer with a touch screen, and the like.
  • the touch device unlocking device of the embodiment of the invention can save the encrypted information in the touch screen control chip, and can effectively prevent the illegal user from bypassing the system encryption and normal use of the touch device after the operating system of the touch device is cracked, thereby ensuring the user.
  • the security of personal information enhances the security of touch devices.
  • first and second are used for descriptive purposes only, and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated.
  • features defining “first” or “second” may include at least one of the features, either explicitly or implicitly.
  • the meaning of "a plurality” is at least two, such as two, three, etc., unless specifically defined otherwise.

Abstract

一种触摸设备解锁方法和装置,其中,触摸设备解锁方法包括以下步骤:接收用户对触摸设备的解锁操作(S1),所述解锁操作包括输入解锁信息;将所述解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配(S2);以及当所述解锁信息与所述加密信息匹配一致时,控制所述触摸屏控制芯片解锁所述触摸设备(S3)。该触摸设备解锁方法将加密信息保存在触摸屏控制芯片中,能够有效地防止非法用户绕过系统加密正常使用触摸设备,从而保证用户的个人信息安全,提升触摸设备的安全性。

Description

触摸设备解锁方法和装置 技术领域
本发明涉及信息安全技术领域,尤其涉及一种触摸设备解锁方法和装置。
背景技术
随着信息化的高速发展,触摸设备的普及,人们越来越重视个人信息的安全。目前,主要通过在触摸设备的操作系统中安装加密软件,通过软件方式实现对触摸设备的加密。但是,如果非法用户对操作系统进行了破解,或者进行了刷机等操作,则会使得加密软件失效,从而非法用户能够对触摸设备进行完全控制。因此,亟需一种在触摸设备的操作系统被破解后,防止非法用户正常使用触摸设备的方法,以保证用户个人信息的安全。
发明内容
本发明旨在至少在一定程度上解决相关技术中的技术问题之一。为此,本发明的一个目的在于提出一种触摸设备解锁方法,能有效提高触摸设备的保密性能和安全性。
本发明的第二个目的在于提出一种触摸设备解锁装置。
为了实现上述目的,本发明第一方面实施例提出了一种触摸设备解锁方法,包括:接收用户对触摸设备的解锁操作,所述解锁操作包括输入解锁信息;将所述解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配;以及当所述解锁信息与所述加密信息匹配一致时,控制所述触摸屏控制芯片解锁所述触摸设备。
本发明实施例的触摸设备解锁方法,通过将加密信息保存在触摸屏控制芯片中,能够有效地防止非法用户绕过系统加密正常使用触摸设备,从而保证用户的个人信息安全,提升触摸设备的安全性。
本发明第二方面实施例提出了一种触摸设备解锁装置,包括:接收模块,用于接收用户对触摸设备的解锁操作,所述解锁操作包括输入解锁信息;匹配模块,用于将所述解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配;以及控制模块,用于当所述解锁信息与所述加密信息匹配一致时,控制所述触摸屏控制芯片解锁所述触摸设备。
本发明实施例的触摸设备解锁装置,通过将加密信息保存在触摸屏控制芯片中,能够有效地防止非法用户绕过系统加密正常使用触摸设备,从而保证用户的个人信息安全,提升触摸设备的安全性。
附图说明
本发明所述的和/或附加的方面和优点从下面结合附图对实施例的描述中将变得明显和容易理解,其中:
图1是根据本发明一个实施例的触摸设备解锁方法的流程图一;
图2是根据本发明一个实施例的触摸设备解锁方法的流程图二;
图3是根据本发明一个实施例的触摸设备解锁方法的流程图三;
图4是根据本发明一个实施例的触摸设备解锁装置的结构示意图一;
图5是根据本发明一个实施例的触摸设备解锁装置的结构示意图二;
图6是根据本发明一个实施例的触摸设备解锁装置的结构示意图三;
图7是根据本发明一个实施例的触摸设备解锁装置的结构示意图四。
具体实施方式
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的模块或具有相同或类似功能的模块。下面通过参考附图描述的实施例是示例性的,旨在用于解释本发明,而不能理解为对本发明的限制。
下面参考附图描述本发明实施例的触摸设备解锁方法和装置。
图1是根据本发明一个实施例的触摸设备解锁方法的流程图。
如图1所示,触摸设备解锁方法可包括:
S1、接收用户对触摸设备的解锁操作。
其中,解锁操作可包括输入解锁信息。
在相关技术中,主要通过加密软件对触摸设备进行加密,而加密信息均保存在操作系统中,因此很容易通过破解、ROOT、刷机等方式绕过加密软件,从而使得非法用户对触摸设备进行正常操作。
为解决上述问题,在本发明的一个实施例中,用户可先通过操作系统录入加密信息,并将加密信息保存至触摸屏控制芯片中。其中,加密信息可以是用户滑动触摸屏产生的轨迹信息,也可以是密码。密码可以是数字,也可以是字母等字符。该加密信息保存至独立的触摸屏控制芯片中,即使触摸设备的操作系统被破解,非法用户也无法触摸设备进行输入操作,使得触摸设备的可利用价值降低,保证用户个人信息安全。
在当用户需要对触摸设备进行解锁时,用户可输入解锁信息。
S2、将解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配。
在接收到用户对触摸设备的解锁操作之后,可将解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配。例如:如果加密信息为则滑动触摸屏产生的轨迹信息,那么对应的 解锁信息也应该是滑动触摸屏产生的轨迹信息。
S3、当解锁信息与加密信息匹配一致时,控制触摸屏控制芯片解锁触摸设备。
具体地,如果用户输入的解锁信息与保存在触摸屏控制芯片中的加密信息匹配一致,则由触摸屏控制芯片确定触摸设备解锁成功。在解锁成功后,用户可对触摸设备进行控制,使得触摸设备的主控芯片能够执行对应的指令。
另外,如图2所示,本发明实施例的触摸设备解锁方法还可包括步骤S4和步骤S5。
S4、控制触摸屏控制芯片以第一预设时间向主控芯片上报预设信息。
具体地,在将加密信息录入至触摸屏控制芯片,且开启对应的加密功能之后,触摸屏控制芯片可以第一预设时间如每隔1秒钟向触摸设备的主控芯片上报预设信息。与预设信息对应的是主控芯片向触摸屏控制芯片返回的响应信息。预设信息和响应信息主要用于判断触摸设备的操作系统是否处于异常状态。如果触摸屏控制芯片接收到主控芯片返回的响应信息,说明操作系统处于正常状态;如果未接收到响应信息,说明操作系统处于异常状态。其中,异常状态可能是主控芯片与触摸屏控制芯片的通信信号中断、连接故障引起的,也可能是操作系统被破解或刷机引起的。
S5、如果触摸屏控制芯片在第二预设时间内未接收到主控芯片返回的响应信息,则确定操作系统处于异常状态。
具体地,如果触摸屏控制芯片在第二预设时间内如5分钟内,未接收到触摸设备的主控芯片返回的与预设信息对应的响应信息,则说明触摸设备的操作系统处于异常状态,无法向触摸屏控制芯片产生应答。例如:由于触摸屏控制芯片每隔1秒钟都会向主控芯片发送预设信息,而如果操作系统如果处于正常状态,则主控芯片会针对每一个预设信息向触摸屏控制芯片返回一个响应信息。因此,如果触摸屏控制芯片持续了5分钟都没有收到响应信息,则说明操作系统可能被破解,或已刷机,或者主控芯片与触摸屏控制芯片的通信信号中断、主控芯片与触摸屏控制芯片连接故障等,操作系统处于异常状态。
此外,如图3所示,本发明实施例的触摸设备解锁方法还可包括步骤S6。
S6、当触摸设备的操作系统处于异常状态,且触摸设备处于锁屏状态时,如果检测到触摸设备接收到输入操作,则控制触摸屏控制芯片向主控芯片发送干扰信息,以使主控芯片无法执行输入操作对应的指令。
在确定操作系统处于异常状态后,例如操作系统可能被破解的情况下,并且触摸屏控制芯片并未解锁触摸设备时,如果此时检测到有用户对触摸设备进行输入操作,则可控制触摸屏控制芯片向主控芯片发送干扰信息,使得主控芯片无法执行输入操作对应的指令,从而能够有效防止非法用户正常使用触摸设备。
干扰信息可以是对触摸设备的输入操作产生干扰的其他操作信息,例如持续的按键触 发信息。其中,输入操作可以是通过鼠标、键盘等外部命令方式进行输入的操作。也就是说,如果操作系统被破解,非法用户是可以通过鼠标、键盘等非触摸的方式对触摸设备进行操作的。由于加密信息是保存在触摸屏控制芯片中的,因此即使操作系统被破解,也无法绕过加密信息,必须通过输入与之对应的解锁信息才能解锁屏幕,从而正常使用触摸设备。因此,将加密信息保存在触摸屏控制芯片中,有效提高了触摸设备的安全性。
应当理解的是,触摸设备可以是包括触摸屏的电子设备,如智能手机、平板电脑、带触摸屏的一体电脑等。
虽然相关技术中,公开了一种基于安全触控屏控制芯片的安全密码输入系统和方法,主要应用场景为电子支付或电子交易。利用安全触摸屏控制芯片将接收到的系统处理器发送的密码输入界面图像加密并发送给显示屏显示和将触摸屏生成的包含位置信息的电信号转化为真实密码并加密保存,在系统处理器发出读取密码命令时自动将密码解密发送。具体来说,就是在输入支付密码时,利用安全触摸屏控制芯片对密码输入界面图像进行加密,如打乱按键键值与按键坐标信息的对应关系,从而防止支付密码被恶意程序截获。在用户输入正确的密码之后,再对该密码进行解密,生成真实的密码,发送给系统,最后由系统完成对应的密码验证操作,如密码正确支付成功。因此,与本发明的技术方案本质并不相同。
本发明实施例的触摸设备解锁方法,通过将加密信息保存在触摸屏控制芯片中,能够有效地防止非法用户绕过系统加密正常使用触摸设备,从而保证用户的个人信息安全,提升触摸设备的安全性。
为实现上述目的,本发明还提出一种触摸设备解锁装置。
图4是根据本发明一个实施例的触摸设备解锁装置的结构示意图一。
如图4所示,该触摸设备解锁装置可包括:接收模块110、匹配模块120和控制模块130。
接收模块110用于接收用户对触摸设备的解锁操作。
其中,解锁操作可包括输入解锁信息。
匹配模块120用于将解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配。
在接收到用户对触摸设备的解锁操作之后,可将解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配。例如:如果加密信息为则滑动触摸屏产生的轨迹信息,那么对应的解锁信息也应该是滑动触摸屏产生的轨迹信息。
控制模块130用于当解锁信息与加密信息匹配一致时,控制触摸屏控制芯片解锁触摸设备。
具体地,如果用户输入的解锁信息与保存在触摸屏控制芯片中的加密信息匹配一致,则由触摸屏控制芯片确定触摸设备解锁成功。控制模块130控制触摸屏控制芯片解锁触摸设备。在解锁成功后,用户可对触摸设备进行控制,使得触摸设备的主控芯片能够执行对应的指令。
另外,如图5所示,本发明实施例的触摸设备解锁装置还可包括保存模块140。
保存模块140用于在将解锁信息与加密信息进行匹配之前,通过操作系统录入加密信息,并将加密信息保存至触摸屏控制芯片中。在本发明的一个实施例中,用户可先通过操作系统录入加密信息,保存模块140可将加密信息保存至触摸屏控制芯片中。其中,加密信息可以是用户滑动触摸屏产生的轨迹信息,也可以是密码。密码可以是数字,也可以是字母等字符。该加密信息保存至独立的触摸屏控制芯片中,即使触摸设备的操作系统被破解,非法用户也无法触摸设备进行输入操作,使得触摸设备的可利用价值降低,保证用户个人信息安全。
此外,如图6所示,本发明实施例的触摸设备解锁装置还可包括上报模块150和确定模块160。
上报模块150用于控制触摸屏控制芯片以第一预设时间向主控芯片上报预设信息。具体地,在将加密信息录入至触摸屏控制芯片,且开启对应的加密功能之后,上报模块150可控制触摸屏控制芯片以第一预设时间如每隔1秒钟向触摸设备的主控芯片上报预设信息。与预设信息对应的是主控芯片向触摸屏控制芯片返回的响应信息。预设信息和响应信息主要用于判断触摸设备的操作系统是否处于异常状态。如果触摸屏控制芯片接收到主控芯片返回的响应信息,说明操作系统处于正常状态;如果未接收到响应信息,说明操作系统处于异常状态。其中,异常状态可能是主控芯片与触摸屏控制芯片的通信信号中断、连接故障引起的,也可能是操作系统被破解或刷机引起的。
确定模块160用于当触摸屏控制芯片在第二预设时间内未接收到主控芯片返回的响应信息时,确定操作系统处于异常状态。
具体地,如果触摸屏控制芯片在第二预设时间内如5分钟内,未接收到触摸设备的主控芯片返回的与预设信息对应的响应信息,则说明触摸设备的操作系统处于异常状态,无法向触摸屏控制芯片产生应答。例如:由于触摸屏控制芯片每隔1秒钟都会向主控芯片发送预设信息,而如果操作系统如果处于正常状态,则主控芯片会针对每一个预设信息向触摸屏控制芯片返回一个响应信息。因此,如果触摸屏控制芯片持续了5分钟都没有收到响应信息,则说明操作系统可能被破解,或已刷机,或者主控芯片与触摸屏控制芯片的通信信号中断、主控芯片与触摸屏控制芯片连接故障等,操作系统处于异常状态。
此外,如图7所示,本发明实施例的触摸设备解锁装置还可包括发送模块170。
发送模块170用于当触摸设备的操作系统处于异常状态,且触摸设备处于锁屏状态时,如果检测到触摸设备接收到输入操作,则控制触摸屏控制芯片向主控芯片发送干扰信息,以使主控芯片无法执行输入操作对应的指令。
在确定操作系统处于异常状态后,例如操作系统可能被破解的情况下,并且触摸屏控制芯片并未解锁触摸设备时,如果此时检测到有用户对触摸设备进行输入操作,则发送模块170可控制触摸屏控制芯片向主控芯片发送干扰信息,使得主控芯片无法执行输入操作对应的指令,从而能够有效防止非法用户正常使用触摸设备。
干扰信息可以是对触摸设备的输入操作产生干扰的其他操作信息,例如持续的按键触发信息。其中,输入操作可以是通过鼠标、键盘等外部命令方式进行输入的操作。也就是说,如果操作系统被破解,非法用户是可以通过鼠标、键盘等非触摸的方式对触摸设备进行操作的。由于加密信息是保存在触摸屏控制芯片中的,因此即使操作系统被破解,也无法绕过加密信息,必须通过输入与之对应的解锁信息才能解锁屏幕,从而正常使用触摸设备。因此,将加密信息保存在触摸屏控制芯片中,有效提高了触摸设备的安全性。
应当理解的是,触摸设备可以是包括触摸屏的电子设备,如智能手机、平板电脑、带触摸屏的一体电脑等。
本发明实施例的触摸设备解锁装置,通过将加密信息保存在触摸屏控制芯片中,能够在触摸设备的操作系统被破解后,有效地防止非法用户绕过系统加密正常使用触摸设备,从而保证了用户的个人信息安全,提升了触摸设备的安全性。
在本发明中,术语“第一”、“第二”仅用于描述目的,而不能理解为指示或暗示相对重要性或者隐含指明所指示的技术特征的数量。由此,限定有“第一”、“第二”的特征可以明示或者隐含地包括至少一个该特征。在本发明的描述中,“多个”的含义是至少两个,例如两个,三个等,除非另有明确具体的限定。
在本说明书中,对上述术语的示意性表述不必须针对的是相同的实施例或示例。而且,描述的具体特征或者特点可以在任一个或多个实施例或示例中以合适的方式结合。此外,在不相互矛盾的情况下,本领域的技术人员可以将本说明书中描述的不同实施例或示例以及不同实施例或示例的特征进行结合和组合。
尽管上面已经示出和描述了本发明的实施例,可以理解的是,上述实施例是示例性的,不能理解为对本发明的限制,本领域的普通技术人员在本发明的范围内可以对上述实施例进行变化、修改、替换和变型。

Claims (12)

  1. 一种触摸设备解锁方法,其特征在于,包括以下步骤:
    接收用户对触摸设备的解锁操作,所述解锁操作包括输入解锁信息;
    将所述解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配;以及
    当所述解锁信息与所述加密信息匹配一致时,控制所述触摸屏控制芯片解锁所述触摸设备。
  2. 如权利要求1所述的方法,其特征在于,还包括:
    控制所述触摸屏控制芯片以第一预设时间向主控芯片上报预设信息;
    如果所述触摸屏控制芯片在第二预设时间内未接收到所述主控芯片返回的响应信息,则确定所述触摸设备的操作系统处于异常状态,其中,所述响应信息与所述预设信息相对应。
  3. 如权利要求2所述的方法,其特征在于,还包括:
    当所述触摸设备的操作系统处于所述异常状态,且所述触摸设备处于锁屏状态时,如果检测到所述触摸设备接收到输入操作,则控制所述触摸屏控制芯片向所述主控芯片发送干扰信息,以使所述主控芯片无法执行所述输入操作对应的指令。
  4. 如权利要求3所述的方法,其特征在于,所述输入操作为通过外部命令方式进行输入的操作。
  5. 如权利要求1所述的方法,其特征在于,在将所述解锁信息与所述加密信息进行匹配之前,还包括:
    通过操作系统录入所述加密信息,并将所述加密信息保存至所述触摸屏控制芯片中。
  6. 如权利要求5所述的方法,其特征在于,所述加密信息包括轨迹信息或密码。
  7. 一种触摸设备解锁装置,其特征在于,包括:
    接收模块,用于接收用户对触摸设备的解锁操作,所述解锁操作包括输入解锁信息;
    匹配模块,用于将所述解锁信息与保存在触摸屏控制芯片中的加密信息进行匹配;以及
    控制模块,用于当所述解锁信息与所述加密信息匹配一致时,控制所述触摸屏控制芯片解锁所述触摸设备。
  8. 如权利要求7所述的装置,其特征在于,还包括:
    上报模块,用于控制所述触摸屏控制芯片以第一预设时间向主控芯片上报预设信息;
    确定模块,用于当所述触摸屏控制芯片在第二预设时间内未接收到所述主控芯片返回的响应信息时,确定操作系统处于异常状态,其中,所述响应信息与所述预设信息相对应。
  9. 如权利要求8所述的装置,其特征在于,还包括:
    发送模块,用于当所述触摸设备的操作系统处于所述异常状态,且所述触摸设备处于锁屏状态时,如果检测到所述触摸设备接收到输入操作,则控制所述触摸屏控制芯片向所述主控芯片发送干扰信息,以使所述主控芯片无法执行所述输入操作对应的指令。
  10. 如权利要求9所述的装置,其特征在于,所述输入操作为通过外部命令方式进行输入的操作。
  11. 如权利要求7所述的装置,其特征在于,还包括:
    保存模块,用于在将所述解锁信息与所述加密信息进行匹配之前,通过操作系统录入所述加密信息,并将所述加密信息保存至所述触摸屏控制芯片中。
  12. 如权利要求11所述的装置,其特征在于,所述加密信息包括轨迹信息或密码。
PCT/CN2016/083360 2016-05-25 2016-05-25 触摸设备解锁方法和装置 WO2017201696A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201680000661.1A CN107850973B (zh) 2016-05-25 2016-05-25 触摸设备解锁方法和装置
PCT/CN2016/083360 WO2017201696A1 (zh) 2016-05-25 2016-05-25 触摸设备解锁方法和装置

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/083360 WO2017201696A1 (zh) 2016-05-25 2016-05-25 触摸设备解锁方法和装置

Publications (1)

Publication Number Publication Date
WO2017201696A1 true WO2017201696A1 (zh) 2017-11-30

Family

ID=60411125

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/083360 WO2017201696A1 (zh) 2016-05-25 2016-05-25 触摸设备解锁方法和装置

Country Status (2)

Country Link
CN (1) CN107850973B (zh)
WO (1) WO2017201696A1 (zh)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246460A (zh) * 2012-02-10 2013-08-14 中兴通讯股份有限公司 触摸屏的解锁方法及装置
CN103389870A (zh) * 2012-05-11 2013-11-13 中兴通讯股份有限公司 一种触摸屏的解锁方法及装置
CN103810414A (zh) * 2012-11-04 2014-05-21 国际商业机器公司 密码呈现管理方法和系统
CN104156642A (zh) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 一种基于安全触控屏控制芯片的安全密码输入系统和方法
CN204242180U (zh) * 2014-07-22 2015-04-01 杭州晟元芯片技术有限公司 一种基于安全触控屏控制芯片的安全密码输入系统

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6577899B2 (en) * 2000-01-21 2003-06-10 Medtronic Minimed, Inc. Microprocessor controlled ambulatory medical apparatus with hand held communication device
US9024890B2 (en) * 2008-05-17 2015-05-05 David H. Chin Comparison of an applied gesture on a touch screen of a mobile device with a remotely stored security gesture
CN103632110B (zh) * 2012-08-20 2017-11-28 联想(北京)有限公司 启动电子设备的方法及电子设备
CN102946484B (zh) * 2012-11-16 2016-08-17 Tcl通讯(宁波)有限公司 一种利用近场通信解锁移动终端的方法及系统
CN103458376A (zh) * 2013-01-26 2013-12-18 曾昭兴 手机号码传送方法及手机号码传送系统
CN103092484B (zh) * 2013-02-06 2016-04-27 小米科技有限责任公司 解锁屏幕的方法、装置及终端
CN104424673A (zh) * 2013-08-23 2015-03-18 黄汉文 车门电子安全锁定技术
CN104200359A (zh) * 2014-09-01 2014-12-10 淄博思科电子技术开发有限公司 应用于移动设备的支付加密硬件的应用方法
CN104766002B (zh) * 2015-03-04 2017-03-08 努比亚技术有限公司 一种解锁方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103246460A (zh) * 2012-02-10 2013-08-14 中兴通讯股份有限公司 触摸屏的解锁方法及装置
CN103389870A (zh) * 2012-05-11 2013-11-13 中兴通讯股份有限公司 一种触摸屏的解锁方法及装置
CN103810414A (zh) * 2012-11-04 2014-05-21 国际商业机器公司 密码呈现管理方法和系统
CN104156642A (zh) * 2014-07-22 2014-11-19 杭州晟元芯片技术有限公司 一种基于安全触控屏控制芯片的安全密码输入系统和方法
CN204242180U (zh) * 2014-07-22 2015-04-01 杭州晟元芯片技术有限公司 一种基于安全触控屏控制芯片的安全密码输入系统

Also Published As

Publication number Publication date
CN107850973B (zh) 2021-08-10
CN107850973A (zh) 2018-03-27

Similar Documents

Publication Publication Date Title
US20210286865A1 (en) Biometric authentication techniques
CN110741370B (zh) 利用用户输入的生物识别认证
US9875368B1 (en) Remote authorization of usage of protected data in trusted execution environments
JP6239788B2 (ja) 指紋認証方法、装置、インテリジェント端末及びコンピュータ記憶媒体
US20210192090A1 (en) Secure data storage device with security function implemented in a data security bridge
US9762396B2 (en) Device theft protection associating a device identifier and a user identifier
US9582656B2 (en) Systems for validating hardware devices
US10063538B2 (en) System for secure login, and method and apparatus for same
US20100192230A1 (en) Protecting transactions
TW201539247A (zh) 密碼輸入與確認方法及其系統
WO2017206833A1 (zh) 支付方法、支付设备和支付服务器
US20040010686A1 (en) Apparatus for remote working
MX2011002423A (es) Autorizacion de operaciones de servidor.
WO2015055141A1 (zh) 终端设备的调试端口控制方法和装置
CN106687985A (zh) 用于基于特权模式的安全输入机构的方法
EP3206329B1 (en) Security check method, device, terminal and server
KR20130113486A (ko) 모바일 상거래에서의 사용자 아이덴티티 증명
WO2020186457A1 (zh) 网络摄像机的认证方法和装置
WO2021051591A1 (zh) 安全键盘实现方法、装置、计算机设备及存储介质
US20180322271A1 (en) Information Handling System Multi-Security System Management
Götzfried et al. Mutual authentication and trust bootstrapping towards secure disk encryption
US10810297B2 (en) Information handling system multi-touch security system
KR101306569B1 (ko) 시큐어 os를 이용한 모바일 디바이스의 도어락 개폐 시스템 및 도어락 개폐 방법
US8863273B2 (en) Method of using an account agent to access superuser account shell of a computer device
KR102102179B1 (ko) 임베디드 시스템, 이를 포함하는 인증 시스템, 및 인증 방법

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16902686

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 16902686

Country of ref document: EP

Kind code of ref document: A1