WO2022188756A1 - 电子设备解锁方法及相关设备 - Google Patents

电子设备解锁方法及相关设备 Download PDF

Info

Publication number
WO2022188756A1
WO2022188756A1 PCT/CN2022/079602 CN2022079602W WO2022188756A1 WO 2022188756 A1 WO2022188756 A1 WO 2022188756A1 CN 2022079602 W CN2022079602 W CN 2022079602W WO 2022188756 A1 WO2022188756 A1 WO 2022188756A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
authentication
unlocking
information
collector
Prior art date
Application number
PCT/CN2022/079602
Other languages
English (en)
French (fr)
Inventor
时春雷
马小双
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to US18/549,737 priority Critical patent/US20240223376A1/en
Priority to EP22766279.8A priority patent/EP4273721A4/en
Publication of WO2022188756A1 publication Critical patent/WO2022188756A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response

Definitions

  • the present application relates to the field of terminal technologies, and in particular, to a method for unlocking an electronic device and related devices.
  • the embodiments of the present application disclose an electronic device unlocking method and related devices, which can unlock a first electronic device on a second electronic device to ensure the safety and convenience of unlocking.
  • a first aspect of the present application discloses a method for unlocking an electronic device, which is applied to a first electronic device, and the method includes:
  • first information is sent to the second electronic device, and the first information is used by the second electronic device to collect the unlocking data. Describe the authentication information required to unlock the object;
  • the unlocking object of the first electronic device is unlocked.
  • the user inputs authentication information on the second electronic device, and the first electronic device unlocks the first electronic device according to the authentication information input on the second electronic device, which can ensure the security and convenience of unlocking.
  • the first information is used to determine a target authentication information collector of the second electronic device, and the target authentication information collector is used to collect the authentication information.
  • the first information includes:
  • the target authentication type corresponding to the authentication method used to unlock the unlocked object is used by the second electronic device to determine the target authentication information collector;
  • the identifier of the target authentication information collector is the identifier of the target authentication information collector.
  • the method for unlocking an electronic device is applied to a scenario where the first electronic device projects a screen to the second electronic device.
  • the unlocking object is a screen of the first electronic device or a target application of the first electronic device, and the target application is a locked application.
  • the determining according to the operation information that the unlocking object of the first electronic device is to be unlocked includes:
  • the obtaining the authentication information from the second electronic device to perform user authentication includes:
  • User authentication is performed by obtaining the authentication information from the second electronic device based on a password authentication protocol.
  • the performing user authentication by obtaining the authentication information from the second electronic device based on a password authentication protocol includes:
  • the remote attestation credential includes a salted value and a first base value
  • the second public key is generated by the second electronic device according to the second base value
  • the first The second base value is generated by the second electronic device according to the salting value and the authentication information
  • the second challenge value is a random number generated by the second electronic device
  • the first signature data is all
  • the second electronic device uses a first key to sign the first challenge value and the second challenge value, and the first key is generated by the second electronic device between the second private key and the second challenge value. Obtained by performing an operation on the first public key, and the second private key is generated by the second electronic device according to the second base value;
  • the authentication result is determined according to the first signature data and the second signature data.
  • the method before the user authentication is performed by obtaining the authentication information from the second electronic device, the method further includes:
  • An authentication request sent by the second electronic device is received.
  • the method before the sending the first information to the second electronic device, the method further includes:
  • An authentication method for unlocking the unlocked object is determined.
  • the determining an authentication method for unlocking the unlocking object includes:
  • the first authentication mode used by the first electronic device and supported by the second electronic device is determined as the authentication mode for unlocking the unlocking object.
  • the operation information includes a device identifier of the second electronic device
  • the determining an authentication method supported by the second electronic device includes:
  • the authentication mode supported by the second electronic device is determined according to the device identifier of the second electronic device.
  • the determining the authentication mode supported by the second electronic device according to the device identifier of the second electronic device includes:
  • the authentication mode supported by the second electronic device is determined according to the collector information of the second electronic device.
  • the determining, according to the collector information of the second electronic device, the authentication method supported by the second electronic device includes:
  • the second electronic device When it is determined according to the collector information of the second electronic device that the second electronic device includes a face image collector and/or a fingerprint collector and/or a password collector, determine the authentication method supported by the second electronic device Including password authentication and/or fingerprint authentication and/or face authentication.
  • the first authentication method is the one with the highest priority among the multiple authentication methods. verification method.
  • the authentication method for unlocking the unlocked object is password authentication
  • the target authentication type is a four-digit password, a six-digit password, a user-defined digital password, a pattern password, or a mixed password. password; or
  • the authentication method for unlocking the unlocked object is face authentication, and the target authentication type is 2D face authentication or 3D face authentication; or
  • the authentication method for unlocking the unlocking object is fingerprint authentication, and the target authentication type is in-screen fingerprint, side fingerprint or off-screen fingerprint.
  • a second aspect of the present application discloses a method for unlocking an electronic device, which is applied to a second electronic device, and the method includes:
  • the second electronic device collects the authentication information required to unlock the unlocked object
  • the authentication information is provided to the first electronic device for user authentication, and a result of the user authentication is used to determine whether to unlock the unlocking object.
  • the user operation is used to unlock the screen of the first electronic device.
  • the user operation is used to open a target application of the first electronic device, where the target application is a locked application.
  • a third aspect of the present application discloses a computer-readable storage medium, comprising computer instructions, when the computer instructions are executed on an electronic device, the electronic device causes the electronic device to execute the electronic device according to the first aspect or the second aspect unlock method.
  • a fourth aspect of the present application discloses an electronic device, the electronic device includes a processor and a memory, the memory is used for storing instructions, and the processor is used for invoking the instructions in the memory, so that the electronic device executes the following steps: The method for unlocking an electronic device according to the first aspect or the second aspect.
  • a fifth aspect of the present application discloses a chip system, which is applied to an electronic device; the chip system includes an interface circuit and a processor; the interface circuit and the processor are interconnected by lines; the interface circuit is used for receiving signals from a memory of the electronic device, A signal is sent to the processor, where the signal includes computer instructions stored in the memory; when the processor executes the computer instructions, the chip system executes the method for unlocking an electronic device according to the first aspect or the second aspect.
  • a sixth aspect of the present application discloses a computer program product, which, when the computer program product runs on a computer, causes the computer to execute the method for unlocking an electronic device according to the first aspect or the second aspect.
  • a seventh aspect of the present application discloses an apparatus, the apparatus having the function of implementing the behavior of the electronic device in the method provided in the first aspect or the second aspect.
  • the functions can be implemented by hardware, or by executing corresponding software by hardware.
  • the hardware or software includes one or more modules corresponding to the above functions.
  • the computer-readable storage medium according to the third aspect corresponds to the methods of the first and second aspects. Therefore, for the beneficial effects that can be achieved, reference may be made to the beneficial effects of the corresponding methods provided above, which will not be repeated here.
  • FIG. 1 is a schematic diagram of an application scenario of the method for unlocking an electronic device disclosed in an embodiment of the present application.
  • FIG. 2 is a functional architecture diagram of a first electronic device and a second electronic device to which the method for unlocking an electronic device disclosed in an embodiment of the present application is applied.
  • FIG. 3 is a flowchart of a method for unlocking an electronic device disclosed in an embodiment of the present application.
  • FIG. 4 is a flowchart of a method for unlocking an electronic device disclosed by another embodiment of the present application.
  • FIG. 5 is a detailed flowchart of user authentication in the method for unlocking an electronic device disclosed in an embodiment of the present application.
  • FIG. 6 is another functional architecture diagram of a first electronic device and a second electronic device to which the method for unlocking an electronic device disclosed in an embodiment of the present application is applied.
  • FIG. 7 is a schematic structural diagram of an electronic device disclosed in an embodiment of the present application.
  • FIG. 1 is a schematic diagram of an application scenario of the method for unlocking an electronic device disclosed in an embodiment of the present application.
  • the screen of the first electronic device 10 is projected onto the second electronic device 11 , and the collaboration window 110 of the first electronic device 10 is displayed on the second electronic device 11 .
  • the first electronic device 10 (the mobile phone in the figure) and the second electronic device 11 (the computer in the figure) can perform multi-screen collaboration, and the user operates the first electronic device 10 through the collaboration window 110 .
  • the first electronic device 10 is a mobile phone
  • the second electronic device 11 is a computer.
  • the user can operate the mobile phone through the collaboration window 110, such as opening files on the mobile phone, making audio and video calls on the mobile phone, and playing music on the mobile phone.
  • the existing multi-screen collaboration technology does not support unlocking the screen or application of the first electronic screen 10 on the second electronic device 11.
  • the user needs to unlock the screen or application of the first electronic screen 10 on the first electronic device 10 .
  • the electronic device unlocking method disclosed in the embodiment of the present application when the first electronic device 10 and the second electronic device 11 perform multi-screen collaboration, if the first electronic device 10 enters a locked state (screen lock or application lock), the user does not need to Performing an unlocking operation on the first electronic device 10 can directly unlock the screen or application of the first electronic device 10 on the second electronic device 11 through the collaboration window 110 to ensure the security and convenience of unlocking.
  • a locked state screen lock or application lock
  • FIG. 2 is a functional architecture diagram of a first electronic device and a second electronic device to which the method for unlocking an electronic device disclosed in an embodiment of the present application is applied.
  • the electronic device unlocking method of the present application is applied to a first electronic device 20 (eg, a mobile phone in FIG. 1 ) and a second electronic device 21 (eg, a computer in FIG. 1 ).
  • the first electronic device 20 includes a first screen projection module 201 , an unlocking module 202 , a collaborative authentication module 203 and an authenticator 204 .
  • the second electronic device 21 includes a second screen projection module 211 , an authentication information collector 212 and a display module 213 .
  • the first screen projection module 201 is used to provide the first electronic device 20 with a multi-screen collaboration capability, so as to realize the interaction between the first electronic device 20 and the second electronic device 21 .
  • the unlocking module 202 is used to unlock the screen or application of the first electronic device 20 .
  • the unlocking module 202 may include a screen unlocking submodule and an application unlocking submodule (not shown in the figure).
  • the screen unlocking submodule is used to unlock the screen of the first electronic device 20, and the application unlocking The sub-module is used to unlock the application of the first electronic device 20 .
  • the collaborative authentication module 203 is configured to schedule the authenticator 204 of the first electronic device 20 and the authentication information collector 212 of the second electronic device 21 .
  • the first electronic device 20 may use multiple authentication methods, and each authentication method may correspond to an authenticator 204 .
  • each authentication method may correspond to an authenticator 204 .
  • the authenticator corresponding to password authentication is a password authenticator
  • the authenticator corresponding to fingerprint authentication is a fingerprint authenticator
  • the authenticator corresponding to face authentication is a face authenticator.
  • the authenticator 204 is used to authenticate the first electronic device 20 according to the authentication information received from the second electronic device 21 .
  • the second screen projection module 211 is used to provide the second electronic device 21 with a multi-screen collaboration capability, so as to realize the interaction between the second electronic device 21 and the first electronic device 20 .
  • the authentication information collector 212 is used to collect the authentication information of the user.
  • the authentication information collected by the authentication information collector 212 may include passwords, fingerprints, face images, and the like.
  • the display module 213 is used to display the user interface during the unlocking process of the first electronic device 20 .
  • each module will be described below with reference to the flowchart shown in FIG. 3 .
  • FIG. 3 is a flowchart of a method for unlocking an electronic device disclosed in an embodiment of the present application.
  • FIG. 3 takes an example of unlocking the screen of a first electronic device (eg, a mobile phone) on a second electronic device (eg, a computer).
  • a first electronic device eg, a mobile phone
  • a second electronic device eg, a computer
  • the first electronic device includes a first screen projection module, an unlocking module, a collaborative authentication module and an authenticator
  • the second electronic device includes a second screen projection module, an authentication information collector and a display module (see Figure 2).
  • the first electronic device projects a screen onto the second electronic device, and the second electronic device displays the collaboration window of the first electronic device on the screen of the second electronic device.
  • the display module displays a screen lock interface of the first electronic device in a collaboration window of the first electronic device.
  • the first electronic device enters a screen-locked state after the user does not operate for a period of time or presses the power-off key.
  • the sleep time set by the first electronic device is one minute, and if the user does not operate the first electronic device within one minute, the first electronic device enters a screen lock state.
  • the lock screen interface of the first electronic device displayed in the collaboration window of the first electronic device includes an "unlock” button.
  • the display module sends the unlocking operation information to the first electronic device through the second screen projection module, where the unlocking operation information may include a device identifier of the second electronic device.
  • the unlocking operation information is used to instruct to unlock the screen of the first electronic device.
  • the first electronic device and the second electronic device interact through the first screen projection module and the second screen projection module.
  • the second screen projection module first sends the unlocking operation information to the first screen projection module, and the first screen projection module then transmits the unlocking operation information to the unlocking module.
  • the unlocking module determines to unlock the screen of the first electronic device according to the unlocking operation information, initiates collaborative authentication to the collaborative authentication module, and sends the device identifier of the second electronic device and unlocking target information to the collaborative authentication module.
  • the unlocking target information is used to indicate the unlocking object of the first electronic device.
  • the unlocking module determines that the unlocking object is the screen of the first electronic device according to the unlocking operation information, and the unlocking target information may be represented by "0".
  • the collaborative authentication module generates a collaborative authentication scheme according to the device identifier of the second electronic device.
  • the collaborative authentication scheme includes a first authentication method, and the first authentication method is an authentication method used to unlock the unlocking object.
  • the collaborative authentication module determines the authentication method used by the first electronic device and the authentication method supported by the second electronic device (determining the authentication method supported by the second electronic device according to the device identifier of the second electronic device) , generating a collaborative authentication scheme according to the authentication method used by the first electronic device and the authentication method supported by the second electronic device.
  • Authentication resource information of the first electronic device may be stored in the first electronic device, and the collaborative authentication module may determine an authentication method used by the first electronic device according to the authentication resource information of the first electronic device.
  • the authentication resource information of the first electronic device is used to indicate the authentication method used by the first electronic device.
  • the authentication method used by the first electronic device includes password authentication, fingerprint authentication, and face authentication.
  • the first electronic device may use different authentication methods for different unlocking objects by preset settings.
  • the collaborative authentication module may determine, according to the unlocking target information, an authentication method used by the first electronic device for the unlocking object.
  • the collaborative authentication module may determine the authentication mode supported by the second electronic device according to the device identifier of the second electronic device.
  • the first electronic device stores the collector information of the second electronic device
  • the collaborative authentication module can obtain the collector information of the second electronic device according to the device identifier of the second electronic device, and according to the second electronic device
  • the collector information of the electronic device determines the authentication method supported by the second electronic device.
  • the collector information of the second electronic device is used to indicate the authentication information collector included in the second electronic device.
  • the second electronic device includes a face image collector (camera), a fingerprint collector and a password collector. Therefore, the authentication methods supported by the second electronic device include password authentication, fingerprint authentication and face authentication.
  • the collaborative authentication module determines the intersection of the authentication mode used by the first electronic device and the authentication mode supported by the second electronic device, and determines the collaborative authentication scheme according to the intersection of the authentication mode used by the first electronic device and the authentication mode supported by the second electronic device.
  • the authentication methods used by the first electronic device include password authentication and face authentication
  • the authentication methods supported by the second electronic device include password authentication and fingerprint authentication
  • the collaborative authentication module determines that the first authentication method is password authentication.
  • the collaborative authentication module may determine the priorities of the multiple authentication methods, and determine the authentication method with the highest priority as the first authentication method. verification method.
  • the intersection of the authentication method used by the first electronic device and the authentication method supported by the second electronic device includes password authentication, fingerprint authentication, and face authentication, and face authentication, fingerprint authentication, and password authentication are in descending order of priority. (That is, the priority of face authentication is higher than that of fingerprint authentication, and the priority of fingerprint authentication is higher than that of password authentication), then the first authentication method is face authentication.
  • the priority of authentication methods can be based on the convenience of authentication.
  • the collaborative authentication module pulls up the authenticator corresponding to the collaborative authentication scheme, and sends the collaborative authentication scheme to the authenticator corresponding to the collaborative authentication scheme.
  • Each authentication method can correspond to an authenticator, and the collaborative authentication module pulls up the authenticator corresponding to the collaborative authentication scheme.
  • the authenticator corresponding to password authentication is a password authenticator
  • the authenticator corresponding to fingerprint authentication is a fingerprint authenticator
  • the authenticator corresponding to face authentication is a face authenticator.
  • the collaborative authentication module pulls up the password authenticator.
  • the authenticator can return the pull result to the collaborative authentication module. For example, if the authenticator is successfully pulled up, the authenticator returns a pull-up successful message to the collaborative authentication module.
  • the authenticator determines the target authentication type corresponding to the collaborative authentication scheme.
  • the authenticator can display the authentication type setting interface, and the user can set the target authentication type corresponding to the collaborative authentication scheme from the authentication type setting interface.
  • the first authentication method is password authentication
  • the authentication types of password authentication include four-digit passwords, six-digit passwords, custom digital passwords, pattern passwords, and mixed passwords.
  • the user sets the target corresponding to the collaborative authentication scheme from the authentication type setting interface.
  • the authentication type is a six-digit password.
  • a four-digit password is a password that consists of four digits.
  • a six-digit password is a password that consists of six digits.
  • the custom numeric password is a password consisting of 4-32 digits.
  • a pattern password is a password composed of at least four dots in a nine-square grid.
  • Mixed passwords can be passwords consisting of 4-32 characters with at least one letter in the password.
  • the first authentication method is face authentication
  • the authentication types corresponding to face authentication include 2D face authentication and 3D face authentication
  • the user sets the target authentication type corresponding to the collaborative authentication scheme to 2D face authentication from the authentication type setting interface.
  • the first authentication method is fingerprint authentication
  • the authentication types corresponding to fingerprint authentication include in-screen fingerprints, side fingerprints, and off-screen fingerprints.
  • the user sets the target authentication type corresponding to the collaborative authentication scheme to in-screen fingerprints from the authentication type setting interface.
  • the default target authentication type can be set for the collaborative authentication scheme. If the user does not set the target authentication type corresponding to the collaborative authentication scheme, the default target authentication type can be used.
  • the default target authentication type for password authentication may be a six-digit password
  • the default target authentication type for face authentication may be 2D face authentication
  • the default target authentication type for fingerprint authentication may be on-screen fingerprint.
  • the authenticator sends the target authentication type and unlocking target information to the collaborative authentication module
  • the collaborative authentication module sends the target authentication type and unlocking target information to the authentication information corresponding to the collaborative authentication scheme through the first screen projection module and the second screen projection module Collector (ie target authentication collector).
  • the target authentication type corresponding to the collaborative authentication scheme is 2D face authentication
  • the authenticator sends the target authentication type of 2D face authentication to the collaborative authentication module
  • the collaborative authentication module sends the target authentication type of 2D face authentication and the unlock target information ( For example, screen information) is sent to the face image collector through the first screen projection module and the second screen projection module, so as to pull up the face image collector.
  • the unlock target information For example, screen information
  • the authentication information collector can return the pull-up result to the collaborative authentication module. For example, if the pull is successful, the authentication information collector will pull the successful message back to the collaborative authentication module.
  • the authenticator may determine the authentication information collector corresponding to the collaborative authentication scheme according to the target authentication type, and the authenticator sends the identification of the authentication information collector corresponding to the collaborative authentication scheme to the collaborative authentication module, and the collaborative authentication The module sends the identification of the authentication information collector corresponding to the collaborative authentication scheme to the authentication information collector corresponding to the collaborative authentication scheme through the first screen projection module and the second screen projection module.
  • each interaction between the authenticator and the authentication information collector needs to go through the collaborative authentication module, the first screen projection module, and the second screen projection module.
  • the authenticator needs to send information to the authentication information collector
  • the authenticator transmits the information to the collaborative authentication module
  • the collaborative authentication module transmits the information to the first screen projection module
  • the first screen projection module sends the information to the second screen projection module
  • the second screen projection module transmits the information to the authentication information collector.
  • the authentication information collector needs to send information to the authenticator
  • the authentication information collector transfers the information to the second screen projection module
  • the second screen projection module sends the information to the first screen projection module
  • the first screen projection module transmits the information
  • the collaborative authentication module passes the information to the authenticator.
  • the authentication information collector transmits the target authentication type to the display module.
  • the display module prompts the user to input authentication information according to the target authentication type.
  • the display module displays a password input box containing six digits according to the target authentication type, and displays the password input box on the first electronic device screen page in the collaboration window of the second electronic device.
  • the target authentication type is 2D face authentication
  • the display module prompts the user to take a face image.
  • the target authentication type is an in-screen fingerprint
  • the display module prompts the user to press the fingerprint at the in-screen fingerprint sensor.
  • the authentication information collector collects the authentication information input by the user according to the target authentication type.
  • the authentication information collector corresponding to the collaborative authentication scheme is a password collector, and the password collector collects the six-digit password entered in the user box.
  • the user enters a password (eg, a six-digit password) in the password input box displayed by the display module, and the display module transmits the password entered by the user to the password collector.
  • a password eg, a six-digit password
  • the face image collector directly collects the user's face image (for example, a 2D face image).
  • the fingerprint collector directly collects the user's fingerprint.
  • the authentication information collector generates an authentication request, where the authentication request includes the authentication information and unlocking target information input by the user.
  • the authentication information collector and the authenticator perform authentication interaction through the second screen projection module, the first screen projection module, and the collaborative authentication module, and the authenticator performs user authentication according to the authentication information and unlocking target information input by the user, and obtains the authentication result.
  • the authenticator returns the authentication result to the unlocking module through the collaborative authentication module.
  • the unlocking module unlocks the screen of the first electronic device according to the authentication result.
  • the unlocking module unlocks the screen of the first electronic device. Otherwise, if the user authentication is not passed, the unlocking module keeps the screen of the first electronic device in a locked state.
  • FIG. 4 is a flowchart of a method for unlocking an electronic device disclosed by another embodiment of the present application.
  • FIG. 4 is an example of unlocking an application of a first electronic device (eg, a mobile phone) on a second electronic device (eg, a computer).
  • a first electronic device eg, a mobile phone
  • a second electronic device eg, a computer
  • the display module sends the application icon operation information to the unlocking module through the second screen projection module and the first screen projection module, where the application icon operation information includes the position coordinates of the click and the device identifier of the second electronic device.
  • the application icon operation information is used to instruct to open the target application.
  • the first electronic device and the second electronic device interact through the first screen projection module and the second screen projection module.
  • the second screen projection module first sends the application icon operation information to the first screen projection module, and the first screen projection module then transmits the application icon operation information to the unlocking module.
  • the unlocking module determines whether the application opened by the user is an application that is locked in the first electronic device according to the clicked position coordinates, and if the application opened by the user is an application that is locked in the first electronic device, initiate collaborative authentication to the collaborative authentication module, Send the device identifier and unlock target information of the second electronic device to the collaborative authentication module.
  • the unlocking module may also send the identification of the application lock (eg, the package name) to the collaborative authentication module.
  • the application lock is a system-level application on the first electronic device, and the protection (locking and unlocking) of other applications is realized through the application lock.
  • the collaborative authentication module generates a collaborative authentication scheme according to the device identifier of the second electronic device.
  • the collaborative authentication module pulls up the authenticator corresponding to the collaborative authentication scheme, and sends the collaborative authentication scheme to the authenticator corresponding to the collaborative authentication scheme.
  • the authenticator can return the pull result to the collaborative authentication module. For example, if the authenticator is successfully pulled up, the authenticator returns a pull-up successful message to the collaborative authentication module.
  • the authenticator determines the target authentication type corresponding to the collaborative authentication scheme.
  • the authenticator sends the target authentication type to the collaborative authentication module
  • the collaborative authentication module sends the target authentication type and unlocking target information to the authentication information collector corresponding to the collaborative authentication scheme through the first screen projection module and the second screen projection module, so as to Pull up the authentication information collector.
  • the authentication information collector can return the pull-up result to the collaborative authentication module. For example, if the pull is successful, the authentication information collector will pull the successful message back to the collaborative authentication module.
  • the authentication information collector transmits the target authentication type to the display module.
  • the display module prompts the user to input authentication information according to the target authentication type.
  • the authentication information collector collects the authentication information input by the user according to the target authentication type.
  • the authentication information collector generates an authentication request, where the authentication request includes the authentication information and unlocking target information input by the user.
  • the authentication information collector and the authenticator perform authentication interaction through the second screen projection module, the first screen projection module, and the collaborative authentication module, and the authenticator performs user authentication according to the authentication information input by the user and the unlocking target information, and obtains an authentication result.
  • the specific process of the authentication information collector and the authenticator performing authentication interaction can refer to FIG. 5 .
  • the authenticator returns the authentication result to the unlocking module through the collaborative authentication module.
  • the unlocking module unlocks the application of the first electronic device according to the authentication result.
  • the unlocking module unlocks the application of the first electronic device and starts the application. Otherwise, if the user authentication is not passed, the unlocking module keeps the application of the first electronic device in a locked state and does not open the application.
  • the unlocking module may unlock the application through the application lock in the first electronic device.
  • the first electronic device may obtain authentication information from the second electronic device for user authentication based on a password authentication protocol.
  • FIG. 5 is a detailed flowchart of the authentication information collector and the authenticator performing authentication interaction (ie, steps 313 and 412 ) in the method for unlocking an electronic device disclosed in an embodiment of the present application.
  • the authentication information collector sends an authentication request to the authenticator, where the authentication request includes unlocking target information.
  • the unlocking module initiates collaborative authentication to the collaborative authentication module, it sends the unlocking target information to the collaborative authentication module (see 304).
  • the collaborative authentication module pulls up the authentication information collector, it sends the unlocking target information to the authentication information collector.
  • the authentication request sent by the authentication information collector to the authenticator may not include unlocking target information.
  • the authenticator obtains the user's remote attestation credentials according to the unlocking target information, where the remote attestation credentials include the salted value auth_salt and the first base value base1.
  • the authenticator may acquire unlocking target information from the unlocking module.
  • the authenticator When a user sets authentication information (such as a six-digit password) on a first electronic device (such as a mobile phone), the authenticator will generate the user's remote authentication credential, and store the unlocking target information and the corresponding remote authentication credential in the authenticator.
  • authentication information such as a six-digit password
  • the authenticator When the user sets authentication information (such as a six-digit password) on the first electronic device (such as a mobile phone), the authenticator generates a random number as the salted value auth_salt, and performs password-based encryption between the authentication information set by the user and the salted value auth_salt.
  • the Password-Based Key Derivation Function (PBKDF) iteratively operates to generate the first ciphertext secretData1, square the first ciphertext secretData1 and perform a large integer modular exponentiation operation to obtain the first base value base1.
  • the authenticator generates a first public key and a first private key (ie, generates a first public-private key pair) according to the first base value base1.
  • the authenticator may generate a random number as the first private key sk1, and perform a large integer modular exponentiation operation on the first base value base1 and the private key sk1 to obtain the first public key pk1.
  • the authenticator generates a random number as the first challenge value challenge1.
  • the authenticator can generate random numbers by calling the random number generator.
  • the authenticator sends the salted value auth_salt, the first public key and the first challenge value challenge1 to the authentication information collector.
  • the authentication information collector generates a second base value base2 according to the salted value auth_salt and the authentication information input by the user.
  • the authentication information collector can perform the PBKDF iterative operation on the authentication information input by the user and the salted value auth_salt to generate the second ciphertext secretData2, and perform a large integer modular exponentiation operation after squaring the second ciphertext secretData2 to obtain the second base value base2.
  • the authentication information collector generates a second public key and a second private key (ie, generates a second public-private key pair) according to the second base value base2.
  • the authentication information collector may generate a random number as the second private key sk2, and perform a large integer modular exponentiation operation on the second base value base2 and the private key sk2 to obtain the second public key pk2.
  • the authentication information collector performs an operation on the second private key and the first public key to obtain the first key sessionKey1.
  • the authentication information collector may perform a large integer modular exponentiation operation on the second private key and the first public key to obtain the first key sessionKey1.
  • the authentication information collector generates a random number as the second challenge value challenge2.
  • the authentication information collector uses the first key sessionKey1 to sign the first challenge value challenge1 and the second challenge value challenge2 to generate first signature data kcfDataC1.
  • the authentication information collector can use the first challenge value challenge1 and the second challenge value challenge2 as plaintext, use the first key sessionKey1 as the key, and generate the first challenge through the Hash-based Message Authentication Code (HMAC) algorithm.
  • HMAC Hash-based Message Authentication Code
  • the authentication information collector sends the second public key, the second challenge value challenge2, and the first signature data kcfDataC1 to the authenticator.
  • the authenticator performs an operation on the first private key and the second public key to obtain the second key sessionKey2.
  • the authenticator may perform a large integer modular exponentiation operation on the first private key and the second public key to obtain the second key sessionKey2.
  • the authenticator uses the second key sessionKey2 to sign the first challenge value challenge1 and the second challenge value challenge2 to generate second signature data kcfDataC2.
  • the authenticator may use the first challenge value challenge1 and the second challenge value challenge2 as plaintext, and use the second key sessionKey2 as the key, and generate the second signature data kcfDataC2 through the HMAC algorithm.
  • the authenticator determines an authentication result according to the first signature data and the second signature data.
  • the authenticator determines whether the second signature data kcfDataC2 is consistent with the first signature data kcfDataC1 sent by the authentication information collector. If the second signature data kcfDataC2 is consistent with the first signature data kcfDataC1 sent by the authentication information collector, the user passes the authentication. Otherwise, the second signature data kcfDataC2 is inconsistent with the first signature data kcfDataC1 sent by the authentication information collector, and the user fails the authentication.
  • a password-based authentication key exchange protocol is used for authentication interaction between the authenticator and the authentication information collector, and the authentication information is encrypted between the first electronic device and the second electronic device. transmission, which can further improve the security of unlocking across devices.
  • the method for unlocking an electronic device provided by this application is applied to the scenario in which the screen of the first electronic device is projected to the second electronic device, and the second electronic device is based on the user who projects the screen of the first electronic device to the interface of the second electronic device.
  • the operation sends operation information (eg, unlock operation information in FIG. 3 or application icon operation information in FIG. 4 ) to the first electronic device.
  • the method for unlocking an electronic device provided by the present application may be applied to a non-screen projection scenario (the first electronic device does not project the screen to the second electronic device).
  • the second electronic device can generate a control interface (non-screen projection interface) of the first electronic device, the user can perform operations on the control interface, and the second electronic device can report to the first electronic device according to the user operation on the control interface.
  • the electronic device sends operational information.
  • the first electronic device includes a first screen projection module, an unlocking module, a collaborative authentication module, and an authenticator.
  • the second electronic device includes a second screen projection module, an authentication information collector and a display module.
  • the first electronic device and the second electronic device may be divided into other functional modules.
  • FIG. 6 is another functional architecture diagram of a first electronic device and a second electronic device to which the method for unlocking an electronic device disclosed in an embodiment of the present application is applied.
  • the first electronic device 60 may include a first screen projection module 601 and an authentication and unlock module 602
  • the second electronic device 61 may include a second screen projection module 611 and a collection module 612 .
  • the first screen projection module 601 is configured to receive operation information sent by the second electronic device 61 .
  • the first screen projection module 601 is further configured to send the first information to the second electronic device when it is determined according to the operation information that the unlocking object of the first electronic device is to be unlocked.
  • the first information is used by the second electronic device to collect authentication information required to unlock the unlocked object.
  • the authentication and unlocking module 602 is configured to obtain authentication information from the second electronic device to perform user authentication, and when the user authentication is passed, unlock the unlocking object of the first electronic device.
  • the second screen projection module 611 is configured to send the operation information of the user operation performed by the second electronic device to the first electronic device.
  • the user operation triggers the unlocking of the unlocking object of the first electronic device.
  • the second screen projection module 611 is further configured to receive first information from the first electronic device.
  • the first information is sent when the first electronic device determines to unlock the unlocking object of the first electronic device according to the operation information, and is used for the second electronic device to collect authentication information required by the unlocking object.
  • the collection module 612 is configured to collect authentication information required for unlocking the unlocking object according to the first information, provide the first electronic device with the authentication information for user authentication, and the result of the user authentication is used to determine whether to unlock the unlocking object.
  • FIG. 7 is a schematic structural diagram of an electronic device (a first electronic device or a second electronic device) disclosed in an embodiment of the present application.
  • the electronic device 70 may include: a radio frequency (RF) circuit 701 , a memory 702 , an input unit 703 , a display unit 704 , a sensor 705 , an audio circuit 706 , a Wi-Fi module 707 , a processor 708 and Power supply 709 and other components.
  • RF radio frequency
  • FIG. 7 does not constitute a limitation on the service flow aggregation and forwarding node, and may include more or less components than those shown in the figure, or combine some components, or arrange different components .
  • the RF circuit 701 can be used to send and receive information or to receive and transmit signals during a call. In particular, after receiving the downlink information of the base station, it is transferred to the processor 708 for processing; in addition, it sends the uplink data to the base station.
  • the RF circuit 701 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • LNA Low Noise Amplifier
  • the memory 702 can be used to store software programs and modules, and the processor 708 executes various functional applications and data processing of the electronic device by running the software programs and modules stored in the memory 702 .
  • the memory 702 may mainly include a stored program area and a stored data area, wherein the stored program area may store an operating system, an application program (such as a sound playback function, an image playback function, etc.) required for at least one function, and the like; Data created by the use of electronic equipment (such as audio data, phone book, etc.), etc.
  • memory 702 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 703 may be used to receive input numerical or character information, and generate key signal input related to user settings and function control of the electronic device.
  • the input unit 703 may include a touch panel 7031 and other input devices 7032 .
  • the touch panel 7031 also known as the touch screen, collects the user's touch operations on or near it (such as the user using a finger, a stylus, etc., any suitable object or accessory on or near the touch panel 7031) operation), and drive the corresponding connection device according to the preset program.
  • the touch panel 7031 may include two parts, a touch detection device and a touch controller.
  • the touch detection device detects the user's touch orientation, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it to the touch controller.
  • the touch panel 7031 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 703 may also include other input devices 7032 .
  • other input devices 7032 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 704 may be used to display information input by the user or information provided to the user and various menus of the electronic device.
  • the display unit 704 may include a display panel 7041, and optionally, the display panel 7041 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like.
  • the touch panel 7031 can cover the display panel 7041. When the touch panel 7031 detects a touch operation on or near it, it transmits it to the processor 708 to determine the type of the touch event, and then the processor 708 determines the type of the touch event according to the touch event. Type provides corresponding visual output on display panel 7041.
  • the touch panel 7031 and the display panel 7041 are used as two independent components to realize the input and output functions of the electronic device, but in some embodiments, the touch panel 7031 and the display panel 7041 may be integrated And realize the input and output functions of electronic equipment.
  • the electronic device may also include at least one sensor 705, such as light sensors, motion sensors, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 7041 according to the brightness of the ambient light, and the proximity sensor may turn off the display panel 7041 and the display panel 7041 when the electronic device is moved to the ear. / or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (generally three axes), and can detect the magnitude and direction of gravity when stationary, and can be used for applications that recognize the posture of electronic devices (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; in addition, electronic devices can also be equipped with other sensors such as gyroscopes, barometers, hygrometers, thermometers, infrared sensors, etc. This will not be repeated here.
  • Audio circuitry 706, speakers 7061, and microphones 7062 may provide an audio interface between the user and the electronic device.
  • the audio circuit 706 can convert the received audio data into an electrical signal, and transmit it to the speaker 7061, and the speaker 7061 converts it into a sound signal for output; on the other hand, the microphone 7062 converts the collected sound signal into an electrical signal, which is converted by the audio circuit 706. After receiving, it is converted into audio data, and then the audio data is output to the processor 708 for processing, and then sent to another electronic device through the RF circuit 701, or the audio data is output to the memory 702 for further processing.
  • Wi-Fi is a short-distance wireless transmission technology, and the electronic device can help users to send and receive emails, browse web pages, and access streaming media through the Wi-Fi module 707, which provides users with wireless broadband Internet access.
  • FIG. 6 shows the Wi-Fi module 707, it can be understood that it is not a necessary component of the electronic device, and can be completely omitted as required and within the scope of not changing the essence of the invention.
  • the processor 708 is the control center of the electronic device, using various interfaces and lines to connect various parts of the entire electronic device, by running or executing the software programs and/or modules stored in the memory 702, and calling the data stored in the memory 702. , perform various functions of electronic equipment and process data, so as to monitor electronic equipment as a whole.
  • the processor 708 may include one or more processing units; preferably, the processor 708 may integrate an application processor and a modem, wherein the application processor mainly handles the operating system, user interface, and application programs, and the modem mainly handles Wireless communication. It can be understood that the above-mentioned modulation and demodulation processor may not be integrated into the processor 708 .
  • the electronic device also includes a power supply 709 (such as a battery) for supplying power to various components.
  • a power supply 709 (such as a battery) for supplying power to various components.
  • the power supply can be logically connected to the processor 708 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system. .
  • the electronic device may further include a camera, a Bluetooth module, and the like, which will not be repeated here.
  • This embodiment also provides a computer storage medium, where computer instructions are stored in the computer storage medium.
  • the electronic device executes the above-mentioned relevant method steps to realize the blockchain verification in the above-mentioned embodiments. sign method.
  • This embodiment also provides a computer program product, which, when the computer program product runs on the electronic device, causes the electronic device to execute the above-mentioned relevant steps, so as to realize the blockchain signature verification method in the above-mentioned embodiment.
  • the embodiments of the present application also provide an apparatus, which may specifically be a chip, a component or a module, and the apparatus may include a connected processor and a memory; wherein, the memory is used for storing computer execution instructions, and when the apparatus is running, The processor can execute the computer-executed instructions stored in the memory, so that the chip executes the blockchain signature verification method in the above method embodiments.
  • the electronic device, computer storage medium, computer program product or chip provided in this embodiment are all used to execute the corresponding method provided above. Therefore, for the beneficial effects that can be achieved, reference can be made to the corresponding provided above. The beneficial effects in the method will not be repeated here.
  • the units described as separate components may or may not be physically separated, and components shown as units may be one physical unit or multiple physical units, that is, may be located in one place, or may be distributed to multiple different places. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units may be implemented in the form of hardware, or may be implemented in the form of software functional units.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a readable storage medium.
  • a readable storage medium including several instructions to make a device (may be a single chip microcomputer, a chip, etc.) or a processor (processor) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk and other media that can store program codes .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

一种电子设备解锁方法及相关设备,应用于第一电子设备,所述方法包括:接收第二电子设备发送的操作信息;在根据操作信息确定要对第一电子设备的解锁对象进行解锁时,向第二电子设备发送第一信息,第一信息用于第二电子设备采集对解锁对象进行解锁所需的认证信息;从第二电子设备获得认证信息进行用户认证;在用户认证通过时,对第一电子设备的解锁对象进行解锁。该方法可以在第二电子设备上对第一电子设备进行解锁,确保解锁的安全性与便捷性。

Description

电子设备解锁方法及相关设备
本申请要求于2021年3月12日提交中国专利局、申请号为202110272554.7、发明名称为“电子设备解锁方法及相关设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及终端技术领域,尤其涉及一种电子设备解锁方法及相关设备。
背景技术
分布式场景下,设备之间协同应用的场景越来越多,设备之间硬件互助、文件共享越来越频繁。出于安全考虑,设备A(例如电脑)与设备B(例如手机)进行多屏协作时,一旦设备B进入锁屏状态,用户需要在设备B上进行解锁操作。目前这种解锁方式效率不高,不方便用户操作。
发明内容
本申请实施例公开了一种电子设备解锁方法及相关设备,能够在第二电子设备上对第一电子设进行解锁,确保解锁的安全性与便捷性。
本申请第一方面公开了一种电子设备解锁方法,应用于第一电子设备,所述方法包括:
接收第二电子设备发送的操作信息;
在根据所述操作信息确定要对所述第一电子设备的解锁对象进行解锁时,向所述第二电子设备发送第一信息,所述第一信息用于所述第二电子设备采集解锁所述解锁对象所需的认证信息;
从所述第二电子设备获得所述认证信息进行用户认证;
在用户认证通过时,对所述第一电子设备的所述解锁对象进行解锁。
用户在第二电子设备上输入认证信息,第一电子设备根据第二电子设备上输入的认证信息对第一电子设备进行解锁,能够确保解锁的安全性与便捷性。
在一些可选的实施方式中,所述第一信息用于确定所述第二电子设备的目标认证信息采集器,所述目标认证信息采集器用于采集所述认证信息。
在一些可选的实施方式中,所述第一信息包括:
用于解锁所述解锁对象的认证方式对应的目标认证类型,所述目标认证类型用于所述第二电子设备确定所述目标认证信息采集器;和/或
所述目标认证信息采集器的标识。
在一些可选的实施方式中,所述电子设备解锁方法应用于所述第一电子设备投屏到所述第二电子设备的场景。
在一些可选的实施方式中,所述解锁对象为所述第一电子设备的屏幕或者所述第一电子设备的目标应用,所述目标应用为已加锁应用。
在一些可选的实施方式中,所述根据所述操作信息确定要对所述第一电子设备的解锁对象进行解锁包括:
确定所述操作信息用于指示对所述第一电子设备的屏幕进行解锁;或者
确定所述操作信息用于指示打开所述目标应用。
在一些可选的实施方式中,所述从所述第二电子设备获得所述认证信息进行用户认证包括:
基于密码认证协议从所述第二电子设备获得所述认证信息进行用户认证。
在一些可选的实施方式中,所述基于密码认证协议从所述第二电子设备获得所述认证信息进行用户认证包括:
接收所述第二电子设备发送的所述用户的远程证明凭据,所述远程证明凭据包括加盐值和第一基值;
根据所述第一基值,生成第一公钥和第一私钥;
生成随机数作为第一挑战值;
将所述加盐值、所述第一公钥和所述第一挑战值发送给所述第二电子设备;
接收所述第二电子设备发送的第二公钥、第二挑战值和第一签名数据,其中,所述第二公钥是所述第二电子设备根据第二基值生成的,所述第二基值是所述第二电子设备根据所述加盐值与所述认证信息生成的,所述第二挑战值是所述第二电子设备生成的随机数,所述第一签名数据是所述第二电子设备使用第一密钥对所述第一挑战值和所述第二挑战值进行签名生成的,所述第一密钥是所述第二电子设备对第二私钥与所述第一公钥进行运算得到的,所述第二私钥是所述第二电子设备根据所述第二基值生成的;
对所述第一私钥与所述第二公钥进行运算,得到第二密钥;
使用所述第二密钥对所述第一挑战值和所述第二挑战值进行签名,生成第二签名数据;
根据所述第一签名数据与所述第二签名数据确定所述认证结果。
在一些可选的实施方式中,所述从所述第二电子设备获得所述认证信息进行用户认证之前,所述方法还包括:
接收所述第二电子设备发送的认证请求。
在一些可选的实施方式中,所述向所述第二电子设备发送第一信息之前,所述方法还包括:
确定用于解锁所述解锁对象的认证方式。
在一些可选的实施方式中,所述确定用于解锁所述解锁对象的认证方式包括:
确定所述第一电子设备使用的认证方式;
确定所述第二电子设备支持的认证方式;
将所述第一电子设备使用且所述第二电子设备支持的第一认证方式确定为用于解锁所述解锁对象的认证方式。
在一些可选的实施方式中,所述操作信息包括所述第二电子设备的设备标识符,所述确定所述第二电子设备支持的认证方式包括:
根据所述第二电子设备的设备标识符确定所述第二电子设备支持的认证方式。
在一些可选的实施方式中,所述根据所述第二电子设备的设备标识符确定所述第二电子设备支持的认证方式包括:
根据所述第二电子设备的设备标识符获取所述第二电子设备的采集器信息,所述第二电子设备的采集器信息用于指示所述第二电子设备包括的认证信息采集器;
根据所述第二电子设备的采集器信息确定所述第二电子设备支持的认证方式。
在一些可选的实施方式中,所述根据所述第二电子设备的采集器信息确定所述第二电子设备支持的认证方式包括:
在根据所述第二电子设备的采集器信息确定所述第二电子设备包括人脸图像采集器和/或指纹采集器和/或密码采集器时,确定所述第二电子设备支持的认证方式包括密码认证和/或指纹认证和/或人脸认证。
在一些可选的实施方式中,若所述第一电子设备使用且所述第二电子设备支持的认证方式有多个,所述第一认证方式为所述多个认证方式中优先级最高的认证方式。
在一些可选的实施方式中,所述用于解锁所述解锁对象的认证方式为密码认证,所述目标认证类型为四位数字密码、六位数字密码、自定义数字密码、图案密码或混合密码;或者
所述用于解锁所述解锁对象的认证方式为人脸认证,所述目标认证类型为2D人脸认证或3D人脸认证;或者
所述用于解锁所述解锁对象的认证方式为指纹认证,所述目标认证类型为屏内指纹、侧边指纹或屏下指纹。
本申请第二方面公开了一种电子设备解锁方法,应用于第二电子设备,所述方法包括:
将通过所述第二电子设备执行的用户操作的操作信息发送给第一电子设备,所述用户操作触发对所述第一电子设备的解锁对象进行解锁;
从所述第一电子设备接收第一信息,所述第一信息是所述第一电子设备根据所述操作信息确定要对所述第一电子设备的解锁对象进行解锁时发送的,用于所述第二电子设备采集解锁所述解锁对象所需的认证信息;
根据所述第一信息采集解锁所述解锁对象所需的认证信息;
向所述第一电子设备提供所述认证信息以进行用户认证,所述用户认证的结果用于确定是否对所述解锁对象进行解锁。
在一些可选的实施方式中,所述用户操作用于对所述第一电子设备的屏幕进行解锁;或者
所述用户操作用于打开所述第一电子设备的目标应用,所述目标应用为已加锁应用。
本申请第三方面公开了一种计算机可读存储介质,包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如第一方面或第二方面所述的电子设备解锁方法。
本申请第四方面公开了一种电子设备,所述电子设备包括处理器和存储器,所述存储器用于存储指令,所述处理器用于调用所述存储器中的指令,使得所述电子设备执行如第一方面或第二方面所述的电子设备解锁方法。
本申请第五方面公开了一种芯片系统,该芯片系统应用于电子设备;芯片系统包括接口电路和处理器;接口电路和处理器通过线路互联;接口电路用于从电子设备的存储器接收信号,并向处理器发送信号,信号包括存储器中存储的计算机指令;当处理器执行该计算机指令时,芯片系统执行如第一方面或第二方面所述的电子设备解锁方法。
本申请第六方面公开了一种计算机程序产品,当计算机程序产品在计算机上运行时,使得计算机执行如第一方面或第二方面所述的电子设备解锁方法。
本申请第七方面公开了一种装置,该装置具有实现上述第一方面或第二方面所提供的方法中电子设备行为的功能。功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。硬件或软件包括一个或多个与上述功能相对应的模块。
应当理解地,上述提供的第三方面所述的计算机可读存储介质,第四方面所述的电子设备,第五方面所述的芯片系统、第六方面所述的计算机程序产品,及第七方面所述的装置均与上述第一方面、第二方面的方法对应,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。
附图说明
图1是本申请实施例公开的电子设备解锁方法的应用场景示意图。
图2是应用本申请实施例公开的电子设备解锁方法的第一电子设备和第二电子设备的功能架构图。
图3是本申请实施例公开的电子设备解锁方法的流程图。
图4是本申请另一实施例公开的电子设备解锁方法的流程图。
图5是本申请实施例公开的电子设备解锁方法中进行用户认证的细化流程图。
图6是应用本申请实施例公开的电子设备解锁方法的第一电子设备和第二电子设备的另一功能架构图。
图7是本申请实施例公开的电子设备的结构示意图。
具体实施方式
为了便于理解,示例性的给出了部分与本申请实施例相关概念的说明以供参考。
需要说明的是,本申请中“至少一个”是指一个或者多个,“多个”是指两个或多于两个。“和/或”,描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B可以表示:单独存在A,同时存在A和B,单独存在B的情况,其中A,B可以是单数或者复数。本申请的说明书和权利要求书及附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不是用于描述特定的顺序或先后次序。
为了更好地理解本申请实施例公开的电子设备解锁方法及相关设备,下面首先对本申请电子设备解锁方法的应用场景进行描述。
图1是本申请实施例公开的电子设备解锁方法的应用场景示意图。
如图1所示,第一电子设备10投屏到第二电子设备11上,在第二电子设备11上显示第一电子设备10的协同窗口110。第一电子设备10(图中为手机)和第二电子设备11 (图中为电脑)可以进行多屏协同,用户通过协同窗口110对第一电子设备10进行操作。例如,第一电子设备10为手机,第二电子设备11为电脑,用户可以通过协同窗口110操作手机,例如打开手机上的文件、接打手机的音视频通话、播放手机上的音乐等。
出于安全考虑,当第一电子设备10屏幕锁定或应用锁定/加锁时,现有的多屏协同技术不支持在第二电子设备11上对第一电子屏幕10的屏幕或者应用进行解锁,用户需要在第一电子设备10上对第一电子屏幕10的屏幕或者应用进行解锁。
根据本申请实施例公开的电子设备解锁方法,当第一电子设备10和第二电子设备11进行多屏协同时,若第一电子设备10进入锁定状态(屏幕锁定或应用加锁),用户无需在第一电子设备10上进行解锁操作,可直接在第二电子设备11上通过协同窗口110对第一电子设备10的屏幕或者应用进行解锁,确保解锁的安全性与便捷性。
图2是应用本申请实施例公开的电子设备解锁方法的第一电子设备和第二电子设备的功能架构图。
本申请电子设备解锁方法应用于第一电子设备20(例如图1中的手机)和第二电子设备21(例如图1中的电脑)。第一电子设备20包括第一投屏模块201、解锁模块202、协同认证模块203和认证器204。第二电子设备21包括第二投屏模块211、认证信息采集器212和显示模块213。
第一投屏模块201用于为第一电子设备20提供多屏协同能力,以实现第一电子设备20与第二电子设备21的交互。
解锁模块202用于对第一电子设备20的屏幕或应用进行解锁。在本申请的一个实施例中,解锁模块202可以包括屏幕解锁子模块和应用解锁子模块(图上未示出),屏幕解锁子模块用于对第一电子设备20的屏幕进行解锁,应用解锁子模块用于对第一电子设备20的应用进行解锁。
协同认证模块203用于对第一电子设备20的认证器204和第二电子设备21的认证信息采集器212进行调度。
第一电子设备20可以使用多种认证方式,每种认证方式可以对应一个认证器204。例如,密码认证对应的认证器是密码认证器,指纹认证对应的认证器是指纹认证器,人脸认证对应的认证器是人脸认证器。
认证器204用于根据从第二电子设备21接收到的认证信息,对第一电子设备20进行认证。
第二投屏模块211用于为第二电子设备21提供多屏协同能力,以实现第二电子设备21与第一电子设备20的交互。
认证信息采集器212用于采集用户的认证信息。认证信息采集器212采集的认证信息可以包括密码、指纹、人脸图像等。
显示模块213用于显示第一电子设备20解锁过程中的用户界面。
下面将结合图3所示的流程图,对各个模块的具体功能进行描述。
图3是本申请实施例公开的电子设备解锁方法的流程图。
图3以在第二电子设备(例如电脑)上对第一电子设备(例如手机)的屏幕进行解锁为例进行说明。
第一电子设备包括第一投屏模块、解锁模块、协同认证模块和认证器,第二电子设 备包括第二投屏模块、认证信息采集器和显示模块(参见图2所示)。第一电子设备投屏到第二电子设备上,第二电子设备在第二电子设备的屏幕上显示第一电子设备的协同窗口。
301,在第一电子设备进入锁屏状态后,显示模块在第一电子设备的协同窗口中显示第一电子设备的锁屏界面。
第一电子设备在用户一段时间未进行操作或者按下关机键后进入锁屏状态。例如,第一电子设备设置的休眠时间为一分钟,用户在一分钟内未对第一电子设备进行操作,第一电子设备进入锁屏状态。
第一电子设备的协同窗口中显示的第一电子设备的锁屏界面包括“解锁”按钮。
302,用户在第二电子设备显示的第一电子设备的锁屏界面上点击“解锁”按钮。
303,显示模块通过第二投屏模块将解锁操作信息发送给第一电子设备,解锁操作信息可以包括第二电子设备的设备标识符。
解锁操作信息用于指示对第一电子设备的屏幕进行解锁。
第一电子设备和第二电子设备之间通过第一投屏模块和第二投屏模块进行交互。第二投屏模块先将解锁操作信息发送给第一投屏模块,第一投屏模块再将解锁操作信息传递给解锁模块。
304,解锁模块根据解锁操作信息确定要对第一电子设备的屏幕进行解锁,向协同认证模块发起协同认证,将第二电子设备的设备标识符和解锁目标信息发送给协同认证模块。
解锁目标信息用于指示第一电子设备的解锁对象。例如,解锁模块根据解锁操作信息确定解锁对象为第一电子设备的屏幕,解锁目标信息可以用“0”表示。
305,协同认证模块根据第二电子设备的设备标识符生成协同认证方案。
协同认证方案包括第一认证方式,第一认证方式是对解锁对象进行解锁所采用的认证方式。在本申请的一个实施例中,协同认证模块确定第一电子设备使用的认证方式以及第二电子设备支持的认证方式(根据第二电子设备的设备标识符确定第二电子设备支持的认证方式),根据第一电子设备使用的认证方式和第二电子设备支持的认证方式生成协同认证方案。
第一电子设备中可以存储有第一电子设备的认证资源信息,协同认证模块可以根据第一电子设备的认证资源信息确定第一电子设备使用的认证方式。第一电子设备的认证资源信息用于指示第一电子设备使用的认证方式。例如,第一电子设备使用的认证方式包括密码认证、指纹认证和人脸认证。
第一电子设备可以预设设置对不同的解锁对象使用不同的认证方式。协同认证模块可以根据解锁目标信息确定第一电子设备针对解锁对象使用的认证方式。
协同认证模块可以根据第二电子设备的设备标识符确定第二电子设备支持的认证方式。在本申请的一个实施例中,第一电子设备存储有第二电子设备的采集器信息,协同认证模块可以根据第二电子设备的设备标识符获取第二电子设备的采集器信息,根据第二电子设备的采集器信息确定第二电子设备支持的认证方式。第二电子设备的采集器信息用于指示第二电子设备包括的认证信息采集器。例如,根据第二电子设备的采集器信息,第二电子设备包括人脸图像采集器(摄像头)、指纹采集器和密码采集器,因此,第二电子设备支持的认证方式包括密码认证、指纹认证和人脸认证。
协同认证模块确定第一电子设备使用的认证方式和第二电子设备支持的认证方式的交集,根据第一电子设备使用的认证方式和第二电子设备支持的认证方式的交集确定协同认证方案。例如,第一电子设备使用的认证方式包括密码认证和人脸认证,第二电子设备支持的认证方式包括密码认证和指纹认证,协同认证模块确定第一认证方式为密码认证。
若第一电子设备使用的认证方式和第二电子设备支持的认证方式的交集包括多个认证方式,协同认证模块可以确定多个认证方式的优先级,将最高优先级的认证方式确定为第一认证方式。例如,第一电子设备使用的认证方式和第二电子设备支持的认证方式的交集包括密码认证、指纹认证和人脸认证,按照优先级从高到低的顺序为人脸认证、指纹认证、密码认证(即人脸认证的优先级高于指纹认证,指纹认证的优先级高于密码认证),则第一认证方式为人脸认证。认证方式的优先级可以以认证的便利程度作为排序依据。
306,协同认证模块拉起协同认证方案对应的认证器,将协同认证方案发送给协同认证方案对应的认证器。
每种认证方式可以对应一个认证器,协同认证模块拉起协同认证方案对应的认证器。例如,密码认证对应的认证器是密码认证器,指纹认证对应的认证器是指纹认证器,人脸认证对应的认证器是人脸认证器。若第一认证方式为密码认证,则协同认证模块拉起密码认证器。
认证器可以将拉起结果返回协同认证模块。例如,若认证器拉起成功,认证器向协同认证模块返回拉起成功的消息。
307,认证器确定协同认证方案对应的目标认证类型。
认证器可以显示认证类型设置界面,用户可以从认证类型设置界面设置协同认证方案对应的目标认证类型。
例如,第一认证方式为密码认证,密码认证的认证类型包括四位数字密码、六位数字密码、自定义数字密码、图案密码、混合密码,用户从认证类型设置界面设置协同认证方案对应的目标认证类型为六位数字密码。
四位数字密码是由四位数字组成的密码。六位数字密码是由六位数字组成的密码。自定义数字密码由4-32位数字组成的密码。图案密码是由九宫格中的至少四个点组成的密码。混合密码可以是由4-32位字符组成的密码,密码中至少包含一个字母。
又如,第一认证方式为人脸认证,人脸认证对应的认证类型包括2D人脸认证和3D人脸认证,用户从认证类型设置界面设置协同认证方案对应的目标认证类型为2D人脸认证。
再如,第一认证方式为指纹认证,指纹认证对应的认证类型包括屏内指纹、侧边指纹、屏下指纹,用户从认证类型设置界面设置协同认证方案对应的目标认证类型为屏内指纹。
可以对协同认证方案设置默认的目标认证类型,若用户未对协同认证方案对应的目标认证类型进行设置,可以使用默认的目标认证类型。例如,密码认证默认的目标认证类型可以是六位数字密码,人脸认证默认的目标认证类型可以是2D人脸认证,指纹认证默认的目标认证类型可以是屏内指纹。
308,认证器将目标认证类型和解锁目标信息发送给协同认证模块,协同认证模块将目标认证类型和解锁目标信息通过第一投屏模块、第二投屏模块发送给协同认证方案对应的认证信息采集器(即目标认证采集器)。
例如,协同认证方案对应的目标认证类型为2D人脸认证,认证器将2D人脸认证的目标认证类型发送给协同认证模块,协同认证模块将2D人脸认证的目标认证类型和解锁目标信息(例如屏幕信息)通过第一投屏模块、第二投屏模块发送给人脸图像采集器,以拉起人脸图像采集器。
认证信息采集器可以将拉起结果返回协同认证模块。例如,若拉起成功,认证信息采集器将拉起成功的消息返回协同认证模块。
在本申请的另一个实施例中,认证器可以根据目标认证类型确定协同认证方案对应的认证信息采集器,认证器将协同认证方案对应的认证信息采集器的标识发送给协同认证模块,协同认证模块将协同认证方案对应的认证信息采集器的标识通过第一投屏模块、第二投屏模块发送给协同认证方案对应的认证信息采集器。
需要说明的是,在本实施例中,认证器与认证信息采集器的每次交互需要经由协同认证模块、第一投屏模块、第二投屏模块。当认证器需要发送信息给认证信息采集器时,认证器将信息传递给协同认证模块,协同认证模块将信息传递给第一投屏模块,第一投屏模块将信息发送给第二投屏模块,第二投屏模块将信息传递给认证信息采集器。当认证信息采集器需要发送信息给认证器时,认证信息采集器将信息传递给第二投屏模块,第二投屏模块将信息发送给第一投屏模块,第一投屏模块将信息传递给协同认证模块,协同认证模块将信息传递给认证器。
309,认证信息采集器将目标认证类型传递给显示模块。
310,显示模块根据目标认证类型提示用户输入认证信息。
例如,目标认证类型为六位数字密码,显示模块根据目标认证类型显示包含六位数字的密码输入框,将密码输入框显示在第二电子设备的协同窗口中的第一电子设备屏幕页面上。
又如,目标认证类型为2D人脸认证,显示模块提示用户拍摄人脸图像。
再如,目标认证类型为屏内指纹,显示模块提示用户到屏幕内指纹传感器处按压指纹。
311,认证信息采集器根据目标认证类型采集用户输入的认证信息。
例如,协同认证方案对应的认证信息采集器为密码采集器,密码采集器采集用户框输入的六位数字密码。
当第一认证方式为密码认证时,用户在显示模块显示的密码输入框中输入密码(例如六位数字密码),显示模块将用户输入的密码传递给密码采集器。
当第一认证方式为人脸认证时,人脸图像采集器直接采集用户的人脸图像(例如2D人脸图像)。
当第一认证方式为人脸认证时,指纹采集器直接采集用户的指纹。
312,认证信息采集器生成认证请求,认证请求包括用户输入的认证信息和解锁目标信息。
313,认证信息采集器和认证器通过第二投屏模块、第一投屏模块、协同认证模块进 行认证交互,认证器根据用户输入的认证信息和解锁目标信息进行用户认证,得到认证结果。
314,认证器将认证结果通过协同认证模块返回解锁模块。
315,若通过用户认证,解锁模块根据认证结果对第一电子设备的屏幕进行解锁。
若通过用户认证,解锁模块对第一电子设备的屏幕进行解锁。否则,若未通过用户认证,解锁模块保持第一电子设备的屏幕为锁定状态。
图4是本申请另一实施例公开的电子设备解锁方法的流程图。
图4以在第二电子设备(例如电脑)上对第一电子设备(例如手机)的应用进行解锁为例进行说明。
401,用户在第二电子设备显示的第一电子设备的协同窗口中点击应用图标,以开启第一电子设备中的应用。
402,显示模块通过第二投屏模块、第一投屏模块将应用图标操作信息发送给解锁模块,应用图标操作信息包括点击的位置坐标和第二电子设备的设备标识符。
应用图标操作信息用于指示打开目标应用。
第一电子设备和第二电子设备之间通过第一投屏模块和第二投屏模块进行交互。第二投屏模块先将应用图标操作信息发送给第一投屏模块,第一投屏模块再将应用图标操作信息传递给解锁模块。
403,解锁模块根据点击的位置坐标判断用户开启的应用是否为第一电子设备中加锁的应用,若用户开启的应用为第一电子设备中加锁的应用,向协同认证模块发起协同认证,将第二电子设备的设备标识符和解锁目标信息发送给协同认证模块。
在本申请的一个实施例中,若用户开启的应用为第一电子设备中加锁的应用,解锁模块还可以将应用锁的标识(如包名)发送给协同认证模块。应用锁是第一电子设备上的一个系统级的应用,其他应用的保护(加锁、解锁)是通过应用锁实现的。
404,协同认证模块根据第二电子设备的设备标识符生成协同认证方案。
405,协同认证模块拉起协同认证方案对应的认证器,将协同认证方案发送给协同认证方案对应的认证器。
认证器可以将拉起结果返回协同认证模块。例如,若认证器拉起成功,认证器向协同认证模块返回拉起成功的消息。
406,认证器确定协同认证方案对应的目标认证类型。
407,认证器将目标认证类型发送给协同认证模块,协同认证模块将目标认证类型和解锁目标信息通过第一投屏模块、第二投屏模块发送给协同认证方案对应的认证信息采集器,以拉起认证信息采集器。
认证信息采集器可以将拉起结果返回协同认证模块。例如,若拉起成功,认证信息采集器将拉起成功的消息返回协同认证模块。
408,认证信息采集器将目标认证类型传递给显示模块。
409,显示模块根据目标认证类型提示用户输入认证信息。
410,认证信息采集器根据目标认证类型采集用户输入的认证信息。
411,认证信息采集器生成认证请求,认证请求包括用户输入的认证信息和解锁目标信息。
412,认证信息采集器和认证器通过第二投屏模块、第一投屏模块、协同认证模块进行认证交互,认证器根据用户输入的认证信息和解锁目标信息进行用户认证,得到认证结果。
认证信息采集器和认证器进行认证交互的具体过程可以参阅图5。
413,认证器将认证结果通过协同认证模块返回解锁模块。
414,解锁模块根据认证结果对第一电子设备的应用进行解锁。
若通过用户认证,解锁模块对第一电子设备的应用进行解锁,开启该应用。否则,若未通过用户认证,解锁模块保持第一电子设备的应用为锁定状态,不开启该应用。
在本申请的一个实施例中,解锁模块可以通过第一电子设备中的应用锁对应用进行解锁。
第一电子设备可以基于密码认证协议从第二电子设备获得认证信息进行用户认证。
图5是本申请实施例公开的电子设备解锁方法中认证信息采集器与认证器进行认证交互(即步骤313与412)的细化流程图。
501,认证信息采集器将认证请求发送给认证器,认证请求包括解锁目标信息。
解锁模块向协同认证模块发起协同认证时,将解锁目标信息发送给协同认证模块(参见304),协同认证模块拉起认证信息采集器时,将解锁目标信息发送给认证信息采集器。
在本申请的另一个实施例中,认证信息采集器发送给认证器的认证请求可以不包括解锁目标信息。
502,认证器根据解锁目标信息,获取用户的远程证明凭据,远程证明凭据包括加盐值auth_salt和第一基值base1。
在本申请的另一个实施例中,认证器可以从解锁模块获取解锁目标信息。
用户在第一电子设备(例如手机)设置认证信息(例如六位数字密码)时,认证器会生成该用户的远程证明凭据,并将解锁目标信息与对应的远程证明凭据存储在认证器中。
用户在第一电子设备(例如手机)设置认证信息(例如六位数字密码)时,认证器生成一个随机数作为加盐值auth_salt,将用户设置的认证信息与加盐值auth_salt进行基于口令的密钥导出函数(Password-Based Key Derivation Function,PBKDF)迭代运算,生成第一密文secretData1,将第一密文secretData1平方后进行大整数模幂运算,得到第一基值base1。
503,认证器根据第一基值base1,生成第一公钥和第一私钥(即生成第一公私钥对)。
认证器可以生成一个随机数作为第一私钥sk1,对第一基值base1和私钥sk1进行大整数模幂运算,得到第一公钥pk1。
504,认证器生成随机数作为第一挑战值challenge1。
认证器可以通过调用随机数生成器来生成随机数。
505,认证器将加盐值auth_salt、第一公钥和第一挑战值challenge1发送给认证信息采集器。
506,认证信息采集器根据加盐值auth_salt与用户输入的认证信息,生成第二基值base2。
认证信息采集器可以将用户输入的认证信息与加盐值auth_salt进行PBKDF迭代运算,生成第二密文secretData2,将第二密文secretData2平方后进行大整数模幂运算,得 到第二基值base2。
507,认证信息采集器根据第二基值base2,生成第二公钥和第二私钥(即生成第二公私钥对)。
认证信息采集器可以生成一个随机数作为第二私钥sk2,对第二基值base2和私钥sk2进行大整数模幂运算,得到第二公钥pk2。
508,认证信息采集器对第二私钥与第一公钥进行运算,得到第一密钥sessionKey1。
认证信息采集器可以对第二私钥与第一公钥进行大整数模幂运算,得到第一密钥sessionKey1。
509,认证信息采集器生成随机数作为第二挑战值challenge2。
510,认证信息采集器使用第一密钥sessionKey1对第一挑战值challenge1和第二挑战值challenge2进行签名,生成第一签名数据kcfDataC1。
认证信息采集器可以以第一挑战值challenge1和第二挑战值challenge2为明文,以第一密钥sessionKey1为密钥,通过哈希消息认证码(Hash-based Message Authentication Code,HMAC)算法,生成第一签名数据kcfDataC1。
511,认证信息采集器将第二公钥、第二挑战值challenge2、第一签名数据kcfDataC1发送给认证器。
512,认证器对第一私钥与第二公钥进行运算,得到第二密钥sessionKey2。
认证器可以将第一私钥与第二公钥进行大整数模幂运算,得到第二密钥sessionKey2。
513,认证器使用第二密钥sessionKey2对第一挑战值challenge1和第二挑战值challenge2进行签名,生成第二签名数据kcfDataC2。
认证器可以以第一挑战值challenge1和第二挑战值challenge2为明文,以第二密钥sessionKey2为密钥,通过HMAC算法生成第二签名数据kcfDataC2。
514,认证器根据第一签名数据与第二签名数据确定认证结果。
认证器判断第二签名数据kcfDataC2与认证信息采集器发送过来的第一签名数据kcfDataC1是否一致,若第二签名数据kcfDataC2与认证信息采集器发送过来的第一签名数据kcfDataC1一致,则用户通过认证。否则,第二签名数据kcfDataC2与认证信息采集器发送过来的第一签名数据kcfDataC1不一致,则用户未通过认证。
图5所示的实施例中,认证器和认证信息采集器之间采用基于口令的认证密钥交换协议进行认证交互,认证信息采用加密的形式在第一电子设备和第二电子设备之间进行传输,可以进一步提高跨设备解锁的安全性。
上述实施例中,本申请提供的电子设备解锁方法应用于第一电子设备投屏到第二电子设备的场景,第二电子设备根据第一电子设备投屏到第二电子设备的界面上的用户操作向第一电子设备发送操作信息(例如图3中的解锁操作信息或图4中的应用图标操作信息)。
在本申请的其他实施例中,本申请提供的电子设备解锁方法可以应用于非投屏场景(第一电子设备未投屏到第二电子设备)。在非投屏场景下,第二电子设备可以生成第一电子设备的控制界面(非投屏界面),用户可以在控制界面进行操作,第二电子设备可以根据控制界面上的用户操作向第一电子设备发送操作信息。
上述实施例中,第一电子设备包括第一投屏模块、解锁模块、协同认证模块和认证器。第二电子设备包括第二投屏模块、认证信息采集器和显示模块。在本申请的其他实 施例中,第一电子设备和第二电子设备可以划分为其他的功能模块。
图6是应用本申请实施例公开的电子设备解锁方法的第一电子设备和第二电子设备的另一功能架构图。参阅图6所示,第一电子设备60可以包括第一投屏模块601和认证解锁模块602,第二电子设备61可以包括第二投屏模块611和采集模块612。
第一投屏模块601用于接收第二电子设备61发送的操作信息。第一投屏模块601还用于在根据操作信息确定要对第一电子设备的解锁对象进行解锁时,向第二电子设备发送第一信息。第一信息用于第二电子设备采集解锁所述解锁对象所需的认证信息。
认证解锁模块602用于从第二电子设备获得认证信息进行用户认证,在用户认证通过时,对第一电子设备的解锁对象进行解锁。
第二投屏模块611用于将通过第二电子设备执行的用户操作的操作信息发送给第一电子设备。用户操作触发对第一电子设备的解锁对象进行解锁。
第二投屏模块611还用于从第一电子设备接收第一信息。第一信息是第一电子设备根据操作信息确定要对第一电子设备的解锁对象进行解锁时发送的,用于第二电子设备采集解锁对象所需的认证信息。
采集模块612用于根据第一信息采集对解锁对象进行解锁所需的认证信息,向第一电子设备提供认证信息以进行用户认证,用户认证的结果用于确定是否对解锁对象进行解锁。
图7是本申请实施例公开的一种电子设备(第一电子设备或第二电子设备)的结构示意图。如图6所示,电子设备70可以包括:射频(Radio Frequency,RF)电路701、存储器702、输入单元703、显示单元704、传感器705、音频电路706、Wi-Fi模块707、处理器708以及电源709等部件。本领域技术人员可以理解,图7中示出的结构并不构成对业务流汇聚转发节点的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
RF电路701可用于收发信息或在通话过程中,对信号进行接收和发送,特别地,接收基站的下行信息后,转给处理器708进行处理;另外,将涉及上行的数据发送给基站。通常,RF电路701包括,但不限于:天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。
存储器702可用于存储软件程序以及模块,处理器708通过运行存储在存储器702中的软件程序以及模块,从而执行电子设备的各种功能应用以及数据处理。存储器702可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据电子设备的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器702可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。
输入单元703可用于接收输入的数字或字符信息,以及产生与电子设备的用户设置以及功能控制有关的键信号输入。具体地,输入单元703可包括触控面板7031以及其他输入设备7032。触控面板7031,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触控笔等任何适合的物体或附件在触控面板7031上或在触控面板7031附近的操作),并根据预先设定的程序驱动相应的连接装置。可选地,触控面板7031可 包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器708,并接收处理器708发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板7031。除了触控面板7031,输入单元703还可以包括其他输入设备7032。具体地,其他输入设备7032可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
显示单元704可用于显示由用户输入的信息或提供给用户的信息以及电子设备的各种菜单。显示单元704可包括显示面板7041,可选地,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板7041。进一步地,触控面板7031可覆盖显示面板7041,当触控面板7031检测到在其上或附近的触摸操作后,传送给处理器708以确定触摸事件的类型,随后处理器708根据触摸事件的类型在显示面板7041上提供相应的视觉输出。虽然在图6中,触控面板7031与显示面板7041是作为两个独立的部件来实现电子设备的输入和输出功能,但是在某些实施例中,可以将触控面板7031与显示面板7041集成而实现电子设备的输入和输出功能。
电子设备还可包括至少一种传感器705,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板7041的亮度,接近传感器可在电子设备移动到耳边时,关闭显示面板7041和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别电子设备姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;此外,电子设备还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
音频电路706、扬声器7061,传声器7062可提供用户与电子设备之间的音频接口。音频电路706可将接收到的音频数据转换后的电信号,传输到扬声器7061,由扬声器7061转换为声音信号输出;另一方面,传声器7062将收集的声音信号转换为电信号,由音频电路706接收后转换为音频数据,再将音频数据输出处理器708处理后,经RF电路701发送给另一电子设备,或者将音频数据输出至存储器702以便进一步处理。
Wi-Fi属于短距离无线传输技术,电子设备通过Wi-Fi模块707可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图6示出了Wi-Fi模块707,但是可以理解的是,其并不属于电子设备的必需构成,完全可以根据需要、在不改变发明本质的范围内进行省略。
处理器708是电子设备的控制中心,利用各种接口和线路连接整个电子设备的各个部分,通过运行或执行存储在存储器702内的软件程序和/或模块,以及调用存储在存储器702内的数据,执行电子设备的各种功能和处理数据,从而对电子设备进行整体监控。可选地,处理器708可包括一个或多个处理单元;优选的,处理器708可集成应用处理器和调制解调器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器708 中。
电子设备还包括给各个部件供电的电源709(比如电池),可选地,电源可以通过电源管理系统与处理器708逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。
尽管未示出,电子设备还可以包括摄像头、蓝牙模块等,在此不再赘述。
图7中描述的电子设备可以用于实施本申请图3-5介绍的方法实施例中的部分或全部流程,可参见前述图3-5所述实施例中的相关阐述,这里不再赘述。
本实施例还提供一种计算机存储介质,该计算机存储介质中存储有计算机指令,当该计算机指令在电子设备上运行时,使得电子设备执行上述相关方法步骤实现上述实施例中的区块链验签方法。
本实施例还提供了一种计算机程序产品,当该计算机程序产品在电子设备上运行时,使得电子设备执行上述相关步骤,以实现上述实施例中的区块链验签方法。
另外,本申请的实施例还提供一种装置,这个装置具体可以是芯片,组件或模块,该装置可包括相连的处理器和存储器;其中,存储器用于存储计算机执行指令,当装置运行时,处理器可执行存储器存储的计算机执行指令,以使芯片执行上述各方法实施例中的区块链验签方法。
其中,本实施例提供的电子设备、计算机存储介质、计算机程序产品或芯片均用于执行上文所提供的对应的方法,因此,其所能达到的有益效果可参考上文所提供的对应的方法中的有益效果,此处不再赘述。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,该模块或单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个装置,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
该作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是一个物理单元或多个物理单元,即可以位于一个地方,或者也可以分布到多个不同地方。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
该集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体 现出来,该软件产品存储在一个存储介质中,包括若干指令用以使得一个设备(可以是单片机,芯片等)或处理器(processor)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何在本申请揭露的技术范围内的变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (21)

  1. 一种电子设备解锁方法,应用于第一电子设备,其特征在于,所述方法包括:
    接收第二电子设备发送的操作信息;
    在根据所述操作信息确定要对所述第一电子设备的解锁对象进行解锁时,向所述第二电子设备发送第一信息,所述第一信息用于所述第二电子设备采集解锁所述解锁对象所需的认证信息;
    从所述第二电子设备获得所述认证信息进行用户认证;
    在用户认证通过时,对所述第一电子设备的所述解锁对象进行解锁。
  2. 如权利要求1所述的电子设备解锁方法,其特征在于,所述第一信息用于确定所述第二电子设备的目标认证信息采集器,所述目标认证信息采集器用于采集所述认证信息。
  3. 如权利要求2所述的电子设备解锁方法,其特征在于,所述第一信息包括:
    用于解锁所述解锁对象的认证方式对应的目标认证类型,所述目标认证类型用于所述第二电子设备确定所述目标认证信息采集器;和/或
    所述目标认证信息采集器的标识。
  4. 如权利要求1所述的电子设备解锁方法,其特征在于,所述电子设备解锁方法应用于所述第一电子设备投屏到所述第二电子设备的场景。
  5. 如权利要求1所述的电子设备解锁方法,其特征在于,所述解锁对象为所述第一电子设备的屏幕或者所述第一电子设备的目标应用,所述目标应用为已加锁应用。
  6. 如权利要求5所述的电子设备解锁方法,其特征在于,所述根据所述操作信息确定要对所述第一电子设备的解锁对象进行解锁包括:
    确定所述操作信息用于指示对所述第一电子设备的屏幕进行解锁;或者
    确定所述操作信息用于指示打开所述目标应用。
  7. 如权利要求1至6中任一项所述的电子设备解锁方法,其特征在于,所述从所述第二电子设备获得所述认证信息进行用户认证包括:
    基于密码认证协议从所述第二电子设备获得所述认证信息进行用户认证。
  8. 如权利要求7所述的电子设备解锁方法,其特征在于,所述基于密码认证协议从所述第二电子设备获得所述认证信息进行用户认证包括:
    接收所述第二电子设备发送的所述用户的远程证明凭据,所述远程证明凭据包括加盐值和第一基值;
    根据所述第一基值,生成第一公钥和第一私钥;
    生成随机数作为第一挑战值;
    将所述加盐值、所述第一公钥和所述第一挑战值发送给所述第二电子设备;
    接收所述第二电子设备发送的第二公钥、第二挑战值和第一签名数据,其中,所述第二公钥是所述第二电子设备根据第二基值生成的,所述第二基值是所述第二电子设备根据所述加盐值与所述认证信息生成的,所述第二挑战值是所述第二电子设备生成的随机数,所述第一签名数据是所述第二电子设备使用第一密钥对所述第一挑战值和所述第二挑战值进行签名生成的,所述第一密钥是所述第二电子设备对第二私钥与所述第一公钥 进行运算得到的,所述第二私钥是所述第二电子设备根据所述第二基值生成的;
    对所述第一私钥与所述第二公钥进行运算,得到第二密钥;
    使用所述第二密钥对所述第一挑战值和所述第二挑战值进行签名,生成第二签名数据;
    根据所述第一签名数据与所述第二签名数据确定所述认证结果。
  9. 如权利要求1所述的电子设备解锁方法,其特征在于,所述从所述第二电子设备获得所述认证信息进行用户认证之前,所述方法还包括:
    接收所述第二电子设备发送的认证请求。
  10. 如权利要求3所述的电子设备解锁方法,其特征在于,所述向所述第二电子设备发送第一信息之前,所述方法还包括:
    确定用于解锁所述解锁对象的认证方式。
  11. 如权利要求10所述的电子设备解锁方法,其特征在于,所述确定用于解锁所述解锁对象的认证方式包括:
    确定所述第一电子设备使用的认证方式;
    确定所述第二电子设备支持的认证方式;
    将所述第一电子设备使用且所述第二电子设备支持的第一认证方式确定为用于解锁所述解锁对象的认证方式。
  12. 如权利要求11所述的电子设备解锁方法,其特征在于,所述操作信息包括所述第二电子设备的设备标识符,所述确定所述第二电子设备支持的认证方式包括:
    根据所述第二电子设备的设备标识符确定所述第二电子设备支持的认证方式。
  13. 如权利要求12所述的电子设备解锁方法,其特征在于,所述根据所述第二电子设备的设备标识符确定所述第二电子设备支持的认证方式包括:
    根据所述第二电子设备的设备标识符获取所述第二电子设备的采集器信息,所述第二电子设备的采集器信息用于指示所述第二电子设备包括的认证信息采集器;
    根据所述第二电子设备的采集器信息确定所述第二电子设备支持的认证方式。
  14. 如权利要求13所述的电子设备解锁方法,其特征在于,所述根据所述第二电子设备的采集器信息确定所述第二电子设备支持的认证方式包括:
    在根据所述第二电子设备的采集器信息确定所述第二电子设备包括人脸图像采集器和/或指纹采集器和/或密码采集器时,确定所述第二电子设备支持的认证方式包括密码认证和/或指纹认证和/或人脸认证。
  15. 如权利要求11所述的电子设备解锁方法,其特征在于,若所述第一电子设备使用且所述第二电子设备支持的认证方式有多个,所述第一认证方式为所述多个认证方式中优先级最高的认证方式。
  16. 如权利要求3所述的电子设备解锁方法,其特征在于,所述用于解锁所述解锁对象的认证方式为密码认证,所述目标认证类型为四位数字密码、六位数字密码、自定义数字密码、图案密码或混合密码;或者
    所述用于解锁所述解锁对象的认证方式为人脸认证,所述目标认证类型为2D人脸认证或3D人脸认证;或者
    所述用于解锁所述解锁对象的认证方式为指纹认证,所述目标认证类型为屏内指纹、侧 边指纹或屏下指纹。
  17. 一种电子设备解锁方法,应用于第二电子设备,其特征在于,所述方法包括:
    将通过所述第二电子设备执行的用户操作的操作信息发送给第一电子设备,所述用户操作触发对所述第一电子设备的解锁对象进行解锁;
    从所述第一电子设备接收第一信息,所述第一信息是所述第一电子设备根据所述操作信息确定要对所述第一电子设备的解锁对象进行解锁时发送的,用于所述第二电子设备采集解锁所述解锁对象所需的认证信息;
    根据所述第一信息采集解锁所述解锁对象所需的认证信息;
    向所述第一电子设备提供所述认证信息以进行用户认证,所述用户认证的结果用于确定是否对所述解锁对象进行解锁。
  18. 如权利要求17所述的电子设备解锁方法,其特征在于,所述用户操作用于对所述第一电子设备的屏幕进行解锁;或者
    所述用户操作用于打开所述第一电子设备的目标应用,所述目标应用为已加锁应用。
  19. 一种计算机可读存储介质,其特征在于,包括计算机指令,当所述计算机指令在电子设备上运行时,使得所述电子设备执行如权利要求1至16中任一项,或者权利要求17或18所述的电子设备解锁方法。
  20. 一种电子设备,其特征在于,所述电子设备包括处理器和存储器,所述存储器用于存储指令,所述处理器用于调用所述存储器中的指令,使得所述电子设备执行如权利要求1至16中任一项,或者权利要求17或18所述的电子设备解锁方法。
  21. 一种芯片系统,所述芯片系统应用于电子设备;其特征在于,所述芯片系统包括接口电路和处理器;所述接口电路和所述处理器通过线路互联;所述接口电路用于从所述电子设备的存储器接收信号,并向所述处理器发送信号,所述信号包括所述存储器中存储的计算机指令;当所述处理器执行该计算机指令时,所述芯片系统执行如权利要求1至16中任一项,或者权利要求17或18所述的电子设备解锁方法。
PCT/CN2022/079602 2021-03-12 2022-03-07 电子设备解锁方法及相关设备 WO2022188756A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US18/549,737 US20240223376A1 (en) 2021-03-12 2022-03-07 Electronic Device Unlocking Method and Related Device
EP22766279.8A EP4273721A4 (en) 2021-03-12 2022-03-07 UNLOCKING METHOD FOR ELECTRONIC DEVICE AND RELATED DEVICE

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110272554.7A CN115080949A (zh) 2021-03-12 2021-03-12 电子设备解锁方法及相关设备
CN202110272554.7 2021-03-12

Publications (1)

Publication Number Publication Date
WO2022188756A1 true WO2022188756A1 (zh) 2022-09-15

Family

ID=83227416

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/079602 WO2022188756A1 (zh) 2021-03-12 2022-03-07 电子设备解锁方法及相关设备

Country Status (4)

Country Link
US (1) US20240223376A1 (zh)
EP (1) EP4273721A4 (zh)
CN (1) CN115080949A (zh)
WO (1) WO2022188756A1 (zh)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049945A (zh) * 2015-08-13 2015-11-11 中国科学院信息工程研究所 一种基于智能电视多屏互动的安全支付系统及方法
CN105554750A (zh) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 一种数据帧的传输方法及终端
CN107153534A (zh) * 2017-03-24 2017-09-12 联想(北京)有限公司 一种信息处理方法及第一电子设备

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5784566A (en) * 1996-01-11 1998-07-21 Oracle Corporation System and method for negotiating security services and algorithms for communication across a computer network
US6226383B1 (en) * 1996-04-17 2001-05-01 Integrity Sciences, Inc. Cryptographic methods for remote authentication
EP2073484B1 (en) * 2007-12-21 2014-07-02 BlackBerry Limited Methods and systems for secure channel initialization
US9450760B2 (en) * 2014-07-31 2016-09-20 Nok Nok Labs, Inc. System and method for authenticating a client to a device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105554750A (zh) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 一种数据帧的传输方法及终端
CN105049945A (zh) * 2015-08-13 2015-11-11 中国科学院信息工程研究所 一种基于智能电视多屏互动的安全支付系统及方法
CN107153534A (zh) * 2017-03-24 2017-09-12 联想(北京)有限公司 一种信息处理方法及第一电子设备

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4273721A4

Also Published As

Publication number Publication date
EP4273721A1 (en) 2023-11-08
CN115080949A (zh) 2022-09-20
US20240223376A1 (en) 2024-07-04
EP4273721A4 (en) 2024-07-03

Similar Documents

Publication Publication Date Title
AU2018421189B2 (en) Method for quickly opening application or application function, and terminal
CN109905318B (zh) 设备控制方法、装置及存储介质
WO2017185711A1 (zh) 控制智能设备的方法、装置、系统和存储介质
WO2021115199A1 (zh) 验证信息共享方法及电子设备
WO2018019261A1 (zh) 资源转移方法及装置
CN110166439B (zh) 设备共享方法、终端、路由器及服务器
WO2020259015A1 (zh) 投屏方法及移动终端
WO2015043193A1 (zh) 一种终端的解锁处理方法、装置及设备
WO2020011074A1 (zh) 锁屏方法及电子设备
WO2016078504A1 (zh) 身份鉴权方法和装置
WO2021190373A1 (zh) 一种交互方法、交互系统和显示设备
WO2020233218A1 (zh) 信息加密方法、信息解密方法及终端
CN109284150A (zh) 一种启动应用程序的方法及终端
CN108710806B (zh) 一种终端解锁方法、移动终端
WO2018166103A1 (zh) 一种基于无线通信的连接方法及终端
WO2020173316A1 (zh) 图像显示方法、终端和移动终端
CN107861669A (zh) 一种用户系统的切换方法和移动终端
CN109376519A (zh) 一种指纹解锁方法及终端设备
EP4138462A1 (en) Information sharing method, electronic devices and system
WO2016131181A1 (zh) 一种指纹事件的处理方法、装置及终端
WO2023186011A1 (zh) 图像显示方法、装置及电子设备
WO2020011071A1 (zh) 应用程序加锁方法、解锁方法及终端设备
WO2022188756A1 (zh) 电子设备解锁方法及相关设备
CN107508740A (zh) 一种图片分享方法、终端和计算机可读存储介质
WO2019206224A1 (zh) 屏幕解锁方法及移动终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22766279

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022766279

Country of ref document: EP

Effective date: 20230802

NENP Non-entry into the national phase

Ref country code: DE