WO2023124499A1 - 自动解锁屏幕的方法、装置、电子设备及可读存储介质 - Google Patents

自动解锁屏幕的方法、装置、电子设备及可读存储介质 Download PDF

Info

Publication number
WO2023124499A1
WO2023124499A1 PCT/CN2022/128598 CN2022128598W WO2023124499A1 WO 2023124499 A1 WO2023124499 A1 WO 2023124499A1 CN 2022128598 W CN2022128598 W CN 2022128598W WO 2023124499 A1 WO2023124499 A1 WO 2023124499A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal device
key
bluetooth connection
confirmation
user
Prior art date
Application number
PCT/CN2022/128598
Other languages
English (en)
French (fr)
Inventor
陆舟
Original Assignee
飞天诚信科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 飞天诚信科技股份有限公司 filed Critical 飞天诚信科技股份有限公司
Publication of WO2023124499A1 publication Critical patent/WO2023124499A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the invention relates to an automatic screen unlocking method, device, electronic equipment and a readable storage medium.
  • the invention belongs to the technical field of information security.
  • the terminal device (such as a PC terminal) is set to lock the screen so that the user can lock the screen of the terminal device when leaving the terminal device, thereby avoiding information leakage in the terminal device and protecting the terminal Information security in the device; and the method of unlocking the screen of the terminal device is usually realized by the user inputting the set password on the physical keyboard.
  • This screen unlocking method requires the user to actively touch the physical keyboard to trigger the unlocking.
  • the verification input operation is not convenient enough, and because the position of the key on the physical keyboard is fixed, it is easy to cause the leakage of the screen unlock password, and the security of the unlock method is not high; based on this, how to realize the lock screen of the terminal device Safe, effective and fast automatic unlocking has become a technical problem to be solved urgently.
  • the object of the present invention is to provide a method, device, electronic device and readable storage medium for automatically unlocking the screen, so as to realize safe, effective and fast automatic unlocking of the locked screen of the terminal device.
  • a method for automatically unlocking the screen including the following steps:
  • the terminal device determines that the device to which the broadcast belongs is a connectable device according to the signal strength and uuid value of the broadcast, receiving the Bluetooth connection establishment request sent by the terminal device;
  • the terminal device after receiving the authentication login instruction sent by the terminal device based on the notification message, it further includes:
  • buttons confirmation process When it is determined that the button confirmation process needs to be performed, send an instruction message to the user to execute the button confirmation, and wait for the confirmation trigger of the button to be received by the user;
  • the process of signing the data to be signed according to the stored private key is performed.
  • the waiting to receive the user's confirmation trigger of the button includes:
  • the preset time threshold is not reached, it is determined that the user's confirmation trigger of the key has not timed out, and the processing of waiting for the user's confirmation trigger of the key is continued.
  • the method also includes:
  • the preset time threshold is reached, it is determined that the user's confirmation of the button triggers a timeout, and a trigger timeout result is sent to the terminal device.
  • the method also includes:
  • a device for automatically unlocking a screen including:
  • the sending module is used to send the broadcast carrying the uuid value
  • the receiving module is configured to receive the Bluetooth connection establishment request sent by the terminal device when the terminal device determines that the device to which the broadcast belongs is a connectable device according to the signal strength and uuid value of the broadcast;
  • a first processing module configured to establish a Bluetooth connection with the terminal device based on the Bluetooth connection establishment request
  • the second processing module is configured to send a notification message that the Bluetooth connection is successfully established to the terminal device; receive an authentication login instruction sent by the terminal device based on the notification message;
  • a third processing module configured to obtain the data to be signed carried in the authentication login instruction
  • a fourth processing module configured to sign the data to be signed according to the stored private key to obtain a signature result
  • the sending module is further configured to send the signature result to the terminal device, so that the terminal device performs an automatic screen unlocking operation according to the signature result.
  • it also includes:
  • the fifth processing module is used to obtain the command feature value carried in the authentication login command; determine whether to perform button confirmation processing according to the command feature value;
  • the fifth processing module is configured to execute the process of signing the data to be signed according to the stored private key when receiving the user's confirmation trigger for the key; when the user's confirmation of the key is not received
  • the fifth processing module is configured to determine that the user's confirmation of the button triggers a timeout when the preset time threshold is reached, and send a trigger timeout result to the terminal device.
  • it also includes:
  • the sixth processing module is configured to receive an information acquisition instruction sent by the terminal device; and return corresponding key information to the terminal device according to the information acquisition instruction.
  • an electronic device including: a processor and a memory;
  • the memory is used to store computer programs
  • the processor is configured to execute the above-mentioned method for automatically unlocking the screen by calling the computer program.
  • a computer-readable storage medium is provided, the computer storage medium is used for storing a computer program, and when it is run on a computer, the computer can execute the above method for automatically unlocking the screen.
  • the present invention realizes safe, effective and rapid automatic unlocking of the lock screen of the terminal device.
  • FIG. 1 is a schematic flowchart of a method for automatically unlocking a screen provided by the present invention
  • FIG. 2 is a schematic diagram of a specific processing flow of a possible implementation of a method for automatically unlocking a screen provided by the present invention
  • Fig. 3 is a schematic structural diagram of an automatic screen unlocking device provided by the present invention.
  • FIG. 4 is a schematic structural diagram of an electronic device according to the method for automatically unlocking a screen provided by the present invention.
  • the present invention proposes a method, device, electronic device and readable storage medium for automatically unlocking a screen.
  • the specific implementations of the present invention will be described in detail below in conjunction with the accompanying drawings.
  • the key device needs to be within the Bluetooth connection range of the terminal device. It can be realized that the terminal device receives the broadcast notification within a specific signal strength range, and the key device is continuously sending broadcasts.
  • the terminal device When the terminal device detects the key device within the specific signal strength range, it indicates the signal strength of the key device Meet the signal strength requirements of the terminal device, and then determine that the key device is within the broadcast range; and in order to determine whether the Bluetooth device is a connectable device, the terminal device needs to judge according to the uuid value of the broadcast, only the uuid value is The standard uuid value that can be recognized by the protocol stack can be used to determine that the key device is a connectable key device. Therefore, after determining that the key device is a connectable key device, the terminal device may establish a Bluetooth connection with the key device, so as to perform screen unlocking interaction with the key device through the Bluetooth connection.
  • the terminal device in the present invention can be a notebook computer, and it can also be a PC terminal with a Bluetooth adapter, that is, the PC terminal can perform Bluetooth connection and Bluetooth communication with the key device through the Bluetooth adapter provided, and then realize Corresponding data communication transmission.
  • FIG. 1 it is a schematic flow chart of a method for automatically unlocking the screen provided by the present invention, the method includes the following steps:
  • Step S101 sending a broadcast carrying a uuid value
  • Step S102 when the terminal device determines that the device to which the broadcast belongs is a connectable device according to the signal strength and uuid value of the broadcast, receive the Bluetooth connection establishment request sent by the terminal device;
  • Step S103 establishing a Bluetooth connection with the terminal device based on the Bluetooth connection establishment request
  • Step S104 sending a notification message that the Bluetooth connection is successfully established to the terminal device
  • Step S105 receiving the authentication login instruction sent by the terminal device based on the notification message
  • Step S106 obtaining the data to be signed carried in the authentication login instruction
  • Step S107 signing the data to be signed according to the stored private key to obtain a signature result
  • Step S108 sending the signature result to the terminal device, so that the terminal device automatically unlocks the screen according to the signature result.
  • the fast automatic unlocking of the locked screen is realized, and the security is high.
  • FIG. 2 it is a specific processing flowchart of a possible implementation manner of a method for automatically unlocking a screen provided by the present invention.
  • the processing of the aforementioned steps S101 to S104 specifically includes the processing of the following step S201.
  • step S201 the key device establishes a Bluetooth connection with the terminal device.
  • the terminal device actively sends a Bluetooth connection establishment request to the key device, and the key device receives After receiving the Bluetooth connection establishment request initiated by the terminal device, establish a Bluetooth connection with the terminal device according to the Bluetooth connection establishment request, and then send a notification message of successful Bluetooth connection establishment to the terminal device to notify the terminal that the two have established Bluetooth connection.
  • the establishment of the Bluetooth connection above specifically includes: the terminal device is in a state of continuously receiving broadcast notifications within a specific signal strength range, and when the key device is detected within the specific signal strength range, it is determined that the key device is in the Within the broadcast range; further, the terminal device obtains the broadcast uuid value, determines whether the uuid value is a recognizable standard uuid value, and if so, determines that the key device is a connectable key device; otherwise, determines the key device The device is a non-attachable device.
  • the terminal device After the terminal device establishes a Bluetooth connection with the key device, the following processing is also included:
  • Step S202 the terminal device sends an information acquisition instruction to the key device.
  • the terminal device sends an information acquisition instruction to the key device according to the notification message of the key device, so as to obtain corresponding key information and the like.
  • step S203 the key device returns key information to the terminal device.
  • the key device After receiving the information acquisition instruction sent by the terminal device, the key device searches for corresponding key information according to the instruction, and returns the found key information to the terminal device.
  • the processing of the aforementioned steps S105 to S108 specifically includes the processing of the following steps S204 to S213.
  • Step S204 the terminal device sends an authentication login instruction to the key device.
  • the terminal device constructs a corresponding command characteristic value according to the key information, and carries the command characteristic value in the authentication login command and sends it to the key device.
  • step S205 the key device obtains the instruction characteristic value in the authentication login instruction.
  • the key device After receiving the authentication login instruction sent by the terminal device, the key device acquires the characteristic value of the instruction carried therein.
  • step S206 the key device determines whether key confirmation processing needs to be performed according to the instruction feature value.
  • the key device After the key device acquires the command feature value, it determines whether to perform the key confirmation process according to the command feature value; when it is determined that the key press confirmation process needs to be performed, go to step S207; otherwise, go to Step S210.
  • step S207 the key device sends instruction information to the user to perform key confirmation.
  • the key device determines that it is necessary to perform the key confirmation process, it sends instruction information for performing key confirmation to the user, thereby instructing the user to perform a corresponding key confirmation trigger.
  • Step S208 the key device waits to receive a user's confirmation trigger on the key.
  • the process of waiting for a confirmation trigger of the key press by the user is continued.
  • step S209 the key device determines whether the waiting time for receiving the user's confirmation trigger on the key reaches a preset time threshold.
  • the key device when the key device is waiting to receive the user's confirmation trigger for the key, it is necessary to further determine whether the time for waiting for the user's confirmation trigger for the key reaches the preset time threshold;
  • the confirmation of the button go to step S210; if the preset time threshold is not reached and the user’s confirmation trigger for the button is not received, go to step S208 and continue to wait; if the preset time threshold is reached and the user’s button is not received
  • Step S210 the key device signs the data to be signed in the authentication login instruction according to the stored private key.
  • the authentication login instruction also carries data to be signed, and the key device signs the data to be signed in the authentication login instruction according to the stored private key to obtain a corresponding signature result.
  • Step S211 the key device sends the signature result to the terminal device.
  • the key device After the key device signs the data to be signed according to the private key to obtain a signature result, it sends the signature result to the terminal device.
  • Step S212 the terminal device unlocks the screen according to the signature result.
  • the terminal device verifies the signature result according to the stored public key to obtain the corresponding signature verification result, and unlocks the lock screen after the signature verification result is verified. deal with.
  • Step S213 the key device sends a trigger timeout result to the terminal device.
  • the key device determines that the user's confirmation of the button triggers a timeout, and sends a trigger timeout result to the terminal device.
  • the present invention provides a schematic structural diagram of an automatic screen unlocking device.
  • the automatic screen unlocking device 30 of the present invention may include: a sending module 31 , a receiving module 32, a first processing module 33, a second processing module 34, a third processing module 35, a fourth processing module 36, a fifth processing module 37 and a sixth processing module 38;
  • Sending module 31 is used for sending the broadcast that carries uuid value
  • the receiving module 32 is used to receive the Bluetooth connection establishment request sent by the terminal device when the terminal device determines that the device to which the broadcast belongs is a connectable device according to the signal strength and uuid value of the broadcast;
  • the first processing module 33 is configured to establish a Bluetooth connection with the terminal device based on the Bluetooth connection establishment request;
  • the second processing module 34 is configured to send a notification message that the Bluetooth connection is successfully established to the terminal device; receive an authentication login instruction sent by the terminal device based on the notification message;
  • the third processing module 35 is configured to obtain the data to be signed carried in the authentication login instruction
  • the fourth processing module 36 is configured to sign the data to be signed according to the stored private key to obtain a signature result
  • the sending module 31 is further configured to send the signature result to the terminal device, so that the terminal device performs an automatic screen unlocking operation according to the signature result.
  • it also includes:
  • the fifth processing module 37 is used to obtain the instruction characteristic value carried in the authentication login instruction; determine whether to perform key confirmation processing according to the instruction characteristic value; and wait for the user to confirm the button; when it is determined that the button confirmation process does not need to be performed, execute the process of signing the data to be signed according to the stored private key.
  • the fifth processing module 37 is configured to execute the processing of signing the data to be signed according to the stored private key when receiving the user's confirmation trigger on the button;
  • the confirmation trigger of the button is confirmed, it is determined whether the time for waiting to receive the user's confirmation trigger for the button reaches the preset time threshold; Confirm the triggered processing.
  • the fifth processing module 37 is configured to determine that the user's confirmation of the button triggers a timeout when the preset time threshold is reached, and send a trigger timeout result to the terminal device.
  • it also includes:
  • the sixth processing module 38 is configured to receive an information acquisition instruction sent by the terminal device; and return corresponding key information to the terminal device according to the information acquisition instruction.
  • the fast and automatic unlocking of the locked screen is realized, which has high security; and for the lock screen unlocking process between the terminal device and the key device, the terminal device and the key
  • the connection method of direct Bluetooth connection between key devices, and based on this connection method a variety of unlocking processing operations for the lock screen are used, so that the unlocking processing methods of the lock screen are varied, avoiding the singleness of one unlocking method, and through various
  • the unique unlocking method not only improves the security of unlocking, but also gives users a variety of choices, and improves the user experience.
  • FIG. 4 it shows a schematic structural diagram of an electronic device (such as the terminal device in FIG. 1 ) 400 suitable for implementing the embodiment of the present invention.
  • the terminal equipment in the embodiment of the present invention may include but not limited to such as mobile phone, notebook computer, digital broadcast receiver, PDA (personal digital assistant), PAD (tablet computer), PMP (portable multimedia player), vehicle-mounted terminal (such as mobile terminals such as car navigation terminals) and fixed terminals such as digital TVs, desktop computers and the like.
  • the electronic device shown in FIG. 4 is only an example, and should not limit the functions and scope of use of this embodiment of the present invention.
  • an electronic device 400 may include a processing device (such as a central processing unit, a graphics processing unit, etc.) 401, which may be randomly accessed according to a program stored in a read-only memory (ROM) 402 or loaded from a storage device 408.
  • a processing device such as a central processing unit, a graphics processing unit, etc.
  • RAM read-only memory
  • various appropriate actions and processes are executed by programs in the memory (RAM) 403 .
  • RAM 403 In the RAM 403, various programs and data necessary for the operation of the electronic device 400 are also stored.
  • the processing device 401, the ROM 402, and the RAM 403 are connected to each other through a bus 404.
  • An input/output (I/O) interface 405 is also connected to bus 404 .
  • the following devices can be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; including, for example, a liquid crystal display (LCD), speaker, vibration an output device 407 such as a computer; a storage device 408 including, for example, a magnetic tape, a hard disk, etc.; and a communication device 409.
  • the communication means 409 may allow the electronic device 400 to perform wireless or wired communication with other devices to exchange data. While FIG. 4 shows electronic device 400 having various means, it should be understood that implementing or having all of the means shown is not a requirement. More or fewer means may alternatively be implemented or provided.
  • the processes described above with reference to the flowcharts may be implemented as computer software programs.
  • the embodiments of the present invention include a computer program product, which includes a computer program carried on a computer-readable medium, where the computer program includes program codes for executing the methods shown in the flowcharts.
  • the computer program may be downloaded and installed from a network via communication means 409, or from storage means 408, or from ROM 402.
  • the processing device 401 When the computer program is executed by the processing device 401, the above-mentioned functions defined in the method of the embodiment of the present invention are performed.
  • the computer-readable medium mentioned above in the present invention may be a computer-readable signal medium or a computer-readable storage medium or any combination of the two.
  • a computer readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or any combination thereof. More specific examples of computer-readable storage media may include, but are not limited to, electrical connections with one or more wires, portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable Programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
  • a computer-readable storage medium may be any tangible medium that contains or stores a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
  • a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, carrying computer-readable program codes therein. Such propagated data signals may take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
  • a computer-readable signal medium may also be any computer-readable medium other than a computer-readable storage medium, which can transmit, propagate, or transmit a program for use by or in conjunction with an instruction execution system, apparatus, or device .
  • Program code embodied on a computer readable medium may be transmitted by any appropriate medium, including but not limited to wires, optical cables, RF (radio frequency), etc., or any suitable combination of the above.
  • the above-mentioned computer-readable medium may be included in the above-mentioned electronic device, or may exist independently without being incorporated into the electronic device.
  • the above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the electronic device, the electronic device: acquires at least two Internet Protocol addresses; sends a message including the at least two addresses to the node evaluation device A node evaluation request of two Internet Protocol addresses, wherein the node evaluation device selects an Internet Protocol address from the at least two Internet Protocol addresses and returns it; receives the Internet Protocol address returned by the node evaluation device; wherein, the acquired The Internet Protocol address of indicates an edge node in the content distribution network.
  • the above-mentioned computer-readable medium carries one or more programs, and when the above-mentioned one or more programs are executed by the electronic device, the electronic device: receives a node evaluation request including at least two Internet protocol addresses; from the From the at least two IP addresses, select an IP address; return the selected IP address; wherein, the received IP address indicates an edge node in the content delivery network.
  • Computer program code for carrying out the operations of the present invention may be written in one or more programming languages, or combinations thereof, including object-oriented programming languages—such as Java, Smalltalk, C++, and conventional Procedural Programming Language - such as "C" or a similar programming language.
  • the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as through an Internet service provider). Internet connection).
  • LAN local area network
  • WAN wide area network
  • Internet service provider such as AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
  • each block in a flowchart or block diagram may represent a module, program segment, or portion of code that contains one or more logical functions for implementing specified executable instructions.
  • the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by a dedicated hardware-based system that performs the specified functions or operations , or may be implemented by a combination of dedicated hardware and computer instructions.
  • the units involved in the description in the embodiments of the present invention may be implemented by means of software or by means of hardware.
  • the name of the unit does not constitute a limitation of the unit itself under certain circumstances, for example, the first obtaining unit may also be described as "a unit for obtaining at least two Internet Protocol addresses".
  • the electronic device provided by the present invention is applicable to any embodiment of the above-mentioned method for automatically unlocking the screen, which will not be repeated here.
  • the fast and automatic unlocking of the locked screen is realized, which has high security; and for the lock screen unlocking process between the terminal device and the key device, the terminal device and the key
  • the connection method of direct Bluetooth connection between key devices, and based on this connection method a variety of unlocking processing operations for the lock screen are used, so that the unlocking processing methods of the lock screen are varied, avoiding the singleness of one unlocking method, and through various
  • the unique unlocking method not only improves the security of unlocking, but also gives users a variety of choices, and improves the user experience.
  • the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program enables the computer to execute the method for automatically unlocking the screen shown in the above-mentioned embodiments.
  • the computer-readable storage medium provided by the present invention is applicable to any embodiment of the above-mentioned method for automatically unlocking the screen, and details are not repeated here.
  • the fast and automatic unlocking of the locked screen is realized, which has high security; and for the lock screen unlocking process between the terminal device and the key device, the terminal device and the key
  • the connection method of direct Bluetooth connection between key devices, and based on this connection method a variety of unlocking processing operations for the lock screen are used, so that the unlocking processing methods of the lock screen are varied, avoiding the singleness of one unlocking method, and through various
  • the unique unlocking method not only improves the security of unlocking, but also gives users a variety of choices, and improves the user experience.
  • each module of the device according to the present invention can be integrated into one body, or deployed separately.
  • the above modules can be combined into one module, or can be further split into multiple sub-modules.
  • modules in the device in the embodiment can be distributed in the device in the embodiment according to the description in the embodiment, and can also be changed and located in one or more devices different from the embodiment.
  • the modules in the above embodiments can be combined into one module, and can also be further split into multiple sub-modules.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Selective Calling Equipment (AREA)

Abstract

一种自动解锁屏幕的方法,该方法包括:发送携带有uuid值的广播;当由终端设备根据广播的信号强度及uuid值确定广播所属的设备为可连接设备时,接收终端设备发送的蓝牙连接建立请求;基于蓝牙连接建立请求与终端设备建立蓝牙连接;向终端设备发送蓝牙连接建立成功的通知消息;接收终端设备基于通知消息发送的认证登录指令;获取认证登录指令中携带的待签名数据;根据存储的私钥对待签名数据进行签名,得到签名结果;将签名结果发送给终端设备,以使终端设备根据签名结果执行自动解锁屏幕操作。本发明还涉及解锁屏幕的装置、电子设备及可读存储介质。基于蓝牙连接的自动解锁处理,本发明实现了对锁定屏幕快速地自动解锁,具有较高安全性。

Description

自动解锁屏幕的方法、装置、电子设备及可读存储介质 技术领域
本发明涉及一种自动解锁屏幕方法、装置、电子设备及可读存储介质。本发明属于信息安全技术领域。
背景技术
现有技术中,通过对终端设备(如PC终端)进行锁屏处理设置,以便用户在离开该终端设备时可以对该终端设备的屏幕锁定,从而避免该终端设备中的信息泄露,保护了终端设备中的信息安全;而对终端设备进行屏幕解锁的方式,通常是由用户根据在实体键盘上输入设定的密码来实现,这种屏幕解锁方式,由于需要用户主动触碰实体键盘来触发解锁的验证输入操作,操作不够便捷,且由于实体键盘上按键的位置固定不变,很容易造成屏幕解锁密码的泄露,解锁方式的安全性不高;基于此,如何实现对终端设备的锁定屏幕进行安全、有效、快速地自动解锁成为了当前亟待解决的技术问题。
发明内容
本发明的目的是提供一种自动解锁屏幕的方法、装置、电子设备及可读存储介质,以实现对终端设备的锁定屏幕进行安全、有效、快速地自动解锁。
为此,根据本发明的第一方面,提供了一种自动解锁屏幕的方法,包括如下步骤:
发送携带有uuid值的广播;
当由终端设备根据所述广播的信号强度及uuid值确定所述广播所属的设备为可连接设备时,接收所述终端设备发送的蓝牙连接建立请求;
基于所述蓝牙连接建立请求与所述终端设备建立蓝牙连接;
向所述终端设备发送蓝牙连接建立成功的通知消息;
接收所述终端设备基于所述通知消息发送的认证登录指令;
获取所述认证登录指令中携带的待签名数据;
根据存储的私钥对所述待签名数据进行签名,得到签名结果;
将所述签名结果发送给所述终端设备,以使所述终端设备根据所述签名结果执行自动解锁屏幕操作。
优选地,所述接收所述终端设备基于所述通知消息发送的认证登录指令之后,还包括:
获取所述认证登录指令中携带的指令特征值;
根据所述指令特征值确定是否需要执行按键确认处理;
当确定需要执行按键确认处理时,向用户发送执行按键确认的指示信息,并等待接收用户对按键的确认触发;
当确定不需要执行按键确认处理时,执行根据存储的私钥对所述待签名数据进行签名的处理。
优选地,所述等待接收用户对按键的确认触发,包括:
当接收到所述用户对按键的确认触发时,执行根据存储的私钥对所述待签名数据进行签名的处理;
当未接收到所述用户对按键的确认触发时,确定等待接收用户对按键的确认触发的时间是否达到预设时间阈值;
若未达到预设时间阈值时,确定用户对按键的确认触发未超时,继续执行等待接收用户对按键的确认触发的处理。
优选地,所述方法还包括:
若达到预设时间阈值时,确定用户对按键的确认触发超时,向终端设备发送触发超时结果。
优选地,所述方法还包括:
接收所述终端设备发送的信息获取指令;
根据所述信息获取指令将相应的按键信息返回给所述终端设备。
根据本发明的第二方面,提供了一种自动解锁屏幕的装置,包括:
发送模块,用于发送携带有uuid值的广播;
接收模块,用于当由终端设备根据所述广播的信号强度及uuid值确定所述广播所属的设备为可连接设备时,接收所述终端设备发送的蓝牙连接建立请求;
第一处理模块,用于基于所述蓝牙连接建立请求与所述终端设备建立蓝牙连接;
第二处理模块,用于向所述终端设备发送蓝牙连接建立成功的通知消息;接收所述终端设备基于所述通知消息发送的认证登录指令;
第三处理模块,用于获取所述认证登录指令中携带的待签名数据;
第四处理模块,用于根据存储的私钥对所述待签名数据进行签名,得到签名结果;
所述发送模块,还用于将所述签名结果发送给所述终端设备,以使所述终端设备根据所述签名结果执行自动解锁屏幕操作。
优选地,还包括:
第五处理模块,用于获取所述认证登录指令中携带的指令特征值;根据所述指令特征值确定是否需要执行按键确认处理;
当确定需要执行按键确认处理时,向用户发送执行按键确认的指示信息,并等待接收用户对按键的确认触发;当确定不需要执行按键确认处理时,执行根据存储的私钥对所述待签名数据进行签名的处理。
优选地,第五处理模块,用于当接收到所述用户对按键的确认触发时,执行根据存储的私钥对所述待签名数据进行签名的处理;当未接收到所述用户对按键的确认触发时,确定等待接收用户对按键的确认触发的时间是否达到预设时间阈值;若未达到预设时间阈值时,确定用户对按键的确认触发未超时,继续执行等待接收用户对按键的确认触发的处理。
优选地,第五处理模块,用于若达到预设时间阈值时,确定用户对按键的确认触发超时,向终端设备发送触发超时结果。
优选地,还包括:
第六处理模块,用于接收所述终端设备发送的信息获取指令;根据所述信息获取指令将相应的按键信息返回给所述终端设备。
根据本发明的第三方面,提供了一种电子设备,包括:处理器和存储器;
所述存储器,用于存储计算机程序;
所述处理器,用于通过调用所述计算机程序,执行上述的自动解锁屏幕方法。
根据本发明的第四方面,提供了一种计算机可读存储介质,所述计算机存储介质用于存储计算机程序,当其在计算机上运行时,使得计算机可以执行上述的自动解锁屏幕方法。
基于蓝牙连接的自动解锁处理,本发明实现了对终端设备的锁定屏幕进行安全、有效、快速地自动解锁。
附图说明
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域的技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本发明实施例的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1为本发明提供的一种自动解锁屏幕方法的流程示意图;
图2为本发明提供的一种自动解锁屏幕方法的一种可能实现方式的具体处理流程示意图;
图3为本发明提供的一种自动解锁屏幕装置的结构示意图;
图4为本发明提供的自动解锁屏幕方法的电子设备的结构示意图。
具体实施方式
本发明提出一种自动解锁屏幕方法、装置、电子设备及可读存储介质,下面结合附图,对本发明具体实施方式进行详细说明。
下面详细描述本发明的实施例,所述实施例的示例在附图中示出,其中自始至终相同或类似的标号表示相同或类似的元件或具有相同或类似功能的元件。下面通过参考附图描述的实施例是示例性的,仅用于解释本发明,而不能解释为对本发明的限制。
本领域的技术人员可以理解,除非特意声明,这里使用的单数形式“一”、“一个”、“所述”和“该”也可包括复数形式。应该进一步理解的是,本发明的说明书中使用的措辞“包括”是指存在所述特征、整数、步骤、操作、元件和/或组件,但是并不排除存在或添加一个或多个其他特征、整数、步骤、操作、元件、组件和/或它们的组。应该理解,当我们称元件被“连接”或“耦接”到另一元件时,它可以直接连接或耦接到其他元件,或者也可以存在中间元件。此外,这里使用的“连接”或“耦接”可以包括无线连接或无线耦接。这里使用的措辞“和/或”包括一个或更多个相关联的列出项的全部或任一单元和全部组合。
本领域的技术人员可以理解,除非另外定义,这里使用的所有术语(包括技术术语和科学术语),具有与本领域的技术人员的一般理解相同的意义。还应该理解的是,诸如通用字典中定义的那些术语,应该被理解为具有与现有技术的上下文中的意义一致的意义,并且除非像这里一样被特定定义,否则不会用理想化或过于正式的含义来解释。
为使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明实施方式作进一步地详细描述。下面这几个具体的实施例可以相互结合,对于相同或相似的概念或过程可能在某些实施例中不再赘述。
基于上述本发明所提供的技术方案,下面对该技术方案进行详尽阐释,在该详尽阐释中,要实现对终端设备上屏幕的自动解锁,需要密钥设备处于终端设备的蓝牙连接范围内才可实现,即终端设备在特定信号强度范围内接收广播通知,密钥设备在不间断地发送广播,当终端设备在该特定信号强度范围内检测到密钥设备,说明该密钥设备的信号强度满足该终端设备对信号强度的要求,进而确定该密钥设备处于广播范围内;而为了确定该蓝牙设备是否为可连接设备时,还需要终端设备根据广播的uuid值进行判断,只有uuid值为可被协议栈识别的标准uuid值,才能据此确定该密钥设备为可连接的密钥设备。因此,在确定该密钥设备为可连接的密钥设备后,终端设备可以与该密钥设备建立蓝牙连接,从而通过蓝牙连接来与密钥设备进行屏幕解锁的相应信息传输交互。下面本发明所提供的实施例均是围绕屏幕自动解锁进行阐述。其中,对于本发明中的终端设备,其可以是笔记本电脑,还可以是带有蓝牙适配器的PC终端,即PC终端可以通过带有的蓝牙适配器与密钥设备进行蓝牙连接及蓝牙通信,进而实现相应的数据通信传输。
如图1所示,为本发明提供的一种自动解锁屏幕方法的流程示意图,该方法包括如下步骤:
步骤S101,发送携带有uuid值的广播;
步骤S102,当由终端设备根据广播的信号强度及uuid值确定广播所属的设备为可连接设备时,接收终端设备发送的蓝牙连接建立请求;
步骤S103,基于蓝牙连接建立请求与终端设备建立蓝牙连接;
步骤S104,向终端设备发送蓝牙连接建立成功的通知消息;
步骤S105,接收终端设备基于通知消息发送的认证登录指令;
步骤S106,获取所述认证登录指令中携带的待签名数据;
步骤S107,根据存储的私钥对所述待签名数据进行签名,得到签名结果;
步骤S108,将所述签名结果发送给所述终端设备,以使终端设备根据签名结果执行自动 解锁屏幕操作。
本发明中,通过基于蓝牙连接的自动解锁处理,实现了对锁定屏幕快速地自动解锁,安全性高。
如图2所示,为本发明提供的一种自动解锁屏幕方法的一个可能地实现方式的具体处理流程图。
对于本发明,优选地,前述步骤S101~步骤S104的处理具体包括下述步骤S201的处理。
步骤S201,密钥设备与终端设备建立蓝牙连接。
优选地,当用户携带着密钥设备距离终端设备很近,即处于终端设备的连接范围内且为可连接设备时,终端设备主动向该密钥设备发送蓝牙连接建立请求,密钥设备在接收到终端设备发起的蓝牙连接建立请求后,根据该蓝牙连接建立请求与该终端设备建立二者间的蓝牙连接,之后向终端设备发送蓝牙连接建立成功的通知消息来通知终端二者间已建立了蓝牙连接。
优选地,对于上述蓝牙连接的建立,其具体包括:终端设备在特定信号强度范围内处于持续接收广播通知的状态,当在特定信号强度范围内检测到密钥设备后,确定该密钥设备处于广播范围内;进一步地,终端设备获取该广播的uuid值,确定该uuid值是否为可识别的标准uuid值,若是,确定该密钥设备为可连接的密钥设备;否则,确定该密钥设备为非可连接的设备。
优选地,在终端设备与密钥设备建立蓝牙连接后,还包括如下处理:
步骤S202,终端设备向密钥设备发送信息获取指令。
优选地,在密钥设备向终端设备发送蓝牙连接建立成功的通知消息后,终端设备根据密钥设备的通知消息向密钥设备发送信息获取指令,以获取相应的按键信息等。
步骤S203,密钥设备向终端设备返回按键信息。
优选地,密钥设备接收到终端设备发送的信息获取指令后,根据该指令查找相应的按键信息,并将查找到的按键信息返回给终端设备。
对于本发明,优选地,前述步骤S105~步骤S108的处理具体包括下述步骤S204~步骤S213的处理。
步骤S204,终端设备向密钥设备发送认证登录指令。
优选地,终端设备在得到密钥设备返回的按键信息后,根据该按键信息构建相应的指令特征值,并将指令特征值携带于认证登录指令中发送给密钥设备。
步骤S205,密钥设备获取认证登录指令中的指令特征值。
优选地,密钥设备接收到终端设备发送的认证登录指令后,获取其中携带的指令特征值。
步骤S206,密钥设备根据指令特征值确定是否需要执行按键确认处理。
在一个可能的实现方式中,密钥设备在获取到指令特征值后,根据该指令特征值确定是否需要执行按键确认处理;当确定需要执行按键确认处理时,转到步骤S207;否则,转到步骤S210。
步骤S207,密钥设备向用户发送执行按键确认的指示信息。
优选地,密钥设备在确定需要执行按键确认处理时,向用户发送执行按键确认的指示信息,从而指示用户进行相应的按键确认触发。
步骤S208,密钥设备等待接收用户对按键的确认触发。
优选地,当密钥设备向用户发送执行按键确认的指示信息后,继续执行等待接收用户对按键的确认触发的处理。
步骤S209,密钥设备确定等待接收用户对按键的确认触发的时间是否达到预设时间阈值。
优选地,在密钥设备等待接收用户对按键的确认触发时,还需要进一步确定等待接收用户对按键的确认触发的时间是否达到预设时间阈值;若未达到预设时间阈值且接收到用户对按键的确认触发时,转到步骤S210;若未达到预设时间阈值且未接收到用户对按键的确认触发时,转到步骤S208继续等待;若达到预设时间阈值且未接收到用户对按键的确认触发时, 转到步骤S213。
步骤S210,密钥设备根据存储的私钥对认证登录指令中的待签名数据进行签名。
优选地,认证登录指令中还携带有待签名数据,密钥设备根据存储的私钥对认证登录指令中的待签名数据进行签名,得到相应的签名结果。
步骤S211,密钥设备将签名结果发送给终端设备。
优选地,密钥设备在根据私钥对该待签名数据签名得到签名结果后,将该签名结果发送给终端设备。
步骤S212,终端设备根据签名结果进行屏幕解锁。
优选地,终端设备在接收到上述签名结果后,根据存储的公钥对该签名结果进行验签,得到相应的验签结果,并在该验签结果为验证通过后,执行对锁定屏幕的解锁处理。
步骤S213,密钥设备向终端设备发送触发超时结果。
优选地,密钥设备确定用户对按键的确认触发超时,向终端设备发送触发超时结果。
基于上述本发明所提供的自动解锁屏幕方法的技术方案,本发明对应提供了一种自动解锁屏幕装置的结构示意图,如图3所示,本发明的自动解锁屏幕装置30可以包括:发送模块31,接收模块32,第一处理模块33,第二处理模块34,第三处理模块35,第四处理模块36,第五处理模块37及第六处理模块38;
发送模块31,用于发送携带有uuid值的广播;
接收模块32,用于当由终端设备根据所述广播的信号强度及uuid值确定所述广播所属的设备为可连接设备时,接收所述终端设备发送的蓝牙连接建立请求;
第一处理模块33,用于基于所述蓝牙连接建立请求与所述终端设备建立蓝牙连接;
第二处理模块34,用于向所述终端设备发送蓝牙连接建立成功的通知消息;接收所述终端设备基于所述通知消息发送的认证登录指令;
第三处理模块35,用于获取所述认证登录指令中携带的待签名数据;
第四处理模块36,用于根据存储的私钥对所述待签名数据进行签名,得到签名结果;
所述发送模块31,还用于将所述签名结果发送给所述终端设备,以使所述终端设备根据所述签名结果执行自动解锁屏幕操作。
优选地,还包括:
第五处理模块37,用于获取所述认证登录指令中携带的指令特征值;根据所述指令特征值确定是否需要执行按键确认处理;当确定需要执行按键确认处理时,向用户发送执行按键确认的指示信息,并等待接收用户对按键的确认触发;当确定不需要执行按键确认处理时,执行根据存储的私钥对所述待签名数据进行签名的处理。
优选地,第五处理模块37,用于当接收到所述用户对按键的确认触发时,执行根据存储的私钥对所述待签名数据进行签名的处理;当未接收到所述用户对按键的确认触发时,确定等待接收用户对按键的确认触发的时间是否达到预设时间阈值;若未达到预设时间阈值时,确定用户对按键的确认触发未超时,继续执行等待接收用户对按键的确认触发的处理。
优选地,第五处理模块37,用于若达到预设时间阈值时,确定用户对按键的确认触发超时,向终端设备发送触发超时结果。
优选地,还包括:
第六处理模块38,用于接收所述终端设备发送的信息获取指令;根据所述信息获取指令将相应的按键信息返回给所述终端设备。
本发明中,通过基于蓝牙连接的自动解锁处理,实现了对锁定屏幕快速地自动解锁,具有较高地安全性;并且对于终端设备与密钥设备间的锁屏解锁处理,采用了终端设备与密钥设备间的直接蓝牙连接的连接方式,并基于该连接方式采用了多种锁定屏幕的解锁处理操作,使得锁屏的解锁处理方式选择多样,避免了一种解锁方式的单一性,且通过多样的解锁方式,既提升了解锁的安全性,也给了用户多样化选择,提升了用户使用感受。
下面参考图4,其示出了适于用来实现本发明实施例的电子设备(例如图1中的终端设 备)400的结构示意图。本发明实施例中的终端设备可以包括但不限于诸如移动电话、笔记本电脑、数字广播接收器、PDA(个人数字助理)、PAD(平板电脑)、PMP(便携式多媒体播放器)、车载终端(例如车载导航终端)等等的移动终端以及诸如数字TV、台式计算机等等的固定终端。图4示出的电子设备仅仅是一个示例,不应对本发明实施例的功能和使用范围带来任何限制。
如图4所示,电子设备400可以包括处理装置(例如中央处理器、图形处理器等)401,其可以根据存储在只读存储器(ROM)402中的程序或者从存储装置408加载到随机访问存储器(RAM)403中的程序而执行各种适当的动作和处理。在RAM 403中,还存储有电子设备400操作所需的各种程序和数据。处理装置401、ROM 402以及RAM 403通过总线404彼此相连。输入/输出(I/O)接口405也连接至总线404。
通常,以下装置可以连接至I/O接口405:包括例如触摸屏、触摸板、键盘、鼠标、摄像头、麦克风、加速度计、陀螺仪等的输入装置406;包括例如液晶显示器(LCD)、扬声器、振动器等的输出装置407;包括例如磁带、硬盘等的存储装置408;以及通信装置409。通信装置409可以允许电子设备400与其他设备进行无线或有线通信以交换数据。虽然图4示出了具有各种装置的电子设备400,但是应理解的是,并不要求实施或具备所有示出的装置。可以替代地实施或具备更多或更少的装置。
特别地,根据本发明的实施例,上文参考流程图描述的过程可以被实现为计算机软件程序。例如,本发明的实施例包括一种计算机程序产品,其包括承载在计算机可读介质上的计算机程序,该计算机程序包含用于执行流程图所示的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信装置409从网络上被下载和安装,或者从存储装置408被安装,或者从ROM 402被安装。在该计算机程序被处理装置401执行时,执行本发明实施例的方法中限定的上述功能。
需要说明的是,本发明上述的计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质或者是上述两者的任意组合。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子可以包括但不限于:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机访问存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本发明中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。而在本发明中,计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。计算机可读信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读信号介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于:电线、光缆、RF(射频)等等,或者上述的任意合适的组合。
上述计算机可读介质可以是上述电子设备中所包含的;也可以是单独存在,而未装配入该电子设备中。
上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:获取至少两个网际协议地址;向节点评价设备发送包括所述至少两个网际协议地址的节点评价请求,其中,所述节点评价设备从所述至少两个网际协议地址中,选取网际协议地址并返回;接收所述节点评价设备返回的网际协议地址;其中,所获取的网际协议地址指示内容分发网络中的边缘节点。
或者,上述计算机可读介质承载有一个或者多个程序,当上述一个或者多个程序被该电子设备执行时,使得该电子设备:接收包括至少两个网际协议地址的节点评价请求;从所述至少两个网际协议地址中,选取网际协议地址;返回选取出的网际协议地址;其中,接收到 的网际协议地址指示内容分发网络中的边缘节点。
可以以一种或多种程序设计语言或其组合来编写用于执行本发明的操作的计算机程序代码,上述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。
描述于本发明实施例中所涉及到的单元可以通过软件的方式实现,也可以通过硬件的方式来实现。其中,单元的名称在某种情况下并不构成对该单元本身的限定,例如,第一获取单元还可以被描述为“获取至少两个网际协议地址的单元”。
以上描述仅为本发明的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本发明中所涉及的公开范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离上述公开构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本发明中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。
本发明提供的电子设备,适用于上述的自动解锁屏幕方法的任一实施例,在此不再赘述。
本发明中,通过基于蓝牙连接的自动解锁处理,实现了对锁定屏幕快速地自动解锁,具有较高地安全性;并且对于终端设备与密钥设备间的锁屏解锁处理,采用了终端设备与密钥设备间的直接蓝牙连接的连接方式,并基于该连接方式采用了多种锁定屏幕的解锁处理操作,使得锁屏的解锁处理方式选择多样,避免了一种解锁方式的单一性,且通过多样的解锁方式,既提升了解锁的安全性,也给了用户多样化选择,提升了用户使用感受。
本发明提供了一种计算机可读存储介质,该计算机可读存储介质存储计算机程序,计算机程序使计算机执行上述实施例所示的自动解锁屏幕方法。
本发明提供的计算机可读存储介质,适用于上述的自动解锁屏幕方法的任一实施例,在此不再赘述。
本发明中,通过基于蓝牙连接的自动解锁处理,实现了对锁定屏幕快速地自动解锁,具有较高地安全性;并且对于终端设备与密钥设备间的锁屏解锁处理,采用了终端设备与密钥设备间的直接蓝牙连接的连接方式,并基于该连接方式采用了多种锁定屏幕的解锁处理操作,使得锁屏的解锁处理方式选择多样,避免了一种解锁方式的单一性,且通过多样的解锁方式,既提升了解锁的安全性,也给了用户多样化选择,提升了用户使用感受。
本领域的技术人员可以理解,可以用计算机程序指令来实现这些结构图和/或框图和/或流图中的每个框以及这些结构图和/或框图和/或流图中的框的组合。本技术领域技术人员可以理解,可以将这些计算机程序指令提供给通用计算机、专业计算机或其他可编程数据处理方法的处理器来实现,从而通过计算机或其他可编程数据处理方法的处理器来执行本发明公开的结构图和/或框图和/或流图的框或多个框中指定的方案。
其中,根据本发明的装置的各个模块可以集成于一体,也可以分离部署。上述模块可以 合并为一个模块,也可以进一步拆分成多个子模块。
本领域的技术人员可以理解附图只是一个优选实施例的示意图,附图中的模块或流程并不一定是实施本发明所必须的。
本领域的技术人员可以理解实施例中的装置中的模块可以按照实施例描述进行分布于实施例的装置中,也可以进行相应变化位于不同于本实施例的一个或多个装置中。上述实施例的模块可以合并为一个模块,也可以进一步拆分成多个子模块。
上述本发明序号仅仅为了描述,不代表实施例的优劣。
以上公开的仅为本发明的几个具体实施例,但是,本发明并非局限于此,任何本领域的技术人员能思之的变化都应落入本发明的保护范围。

Claims (7)

  1. 一种自动解锁屏幕的方法,其特征在于,包括如下步骤:
    发送携带有uuid值的广播;
    当由终端设备根据所述广播的信号强度及uuid值确定所述广播所属的设备为可连接设备时,接收所述终端设备发送的蓝牙连接建立请求;
    基于所述蓝牙连接建立请求与所述终端设备建立蓝牙连接;
    向所述终端设备发送蓝牙连接建立成功的通知消息;
    接收所述终端设备基于所述通知消息发送的认证登录指令;
    获取所述认证登录指令中携带的待签名数据;
    根据存储的私钥对所述待签名数据进行签名,得到签名结果;以及
    将所述签名结果发送给所述终端设备,以使所述终端设备根据所述签名结果执行自动解锁屏幕操作。
  2. 如权利要求1所述的方法,其特征在于,所述接收所述终端设备基于所述通知消息发送的认证登录指令之后,还包括:
    获取所述认证登录指令中携带的指令特征值;
    根据所述指令特征值确定是否需要执行按键确认处理;
    当确定需要执行按键确认处理时,向用户发送执行按键确认的指示信息,并等待接收用户对按键的确认触发;以及
    当确定不需要执行按键确认处理时,执行根据存储的私钥对所述待签名数据进行签名的处理。
  3. 如权利要求2所述的方法,其特征在于,所述等待接收用户对按键的确认触发,包括:
    当接收到所述用户对按键的确认触发时,执行根据存储的私钥对所述待签名数据进行签名的处理;
    当未接收到所述用户对按键的确认触发时,确定等待接收用户对按键的确认触发的时间是否达到预设时间阈值;以及
    若未达到预设时间阈值时,确定用户对按键的确认触发未超时,继续执行等待接收用户对按键的确认触发的处理。
  4. 如权利要求3所述的方法,其特征在于,所述方法还包括:
    若达到预设时间阈值时,确定用户对按键的确认触发超时,向终端设备发送触发超时结果。
  5. 如权利要求1中任一项所述的方法,其特征在于,所述方法还包括:
    接收所述终端设备发送的信息获取指令;以及
    根据所述信息获取指令将相应的按键信息返回给所述终端设备。
  6. 一种自动解锁屏幕装置,其特征在于,包括:
    发送模块,用于发送携带有uuid值的广播;
    接收模块,用于当由终端设备根据所述广播的信号强度及uuid值确定所述广播所属的设备为可连接设备时,接收所述终端设备发送的蓝牙连接建立请求;
    第一处理模块,用于基于所述蓝牙连接建立请求与所述终端设备建立蓝牙连接;
    第二处理模块,用于向所述终端设备发送蓝牙连接建立成功的通知消息;接收所述终端设备基于所述通知消息发送的认证登录指令;
    第三处理模块,用于获取所述认证登录指令中携带的待签名数据;
    第四处理模块,用于根据存储的私钥对所述待签名数据进行签名,得到签名结果;以及
    所述发送模块,还用于将所述签名结果发送给所述终端设备,以使所述终端设备根据所述签名结果执行自动解锁屏幕操作。
  7. 一种电子设备或计算机可读存储介质,其特征在于,包括:处理器和存储器;
    所述存储器,用于存储计算机程序;
    所述处理器,用于通过调用所述计算机程序,执行如权利要求1所述的自动解锁屏幕的方法;或者,所述计算机存储介质用于存储计算机程序,当其在计算机上运行时,使得计算机执行如权利要求1所述的自动解锁屏幕的方法。
PCT/CN2022/128598 2021-12-27 2022-10-31 自动解锁屏幕的方法、装置、电子设备及可读存储介质 WO2023124499A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111607276.2 2021-12-27
CN202111607276.2A CN113993115B (zh) 2021-12-27 2021-12-27 自动解锁屏幕方法、装置、电子设备及可读存储介质

Publications (1)

Publication Number Publication Date
WO2023124499A1 true WO2023124499A1 (zh) 2023-07-06

Family

ID=79734379

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/128598 WO2023124499A1 (zh) 2021-12-27 2022-10-31 自动解锁屏幕的方法、装置、电子设备及可读存储介质

Country Status (2)

Country Link
CN (1) CN113993115B (zh)
WO (1) WO2023124499A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113993115B (zh) * 2021-12-27 2022-04-01 飞天诚信科技股份有限公司 自动解锁屏幕方法、装置、电子设备及可读存储介质
CN115379590B (zh) * 2022-10-27 2023-02-14 深圳市正浩创新科技股份有限公司 蓝牙连接建立方法、装置、电子设备及计算机存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110313922A1 (en) * 2009-06-22 2011-12-22 Mourad Ben Ayed System For NFC Authentication Based on BLUETOOTH Proximity
CN103853328A (zh) * 2012-12-03 2014-06-11 三星电子株式会社 控制屏幕锁定的方法和移动终端
CN108269334A (zh) * 2018-01-10 2018-07-10 北京小米移动软件有限公司 开锁方法、终端设备以及智能锁
CN109840980A (zh) * 2019-04-04 2019-06-04 兰溪铂蓝智能科技有限公司 一种蓝牙自动锁自动开锁方法
CN113993115A (zh) * 2021-12-27 2022-01-28 飞天诚信科技股份有限公司 自动解锁屏幕方法、装置、电子设备及可读存储介质

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8045961B2 (en) * 2009-06-22 2011-10-25 Mourad Ben Ayed Systems for wireless authentication based on bluetooth proximity
CN102568184B (zh) * 2012-02-17 2013-09-18 深圳市中兴移动通信有限公司 一种实现蓝牙耳机解/锁屏及开关背光的方法及系统
CN103647587B (zh) * 2013-12-30 2016-08-17 华为终端有限公司 为移动终端解锁的方法、系统、移动终端及穿戴电子设备
US9276914B2 (en) * 2014-04-15 2016-03-01 Google Inc. Auto-user registration and unlocking of a computing device
US10055567B2 (en) * 2014-05-30 2018-08-21 Apple Inc. Proximity unlock and lock operations for electronic devices
CN104090710A (zh) * 2014-06-25 2014-10-08 广东欧珀移动通信有限公司 一种智能终端解锁方法及智能终端
CN104360731A (zh) * 2014-09-24 2015-02-18 四川长虹电器股份有限公司 智能手持设备解锁系统及方法
CN106446642A (zh) * 2015-08-10 2017-02-22 宇龙计算机通信科技(深圳)有限公司 一种终端屏幕解锁的方法及装置
CN105966356A (zh) * 2015-10-22 2016-09-28 乐视移动智能信息技术(北京)有限公司 一种通过蓝牙技术控制汽车门锁开关的方法和装置
CN105512537A (zh) * 2015-12-01 2016-04-20 深圳还是威健康科技有限公司 一种利用智能穿戴设备解锁终端的方法及智能穿戴设备
CN105893802A (zh) * 2016-03-29 2016-08-24 四川效率源信息安全技术股份有限公司 一种基于蓝牙锁定/解锁电脑屏幕的方法
US10310725B2 (en) * 2016-06-12 2019-06-04 Apple Inc. Generating scenes based on accessory state
KR20180086118A (ko) * 2017-01-20 2018-07-30 삼성전자주식회사 통신 시스템에서 보안 정보 제공 및 관리 장치 및 방법
CN109074443B (zh) * 2017-06-02 2022-12-06 华为技术有限公司 一种解锁方法及装置
CN109525395B (zh) * 2018-09-27 2022-02-08 腾讯科技(北京)有限公司 签名信息的传输方法和装置、存储介质及电子装置
CN113449273A (zh) * 2021-07-16 2021-09-28 深圳传音控股股份有限公司 解锁方法、移动终端及存储介质

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110313922A1 (en) * 2009-06-22 2011-12-22 Mourad Ben Ayed System For NFC Authentication Based on BLUETOOTH Proximity
CN103853328A (zh) * 2012-12-03 2014-06-11 三星电子株式会社 控制屏幕锁定的方法和移动终端
CN108269334A (zh) * 2018-01-10 2018-07-10 北京小米移动软件有限公司 开锁方法、终端设备以及智能锁
CN109840980A (zh) * 2019-04-04 2019-06-04 兰溪铂蓝智能科技有限公司 一种蓝牙自动锁自动开锁方法
CN113993115A (zh) * 2021-12-27 2022-01-28 飞天诚信科技股份有限公司 自动解锁屏幕方法、装置、电子设备及可读存储介质

Also Published As

Publication number Publication date
CN113993115B (zh) 2022-04-01
CN113993115A (zh) 2022-01-28

Similar Documents

Publication Publication Date Title
WO2023124499A1 (zh) 自动解锁屏幕的方法、装置、电子设备及可读存储介质
CN111639319B (zh) 用户资源授权方法、装置及计算机可读存储介质
WO2021077833A1 (zh) 信息推送方法、设备、电子设备及计算机可读存储介质
US8925070B2 (en) Method and apparatus for providing user authentication based on user actions
US7822863B2 (en) Personal domain controller
JP2022003772A (ja) 無線接続を確立する方法、装置、機器及び記憶媒体
CN110662209B (zh) 一种隔离网络中的投屏设备连接方法及装置
WO2021159765A1 (zh) 一种账号数据共享方法及电子设备
WO2021136543A1 (zh) 卡片自动连接方法、电子设备及计算机可读存储介质
CN109313535B (zh) 提供远程键盘服务
WO2021228174A1 (zh) 信息交互方法、装置和电子设备
WO2019019811A1 (zh) 用于获取无线接入点信息的方法和装置
EP2839698A1 (en) Method, system and apparatus for accessing a communications network
US11736149B2 (en) Data transmission method for Bluetooth card reader and electronic device
CN115801299B (zh) 元宇宙身份认证方法、装置、设备及存储介质
WO2023116545A1 (zh) 设备互联方法、装置、终端设备及计算机可读存储介质
WO2022083589A1 (zh) 终端的控制方法、装置、终端和存储介质
EP3261317B1 (en) Authentication system, communication system, and authentication and authorization method
WO2021143317A1 (zh) 邀请链接信息处理方法、装置、电子设备及可读介质
US20130172077A1 (en) System and method for resource sharing and playing device thereof
WO2023207788A1 (zh) 信息处理方法、装置、电子设备和存储介质
US20160026814A1 (en) Access control of external memory
CN115174558B (zh) 云网端一体化身份认证方法、装置、设备及存储介质
CN110602700A (zh) 种子密钥处理方法、装置及电子设备
US20240232305A1 (en) Automatic screen unlocking method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22913762

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 18561366

Country of ref document: US