WO2023142749A1 - 设备解锁方法、装置、电子设备及计算机可读存储介质 - Google Patents

设备解锁方法、装置、电子设备及计算机可读存储介质 Download PDF

Info

Publication number
WO2023142749A1
WO2023142749A1 PCT/CN2022/139111 CN2022139111W WO2023142749A1 WO 2023142749 A1 WO2023142749 A1 WO 2023142749A1 CN 2022139111 W CN2022139111 W CN 2022139111W WO 2023142749 A1 WO2023142749 A1 WO 2023142749A1
Authority
WO
WIPO (PCT)
Prior art keywords
wearable device
operating system
token
mode
terminal device
Prior art date
Application number
PCT/CN2022/139111
Other languages
English (en)
French (fr)
Inventor
石建
郑逾洋
Original Assignee
Oppo广东移动通信有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo广东移动通信有限公司 filed Critical Oppo广东移动通信有限公司
Publication of WO2023142749A1 publication Critical patent/WO2023142749A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Definitions

  • the present application relates to the technical field of information security, and in particular to a device unlocking method, device, electronic device, and computer-readable storage medium.
  • wearable devices such as smart watches, etc.
  • wearable devices also have more and more functions, such as payment functions, health monitoring functions, etc.
  • How to effectively ensure the information security of wearable devices has become a problem for many user concerns.
  • wearable devices provide a lock screen function. Users need to input a preset password on the wearable device to unlock the wearable device.
  • the limited interaction area of the wearable device such as touch control screen, etc.
  • the embodiment of the present application discloses a device unlocking method, device, electronic device, and computer-readable storage medium, which can unlock wearable devices more easily and quickly, while ensuring the information security of wearable devices, and improving wearable devices. Intelligent equipment.
  • the embodiment of the present application discloses a method for unlocking a device, which is applied to a terminal device.
  • the method includes:
  • the embodiment of the present application discloses a method for unlocking a device, which is applied to a wearable device, and the method includes:
  • the verification information is verified, and if the verification is successful, the lock screen state of the wearable device is released.
  • the embodiment of the present application discloses a device unlocking device, which is applied to a terminal device, and the device includes:
  • An unlocking module configured to release the lock screen state of the terminal device in response to an unlock instruction
  • a sending module configured to send verification information to a wearable device communicatively connected to the terminal device, so that the wearable device releases the lock screen state of the wearable device when the verification information is successfully verified .
  • the embodiment of the present application discloses a device unlocking device, which is applied to wearable devices, and the device includes:
  • a receiving module configured to receive verification information sent by a terminal device communicatively connected to the wearable device, where the verification information is sent by the terminal device when the screen is unlocked;
  • the verification module is configured to verify the verification information, and if the verification is successful, release the lock screen state of the wearable device.
  • the embodiment of the present application discloses an electronic device, including a memory and a processor, and a computer program is stored in the memory, and when the computer program is executed by the processor, the processor realizes any of the above-mentioned method.
  • the embodiment of the present application discloses a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, any one of the methods described above is implemented.
  • Figure 1 is an application scenario diagram of a device unlocking method in an embodiment
  • FIG. 2 is a flow chart of a device unlocking method in one embodiment
  • FIG. 3 is a schematic diagram of a scenario in which a terminal device automatically unlocks a wearable device in an embodiment
  • FIG. 4 is a flow chart of a device unlocking method in another embodiment
  • FIG. 5A is a schematic structural diagram of a wearable device verifying a token and a handle through a first operating system in an embodiment
  • FIG. 5B is a schematic diagram of a wearable device verifying a hash value and a salt value through a second operating system in an embodiment
  • Fig. 6 is a flow chart of agreeing verification information between a terminal device and a wearable device in an embodiment
  • FIG. 7 is a schematic diagram of the sequence of a device unlocking method in an embodiment
  • Fig. 8 is a flowchart of a device unlocking method in yet another embodiment
  • Fig. 9 is a flow chart of agreeing verification information between a terminal device and a wearable device in another embodiment
  • Fig. 10 is a block diagram of a device unlocking device in an embodiment
  • Fig. 11 is a block diagram of a device unlocking device in another embodiment
  • Fig. 12 is a structural block diagram of a terminal device in an embodiment.
  • first, second and the like used in this application may be used to describe various elements herein, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element.
  • a first mode could be termed a second mode, and, similarly, a second mode could be termed a first mode, without departing from the scope of the present application.
  • Both the first mode and the second mode belong to the operation modes of the wearable device, but they are not the same operation mode.
  • the term “plurality” and the like used in the embodiments of the present application refer to two or more.
  • Fig. 1 is an application scenario diagram of a device unlocking method in an embodiment.
  • the terminal device 10 can establish a communication connection with the wearable device 20, and the terminal device can include but not limited to a mobile phone, a tablet computer, a vehicle terminal, a notebook computer, a PC (Personal Computer, personal computer), etc., and the terminal device can also could be a wearable device.
  • the wearable device 20 may include, but is not limited to, smart watches, smart bracelets, smart glasses, etc., but is not limited thereto.
  • the terminal device 10 and the wearable device 20 can establish a wireless communication connection, such as a Bluetooth connection, a Wi-Fi connection, etc., or a wired communication connection, and the way of the communication connection between the two is not limited in this embodiment of the application.
  • the terminal device 10 may respond to the unlocking instruction to release the lock screen state of the terminal device 10 .
  • the terminal device 10 can send verification information to the wearable device 20. After the wearable device 20 receives the verification information sent by the terminal device 10, it can verify the verification information. If the verification is successful, the wearable device 20 can be unlocked. screen status.
  • At least two operating systems can be installed in the wearable device 20, for example, the wearable device 20 can be installed with an embedded operating system (such as RTOS (Real Time Operating System, real-time operating system) etc.) and Intelligent operating systems (such as IOS system, Android (Android) system, etc.), can also be installed with multiple intelligent operating systems or multiple embedded systems, etc., the specific operating system installed on the wearable device 20 is described in the embodiment of the present application There is no limit in .
  • an embedded operating system such as RTOS (Real Time Operating System, real-time operating system) etc.
  • Intelligent operating systems such as IOS system, Android (Android) system, etc.
  • the wearable device 20 may include multiple processors, or may include a multi-core processor, for example, may include a dual-core processor, a quad-core processor, etc., so that different processors may be used to Or run different operating systems through different cores in the same processor.
  • a device unlocking method is provided, which can be applied to the above-mentioned terminal device, and the method may include the following steps:
  • Step 210 in response to the unlock instruction, release the lock screen state of the terminal device.
  • the user may input terminal unlocking information to unlock the terminal device.
  • the lock screen state can be used to protect the information security of the terminal device.
  • the user In the lock screen state, the user cannot normally use all functions of the terminal device (only simple functions such as emergency help can be used), and usually cannot view the data information on the terminal device.
  • the screen of the terminal device in the lock screen state, usually only displays the lock screen interface or the screen is directly powered off.
  • the terminal unlocking information can be preset information for unlocking the terminal device, and the terminal unlocking information can include but not limited to the agreed password, the agreed swipe gesture, the entered biometric information (such as face information, fingerprint information, pupil print information, etc.) information, voiceprint information, etc.) and so on.
  • the terminal device receives the terminal unlocking information input by the user, and matches the received terminal unlocking information with the stored unlocking information. If the matching is successful, it can generate an unlocking instruction, and release the lock screen state of the terminal device according to the unlocking instruction.
  • the matching success may refer to that the received terminal unlock information is completely consistent with the stored unlock information, or the similarity between the received terminal unlock information and the stored unlock information is greater than a similarity threshold (such as 95%, 97%, etc. ).
  • the terminal device can collect the face image through the camera and extract the face feature information of the face image.
  • the extracted face feature information can be combined with the stored face information. Matching is performed, and if the matching is successful, an unlocking instruction can be generated.
  • the terminal device After the terminal device unlocks the screen lock state, it can display the main interface of the terminal device, or display the relevant interface of the application running in the foreground on the terminal device, and the user can normally use various functions provided by the terminal device.
  • Step 220 sending verification information to the wearable device communicatively connected with the terminal device, so that the wearable device releases the lock screen state of the wearable device when the verification information is successfully verified.
  • a communication connection can be established between the terminal device and the wearable device.
  • the wearable device and the terminal device can be trusted devices.
  • the wearable device and the terminal device can belong to the same user, or although they belong to two users but the two users have an intimate relationship.
  • Wearable devices and terminal devices can perform trust authentication in advance, and use the trust mechanism to add each other to the list of trusted devices.
  • the terminal device can send verification information to the wearable device.
  • the verification information can be pre-agreed information used to verify the identity of the terminal device, such as one or more of pre-agreed tokens, passwords, signatures and other information, but not limited to this.
  • the wearable device After the wearable device receives the verification information sent by the terminal device, it can verify the verification information. Optionally, it can compare the received verification information with the stored verification information. If the two are consistent, the verification is successful. If the verification of the verification information is successful, the wearable device can release the lock screen state.
  • the terminal device may first determine whether the wearable device is currently in a lock screen state, and if it is determined that the wearable device is currently in a lock screen state, then send verification information to the wearable device .
  • the terminal device can send an unlock request to the wearable device. After the wearable device receives the unlock request, if the wearable device is currently locked, it can return a response message to the terminal device. The terminal device can determine the wearable The device is currently locked.
  • the unlock request may not be responded to, and if the terminal device does not receive the response information returned by the wearable device within the first time period, it may be determined that the wearable device is not currently in a locked screen state, Then there is no need to unlock the wearable device, which can further reduce the power consumption of the terminal device.
  • the above-mentioned first duration can be set according to actual needs, such as 3 seconds, 5 seconds, 4 seconds, etc., but is not limited thereto.
  • the first duration may be determined by the signal transmission speed between the terminal device and the wearable device, and therefore may also be obtained through multiple test experiments in advance.
  • FIG. 3 is a schematic diagram of a scenario in which a terminal device automatically unlocks a wearable device in an embodiment.
  • the terminal device 10 when the terminal device 10 is in the screen-locked state, in response to an unlocking instruction, the screen-locked state of the terminal device 10 is released, and the screen-locked interface is switched to the desktop of the terminal device 10 for display.
  • the terminal device 10 After the terminal device 10 is successfully unlocked, it sends verification information to the wearable device 20 connected to the communication.
  • the wearable device 20 in the locked screen state receives the verification information sent by the terminal device 10, it can verify the verification information, and when the verification is successful , unlock the screen lock status, and switch from the lock screen interface to the watch face interface for display.
  • the user does not need to additionally input unlocking information to the wearable device 20 , and since the terminal device 10 is in an unlocked state, the safety of the terminal device 10 automatically unlocking the wearable device 20 can be guaranteed.
  • the terminal device responds to the unlocking instruction, releases the lock screen state of the terminal device, and sends verification information to the wearable device communicatively connected with the terminal device, and the wearable device can verify the verification information. If the lock screen status of the wearable device is successfully released, when the user triggers the unlocking of the terminal device, the terminal device will automatically trigger the wearable device to unlock, without the user needing to enter the preset unlock password on the wearable device to unlock.
  • the wearable device can be unlocked more easily and quickly, and the intelligence of the wearable device is improved while ensuring the information security of the wearable device.
  • corresponding unlocking strategies can be set respectively for different operating conditions of the wearable device.
  • the terminal device can determine the current running status of the wearable device connected to the terminal device, and send verification information corresponding to the current running status to the wearable device to ensure that the wearable device can be successfully authenticated. unlock.
  • the running conditions of the wearable device may include the running mode of the wearable device, and the terminal device may determine the verification information to be sent according to the current running mode of the wearable device.
  • a device unlocking method is provided, which can be applied to the above-mentioned terminal device, and the method may include the following steps:
  • Step 402 in response to the unlock instruction, release the lock screen state of the terminal device.
  • step 402 reference may be made to relevant descriptions in the foregoing embodiments, and details are not repeated here.
  • Step 404 determine the current operating mode of the wearable device communicatively connected with the terminal device.
  • At least a first operating system and a second operating system may be installed in the wearable device, and the first operating system and the second operating system may run on different processors, or run on different cores of the same processor.
  • the operating power consumption of the first operating system can be greater than the operating power consumption of the second operating system, and the first operating system can be an intelligent operating system (such as Android operating system, IOS, etc.)
  • the second operating system may be an embedded operating system (such as RTOS, etc.) with relatively simple functions and poor performance but low power consumption.
  • the first operating system can run on the large-core processor of the wearable device
  • the second operating system can run on the small-core processor of the wearable device.
  • the large-core processor has better performance than the small-core processor.
  • the processing performance is higher than that of small-core processors.
  • Users can switch the operating system of the wearable device according to actual needs. When higher processing performance is required (such as using various applications, calling, surfing the Internet, etc.), the operating system of the wearable device can be switched to run on the The first operating system of the large-core processor can switch the operating system of the wearable device to the second operating system running on the small-core processor when it is necessary to reduce the power consumption of the wearable device, so as to improve the battery life of the wearable device.
  • the wearable device can also switch between the first operating system and the second operating system according to its actual operating requirements.
  • the operating power consumption can refer to the wearable device in this operating mode.
  • the generated power consumption, etc., and operating performance can refer to the usage rate of various hardware resources (such as processors, memory, etc.), data processing speed, and data types that can be processed by the wearable device in this operating mode.
  • the operating power consumption and operating performance in the same operating mode may be positively correlated, and the stronger the operating performance, the greater the operating power consumption.
  • the operating mode of the wearable device may include a first mode in which the first operating system continues to run in the foreground, a second mode in which only the second operating system runs, and a mode in which the first operating system and the second operating system Toggle between the third modes of operation.
  • Running the first operating system in the foreground may mean that the first operating system has the control authority of the peripherals of the wearable device (such as a display device, etc.), and can control the display device to display content.
  • the operating system running in the foreground is always the first operating system without switching, and the second operating system can be in a shutdown state, a dormant state, or run in the background.
  • the first operating system may be in a shutdown state, and the wearable device only runs the second operating system.
  • the operating system running in the foreground can switch between the first operating system and the second operating system, and the operating system not running in the foreground can be in a dormant state.
  • the operating system is in the shutdown state, which may refer to the processor corresponding to the operating system is in a state of complete power failure, and all modules of the operating system cannot run; the operating system is in the dormant state, which may refer to the The processor is in a power-off state, but some modules (such as communication modules, etc.) in the operating system are still running.
  • the first mode, the second mode, and the third mode respectively correspond to different operating power consumption and operating performance.
  • the operating power consumption of the first mode can be greater than that of the third mode, and the operating power consumption of the third mode can be greater than that of the second mode.
  • the operating performance of the first mode may be higher than that of the third mode, and the operating performance of the third mode may be higher than that of the second mode.
  • the above-mentioned first mode can be understood as the high-performance mode of the wearable device, which has high operating performance;
  • the second mode can be understood as the long battery life mode of the wearable device, which can make the wearable device operate at low power consumption;
  • the second mode The three modes can be understood as a balanced mode, taking into account both performance and battery life.
  • the wearable device can switch between the first operating system and the second operating system according to the actual operating conditions. For example, when the wearable device is busy, it can switch to the second operating system. One operating system runs, and can switch to the second operating system to run when the running is idle.
  • the terminal device After the terminal device is successfully unlocked, it can determine the current operating mode of the wearable device, and send verification information corresponding to the current operating mode to the wearable device according to the current operating mode of the wearable device, so as to verify The wearable device is unlocked.
  • the terminal device may send a mode acquisition request to the communication-connected wearable device, and the mode acquisition request is used to request the wearable device to acquire the current operating mode.
  • the wearable device receives the mode acquisition request sent by the terminal device, and may return the mode identifier corresponding to the current operating mode to the terminal device according to the mode acquisition request.
  • the terminal device can receive the mode identifier returned by the wearable device, and determine the current operating mode of the wearable device according to the mode identifier.
  • Different operating modes can correspond to different mode identifications, and the mode identification can be composed of one or more of letters, numbers, symbols, etc.
  • the mode identification corresponding to the first mode can be 01
  • the mode corresponding to the second mode can be
  • the logo can be 02
  • the mode logo corresponding to the third mode can be 03
  • the mode logo corresponding to the first mode can be mode A
  • the mode logo corresponding to the second mode can be mode B
  • the mode logo corresponding to the third mode can be mode C, etc., but not limited to this.
  • the terminal device first determines the current operating mode of the wearable device, and then sends the verification information, which can ensure the accuracy of the sent verification information, and can ensure the success rate and efficiency of successfully unlocking the wearable device.
  • Step 406 sending verification information corresponding to the current running mode to the wearable device, so that the wearable device releases the lock screen state of the wearable device when the verification information is successfully verified.
  • the above-mentioned first operating system may have TEE (Trusted execution environment, Trusted Execution Environment) security firmware, and may communicate and interact with TEE, wherein, TEE may be specially used for digital Space for copyright management, mobile payment and sensitive data protection, with strong security. Therefore, sensitive data can be stored and accessed under the first operating system.
  • TEE Trusted Execution Environment
  • the second operating system does not have TEE security firmware and cannot communicate with the TEE. Therefore, sensitive data cannot be stored and accessed under the second operating system.
  • the wearable device cannot be unlocked when running under the second operating system, causing inconvenience to users.
  • the current running mode of the wearable device may include any one of the above-mentioned first mode, second mode and third mode.
  • the terminal device can send a token and handle to the wearable device, and the token and handle are used to trigger the first mode of the wearable device.
  • the operating system verifies the token and handle, and releases the lock screen status of the wearable device after the verification is successful.
  • Verification information can include a token and a handle.
  • the token can be understood as a pass for the terminal device.
  • the terminal device can use the token to have the authority to unlock the wearable device.
  • the handle can be used to identify the token object, or It is understood as identifying the object of the terminal device. According to the token and handle, the wearable device can accurately identify that the terminal device has the permission to unlock, and unlock accordingly.
  • the wearable device can receive the token and handle sent by the terminal device through the first operating system, and pass the first operation The system verifies the token and the handle, and if the verification is successful, the first operating system releases the lock screen state of the wearable device.
  • the wearable device When the wearable device is in the third mode, if the first operating system is currently running in the foreground, the wearable device can receive the token and handle sent by the terminal device through the first operating system, and use the first operating system to Tokens and handles are authenticated.
  • the wearable device When the wearable device is in the third mode, if the second operating system is currently running and the first operating system is in a dormant state, the second operating system can send a wake-up command to the first operating system, and the wake-up command can be used to wake up the First operating system in hibernate state. After the second operating system receives the wake-up instruction sent by the first operating system, it can wake up according to the wake-up instruction, the wearable device can switch from the second operating system to the first operating system, and use the first operating system to activate the token and handle to verify.
  • the second operating system may send a wake-up instruction to the first operating system after receiving the mode acquisition request sent by the terminal device, so that the first operating system after awakening can receive the token sent by the terminal device and handle.
  • the second operating system may also send a wake-up instruction to the first operating system after receiving the token and handle sent by the terminal device, and then send the received token and handle to the wake-up to verify the token and handle through the first operating system.
  • the token and the handle are also used to trigger the first operating system of the wearable device to verify the token and the handle in the TEE, and release the lock screen state of the wearable device after the verification is successful.
  • the first operating system of the wearable device may verify the token and the handle in the TEE.
  • the first operating system can pass the token and the handle to the framework layer through the token authentication mechanism, and the framework layer can pass it to the TEE, and the token and the handle can be verified in the TEE.
  • the first operating system can search for a matching pre-stored token in the TEE according to the handle, and compare the token sent by the terminal device with the pre-stored token, and if the two are consistent, it can be determined Verification succeeded.
  • the first operating system may call a lock screen interface (such as an interface such as Keyguard) to close the lock screen interface and release the lock screen state of the wearable device.
  • FIG. 5A is a schematic structural diagram of a wearable device verifying a token and a handle through a first operating system in an embodiment.
  • the first operating system in the wearable device receives the token and the handle sent by the terminal device through a data transmission channel of the application layer (such as a Bluetooth transmission channel, etc.).
  • An unlocking application may be set in the application layer of the first operating system, and the unlocking application may implement message transfer between the first operating system in the wearable device and the terminal device, and call various interfaces provided locally.
  • the unlocking application can obtain the token and handle, and call the Trust Agent Service (trust agent service) provided by the framework layer, and pass the token and handle to the framework layer.
  • trust agent service Trust agent service
  • the framework layer of the first operating system can pass the token and handle to the Lock Setting Service (lock setting service) through the Trust Agent Service, and then pass the token and handle from the framework layer to the hardware abstraction layer by the gatekeeper function, and then transmit it into the TEE , tokens and handles can be verified in the TEE.
  • the gatekeeper function transmits data
  • the token and handle can be encrypted, and then the encrypted token and handle can be decrypted in the TEE, and the token and handle can be verified. If the token and handle are successfully verified in the TEE, a notification message indicating successful verification can be returned to the unlocking application. After receiving the notification message, the unlocking application can call Keyguard to close the lock screen interface and successfully unlock the wearable device.
  • the first operating system can verify the token and handle sent by the terminal device in the TEE, which improves the security of unlocking the wearable device .
  • the terminal device can send encrypted information corresponding to the handle to the wearable device; the encrypted information is used to trigger the second operation of the wearable device
  • the system verifies the encrypted information, and releases the lock screen status of the wearable device after the verification is successful.
  • the wearable device When the wearable device is in the second mode, the wearable device runs under the second operating system and will not actively switch to the first operating system, so it can be unlocked by the second operating system. Since the second operating system of the wearable device does not have TEE security firmware, it cannot access the TEE and cannot store sensitive data.
  • encrypted information corresponding to the handle may be stored in the second operating system.
  • the encrypted information may be information obtained by encrypting the handle.
  • the encrypted information corresponding to the handle includes a hash value and a salt value (salt value), and the hash value is obtained by calculating the handle and the salt value using a hash algorithm.
  • the salt value can be a random number
  • the salt value and the handle can be combined to obtain the target field
  • the hash algorithm can be used to calculate the target field to obtain the hash value.
  • the hash algorithm can include but not limited to MD4 information digest algorithm, MD5 information digest Any one of algorithms, SHA (Secure Hash Algorithm, secure hash algorithm), etc.
  • the second operating system may also calculate the first value according to the received hash value and salt value, and calculate the second value according to the stored hash value and stored salt value, and then combine the first value with the second value Compare the two values to determine whether they are consistent. If they are consistent, the verification is successful, which can further ensure the accuracy and security of the verification.
  • the second operating system After the second operating system successfully verifies the received hash value and salt value, it can call a lock screen interface (such as an interface such as Keyguard) to close the lock screen interface and release the lock screen state of the wearable device.
  • a lock screen interface such as an interface such as Keyguard
  • FIG. 5B is a schematic structural diagram of a wearable device verifying a hash value and a salt value through a second operating system in an embodiment.
  • the second operating system in the wearable device receives the hash value and the salt value sent by the terminal device through a data transmission channel of the application layer (such as a Bluetooth transmission channel, etc.).
  • the data transmission channel of the second operating system can pass the received hash value and salt value to the Keyguard task (lock screen module), and the Keyguard task has the function of verifying the hash value and salt value.
  • the Keyguard task can verify the obtained hash value and salt value. If the verification is successful, it can call Keyguard to close the lock screen interface and successfully unlock the wearable device.
  • a solution that the wearable device can be unlocked normally even when the wearable device is running under the second operating system is implemented, which meets different needs of users while ensuring the information security of the wearable device.
  • the terminal device may also send encrypted information corresponding to the handle to the wearable device, the The encrypted information can be used to trigger the second operating system of the wearable device to verify the encrypted information, and release the lock screen state of the wearable device after the verification is successful.
  • the second operating system of the wearable device can also be directly unlocked.
  • the terminal device can send encrypted information corresponding to the handle to the wearable device, and the second operating system of the wearable device can receive the encrypted information and verify the encrypted information.
  • the wearable device When the wearable device is in the third mode and currently runs the first operating system, it can be unlocked by the first operating system of the wearable device.
  • the terminal device can send the token and the handle to the wearable device, and the first operating system of the wearable device can receive the token and the handle, and verify the token and the handle.
  • the terminal device can send the verification information corresponding to the current operating mode to the wearable device according to the current operating mode of the wearable device, so as to ensure that the wearable device is in any operating mode. Unlocking can be performed normally, and the unlocking security of the wearable device can be guaranteed, further improving the intelligence of the wearable device.
  • the running status of the wearable device may include the state of the first operating system in the wearable device, and the terminal device may also determine the verification required to be sent according to the current state of the first operating system in the wearable device. information. After the terminal device responds to the unlock instruction and releases the lock screen state of the terminal device, it may determine the current state of the first operating system in the wearable device, and send verification information corresponding to the current state of the first operating system to the wearable device.
  • the current state of the first operating system may include any one of a sleep state, a shutdown state and a running state.
  • the terminal device may send a status acquisition request to the wearable device, where the status acquisition request is used to request the wearable device to acquire the current status of the first operating system.
  • the wearable device may send status information to the terminal device according to the status acquisition request, where the status information is used to represent the current status of the first operating system.
  • the status information may include a status identifier.
  • the current status of the first operating system is different and may correspond to different status identifiers.
  • the status identifier corresponding to the sleep state may be X
  • the status identifier corresponding to the shutdown state may be Y
  • the status identifier corresponding to the running state may be X
  • the state identifier corresponding to the state may be Z, etc., but is not limited thereto, and the state information may also include information such as a state name.
  • the terminal device receives the state information sent by the wearable device, and can determine the current state of the first operating system in the wearable device according to the state information.
  • the current state of the first operating system is a running state or a dormant state
  • the wearable device When the first operating system is in a running state or a dormant state, the wearable device can be unlocked by the first operating system.
  • the wearable device can receive the token and handle sent by the terminal device, and verify the token and handle through the first operating system. If the verification is successful, the first operating system releases the lock screen state of the wearable device.
  • the second operating system may send a wake-up instruction to the first operating system to wake up the first operating system in the dormant state, and the The first operating system verifies the token and the handle.
  • the current state of the first operating system is a shutdown state
  • send encrypted information corresponding to the handle to the wearable device the encrypted information is used to trigger the second operating system of the wearable device to verify the encrypted information, and Release the lock screen status of the wearable device after successful authentication.
  • the wearable device can be unlocked by the second operating system.
  • the wearable device can receive the encrypted information corresponding to the handle sent by the terminal device, and verify the encrypted information through the second operating system. If the verification is successful, the second operating system releases the lock screen state of the wearable device.
  • the terminal device can send the verification information corresponding to the current state of the first operating system to the wearable device according to the current state of the first operating system in the wearable device, so as to ensure that the wearable device is It can be successfully unlocked under any circumstances, and can guarantee the security of unlocking the wearable device while taking into account the unlocking efficiency.
  • the terminal device and the wearable device before using the terminal device to unlock the wearable device, can agree on verification information, and save the verification information, so that when the terminal device is unlocked, the saved verification information can be used to automatically Unlock the wearable.
  • the above method may further include the following steps:
  • Step 602 Receive a registration instruction sent by a wearable device communicatively connected to the terminal device, where the registration instruction is generated when the wearable device detects a trigger operation on an unlock switch.
  • the wearable device may be provided with an unlock switch, which may be used to select on/off the function of automatically unlocking the wearable device by the terminal device.
  • the unlock switch may be a physical switch or a virtual switch, which is not limited herein.
  • the trigger operation can include but not limited to touch operations such as click operations and slide operations. It is an operation in other interactive modes such as a voice control operation, and the implementation manner of the trigger operation is not specifically limited in this embodiment of the present application.
  • a registration instruction can be sent to the communication-connected terminal device, and the registration instruction can be used to instruct the terminal device to generate a token.
  • Step 604 generate a token according to the registration instruction, and send the token to the wearable device, so that the wearable device registers the token and generates a handle corresponding to the token.
  • the terminal device can generate a token according to the registration instruction.
  • the token can be a field composed of a randomly generated character string, or a field generated according to a preset generation rule.
  • the preset generation rule can specify the field composition format of the token, for example, it can be stipulated that the first 2 digits of the token are English word lines TK, and the last 4 digits of the token can be random numbers, etc., which are generated according to the preset Rule-generated tokens can facilitate effective identification of wearable devices and ensure the accuracy of tokens.
  • the terminal device can send the generated token to the wearable device, and the wearable device can register the token and generate a handle corresponding to the token.
  • the wearable device may receive the token sent by the terminal device through the first operating system, register the token through the first operating system, and generate a handle corresponding to the token.
  • the first operating system in the wearable device can receive the token sent by the terminal device and convert the token into a key, and the first operating system can encrypt the master key according to the key , the master key may be key information pre-stored in the first operating system.
  • the first operating system can receive the input unlock password, and decrypt the encrypted master key according to the unlock password, if the decryption is successful, it can register the token, and generate a handle corresponding to the token.
  • a password input box may pop up, and the password input box may be used to provide the user with an unlock password for inputting the wearable device.
  • the first operating system successfully unlocks the encrypted master key according to the unlock password input by the user. This process is equivalent to activating the token, and the activated token is a valid token that can be used to unlock the wearable device.
  • the first operating system can transfer the token to the TEE through the framework layer for registration and storage, and generate a handle corresponding to the token, and the TEE can also save the handle, and then send the generated handle to the terminal device.
  • the token and handle can also be stored in the password management module provided by the framework layer of the first operating system. When the token and handle need to be verified, the first operating system can store the token stored in the password management module And the handle, and the token and handle sent by the terminal device are passed to the TEE for verification.
  • the first operating system after the first operating system generates the handle, it can also generate encrypted information corresponding to the handle, and send the encrypted information to the second operating system, and the second operating system saves the encrypted information.
  • the first operating system can randomly generate a salt value, and combine the handle with the salt value to obtain a target field, and the first operating system can use a hash algorithm to calculate the target field to obtain a hash value, Then, the calculated hash value and salt value are sent to the second operating system.
  • the second operating system After receiving the hash value and salt value sent by the first operating system, the second operating system may store the hash value and salt value in the memory. Further, the first operating system may send the hash value and the salt value to the second operating system through a communication service with the second operating system.
  • Step 606 receive the handle returned by the wearable device, and save the token and the handle.
  • the terminal device After the terminal device receives the handle returned by the wearable device, it can save the token and the handle, and further, receive the hash value and salt value sent by the wearable device, and process the hash value and salt value sent by the wearable device. save.
  • the terminal device can unlock the wearable device according to the stored verification information.
  • the terminal device can determine the current operating mode of the wearable device, if the current operating mode of the wearable device is the first mode (the first operating system continues to run in the foreground) or the third mode (the first operating system and the second operating system operating system switching operation), the terminal device can send the saved token and handle to the wearable device, so that the first operating system in the wearable device can be verified and unlocked; if the wearable device is currently in the operating mode In the second mode (running only on the second operating system), the terminal device can send the hash value and salt value to the wearable device, so that the second operating system in the wearable device can be verified and unlocked.
  • the unlocking function provided by the terminal device to automatically unlock the wearable device can be integrated into an application program capable of interacting with the wearable device, for example, it can be integrated into a health monitoring application program, which can be accessed from The wearable device obtains and displays the human health data collected by the wearable device, and it may also be other applications, which are not limited here.
  • the application integrated with the unlocking function of the wearable device detects the unlocking event of the terminal device, it can send verification information to the wearable device to request the wearable device to unlock, which can unlock the wearable device more easily and quickly.
  • Fig. 7 is a schematic sequence diagram of a method for unlocking a device in an embodiment.
  • the first operating system of the wearable device may send a registration instruction to the terminal device.
  • the terminal device may generate a token, and send the token to the first operating system of the wearable device.
  • the first operating system of the wearable device can register the token, generate a handle, and save the token and the handle.
  • the first operating system can send the handle to the terminal device, and the terminal device can save the token and the handle.
  • the first operating system of the wearable device may also randomly generate a salt value, calculate a hash value according to the handle and the salt value, and then send the salt value and the hash value to the second operating system.
  • the second operating system may save the salt and hash values sent by the first operating system.
  • the first operating system may also send the salt value and the hash value to the terminal device, and the terminal device may store the salt value and the hash value.
  • the terminal device When the terminal device unlocks the screen lock state, it can determine the current operating mode of the wearable device. If the wearable device is in the first mode or the third mode, the terminal device may send the token and the handle to the first operating system of the wearable device. The first operating system of the wearable device can verify the received token and handle, and unlock it if the verification is successful. If the wearable device is in the second mode, the terminal device can send the salt value and hash value to the second operating system of the wearable device, and the second operating system of the wearable device can verify the received salt value and hash value , if the verification is successful, unlock it.
  • the information transmitted between the terminal device and the wearable device can be encrypted information, for example, after the terminal device generates the token, it can use the agreed key to encrypt the token , and send the encrypted token to the wearable device. After the wearable device generates the handle, it can also encrypt the handle according to the agreed key, and send the encrypted handle to the terminal device, etc., to ensure that the terminal device and the wearable device The verification information transmitted between them is encrypted, which further improves the information security and prevents the leakage of verification information.
  • the verification information can be agreed upon between the terminal device and the wearable device, and the verification information can be saved, so that the wearable device can be automatically unlocked by using the saved verification information when the terminal device is unlocked, and the terminal device can be automatically unlocked when the user triggers the terminal device.
  • the terminal device will automatically trigger the wearable device to unlock, without the need for the user to enter the preset unlock password on the wearable device to unlock, which can unlock the wearable device more easily and quickly, and protect the wearable device While improving information security, it improves the intelligence of wearable devices.
  • another device unlocking method is provided, which can be applied to the above-mentioned wearable device, and the method may include the following steps:
  • Step 810 Receive verification information sent by a terminal device communicatively connected to the wearable device, where the verification information is sent by the terminal device when the screen lock state is released.
  • Step 820 verify the verification information, and release the lock screen state of the wearable device if the verification is successful.
  • step 810 includes: receiving verification information corresponding to the current operating conditions of the wearable device sent by a terminal device communicatively connected with the wearable device.
  • the running status includes the running mode, and before the step of receiving the verification information corresponding to the current running status of the wearable device sent by the terminal device communicatively connected with the wearable device, it also includes: receiving the communication with the wearable device A mode acquisition request sent by the connected terminal device; according to the mode acquisition request, the mode identifier corresponding to the current operating mode is returned to the terminal device, so that the terminal device determines the current operating mode of the wearable device according to the mode identifier.
  • the wearable device is installed with a first operating system and a second operating system; the operating modes include the first mode in which the first operating system continues to run in the foreground, and the second mode in which the second operating system only runs.
  • the step is to receive the verification information corresponding to the current operation status of the wearable device sent by the terminal device connected to the wearable device, including: if the current operation mode of the wearable device is the first mode, then receiving the verification information sent by the terminal device A token and a handle; if the current running mode of the wearable device is the second mode, the encrypted information corresponding to the handle sent by the terminal device is received.
  • Step 820 includes: if the current running mode of the wearable device is the first mode, verify the token and the handle through the first operating system, and if the verification is successful, release the wearable device from the first operating system. lock screen status; if the current operating mode of the wearable device is the second mode, the encrypted information will be verified through the second operating system, and if the verification is successful, the wearable device will be unlocked by the second operating system screen status.
  • the trusted execution environment TEE security firmware is not provided under the second operating system.
  • the running mode further includes a third mode for switching running between the first operating system and the second operating system.
  • the step is to receive the verification information corresponding to the current operation status of the wearable device sent by the terminal device connected to the wearable device, including: if the current operation mode of the wearable device is the third mode, then receiving the verification information sent by the terminal device tokens and handles.
  • Step 820 including: if the current operating mode of the wearable device is the third mode, verify the token and the handle through the first operating system, and if the verification is successful, release the wearable device from the first operating system. lock screen status.
  • the method may further include : sending a wake-up instruction to the first operating system through the second operating system, where the wake-up instruction is used to wake up the first operating system in a dormant state.
  • the step of receiving the verification information corresponding to the current operation status of the wearable device sent by the terminal device communicatively connected with the wearable device includes: if the current operation mode of the wearable device is the third mode, And the wearable device currently runs the second operating system, then receives the encrypted information corresponding to the handle sent by the terminal device.
  • Step 820 including: if the current operating mode of the wearable device is the third mode, and the wearable device is currently running the second operating system, then verify the encrypted information through the second operating system, and if the verification is successful Next, the lock screen state of the wearable device is released by the second operating system.
  • the first operating system is provided with TEE security firmware.
  • the step of verifying the token and the handle through the first operating system includes: verifying the token and the handle in the TEE through the first operating system.
  • the terminal device can send the verification information corresponding to the current operating mode to the wearable device according to the current operating mode of the wearable device, so as to ensure that the wearable device is in any operating mode. Unlocking can be performed normally, and the unlocking security of the wearable device can be guaranteed, further improving the intelligence of the wearable device.
  • the step of receiving the verification information corresponding to the current operation status of the wearable device sent by the terminal device connected in communication with the wearable device includes: receiving the verification information sent by the terminal device connected in communication with the wearable device and corresponding to the first Verification information corresponding to the current state of the operating system; wherein, the current state includes any one of a dormant state, a shutdown state, and a running state.
  • the step of receiving the verification information corresponding to the current state of the first operating system sent by the terminal device communicatively connected to the wearable device includes: if the current state of the first operating system is a running state or a dormant state, Then receive the token and the handle sent by the terminal device; if the current state of the first operating system is a shutdown state, then receive the encrypted information corresponding to the handle sent by the terminal device.
  • the step of verifying the verification information, and if the verification is successful, releasing the lock screen state of the wearable device includes: if the current state of the first operating system is the running state or the dormant state, passing the first The operating system verifies the token and the handle, and if the verification is successful, the first operating system releases the lock screen state of the wearable device; The second operating system verifies the encrypted information, and if the verification is successful, the second operating system releases the lock screen state of the wearable device.
  • the method before the step of receiving the verification information sent by the terminal device communicatively connected to the wearable device, the method further includes the following steps:
  • Step 902 If a trigger operation on the unlock switch is detected, in response to the trigger operation, send a registration instruction to the terminal device communicatively connected with the wearable device, where the registration instruction is used to instruct the terminal device to generate a token.
  • Step 904 receiving the token sent by the terminal device, registering the token, and generating a handle corresponding to the token.
  • step 904 may include: receiving the token sent by the terminal device through the first operating system, registering the token, and generating a handle corresponding to the token.
  • the step of receiving the token sent by the terminal device through the first operating system, registering the token, and generating a handle corresponding to the token includes: receiving the token sent by the terminal device through the first operating system, And convert the token into a key; encrypt the master key according to the key through the first operating system; receive the input unlock password through the first operating system, and decrypt the encrypted master key according to the unlock password, if the decryption If successful, the token is registered and a handle corresponding to the token is generated.
  • the method further includes: generating encrypted information corresponding to the handle through the first operating system, sending the encrypted information to the second operating system, and storing the encrypted information by the second operating system.
  • the step of generating encrypted information corresponding to the handle through the first operating system, and sending the encrypted information to the second operating system includes: randomly generating a salt value through the first operating system, and combining the handle and the salt value The target field is obtained; the target field is calculated by using a hash algorithm through the first operating system to obtain a hash value; the salt value and the hash value are sent to the second operating system through the first operating system.
  • Step 906 sending the handle to the terminal device, so that the terminal device saves the token and the handle.
  • the verification information can be agreed upon between the terminal device and the wearable device, and the verification information can be saved, so that the wearable device can be automatically unlocked by using the saved verification information when the terminal device is unlocked, and the terminal device can be automatically unlocked when the user triggers the terminal device.
  • the terminal device will automatically trigger the wearable device to unlock, without the need for the user to enter the preset unlock password on the wearable device to unlock, which can unlock the wearable device more easily and quickly, and protect the wearable device While improving information security, it improves the intelligence of wearable devices.
  • a device unlocking apparatus 1000 is provided, which can be applied to the above-mentioned terminal device.
  • the device unlocking device 1000 may include an unlocking module 1010 and a sending module 1020 .
  • the unlocking module 1010 is configured to release the lock screen state of the terminal device in response to the unlock instruction.
  • the sending module 1020 is configured to send verification information to the wearable device communicatively connected with the terminal device, so that the wearable device releases the lock screen state of the wearable device when the verification information is successfully verified.
  • the device unlocking apparatus 1000 includes not only the unlocking module 1010 and the sending module 1020 , but also a running condition determination module.
  • the operating condition determining module is configured to determine the current operating condition of the wearable device communicatively connected to the terminal device.
  • the running situation includes a running mode
  • the running situation determining module is further configured to send a mode acquisition request to the wearable device communicatively connected to the terminal device, and the mode acquisition request is used to request the wearable device to obtain the current mode.
  • Operating mode receive the mode identification returned by the wearable device, and determine the current operating mode of the wearable device according to the mode identification.
  • the sending module 1020 is further configured to send verification information corresponding to the current running situation to the wearable device.
  • the wearable device is installed with a first operating system and a second operating system; the running modes include the first mode in which the first operating system continues to run in the foreground, and the second mode in which the second operating system only runs.
  • the sending module 1020 is also used to send the token and the handle to the wearable device if the current operating mode of the wearable device is the first mode; the token and the handle are used to trigger the first operating system of the wearable device to command The card and the handle are verified, and the lock screen status of the wearable device is released after the verification is successful; and it is used to send the encrypted information corresponding to the handle to the wearable device if the current operating mode of the wearable device is the second mode ; The encrypted information is used to trigger the second operating system of the wearable device to verify the encrypted information, and release the lock screen state of the wearable device after the verification is successful.
  • the trusted execution environment TEE security firmware is not provided under the second operating system.
  • the running mode further includes a third mode for switching running between the first operating system and the second operating system.
  • the sending module 1020 is also configured to send a token and a handle to the wearable device if the current operating mode of the wearable device is the third mode; the token and the handle are used to trigger the first operating system of the wearable device Verify the token and handle, and release the lock screen status of the wearable device after the verification is successful; or, if the current operating mode of the wearable device is the third mode, and the wearable device is currently running the second operating system,
  • the encrypted information corresponding to the handle is sent to the wearable device; the encrypted information is used to trigger the second operating system of the wearable device to verify the encrypted information, and release the lock screen state of the wearable device after the verification is successful.
  • the first operating system has TEE security firmware; the token and the handle are also used to trigger the first operating system of the wearable device to verify the token and the handle in the TEE, and release the wearable device after successful verification.
  • the lock screen state of the device is also used to trigger the first operating system of the wearable device to verify the token and the handle in the TEE, and release the wearable device after successful verification.
  • the encrypted information corresponding to the handle includes a hash value and a salt value
  • the hash value is obtained by calculating the handle and the salt value using a hash algorithm.
  • the running status determination module is also used to determine the current state of the first operating system in the wearable device, and the current state includes any one of the dormant state, the shutdown state and the running state.
  • the sending module 1020 is further configured to send verification information corresponding to the current state of the first operating system to the wearable device.
  • the sending module 1020 is further configured to send the token and the handle to the wearable device if the current state of the first operating system is the running state or the dormant state; the token and the handle are used to trigger the wearable device
  • the first operating system verifies the token and the handle, and releases the lock screen state of the wearable device after the verification is successful; if the current state of the first operating system is a power-off state, then the wearable device sends a message corresponding to the handle to the wearable device.
  • Encrypted information the encrypted information is used to trigger the second operating system of the wearable device to verify the encrypted information, and release the lock screen state of the wearable device after the verification is successful.
  • the device unlocking apparatus 1000 further includes a receiving module, a token generating module and a saving module.
  • the receiving module is configured to receive a registration instruction sent by a wearable device communicatively connected to the terminal device, where the registration instruction is generated when the wearable device detects a trigger operation on the unlock switch.
  • the token generating module is configured to generate a token according to the registration instruction, and send the token to the wearable device, so that the wearable device registers the token and generates a handle corresponding to the token.
  • the saving module is used to receive the handle returned by the wearable device, and save the token and the handle.
  • the terminal device when the user triggers the unlocking of the terminal device, the terminal device will automatically trigger the wearable device to be unlocked, without the need for the user to additionally enter the preset unlock password on the wearable device to unlock, which can be more convenient and faster. Unlocking the wearable device improves the intelligence of the wearable device while ensuring the information security of the wearable device.
  • a device unlocking device 1100 is provided, which can be applied to the above-mentioned wearable devices.
  • the device unlocking device 1100 may include a receiving module 1110 and a verification module 1120 .
  • the receiving module 1110 is configured to receive verification information sent by a terminal device communicatively connected to the wearable device, and the verification information is sent by the terminal device when the screen lock state is released.
  • the verification module 1120 is configured to verify the verification information, and if the verification is successful, release the lock screen state of the wearable device.
  • the receiving module 1110 is further configured to receive verification information corresponding to the current operating conditions of the wearable device sent by a terminal device communicatively connected with the wearable device.
  • the wearable device is installed with a first operating system and a second operating system; the operating conditions include operating modes, and the operating modes include the first mode in which the first operating system continues to run in the foreground, and only runs in the second operating system. of the second mode.
  • the receiving module 1110 is also used to receive the token and handle sent by the terminal device if the current operating mode of the wearable device is the first mode; if the current operating mode of the wearable device is the second mode, receive The encrypted information corresponding to the handle sent by the terminal device.
  • the device unlocking apparatus 1100 further includes a mode confirmation module.
  • the mode confirmation module is used to receive the mode acquisition request sent by the terminal device connected to the wearable device in communication; according to the mode acquisition request, return the mode identification corresponding to the current operating mode to the terminal device, so that the terminal device can determine the mode according to the mode identification The current operating mode of the wearable device.
  • the verification module 1120 is also used to verify the token and the handle through the first operating system if the current running mode of the wearable device is the first mode, and if the verification is successful, the The first operating system releases the lock screen state of the wearable device; if the current operating mode of the wearable device is the second mode, the encrypted information is verified through the second operating system, and if the verification is successful, the second The operating system removes the lock screen state of the wearable device.
  • the operating power consumption of the first operating system is greater than that of the second operating system, and the second operating system does not have TEE security firmware.
  • the running mode further includes a third mode for switching running between the first operating system and the second operating system.
  • the receiving module 1110 is also configured to receive the token and the handle sent by the terminal device if the current running mode of the wearable device is the third mode.
  • the verification module 1120 is also used to verify the token and the handle through the first operating system if the current operating mode of the wearable device is the third mode. The lock screen status of the wearable device.
  • the device unlocking apparatus 1100 further includes a wake-up module.
  • the wake-up module is also used to pass the second operating system before the verification module 1120 verifies the token and the handle through the first operating system if the wearable device is currently in the third mode and is currently running the second operating system.
  • the second operating system sends a wake-up instruction to the first operating system, and the wake-up instruction is used to wake up the first operating system in a dormant state.
  • the receiving module 1110 is further configured to receive the encrypted message corresponding to the handle sent by the terminal device if the wearable device is currently in the third mode and the wearable device is currently running the second operating system. information.
  • the verification module 1120 is also used to verify the encrypted information through the second operating system if the current operating mode of the wearable device is the third mode and the wearable device is currently running the second operating system. In the case of , the lock screen state of the wearable device is released by the second operating system.
  • the first operating system is provided with TEE security firmware.
  • the verification module 1120 is further configured to verify the token and the handle in the TEE through the first operating system.
  • the receiving module 1110 is further configured to receive verification information corresponding to the current state of the first operating system sent by a terminal device communicatively connected to the wearable device; wherein, the current state includes a dormant state, a power-off state and any of the operating states.
  • the receiving module 1110 is also configured to receive the token and handle sent by the terminal device if the current state of the first operating system is the running state or the dormant state; if the current state of the first operating system is the shutdown state , then receive the encrypted information corresponding to the handle sent by the terminal device.
  • the verification module 1120 is further configured to verify the token and the handle through the first operating system if the current state of the first operating system is the running state or the dormant state, and if the verification is successful, the first operating system Release the lock screen state of the wearable device; if the current state of the first operating system is the shutdown state, then verify the encrypted information through the second operating system, and if the verification is successful, the wearable device is released by the second operating system Lock screen status.
  • the device unlocking apparatus 1100 further includes a sending module and a token registration module.
  • the sending module is configured to send a registration instruction to the terminal device communicatively connected to the wearable device in response to the trigger operation if a trigger operation on the unlock switch is detected, and the registration instruction is used to instruct the terminal device to generate a token.
  • the token registration module is also used to receive the token sent by the terminal device, register the token, and generate a handle corresponding to the token.
  • the token registration module is further configured to receive the token sent by the terminal device through the first operating system, register the token, and generate a handle corresponding to the token.
  • the token registration module is also used to receive the token sent by the terminal device through the first operating system, and convert the token into a key; encrypt the master key according to the key through the first operating system ; Receive the input unlock password through the first operating system, and decrypt the encrypted master key according to the unlock password, if the decryption is successful, register the token, and generate a handle corresponding to the token.
  • the device unlocking apparatus 1100 further includes a calculation module.
  • the calculation module is used to generate encrypted information corresponding to the handle through the first operating system, send the encrypted information to the second operating system, and store the encrypted information by the second operating system.
  • the calculation module is further configured to randomly generate a salt value through the first operating system, and combine the handle and the salt value to obtain the target field; the first operating system uses a hash algorithm to calculate the target field to obtain the hash value Hash; sending the salt and hash to the second operating system via the first operating system.
  • the sending module is also used to send the handle to the terminal device, so that the terminal device saves the token and the handle.
  • the terminal device when the user triggers the unlocking of the terminal device, the terminal device will automatically trigger the wearable device to be unlocked, without the need for the user to additionally enter the preset unlock password on the wearable device to unlock, which can be more convenient and faster. Unlocking the wearable device improves the intelligence of the wearable device while ensuring the information security of the wearable device.
  • Fig. 12 is a structural block diagram of a terminal device in an embodiment.
  • the terminal device 1200 may include one or more of the following components: a processor 1210, a memory 1220 coupled to the processor 1210, wherein the memory 1220 may store one or more computer programs, one or more computer programs It may be configured to be executed by one or more processors 1210 to implement the methods applied to the terminal device as described in the foregoing embodiments.
  • Processor 1210 may include one or more processing cores.
  • the processor 1210 uses various interfaces and lines to connect various parts of the entire terminal device 1200, and executes or executes instructions, programs, code sets or instruction sets stored in the memory 1220, and calls data stored in the memory 1220 to execute Various functions and processing data of the terminal device 1200.
  • the processor 1210 may adopt at least one of Digital Signal Processing (Digital Signal Processing, DSP), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA), and Programmable Logic Array (Programmable Logic Array, PLA). implemented in the form of hardware.
  • DSP Digital Signal Processing
  • FPGA Field-Programmable Gate Array
  • PLA Programmable Logic Array
  • the processor 1210 may integrate one or a combination of a central processing unit (Central Processing Unit, CPU), an image processor (Graphics Processing Unit, GPU), a modem, and the like.
  • CPU Central Processing Unit
  • GPU Graphics Processing Unit
  • the CPU mainly handles the operating system, user interface and application programs, etc.
  • the GPU is used to render and draw the displayed content
  • the modem is used to handle wireless communication. It can be understood that the above modem may also not be integrated into the processor 1210, but implemented by a communication chip alone.
  • the memory 1220 may include a random access memory (Random Access Memory, RAM), and may also include a read-only memory (Read-Only Memory, ROM).
  • the memory 1220 may be used to store instructions, programs, codes, sets of codes or sets of instructions.
  • the memory 1220 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system and instructions for implementing at least one function (such as a touch function, a sound playback function, an image playback function, etc.) , instructions for implementing the foregoing method embodiments, and the like.
  • the storage data area can also store data created by the terminal device 1200 during use, and the like.
  • the terminal device 1200 may include more or fewer structural elements than those in the above structural block diagram, for example, including a power supply module, a physical button, a WiFi (Wireless Fidelity, wireless fidelity) module, a speaker, a Bluetooth module, a sensor, etc. , and may not be limited here.
  • a power supply module for example, including a power supply module, a physical button, a WiFi (Wireless Fidelity, wireless fidelity) module, a speaker, a Bluetooth module, a sensor, etc.
  • WiFi Wireless Fidelity, wireless fidelity
  • the embodiment of the present application discloses a wearable device, including a processor and a memory coupled to the processor, wherein the memory can store one or more computer programs, and one or more computer programs can be configured to be processed by one or more When the device is executed, the wearable methods described in the above embodiments are implemented.
  • the embodiment of the present application discloses a computer-readable storage medium, which stores a computer program, where, when the computer program is executed by a processor, the method applied to the terminal device as described in the foregoing embodiments is implemented.
  • the embodiment of the present application discloses a computer-readable storage medium, which stores a computer program, wherein, when the computer program is executed by a processor, the method applied to a wearable device as described in the above-mentioned embodiments is implemented.
  • the embodiment of the present application discloses a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and when the computer program is executed by a processor, the application as described in the above-mentioned embodiments can be implemented. method of the end device.
  • the embodiment of the present application discloses a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and when the computer program is executed by a processor, the application as described in the above-mentioned embodiments can be implemented. approach to wearable devices.
  • the processes in the methods of the above embodiments can be realized through computer programs to instruct related hardware, and the programs can be stored in a non-volatile computer-readable storage medium When the program is executed, it may include the processes of the embodiments of the above-mentioned methods.
  • the storage medium may be a magnetic disk, an optical disk, a ROM, or the like.
  • Non-volatile memory may include ROM, Programmable ROM (PROM), Erasable PROM (Erasable PROM, EPROM), Electrically Erasable PROM (Electrically Erasable PROM, EEPROM) or flash memory.
  • Volatile memory can include random access memory (RAM), which acts as external cache memory.
  • RAM can take many forms, such as static RAM (Static RAM, SRAM), dynamic RAM (Dynamic Random Access Memory, DRAM), synchronous DRAM (synchronous DRAM, SDRAM), double data rate SDRAM (Double data rate Data Rate SDRAM, DDR SDRAM), enhanced SDRAM (Enhanced Synchronous DRAM, ESDRAM), synchronous link DRAM (Synchlink DRAM, SLDRAM), memory bus direct RAM (Rambus DRAM, RDRAM) and direct memory bus dynamic RAM (Direct Rambus DRAM) , DRDRAM).
  • static RAM Static RAM, SRAM
  • dynamic RAM Dynamic Random Access Memory
  • SDRAM synchronous DRAM
  • double data rate SDRAM Double data rate Data Rate SDRAM, DDR SDRAM
  • enhanced SDRAM Enhanced Synchronous DRAM, ESDRAM
  • synchronous link DRAM Synchlink DRAM, SLDRAM
  • memory bus direct RAM Rabus DRAM, RDRAM
  • Direct Rambus DRAM Direct Rambus DRAM
  • Each functional unit in each embodiment of the present application may be integrated into one processing unit, each unit may exist separately physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware or in the form of software functional units.
  • the above-mentioned integrated units are realized in the form of software function units and sold or used as independent products, they can be stored in a computer-accessible memory.
  • the technical solution of the present application in essence, or the part that contributes to the prior art, or all or part of the technical solution, can be embodied in the form of a software product, and the computer software product is stored in a memory , including several requests to make a computer device (which may be a personal computer, server, or network device, etc., specifically, a processor in the computer device) execute some or all of the steps of the above-mentioned methods in various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本申请实施例公开了一种设备解锁方法、装置、电子设备及计算机可读存储介质。该方法应用于终端设备,该方法包括:响应于解锁指令,解除所述终端设备的锁屏状态;向与所述终端设备通信连接的可穿戴设备发送验证信息,以使得所述可穿戴设备在对所述验证信息验证成功的情况下,解除所述可穿戴设备的锁屏状态。上述的设备解锁方法、装置、电子设备及计算机可读存储介质,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。

Description

设备解锁方法、装置、电子设备及计算机可读存储介质
本申请要求于2022年1月26日提交、申请号为202210094454.4、发明名称为“设备解锁方法、装置、电子设备及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息安全技术领域,具体涉及一种设备解锁方法、装置、电子设备及计算机可读存储介质。
背景技术
随着电子技术的不断发展,可穿戴设备(如智能手表等)上也具备了越来越丰富的功能,如支付功能、健康监测功能等,如何有效保障可穿戴设备的信息安全也成为了许多用户关注的问题。目前可穿戴设备为了保障信息安全,会提供锁屏功能,用户需要在可穿戴设备上输出预设的密码才能够对可穿戴设备进行解锁,但是由于受限于可穿戴设备的交互区域(如触控屏等)的面积,导致操作不便。
发明内容
本申请实施例公开了一种设备解锁方法、装置、电子设备及计算机可读存储介质,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。
本申请实施例公开了一种设备解锁方法,应用于终端设备,所述方法包括:
响应于解锁指令,解除所述终端设备的锁屏状态;
向与所述终端设备通信连接的可穿戴设备发送验证信息,以使得所述可穿戴设备在对所述验证信息验证成功的情况下,解除所述可穿戴设备的锁屏状态。
本申请实施例公开了一种设备解锁方法,应用于可穿戴设备,所述方法包括:
接收与所述可穿戴设备通信连接的终端设备发送的验证信息,所述验证信息为所述终端设备在解除锁屏状态的情况下发送的;
对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态。
本申请实施例公开了一种设备解锁装置,应用于终端设备,所述装置包括:
解锁模块,用于响应于解锁指令,解除所述终端设备的锁屏状态;
发送模块,用于向与所述终端设备通信连接的可穿戴设备发送验证信息,以使得所述可穿戴设备在对所述验证信息验证成功的情况下,解除所述可穿戴设备的锁屏状态。
本申请实施例公开了一种设备解锁装置,应用于可穿戴设备,所述装置包括:
接收模块,用于接收与所述可穿戴设备通信连接的终端设备发送的验证信息,所述验证信息为所述终端设备在解除锁屏状态的情况下发送的;
验证模块,用于对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态。
本申请实施例公开了一种电子设备,包括存储器及处理器,所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器实现如上任一所述的方法。
本申请实施例公开了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现如上任一所述的方法。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和有益效果将从说明书、附图以及权利要求书中体现。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不 付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为一个实施例中设备解锁方法的应用场景图;
图2为一个实施例中设备解锁方法的流程图;
图3为一个实施例中终端设备自动解锁可穿戴设备的场景示意图;
图4为另一个实施例中设备解锁方法的流程图;
图5A为一个实施例中可穿戴设备通过第一操作系统验证令牌及句柄的架构示意图;
图5B为一个实施例中可穿戴设备通过第二操作系统验证哈希值及盐值的架构示意图;
图6为一个实施例中终端设备与可穿戴设备之间约定验证信息的流程图;
图7为一个实施例中设备解锁方法的时序示意图;
图8为又一个实施例中设备解锁方法的流程图;
图9为另一个实施例中终端设备与可穿戴设备之间约定验证信息的流程图;
图10为一个实施例中设备解锁装置的框图;
图11为另一个实施例中设备解锁装置的框图;
图12为一个实施例中终端设备的结构框图。
具体实施方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
需要说明的是,本申请实施例及附图中的术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
可以理解,本申请所使用的术语“第一”、“第二”等可在本文中用于描述各种元件,但这些元件不受这些术语限制。这些术语仅用于将第一个元件与另一个元件区分。举例来说,在不脱离本申请的范围的情况下,可以将第一模式称为第二模式,且类似地,可将第二模式称为第一模式。第一模式和第二模式两者属于可穿戴设备的运行模式,但其不是同一运行模式。另外,需要说明的是,本申请实施例中所使用的术语“多个”等指的是两个或两个以上。
图1为一个实施例中设备解锁方法的应用场景图。如图1所示,终端设备10可与可穿戴设备20建立通信连接,终端设备可包括但不限于手机、平板电脑、车载终端、笔记本电脑、PC(Personal Computer,个人计算机)等,终端设备也可以是可穿戴设备。可穿戴设备20可包括但不限于智能手表、智能手环、智能眼镜等,但不限于此。终端设备10可与可穿戴设备20之间可建立无线通信连接,如蓝牙连接、Wi-Fi连接等,也可建立有线通信连接,二者的通信连接的方式在本申请实施例中不作限制。
终端设备10可响应用于解锁指令,解除终端设备10的锁屏状态。终端设备10可向可穿戴设备20发送验证信息,可穿戴设备20接收终端设备10发送的验证信息后,可对该验证信息进行验证,在验证成功的情况下,可解除可穿戴设备20的锁屏状态。
在一些实施例中,可穿戴设备20中可安装有至少两个操作系统,例如,可穿戴设备20可同时安装有嵌入式操作系统(如RTOS(Real Time Operating System,实时操作系统)等)及智能操作系统(如IOS系统、Android(安卓)系统等),也可同时安装有多个智能操作系统或是多个嵌入式系统等,可穿戴设备20上安装的具体操作系统在本申请实施例中不作限制。
在一些实施例中,可穿戴设备20中可包括有多个处理器,或是可包括一个多核处理器,例如,可包括双核处理器、四核处理器等,从而可通过不同的处理器,或是通过同一个处理器中的不同内核运行不同的操作系统。
如图2所示,在一个实施例中,提供一种设备解锁方法,可应用于上述的终端设备,该方法可包括以下步骤:
步骤210,响应于解锁指令,解除终端设备的锁屏状态。
在终端设备处于锁屏状态时,用户可输入终端解锁信息对终端设备进行解锁。其中,锁屏状态可用于保护终端设备的信息安全,在锁屏状态下用户无法正常使用终端设备的所有功能(只能使用如紧急求助等简单功能),通常也无法查看终端设备上的数据信息,在锁屏状态下,终端设备的屏幕通常只显示锁屏界面或是屏幕直接处于断电状态。
终端解锁信息可以是预先设置的用于解锁终端设备的信息,终端解锁信息可包括但不限于约定的密码、约定的划动手势、录入的生物特征信息(如人脸信息、指纹信息、瞳纹信息、声纹信息等)等中的一种或多种。终端设备接收用户输入的终端解锁信息,并将接收的终端解锁信息与存储的解锁信息进行匹配,若匹配成功,则可生成解锁指令,并根据该解锁指令解除终端设备的锁屏状态。可选地,该匹配成功可指的是接收的终端解锁信息与存储的解锁信息完全一致,或接收的终端解锁信息与存储的解锁信息的相似度大于相似度阈值(如95%、97%等)。
以终端解锁信息为人脸信息为例,用户触发解锁,终端设备可通过摄像头采集人脸图像,并提取该人脸图像的人脸特征信息,可将提取的人脸特征信息与存储的人脸信息进行匹配,若匹配成功,则可生成解锁指令。
终端设备解除锁屏状态后,可显示终端设备的主界面,或是显示终端设备上在前台运行的应用的相关界面,用户可正常使用终端设备所提供的各种功能。
步骤220,向与终端设备通信连接的可穿戴设备发送验证信息,以使得可穿戴设备在对验证信息验证成功的情况下,解除可穿戴设备的锁屏状态。
终端设备与可穿戴设备之间可建立通信连接,该可穿戴设备与终端设备之间可以是受信任的设备,例如,可穿戴设备与终端设备可以是属于同一用户的设备,或是虽然属于两个用户但是该两个用户具备亲密关系的设备。可穿戴设备与终端设备可预先进行信任认证,利用信任机制将彼此添加到可信任设备名单中。
在终端设备成功解锁的情况下,由于终端设备与可穿戴设备通信连接,可说明可穿戴设备当前处于较为安全的环境中,则终端设备可自动对可穿戴设备进行解锁。终端设备可向可穿戴设备发送验证信息,该验证信息可以是预先约定的用于验证终端设备身份的信息,例如预先约定的令牌、密码、签名等信息中的一种或多种,但不限于此。
可穿戴设备接收到终端设备发送的验证信息后,可对该验证信息进行验证,可选地,可将接收的验证信息与存储的验证信息进行比对,若二者一致,则验证成功。若对验证信息验证成功,则可穿戴设备可解除锁屏状态。
在一些实施例中,在终端设备向可穿戴设备发送验证信息之前,可先判断可穿戴设备当前是否处于锁屏状态,若确定可穿戴设备当前处于锁屏状态,再向可穿戴设备发送验证信息。终端设备可向可穿戴设备发送解锁请求,可穿戴设备接收到解锁请求后,若可穿戴设备当前处于锁屏状态,可向终端设备返回响应信息,终端设备根据接收到的响应信息可确定可穿戴设备当前处于锁屏状态。若可穿戴设备当前处于解锁状态,则可不对该解锁请求进行响应,若终端设备在第一时长内未接收到可穿戴设备返回的响应信息,则可确定可穿戴设备当前不处于锁屏状态,则不需要再对可穿戴设备进行解锁,可进一步减少终端设备的功耗。
上述的第一时长可根据实际需求进行设置,例如3秒、5秒、4秒等,但不限于此。第一时长可由终端设备与可穿戴设备之间的信号传输速度决定,因此也可以预先经过多次测试实验测试得到。
示例性地,图3为一个实施例中终端设备自动解锁可穿戴设备的场景示意图。如图3所示,终端设备10在锁屏状态下,响应于解锁指令,解除终端设备10的锁屏状态,从锁屏界面切换到终端设备10的桌面进行显示。终端设备10解锁成功后向通信连接的可穿戴设备20发送验证信息,处于锁屏状态的可穿戴设备20接收到终端设备10发送的验证信息后,可对该验证信息进行验证,并在验证成功时,解除锁屏状态,从锁屏界面切换到表盘界面进行显示。在此过程中用户不需要额外向可穿戴设备20输入解锁信息,且由于终端设备10是处于解锁状态的,可保障终端设备10自动解锁可穿戴设备20的安全性。
在本申请实施例中,终端设备响应于解锁指令,解除终端设备的锁屏状态,并向与终端设备通信连 接的可穿戴设备发送验证信息,可穿戴设备可对该验证信息进行验证,在验证成功的情况下解除可穿戴设备的锁屏状态,在用户触发终端设备解锁时,终端设备会自动触发可穿戴设备进行解锁,无需用户在可穿戴设备上另外再输入预设的解锁密码进行解锁,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。
在一些实施例中,针对可穿戴设备中的不同运行情况,可分别设置对应的解锁策略。终端设备可在解除锁屏状态后,确定与终端设备通信连接的可穿戴设备当前的运行情况,并向可穿戴设备发送与当前的运行情况对应的验证信息,以保证能够成功对可穿戴设备进行解锁。
作为一种实施方式,可穿戴设备的运行情况可包括可穿戴设备的运行模式,终端设备可根据可穿戴设备当前所处的运行模式确定所需发送的验证信息。如图4所示,在另一个实施例中,提供一种设备解锁方法,可应用于上述的终端设备,该方法可包括以下步骤:
步骤402,响应于解锁指令,解除终端设备的锁屏状态。
步骤402的描述可参考上述实施例中的相关描述,在此不再重复赘述。
步骤404,确定与终端设备通信连接的可穿戴设备当前所处的运行模式。
可穿戴设备中可至少安装有第一操作系统及第二操作系统,该第一操作系统及第二操作系统可分别运行在不同的处理器上,也可以分别运行在同一处理器的不同核心中。第一操作系统的运行功耗可大于第二操作系统的运行功耗,该第一操作系统可以是功能丰富、性能强但功耗也较大的智能操作系统(如安卓操作系统、IOS等),第二操作系统可以是功能较为简单、性能较差但功耗较小的嵌入式操作系统(如RTOS等)。
可选地,第一操作系统可运行在可穿戴设备的大核处理器中,第二操作系统可运行在可穿戴设备的小核处理器中,大核处理器具备比小核处理器更好的处理性能,同时产生的功耗也比小核处理器要大。用户可根据实际需求对可穿戴设备的操作系统进行切换,在需要使用较高的处理性能(例如使用各式的应用、通话、上网等)时,可将可穿戴设备的操作系统切换至运行在大核处理器的第一操作系统,在需要降低可穿戴设备的功耗时,可将可穿戴设备的操作系统切换至运行在小核处理器的第二操作系统,提高可穿戴设备的续航。可穿戴设备也可根据自身实际的运行需求在第一操作系统与第二操作系统之间进行切换。
针对支持双操作系统的可穿戴设备,可定义多种不同的运行模式,不同运行模式可分别对应不同的运行功耗及运行性能,该运行功耗可指的是可穿戴设备在该运行模式下所产生的电量消耗等,运行性能可指的是可穿戴设备在该运行模式下对于各个硬件资源(如处理器、存储器等)的使用率、数据处理速度、能够处理的数据类型等。同一运行模式下的运行功耗及运行性能可呈正相关关系,运行性能越强,运行功耗可越大。
在一些实施例中,可穿戴设备的运行模式可包括第一操作系统持续在前台运行的第一模式、仅运行在第二操作系统的第二模式,以及在第一操作系统与第二操作系统之间切换运行的第三模式。第一操作系统在前台运行可指的是第一操作系统具备可穿戴设备的外设(如显示装置等)的控制权限,能够控制显示装置进行内容显示。在第一模式下,前台运行的操作系统一直为第一操作系统,不会发生切换,第二操作系统可处于关机状态、休眠状态或是在后台运行。在第二模式下,第一操作系统可处于关机状态,可穿戴设备仅运行第二操作系统。在第三模式下,前台运行的操作系统可在第一操作系统与第二操作系统之间切换,未在前台运行的操作系统可处于休眠状态。其中,操作系统处于关机状态,可指的是操作系统所对应的处理器可处于完全断电的状态,操作系统的所有模块均无法运行;操作系统处于休眠状态,可指的是操作系统所对应的处理器处于断电状态,但是操作系统内的某些模块(如通信模块等)依然处于运行中。
第一模式、第二模式及第三模式分别对应不同的运行功耗及运行性能,第一模式的运行功耗可大于第三模式的运行功耗,第三模式的运行功耗可大于第二模式的运行功耗,第一模式的运行性能可高于第三模式的运行性能,第三模式的运行性能可高于第二模式的运行性能。
上述的第一模式可理解为可穿戴设备的高性能模式,具备很高的运行性能;第二模式可理解为可穿 戴设备的长续航模式,能够使得可穿戴设备处于低功耗下运行;第三模式可理解为均衡模式,同时兼顾性能及续航,可穿戴设备可根据实际的运行情况在第一操作系统与第二操作系统之间切换,例如可穿戴设备在运行繁忙时,可切换至第一操作系统运行,在运行空闲时,可切换至第二操作系统运行。
终端设备在成功解锁后,可确定可穿戴设备当前所处的运行模式,并根据可穿戴设备当前所处的运行模式向可穿戴设备发送与该当前所处的运行模式对应的验证信息,以对可穿戴设备进行解锁。在一些实施例中,终端设备可向通信连接的可穿戴设备发送模式获取请求,该模式获取请求用于向可穿戴设备请求获取当前所处的运行模式。可穿戴设备接收终端设备发送的模式获取请求,可根据该模式获取请求向终端设备返回当前所处的运行模式对应的模式标识。终端设备可接收可穿戴设备返回的模式标识,并根据该模式标识确定可穿戴设备当前所处的运行模式。
不同运行模式可分别对应不同的模式标识,模式标识可以是由字母、数字、符号等中的一种或多种组成,例如,第一模式对应的模式标识可为01,第二模式对应的模式标识可为02、第三模式对应的模式标识可为03;或第一模式对应的模式标识可为mode A,第二模式对应的模式标识可为mode B,第三模式对应的模式标识可为mode C等,但不限于此。终端设备先确定可穿戴设备当前所处的运行模式,再发送验证信息,可保证发送的验证信息的准确性,且可保证成功解锁可穿戴设备的成功率及效率。
步骤406,向可穿戴设备发送与该当前所处的运行模式对应的验证信息,以使得可穿戴设备在对验证信息验证成功的情况下,解除可穿戴设备的锁屏状态。
在一些实施例中,上述的第一操作系统可具备TEE(Trusted execution environment,可信执行环境)安全固件,可与TEE进行通信交互,其中,TEE可以是内存中开辟出的专门用于进行数字版权管理、移动支付及敏感数据保护的空间,安全性强。因此,第一操作系统下可存储及访问敏感数据。而第二操作系统下不具备TEE安全固件,无法与TEE进行通信交互,因此,第二操作系统下无法存储及访问敏感数据。而在传统技术领域中,由于第二操作系统无法存储及访问敏感数据,当可穿戴设备运行在第二操作系统下时无法进行解锁,给用户造成不便。
在本申请实施例中,为了保证可穿戴设备无论运行在哪个操作系统下均可正常进行解锁,且可保证可穿戴设备的信息安全,针对可穿戴设备的各个运行模式,可分别发送相应的验证信息。
在一些实施例中,可穿戴设备当前所处的运行模式可包括上述的第一模式、第二模式及第三模式中的任一种。可选地,若可穿戴设备当前所处的运行模式为第一模式或第三模式,终端设备可向可穿戴设备发送令牌及句柄,该令牌及句柄用于触发可穿戴设备的第一操作系统对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
验证信息可包括令牌及句柄,该令牌可理解为终端设备的通行证,终端设备利用该令牌可具备对可穿戴设备进行解锁的权限,句柄则可用于对令牌对象进行标识,也可理解为对终端设备这一对象进行标识。可穿戴设备根据令牌及句柄可准确识别出终端设备具备解锁的权限,并相应进行解锁。
进一步地,在可穿戴设备处于第一模式时,第一操作系统在可穿戴设备的前台运行,则可穿戴设备可通过第一操作系统接收终端设备发送的令牌及句柄,并通过第一操作系统对该令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态。
在可穿戴设备处于第三模式时,若当前在前台运行的是第一操作系统,则可穿戴设备可通过第一操作系统接收终端设备发送的令牌及句柄,并通过第一操作系统对该令牌及句柄进行验证。在可穿戴设备处于第三模式时,若当前运行的是第二操作系统,第一操作系统处于休眠状态,则第二操作系统可向第一操作系统发送唤醒指令,该唤醒指令可用于唤醒处于休眠状态的第一操作系统。第二操作系统接收到第一操作系统发送的唤醒指令后,可根据该唤醒指令进行唤醒,可穿戴设备可从第二操作系统切换至第一操作系统,并通过第一操作系统对该令牌及句柄进行验证。
在一些实施例中,第二操作系统可以是在接收到终端设备发送的模式获取请求后,向第一操作系统发送唤醒指令,以使得唤醒后的第一操作系统可接收终端设备发送的令牌和句柄。在另一些实施例中,第二操作系统也可以是在接收到终端设备发送的令牌和句柄后,再向第一操作系统发送唤醒指令,再将接收到的令牌和句柄发送给唤醒后的第一操作系统,以通过第一操作系统对该令牌及句柄进行验证。
作为一种具体实施方式,令牌及句柄还用于触发可穿戴设备的第一操作系统在TEE中对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态。可穿戴设备的第一操作系统在获取到终端设备发送的令牌及句柄后,可在TEE中对令牌及句柄进行验证。第一操作系统可通过令牌认证机制,将令牌及句柄向框架层传递,并由框架层传递到TEE中,可在TEE中对令牌及句柄进行验证。可选地,第一操作系统可在TEE中根据句柄查找匹配的预先存储的令牌,并将终端设备发送的令牌与该预先存储的令牌进行比对,若二者一致,则可确定验证成功。第一操作系统可调用锁屏接口(如Keyguard等接口)关闭锁屏界面,解除可穿戴设备的锁屏状态。
示例性地,图5A为一个实施例中可穿戴设备通过第一操作系统验证令牌及句柄的架构示意图。如图5A所示,可穿戴设备中的第一操作系统通过应用层的数据传输通道(如蓝牙传输通道等)接收终端设备发送令牌和句柄。第一操作系统的应用层中可设置有解锁应用,该解锁应用可实现可穿戴设备中的第一操作系统与终端设备之间的消息传递,以及调用本地提供的各种接口。解锁应用可获取该令牌和句柄,并调用框架层提供的Trust Agent Service(信任代理服务),向框架层传递令牌和句柄。第一操作系统的框架层通过Trust Agent Service可将令牌和句柄传递到Lock Setting Service(锁设置服务),再由gatekeeper函数将令牌和句柄从框架层传递到硬件抽象层,再传输进入TEE中,可在TEE中对令牌和句柄进行验证。可选地,gatekeeper函数进行数据传递时,可将令牌和句柄进行加密,再在TEE中对加密的令牌和句柄进行解密,并对令牌和句柄进行验证。若在TEE中对令牌和句柄验证成功后,可向解锁应用返回表征验证成功的通知消息,解锁应用接收到该通知消息后,可调用Keyguard关闭锁屏界面,成功对可穿戴设备进行解锁。
在本申请实施例中,在可穿戴设备处于第一模式或第三模式时,第一操作系统可在TEE中对终端设备发送的令牌及句柄进行验证,提高了可穿戴设备解锁的安全性。
在一些实施例中,若可穿戴设备当前所处的运行模式为第二模式,则终端设备可向可穿戴设备发送与句柄对应的加密信息;该加密信息用于触发可穿戴设备的第二操作系统对加密信息进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在可穿戴设备处于第二模式时,可穿戴设备运行在第二操作系统下,且不会主动切换到第一操作系统,因此可由第二操作系统进行解锁。由于可穿戴设备的第二操作系统不具备TEE安全固件,因此无法访问TEE,无法存储敏感数据。为了既可以在可穿戴设备的第二操作系统进行解锁,又保证解锁安全性,第二操作系统中可存储有与句柄对应的加密信息。该加密信息可以是对句柄进行加密处理后得到的信息。在一些实施例中,句柄对应的加密信息包括哈希值和盐值(salt值),该哈希值是采用哈希算法对句柄及盐值进行计算得到的。
盐值可以是个随机数,盐值和句柄可组合得到目标字段,可采用哈希算法对目标字段进行计算,得到哈希值,该哈希算法可包括但不限于MD4信息摘要算法、MD5信息摘要算法、SHA(Secure Hash Algorithm,安全散列算法)等中的任一种。第二操作系统接收到终端设备发送的哈希值和盐值后,可选地,可直接将该哈希值与存储的哈希值进行比对,判断二者是否一致,若一致,则验证成功。可选地,第二操作系统也可根据接收的哈希值和盐值计算得到第一值,并根据存储的哈希值及存储的盐值计算得到第二值,再将第一值与第二值进行比对,判断二者是否一致,若一致,则验证成功,可进一步保证验证的准确性及安全性。第二操作系统对接收的哈希值和盐值验证成功后,可调用锁屏接口(如Keyguard等接口)关闭锁屏界面,解除可穿戴设备的锁屏状态。
示例性地,图5B为一个实施例中可穿戴设备通过第二操作系统验证哈希值及盐值的架构示意图。如图5B所示,可穿戴设备中的第二操作系统通过应用层的数据传输通道(如蓝牙传输通道等)接收终端设备发送哈希值和盐值。第二操作系统的数据传输通道可将接收到的哈希值和盐值传递到Keyguard task(锁屏模块),该Keyguard task具备对哈希值和盐值进行验证的功能。Keyguard task可对获取的哈希值和盐值进行验证,若验证成功,则可调用Keyguard关闭锁屏界面,成功对可穿戴设备进行解锁。在本申请实施例中,实现了在可穿戴设备运行在第二操作系统下也能够正常进行解锁的方案,在保障可穿戴设备的信息安全的同时,满足用户的不同需求。
作为另一种实施方式,若可穿戴设备当前所处的运行模式为第三模式,且可穿戴设备当前运行第二操作系统,终端设备也可向可穿戴设备发送与句柄对应的加密信息,该加密信息可用于触发可穿戴设备的第二操作系统对加密信息进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在可穿戴设备处于第三模式,且当前运行第二操作系统,第一操作系统处于休眠状态时,也可直接由可穿戴设备的第二操作系统进行解锁。终端设备可向可穿戴设备发送与句柄对应的加密信息,可穿戴设备的第二操作系统可接收该加密信息,并对该加密信息进行验证。
在可穿戴设备处于第三模式,且当前运行第一操作系统,则可由可穿戴设备的第一操作系统进行解锁。终端设备可向可穿戴设备发送令牌及句柄,可穿戴设备的第一操作系统可接收该令牌及句柄,并对该令牌及句柄进行验证。
在本申请实施例中,终端设备可根据可穿戴设备当前所处的运行模式,向可穿戴设备发送与该当前所处的运行模式对应的验证信息,保证可穿戴设备不论在任一运行模式下均可以正常进行解锁,且可保障可穿戴设备的解锁安全,进一步提高了可穿戴设备的智能化。
作为另一种实施方式,可穿戴设备的运行情况可包括可穿戴设备中第一操作系统的状态,终端设备也可根据可穿戴设备中的第一操作系统的当前状态来确定所需发送的验证信息。终端设备响应于解锁指令,解除终端设备的锁屏状态之后,可确定可穿戴设备中第一操作系统的当前状态,并向可穿戴设备发送,与第一操作系统的当前状态对应的验证信息。
第一操作系统的当前状态可包括休眠状态、关机状态及运行状态中的任一种。作为一种实施方式,终端设备可向可穿戴设备发送状态获取请求,该状态获取请求用于请求向可穿戴设备获取第一操作系统的当前状态。可穿戴设备接收到终端设备发送的状态获取请求后,可根据该状态获取请求向终端设备发送状态信息,该状态信息用于表征第一操作系统的当前状态。进一步地,状态信息可包括状态标识,第一操作系统的当前状态不同,可分别对应不同的状态标识,例如,休眠状态对应的状态标识可为X,关机状态对应的状态标识可为Y,运行状态对应的状态标识可为Z等,但不限于此,状态信息也可以包括状态名称等信息。终端设备接收可穿戴设备发送的状态信息,可根据该状态信息确定可穿戴设备中第一操作系统的当前状态。
可选地,若第一操作系统的当前状态为运行状态或休眠状态,则向可穿戴设备发送令牌及句柄,该令牌及句柄可用于触发可穿戴设备的第一操作系统对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在第一操作系统处于运行状态或休眠状态时,可由第一操作系统对可穿戴设备进行解锁。可穿戴设备可接收终端设备发送的令牌及句柄,并通过第一操作系统对令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态。可选地,若第一操作系统处于休眠状态,第二操作系统处于运行状态,则可通过第二操作系统向第一操作系统发送唤醒指令,以唤醒处于休眠状态的第一操作系统,并由第一操作系统对令牌及句柄进行验证。
可选地,若第一操作系统的当前状态为关机状态,则向可穿戴设备发送与句柄对应的加密信息;该加密信息用于触发可穿戴设备的第二操作系统对加密信息进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在第一操作系统处于关机状态时,由于重启第一操作系统需要等待较长时间,为了提高解锁的效率,则可由第二操作系统对可穿戴设备进行解锁。可穿戴设备可接收终端设备发送的与句柄对应的加密信息,并通过第二操作系统对该加密信息进行验证,在验证成功的情况下,由第二操作系统解除可穿戴设备的锁屏状态。
需要说明的是,通过第一操作系统对令牌及句柄进行验证,以及通过第二操作系统对与句柄对应的加密信息进行验证的描述,可参考上述各实施例中的相关描述,在此不再重复赘述。
在本申请实施例中,终端设备可根据可穿戴设备中第一操作系统的当前状态,向可穿戴设备发送与该第一操作系统的当前状态对应的验证信息,保证可穿戴设备在任何运行情况下都可以成功进行解锁,且可保障可穿戴设备的解锁安全,同时兼顾解锁效率。
在一些实施例中,在利用终端设备对可穿戴设备进行解锁之前,终端设备与可穿戴设备之间可约定验证信息,并保存该验证信息,从而可在终端设备解锁时利用保存的验证信息自动对可穿戴设备进行解锁。如图6所示,在一个实施例中,在步骤响应于解锁指令,解除终端设备的锁屏状态之前,上述的方法还可包括以下步骤:
步骤602,接收与终端设备通信连接的可穿戴设备发送的登记指令,该登记指令为可穿戴设备检测到针对解锁开关的触发操作生成的。
可穿戴设备可设置有解锁开关,该解锁开关可用于选择开启/关闭利用终端设备自动对可穿戴设备进行解锁的功能,该解锁开关可以是物理开关,也可以是虚拟开关,在此不作限定。当用户选择开启利用终端设备自动对可穿戴设备进行解锁的功能时,可对该解锁开关进行触发操作,该触发操作可包括但不限于点击操作、滑动操作等触控操作,该触发操作也可以是语音控制操作等其它交互方式的操作,触发操作的实现方式在本申请实施例不作具体限定。
若可穿戴设备检测到针到该解锁开关的触发操作,则响应该触发操作,可向通信连接的终端设备发送登记指令,该登记指令可用于指示终端设备生成令牌。
步骤604,根据登记指令生成令牌,并将令牌发送至可穿戴设备,以使可穿戴设备对令牌进行登记,并生成与令牌对应的句柄。
终端设备接收到可穿戴设备发送的登记指令后,可根据该登记指令生成令牌,该令牌可以是由随机生成的字符串组成的字段,也可以是按照预设生成规则生成的字段。可选地,该预设生成规则可规定令牌的字段组成格式,例如,可规定令牌的前2位为英文字线TK,令牌的后4位可为随机数字等,按照预设生成规则生成令牌可方便可穿戴设备进行有效识别,保证令牌的准确性。
终端设备可将生成的令牌发送给可穿戴设备,可穿戴设备可对该令牌进行登记,并生成与该令牌对应的句柄。在一些实施例中,可穿戴设备可通过第一操作系统接收终端设备发送的令牌,并通过第一操作系统对该令牌进行登记,并生成与令牌对应的句柄。
作为一种具体实施方式,可穿戴设备中的第一操作系统可接收终端设备发送的令牌,并将该令牌转换为密钥,第一操作系统可根据该密钥对主密钥进行加密,该主密钥可以是第一操作系统中预先存储的密钥信息。第一操作系统可接收输入的解锁密码,并根据该解锁密码对加密的主密钥进行解密,若解密成功,则可对该令牌进行登记,并生成与该令牌对应的句柄。
第一操作系统在将令牌转换为密钥并对主密钥进行加密后,可弹出密码输入框,该密码输入框可用于提供给用户输入可穿戴设备的解锁密码。第一操作系统根据用户输入的解锁密码成功解锁加密的主密钥,该过程相当于对令牌进行激活,经过激活后的令牌为有效的能够用于解锁可穿戴设备的令牌。第一操作系统可将该令牌通过框架层传递到TEE中进行登记存储,并生成与该令牌对应的句柄,TEE也可保存该句柄,再将生成的句柄发送给终端设备。可选地,令牌及句柄也可保存在第一操作系统的框架层所提供的密码管理模块中,在需要验证令牌及句柄时,第一操作系统可将密码管理模块中存储的令牌及句柄,以及终端设备发送的令牌和句柄一起传递到TEE中进行验证。
在一些实施例中,第一操作系统生成句柄后,还可生成与该句柄对应的加密信息,并将加密信息发送给第二操作系统,并由第二操作系统保存该加密信息。作为一种具体实施方式,第一操作系统可随机生成盐值,并将句柄与盐值组成合得到目标字段,第一操作系统可采用哈希算法对该目标字段进行计算,得到哈希值,再将计算得到的哈希值与盐值发送到第二操作系统。第二操作系统接收到第一操作系统发送的哈希值与盐值后,可将该哈希值与盐值保存到存储器中。进一步地,第一操作系统可通过与第二操作系统之间的通信服务,向第二操作系统发送哈希值与盐值。
步骤606,接收可穿戴设备返回的句柄,并保存令牌及句柄。
终端设备接收可穿戴设备返回的句柄后,可保存令牌及句柄,进一步地,还可接收可穿戴设备发送的哈希值和盐值,并对可穿戴设备发送的哈希值和盐值进行保存。
在终端设备响应于解锁指令,成功解除终端设备的锁屏状态之后,终端设备可根据保存的验证信息对可穿戴设备进行解锁。终端设备可确定可穿戴设备当前所处的运行模式,若可穿戴设备当前所处的运 行模式为第一模式(第一操作系统持续在前台运行)或第三模式(第一操作系统与第二操作系统之间切换运行),则终端设备可向可穿戴设备发送保存的令牌及句柄,以使得可穿戴设备中的第一操作系统进行验证及解锁;若可穿戴设备当前所处的运行模式为第二模式(仅运行在第二操作系统),则终端设备可向可穿戴设备发送哈希值和盐值,以使得可穿戴设备中的第二操作系统进行验证及解锁。
在一些实施例中,终端设备提供的自动解锁可穿戴设备的解锁功能可集成在能够与可穿戴设备进行交互的应用程序中,例如可集成在健康监测应用程序中,该健康监测应用程序可从可穿戴设备获取可穿戴设备所采集的人体健康数据,并进行展示,也可以是其它应用程序,在此不作限定。在集成有可穿戴设备的解锁功能的应用程序监听到终端设备的解锁事件时,即可向可穿戴设备发送验证信息请求可穿戴设备进行解锁,能够更加简便、快捷对可穿戴设备进行解锁。
示例性地,图7为一个实施例中设备解锁方法的时序示意图。如图7所示,可穿戴设备的第一操作系统检测到针对解锁开关的触发操作,则可向终端设备发送登记指令。终端设备接收该登记指令后,可生成令牌,并向可穿戴设备的第一操作系统发送令牌。可穿戴设备的第一操作系统接收到终端设备发送的令牌后,可对令牌进行登记,并生成句柄,以及保存令牌和句柄。第一操作系统可向终端设备发送句柄,终端设备可对令牌及句柄进行保存。可穿戴设备的第一操作系统还可随机生成盐值,并根据句柄和盐值计算得到哈希值,再将盐值和哈希值发送给第二操作系统。第二操作系统可对第一操作系统发送的盐值和哈希值进行保存。第一操作系统也可向终端设备发送盐值和哈希值,终端设备可对该盐值和哈希值进行保存。
在终端设备解除锁屏状态时,可确定可穿戴设备当前所处的运行模式。若可穿戴设备处于第一模式或第三模式,则终端设备可向可穿戴设备的第一操作系统发送令牌及句柄。可穿戴设备的第一操作系统可对接收的令牌及句柄进行验证,若验证成功则进行解锁。若可穿戴设备处于第二模式,则终端设备可向可穿戴设备的第二操作系统发送盐值和哈希值,可穿戴设备的第二操作系统可对接收的盐值和哈希值进行验证,若验证成功则进行解锁。
在一些实施例中,为了进一步保障信息安全,终端设备与可穿戴设备之间传递的信息均可以是加密信息,例如,终端设备在生成令牌后,可利用约定的密钥对令牌进行加密,并将加密的令牌发送给可穿戴设备,可穿戴设备生成句柄后,也可根据约定的密钥对句柄进行加密,并将加密的句柄发送给终端设备等,保证终端设备与可穿戴设备之间传输的验证信息均是经过加密,进一步提高了信息安全,防止验证信息出现泄露的情况。
在本申请实施例中,终端设备与可穿戴设备之间可约定验证信息,并保存该验证信息,从而可在终端设备解锁时利用保存的验证信息自动对可穿戴设备进行解锁,在用户触发终端设备解锁时,终端设备会自动触发可穿戴设备进行解锁,无需用户在可穿戴设备上另外再输入预设的解锁密码进行解锁,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。
如图8所示,在一个实施例中,提供另一种设备解锁方法,可应用于上述的可穿戴设备,该方法可包括以下步骤:
步骤810,接收与可穿戴设备通信连接的终端设备发送的验证信息,该验证信息为终端设备在解除锁屏状态的情况下发送的。
步骤820,对验证信息进行验证,在验证成功的情况下,解除可穿戴设备的锁屏状态。
在一个实施例中,步骤810包括:接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息。
在一个实施例中,运行情况包括运行模式,在步骤接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息之前,还包括:接收与可穿戴设备通信连接的终端设备发送的模式获取请求;根据模式获取请求,向终端设备返回当前所处的运行模式对应的模式标识,以使终端设备根据模式标识确定可穿戴设备当前所处的运行模式。
在一个实施例中,可穿戴设备安装有第一操作系统及第二操作系统;运行模式包括第一操作系统持 续在前台运行的第一模式、仅运行在第二操作系统的第二模式。
步骤接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息,包括:若可穿戴设备当前所处的运行模式为第一模式,则接收终端设备发送的令牌及句柄;若可穿戴设备当前所处的运行模式为第二模式,则接收终端设备发送的与句柄对应的加密信息。
步骤820,包括:若可穿戴设备当前所处的运行模式为第一模式,则通过第一操作系统对令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态;若可穿戴设备当前所处的运行模式为第二模式,则通过第二操作系统对加密信息进行验证,在验证成功的情况下,由第二操作系统解除可穿戴设备的锁屏状态。
其中,第二操作系统下不具备可信执行环境TEE安全固件。
在一个实施例中,运行模式还包括在所述第一操作系统与第二操作系统之间切换运行的第三模式。步骤接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息,包括:若可穿戴设备当前所处的运行模式为第三模式,则接收终端设备发送的令牌及句柄。步骤820,包括:若可穿戴设备当前所处的运行模式为第三模式,则通过第一操作系统对令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态。
在一个实施例中,若可穿戴设备当前所处的运行模式为第三模式,且当前运行第二操作系统,则在通过第一操作系统对令牌及句柄进行验证之前,该方法还可包括:通过第二操作系统向第一操作系统发送唤醒指令,唤醒指令用于唤醒处于休眠状态的第一操作系统。
在一个实施例中,步骤接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息,包括:若可穿戴设备当前所处的运行模式为第三模式,且可穿戴设备当前运行第二操作系统,则接收终端设备发送的与句柄对应的加密信息。步骤820,包括:若可穿戴设备当前所处的运行模式为所述第三模式,且可穿戴设备当前运行第二操作系统,则通过第二操作系统对加密信息进行验证,在验证成功的情况下,由第二操作系统解除所述可穿戴设备的锁屏状态。
在一个实施例中,第一操作系统具备TEE安全固件。步骤通过第一操作系统对令牌及句柄进行验证,包括:通过第一操作系统在TEE中对令牌及句柄进行验证。
在本申请实施例中,终端设备可根据可穿戴设备当前所处的运行模式,向可穿戴设备发送与该当前所处的运行模式对应的验证信息,保证可穿戴设备不论在任一运行模式下均可以正常进行解锁,且可保障可穿戴设备的解锁安全,进一步提高了可穿戴设备的智能化。
在一个实施例中,步骤接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息,包括:接收与可穿戴设备通信连接的终端设备发送的,与第一操作系统的当前状态对应的验证信息;其中,当前状态包括休眠状态、关机状态及运行状态中的任一种。
在一个实施例中,步骤接收与可穿戴设备通信连接的终端设备发送的,与第一操作系统的当前状态对应的验证信息,包括:若第一操作系统的当前状态为运行状态或休眠状态,则接收终端设备发送的令牌及句柄;若第一操作系统的当前状态为关机状态,则接收终端设备发送的与句柄对应的加密信息。
在一个实施例中,步骤对验证信息进行验证,在验证成功的情况下,解除可穿戴设备的锁屏状态,包括:若第一操作系统的当前状态为运行状态或休眠状态,则通过第一操作系统对所述令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除所述可穿戴设备的锁屏状态;若第一操作系统的当前状态为关机状态,则通过第二操作系统对加密信息进行验证,在验证成功的情况下,由第二操作系统解除可穿戴设备的锁屏状态。
如图9所示,在一个实施例中,在步骤接收与可穿戴设备通信连接的终端设备发送的验证信息之前,该方法还包括以下步骤:
步骤902,若检测到针对解锁开关的触发操作,则响应触发操作,向与可穿戴设备通信连接的终端设备发送登记指令,登记指令用于指示终端设备生成令牌。
步骤904,接收终端设备发送的令牌,对令牌进行登记,并生成与令牌对应的句柄。
在一个实施例中,步骤904可包括:通过第一操作系统接收终端设备发送的令牌,对令牌进行登记, 并生成与令牌对应的句柄。
在一个实施例中,步骤通过第一操作系统接收终端设备发送的令牌,对令牌进行登记,并生成与令牌对应的句柄,包括:通过第一操作系统接收终端设备发送的令牌,并将令牌转换为密钥;通过第一操作系统根据密钥对主密钥进行加密;通过第一操作系统接收输入的解锁密码,并根据解锁密码对加密的主密钥进行解密,若解密成功,则对令牌进行登记,并生成与令牌对应的句柄。
在一个实施例中,该方法还包括:通过第一操作系统生成与句柄对应的加密信息,并将加密信息发送给第二操作系统,并由第二操作系统保存加密信息。
在一个实施例中,步骤通过第一操作系统生成与句柄对应的加密信息,并将加密信息发送给第二操作系统,包括:通过第一操作系统随机生成盐值,并将句柄及盐值组合得到目标字段;通过第一操作系统采用哈希算法对目标字段进行计算,得到哈希值;通过第一操作系统将盐值和哈希值发送至第二操作系统。
步骤906,向终端设备发送句柄,以使终端设备保存令牌及句柄。
需要说明的是,本申请实施例所提供的应用于可穿戴设备的设备解锁方法的描述,可参考上述各实施例中提供的应用于终端设备的设备解锁方法的描述,在此不再一一进行赘述。
在本申请实施例中,终端设备与可穿戴设备之间可约定验证信息,并保存该验证信息,从而可在终端设备解锁时利用保存的验证信息自动对可穿戴设备进行解锁,在用户触发终端设备解锁时,终端设备会自动触发可穿戴设备进行解锁,无需用户在可穿戴设备上另外再输入预设的解锁密码进行解锁,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。
如图10所示,在一个实施例中,提供一种设备解锁装置1000,可应用于上述的终端设备。设备解锁装置1000可包括解锁模块1010及发送模块1020。
解锁模块1010,用于响应于解锁指令,解除终端设备的锁屏状态。
发送模块1020,用于向与终端设备通信连接的可穿戴设备发送验证信息,以使得可穿戴设备在对验证信息验证成功的情况下,解除可穿戴设备的锁屏状态。
在一个实施例中,设备解锁装置1000除了包括解锁模块1010及发送模块1020,还包括运行情况确定模块。
运行情况确定模块,用于确定与终端设备通信连接的可穿戴设备当前的运行情况。
在一个实施例中,运行情况包括运行模式,运行情况确定模块,还用于向与终端设备通信连接的可穿戴设备发送模式获取请求,模式获取请求用于向可穿戴设备请求获取当前所处的运行模式;接收可穿戴设备返回的模式标识,并根据模式标识确定可穿戴设备当前所处的运行模式。
发送模块1020,还用于向可穿戴设备发送与当前的运行情况对应的验证信息。
在一个实施例中,可穿戴设备安装有第一操作系统及第二操作系统;运行模式包括第一操作系统持续在前台运行的第一模式、仅运行在第二操作系统的第二模式。
发送模块1020,还用于若可穿戴设备当前所处的运行模式为第一模式,则向可穿戴设备发送令牌及句柄;令牌及句柄用于触发可穿戴设备的第一操作系统对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态;以及用于若可穿戴设备当前所处的运行模式为第二模式,则向可穿戴设备发送与句柄对应的加密信息;加密信息用于触发可穿戴设备的第二操作系统对加密信息进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
其中,第二操作系统下不具备可信执行环境TEE安全固件。
在一个实施例中,运行模式还包括在第一操作系统与第二操作系统之间切换运行的第三模式。发送模块1020,还用于若可穿戴设备当前所处的运行模式为第三模式,则向可穿戴设备发送令牌及句柄;令牌及句柄用于触发可穿戴设备的所述第一操作系统对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态;或,若可穿戴设备当前所处的运行模式为第三模式,且可穿戴设备当前运行第二操作 系统,则向可穿戴设备发送与句柄对应的加密信息;加密信息用于触发可穿戴设备的第二操作系统对所述加密信息进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在一个实施例中,第一操作系统具备TEE安全固件;令牌及句柄还用于触发可穿戴设备的第一操作系统在TEE中对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在一个实施例中,句柄对应的加密信息包括哈希值和盐值,哈希值是采用哈希算法对句柄及盐值进行计算得到的。
运行情况确定模块,还用于确定可穿戴设备中第一操作系统的当前状态,当前状态包括休眠状态、关机状态及运行状态中的任一种。
发送模块1020,还用于向可穿戴设备发送,与第一操作系统的当前状态对应的验证信息。
在一个实施例中,发送模块1020,还用于若第一操作系统的当前状态为运行状态或休眠状态,则向可穿戴设备发送令牌及句柄;令牌及句柄用于触发可穿戴设备的所述第一操作系统对令牌及句柄进行验证,并在验证成功后解除可穿戴设备的锁屏状态;若第一操作系统的当前状态为关机状态,则向可穿戴设备发送与句柄对应的加密信息;加密信息用于触发可穿戴设备的第二操作系统对加密信息进行验证,并在验证成功后解除可穿戴设备的锁屏状态。
在一个实施例中,设备解锁装置1000还包括接收模块、令牌生成模块及保存模块。
接收模块,用于接收与终端设备通信连接的可穿戴设备发送的登记指令,登记指令为可穿戴设备检测到针对解锁开关的触发操作生成的。
令牌生成模块,用于根据登记指令生成令牌,并将令牌发送至可穿戴设备,以使可穿戴设备对令牌进行登记,并生成与令牌对应的句柄。
保存模块,用于接收可穿戴设备返回的句柄,并保存令牌及句柄。
在本申请实施例中,在用户触发终端设备解锁时,终端设备会自动触发可穿戴设备进行解锁,无需用户在可穿戴设备上另外再输入预设的解锁密码进行解锁,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。
如图11所示,在一个实施例中,提供一种设备解锁装置1100,可应用于上述的可穿戴设备,该设备解锁装置1100可包括接收模块1110及验证模块1120。
接收模块1110,用于接收与可穿戴设备通信连接的终端设备发送的验证信息,验证信息为终端设备在解除锁屏状态的情况下发送的。
验证模块1120,用于对验证信息进行验证,在验证成功的情况下,解除可穿戴设备的锁屏状态。
在一个实施例中,接收模块1110,还用于接收与可穿戴设备通信连接的终端设备发送的,与可穿戴设备当前的运行情况对应的验证信息。
在一个实施例中,可穿戴设备安装有第一操作系统及第二操作系统;运行情况包括运行模式,运行模式包括第一操作系统持续在前台运行的第一模式、仅运行在第二操作系统的第二模式。
接收模块1110,还用于若可穿戴设备当前所处的运行模式为第一模式,则接收终端设备发送的令牌及句柄;若可穿戴设备当前所处的运行模式为第二模式,则接收终端设备发送的与句柄对应的加密信息。
在一个实施例中,设备解锁装置1100还包括模式确认模块。
模式确认模块,用于接收与可穿戴设备通信连接的终端设备发送的模式获取请求;根据模式获取请求,向终端设备返回当前所处的运行模式对应的模式标识,以使终端设备根据模式标识确定可穿戴设备当前所处的运行模式。
在一个实施例中,验证模块1120,还用于若可穿戴设备当前所处的运行模式为第一模式,则通过第一操作系统对令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态;若可穿戴设备当前所处的运行模式为第二模式,则通过第二操作系统对加密信息进行验证,在验证成功的情况下,由第二操作系统解除可穿戴设备的锁屏状态。其中,第一操作系统的运行功耗大于第二操作系统的运行功耗,第二操作系统下不具备可信执行环境TEE安全固件。
在一个实施例中,运行模式还包括在第一操作系统与第二操作系统之间切换运行的第三模式。接收 模块1110,还用于若可穿戴设备当前所处的运行模式为第三模式,则接收终端设备发送的令牌及句柄。验证模块1120,还用于若可穿戴设备当前所处的运行模式为第三模式,则通过第一操作系统对令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态。
在一个实施例中,设备解锁装置1100,还包括唤醒模块。
唤醒模块,还用于若可穿戴设备当前所处的运行模式为第三模式,且当前运行第二操作系统,则在验证模块1120通过第一操作系统对令牌及句柄进行验证之前,通过第二操作系统向第一操作系统发送唤醒指令,唤醒指令用于唤醒处于休眠状态的第一操作系统。
在一个实施例中,接收模块1110,还用于若可穿戴设备当前所处的运行模式为第三模式,且可穿戴设备当前运行第二操作系统,则接收终端设备发送的与句柄对应的加密信息。验证模块1120,还用于若可穿戴设备当前所处的运行模式为第三模式,且可穿戴设备当前运行第二操作系统,则通过第二操作系统对所述加密信息进行验证,在验证成功的情况下,由第二操作系统解除所述可穿戴设备的锁屏状态。
在一个实施例中,第一操作系统具备TEE安全固件。验证模块1120,还用于通过第一操作系统在TEE中对令牌及句柄进行验证。
在一个实施例中,接收模块1110,还用于接收与可穿戴设备通信连接的终端设备发送的,与第一操作系统的当前状态对应的验证信息;其中,当前状态包括休眠状态、关机状态及运行状态中的任一种。
在一个实施例中,接收模块1110,还用于若第一操作系统的当前状态为运行状态或休眠状态,则接收终端设备发送的令牌及句柄;若第一操作系统的当前状态为关机状态,则接收终端设备发送的与句柄对应的加密信息。验证模块1120,还用于若第一操作系统的当前状态为运行状态或休眠状态,则通过第一操作系统对所述令牌及句柄进行验证,在验证成功的情况下,由第一操作系统解除可穿戴设备的锁屏状态;若第一操作系统的当前状态为关机状态,则通过第二操作系统对加密信息进行验证,在验证成功的情况下,由第二操作系统解除可穿戴设备的锁屏状态。
在一个实施例中,设备解锁装置1100,还包括发送模块、令牌登记模块。
发送模块,用于若检测到针对解锁开关的触发操作,则响应触发操作,向与可穿戴设备通信连接的终端设备发送登记指令,登记指令用于指示终端设备生成令牌。
令牌登记模块,还用于接收终端设备发送的令牌,对令牌进行登记,并生成与令牌对应的句柄。
在一个实施例中,令牌登记模块,还用于通过第一操作系统接收终端设备发送的令牌,对令牌进行登记,并生成与令牌对应的句柄。
在一个实施例中,令牌登记模块,还用于通过第一操作系统接收终端设备发送的令牌,并将令牌转换为密钥;通过第一操作系统根据密钥对主密钥进行加密;通过第一操作系统接收输入的解锁密码,并根据解锁密码对加密的主密钥进行解密,若解密成功,则对令牌进行登记,并生成与令牌对应的句柄。
在一个实施例中,设备解锁装置1100,还包括计算模块。
计算模块,用于通过第一操作系统生成与句柄对应的加密信息,并将加密信息发送给第二操作系统,并由第二操作系统保存加密信息。
在一个实施例中,计算模块,还用于通过第一操作系统随机生成盐值,并将句柄及盐值组合得到目标字段;通过第一操作系统采用哈希算法对目标字段进行计算,得到哈希值;通过第一操作系统将盐值和哈希值发送至第二操作系统。
发送模块,还用于向终端设备发送句柄,以使终端设备保存令牌及句柄。
在本申请实施例中,在用户触发终端设备解锁时,终端设备会自动触发可穿戴设备进行解锁,无需用户在可穿戴设备上另外再输入预设的解锁密码进行解锁,能够更加简便、快捷对可穿戴设备进行解锁,在保障可穿戴设备的信息安全的同时,提高了可穿戴设备的智能化。
图12为一个实施例中终端设备的结构框图。如图12所示,终端设备1200可以包括一个或多个如下部件:处理器1210、与处理器1210耦合的存储器1220,其中存储器1220可存储有一个或多个计算机程序,一个或多个计算机程序可以被配置为由一个或多个处理器1210执行时实现如上述各实施例描述的应用 于终端设备的方法。
处理器1210可以包括一个或者多个处理核。处理器1210利用各种接口和线路连接整个终端设备1200内的各个部分,通过运行或执行存储在存储器1220内的指令、程序、代码集或指令集,以及调用存储在存储器1220内的数据,执行终端设备1200的各种功能和处理数据。可选地,处理器1210可以采用数字信号处理(Digital Signal Processing,DSP)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)、可编程逻辑阵列(Programmable Logic Array,PLA)中的至少一种硬件形式来实现。处理器1210可集成中央处理器(Central Processing Unit,CPU)、图像处理器(Graphics Processing Unit,GPU)和调制解调器等中的一种或几种的组合。其中,CPU主要处理操作系统、用户界面和应用程序等;GPU用于负责显示内容的渲染和绘制;调制解调器用于处理无线通信。可以理解的是,上述调制解调器也可以不集成到处理器1210中,单独通过一块通信芯片进行实现。
存储器1220可以包括随机存储器(Random Access Memory,RAM),也可以包括只读存储器(Read-Only Memory,ROM)。存储器1220可用于存储指令、程序、代码、代码集或指令集。存储器1220可包括存储程序区和存储数据区,其中,存储程序区可存储用于实现操作系统的指令、用于实现至少一个功能的指令(比如触控功能、声音播放功能、图像播放功能等)、用于实现上述各个方法实施例的指令等。存储数据区还可以存储终端设备1200在使用中所创建的数据等。
可以理解地,终端设备1200可包括比上述结构框图中更多或更少的结构元件,例如,包括电源模块、物理按键、WiFi(Wireless Fidelity,无线保真)模块、扬声器、蓝牙模块、传感器等,还可在此不进行限定。
本申请实施例公开一种可穿戴设备,包括处理器、与处理器耦合的存储器,其中存储器可存储有一个或多个计算机程序,一个或多个计算机程序可以被配置为由一个或多个处理器执行时实现如上述各实施例描述的应用于可穿戴的方法。
本申请实施例公开一种计算机可读存储介质,其存储计算机程序,其中,该计算机程序被处理器执行时实现如上述实施例描述的应用于终端设备的方法。
本申请实施例公开一种计算机可读存储介质,其存储计算机程序,其中,该计算机程序被处理器执行时实现如上述实施例描述的应用于可穿戴设备的方法。
本申请实施例公开一种计算机程序产品,该计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,且该计算机程序可被处理器执行时实现如上述各实施例描述的应用于终端设备的方法。
本申请实施例公开一种计算机程序产品,该计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,且该计算机程序可被处理器执行时实现如上述各实施例描述的应用于可穿戴设备的方法。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的程序可存储于一非易失性计算机可读取存储介质中,该程序在执行时,可包括如上述各方法的实施例的流程。其中,所述的存储介质可为磁碟、光盘、ROM等。
如此处所使用的对存储器、存储、数据库或其它介质的任何引用可包括非易失性和/或易失性存储器。合适的非易失性存储器可包括ROM、可编程ROM(Programmable ROM,PROM)、可擦除PROM(Erasable PROM,EPROM)、电可擦除PROM(Electrically Erasable PROM,EEPROM)或闪存。易失性存储器可包括随机存取存储器(random access memory,RAM),它用作外部高速缓冲存储器。作为说明而非局限,RAM可为多种形式,诸如静态RAM(Static RAM,SRAM)、动态RAM(Dynamic Random Access Memory,DRAM)、同步DRAM(synchronous DRAM,SDRAM)、双倍数据率SDRAM(Double Data Rate SDRAM,DDR SDRAM)、增强型SDRAM(Enhanced Synchronous DRAM,ESDRAM)、同步链路DRAM(Synchlink DRAM,SLDRAM)、存储器总线直接RAM(Rambus DRAM,RDRAM)及直接存储器总线动态RAM(Direct Rambus DRAM,DRDRAM)。
应理解,说明书通篇中提到的“一个实施例”或“一实施例”意味着与实施例有关的特定特征、结 构或特性包括在本申请的至少一个实施例中。因此,在整个说明书各处出现的“在一个实施例中”或“在一实施例中”未必一定指相同的实施例。此外,这些特定特征、结构或特性可以以任意适合的方式结合在一个或多个实施例中。本领域技术人员也应该知悉,说明书中所描述的实施例均属于可选实施例,所涉及的动作和模块并不一定是本申请所必须的。
在本申请的各种实施例中,应理解,上述各过程的序号的大小并不意味着执行顺序的必然先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本申请实施例的实施过程构成任何限定。
在本申请各实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
上述集成的单元若以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可获取的存储器中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或者部分,可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干请求用以使得一台计算机设备(可以为个人计算机、服务器或者网络设备等,具体可以是计算机设备中的处理器)执行本申请的各个实施例上述方法的部分或全部步骤。
以上对本申请实施例公开的一种设备解锁方法、装置、电子设备及计算机可读存储介质进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想。同时,对于本领域的一般技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (28)

  1. 一种设备解锁方法,其特征在于,应用于终端设备,所述方法包括:
    响应于解锁指令,解除所述终端设备的锁屏状态;
    向与所述终端设备通信连接的可穿戴设备发送验证信息,以使得所述可穿戴设备在对所述验证信息验证成功的情况下,解除所述可穿戴设备的锁屏状态。
  2. 根据权利要求1所述的方法,其特征在于,在所述向与所述终端设备通信连接的可穿戴设备发送验证信息之前,所述方法还包括:
    确定与所述终端设备通信连接的可穿戴设备当前的运行情况;
    所述向与所述终端设备通信连接的可穿戴设备发送验证信息,包括:
    向所述可穿戴设备发送与所述当前的运行情况对应的验证信息。
  3. 根据权利要求2所述的方法,其特征在于,所述可穿戴设备安装有第一操作系统及第二操作系统;所述运行情况包括运行模式,所述运行模式包括所述第一操作系统持续在前台运行的第一模式、仅运行在所述第二操作系统的第二模式;
    所述向所述可穿戴设备发送与所述当前的运行情况对应的验证信息,包括:
    若所述可穿戴设备当前所处的运行模式为所述第一模式,则向所述可穿戴设备发送令牌及句柄;所述令牌及句柄用于触发所述可穿戴设备的所述第一操作系统对所述令牌及句柄进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态;
    若所述可穿戴设备当前所处的运行模式为所述第二模式,则向所述可穿戴设备发送与所述句柄对应的加密信息;所述加密信息用于触发所述可穿戴设备的所述第二操作系统对所述加密信息进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态;
    其中,所述第二操作系统下不具备可信执行环境TEE安全固件。
  4. 根据权利要求3所述的方法,其特征在于,所述运行模式还包括在所述第一操作系统与第二操作系统之间切换运行的第三模式;所述向所述可穿戴设备发送与所述当前的运行情况对应的验证信息,包括:
    若所述可穿戴设备当前所处的运行模式为所述第三模式,则向所述可穿戴设备发送令牌及句柄;所述令牌及句柄用于触发所述可穿戴设备的所述第一操作系统对所述令牌及句柄进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态;或,
    若所述可穿戴设备当前所处的运行模式为所述第三模式,且所述可穿戴设备当前运行所述第二操作系统,则向所述可穿戴设备发送与所述句柄对应的加密信息;所述加密信息用于触发所述可穿戴设备的所述第二操作系统对所述加密信息进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态。
  5. 根据权利要求3所述的方法,其特征在于,所述确定与所述终端设备通信连接的可穿戴设备当前的的运行情况,包括:
    向与所述终端设备通信连接的可穿戴设备发送模式获取请求,所述模式获取请求用于向所述可穿戴设备请求获取当前所处的运行模式;
    接收所述可穿戴设备返回的模式标识,并根据所述模式标识确定所述可穿戴设备当前所处的运行模式。
  6. 根据权利要求2所述的方法,其特征在于,所述可穿戴设备安装有第一操作系统及第二操作系统,所述第二操作系统不具备TEE安全固件;所述确定与所述终端设备通信连接的可穿戴设备当前的运行情况,包括:
    确定所述可穿戴设备中所述第一操作系统的当前状态,所述当前状态包括休眠状态、关机状态及运行状态中的任一种;
    所述向与所述终端设备通信连接的可穿戴设备发送验证信息,包括:
    向所述可穿戴设备发送,与所述第一操作系统的当前状态对应的验证信息。
  7. 根据权利要求6所述的方法,其特征在于,所述向所述可穿戴设备发送,与所述第一操作系 统的当前状态对应的验证信息,包括:
    若所述第一操作系统的当前状态为所述运行状态或休眠状态,则向所述可穿戴设备发送令牌及句柄;所述令牌及句柄用于触发所述可穿戴设备的所述第一操作系统对所述令牌及句柄进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态;
    若所述第一操作系统的当前状态为所述关机状态,则向所述可穿戴设备发送与所述句柄对应的加密信息;所述加密信息用于触发所述可穿戴设备的所述第二操作系统对所述加密信息进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态。
  8. 根据权利要求3~5、7任一所述的方法,其特征在于,所述第一操作系统具备TEE安全固件;所述令牌及句柄还用于触发所述可穿戴设备的所述第一操作系统在TEE中对所述令牌及句柄进行验证,并在验证成功后解除所述可穿戴设备的锁屏状态。
  9. 根据权利要求3~5、7任一所述的方法,其特征在于,所述句柄对应的加密信息包括哈希值和盐值,所述哈希值是采用哈希算法对所述句柄及所述盐值进行计算得到的。
  10. 根据权利要求1所述的方法,其特征在于,所述验证信息包括令牌及句柄;在所述响应于解锁指令,解除所述终端设备的锁屏状态之前,所述方法还包括:
    接收与所述终端设备通信连接的可穿戴设备发送的登记指令,所述登记指令为所述可穿戴设备检测到针对解锁开关的触发操作生成的;
    根据所述登记指令生成令牌,并将所述令牌发送至所述可穿戴设备,以使所述可穿戴设备对所述令牌进行登记,并生成与所述令牌对应的句柄;
    接收所述可穿戴设备返回的所述句柄,并保存所述令牌及句柄。
  11. 一种设备解锁方法,其特征在于,应用于可穿戴设备,所述方法包括:
    接收与所述可穿戴设备通信连接的终端设备发送的验证信息,所述验证信息为所述终端设备在解除锁屏状态的情况下发送的;
    对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态。
  12. 根据权利要求11所述的方法,其特征在于,所述接收与所述可穿戴设备通信连接的终端设备发送的验证信息,包括:
    接收与所述可穿戴设备通信连接的终端设备发送的,与所述可穿戴设备当前的运行情况对应的验证信息。
  13. 根据权利要求12所述的方法,其特征在于,所述可穿戴设备安装有第一操作系统及第二操作系统;所述运行情况包括运行模式,所述运行模式包括第一操作系统持续在前台运行的第一模式、仅运行在第二操作系统的第二模式;
    所述接收与所述可穿戴设备通信连接的终端设备发送的,与所述可穿戴设备当前的运行情况对应的验证信息,包括:
    若所述可穿戴设备当前所处的运行模式为所述第一模式,则接收所述终端设备发送的令牌及句柄;
    若所述可穿戴设备当前所处的运行模式为所述第二模式,则接收所述终端设备发送的与所述句柄对应的加密信息;
    所述对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态,包括:
    若所述可穿戴设备当前所处的运行模式为所述第一模式,则通过所述第一操作系统对所述令牌及句柄进行验证,在验证成功的情况下,由所述第一操作系统解除所述可穿戴设备的锁屏状态;
    若所述可穿戴设备当前所处的运行模式为所述第二模式,则通过所述第二操作系统对所述加密信息进行验证,在验证成功的情况下,由所述第二操作系统解除所述可穿戴设备的锁屏状态;
    其中,所述第二操作系统下不具备可信执行环境TEE安全固件。
  14. 根据权利要求13所述的方法,其特征在于,所述运行模式还包括在所述第一操作系统与第二操作系统之间切换运行的第三模式;
    所述接收与所述可穿戴设备通信连接的终端设备发送的,与所述可穿戴设备当前的运行情况对应的验证信息,包括:
    若所述可穿戴设备当前所处的运行模式为所述第三模式,则接收所述终端设备发送的令牌及句柄;
    所述对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态,包括:
    若所述可穿戴设备当前所处的运行模式为所述第三模式,则通过所述第一操作系统对所述令牌及句柄进行验证,在验证成功的情况下,由所述第一操作系统解除所述可穿戴设备的锁屏状态。
  15. 根据权利要求14所述的方法,其特征在于,若所述可穿戴设备当前所处的运行模式为所述第三模式,且当前运行所述第二操作系统,则在通过所述第一操作系统对所述令牌及句柄进行验证之前,所述方法还包括:
    通过所述第二操作系统向所述第一操作系统发送唤醒指令,所述唤醒指令用于唤醒处于休眠状态的所述第一操作系统。
  16. 根据权利要求13所述的方法,其特征在于,所述运行模式还包括在所述第一操作系统与第二操作系统之间切换运行的第三模式;
    所述接收与所述可穿戴设备通信连接的终端设备发送的,与所述可穿戴设备当前的运行情况对应的验证信息,包括:
    若所述可穿戴设备当前所处的运行模式为所述第三模式,且所述可穿戴设备当前运行所述第二操作系统,则接收所述终端设备发送的与所述句柄对应的加密信息;
    所述对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态,包括:
    若所述可穿戴设备当前所处的运行模式为所述第三模式,且所述可穿戴设备当前运行所述第二操作系统,则通过所述第二操作系统对所述加密信息进行验证,在验证成功的情况下,由所述第二操作系统解除所述可穿戴设备的锁屏状态。
  17. 根据权利要求13所述的方法,其特征在于,所述可穿戴设备安装有第一操作系统及第二操作系统,所述第二操作系统不具备TEE安全固件;在所述接收与所述可穿戴设备通信连接的终端设备发送的,与所述可穿戴设备当前的运行情况对应的验证信息之前,所述方法还包括:
    接收与所述可穿戴设备通信连接的终端设备发送的模式获取请求;
    根据所述模式获取请求,向所述终端设备返回当前所处的运行模式对应的模式标识,以使所述终端设备根据所述模式标识确定所述可穿戴设备当前所处的运行模式。
  18. 根据权利要求12所述的方法,其特征在于,所述接收与所述可穿戴设备通信连接的终端设备发送的,与所述可穿戴设备当前的运行情况对应的验证信息,包括:
    接收与所述可穿戴设备通信连接的终端设备发送的,与所述第一操作系统的当前状态对应的验证信息;
    其中,所述当前状态包括休眠状态、关机状态及运行状态中的任一种。
  19. 根据权利要求18所述的方法,其特征在于,所述接收与所述可穿戴设备通信连接的终端设备发送的,与所述第一操作系统的当前状态对应的验证信息,包括:
    若所述第一操作系统的当前状态为所述运行状态或休眠状态,则接收所述终端设备发送的令牌及句柄;
    若所述第一操作系统的当前状态为所述关机状态,则接收所述终端设备发送的与所述句柄对应的加密信息;
    所述对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态,包括:
    若所述第一操作系统的当前状态为所述运行状态或休眠状态,则通过所述第一操作系统对所述令牌及句柄进行验证,在验证成功的情况下,由所述第一操作系统解除所述可穿戴设备的锁屏状态;
    若所述第一操作系统的当前状态为所述关机状态,则通过所述第二操作系统对所述加密信息进行验证,在验证成功的情况下,由所述第二操作系统解除所述可穿戴设备的锁屏状态。
  20. 根据权利要求13~17、19任一所述的方法,其特征在于,所述第一操作系统具备TEE安全固件;所述通过所述第一操作系统对所述令牌及句柄进行验证,包括:
    通过所述第一操作系统在TEE中对所述令牌及句柄进行验证。
  21. 根据权利要求11所述的方法,其特征在于,所述验证信息包括令牌及句柄;在所述接收与所述可穿戴设备通信连接的终端设备发送的验证信息之前,所述方法还包括:
    若检测到针对解锁开关的触发操作,则响应所述触发操作,向与所述可穿戴设备通信连接的终端设备发送登记指令,所述登记指令用于指示所述终端设备生成令牌;
    接收所述终端设备发送的所述令牌,对所述令牌进行登记,并生成与所述令牌对应的句柄;
    向所述终端设备发送所述句柄,以使所述终端设备保存所述令牌及句柄。
  22. 根据权利要求21所述的方法,其特征在于,所述可穿戴设备安装有第一操作系统及第二操作系统;所述接收所述终端设备发送的所述令牌,对所述令牌进行登记,并生成与所述令牌对应的句柄,包括:
    通过所述第一操作系统接收所述终端设备发送的所述令牌,对所述令牌进行登记,并生成与所述令牌对应的句柄;
    所述方法还包括:
    通过所述第一操作系统生成与所述句柄对应的加密信息,并将所述加密信息发送给所述第二操作系统,并由所述第二操作系统保存所述加密信息。
  23. 根据权利要求22所述的方法,其特征在于,所述通过所述第一操作系统接收所述终端设备发送的所述令牌,对所述令牌进行登记,并生成与所述令牌对应的句柄,包括:
    通过所述第一操作系统接收所述终端设备发送的所述令牌,并将所述令牌转换为密钥;
    通过所述第一操作系统根据所述密钥对主密钥进行加密;
    通过所述第一操作系统接收输入的解锁密码,并根据所述解锁密码对加密的主密钥进行解密,若解密成功,则对所述令牌进行登记,并生成与所述令牌对应的句柄。
  24. 根据权利要求22所述的方法,其特征在于,所述通过所述第一操作系统生成与所述句柄对应的加密信息,并将所述加密信息发送给所述第二操作系统,包括:
    通过所述第一操作系统随机生成盐值,并将所述句柄及所述盐值组合得到目标字段;
    通过所述第一操作系统采用哈希算法对所述目标字段进行计算,得到哈希值;
    通过所述第一操作系统将所述盐值和所述哈希值发送至所述第二操作系统。
  25. 一种设备解锁装置,其特征在于,应用于终端设备,所述设备解锁装置包括:
    解锁模块,用于响应于解锁指令,解除所述终端设备的锁屏状态;
    发送模块,用于向与所述终端设备通信连接的可穿戴设备发送验证信息,以使得所述可穿戴设备在对所述验证信息验证成功的情况下,解除所述可穿戴设备的锁屏状态。
  26. 一种设备解锁装置,其特征在于,应用于可穿戴设备,所述设备解锁装置包括:
    接收模块,用于接收与所述可穿戴设备通信连接的终端设备发送的验证信息,所述验证信息为所述终端设备在解除锁屏状态的情况下发送的;
    验证模块,用于对所述验证信息进行验证,在验证成功的情况下,解除所述可穿戴设备的锁屏状态。
  27. 一种电子设备,其特征在于,包括存储器及处理器,所述存储器中存储有计算机程序,所述计算机程序被所述处理器执行时,使得所述处理器实现如权利要求1~10或11~24任一所述的设备解锁方法。
  28. 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所述计算机程序被处理器执行时实现如权利要求1~10或11~24任一所述的设备解锁方法。
PCT/CN2022/139111 2022-01-26 2022-12-14 设备解锁方法、装置、电子设备及计算机可读存储介质 WO2023142749A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210094454.4A CN116541810A (zh) 2022-01-26 2022-01-26 设备解锁方法、装置、电子设备及计算机可读存储介质
CN202210094454.4 2022-01-26

Publications (1)

Publication Number Publication Date
WO2023142749A1 true WO2023142749A1 (zh) 2023-08-03

Family

ID=87451160

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/139111 WO2023142749A1 (zh) 2022-01-26 2022-12-14 设备解锁方法、装置、电子设备及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN116541810A (zh)
WO (1) WO2023142749A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058942A1 (en) * 2013-08-22 2015-02-26 Motorola Mobility Llc Accessing a Primary Device Using a Wearable Device and a Wireless Link
CN105138267A (zh) * 2015-08-26 2015-12-09 广东欧珀移动通信有限公司 一种可穿戴设备的解锁方法及终端
CN105160222A (zh) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 一种解锁方法和移动终端
CN105631271A (zh) * 2016-01-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 解锁方法、解锁装置及可穿戴智能设备和终端
CN110419042A (zh) * 2017-09-29 2019-11-05 华为技术有限公司 一种屏幕解锁的方法及终端
CN113343187A (zh) * 2020-02-18 2021-09-03 Oppo广东移动通信有限公司 可穿戴设备的解锁方法和装置、电子设备及存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150058942A1 (en) * 2013-08-22 2015-02-26 Motorola Mobility Llc Accessing a Primary Device Using a Wearable Device and a Wireless Link
CN105138267A (zh) * 2015-08-26 2015-12-09 广东欧珀移动通信有限公司 一种可穿戴设备的解锁方法及终端
CN105160222A (zh) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 一种解锁方法和移动终端
CN105631271A (zh) * 2016-01-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 解锁方法、解锁装置及可穿戴智能设备和终端
CN110419042A (zh) * 2017-09-29 2019-11-05 华为技术有限公司 一种屏幕解锁的方法及终端
CN113343187A (zh) * 2020-02-18 2021-09-03 Oppo广东移动通信有限公司 可穿戴设备的解锁方法和装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN116541810A (zh) 2023-08-04

Similar Documents

Publication Publication Date Title
JP4933519B2 (ja) 生体認証装置を備えるコンピュータ
TWI245182B (en) Method, chipset, system and recording medium for responding to a sleep attack
US8763112B2 (en) Systems and methods for power-on user authentication
WO2016110101A1 (zh) 一种指纹认证方法、装置、智能终端和计算机存储介质
US10591975B2 (en) Memory access management for low-power use cases of a system on chip via secure non-volatile random access memory
CN108476404A (zh) 安全设备配对
KR101654778B1 (ko) 하드웨어 강제 액세스 보호
CN110741370A (zh) 利用用户输入的生物识别认证
US11212283B2 (en) Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
US8738904B2 (en) Electronic devices and methods for sharing encryption settings in dual operating systems
US8918652B2 (en) System and method for BIOS and controller communication
CN111125664B (zh) 一种电子设备及登录操作系统的方法
TW201631507A (zh) 用於動態修改處理系統之鑑認要求的方法及裝置(二)
TW201028883A (en) Secure platform management device
CN102024115B (zh) 一种具有用户安全子系统的计算机
US11194374B2 (en) Systems and methods for waking an information handling system from a wireless peripheral device
WO2023142749A1 (zh) 设备解锁方法、装置、电子设备及计算机可读存储介质
WO2015099938A1 (en) Content protection system using biometric authentication
WO2023142748A1 (zh) 设备解锁方法、装置、电子设备及计算机可读存储介质
WO2023142743A1 (zh) 设备解锁方法、装置、电子设备及计算机可读存储介质
TWI709873B (zh) 以電子鑰匙安全管理電子裝置的方法及系統
TW202236135A (zh) 加解密神經網路模型的方法、電子設備及存儲介質
JP4800340B2 (ja) Tcgの仕様に基づくフィジカル・プリゼンスの認証方法およびコンピュータ
TW202324971A (zh) 經加密邊帶通訊技術
TWI506469B (zh) 資料保密方法、電子裝置和外部儲存裝置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22923535

Country of ref document: EP

Kind code of ref document: A1