WO2018035930A1 - Procédé et dispositif de déverrouillage de système - Google Patents
Procédé et dispositif de déverrouillage de système Download PDFInfo
- Publication number
- WO2018035930A1 WO2018035930A1 PCT/CN2016/100778 CN2016100778W WO2018035930A1 WO 2018035930 A1 WO2018035930 A1 WO 2018035930A1 CN 2016100778 W CN2016100778 W CN 2016100778W WO 2018035930 A1 WO2018035930 A1 WO 2018035930A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- authentication
- terminal device
- threshold
- information
- authentication information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a method and device for unlocking a system.
- many terminal devices are equipped with relevant lock screens and unlocking programs.
- the lock screen and the unlocking program are run on the terminal screen, and the related unlocking interface is displayed.
- the authentication information input by the user is passed. After the certification, the system can be successfully entered.
- the communication terminal device can only set one unlock interface and corresponding password.
- the terminal device may be forced to speak the password or perform the terminal device. Unlock.
- the infringer can operate the terminal device of the victim to log in to the payment application to perform the transfer and other operations.
- the unlocking methods adopted by the terminal device include: digital password, gesture pattern, sliding unlocking, etc., and these unlocking methods cannot effectively prevent the unscrupulous person from performing the transfer and the like when the owner of the terminal device is forced to unlock the terminal device.
- the embodiment of the invention provides a method and a device for unlocking a system, so as to protect the security of the personal property of the terminal device owner when it is forced to unlock the terminal device.
- An embodiment of the present invention provides a method for unlocking a system, including:
- the terminal device receives the authentication information in a system locked state
- the terminal device uses the preset system unlocking authentication information to authenticate the authentication information. If the authentication fails, the authentication information is re-received, and the re-received authentication information is authenticated by using the preset system unlocking authentication information. Until the certification is passed;
- the terminal device counts the number of authentication failures, and enters the first system if the number of authentication failures is less than the first threshold, and enters the second system if the number of authentication failures is greater than the second threshold;
- the first system lacks a payment class application, and the second threshold is greater than or equal to the first threshold.
- the method before the terminal device receives the authentication information in the system locked state, the method further includes:
- the terminal device displays an authentication interface after receiving the unlocking instruction.
- the method further includes:
- the terminal device freezes and hides the payment application.
- the method further includes:
- the replacement command is received, the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction, and then the re-receiving authentication information is executed.
- the method further includes:
- the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal.
- the embodiment of the invention further discloses a terminal device, including:
- the receiving unit is configured to receive the authentication information when the terminal device is in the system locked state; and re-receive the authentication information after the authentication fails;
- An authentication unit configured to authenticate the authentication information by using preset system unlock authentication information
- the statistical unit is set to count the number of failed authentication attempts.
- An execution unit configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold;
- the system lacks a payment application, and the second threshold is greater than or equal to the first threshold;
- the receiving unit is further configured to receive an unlocking instruction; the device further includes:
- a display unit configured to display an authentication interface after the receiving unit receives the unlocking instruction.
- the device further includes:
- the application control unit is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold.
- the device further includes:
- the output unit is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode
- the receiving unit is further configured to receive a replacement instruction
- the authentication control unit is configured to: if the receiving unit receives the replacement instruction, replace the currently used authentication mode with the authentication mode specified by the replacement instruction;
- the receiving unit is further configured to re-receive the authentication information after the currently used authentication mode is replaced with the authentication mode specified by the replacement instruction.
- the device further includes:
- a positioning unit configured to locate location information of the terminal device.
- the sending unit is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.
- the method of the embodiment provides an unlocking method that can freeze and hide the payment application.
- the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
- FIG. 1 is a schematic flowchart of a system unlocking method according to an embodiment of the present invention
- FIG. 2 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 3 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 4 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 5 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- FIG. 8 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
- the embodiment of the invention provides a system unlocking method, as shown in FIG. 1 , including:
- the terminal device receives the authentication information in a system locked state
- the terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, or the like.
- the system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state.
- the authentication information is verification information required to release the locked state of the terminal device.
- the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
- the authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like.
- the corresponding authentication information is a fingerprint.
- the authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.
- the terminal device receives the authentication information in the system locked state.
- the authentication device may have no authentication interface, that is, the mobile phone is in a black screen state.
- the user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.
- the terminal device authenticates the authentication information by using preset system unlocking authentication information, and if the authentication fails, re-receiving the authentication information, and authenticating the re-received authentication information by using the preset system unlocking authentication information, until Certification passed.
- the preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authenticating the authentication information input by the user.
- the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
- the embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.
- the first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be found in the system.
- the payment application refers to an application used on a communication terminal device such as Alipay, WeChat payment, and mobile banking.
- the first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc.
- the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7.
- the second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4.
- the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the first system or the second system may be entered.
- both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.
- the embodiment provides an unlocking method that can freeze and hide the payment application.
- the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
- the embodiment of the present invention provides another method for receiving authentication information on the basis of the previous embodiment, which is specifically as follows: the terminal device receives the authentication in the system locked state. Before the information, the above methods also include:
- the authentication interface is displayed.
- the method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes.
- the terminal device in the embodiment of the present invention displays the authentication interface after receiving the unlocking instruction.
- the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.
- the user After the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.
- the method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.
- the method of the present invention provides a method for configuring a security system, which is as follows: Before the number of the authentication failures is greater than the second threshold, the method further includes:
- the above terminal device freezes and hides the above payment type application.
- the second system is the configured security system.
- the payment application in the second system is in a frozen and hidden state, and the payment application cannot be found in the second system. Therefore, even if the terminal device is successfully unlocked, the transfer cannot be performed. operating.
- the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds.
- the configuration process of the second system that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not notice the process.
- the payment application such as Alipay, mobile banking, WeChat payment, etc. in the mobile phone is frozen and cannot be found in the mobile phone.
- the method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.
- the method of the present invention further provides a method for replacing the authentication mode, as follows: After the authentication fails, the method further includes:
- the currently used authentication method is replaced with the authentication method specified by the replacement instruction, and then the above re-accept authentication information is executed.
- a plurality of authentication modes can be set in the terminal device.
- the user forgets the current authentication information of the terminal device, the user can also change another authentication mode.
- the user when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. .
- the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.
- three authentication modes such as pattern unlocking, fingerprint unlocking, and voice unlocking
- the default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or select another authentication method after the authentication fails; if the user is forced to unlock, he can deliberately fail the authentication and then select the pattern that is easy to deliberately failed to be unlocked. the way.
- the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.
- the method for replacing the authentication method provided by the embodiment of the present invention not only enriches the authentication mode, but also improves the practical value of the method of the embodiment of the present invention.
- An embodiment of the present invention provides an alarm method, which is as follows: After the terminal device enters the second system, the method further includes:
- the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal.
- the preset target terminal may be a terminal device of a mechanism such as a police station preset by the user, or may be another terminal device.
- the alarm message is used to indicate that the user of the terminal device is in danger and needs help.
- the alarm information may include the user's identity information, physical information, appearance information, and the like.
- the location information accurately locates the location of the terminal device.
- the terminal device periodically sends location information to the preset target terminal device, and continuously notifies the location information of the preset target terminal device.
- the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.
- the alarm method provided by the embodiment of the invention can covertly transmit the location information and the alarm information of the terminal device to the preset target terminal, thereby helping the victim to be rescued in time.
- the embodiment of the invention further provides a terminal device, as shown in FIG. 2, comprising:
- the receiving unit 201 is configured to receive the authentication information when the terminal device is in the system locked state, and re-receive the authentication information after the authentication fails;
- the authentication unit 202 is configured to authenticate the foregoing authentication information by using preset system unlock authentication information;
- the statistics unit 203 is configured to count the number of failed authentication attempts
- the executing unit 204 is configured to enter the first system if the number of authentication failures is less than the first threshold, and enter the second system if the number of authentication failures is greater than the second threshold; the second system lacks a payment class compared to the first system.
- the second threshold is greater than or equal to the first threshold.
- the terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a MID, or the like.
- the system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state.
- the authentication information is verification information required to release the locked state of the terminal device.
- the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
- the authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like.
- the corresponding authentication information is a fingerprint.
- the authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.
- the receiving unit 201 is arranged to receive authentication information, which may be in various forms.
- the terminal device receives the authentication information in the system locked state.
- the authentication device may have no authentication interface, that is, the mobile phone is in a black screen state.
- the user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.
- the preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authentication with the authentication information input by the user.
- the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
- the authentication unit 202 performs authentication using the preset system unlock authentication information and the above-described authentication information.
- the embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.
- the first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be found in the system.
- the payment application refers to an application used on a communication terminal such as Alipay, WeChat payment, and mobile banking.
- the first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc.
- the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7.
- the second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4.
- the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the system may enter the first system or the second system.
- both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.
- the method of the embodiment provides an unlocking method that can freeze and hide the payment application.
- the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
- the embodiment of the present invention further provides another method for receiving the authentication information, which is specifically as follows. Further, as shown in FIG. 3, the device further includes:
- the receiving unit is further configured to receive an unlocking instruction
- the display unit 301 is configured to display an authentication interface after the receiving unit receives the unlocking instruction.
- the method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes.
- the terminal device in the embodiment of the present invention displays the authentication interface after receiving the instruction, and the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.
- the user After the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.
- the method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.
- the embodiment of the present invention further provides a method for configuring a security system, which is specifically as follows. Further, as shown in FIG. 4, the terminal device further includes:
- the freeze and hide unit unit 401 is configured to freeze and hide the payment application in the terminal device before entering the second system if the number of authentication failures is greater than the second threshold.
- the second system is a configured security system.
- the payment application in the second system is in a frozen and hidden state, and the payment application cannot be found in the second system. Therefore, even if the terminal device is successfully unlocked, the transfer cannot be performed. .
- the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds.
- the configuration process of the second system that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not notice the process.
- the payment application such as Alipay, mobile banking, and WeChat payment in the mobile phone cannot be found in the mobile phone.
- the method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.
- the embodiment of the present invention further provides a method for replacing the authentication mode, which is specifically as follows. Further, as shown in FIG. 5, the device further includes:
- the output unit 501 is configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode;
- the receiving unit 201 is further configured to receive a replacement instruction
- the replacing unit 502 is configured to replace the currently used authentication method with the authentication method specified by the replacement instruction, if the replacement command is received;
- the receiving unit 201 is further configured to re-receive the authentication information after the current authentication mode is replaced with the authentication mode specified by the replacement command.
- a plurality of authentication modes can be set in the terminal device.
- the user forgets the current authentication information of the terminal device, the user can also change another authentication mode.
- the user when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. .
- the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.
- three authentication modes such as pattern unlocking, fingerprint unlocking, and voice unlocking
- the default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or select another authentication method after the authentication fails; if the user is forced to unlock, he can deliberately fail to select the pattern unlocking method that is easy to deliberately fail to authenticate. .
- the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.
- the method for replacing the authentication method provided by the embodiment of the present invention not only enriches the authentication mode, but also improves the practical value of the method of the embodiment of the present invention.
- the embodiment of the present invention provides an alarm method based on the foregoing embodiment, and is specifically as follows. Further, as shown in FIG. 6, the device further includes:
- the sending unit 601 is configured to send the location information and the alarm information of the terminal device to the preset target terminal after the terminal device enters the second system.
- the positioning unit 602 is configured to locate the location information of the terminal device.
- the preset target terminal may be a terminal device of a police station preset by the user or may be another terminal.
- the alarm information is used to indicate that the user of the terminal device is in danger and needs help, and may include the user's identity information, physical information, and appearance information.
- the location information accurately locates the location of the terminal device.
- the terminal device periodically sends the location information to the preset target terminal, and continuously notifies the location information of the preset target terminal terminal device.
- the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.
- the alarm method provided by the embodiment of the invention can covertly transmit the location information and the alarm information of the terminal device to the preset target terminal, thereby helping the victim to get out of danger in time.
- the embodiment of the present invention further provides a terminal device, as shown in FIG. 7, comprising: a processor 701 and a memory 702, an input device 703, and an output device 704; wherein the memory 702 can be used to provide the processor 701 for performing data processing.
- the cache and the local cache of the preset system unlock authentication information may also be used to provide a storage space for the processor 701 to execute the data processing call and the obtained result data; wherein the input device 703 is configured to be in the locked state of the terminal device Receiving the authentication information, and also for re-receiving the authentication information and receiving the change instruction after the authentication fails; the output device 704 is configured to output the prompt message and the authentication interface, and is further configured to send the location information and the alarm information of the terminal device to the preset target terminal. .
- the processor 701 is configured to acquire authentication information when the terminal device is in a locked state, and use the preset system unlock authentication information to authenticate the authentication information, and if the authentication fails, re-receive the authentication information, and use the foregoing pre-
- the system unlocking authentication information is used to authenticate the re-accepted authentication information until the authentication is passed; if the number of authentication failures is less than the first threshold, the system enters the first system, and if the number of authentication failures is greater than the second threshold, the system enters The second system; the second system lacks a payment application compared to the first system, and the second threshold is greater than or equal to the first threshold.
- the terminal device may be, for example, a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a MID, or the like.
- the system lock status is a state in which the terminal device is not unlocked, in which the terminal device is usually in a standby state.
- the authentication information is verification information required to release the locked state of the terminal device.
- the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
- the authentication method may be, for example, sliding unlocking, fingerprint unlocking, voice unlocking, and the like.
- the corresponding authentication information is a fingerprint.
- the authentication mode and the corresponding authentication information are not limited by the embodiment of the present invention.
- the terminal device receives the authentication information in the system locked state.
- the authentication device may have no authentication interface, that is, the mobile phone is in a black screen state.
- the user can input authentication information for authentication when the terminal device is in a black screen state, for example, unlocking by fingerprint in a black screen state.
- the preset system unlock authentication information is authentication information stored locally at the terminal device, and is used for authentication with the authentication information input by the user.
- the authentication information may be one or more of a string, a fingerprint, a voice, and the like, and corresponds to an authentication method in which the terminal device is unlocked.
- the embodiments of the present invention do not focus on how to perform authentication, and therefore will not be described in detail herein. If the authentication fails, the user needs to re-enter the authentication information, and the terminal device authenticates the re-accepted authentication information. Once the authentication fails, the user needs to re-enter the user once the authentication is passed. If the authentication information is not input before the authentication succeeds, the terminal device waits for a certain period of time and then enters the standby state.
- the first system is a system after normal startup, and the payment application in the second system is in a frozen and hidden state, that is, the payment application in the terminal device system is frozen and cannot be seen in the system.
- the payment application refers to an application used on a communication terminal such as Alipay, WeChat payment, and mobile banking.
- the first threshold may be, for example, a positive integer of 2, 3, 4, 5, 6, etc.
- the second threshold may be, for example, a positive integer such as 2, 3, 4, 5, 6, or 7.
- the second threshold is greater than or equal to the first threshold. If the second threshold is equal to the first threshold, for example, the first threshold and the second threshold are both 3. If the number of authentication failures is less than 3, the system enters the first system, and if the number of authentication failures is greater than 3, Entering the second system, if the number of authentication failures is equal to 3, it is not limited, and may enter the first system or the second system; if the second threshold is greater than the first threshold, for example, the first threshold is 3, and the second threshold is 4.
- the system enters the first system. If the number of authentication failures is greater than 4, the system enters the second system. If the number of authentication failures is 3 or 4, the limitation is not limited, and the system may enter the first system or the second system.
- both the first threshold and the second threshold are 3, if the fourth authentication is successful, the second system is entered, in which all applications except the payment class can be seen and operated; if the second If the secondary authentication is successful, the system enters the first system, that is, the normal startup system.
- the method of the embodiment provides an unlocking method that can freeze and hide the payment application.
- the payment application can be frozen and hidden by a simple operation to protect the security of his personal property.
- the embodiment of the present invention further provides an implementation method for receiving authentication information, which is specifically as follows:
- the processor 701 is further configured to display an authentication interface after the receiving unit receives the unlocking instruction.
- the method for receiving authentication information provided by the embodiment of the present invention is to facilitate the user to unlock the terminal device and support multiple authentication modes.
- the terminal device in the embodiment of the present invention displays the authentication interface after receiving the instruction, and the authentication interface may be in various forms, such as fingerprint unlocking, pattern unlocking, voice unlocking, and the like.
- the user After the user displays the authentication interface on the display screen of the terminal device, the user inputs the corresponding authentication information according to the authentication interface, and if the authentication fails, the authentication information is re-entered. For example, after the user lights up the display screen of the terminal device, the terminal device can display the unlocking interface through the corresponding unlocking operation, and then the user can input the corresponding authentication information for authentication. If the authentication succeeds, enter the corresponding system; if the authentication is unsuccessful, re-enter the authentication information for authentication.
- the method for receiving authentication information provided by the embodiment of the present invention is simpler and supports multiple authentication methods.
- the embodiment of the present invention further provides a method for configuring a security system, where the processor 701 is further configured to freeze and hide the terminal device before entering the second system if the number of authentication failures is greater than the second threshold. Payment application.
- the second system described above is the configured security system, and the payment application in the second system is in a frozen and hidden state.
- the payment type application cannot be found in the second system, so even if the terminal device is successfully unlocked, operations such as transfer cannot be performed.
- the terminal device first freezes and hides the payment application, and then enters the second system after the authentication succeeds.
- the configuration process of the second system that is, the freezing and hiding process of the payment application in the terminal device is very fast, and the user does not think that there is such a process.
- the payment application such as Alipay, mobile banking, and WeChat payment in the mobile phone cannot be found in the mobile phone.
- the method for configuring the security system provided by the embodiment of the present invention is very concealed and can effectively prevent operations such as illegal transfer after the user is forced to unlock the terminal device.
- the embodiment of the present invention further provides a method for replacing the authentication mode, which is specifically as follows: the processor 701 is further configured to output a prompt message after the authentication fails, and prompt whether to replace the authentication mode and the current authentication mode after receiving the replacement command. Replace the authentication method specified by the above replacement command and re-accept the authentication information.
- a plurality of authentication modes can be set in the terminal device.
- the user forgets the current authentication information of the terminal device, the user can also change another authentication mode.
- the user when the user is forced to unlock the terminal device, the user can select an authentication method that is easier to authenticate. .
- the authentication mode is crucial. If the terminal device has only one authentication mode and the authentication mode is difficult to deliberately fail authentication, the method of the embodiment of the present invention loses its meaning. For example, if the terminal device only has the authentication mode of fingerprint unlocking and the fingerprint authentication is very accurate, it is difficult for the user to make the number of authentication failures reach the second threshold when forced to unlock the terminal device.
- three authentication modes such as pattern unlocking, fingerprint unlocking, and voice unlocking
- the default authentication mode is fingerprint unlocking. If the user is in a safe situation, he can choose to use the fingerprint to unlock or deliberately fail to select another authentication method; if the user is forced to unlock, he can deliberately fail to select the pattern unlocking method that is easy to deliberately fail.
- the number of authentication failures is cumulative, and the number of authentication failures is the sum of the number of authentication failures in different authentication modes. This makes it easier to reach the second threshold described above, causing the terminal device to enter the second system.
- the method for replacing the authentication method provided by the embodiment of the invention not only enriches the authentication mode, but also improves the practical value of the method of the invention.
- the embodiment of the present invention further provides an alarm method, which is specifically as follows:
- the processor 701 is further configured to: after the terminal device enters the second system, send the location information and the alarm information of the terminal device to the preset target terminal.
- the preset target terminal may be a terminal device of a police station preset by the user or may be another terminal.
- the alarm information is used to indicate that the user of the terminal device is in danger and needs help, and may include the user's identity information, physical information, and appearance information.
- the location information accurately locates the location of the terminal device.
- the terminal device periodically sends the location information to the preset target terminal, and continuously notifies the location information of the preset target terminal terminal device.
- the terminal device sends the location information and the alarm information of the terminal device to the preset target terminal in a concealed manner, and the terminal device does not display the corresponding information.
- the alarm method provided by the embodiment of the invention can covertly the location information and the alarm information of the terminal device to the preset target terminal, which can help the victim to be rescued in time.
- the embodiment of the present invention further provides another terminal device.
- FIG. 8 for the convenience of description, only parts related to the embodiment of the present invention are shown. For details that are not disclosed, refer to the method of the embodiment of the present invention. section.
- the terminal device may be any terminal device including a mobile phone, a tablet computer, a vehicle-mounted computer, and the terminal device is used as a mobile phone as an example.
- FIG. 8 is a block diagram showing a partial structure of a mobile phone related to a terminal device provided by an embodiment of the present invention.
- the mobile phone includes: a radio frequency (RF) circuit 810, a memory 820, an input unit 830, a display unit 840, a sensor 850, an audio circuit 860, a wireless fidelity (WiFi) module 870, and a processor 880. And power supply 890 and other components.
- RF radio frequency
- the RF circuit 810 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, it is processed by the processor 880. In addition, the uplink data is designed to be sent to the base station. Generally, RF circuit 810 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 810 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
- GSM Global System of Mobile communication
- GPRS General Packet Radio Service
- the memory 820 can be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 820.
- the memory 820 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
- memory 820 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the input unit 830 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset.
- the input unit 830 may include a touch panel 831 and other input devices 832.
- Other input devices 832 can be used to receive input fingerprints, voice, and the like.
- the touch panel 831 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 831 or near the touch panel 831. Operation), and drive the corresponding connecting device according to a preset program.
- the touch panel 831 can include two parts: a touch detection device and a touch controller.
- the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
- the processor 880 is provided and can receive commands from the processor 880 and execute them.
- the touch panel 831 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
- the input unit 830 may also include other input devices 832.
- other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
- the display unit 840 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone.
- the display unit 840 can include a display panel 841.
- the display panel 841 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
- the touch panel 831 can cover the display panel 841. When the touch panel 831 detects a touch operation thereon or nearby, the touch panel 831 transmits to the processor 880 to determine the type of the touch event, and then the processor 880 according to the touch event. The type provides a corresponding visual output on display panel 841.
- the touch panel 831 and the display panel 841 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 831 can be integrated with the display panel 841. Realize the input and output functions of the phone.
- the handset may also include at least one type of sensor 850, such as a light sensor, motion sensor, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 841 according to the brightness of the ambient light, and the proximity sensor may close the display panel 841 and/or when the mobile phone moves to the ear. Or backlight.
- the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.
- the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
- Audio circuitry 860, speaker 861, and microphone 862 provide an audio interface between the user and the handset.
- the audio circuit 860 can transmit the converted electrical data of the received audio data to the speaker 861 for conversion to the sound signal output by the speaker 861; on the other hand, the microphone 862 converts the collected sound signal into an electrical signal by the audio circuit 860. After receiving, it is converted into audio data, and then the audio data is output to the processor 880 for processing, sent to the mobile phone 810 via the RF circuit 810, or the audio data is output to the memory 820 for further processing.
- WiFi is a short-range wireless transmission technology
- the mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 870, which provides users with wireless broadband Internet access.
- FIG. 8 shows the WiFi module 870, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the invention.
- the processor 880 is the control center of the handset, and connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 820, and invoking data stored in the memory 820, executing The phone's various functions and processing data, so that the overall monitoring of the phone.
- the processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
- the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 880.
- the handset also includes a power source 890 (such as a battery) that supplies power to the various components.
- a power source 890 such as a battery
- the power source can be logically coupled to the processor 880 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
- the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
- each step method flow may be implemented based on the structure of the terminal device.
- the sensor 850 or the touch panel 831 can be used as a fingerprint collection device.
- each unit included is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented;
- the specific names are also for convenience of distinguishing from each other and are not intended to limit the scope of the present invention.
- the storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Telephone Function (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
L'invention concerne un procédé et un dispositif de déverrouillage de système. Le procédé comprend les étapes suivantes : un dispositif terminal reçoit des informations d'authentification dans un état verrouillé d'un système (101) ; le dispositif terminal authentifie les informations d'authentification en utilisant des informations d'authentification de déverrouillage de système prédéfinies, reçoit à nouveau les informations d'authentification si l'authentification échoue, et authentifie les informations d'authentification à nouveau reçues en utilisant les informations d'authentification de déverrouillage de système prédéfinies, jusqu'à ce que l'authentification réussisse (102) ; et le dispositif terminal compte le nombre d'échecs d'authentification, le dispositif terminal entre dans un premier système si le nombre d'échecs d'authentification est inférieur ou égal à un premier seuil et le dispositif terminal entre dans un second système si le nombre d'échecs d'authentification est supérieur à un second seuil, le second système n'ayant pas d'application de paiement en comparaison avec le premier système et le second seuil étant supérieur ou égal au premier seuil (103). Au moyen du dispositif et du procédé, la sécurité des biens personnels peut être protégée dans un cas dans lequel un propriétaire d'un dispositif terminal est forcé à déverrouiller le dispositif terminal du propriétaire.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201610718935.2A CN106327193B (zh) | 2016-08-24 | 2016-08-24 | 一种系统解锁方法和设备 |
| CN201610718935.2 | 2016-08-24 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018035930A1 true WO2018035930A1 (fr) | 2018-03-01 |
Family
ID=57791098
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/100778 Ceased WO2018035930A1 (fr) | 2016-08-24 | 2016-09-29 | Procédé et dispositif de déverrouillage de système |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106327193B (fr) |
| WO (1) | WO2018035930A1 (fr) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020022737A1 (fr) | 2018-07-23 | 2020-01-30 | Samsung Electronics Co., Ltd. | Appareil électronique et procédé de commande associé |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108320391B (zh) * | 2017-01-18 | 2021-03-09 | 芜湖美的厨卫电器制造有限公司 | 租赁设备的解锁方法、系统及其设备 |
| CN110226164B (zh) * | 2017-01-22 | 2022-02-08 | 华为技术有限公司 | 一种验证方法、移动终端、设备和系统 |
| CN107395889B (zh) * | 2017-07-28 | 2020-01-21 | Oppo广东移动通信有限公司 | 降低移动终端功耗的方法、装置、存储介质及移动终端 |
| CN111128138A (zh) * | 2020-03-30 | 2020-05-08 | 深圳市友杰智新科技有限公司 | 语音唤醒方法、装置、计算机设备和存储介质 |
| CN111814121B (zh) * | 2020-06-29 | 2021-08-31 | 江苏中州科技有限公司 | 一种基于计算机系统的登录鉴权管理系统及方法 |
| CN115393033A (zh) * | 2022-08-15 | 2022-11-25 | 中国工商银行股份有限公司 | 银行卡风险识别方法及装置 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1472952A (zh) * | 2002-06-26 | 2004-02-04 | 夏普株式会社 | 电子设备的功能限制解除方法和电子设备 |
| CN101345967A (zh) * | 2008-08-15 | 2009-01-14 | 深圳华为通信技术有限公司 | 一种功能控制方法以及嵌入式终端 |
| CN104253818A (zh) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | 服务器、终端鉴权方法以及服务器、终端 |
| CN104361303A (zh) * | 2014-10-22 | 2015-02-18 | 小米科技有限责任公司 | 终端异常的处理方法及装置、电子设备 |
| CN105574378A (zh) * | 2015-12-09 | 2016-05-11 | 小米科技有限责任公司 | 终端控制方法及终端控制装置 |
-
2016
- 2016-08-24 CN CN201610718935.2A patent/CN106327193B/zh not_active Expired - Fee Related
- 2016-09-29 WO PCT/CN2016/100778 patent/WO2018035930A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1472952A (zh) * | 2002-06-26 | 2004-02-04 | 夏普株式会社 | 电子设备的功能限制解除方法和电子设备 |
| CN101345967A (zh) * | 2008-08-15 | 2009-01-14 | 深圳华为通信技术有限公司 | 一种功能控制方法以及嵌入式终端 |
| CN104253818A (zh) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | 服务器、终端鉴权方法以及服务器、终端 |
| CN104361303A (zh) * | 2014-10-22 | 2015-02-18 | 小米科技有限责任公司 | 终端异常的处理方法及装置、电子设备 |
| CN105574378A (zh) * | 2015-12-09 | 2016-05-11 | 小米科技有限责任公司 | 终端控制方法及终端控制装置 |
Cited By (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2020022737A1 (fr) | 2018-07-23 | 2020-01-30 | Samsung Electronics Co., Ltd. | Appareil électronique et procédé de commande associé |
| KR20200010946A (ko) * | 2018-07-23 | 2020-01-31 | 삼성전자주식회사 | 전자 장치 및 그 제어 방법. |
| EP3776293A1 (fr) | 2018-07-23 | 2021-02-17 | Samsung Electronics Co., Ltd. | Appareil électronique et procédé de commande associé |
| EP3776293A4 (fr) * | 2018-07-23 | 2021-06-09 | Samsung Electronics Co., Ltd. | Appareil électronique et procédé de commande associé |
| US11403378B2 (en) | 2018-07-23 | 2022-08-02 | Samsung Electronics Co., Ltd. | Electronic apparatus and controlling method thereof |
| KR102520199B1 (ko) * | 2018-07-23 | 2023-04-11 | 삼성전자주식회사 | 전자 장치 및 그 제어 방법. |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106327193B (zh) | 2019-08-02 |
| CN106327193A (zh) | 2017-01-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2018035930A1 (fr) | Procédé et dispositif de déverrouillage de système | |
| WO2014017858A1 (fr) | Appareil de terminal utilisateur et procédé de commande associé | |
| WO2017164585A1 (fr) | Dispositif électronique et son procédé de commande | |
| WO2017067271A1 (fr) | Procédé de reconnaissance d'empreintes digitales, appareil de reconnaissance d'empreintes digitales, et terminal mobile | |
| WO2018072567A1 (fr) | Procédé et système d'appel à l'aide d'urgence basés sur une identification par empreinte digitale pour un terminal mobile, et terminal mobile | |
| WO2012036324A1 (fr) | Terminal mobile et procédé permettant de commander son fonctionnement | |
| WO2018018772A1 (fr) | Procédé de gestion de processus d'arrière-plan et dispositif terminal | |
| WO2013137503A1 (fr) | Procédé de déverrouillage utilisant un traitement de langage naturel et terminal pour réaliser celui-ci | |
| WO2016184330A1 (fr) | Procédé et dispositif de déverrouillage d'écran, et support d'informations | |
| WO2018093005A1 (fr) | Terminal mobile et procédé de commande associé | |
| WO2012016476A1 (fr) | Procédé de mise en état d'attente de terminal mobile portable, microprocesseur et téléphone cellulaire correspondant | |
| WO2017071330A1 (fr) | Procédé de cryptage et de décryptage de données et dispositif de cryptage et de décryptage | |
| WO2018076879A1 (fr) | Procédé et appareil de sauvegarde de données, support d'informations et terminal | |
| EP2910045A1 (fr) | Dispositif et procédé pour transmettre une clé électronique de ce dispositif | |
| WO2017071326A1 (fr) | Procédé, dispositif, et système de commande de terminal | |
| WO2017071324A1 (fr) | Procédé de cryptage et de décryptage de transmission de fichier et dispositif de cryptage et de décryptage | |
| WO2018171534A1 (fr) | Procédé de commande d'alimentation électrique de double appareil photo de terminal mobile, système, et terminal mobile. | |
| WO2018018691A1 (fr) | Procédé de commutation d'esim, et dispositif terminal | |
| WO2018076888A1 (fr) | Procédé, dispositif et système de synchronisation de données d'un terminal mobile, support de mémoire et terminal mobile | |
| WO2019066521A1 (fr) | Dispositif électronique et procédé de commande de dispositif électronique | |
| EP3475801A1 (fr) | Procédé de traitement d'événements tactiles et dispositif électronique adapté à celui-ci | |
| WO2020155772A1 (fr) | Procédé d'envoi d'image de vérification, procédé de synthèse, dispositif, support d'informations et terminal | |
| WO2012053875A2 (fr) | Appareil et système pour transmettre et recevoir des données via des informations d'empreinte digitale | |
| WO2014201915A1 (fr) | Procédé et appareil de réparation de logiciel, et support d'informations lisible par ordinateur | |
| WO2013182073A1 (fr) | Procédé et système d'identification de sécurité de fichier et support de stockage |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16913950 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16913950 Country of ref document: EP Kind code of ref document: A1 |