WO2019071810A1 - Procédé de commande de déverrouillage de dispositif, appareil, dispositif et support de stockage - Google Patents
Procédé de commande de déverrouillage de dispositif, appareil, dispositif et support de stockage Download PDFInfo
- Publication number
- WO2019071810A1 WO2019071810A1 PCT/CN2017/116796 CN2017116796W WO2019071810A1 WO 2019071810 A1 WO2019071810 A1 WO 2019071810A1 CN 2017116796 W CN2017116796 W CN 2017116796W WO 2019071810 A1 WO2019071810 A1 WO 2019071810A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- wireless network
- target
- upper limit
- coverage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Definitions
- the present invention relates to an interaction technology, and in particular, to a device unlocking control method, apparatus, device, and storage medium.
- the password protection function is not set on the device, that is, the number of times the password is not set incorrectly may be caused, the password may be easily tried by others to crack the password when the password is very simple;
- the password protection function is set on the device, that is, the device is unlocked if the number of times of unlocking or login is unsuccessful, and the device may be temporarily disabled because the number of passwords entered by the owner of the device during the password input process exceeds the limit.
- the embodiment of the invention provides a device unlocking control method, device, device and storage medium, so as to prevent the device from being mistakenly locked and improve the user experience while ensuring password security.
- an embodiment of the present invention provides a device unlocking control method, including:
- the number of input error upper limit of the device unlock password is set to the first target number of times
- the device If it is detected that the number of times the wrong password is input exceeds the first target number of times, the device is locked.
- an embodiment of the present invention further provides a device unlocking control method, where the method includes:
- the embodiment of the present invention further provides a device unlocking control device, where the device includes:
- a first detecting module configured to: when the device unlocking instruction is received, detect whether at least one target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located;
- a first upper limit setting module configured to: if there is at least one target terminal corresponding to the pre-stored identity information, set an upper limit of the input error of the device unlock password to the first target number of times;
- the first locking module is configured to lock the device if the number of times the input error password is detected exceeds the first target number of times.
- the embodiment of the present invention further provides a device unlocking control device, where the device includes:
- a second detecting module configured to: when receiving the device unlocking instruction, detecting whether at least one target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located;
- the upper limit canceling module is configured to cancel the input error upper limit number of the device unlocking password if at least one target terminal corresponding to the pre-stored identity information exists, so that the device is not locked.
- an embodiment of the present invention further provides a device, where the device includes:
- One or more processors are One or more processors;
- a memory for storing one or more programs
- the one or more processors implement the device unlock control method as described in any of the embodiments of the present invention.
- the embodiment of the present invention further provides a computer readable storage medium, wherein the computer program is stored, and when the program is executed by the processor, the device unlocking control method according to any one of the embodiments of the present invention is implemented.
- the embodiment of the present invention detects whether there is at least one target terminal corresponding to the pre-stored identity identification information in the coverage of the wireless network where the device is located, and if yes, sets the upper limit of the input error of the device unlock password to the first target number of times, and If the number of times the input error password is detected exceeds the first target number, the device is locked, and the advantage of dynamically setting the upper limit of the number of input errors of the device is utilized, which solves the problem that the upper limit of the password input error is not variable in the prior art. It is easy to be cracked by others, or cause inconvenience to the device owner, reducing the user experience, and realizing the protection of the password to prevent the device from being mistakenly locked and improving the user experience.
- FIG. 1 is a schematic flowchart of a device unlocking control method according to Embodiment 1 of the present invention
- FIG. 2 is a schematic flowchart of a device unlocking control method according to Embodiment 2 of the present invention.
- FIG. 3 is a schematic structural diagram of a device unlocking control apparatus according to Embodiment 3 of the present invention.
- FIG. 4 is a schematic structural diagram of a device unlocking control apparatus according to Embodiment 4 of the present invention.
- FIG. 5 is a schematic structural diagram of an apparatus according to Embodiment 5 of the present invention.
- FIG. 1 is a schematic flowchart diagram of a device unlocking control method according to Embodiment 1 of the present invention.
- the method is applicable to the case of controlling the unlocking of the device, which method can be performed by a device unlocking control device, which can be composed of hardware and/or software, and can be integrated in the computer and all terminals including the locking and unlocking functions. in. Specifically include the following:
- the wireless network may be Bluetooth, WiFi, or other local area network, and is not limited herein.
- the device unlock command may be triggered when logging in to the device system or when switching to the login account.
- detecting that the device itself is within the coverage of the wireless network for example, within the coverage of the device's own WiFi hotspot, and within the coverage of the device's own Bluetooth, and then connected by the device
- the WiFi coverage of the wireless route there is at least one target terminal corresponding to the pre-stored identity information, wherein the pre-stored identity information may be the identity information of the terminal connected to the wireless network when the device is in the unlocked state.
- the identity information used to identify a specific terminal manually entered and saved by the user when the device is in the unlocked state.
- the router corresponding to the WiFi may save related information of the target terminal, and when the target terminal is close to the router, the target terminal may be automatically identified and connected.
- the device can detect whether there is a target terminal corresponding to the pre-stored identity information within the WiFi coverage of the connected wireless route.
- the device directly detects whether there is at least one target terminal corresponding to the pre-stored identity information in the WiFi hotspot or the Bluetooth coverage.
- the target terminal may be, for example, a device connected to WiFi or Bluetooth. Terminal.
- the terminal corresponding to the pre-stored identity information can be regarded as the terminal held by the legitimate user of the device, it is determined whether the target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located. It is determined whether there is a terminal held by a legitimate user around the search device, and then it is determined whether a legitimate user is in the vicinity of the device, so as to dynamically set the upper limit of the unlocking password input error of the device according to different judgment results in the subsequent steps.
- the method before receiving the device unlocking instruction, if the at least one target terminal corresponding to the pre-stored identity information is present in the coverage of the wireless network in which the device is located, the method further includes:
- All the terminals in the coverage of the wireless network save the identity identification information corresponding to the selected at least one target terminal.
- the device when the device is unlocked, when the wireless network (for example, Bluetooth) open command is received, the Bluetooth of the device is turned on, and the searched terminal identity information is displayed by searching all terminals in the Bluetooth coverage area of the device.
- the terminal On the search interface, if the user selects at least one terminal from all the displayed terminals, the terminal saves its corresponding identity information as the target terminal, so as to be pre-stored identity information required when the device is unlocked.
- the identity information corresponding to one terminal may correspond to a legitimate user.
- a target terminal may be selected in the wireless network coverage of the device and the corresponding identity information may be saved, or multiple target terminals may be selected and the identity identification information corresponding to each target terminal may be separately saved, or the device may be set.
- a legitimate user can also set up multiple legitimate users for the device.
- the first target number is a corresponding number of input error upper limit required by the legal user when the device unlocks the password, and the number of times may be set by the user according to the actual situation, to determine that the device owner, that is, the legitimate user can input the wrong password when using the device.
- the upper limit of the number of times is a corresponding number of input error upper limit required by the legal user when the device unlocks the password, and the number of times may be set by the user according to the actual situation, to determine that the device owner, that is, the legitimate user can input the wrong password when using the device. The upper limit of the number of times.
- the number of input error limit of the device unlock password can be set to the corresponding number of input error required by the legitimate user, that is, the first target number, to avoid the legitimate user, that is, when the device owner uses the device, the number of attempts to input the unlock password is exceeded.
- the problem that the device is accidentally locked is increased, and the user experience is improved.
- the device needs to be locked in time to protect the unlocking password of the device from being cracked, that is, S160 is executed; if not, the user may be a legitimate user who forgot the unlocking password temporarily, and thus can continue to input.
- S160 is executed; if not, the user may be a legitimate user who forgot the unlocking password temporarily, and thus can continue to input.
- S130 executes S130 until the number of times the wrong password is entered reaches the first target number of times.
- the second target number is the upper limit of the number of input errors corresponding to the illegal user inputting the device unlock password.
- the number of times may be the default limit of the device protection system (usually 3 times), or may be set by the legal user according to the actual situation. To determine the upper limit of the number of incorrect passwords that can be entered when the device intruder is an illegal user.
- the number of input error upper limit of the device unlocking password can be set to prevent the illegal user from stealing the corresponding upper limit of the input error, that is, the second target number, so as to prevent the illegal user, that is, the device intruder from being repeatedly input by enumerating.
- the device unlocks the password to steal the device, thereby ensuring the security of the password, protecting the device from being stolen, and improving the user experience.
- the first target number of times is greater than the second target number of times.
- the first target number of times of the input error upper limit required by the legal user when the device unlocks the password is greater than the second target number of the input error upper limit times corresponding to the illegal user inputting the device unlock password.
- the device needs to be locked in time to protect the unlocking password of the device from being cracked, that is, S160 is executed; if not, the user may also be a legitimate user who forgot the unlocking password temporarily. You can continue to enter the unlock password, that is, continue to execute S150 until the number of times the wrong password is entered reaches the second target number of times.
- the locking device may freeze the device within a set time to prevent the illegal user from cracking the device unlocking password by multiple input, thereby ensuring the password security.
- the technical solution of the embodiment is to detect whether there is at least one target terminal corresponding to the pre-stored identity information in the coverage of the wireless network where the device is located, and if yes, set the upper limit of the input error of the device unlock password to the first target.
- the problem is easy to be cracked by others, or the device owner is inconvenient to use, and the user experience is reduced, thereby realizing the protection of the password to prevent the device from being accidentally locked and improving the user experience.
- FIG. 2 is a schematic flowchart diagram of a device unlocking control method according to Embodiment 2 of the present invention.
- the method is applicable to the case of controlling the unlocking of the device, which method can be performed by a device unlocking control device, which can be composed of hardware and/or software, and can be integrated in the computer and all terminals including the locking and unlocking functions. in. Specifically include the following:
- S210 When receiving the device unlocking instruction, detecting whether there is at least one target terminal corresponding to the pre-stored identity information in the coverage of the wireless network where the device is located, and if yes, executing S220; if not, executing S230.
- the wireless network may be Bluetooth, WiFi, or other local area network, and is not limited herein.
- the device unlock command may be triggered when logging in to the device system or when switching to the login account.
- the device unlocking instruction when receiving the device unlocking instruction, detecting whether the target terminal corresponding to the pre-stored identity information exists in the wireless network coverage in which the device itself is located, that is, in the wireless network to which the device is connected, wherein the pre-stored
- the identity information may be the identity information of the terminal connected to the wireless network when the device is in the unlocked state, or may be the identity information used to identify the specific terminal manually input and saved by the user when the device is in the unlocked state.
- the terminal corresponding to the pre-stored identity information may be regarded as a terminal held by a legitimate user of the device, and thus one device may be configured with one legal user or multiple legal users.
- the purpose of detecting whether there is at least one target terminal corresponding to the pre-stored identity information in the coverage of the wireless network in which the device is located is whether there is at least one terminal held by the legitimate user around the search device, and further determining whether there is a legitimate user in the vicinity of the device. In order to determine whether to set the password input error upper limit number for the device according to different judgment results in the subsequent steps.
- S220 Cancel the upper limit of the input error of the device unlock password, so that the device is not locked.
- the device determines that there is at least one target terminal corresponding to the pre-stored identity information in the wireless network coverage area of the device, it indicates that there is at least one legal user in the vicinity of the device, and the possibility that the user who uses the device is a legitimate user is more likely Large, so you can cancel the number of input error limit of the device unlock password, so that the device will not be locked because of the password input error, thus avoiding the legitimate user, that is, when the device owner uses the device, the device is rejected due to too many attempts to input the unlock password.
- the problem of incorrect locking improves the user experience.
- the target number is the maximum number of input errors corresponding to the illegal user inputting the device unlock password.
- the number of times can be the default limit of the device protection system (usually 3 times), or can be set by the legal user according to the actual situation. Determine the upper limit of the number of incorrect passwords that can be entered when the device intruder is an illegal user.
- the number of input error upper limit of the device unlock password can be set to prevent the illegal user from stealing the corresponding upper limit of the input error, that is, the target number, so as to prevent the illegal user, that is, the device intruder from entering the device by enumerating multiple times to crack the device to unlock.
- the password is used to steal the device, thereby ensuring the security of the password, protecting the device from being stolen, and improving the user experience.
- the device needs to be locked in time to protect the unlocking password of the device from being cracked, that is, S250 is executed; if not, it indicates that the user may also temporarily forget the legitimate user who unlocked the password. You can continue to enter the unlock password, that is, continue to execute S240 until the number of times the wrong password is entered reaches the second target number of times.
- the locking device may freeze the device within a set time to prevent the illegal user from cracking the device unlocking password by multiple input, thereby ensuring the password security.
- the technical solution of the embodiment is to detect whether there is at least one target terminal corresponding to the pre-stored identity information in the coverage of the wireless network where the device is located, and if yes, cancel the upper limit of the input error of the device unlock password, so that the device does not It is locked, and the advantage of dynamically setting the upper limit of the input error of the device is utilized, which solves the problem that the upper limit of the password input error is immutable in the prior art, which is easy to be cracked by others, or causes inconvenience to the device owner, and reduces the user experience.
- the problem is to prevent the device from being mistakenly locked and to improve the user experience when the password is secure.
- FIG. 3 is a schematic structural diagram of a device unlocking control apparatus according to Embodiment 3 of the present invention.
- the device unlocking control device includes: a first detecting module 310, a first upper limit setting module 320, and a first locking module 330, and each module is specifically described below.
- the first detecting module 310 is configured to: when the device unlocking instruction is received, detect whether at least one target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located;
- the first upper limit setting module 320 is configured to: if there is at least one target terminal corresponding to the pre-stored identity information, set an upper limit of the input error of the device unlock password to the first target number of times;
- the first locking module 330 is configured to lock the device if the number of times the input error password is detected exceeds the first target number of times.
- it also includes:
- a second upper limit setting module configured to: after receiving the device unlocking instruction, detecting whether there is at least one target terminal corresponding to the pre-stored identity information in the wireless network coverage area where the device is located, if not, unlocking the device
- the password input error upper limit is set to the second target number
- the second locking module is configured to lock the device if the number of times the input error password is detected exceeds the second target number of times.
- the first target number of times is greater than the second target number of times.
- it also includes:
- a wireless opening module configured to: when receiving the device unlocking command, detecting whether there is at least one target terminal corresponding to the pre-stored identity information in the wireless network coverage area where the device is located, when receiving the wireless network opening instruction, Turn on the wireless network of the device;
- a terminal search module configured to search and display all terminals in the coverage of the wireless network
- an information saving module configured to save, according to the terminal in the coverage of the wireless network, identity identification information corresponding to the selected at least one target terminal.
- the above product can perform the method provided by any embodiment of the present invention, and has the corresponding functional modules and beneficial effects of the execution method.
- FIG. 4 is a schematic structural diagram of a device unlocking control apparatus according to Embodiment 4 of the present invention.
- the device unlocking control device includes: a second detecting module 410 and an upper limit canceling module 420, and each module is specifically described below.
- the second detecting module 410 is configured to: when the device unlocking instruction is received, detect whether at least one target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located;
- the upper limit canceling module 420 is configured to cancel the input error upper limit number of the device unlocking password if at least one target terminal corresponding to the pre-stored identity information exists, so that the device is not locked.
- it also includes:
- a target upper limit setting module configured to detect, after receiving the device unlocking instruction, whether there is at least one target terminal corresponding to the pre-stored identity information in the wireless network coverage area where the device is located, and if not, the device unlocking password
- the number of input error caps is set to the target number of times
- the target locking module is configured to lock the device if the number of times the input error password is detected exceeds the target number of times.
- the above product can perform the method provided by any embodiment of the present invention, and has the corresponding functional modules and beneficial effects of the execution method.
- FIG. 5 is a structural block diagram of a device according to Embodiment 5 of the present invention.
- an apparatus provided in this embodiment includes: a processor 51 and a memory 52.
- the processor in the device may be one or more.
- a processor 51 is taken as an example.
- the processor 51 and the memory 52 in the device may be connected by a bus or other manner, and the bus is connected in FIG. For example.
- the device unlocking control device provided by the above embodiment is integrated in the processor 51 of the device in this embodiment.
- the memory 52 in the standby device is used as a computer readable storage medium, and can be used to store one or more programs, and the program can be a software program, a computer executable program, and a module, such as the device unlocking control in the embodiment of the present invention.
- the corresponding program instruction/module (for example, the module in the device unlocking control device shown in FIG. 3 includes: a first detecting module 310, a first upper limit setting module 320, and a first locking module 330;
- the module in the device unlocking control device shown in FIG. 4 includes: a second detecting module 410 and an upper limit canceling module 420).
- the processor 51 executes various functional applications and data processing of the device by executing software programs, instructions, and modules stored in the memory 52, that is, implementing the device unlocking control method in the foregoing method embodiments.
- the memory 52 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to usage of the device, and the like.
- memory 52 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device.
- memory 52 may further include memory remotely located relative to processor 51, which may be connected to the device over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
- the processor 51 performs the device unlocking control method provided by the first embodiment of the present invention by executing a program stored in the memory 52, thereby performing various function applications and data processing.
- the processor 51 executes the program, when the device unlocking instruction is received, it is detected whether at least one target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located; if yes, The number of input error upper limit times of the device unlock password is set to the first target number; if the number of times the input error password is detected exceeds the first target number, the device is locked.
- the device unlocking control method provided by the second embodiment of the present invention:
- the processor 51 executes the program, when the device unlocking instruction is received, detecting whether at least one target terminal corresponding to the pre-stored identity information exists in the coverage of the wireless network where the device is located; if yes, canceling The device unlocks the password input error limit number of times so that the device is not locked.
- the sixth embodiment of the present invention further provides a computer readable storage medium, where the computer program is stored, and the program is implemented by the device unlocking control device, for example, the device unlocking control method provided by the first embodiment of the present invention, the method includes: When receiving the device unlocking instruction, detecting whether there is at least one target terminal corresponding to the pre-stored identity information in the coverage of the wireless network where the device is located; if yes, setting the upper limit of the input error of the device unlocking password to the first target The number of times; if the number of times the input error password is detected exceeds the first target number of times, the device is locked.
- the device unlocking control method provided by the second embodiment of the present invention includes: when receiving the device unlocking instruction, detecting whether at least one of the wireless network coverage areas corresponding to the pre-stored identity identification information exists The target terminal; if yes, cancel the input error upper limit number of the device unlock password, so that the device is not locked.
- the computer readable storage medium provided by the embodiment of the present invention, when the computer program stored thereon is executed, is not limited to implementing the method operation as described above, and may also implement the device unlocking control provided by any embodiment of the present invention. Related operations in the method.
- the present invention can be implemented by software and necessary general hardware, and can also be implemented by hardware, but in many cases, the former is a better implementation. .
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product, which may be stored in a computer readable storage medium, such as a floppy disk of a computer. , Read-Only Memory (ROM), Random Access Memory (RAM), Flash (FLASH), hard disk or optical disk, etc., including a number of instructions to make a computer device (can be a personal computer)
- the server, or network device, etc. performs the methods described in various embodiments of the present invention.
- each unit and module included in the device is divided according to functional logic, but is not limited to the above-mentioned division, as long as the corresponding function can be implemented;
- the specific names of the respective functional units are also for convenience of distinguishing from each other and are not intended to limit the scope of protection of the present invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
Abstract
Certains modes de réalisation de l'invention concernent un procédé de commande de déverrouillage de dispositif, un appareil, un dispositif et un support de stockage. Le procédé comporte les étapes consistant: suite à la réception d'une instruction de déverrouillage de dispositif, à détecter s'il existe au moins un terminal cible correspondant à des informations d'identification d'identité pré-stockées dans la zone de couverture d'un réseau sans fil dans lequel est situé le dispositif; si c'est le cas, à fixer la limite supérieure du nombre d'erreurs de saisie d'un mot de passe de déverrouillage de dispositif à un premier nombre visé; et verrouiller le dispositif s'il est détecté que le nombre de fois où un mot de passe incorrect a été saisi dépasse le premier comptage visé. La solution technique selon la présente invention garantit la sécurité du mot de passe tout en empêchant également que le dispositif ne soit verrouillé par inadvertance, améliorant ainsi l'agrément d'utilisation.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710942084.4 | 2017-10-11 | ||
| CN201710942084.4A CN107729742A (zh) | 2017-10-11 | 2017-10-11 | 设备解锁控制方法、装置、设备及存储介质 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019071810A1 true WO2019071810A1 (fr) | 2019-04-18 |
Family
ID=61210223
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/116796 Ceased WO2019071810A1 (fr) | 2017-10-11 | 2017-12-17 | Procédé de commande de déverrouillage de dispositif, appareil, dispositif et support de stockage |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN107729742A (fr) |
| WO (1) | WO2019071810A1 (fr) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN111369716B (zh) * | 2020-02-28 | 2022-01-11 | 歌尔科技有限公司 | 解锁方法、门锁及计算机可读存储介质 |
| CN111770495B (zh) * | 2020-06-29 | 2023-06-02 | 中国联合网络通信集团有限公司 | 网络连接方法、移动终端、计算机设备及存储介质 |
| CN112417429A (zh) * | 2020-11-26 | 2021-02-26 | 维沃移动通信有限公司 | 安全验证方法、装置、电子设备及存储介质 |
| CN115995124B (zh) * | 2021-10-19 | 2025-08-26 | 广州视源电子科技股份有限公司 | 一种智能门锁的锁定方法、装置、存储介质及电子设备 |
| US12047385B2 (en) | 2022-05-09 | 2024-07-23 | T-Mobile Usa, Inc. | Interoperable unlocking technology for wireless devices |
| CN116186682B (zh) * | 2023-04-25 | 2023-07-14 | 邢台纳科诺尔精轧科技股份有限公司 | 设备的解锁方法、装置、电子设备及存储介质 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102883026A (zh) * | 2012-09-07 | 2013-01-16 | 广东欧珀移动通信有限公司 | 一种移动终端实现开机保护的方法 |
| CN104182666A (zh) * | 2014-08-25 | 2014-12-03 | 广东欧珀移动通信有限公司 | 一种密码重置方法及装置 |
| CN104753886A (zh) * | 2013-12-31 | 2015-07-01 | 中国科学院信息工程研究所 | 一种对远程用户的加锁方法、解锁方法及装置 |
| CN105631250A (zh) * | 2015-12-18 | 2016-06-01 | 北京奇虎科技有限公司 | 获取非法访问应用程序的用户的图像信息的方法及装置 |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5928363A (en) * | 1997-08-27 | 1999-07-27 | International Business Machines Corporation | Method and means for preventing unauthorized resumption of suspended authenticated internet sessions using locking and trapping measures |
| KR20110110964A (ko) * | 2010-04-02 | 2011-10-10 | (주)네오위즈게임즈 | 서비스 잠금 기능을 제공하는 방법 및 그 서버 |
| CN104392157B (zh) * | 2014-11-18 | 2017-04-12 | 深圳市腾讯计算机系统有限公司 | 密码锁屏方法及装置 |
| CN107154999B (zh) * | 2017-03-31 | 2020-06-02 | 捷开通讯(深圳)有限公司 | 终端及其基于环境信息的解锁方法、存储装置 |
-
2017
- 2017-10-11 CN CN201710942084.4A patent/CN107729742A/zh active Pending
- 2017-12-17 WO PCT/CN2017/116796 patent/WO2019071810A1/fr not_active Ceased
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102883026A (zh) * | 2012-09-07 | 2013-01-16 | 广东欧珀移动通信有限公司 | 一种移动终端实现开机保护的方法 |
| CN104753886A (zh) * | 2013-12-31 | 2015-07-01 | 中国科学院信息工程研究所 | 一种对远程用户的加锁方法、解锁方法及装置 |
| CN104182666A (zh) * | 2014-08-25 | 2014-12-03 | 广东欧珀移动通信有限公司 | 一种密码重置方法及装置 |
| CN105631250A (zh) * | 2015-12-18 | 2016-06-01 | 北京奇虎科技有限公司 | 获取非法访问应用程序的用户的图像信息的方法及装置 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN107729742A (zh) | 2018-02-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2019071810A1 (fr) | Procédé de commande de déverrouillage de dispositif, appareil, dispositif et support de stockage | |
| US8726371B2 (en) | Enhanced security for devices enabled for wireless communications | |
| US20230297394A1 (en) | Device Locator Disable Authentication | |
| US9674700B2 (en) | Distributing biometric authentication between devices in an ad hoc network | |
| AU2013245980B2 (en) | Location-based access control for portable electronic device | |
| US10548015B2 (en) | Mobile device security lock | |
| CN102880820A (zh) | 一种移动终端应用程序访问方法及移动终端 | |
| US20150341485A1 (en) | Version protection method and apparatus for mobile terminal | |
| CN107704759A (zh) | 敏感操作的控制方法、装置、存储介质及电子设备 | |
| WO2017185457A1 (fr) | Procédé et appareil de contrôle pour verrou de contrôle d'accès, et terminal | |
| CN106897629A (zh) | 终端应用的控制方法及终端 | |
| CN104573576B (zh) | 一种移动终端及移动终端的锁屏保护方法 | |
| US10091177B1 (en) | Controlling access to a computerized resource of a mobile device based on whether the mobile device is within a vehicle that is currently moving | |
| WO2016180234A1 (fr) | Procédé et appareil de construction d'environnement sécurisé | |
| US20190121950A1 (en) | Contextual device unlocking | |
| US9473936B2 (en) | Method and device for protecting privacy information | |
| US20160104333A1 (en) | Electronic lock and method for wirelessly unlocking the electronic lock | |
| US11308187B2 (en) | User authentication | |
| CN107154999B (zh) | 终端及其基于环境信息的解锁方法、存储装置 | |
| WO2017113719A1 (fr) | Procédé et système de verrouillage de terminal mobile à distance | |
| CN109815675B (zh) | 一种基于智能终端的解锁方法、智能终端及存储介质 | |
| US10409971B2 (en) | System and method for secretive storage of applications in portable computing device | |
| US12067109B2 (en) | Methods and systems for managing access of an application | |
| JP5975906B2 (ja) | 防犯装置 | |
| KR20160059624A (ko) | 지문인식을 이용한 특정 애플리케이션 해제 및 컴퓨터가 잠금이 되는 방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17928767 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 15/10/2020) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17928767 Country of ref document: EP Kind code of ref document: A1 |