[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106126986A - Lock unlocking processing method and the device of data partition - Google Patents

Lock unlocking processing method and the device of data partition Download PDF

Info

Publication number
CN106126986A
CN106126986A CN201610425400.6A CN201610425400A CN106126986A CN 106126986 A CN106126986 A CN 106126986A CN 201610425400 A CN201610425400 A CN 201610425400A CN 106126986 A CN106126986 A CN 106126986A
Authority
CN
China
Prior art keywords
safety code
input
server
authentication secret
mark
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610425400.6A
Other languages
Chinese (zh)
Other versions
CN106126986B (en
Inventor
李明浩
赵建凯
张墅潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610425400.6A priority Critical patent/CN106126986B/en
Publication of CN106126986A publication Critical patent/CN106126986A/en
Application granted granted Critical
Publication of CN106126986B publication Critical patent/CN106126986B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosure is directed to lock unlocking processing method and the device of data partition.The method includes: obtains the unlocking pin arranged, generates the first authentication secret according to this unlocking pin, the first authentication secret is stored in local terminal;Generate safety code, generate the second authentication secret according to this safety code, the second authentication secret is stored in local terminal, and the safety code of generation is stored in server;When being not verified when utilizing the first authentication secret to the result that the unlocking pin of input is verified, receive the order obtaining safety code of input;Send the request obtaining safety code to server, server the safety code stored sends to presetting object;Receive the safety code of input, utilize the safety code of the second authentication secret checking input;When the safety code of input is by checking, unlock.When user forgets unlocking pin, the available safety code preset completes to unlock, and formats without to this data partition, it is provided that a kind of safe unlocking mechanism.

Description

Lock unlocking processing method and the device of data partition
Technical field
It relates to unlocking technology field, particularly relate to lock unlocking processing method and the device of data partition.
Background technology
Currently, android system forces the machine of M system to open the function giving tacit consent to full disk encryption, and this is carrying to user Also hidden danger is brought to user, because encryption disk needs the support of user's screen locking password, but the most very while carrying out safety Many mobile phones support fingerprint or bracelet more easily unlocking manner, and the lock screen password thus easily causing user is forgotten Note, once user forgets lock screen password, it is desirable to again unlock the data partition that just can only reformat encryption.
Summary of the invention
Disclosure embodiment provides unlocking processing method and the device locking data partition.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of unlocking processing method locking data partition, including:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first Authentication secret is stored in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is deposited It is stored in local terminal, and the safety code of described generation is stored in the server of network side;
When the result utilizing described first authentication secret to verify the unlocking pin of input is not verified Time, receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server the safety code stored sends in advance If object;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;
When the safety code of described input is by checking, release the locking to described locking data partition.
In one embodiment, after the described releasing locking to described locking data partition, described method also includes:
Output resets the prompting of unlocking pin;
Obtain the unlocking pin reset.
In one embodiment, the described unlocking pin according to described setting generates the first authentication secret, including:
Utilize the unlocking pin of described setting, the AES of local terminal storage and key, generate described first checking Key;
The described safety code according to described generation generates the second authentication secret, including:
Utilize the safety code of described generation, described AES and key, generate described second authentication secret.
In one embodiment, described default object includes bound object or is currently provided to the right of described server As.
In one embodiment, when described default object includes bound object, after described generation safety code, described side Method also includes:
Receive the mark of the first object of input;
The mark of described first object is set to the mark of described bound object.
In one embodiment, when described default object includes the object being currently provided to described server, described to Described server sends the request obtaining safety code, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to described server, the mark of described second object is sent to institute State server.
In one embodiment, after the mark of described the second object receiving input, also include:
Described second object is verified;
Described while send the request obtaining safety code to described server, the mark of described second object is sent To described server, including:
When described second object is by checking, while send the request obtaining safety code to described server, will The mark of described second object is sent to described server.
In one embodiment, described in receive input obtain safety code order, including:
The programmable button monitoring described local terminal is triggered with predetermined manner;And/or
The touch screen monitoring described local terminal is touched with default touch manner.
Second aspect according to disclosure embodiment, it is provided that a kind of unblock processing means locking data partition, including:
First processing module, for obtaining the unlocking pin of setting, generates first according to the unlocking pin of described setting and tests Card key, is stored in local terminal by described first authentication secret;
Second processing module, is used for generating safety code, generates the second authentication secret according to the safety code of described generation, by institute State the second authentication secret and be stored in local terminal, and the safety code of described generation is stored in the server of network side;
First receiver module, for when the checking utilizing described first authentication secret to verify the unlocking pin of input When result is not verified, receive the order obtaining safety code of input;
Request module, for sending the request obtaining safety code to described server, is stored by described server Safety code sends to presetting object;
First authentication module, for receiving the safety code of input, utilizes described second authentication secret to verify described input Safety code;
Unlocked state, for when the safety code of described input is by checking, releasing the lock to described locking data partition Fixed.
In one embodiment, described device also includes:
Reminding module, after releasing the locking to described locking data partition at described unlocked state, output resets The prompting of unlocking pin;
Reset module, for obtaining the unlocking pin of replacement.
In one embodiment, described first processing module includes:
First generates submodule, for utilizing the unlocking pin of described setting, the AES and close of local terminal storage Key, generates described first authentication secret;
Described second processing module, including:
Second generates submodule, for utilizing the safety code of described generation, described AES and key, generates described the Two authentication secrets.
In one embodiment, described default object includes bound object or is currently provided to the right of described server As.
In one embodiment, described device also includes:
Second receiver module, for when described default object includes bound object, when described second processing module generates After safety code, receive the mark of the first object of input;
Module is set, for the mark of described first object is set to the mark of described bound object.
In one embodiment, described request module, including:
Receive submodule, for when described default object includes the object being currently provided to described server, receive defeated The mark of the second object entered;
Request submodule, for while sending the request obtaining safety code, by described second right to described server The mark of elephant is sent to described server.
In one embodiment, described device also includes:
Second authentication module, after receive the mark of the second object of input at described reception submodule, to described Second object is verified;
Described request submodule, is additionally operable to, when described second object is by checking, obtain sending to described server While the request of safety code, the mark of described second object is sent to described server.
In one embodiment, described first receiver module, including:
First monitoring submodule, is triggered with predetermined manner for monitoring the programmable button of described local terminal;And/or
Second monitoring submodule, is touched with default touch manner for monitoring the touch screen of described local terminal.
The third aspect according to disclosure embodiment, it is provided that a kind of unblock processing means locking data partition, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first Authentication secret is stored in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is deposited It is stored in local terminal, and the safety code of described generation is stored in the server of network side;
When the result utilizing described first authentication secret to verify the unlocking pin of input is not verified Time, receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server the safety code stored sends in advance If object;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;
When the safety code of described input is by checking, release the locking to described locking data partition.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
Technique scheme, when user have forgotten the unlocking pin of locking data partition, then can utilize default safety Code completes to unlock, and formats without to this data partition, it is provided that a kind of safe unlocking mechanism, protects data and divide Data in district, improve the safety of data in data partition.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of unlocking processing method locking data partition shown in an exemplary embodiment.
Fig. 2 is the flow process according to the another kind of unlocking processing method locking data partition shown in an exemplary embodiment Figure.
Fig. 3 is the flow process of the unlocking processing method locking data partition according to another shown in an exemplary embodiment Figure.
Fig. 4 is the flow process of the unlocking processing method locking data partition according to another shown in an exemplary embodiment Figure.
Fig. 5 is the flow process of the unlocking processing method locking data partition according to another shown in an exemplary embodiment Figure.
Fig. 6 is the block diagram according to a kind of unblock processing means locking data partition shown in an exemplary embodiment.
Fig. 7 is the block diagram according to the another kind of unblock processing means locking data partition shown in an exemplary embodiment.
Fig. 8 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Fig. 9 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 10 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 11 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 12 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 13 is the block diagram locking the unblock processing means of data partition according to being applicable to shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Disclosure embodiment provides a kind of unlocking processing method locking data partition, and the method can be used for data partition Place terminal, i.e. local terminal, as it is shown in figure 1, the method comprising the steps of S11-S16:
In step s 11, obtaining the unlocking pin arranged, the unlocking pin according to arranging generates the first authentication secret, will First authentication secret is stored in local terminal.
In one embodiment, above-mentioned unlocking pin is by user setup, it is also possible to arranged by system, reinform to Family, makes user know set unlocking pin, to facilitate follow-up unblock of user to use.
In one embodiment, local terminal can be previously stored with AES and key, and this AES and key are used Generate for verifying the checking the information whether unlocking pin that user inputs mates with the unlocking pin of above-mentioned setting, i.e. first Authentication secret.Above-mentioned AES and key may be embodied as realizing any embodiment of above-mentioned functions.Now, above-mentioned " unlocking pin according to arranging generates the first authentication secret " can be embodied as: utilizes unlocking pin, the local terminal storage arranged AES and key, generate the first authentication secret.This first authentication secret can be used in subsequent process, and checking user is defeated The unlocking pin entered is the most legal.
In step s 12, generating safety code, the safety code according to generating generates the second authentication secret, by close for the second checking Key is stored in local terminal, and is stored in the server of network side by the safety code of generation.
In one embodiment, above-mentioned generation safety code can be embodied as: stochastic generation safety code, and such benefit is any People can't know the particular content of the safety code of stochastic generation, thus, he the safety code generated will not be revealed easily, it is ensured that Information Security.It addition, above-mentioned generation safety code can also be embodied as generating according to certain rule, this rule can be according to pre- If information generates, presupposed information e.g. current date, an information or the multinomial information such as personal information of validated user, this The safety code that sample generates has certain complexity, will not be cracked easily.
In one embodiment, above-mentioned " according to generate safety code generate the second authentication secret " can be embodied as utilize generate Safety code, aforementioned generation the first authentication secret time the AES that used and key, generate the second authentication secret.Do so Benefit be local terminal to have only to store this AES and key just can complete the first authentication secret and second The generation of authentication secret, saves memory space, easy.Certainly, the AES that used when generating the first authentication secret and close The AES used when key (the such as first AES and the first key) and generation the second authentication secret and key (example Such as the second AES and the second key) can differ, so can increase the first authentication secret and the second authentication secret Crack difficulty, improve safety.
In step s 13, when the result utilizing the first authentication secret to verify the unlocking pin of input is not for During by checking, receive the order obtaining safety code of input.
In one embodiment, the unlocking pin of available input, the encryption that used when generating the first authentication secret are calculated Method and key, use the operation as when generating the first authentication secret, and the checking generating the unlocking pin of input corresponding is close Key.The authentication secret that comparison the first authentication secret is corresponding with the unlocking pin of input, if the two coupling, then the unblock inputted is close Code is by checking;If the two does not mates, then the checking password inputted is not verified.
When the unlocking pin of input is not verified, an exportable option, when this option is easily selected by a user, just receive The order of above-mentioned acquisition safety code.Or, can the input form of prespecified mentioned order, can be regulation local terminal When programmable button is triggered with predetermined manner by user, just it is considered as have received mentioned order, the power key quilt of such as local terminal When pressing at least twice continuously, just it is considered as have received mentioned order;Can also is that the touch screen of regulation local terminal is by with in advance If touch manner touches, being just considered as have received mentioned order, such as user draws a circle on the touch screen of local terminal continuously Time, just it is considered as have received mentioned order;The form of above two input mentioned order can individually be implemented, it is also possible to both Implementing, except locking the validated user of data partition, other unauthorized person will not be known easily, therefore, can increase safety Property, it is to avoid unauthorized person can start step S14 easily.
In step S14, send the request obtaining safety code to server, server the safety code stored sends To presetting object.
In one embodiment, default object can be the binding bound with locking data partition or local terminal in advance Object or be currently provided to the object of server.Default object can be mobile device such as mobile phone, can also is that bitcom As any in E-mail address, instant communication client etc. can the object of communication information.
Presetting when liking bound object when above-mentioned, said method needs bindings, now, as in figure 2 it is shown, above-mentioned side Method may also include bindings, including step S21-S22 after generating safety code:
In the step s 21, the mark of the first object of input is received.
In step S22, the mark of the first object is set to the mark of bound object.
This mark identifies this first object for unique, such as, can be communication number or the title etc. of the first object.Example As first to when liking mobile phone, it is designated phone number;First pair as if during a mailbox, it is designated the mailbox ground of this mailbox Location.Preferably, the first object can be the mark of other terminal in addition to local terminal, so, if local terminal is non- Legal person person obtains, even if then unauthorized person is wanted to obtain safety code, due to unauthorized person can't get simultaneously this other eventually End, therefore, unauthorized person will not get safety code, also will not successfully unlock data partition, it is ensured that data in data partition Safety.
When default object includes the object being currently provided to server, as it is shown on figure 3, above-mentioned steps S14 can be embodied as Step S31-S32:
In step S31, receive the mark of the second object of input.Can show an input frame, user is in this input frame Input the mark of the second object.This mark identifies this second object for unique, such as, can be the communication number of the second object Or title etc..Such as second to when liking mobile phone, and it is designated phone number;Second pair as if during a mailbox, it is designated this The email address of mailbox.In step s 32, while send the request obtaining safety code to server, by the second object Mark is sent to server.
In one embodiment, as shown in Figure 4, after above-mentioned steps S31, may also include that in step S41, to second Object is verified.In one embodiment, the second object is verified and can be embodied as: clothes are set in advance in local terminal Safety code can be sent the mark of one or more object in the past by business device;Judge the second object identify whether be present in this In the mark of one or more objects, if it is the second object is by checking;Otherwise the second object is not verified.Now, Step S32 can be embodied as step S42: when the second object is by checking, in the request to server transmission acquisition safety code Meanwhile, the mark of the second object is sent to server.Verification operation to the second object, can avoid unauthorized person to get this After ground terminal, get safety code easily, improve the safety of data in data partition.
In step S15, receive the safety code of input, utilize the safety code of the second authentication secret checking input.
If user is validated user, then the safety that this validated user can send from default object acquisition to server Code, thus user can input correct safety code, thus the safety code inputted can be by above-mentioned checking;If user is illegal User, then the safety code that this disabled user cannot send from default object acquisition to server easily, thus this disabled user without The safety code that method input is correct, thus the safety code inputted cannot be by above-mentioned checking.
In one embodiment, the safety code of available input, the AES that used when generating the second authentication secret And key, use the operation as when generating the second authentication secret, generate the authentication secret that the safety code of input is corresponding.Ratio The authentication secret corresponding with the safety code of input to the second authentication secret, if the two coupling, then the safety code inputted is by testing Card;If the two does not mates, then the safety code inputted is not verified.
In step s 16, when the safety code of input is by checking, release the locking locking data partition.
When the safety code of input is not over checking, keep the locking locking data partition.
The said method that disclosure embodiment provides, when user have forgotten the unlocking pin of locking data partition, the most permissible Utilize the safety code preset to complete to unlock, format without to this data partition, it is provided that a kind of safety solves lock machine System, protects the data in data partition, improves the safety of data in data partition.
In one embodiment, said method is after releasing the locking to locking data partition, as it is shown in figure 5, also may be used Including step S17-18:
In step S17, output resets the prompting of unlocking pin.
In step S18, obtain the unlocking pin reset.
In this embodiment it is possible to after releasing the locking to data partition, reset unlocking pin, it is simple to user Follow-up continuation uses data partition safely.
The unlocking processing method of the above-mentioned locking data partition that corresponding disclosure embodiment provides, disclosure embodiment provides A kind of unblock processing means locking data partition, as shown in Figure 6, including:
First processing module 61, is configured to obtain the unlocking pin arranged, generates first according to the unlocking pin arranged Authentication secret, is stored in local terminal by the first authentication secret;
Second processing module 62, is configurable to generate safety code, and the safety code according to generating generates the second authentication secret, will Second authentication secret is stored in local terminal, and is stored in the server of network side by the safety code of generation;
First receiver module 63, is configured as utilizing the first authentication secret to testing that the unlocking pin of input is verified When card result is not verified, receive the order obtaining safety code of input;
Request module 64, is configured to send the request obtaining safety code, the server peace stored to server All-key sends to presetting object;
First authentication module 65, is configured to receive the safety code of input, utilizes the peace of the second authentication secret checking input All-key;
Unlocked state 66, be configured as input safety code by checking time, release to lock data partition locking.
In one embodiment, as it is shown in fig. 7, said apparatus may also include that
Reminding module 71, is configured to after the locking that unlocked state releases locking data partition, and output resets and solves The prompting of lock cipher;
Reset module 72, be configured to obtain the unlocking pin reset.
In one embodiment, as shown in Figure 8, the first processing module 61 may also include that
First generate submodule 81, be configured to, with arrange unlocking pin, local terminal storage AES and Key, generates the first authentication secret;
Now, the second processing module 62 comprises the steps that
Second generates submodule 82, is configured to, with safety code, AES and the key generated, and generates the second checking Key.
In one embodiment, default object includes bound object or is currently provided to the object of server.
In one embodiment, as it is shown in figure 9, said apparatus may also include that
Second receiver module 91, is configured as presetting object when including bound object, when the second processing module 62 generates After safety code, receive the mark of the first object of input;
Module 92 is set, is configured to be set to the mark of the first object the mark of bound object.
In one embodiment, as shown in Figure 10, request module 64 comprises the steps that
Receive submodule 1001, be configured as presetting object when including the object being currently provided to server, receive defeated The mark of the second object entered;
Request submodule 1002, is configured to while send the request obtaining safety code to server, right by second The mark of elephant is sent to server.
In one embodiment, as shown in figure 11, said apparatus also includes:
Second authentication module 111, is configured to after receiving the mark of the second object that submodule 1001 receives input, Second object is verified;
Request submodule 1002, is additionally configured to, when the second object is by checking, obtain safety sending to server While the request of code, the mark of the second object is sent to server.
In one embodiment, as shown in figure 12, the first receiver module 63 comprises the steps that
First monitoring submodule 121, is configured to the programmable button monitoring local terminal and is triggered with predetermined manner; And/or
Second monitoring submodule 122, is configured to the touch screen monitoring local terminal and is touched with default touch manner.
Disclosure embodiment provides a kind of unblock processing means locking data partition, including:
Processor;
For storing the memorizer of processor executable;
Wherein, processor is configured to:
Obtaining the unlocking pin arranged, the unlocking pin according to arranging generates the first authentication secret, by the first authentication secret It is stored in local terminal;
Generating safety code, the safety code according to generating generates the second authentication secret, and the second authentication secret is stored in this locality Terminal, and the safety code of generation is stored in the server of network side;
When being not verified when utilizing the first authentication secret to the result that the unlocking pin of input is verified, connect Receive the order obtaining safety code of input;
Send the request obtaining safety code to server, server the safety code stored sends to presetting object;
Receive the safety code of input, utilize the safety code of the second authentication secret checking input;
When the safety code of input is by checking, release the locking locking data partition.
In one embodiment, above-mentioned processor is also configured to: after releasing the locking to locking data partition, defeated Go out to reset the prompting of unlocking pin;
Obtain the unlocking pin reset.
In one embodiment, above-mentioned processor is also configured to: generate the first checking according to the unlocking pin arranged Key, including:
Utilize unlocking pin, the AES of local terminal storage and the key arranged, generate the first authentication secret;
Safety code according to generating generates the second authentication secret, including:
Utilize safety code, AES and the key generated, generate the second authentication secret.
In one embodiment, above-mentioned processor is also configured to: default object includes bound object or works as premise The object of provisioning server.
In one embodiment, above-mentioned processor is also configured to: when default object includes bound object, generates peace After all-key, method also includes:
Receive the mark of the first object of input;
The mark of the first object is set to the mark of bound object.
In one embodiment, above-mentioned processor is also configured to: when default object includes being currently provided to server Object time, to server send obtain safety code request, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to server, the mark of the second object is sent to server.
In one embodiment, above-mentioned processor is also configured to: after the mark of the second object receiving input, also Including:
Second object is verified;
While send the request obtaining safety code to server, the mark of the second object is sent to server, bag Include:
When the second object is by checking, while send the request obtaining safety code to server, by the second object Mark be sent to server.
In one embodiment, above-mentioned processor is also configured to: receive the order obtaining safety code of input, bag Include:
The programmable button monitoring local terminal is triggered with predetermined manner;And/or
The touch screen monitoring local terminal is touched with default touch manner.
Figure 13 is the device 800 processed according to a kind of unblock for locking data partition shown in an exemplary embodiment Block diagram.Such as, device 800 can be mobile device, and such as mobile phone, computer, digital broadcast terminal, information receiving and transmitting sets Standby, game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 13, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and Communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just Mutual in process between assembly 802 and other assemblies.Such as, processing component 802 can include multi-media module, many to facilitate Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between device 800 and user.Real at some Executing in example, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can To be implemented as touch screen, to receive the input signal from user.Touch panel include one or more touch sensor with Gesture on sensing touch, slip and touch panel.Touch sensor can not only sense touch or the border of sliding action, and And also detect and touch or persistent period that slide is relevant and pressure.In certain embodiments, multimedia groupware 808 includes One front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during such as screening-mode or video mode, front Put photographic head and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can To be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800 Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as assembly For display and the keypad of device 800, sensor cluster 814 can also detect device 800 or the position of 800 1 assemblies of device Put change, the presence or absence that user contacts, device 800 orientation or acceleration/deceleration and the temperature of device 800 with device 800 Change.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact near detection The existence of object.Sensor cluster 814 can also include optical sensor, and such as CMOS or ccd image sensor, being used for should in imaging Use middle use.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensor, magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device 800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement In example, communication component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel. In one exemplary embodiment, communication component 816 also includes near-field communication (NFC) module, to promote junction service.Such as, Can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as, Non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light Data storage device etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of mobile terminal During row so that mobile terminal is able to carry out a kind of unlocking processing method locking data partition, including:
Obtaining the unlocking pin arranged, the unlocking pin according to arranging generates the first authentication secret, by the first authentication secret It is stored in local terminal;
Generating safety code, the safety code according to generating generates the second authentication secret, and the second authentication secret is stored in this locality Terminal, and the safety code of generation is stored in the server of network side;
When being not verified when utilizing the first authentication secret to the result that the unlocking pin of input is verified, connect Receive the order obtaining safety code of input;
Send the request obtaining safety code to server, server the safety code stored sends to presetting object;
Receive the safety code of input, utilize the safety code of the second authentication secret checking input;
When the safety code of input is by checking, release the locking locking data partition.
In one embodiment, after releasing the locking to locking data partition, method also includes:
Output resets the prompting of unlocking pin;
Obtain the unlocking pin reset.
In one embodiment, the unlocking pin according to arranging generates the first authentication secret, including:
Utilize unlocking pin, the AES of local terminal storage and the key arranged, generate the first authentication secret;
Safety code according to generating generates the second authentication secret, including:
Utilize safety code, AES and the key generated, generate the second authentication secret.
In one embodiment, default object includes bound object or is currently provided to the object of server.
In one embodiment, when default object includes bound object, after generating safety code, method also includes:
Receive the mark of the first object of input;
The mark of the first object is set to the mark of bound object.
In one embodiment, when default object includes the object being currently provided to server, send to server and obtain Take the request of safety code, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to server, the mark of the second object is sent to server.
In one embodiment, after the mark of the second object receiving input, also include:
Second object is verified;
While send the request obtaining safety code to server, the mark of the second object is sent to server, bag Include:
When the second object is by checking, while send the request obtaining safety code to server, by the second object Mark be sent to server.
In one embodiment, receive the order obtaining safety code of input, including:
The programmable button monitoring local terminal is triggered with predetermined manner;And/or
The touch screen monitoring local terminal is touched with default touch manner.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.

Claims (17)

1. the unlocking processing method locking data partition, it is characterised in that including:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first checking Key storage is in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is stored in Local terminal, and the safety code of described generation is stored in the server of network side;
When being not verified when utilizing described first authentication secret to the result that the unlocking pin of input is verified, connect Receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server it is right that the safety code stored sends to presetting As;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;
When the safety code of described input is by checking, release the locking to described locking data partition.
2. the method for claim 1, it is characterised in that after the described releasing locking to described locking data partition, Described method also includes:
Output resets the prompting of unlocking pin;
Obtain the unlocking pin reset.
3. the method for claim 1, it is characterised in that
The described unlocking pin according to described setting generates the first authentication secret, including:
Utilize the unlocking pin of described setting, the AES of local terminal storage and key, generate described first authentication secret;
The described safety code according to described generation generates the second authentication secret, including:
Utilize the safety code of described generation, described AES and key, generate described second authentication secret.
4. the method for claim 1, it is characterised in that
Described default object includes bound object or is currently provided to the object of described server.
5. method as claimed in claim 4, it is characterised in that when described default object includes bound object, described generation After safety code, described method also includes:
Receive the mark of the first object of input;
The mark of described first object is set to the mark of described bound object.
6. method as claimed in claim 4, it is characterised in that when described default object includes being currently provided to described server Object time, described to described server send obtain safety code request, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to described server, the mark of described second object is sent to described clothes Business device.
7. method as claimed in claim 6, it is characterised in that after the mark of the second object of described reception input, also wrap Include:
Described second object is verified;
Described while send the request obtaining safety code to described server, the mark of described second object is sent to institute State server, including:
When described second object is by checking, while send the request obtaining safety code to described server, by described The mark of the second object is sent to described server.
8. the method for claim 1, it is characterised in that described in receive input obtain safety code order, including:
The programmable button monitoring described local terminal is triggered with predetermined manner;And/or
The touch screen monitoring described local terminal is touched with default touch manner.
9. the unblock processing means locking data partition, it is characterised in that including:
First processing module, for obtaining the unlocking pin of setting, generates the first checking according to the unlocking pin of described setting close Key, is stored in local terminal by described first authentication secret;
Second processing module, is used for generating safety code, generates the second authentication secret according to the safety code of described generation, by described Two authentication secrets are stored in local terminal, and are stored in the server of network side by the safety code of described generation;
First receiver module, for when the result utilizing described first authentication secret to verify the unlocking pin of input For time not verified, receive the order obtaining safety code of input;
Request module, for sending the request obtaining safety code, described the server safety stored to described server Code sends to presetting object;
First authentication module, for receiving the safety code of input, utilizes described second authentication secret to verify the safety of described input Code;
Unlocked state, for when the safety code of described input is by checking, releasing the locking to described locking data partition.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Reminding module, after releasing the locking to described locking data partition at described unlocked state, output resets and unlocks The prompting of password;
Reset module, for obtaining the unlocking pin of replacement.
11. devices as claimed in claim 9, it is characterised in that
Described first processing module includes:
First generates submodule, for utilizing the unlocking pin of described setting, the AES of local terminal storage and key, raw Become described first authentication secret;
Described second processing module, including:
Second generates submodule, for utilizing the safety code of described generation, described AES and key, generates described second and tests Card key.
12. devices as claimed in claim 9, it is characterised in that
Described default object includes bound object or is currently provided to the object of described server.
13. devices as claimed in claim 12, it is characterised in that described device also includes:
Second receiver module, for when described default object includes bound object, when described second processing module generates safety After Ma, receive the mark of the first object of input;
Module is set, for the mark of described first object is set to the mark of described bound object.
14. devices as claimed in claim 12, it is characterised in that described request module, including:
Receive submodule, for when described default object includes the object being currently provided to described server, receive input The mark of the second object;
Request submodule, for while sending the request obtaining safety code, by described second object to described server Mark is sent to described server.
15. devices as claimed in claim 14, it is characterised in that described device also includes:
Second authentication module, after receive the mark of the second object of input at described reception submodule, to described second Object is verified;
Described request submodule, is additionally operable to, when described second object is by checking, obtain safety sending to described server While the request of code, the mark of described second object is sent to described server.
16. devices as claimed in claim 9, it is characterised in that described first receiver module, including:
First monitoring submodule, is triggered with predetermined manner for monitoring the programmable button of described local terminal;And/or
Second monitoring submodule, is touched with default touch manner for monitoring the touch screen of described local terminal.
17. 1 kinds of unblock processing meanss locking data partition, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first checking Key storage is in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is stored in Local terminal, and the safety code of described generation is stored in the server of network side;
When being not verified when utilizing described first authentication secret to the result that the unlocking pin of input is verified, connect Receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server it is right that the safety code stored sends to presetting As;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;Peace when described input When all-key is by checking, release the locking to described locking data partition.
CN201610425400.6A 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition Active CN106126986B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610425400.6A CN106126986B (en) 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610425400.6A CN106126986B (en) 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition

Publications (2)

Publication Number Publication Date
CN106126986A true CN106126986A (en) 2016-11-16
CN106126986B CN106126986B (en) 2020-07-10

Family

ID=57469854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610425400.6A Active CN106126986B (en) 2016-06-15 2016-06-15 Unlocking processing method and device for locked data partition

Country Status (1)

Country Link
CN (1) CN106126986B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789070A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The decryption method of data, device and terminal
CN109308417A (en) * 2017-07-27 2019-02-05 阿里巴巴集团控股有限公司 Unlocking method and device based on trust computing
CN110020515A (en) * 2019-03-29 2019-07-16 联想(北京)有限公司 Data guard method, data protecting device, electronic equipment and medium
CN110719341A (en) * 2018-07-12 2020-01-21 中兴通讯股份有限公司 Data processing method and device, DHCP server and storage medium
CN115935401A (en) * 2023-03-13 2023-04-07 中诚华隆计算机技术有限公司 SOC safety debugging method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102708328A (en) * 2012-06-18 2012-10-03 施建辉 Authenticity code input-type password coding-decoding system
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
US20140223190A1 (en) * 2011-05-10 2014-08-07 Softlayer Technologies, Inc. Web-based security authentication

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140223190A1 (en) * 2011-05-10 2014-08-07 Softlayer Technologies, Inc. Web-based security authentication
CN102708328A (en) * 2012-06-18 2012-10-03 施建辉 Authenticity code input-type password coding-decoding system
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789070A (en) * 2016-12-20 2017-05-31 北京小米移动软件有限公司 The decryption method of data, device and terminal
CN109308417A (en) * 2017-07-27 2019-02-05 阿里巴巴集团控股有限公司 Unlocking method and device based on trust computing
CN110719341A (en) * 2018-07-12 2020-01-21 中兴通讯股份有限公司 Data processing method and device, DHCP server and storage medium
CN110020515A (en) * 2019-03-29 2019-07-16 联想(北京)有限公司 Data guard method, data protecting device, electronic equipment and medium
CN115935401A (en) * 2023-03-13 2023-04-07 中诚华隆计算机技术有限公司 SOC safety debugging method
CN115935401B (en) * 2023-03-13 2023-05-12 中诚华隆计算机技术有限公司 SOC safety debugging method

Also Published As

Publication number Publication date
CN106126986B (en) 2020-07-10

Similar Documents

Publication Publication Date Title
CN104376248B (en) A kind of method and device that user's checking is carried out in interface for password input
CN104216742B (en) Brush machine control method and device based on password
CN108269334A (en) Method for unlocking, terminal device and smart lock
CN104093119B (en) unlocking method and device
CN104283876A (en) Operation authorization method and device
CN103942469A (en) Picture processing method, device and terminal
CN106104601A (en) Virtual card Activiation method and device
CN105389516A (en) Sensitive picture reminding method and apparatus
CN104156071A (en) Method and device for setting screen password and unlocking screen
CN106126986A (en) Lock unlocking processing method and the device of data partition
CN105491236A (en) Terminal unlocking method and device
CN105450841A (en) Method and device of terminal guard against theft
CN105677214A (en) Application management method and apparatus
CN105468767A (en) Method and device for acquiring calling card information
CN106156561A (en) Application locking method, application unlocking method and a device
CN104318177A (en) Protection method and protection device for data of terminal equipment
CN107798231A (en) Display methods, device, terminal and the storage medium of operation interface
CN106204011A (en) NFC payment and device
TW202101392A (en) Access control method and device, electronic device and storage medium
CN104219053A (en) Information displaying method, information concealing method and information concealing device
CN107045604A (en) Information processing method and device
CN107733872A (en) Information Method of printing and device
CN104158665A (en) Method and device of verification
CN106127062A (en) unlocking method and device
CN105046127A (en) Encryption and decryption method and apparatus

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant