CN106126986A - Lock unlocking processing method and the device of data partition - Google Patents
Lock unlocking processing method and the device of data partition Download PDFInfo
- Publication number
- CN106126986A CN106126986A CN201610425400.6A CN201610425400A CN106126986A CN 106126986 A CN106126986 A CN 106126986A CN 201610425400 A CN201610425400 A CN 201610425400A CN 106126986 A CN106126986 A CN 106126986A
- Authority
- CN
- China
- Prior art keywords
- safety code
- input
- server
- authentication secret
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephonic Communication Services (AREA)
- Lock And Its Accessories (AREA)
Abstract
The disclosure is directed to lock unlocking processing method and the device of data partition.The method includes: obtains the unlocking pin arranged, generates the first authentication secret according to this unlocking pin, the first authentication secret is stored in local terminal;Generate safety code, generate the second authentication secret according to this safety code, the second authentication secret is stored in local terminal, and the safety code of generation is stored in server;When being not verified when utilizing the first authentication secret to the result that the unlocking pin of input is verified, receive the order obtaining safety code of input;Send the request obtaining safety code to server, server the safety code stored sends to presetting object;Receive the safety code of input, utilize the safety code of the second authentication secret checking input;When the safety code of input is by checking, unlock.When user forgets unlocking pin, the available safety code preset completes to unlock, and formats without to this data partition, it is provided that a kind of safe unlocking mechanism.
Description
Technical field
It relates to unlocking technology field, particularly relate to lock unlocking processing method and the device of data partition.
Background technology
Currently, android system forces the machine of M system to open the function giving tacit consent to full disk encryption, and this is carrying to user
Also hidden danger is brought to user, because encryption disk needs the support of user's screen locking password, but the most very while carrying out safety
Many mobile phones support fingerprint or bracelet more easily unlocking manner, and the lock screen password thus easily causing user is forgotten
Note, once user forgets lock screen password, it is desirable to again unlock the data partition that just can only reformat encryption.
Summary of the invention
Disclosure embodiment provides unlocking processing method and the device locking data partition.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of unlocking processing method locking data partition, including:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first
Authentication secret is stored in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is deposited
It is stored in local terminal, and the safety code of described generation is stored in the server of network side;
When the result utilizing described first authentication secret to verify the unlocking pin of input is not verified
Time, receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server the safety code stored sends in advance
If object;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;
When the safety code of described input is by checking, release the locking to described locking data partition.
In one embodiment, after the described releasing locking to described locking data partition, described method also includes:
Output resets the prompting of unlocking pin;
Obtain the unlocking pin reset.
In one embodiment, the described unlocking pin according to described setting generates the first authentication secret, including:
Utilize the unlocking pin of described setting, the AES of local terminal storage and key, generate described first checking
Key;
The described safety code according to described generation generates the second authentication secret, including:
Utilize the safety code of described generation, described AES and key, generate described second authentication secret.
In one embodiment, described default object includes bound object or is currently provided to the right of described server
As.
In one embodiment, when described default object includes bound object, after described generation safety code, described side
Method also includes:
Receive the mark of the first object of input;
The mark of described first object is set to the mark of described bound object.
In one embodiment, when described default object includes the object being currently provided to described server, described to
Described server sends the request obtaining safety code, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to described server, the mark of described second object is sent to institute
State server.
In one embodiment, after the mark of described the second object receiving input, also include:
Described second object is verified;
Described while send the request obtaining safety code to described server, the mark of described second object is sent
To described server, including:
When described second object is by checking, while send the request obtaining safety code to described server, will
The mark of described second object is sent to described server.
In one embodiment, described in receive input obtain safety code order, including:
The programmable button monitoring described local terminal is triggered with predetermined manner;And/or
The touch screen monitoring described local terminal is touched with default touch manner.
Second aspect according to disclosure embodiment, it is provided that a kind of unblock processing means locking data partition, including:
First processing module, for obtaining the unlocking pin of setting, generates first according to the unlocking pin of described setting and tests
Card key, is stored in local terminal by described first authentication secret;
Second processing module, is used for generating safety code, generates the second authentication secret according to the safety code of described generation, by institute
State the second authentication secret and be stored in local terminal, and the safety code of described generation is stored in the server of network side;
First receiver module, for when the checking utilizing described first authentication secret to verify the unlocking pin of input
When result is not verified, receive the order obtaining safety code of input;
Request module, for sending the request obtaining safety code to described server, is stored by described server
Safety code sends to presetting object;
First authentication module, for receiving the safety code of input, utilizes described second authentication secret to verify described input
Safety code;
Unlocked state, for when the safety code of described input is by checking, releasing the lock to described locking data partition
Fixed.
In one embodiment, described device also includes:
Reminding module, after releasing the locking to described locking data partition at described unlocked state, output resets
The prompting of unlocking pin;
Reset module, for obtaining the unlocking pin of replacement.
In one embodiment, described first processing module includes:
First generates submodule, for utilizing the unlocking pin of described setting, the AES and close of local terminal storage
Key, generates described first authentication secret;
Described second processing module, including:
Second generates submodule, for utilizing the safety code of described generation, described AES and key, generates described the
Two authentication secrets.
In one embodiment, described default object includes bound object or is currently provided to the right of described server
As.
In one embodiment, described device also includes:
Second receiver module, for when described default object includes bound object, when described second processing module generates
After safety code, receive the mark of the first object of input;
Module is set, for the mark of described first object is set to the mark of described bound object.
In one embodiment, described request module, including:
Receive submodule, for when described default object includes the object being currently provided to described server, receive defeated
The mark of the second object entered;
Request submodule, for while sending the request obtaining safety code, by described second right to described server
The mark of elephant is sent to described server.
In one embodiment, described device also includes:
Second authentication module, after receive the mark of the second object of input at described reception submodule, to described
Second object is verified;
Described request submodule, is additionally operable to, when described second object is by checking, obtain sending to described server
While the request of safety code, the mark of described second object is sent to described server.
In one embodiment, described first receiver module, including:
First monitoring submodule, is triggered with predetermined manner for monitoring the programmable button of described local terminal;And/or
Second monitoring submodule, is touched with default touch manner for monitoring the touch screen of described local terminal.
The third aspect according to disclosure embodiment, it is provided that a kind of unblock processing means locking data partition, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first
Authentication secret is stored in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is deposited
It is stored in local terminal, and the safety code of described generation is stored in the server of network side;
When the result utilizing described first authentication secret to verify the unlocking pin of input is not verified
Time, receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server the safety code stored sends in advance
If object;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;
When the safety code of described input is by checking, release the locking to described locking data partition.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
Technique scheme, when user have forgotten the unlocking pin of locking data partition, then can utilize default safety
Code completes to unlock, and formats without to this data partition, it is provided that a kind of safe unlocking mechanism, protects data and divide
Data in district, improve the safety of data in data partition.
It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe
The disclosure can be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the disclosure
Example, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart according to a kind of unlocking processing method locking data partition shown in an exemplary embodiment.
Fig. 2 is the flow process according to the another kind of unlocking processing method locking data partition shown in an exemplary embodiment
Figure.
Fig. 3 is the flow process of the unlocking processing method locking data partition according to another shown in an exemplary embodiment
Figure.
Fig. 4 is the flow process of the unlocking processing method locking data partition according to another shown in an exemplary embodiment
Figure.
Fig. 5 is the flow process of the unlocking processing method locking data partition according to another shown in an exemplary embodiment
Figure.
Fig. 6 is the block diagram according to a kind of unblock processing means locking data partition shown in an exemplary embodiment.
Fig. 7 is the block diagram according to the another kind of unblock processing means locking data partition shown in an exemplary embodiment.
Fig. 8 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Fig. 9 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 10 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 11 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 12 is the block diagram of the unblock processing means locking data partition according to another shown in an exemplary embodiment.
Figure 13 is the block diagram locking the unblock processing means of data partition according to being applicable to shown in an exemplary embodiment.
Detailed description of the invention
Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the disclosure.On the contrary, they are only with the most appended
The example of the apparatus and method that some aspects that described in detail in claims, the disclosure are consistent.
Disclosure embodiment provides a kind of unlocking processing method locking data partition, and the method can be used for data partition
Place terminal, i.e. local terminal, as it is shown in figure 1, the method comprising the steps of S11-S16:
In step s 11, obtaining the unlocking pin arranged, the unlocking pin according to arranging generates the first authentication secret, will
First authentication secret is stored in local terminal.
In one embodiment, above-mentioned unlocking pin is by user setup, it is also possible to arranged by system, reinform to
Family, makes user know set unlocking pin, to facilitate follow-up unblock of user to use.
In one embodiment, local terminal can be previously stored with AES and key, and this AES and key are used
Generate for verifying the checking the information whether unlocking pin that user inputs mates with the unlocking pin of above-mentioned setting, i.e. first
Authentication secret.Above-mentioned AES and key may be embodied as realizing any embodiment of above-mentioned functions.Now, above-mentioned
" unlocking pin according to arranging generates the first authentication secret " can be embodied as: utilizes unlocking pin, the local terminal storage arranged
AES and key, generate the first authentication secret.This first authentication secret can be used in subsequent process, and checking user is defeated
The unlocking pin entered is the most legal.
In step s 12, generating safety code, the safety code according to generating generates the second authentication secret, by close for the second checking
Key is stored in local terminal, and is stored in the server of network side by the safety code of generation.
In one embodiment, above-mentioned generation safety code can be embodied as: stochastic generation safety code, and such benefit is any
People can't know the particular content of the safety code of stochastic generation, thus, he the safety code generated will not be revealed easily, it is ensured that
Information Security.It addition, above-mentioned generation safety code can also be embodied as generating according to certain rule, this rule can be according to pre-
If information generates, presupposed information e.g. current date, an information or the multinomial information such as personal information of validated user, this
The safety code that sample generates has certain complexity, will not be cracked easily.
In one embodiment, above-mentioned " according to generate safety code generate the second authentication secret " can be embodied as utilize generate
Safety code, aforementioned generation the first authentication secret time the AES that used and key, generate the second authentication secret.Do so
Benefit be local terminal to have only to store this AES and key just can complete the first authentication secret and second
The generation of authentication secret, saves memory space, easy.Certainly, the AES that used when generating the first authentication secret and close
The AES used when key (the such as first AES and the first key) and generation the second authentication secret and key (example
Such as the second AES and the second key) can differ, so can increase the first authentication secret and the second authentication secret
Crack difficulty, improve safety.
In step s 13, when the result utilizing the first authentication secret to verify the unlocking pin of input is not for
During by checking, receive the order obtaining safety code of input.
In one embodiment, the unlocking pin of available input, the encryption that used when generating the first authentication secret are calculated
Method and key, use the operation as when generating the first authentication secret, and the checking generating the unlocking pin of input corresponding is close
Key.The authentication secret that comparison the first authentication secret is corresponding with the unlocking pin of input, if the two coupling, then the unblock inputted is close
Code is by checking;If the two does not mates, then the checking password inputted is not verified.
When the unlocking pin of input is not verified, an exportable option, when this option is easily selected by a user, just receive
The order of above-mentioned acquisition safety code.Or, can the input form of prespecified mentioned order, can be regulation local terminal
When programmable button is triggered with predetermined manner by user, just it is considered as have received mentioned order, the power key quilt of such as local terminal
When pressing at least twice continuously, just it is considered as have received mentioned order;Can also is that the touch screen of regulation local terminal is by with in advance
If touch manner touches, being just considered as have received mentioned order, such as user draws a circle on the touch screen of local terminal continuously
Time, just it is considered as have received mentioned order;The form of above two input mentioned order can individually be implemented, it is also possible to both
Implementing, except locking the validated user of data partition, other unauthorized person will not be known easily, therefore, can increase safety
Property, it is to avoid unauthorized person can start step S14 easily.
In step S14, send the request obtaining safety code to server, server the safety code stored sends
To presetting object.
In one embodiment, default object can be the binding bound with locking data partition or local terminal in advance
Object or be currently provided to the object of server.Default object can be mobile device such as mobile phone, can also is that bitcom
As any in E-mail address, instant communication client etc. can the object of communication information.
Presetting when liking bound object when above-mentioned, said method needs bindings, now, as in figure 2 it is shown, above-mentioned side
Method may also include bindings, including step S21-S22 after generating safety code:
In the step s 21, the mark of the first object of input is received.
In step S22, the mark of the first object is set to the mark of bound object.
This mark identifies this first object for unique, such as, can be communication number or the title etc. of the first object.Example
As first to when liking mobile phone, it is designated phone number;First pair as if during a mailbox, it is designated the mailbox ground of this mailbox
Location.Preferably, the first object can be the mark of other terminal in addition to local terminal, so, if local terminal is non-
Legal person person obtains, even if then unauthorized person is wanted to obtain safety code, due to unauthorized person can't get simultaneously this other eventually
End, therefore, unauthorized person will not get safety code, also will not successfully unlock data partition, it is ensured that data in data partition
Safety.
When default object includes the object being currently provided to server, as it is shown on figure 3, above-mentioned steps S14 can be embodied as
Step S31-S32:
In step S31, receive the mark of the second object of input.Can show an input frame, user is in this input frame
Input the mark of the second object.This mark identifies this second object for unique, such as, can be the communication number of the second object
Or title etc..Such as second to when liking mobile phone, and it is designated phone number;Second pair as if during a mailbox, it is designated this
The email address of mailbox.In step s 32, while send the request obtaining safety code to server, by the second object
Mark is sent to server.
In one embodiment, as shown in Figure 4, after above-mentioned steps S31, may also include that in step S41, to second
Object is verified.In one embodiment, the second object is verified and can be embodied as: clothes are set in advance in local terminal
Safety code can be sent the mark of one or more object in the past by business device;Judge the second object identify whether be present in this
In the mark of one or more objects, if it is the second object is by checking;Otherwise the second object is not verified.Now,
Step S32 can be embodied as step S42: when the second object is by checking, in the request to server transmission acquisition safety code
Meanwhile, the mark of the second object is sent to server.Verification operation to the second object, can avoid unauthorized person to get this
After ground terminal, get safety code easily, improve the safety of data in data partition.
In step S15, receive the safety code of input, utilize the safety code of the second authentication secret checking input.
If user is validated user, then the safety that this validated user can send from default object acquisition to server
Code, thus user can input correct safety code, thus the safety code inputted can be by above-mentioned checking;If user is illegal
User, then the safety code that this disabled user cannot send from default object acquisition to server easily, thus this disabled user without
The safety code that method input is correct, thus the safety code inputted cannot be by above-mentioned checking.
In one embodiment, the safety code of available input, the AES that used when generating the second authentication secret
And key, use the operation as when generating the second authentication secret, generate the authentication secret that the safety code of input is corresponding.Ratio
The authentication secret corresponding with the safety code of input to the second authentication secret, if the two coupling, then the safety code inputted is by testing
Card;If the two does not mates, then the safety code inputted is not verified.
In step s 16, when the safety code of input is by checking, release the locking locking data partition.
When the safety code of input is not over checking, keep the locking locking data partition.
The said method that disclosure embodiment provides, when user have forgotten the unlocking pin of locking data partition, the most permissible
Utilize the safety code preset to complete to unlock, format without to this data partition, it is provided that a kind of safety solves lock machine
System, protects the data in data partition, improves the safety of data in data partition.
In one embodiment, said method is after releasing the locking to locking data partition, as it is shown in figure 5, also may be used
Including step S17-18:
In step S17, output resets the prompting of unlocking pin.
In step S18, obtain the unlocking pin reset.
In this embodiment it is possible to after releasing the locking to data partition, reset unlocking pin, it is simple to user
Follow-up continuation uses data partition safely.
The unlocking processing method of the above-mentioned locking data partition that corresponding disclosure embodiment provides, disclosure embodiment provides
A kind of unblock processing means locking data partition, as shown in Figure 6, including:
First processing module 61, is configured to obtain the unlocking pin arranged, generates first according to the unlocking pin arranged
Authentication secret, is stored in local terminal by the first authentication secret;
Second processing module 62, is configurable to generate safety code, and the safety code according to generating generates the second authentication secret, will
Second authentication secret is stored in local terminal, and is stored in the server of network side by the safety code of generation;
First receiver module 63, is configured as utilizing the first authentication secret to testing that the unlocking pin of input is verified
When card result is not verified, receive the order obtaining safety code of input;
Request module 64, is configured to send the request obtaining safety code, the server peace stored to server
All-key sends to presetting object;
First authentication module 65, is configured to receive the safety code of input, utilizes the peace of the second authentication secret checking input
All-key;
Unlocked state 66, be configured as input safety code by checking time, release to lock data partition locking.
In one embodiment, as it is shown in fig. 7, said apparatus may also include that
Reminding module 71, is configured to after the locking that unlocked state releases locking data partition, and output resets and solves
The prompting of lock cipher;
Reset module 72, be configured to obtain the unlocking pin reset.
In one embodiment, as shown in Figure 8, the first processing module 61 may also include that
First generate submodule 81, be configured to, with arrange unlocking pin, local terminal storage AES and
Key, generates the first authentication secret;
Now, the second processing module 62 comprises the steps that
Second generates submodule 82, is configured to, with safety code, AES and the key generated, and generates the second checking
Key.
In one embodiment, default object includes bound object or is currently provided to the object of server.
In one embodiment, as it is shown in figure 9, said apparatus may also include that
Second receiver module 91, is configured as presetting object when including bound object, when the second processing module 62 generates
After safety code, receive the mark of the first object of input;
Module 92 is set, is configured to be set to the mark of the first object the mark of bound object.
In one embodiment, as shown in Figure 10, request module 64 comprises the steps that
Receive submodule 1001, be configured as presetting object when including the object being currently provided to server, receive defeated
The mark of the second object entered;
Request submodule 1002, is configured to while send the request obtaining safety code to server, right by second
The mark of elephant is sent to server.
In one embodiment, as shown in figure 11, said apparatus also includes:
Second authentication module 111, is configured to after receiving the mark of the second object that submodule 1001 receives input,
Second object is verified;
Request submodule 1002, is additionally configured to, when the second object is by checking, obtain safety sending to server
While the request of code, the mark of the second object is sent to server.
In one embodiment, as shown in figure 12, the first receiver module 63 comprises the steps that
First monitoring submodule 121, is configured to the programmable button monitoring local terminal and is triggered with predetermined manner;
And/or
Second monitoring submodule 122, is configured to the touch screen monitoring local terminal and is touched with default touch manner.
Disclosure embodiment provides a kind of unblock processing means locking data partition, including:
Processor;
For storing the memorizer of processor executable;
Wherein, processor is configured to:
Obtaining the unlocking pin arranged, the unlocking pin according to arranging generates the first authentication secret, by the first authentication secret
It is stored in local terminal;
Generating safety code, the safety code according to generating generates the second authentication secret, and the second authentication secret is stored in this locality
Terminal, and the safety code of generation is stored in the server of network side;
When being not verified when utilizing the first authentication secret to the result that the unlocking pin of input is verified, connect
Receive the order obtaining safety code of input;
Send the request obtaining safety code to server, server the safety code stored sends to presetting object;
Receive the safety code of input, utilize the safety code of the second authentication secret checking input;
When the safety code of input is by checking, release the locking locking data partition.
In one embodiment, above-mentioned processor is also configured to: after releasing the locking to locking data partition, defeated
Go out to reset the prompting of unlocking pin;
Obtain the unlocking pin reset.
In one embodiment, above-mentioned processor is also configured to: generate the first checking according to the unlocking pin arranged
Key, including:
Utilize unlocking pin, the AES of local terminal storage and the key arranged, generate the first authentication secret;
Safety code according to generating generates the second authentication secret, including:
Utilize safety code, AES and the key generated, generate the second authentication secret.
In one embodiment, above-mentioned processor is also configured to: default object includes bound object or works as premise
The object of provisioning server.
In one embodiment, above-mentioned processor is also configured to: when default object includes bound object, generates peace
After all-key, method also includes:
Receive the mark of the first object of input;
The mark of the first object is set to the mark of bound object.
In one embodiment, above-mentioned processor is also configured to: when default object includes being currently provided to server
Object time, to server send obtain safety code request, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to server, the mark of the second object is sent to server.
In one embodiment, above-mentioned processor is also configured to: after the mark of the second object receiving input, also
Including:
Second object is verified;
While send the request obtaining safety code to server, the mark of the second object is sent to server, bag
Include:
When the second object is by checking, while send the request obtaining safety code to server, by the second object
Mark be sent to server.
In one embodiment, above-mentioned processor is also configured to: receive the order obtaining safety code of input, bag
Include:
The programmable button monitoring local terminal is triggered with predetermined manner;And/or
The touch screen monitoring local terminal is touched with default touch manner.
Figure 13 is the device 800 processed according to a kind of unblock for locking data partition shown in an exemplary embodiment
Block diagram.Such as, device 800 can be mobile device, and such as mobile phone, computer, digital broadcast terminal, information receiving and transmitting sets
Standby, game console, tablet device, armarium, body-building equipment, personal digital assistant etc..
With reference to Figure 13, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, power supply
Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of input/output (I/O), sensor cluster 814, and
Communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, data communication, phase
The operation that machine operation and record operation are associated.Process assembly 802 and can include that one or more processor 820 performs to refer to
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more module, just
Mutual in process between assembly 802 and other assemblies.Such as, processing component 802 can include multi-media module, many to facilitate
Media component 808 and process between assembly 802 mutual.
Memorizer 804 is configured to store various types of data to support the operation at device 800.Showing of these data
Example includes any application program for operation on device 800 or the instruction of method, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile
Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash
Device, disk or CD.
The various assemblies that power supply module 806 is device 800 provide electric power.Power supply module 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
The screen of one output interface of offer that multimedia groupware 808 is included between device 800 and user.Real at some
Executing in example, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen can
To be implemented as touch screen, to receive the input signal from user.Touch panel include one or more touch sensor with
Gesture on sensing touch, slip and touch panel.Touch sensor can not only sense touch or the border of sliding action, and
And also detect and touch or persistent period that slide is relevant and pressure.In certain embodiments, multimedia groupware 808 includes
One front-facing camera and/or post-positioned pick-up head.When device 800 is in operator scheme, during such as screening-mode or video mode, front
Put photographic head and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can
To be a fixing optical lens system or there is focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes a Mike
Wind (MIC), when device 800 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined
It is set to receive external audio signal.The audio signal received can be further stored at memorizer 804 or via communication set
Part 816 sends.In certain embodiments, audio-frequency assembly 810 also includes a speaker, is used for exporting audio signal.
I/O interface 812 provides interface for processing between assembly 802 and peripheral interface module, above-mentioned peripheral interface module can
To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock
Set button.
Sensor cluster 814 includes one or more sensor, for providing the state of various aspects to comment for device 800
Estimate.Such as, what sensor cluster 814 can detect device 800 opens/closed mode, the relative localization of assembly, such as assembly
For display and the keypad of device 800, sensor cluster 814 can also detect device 800 or the position of 800 1 assemblies of device
Put change, the presence or absence that user contacts, device 800 orientation or acceleration/deceleration and the temperature of device 800 with device 800
Change.Sensor cluster 814 can include proximity transducer, is configured to when not having any physical contact near detection
The existence of object.Sensor cluster 814 can also include optical sensor, and such as CMOS or ccd image sensor, being used for should in imaging
Use middle use.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, gyro sensor, magnetic
Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the communication of wired or wireless mode between device 800 and other equipment.Device
800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement
In example, communication component 816 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel.
In one exemplary embodiment, communication component 816 also includes near-field communication (NFC) module, to promote junction service.Such as,
Can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, bluetooth
(BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more application specific integrated circuits (ASIC), numeral letter
Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided
As included the memorizer 804 of instruction, above-mentioned instruction can have been performed said method by the processor 820 of device 800.Such as,
Non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk and light
Data storage device etc..
A kind of non-transitory computer-readable recording medium, when the instruction in storage medium is held by the processor of mobile terminal
During row so that mobile terminal is able to carry out a kind of unlocking processing method locking data partition, including:
Obtaining the unlocking pin arranged, the unlocking pin according to arranging generates the first authentication secret, by the first authentication secret
It is stored in local terminal;
Generating safety code, the safety code according to generating generates the second authentication secret, and the second authentication secret is stored in this locality
Terminal, and the safety code of generation is stored in the server of network side;
When being not verified when utilizing the first authentication secret to the result that the unlocking pin of input is verified, connect
Receive the order obtaining safety code of input;
Send the request obtaining safety code to server, server the safety code stored sends to presetting object;
Receive the safety code of input, utilize the safety code of the second authentication secret checking input;
When the safety code of input is by checking, release the locking locking data partition.
In one embodiment, after releasing the locking to locking data partition, method also includes:
Output resets the prompting of unlocking pin;
Obtain the unlocking pin reset.
In one embodiment, the unlocking pin according to arranging generates the first authentication secret, including:
Utilize unlocking pin, the AES of local terminal storage and the key arranged, generate the first authentication secret;
Safety code according to generating generates the second authentication secret, including:
Utilize safety code, AES and the key generated, generate the second authentication secret.
In one embodiment, default object includes bound object or is currently provided to the object of server.
In one embodiment, when default object includes bound object, after generating safety code, method also includes:
Receive the mark of the first object of input;
The mark of the first object is set to the mark of bound object.
In one embodiment, when default object includes the object being currently provided to server, send to server and obtain
Take the request of safety code, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to server, the mark of the second object is sent to server.
In one embodiment, after the mark of the second object receiving input, also include:
Second object is verified;
While send the request obtaining safety code to server, the mark of the second object is sent to server, bag
Include:
When the second object is by checking, while send the request obtaining safety code to server, by the second object
Mark be sent to server.
In one embodiment, receive the order obtaining safety code of input, including:
The programmable button monitoring local terminal is triggered with predetermined manner;And/or
The touch screen monitoring local terminal is touched with default touch manner.
Those skilled in the art, after considering description and putting into practice disclosure disclosed herein, will readily occur to its of the disclosure
Its embodiment.The application is intended to any modification, purposes or the adaptations of the disclosure, these modification, purposes or
Person's adaptations is followed the general principle of the disclosure and includes the undocumented common knowledge in the art of the disclosure
Or conventional techniques means.Description and embodiments is considered only as exemplary, and the true scope of the disclosure and spirit are by following
Claim is pointed out.
It should be appreciated that the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and
And various modifications and changes can carried out without departing from the scope.The scope of the present disclosure is only limited by appended claim.
Claims (17)
1. the unlocking processing method locking data partition, it is characterised in that including:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first checking
Key storage is in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is stored in
Local terminal, and the safety code of described generation is stored in the server of network side;
When being not verified when utilizing described first authentication secret to the result that the unlocking pin of input is verified, connect
Receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server it is right that the safety code stored sends to presetting
As;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;
When the safety code of described input is by checking, release the locking to described locking data partition.
2. the method for claim 1, it is characterised in that after the described releasing locking to described locking data partition,
Described method also includes:
Output resets the prompting of unlocking pin;
Obtain the unlocking pin reset.
3. the method for claim 1, it is characterised in that
The described unlocking pin according to described setting generates the first authentication secret, including:
Utilize the unlocking pin of described setting, the AES of local terminal storage and key, generate described first authentication secret;
The described safety code according to described generation generates the second authentication secret, including:
Utilize the safety code of described generation, described AES and key, generate described second authentication secret.
4. the method for claim 1, it is characterised in that
Described default object includes bound object or is currently provided to the object of described server.
5. method as claimed in claim 4, it is characterised in that when described default object includes bound object, described generation
After safety code, described method also includes:
Receive the mark of the first object of input;
The mark of described first object is set to the mark of described bound object.
6. method as claimed in claim 4, it is characterised in that when described default object includes being currently provided to described server
Object time, described to described server send obtain safety code request, including:
Receive the mark of the second object of input;
While send the request obtaining safety code to described server, the mark of described second object is sent to described clothes
Business device.
7. method as claimed in claim 6, it is characterised in that after the mark of the second object of described reception input, also wrap
Include:
Described second object is verified;
Described while send the request obtaining safety code to described server, the mark of described second object is sent to institute
State server, including:
When described second object is by checking, while send the request obtaining safety code to described server, by described
The mark of the second object is sent to described server.
8. the method for claim 1, it is characterised in that described in receive input obtain safety code order, including:
The programmable button monitoring described local terminal is triggered with predetermined manner;And/or
The touch screen monitoring described local terminal is touched with default touch manner.
9. the unblock processing means locking data partition, it is characterised in that including:
First processing module, for obtaining the unlocking pin of setting, generates the first checking according to the unlocking pin of described setting close
Key, is stored in local terminal by described first authentication secret;
Second processing module, is used for generating safety code, generates the second authentication secret according to the safety code of described generation, by described
Two authentication secrets are stored in local terminal, and are stored in the server of network side by the safety code of described generation;
First receiver module, for when the result utilizing described first authentication secret to verify the unlocking pin of input
For time not verified, receive the order obtaining safety code of input;
Request module, for sending the request obtaining safety code, described the server safety stored to described server
Code sends to presetting object;
First authentication module, for receiving the safety code of input, utilizes described second authentication secret to verify the safety of described input
Code;
Unlocked state, for when the safety code of described input is by checking, releasing the locking to described locking data partition.
10. device as claimed in claim 9, it is characterised in that described device also includes:
Reminding module, after releasing the locking to described locking data partition at described unlocked state, output resets and unlocks
The prompting of password;
Reset module, for obtaining the unlocking pin of replacement.
11. devices as claimed in claim 9, it is characterised in that
Described first processing module includes:
First generates submodule, for utilizing the unlocking pin of described setting, the AES of local terminal storage and key, raw
Become described first authentication secret;
Described second processing module, including:
Second generates submodule, for utilizing the safety code of described generation, described AES and key, generates described second and tests
Card key.
12. devices as claimed in claim 9, it is characterised in that
Described default object includes bound object or is currently provided to the object of described server.
13. devices as claimed in claim 12, it is characterised in that described device also includes:
Second receiver module, for when described default object includes bound object, when described second processing module generates safety
After Ma, receive the mark of the first object of input;
Module is set, for the mark of described first object is set to the mark of described bound object.
14. devices as claimed in claim 12, it is characterised in that described request module, including:
Receive submodule, for when described default object includes the object being currently provided to described server, receive input
The mark of the second object;
Request submodule, for while sending the request obtaining safety code, by described second object to described server
Mark is sent to described server.
15. devices as claimed in claim 14, it is characterised in that described device also includes:
Second authentication module, after receive the mark of the second object of input at described reception submodule, to described second
Object is verified;
Described request submodule, is additionally operable to, when described second object is by checking, obtain safety sending to described server
While the request of code, the mark of described second object is sent to described server.
16. devices as claimed in claim 9, it is characterised in that described first receiver module, including:
First monitoring submodule, is triggered with predetermined manner for monitoring the programmable button of described local terminal;And/or
Second monitoring submodule, is touched with default touch manner for monitoring the touch screen of described local terminal.
17. 1 kinds of unblock processing meanss locking data partition, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Obtain the unlocking pin arranged, generate the first authentication secret according to the unlocking pin of described setting, by described first checking
Key storage is in local terminal;
Generate safety code, generate the second authentication secret according to the safety code of described generation, described second authentication secret is stored in
Local terminal, and the safety code of described generation is stored in the server of network side;
When being not verified when utilizing described first authentication secret to the result that the unlocking pin of input is verified, connect
Receive the order obtaining safety code of input;
Send the request obtaining safety code to described server, described server it is right that the safety code stored sends to presetting
As;
Receive the safety code of input, utilize described second authentication secret to verify the safety code of described input;Peace when described input
When all-key is by checking, release the locking to described locking data partition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610425400.6A CN106126986B (en) | 2016-06-15 | 2016-06-15 | Unlocking processing method and device for locked data partition |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610425400.6A CN106126986B (en) | 2016-06-15 | 2016-06-15 | Unlocking processing method and device for locked data partition |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106126986A true CN106126986A (en) | 2016-11-16 |
CN106126986B CN106126986B (en) | 2020-07-10 |
Family
ID=57469854
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610425400.6A Active CN106126986B (en) | 2016-06-15 | 2016-06-15 | Unlocking processing method and device for locked data partition |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106126986B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789070A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The decryption method of data, device and terminal |
CN109308417A (en) * | 2017-07-27 | 2019-02-05 | 阿里巴巴集团控股有限公司 | Unlocking method and device based on trust computing |
CN110020515A (en) * | 2019-03-29 | 2019-07-16 | 联想(北京)有限公司 | Data guard method, data protecting device, electronic equipment and medium |
CN110719341A (en) * | 2018-07-12 | 2020-01-21 | 中兴通讯股份有限公司 | Data processing method and device, DHCP server and storage medium |
CN115935401A (en) * | 2023-03-13 | 2023-04-07 | 中诚华隆计算机技术有限公司 | SOC safety debugging method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102708328A (en) * | 2012-06-18 | 2012-10-03 | 施建辉 | Authenticity code input-type password coding-decoding system |
CN102930188A (en) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
US20140223190A1 (en) * | 2011-05-10 | 2014-08-07 | Softlayer Technologies, Inc. | Web-based security authentication |
-
2016
- 2016-06-15 CN CN201610425400.6A patent/CN106126986B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140223190A1 (en) * | 2011-05-10 | 2014-08-07 | Softlayer Technologies, Inc. | Web-based security authentication |
CN102708328A (en) * | 2012-06-18 | 2012-10-03 | 施建辉 | Authenticity code input-type password coding-decoding system |
CN102930188A (en) * | 2012-10-12 | 2013-02-13 | 中兴通讯股份有限公司南京分公司 | Screen unlocking method and device as well as terminal |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789070A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | The decryption method of data, device and terminal |
CN109308417A (en) * | 2017-07-27 | 2019-02-05 | 阿里巴巴集团控股有限公司 | Unlocking method and device based on trust computing |
CN110719341A (en) * | 2018-07-12 | 2020-01-21 | 中兴通讯股份有限公司 | Data processing method and device, DHCP server and storage medium |
CN110020515A (en) * | 2019-03-29 | 2019-07-16 | 联想(北京)有限公司 | Data guard method, data protecting device, electronic equipment and medium |
CN115935401A (en) * | 2023-03-13 | 2023-04-07 | 中诚华隆计算机技术有限公司 | SOC safety debugging method |
CN115935401B (en) * | 2023-03-13 | 2023-05-12 | 中诚华隆计算机技术有限公司 | SOC safety debugging method |
Also Published As
Publication number | Publication date |
---|---|
CN106126986B (en) | 2020-07-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104376248B (en) | A kind of method and device that user's checking is carried out in interface for password input | |
CN104216742B (en) | Brush machine control method and device based on password | |
CN108269334A (en) | Method for unlocking, terminal device and smart lock | |
CN104093119B (en) | unlocking method and device | |
CN104283876A (en) | Operation authorization method and device | |
CN103942469A (en) | Picture processing method, device and terminal | |
CN106104601A (en) | Virtual card Activiation method and device | |
CN105389516A (en) | Sensitive picture reminding method and apparatus | |
CN104156071A (en) | Method and device for setting screen password and unlocking screen | |
CN106126986A (en) | Lock unlocking processing method and the device of data partition | |
CN105491236A (en) | Terminal unlocking method and device | |
CN105450841A (en) | Method and device of terminal guard against theft | |
CN105677214A (en) | Application management method and apparatus | |
CN105468767A (en) | Method and device for acquiring calling card information | |
CN106156561A (en) | Application locking method, application unlocking method and a device | |
CN104318177A (en) | Protection method and protection device for data of terminal equipment | |
CN107798231A (en) | Display methods, device, terminal and the storage medium of operation interface | |
CN106204011A (en) | NFC payment and device | |
TW202101392A (en) | Access control method and device, electronic device and storage medium | |
CN104219053A (en) | Information displaying method, information concealing method and information concealing device | |
CN107045604A (en) | Information processing method and device | |
CN107733872A (en) | Information Method of printing and device | |
CN104158665A (en) | Method and device of verification | |
CN106127062A (en) | unlocking method and device | |
CN105046127A (en) | Encryption and decryption method and apparatus |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |