[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN114692127B - Unlocking method, wearable device and storage medium - Google Patents

Unlocking method, wearable device and storage medium Download PDF

Info

Publication number
CN114692127B
CN114692127B CN202011636916.8A CN202011636916A CN114692127B CN 114692127 B CN114692127 B CN 114692127B CN 202011636916 A CN202011636916 A CN 202011636916A CN 114692127 B CN114692127 B CN 114692127B
Authority
CN
China
Prior art keywords
legal
unlocking information
information
unlocking
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011636916.8A
Other languages
Chinese (zh)
Other versions
CN114692127A (en
Inventor
苏伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202011636916.8A priority Critical patent/CN114692127B/en
Publication of CN114692127A publication Critical patent/CN114692127A/en
Application granted granted Critical
Publication of CN114692127B publication Critical patent/CN114692127B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

本申请公开了一种解锁方法、可穿戴设备及存储介质,属于可穿戴设备领域。所述方法用于可穿戴设备中,可穿戴设备包括第一处理器和第二处理器,第一处理器用于运行第一系统,第二处理器用于运行第二系统,第一处理器的功耗小于第二处理器的功耗,所述方法包括:在对可穿戴设备解锁的过程中,第一系统向第二系统发送解锁请求;第二系统在接收到解锁请求后,在可信任执行环境中读取合法解锁信息,并将合法解锁信息发送至第一系统;第一系统接收合法解锁信息,其中,合法解锁信息用于供第一系统对用户输入的解锁信息进行合法性验证。本申请实施例提供的技术方案能够保证合法解锁信息的数据安全。

The present application discloses an unlocking method, a wearable device and a storage medium, and belongs to the field of wearable devices. The method is used in a wearable device, the wearable device includes a first processor and a second processor, the first processor is used to run a first system, the second processor is used to run a second system, the power consumption of the first processor is less than the power consumption of the second processor, and the method includes: in the process of unlocking the wearable device, the first system sends an unlocking request to the second system; after receiving the unlocking request, the second system reads the legal unlocking information in a trusted execution environment, and sends the legal unlocking information to the first system; the first system receives the legal unlocking information, wherein the legal unlocking information is used for the first system to verify the legitimacy of the unlocking information input by the user. The technical solution provided in the embodiment of the present application can ensure the data security of the legal unlocking information.

Description

解锁方法、可穿戴设备及存储介质Unlocking method, wearable device and storage medium

技术领域Technical Field

本申请涉及可穿戴设备技术领域,特别是涉及一种解锁方法、可穿戴设备及存储介质。The present application relates to the technical field of wearable devices, and in particular to an unlocking method, a wearable device and a storage medium.

背景技术Background technique

当前,可穿戴设备在人们的日常生活中已经越来越常见了,所谓可穿戴设备指的是可以直接穿在身上,或者,整合到用户的衣服或是配件的一种便携式设备。当前,可穿戴设备中可以设置两个处理器,该两个处理器分别用于运行不同的系统,相关技术中,可穿戴设备中的两个系统都可以存储有合法解锁信息,该两个系统均可以基于自身中存储的合法解锁信息对用户输入的解锁信息进行合法性验证。Currently, wearable devices are becoming more and more common in people's daily lives. The so-called wearable devices refer to portable devices that can be worn directly on the body or integrated into the user's clothes or accessories. Currently, two processors can be set in a wearable device, and the two processors are used to run different systems respectively. In the related art, both systems in the wearable device can store legal unlocking information, and both systems can verify the legitimacy of the unlocking information input by the user based on the legal unlocking information stored in themselves.

然而,在两个系统中均存储合法解锁信息的方式难以保证合法解锁信息的数据安全。However, the method of storing the legal unlocking information in both systems is difficult to ensure the data security of the legal unlocking information.

发明内容Summary of the invention

基于此,本申请实施例提供了一种解锁方法、可穿戴设备及存储介质,可以保证合法解锁信息的数据安全。Based on this, the embodiments of the present application provide an unlocking method, a wearable device and a storage medium, which can ensure the data security of legal unlocking information.

第一方面,提供了一种解锁方法,用于可穿戴设备中,该可穿戴设备包括第一处理器和第二处理器,该第一处理器用于运行第一系统,该第二处理器用于运行第二系统,该第一处理器的功耗小于该第二处理器的功耗,该方法包括:In a first aspect, an unlocking method is provided, which is used in a wearable device. The wearable device includes a first processor and a second processor. The first processor is used to run a first system, and the second processor is used to run a second system. The power consumption of the first processor is less than the power consumption of the second processor. The method includes:

在对该可穿戴设备解锁的过程中,该第一系统向该第二系统发送解锁请求;该第二系统在接收到该解锁请求后,在可信任执行环境中读取合法解锁信息,并将该合法解锁信息发送至该第一系统;该第一系统接收该合法解锁信息,其中,该合法解锁信息用于供该第一系统对用户输入的解锁信息进行合法性验证。During the process of unlocking the wearable device, the first system sends an unlock request to the second system; after receiving the unlock request, the second system reads legal unlock information in a trusted execution environment and sends the legal unlock information to the first system; the first system receives the legal unlock information, wherein the legal unlock information is used for the first system to verify the legitimacy of the unlock information input by the user.

第二方面,提供了一种可穿戴设备,包括第一处理器和第二处理器,该第一处理器用于运行第一系统,该第二处理器用于运行第二系统,该第一处理器的功耗小于该第二处理器的功耗;该第一系统,用于执行上述第一方面中该第一系统执行的方法;该第二系统,用于执行上述第一方面中该第二系统执行的方法。In a second aspect, a wearable device is provided, comprising a first processor and a second processor, wherein the first processor is used to run a first system, and the second processor is used to run a second system, and the power consumption of the first processor is less than the power consumption of the second processor; the first system is used to execute the method executed by the first system in the above-mentioned first aspect; the second system is used to execute the method executed by the second system in the above-mentioned first aspect.

第三方面,提供了一种计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如上述第一方面所述的解锁方法。In a third aspect, a computer-readable storage medium is provided, on which a computer program is stored. When the computer program is executed by a processor, the unlocking method described in the first aspect is implemented.

本申请实施例提供的技术方案带来的有益效果至少包括:The beneficial effects brought by the technical solution provided by the embodiment of the present application include at least:

在对可穿戴设备进行解锁的过程中,第一系统向第二系统发送解锁请求,第二系统基于该解锁请求,在可信任执行环境中读取合法解锁信息,并将该合法解锁信息发送至第一系统,以供第一系统基于该合法解锁信息对用户输入的解锁信息进行合法性验证,其中,第一系统运行于功耗较小的第一处理器中,第二系统运行于功耗较大的第二处理器中,这样,就可以保证仅在第二处理器的可信任执行环境中存储有合法解锁信息的前提下实现可穿戴设备的成功解锁,而通常情况下,功耗较高的处理器性能通常较高,其具有可信任执行环境,故而其数据安全等级更高,而功耗较低的处理器性能通常较低,其数据安全等级也较低,因此,将合法解锁信息仅存储于功耗较高第二处理器的可信任执行环境,相较于现有技术中将合法解锁信息同时存储于第一系统和第二系统,可以保证合法解锁信息的数据安全性。In the process of unlocking the wearable device, the first system sends an unlock request to the second system. Based on the unlock request, the second system reads the legal unlock information in the trusted execution environment and sends the legal unlock information to the first system, so that the first system can verify the legitimacy of the unlock information input by the user based on the legal unlock information. The first system runs in a first processor with lower power consumption, and the second system runs in a second processor with higher power consumption. In this way, it can be ensured that the wearable device is successfully unlocked only under the premise that the legal unlock information is stored in the trusted execution environment of the second processor. Under normal circumstances, the performance of a processor with higher power consumption is usually higher and it has a trusted execution environment, so its data security level is higher, while the performance of a processor with lower power consumption is usually lower and its data security level is also lower. Therefore, the legal unlock information is only stored in the trusted execution environment of the second processor with higher power consumption. Compared with the prior art in which the legal unlock information is stored in both the first system and the second system, the data security of the legal unlock information can be guaranteed.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为本申请实施例提供的一种解锁方法的流程图;FIG1 is a flow chart of an unlocking method provided in an embodiment of the present application;

图2为本申请实施例提供的一种示例性地第一系统在接收到第二系统发送的合法解锁信息之后所执行的技术过程的流程图;FIG2 is a flowchart of an exemplary technical process performed by a first system after receiving legal unlocking information sent by a second system according to an embodiment of the present application;

图3为本申请实施例提供的一种示例性地第一系统在对合法解锁信息进行删除处理之后所执行的技术过程的流程图;FIG3 is a flowchart of a technical process performed by an exemplary first system after deleting legal unlocking information according to an embodiment of the present application;

图4为本申请实施例提供的一种示例性地第一系统在对合法解锁信息进行删除处理之后所执行的技术过程的流程图;FIG4 is a flowchart of a technical process performed by an exemplary first system after deleting legal unlocking information according to an embodiment of the present application;

图5为本申请实施例提供的一种示例性地利用合法解锁信息对用户输入的解锁信息进行合法性验证的技术过程的流程图;FIG5 is a flowchart of a technical process for exemplarily verifying the legitimacy of unlocking information input by a user using legal unlocking information provided by an embodiment of the present application;

图6为本申请实施例提供的一种可穿戴设备的框图。FIG6 is a block diagram of a wearable device provided in an embodiment of the present application.

具体实施方式Detailed ways

为使本申请的目的、技术方案和优点更加清楚,下面将结合附图对本申请实施方式作进一步地详细描述。In order to make the objectives, technical solutions and advantages of the present application more clear, the implementation methods of the present application will be further described in detail below with reference to the accompanying drawings.

移动互联网时代,以智能手机为代表的移动终端得到了蓬勃的发展。与此同时,随着人民生活质量水平的提高,大家越来越关注自身的健康状态。与移动终端作为智能休闲娱乐中心的定位不同,可穿戴设备如智能手环、智能手表以及智能眼镜等,除了提供基本的计时以及通知等功能外,还提供了丰富的计步、睡眠检测、心率测量以及血氧检测等健康相关功能,这类可穿戴设备由于满足了人民对健康状态的监测需求,也得到了显著的发展。In the era of mobile Internet, mobile terminals represented by smart phones have developed vigorously. At the same time, with the improvement of people's quality of life, people are paying more and more attention to their own health status. Different from the positioning of mobile terminals as smart leisure and entertainment centers, wearable devices such as smart bracelets, smart watches and smart glasses, in addition to providing basic timing and notification functions, also provide a wealth of health-related functions such as step counting, sleep detection, heart rate measurement and blood oxygen detection. Such wearable devices have also developed significantly because they meet people's needs for monitoring their health status.

出于对用户友好度的考虑,可穿戴设备往往不能像移动终端一样每天进行一次充电,因此可穿戴设备的续航能力是非常关键的一项指标。同时,可穿戴设备需要实现与移动终端互联、监测用户健康状态等功能,因此,需要较强的处理能力,故而,可穿戴设备的处理能力也是非常关键的一项指标。For the sake of user-friendliness, wearable devices often cannot be charged once a day like mobile terminals, so the battery life of wearable devices is a very critical indicator. At the same time, wearable devices need to realize functions such as interconnection with mobile terminals and monitoring user health status, so strong processing power is required. Therefore, the processing power of wearable devices is also a very critical indicator.

为了能够同时保证续航能力以及处理能力,在实际应用中,可穿戴设备中通常可以设置有两个处理器,该两个处理器的功耗不同,该两个处理器分别运行不同的系统。In order to ensure both battery life and processing power, in practical applications, a wearable device may generally be provided with two processors, the two processors have different power consumptions, and the two processors respectively run different systems.

在处理能力需求较低的使用场景中,可以由可穿戴设备中低功耗的处理器进行工作,而可穿戴设备中高功耗的处理器可以进入休眠状态,在处理能力需求较高的使用场景中,可以由可穿戴设备中高功耗的处理器进行工作,而可穿戴设备中低功耗的处理器可以进入休眠状态。In usage scenarios with low processing power requirements, the low-power processor in the wearable device can work, while the high-power processor in the wearable device can enter a sleep state. In usage scenarios with high processing power requirements, the high-power processor in the wearable device can work, while the low-power processor in the wearable device can enter a sleep state.

由于高功耗处理器的处理能力一般较强,而低功耗处理器的处理能力一般较弱,因此,在处理能力需求较高的使用场景中由高功耗的处理器进行工作可以保证可穿戴设备的处理能力满足用户需求,而在处理能力需求较低的使用场景中由低功耗的处理器进行工作,可以在保证可穿戴设备的处理能力满足用户需求的前提下,降低可穿戴设备的功耗,从而提升可穿戴设备的续航能力。Since the processing power of high-power processors is generally stronger, while the processing power of low-power processors is generally weaker, therefore, in usage scenarios with higher processing power requirements, using high-power processors to work can ensure that the processing power of wearable devices meets user needs, while in usage scenarios with lower processing power requirements, using low-power processors to work can reduce the power consumption of wearable devices while ensuring that the processing power of wearable devices meets user needs, thereby improving the battery life of wearable devices.

相关技术中,可穿戴设备的两个处理器所运行的系统中均可以存储有合法解锁信息,这样就可以保证无论解锁时是哪个处理器正在工作都可以从正在工作的处理器所运行的系统中获取合法解锁信息,并基于该合法解锁信息对用户输入的解锁信息进行合法性验证。In the related technology, legal unlocking information can be stored in the systems run by the two processors of the wearable device. This ensures that no matter which processor is working when unlocking, the legal unlocking information can be obtained from the system run by the working processor, and the legitimacy of the unlocking information entered by the user can be verified based on the legal unlocking information.

然而,实际应用中,功耗较低的处理器其性能一般较差,通常其数据安全等级不高,因此,在其所运行的系统中存储合法解锁信息会带来合法解锁信息泄露的风险,难以保证合法解锁信息的数据安全性。However, in actual applications, processors with lower power consumption generally have poorer performance and usually have a low data security level. Therefore, storing legal unlocking information in the system in which it runs will bring the risk of legal unlocking information leakage, and it is difficult to ensure the data security of the legal unlocking information.

有鉴于此,本申请实施例提供了一种解锁方法,该解锁方法中,在对可穿戴设备进行解锁的过程中,第一系统向第二系统发送解锁请求,第二系统基于该解锁请求,在可信任执行环境中读取合法解锁信息,并将该合法解锁信息发送至第一系统,以供第一系统基于该合法解锁信息对用户输入的解锁信息进行合法性验证,其中,第一系统运行于功耗较小的第一处理器中,第二系统运行于功耗较大的第二处理器中,这样,就可以保证仅在第二处理器的可信任执行环境中存储有合法解锁信息的前提下实现可穿戴设备的成功解锁,而通常情况下,功耗较高的处理器性能通常较高,其具有可信任执行环境,故而其数据安全等级更高,而功耗较低的处理器性能通常较低,其数据安全等级也较低,因此,将合法解锁信息仅存储于功耗较高第二处理器的可信任执行环境,相较于现有技术中将合法解锁信息同时存储于第一系统和第二系统,可以保证合法解锁信息的数据安全性。In view of this, an embodiment of the present application provides an unlocking method, in which, during the process of unlocking a wearable device, a first system sends an unlocking request to a second system, and the second system reads legal unlocking information in a trusted execution environment based on the unlocking request, and sends the legal unlocking information to the first system, so that the first system verifies the legitimacy of the unlocking information input by the user based on the legal unlocking information, wherein the first system runs in a first processor with lower power consumption, and the second system runs in a second processor with higher power consumption. In this way, it can be ensured that the wearable device is successfully unlocked only on the premise that legal unlocking information is stored in the trusted execution environment of the second processor. Generally, a processor with higher power consumption usually has higher performance and has a trusted execution environment, so its data security level is higher, while a processor with lower power consumption usually has lower performance and its data security level is also lower. Therefore, storing the legal unlocking information only in the trusted execution environment of the second processor with higher power consumption can ensure the data security of the legal unlocking information compared to storing the legal unlocking information in the first system and the second system at the same time in the prior art.

需要说明的是,本申请实施例提供的解锁方法,其执行主体可以是可穿戴设备,其中,实际应用中,该可穿戴设备可以是诸如智能手环、智能手表以及智能眼镜等可以直接穿在身上,或者,整合到用户的衣服或是配件的一种便携式设备。It should be noted that the unlocking method provided in the embodiment of the present application can be executed by a wearable device. In actual applications, the wearable device can be a portable device such as a smart bracelet, a smart watch, and a smart glasses that can be worn directly on the body, or integrated into the user's clothes or accessories.

在本申请实施例中,执行主体可穿戴设备可以包括第一处理器以及第二处理器,该第一处理器的功耗小于该第二处理器的功耗,该第一处理器用于运行第一系统,该第二处理器用于运行第二系统。可选的,该第一处理器可以为MCU(英文:Micro ControllerUnit;简称:微控制单元)等,该第二处理器可以为CPU(英文:Central Processing Unit;中文:中央处理器)等,本申请实施例不对第一处理器和第二处理器的具体类型进行限定。In the embodiment of the present application, the execution subject wearable device may include a first processor and a second processor, the power consumption of the first processor is less than the power consumption of the second processor, the first processor is used to run the first system, and the second processor is used to run the second system. Optionally, the first processor may be an MCU (Micro Controller Unit; abbreviated as micro control unit), etc., and the second processor may be a CPU (Central Processing Unit; Chinese: Central Processing Unit), etc. The embodiment of the present application does not limit the specific types of the first processor and the second processor.

请参考图1,其示出了本申请实施例提供的一种解锁方法的流程图,该解锁方法可以应用于可穿戴设备中。如图1所示,该解锁方法可以包括以下步骤:Please refer to Figure 1, which shows a flowchart of an unlocking method provided in an embodiment of the present application, which can be applied to a wearable device. As shown in Figure 1, the unlocking method may include the following steps:

步骤101、在进行解锁的过程中,第一系统向第二系统发送解锁请求。Step 101: During the unlocking process, the first system sends an unlocking request to the second system.

在第一系统向第二系统发送解锁请求时,第二处理器可能处于工作状态,也可能处于休眠状态,其中,本申请实施例中的工作状态指的可以是非休眠状态。When the first system sends an unlock request to the second system, the second processor may be in a working state or in a sleep state, wherein the working state in the embodiment of the present application may refer to a non-sleep state.

在第二处理器处于休眠状态的情况下,第二系统也处于休眠状态,在这种情况下,第二系统无法接收第一系统发送的解锁请求,并无法对该解锁请求进行响应,因此,在第二处理器处于休眠状态的情况下,第一系统可以唤醒第二系统,并在第二系统被唤醒后,向第二系统发送解锁请求。在第一系统向第二系统发送解锁请求时第二处理器处于休眠状态可以保证可穿戴设备在大部分时间均处于低功耗状态下,因此,可以保证可穿戴设备的续航能力。When the second processor is in a dormant state, the second system is also in a dormant state. In this case, the second system cannot receive the unlock request sent by the first system and cannot respond to the unlock request. Therefore, when the second processor is in a dormant state, the first system can wake up the second system and send an unlock request to the second system after the second system is woken up. When the first system sends an unlock request to the second system, the second processor is in a dormant state, which can ensure that the wearable device is in a low power consumption state most of the time, thereby ensuring the battery life of the wearable device.

在第二处理器处于工作状态的情况下,第二系统也处于工作状态,在这种情况下,第二系统可以接收第一系统发送的解锁请求,并对该解锁请求进行响应,因此,在第二处理器处于工作状态的情况下,第一系统可以直接向第二系统发送解锁请求。在第一系统向第二系统发送解锁请求时第二处理器处于工作状态可以使第一系统不需要在解锁过程中唤醒第二系统,因此,可以提高解锁的速度。When the second processor is in working state, the second system is also in working state. In this case, the second system can receive the unlock request sent by the first system and respond to the unlock request. Therefore, when the second processor is in working state, the first system can directly send the unlock request to the second system. When the first system sends the unlock request to the second system, the second processor is in working state, so the first system does not need to wake up the second system during the unlocking process, thus improving the unlocking speed.

需要指出的是,在本申请实施例中,第一系统可以在检测到可穿戴设备进入解锁场景后向第二系统发送解锁请求,下面,本申请实施例将对检测可穿戴设备进行解锁场景的两种可选的实现方式进行说明。It should be pointed out that in an embodiment of the present application, the first system can send an unlock request to the second system after detecting that the wearable device enters an unlock scenario. Below, an embodiment of the present application will describe two optional implementation methods for detecting an unlock scenario of a wearable device.

在第一种可能的实现方式中,第一系统可以检测可穿戴设备的屏幕是否展示解锁界面,若可穿戴设备的屏幕展示解锁界面,则第一系统可以确定可穿戴设备进入解锁场景中。其中,解锁界面可以包括解锁密码输入区,该解锁密码输入区用于供用户输入可穿戴设备的解锁密码。In a first possible implementation, the first system may detect whether the screen of the wearable device displays an unlocking interface, and if the screen of the wearable device displays an unlocking interface, the first system may determine that the wearable device enters an unlocking scene. The unlocking interface may include an unlocking password input area, and the unlocking password input area is used for the user to input an unlocking password of the wearable device.

在第二种可能的实现方式中,第一系统可以检测可穿戴设备的生物信息采集组件是否采集到用户的生物信息,若该生物信息采集组件采集到用户的生物信息,则第一系统可以确定可穿戴设备进入解锁场景。其中,该生物信息采集组件可以为指纹采集组件或者声纹采集组件等,本申请实施例不对生物信息采集组件的具体类型进行限定。In a second possible implementation, the first system may detect whether the biometric information collection component of the wearable device has collected the user's biometric information. If the biometric information collection component has collected the user's biometric information, the first system may determine that the wearable device has entered an unlocking scenario. The biometric information collection component may be a fingerprint collection component or a voiceprint collection component, etc. The embodiment of the present application does not limit the specific type of the biometric information collection component.

若检测到可穿戴设备进入解锁场景中,第一系统可以向第二系统发送解锁请求,该解锁请求用于指示第二系统向第一系统发送合法解锁信息。If it is detected that the wearable device enters an unlocking scenario, the first system may send an unlocking request to the second system, where the unlocking request is used to instruct the second system to send legal unlocking information to the first system.

其中,合法解锁信息指的是能够合法解锁可穿戴设备的解锁信息,例如,该合法解锁信息可以为合法解锁密码、合法解锁生物信息等等,其中,合法解锁生物信息可以包括合法解锁指纹信息、合法解锁声纹信息等,本申请实施例不对该合法解锁信息的具体内容进行限定。Among them, legal unlocking information refers to unlocking information that can legally unlock the wearable device. For example, the legal unlocking information can be a legal unlocking password, legal unlocking biometric information, etc., among which the legal unlocking biometric information can include legal unlocking fingerprint information, legal unlocking voiceprint information, etc. The embodiments of this application do not limit the specific content of the legal unlocking information.

步骤102、第二系统在接收到解锁请求后,在可信任执行环境中读取合法解锁信息,并将合法解锁信息发送至第一系统。Step 102: After receiving the unlock request, the second system reads legal unlock information in the trusted execution environment and sends the legal unlock information to the first system.

在本申请实施例中,第二系统可以在接收到第一系统发送的解锁请求后,读取合法解锁信息,其中,第二系统可以在第二处理器的可信任执行环境中读取该合法解锁信息。In an embodiment of the present application, the second system may read the legal unlocking information after receiving the unlocking request sent by the first system, wherein the second system may read the legal unlocking information in a trusted execution environment of the second processor.

需要指出的是,可信任执行环境是第二处理器内的一个安全区域,它运行在一个独立的环境中且与第二系统并行运行,这样,就可以确保可信任执行环境中的数据的机密性和完整性都得到保护。换句话说,可信任执行环境中的数据,是保密且不可篡改的。It should be noted that the trusted execution environment is a secure area within the second processor, which runs in an independent environment and runs in parallel with the second system, so that the confidentiality and integrity of the data in the trusted execution environment can be protected. In other words, the data in the trusted execution environment is confidential and cannot be tampered with.

由于合法解锁信息存放于第二处理器的可信任执行环境中,因此,可以保证合法解锁信息的数据安全,避免合法解锁信息的泄露风险。Since the legal unlocking information is stored in the trusted execution environment of the second processor, the data security of the legal unlocking information can be guaranteed and the risk of leakage of the legal unlocking information can be avoided.

在本申请的一种可选的实现方式中,第二系统在读取到该合法解锁信息后,可以对该合法解锁信息进行加密,并将加密后的合法解锁信息发送至第一系统。In an optional implementation of the present application, after reading the legal unlocking information, the second system may encrypt the legal unlocking information and send the encrypted legal unlocking information to the first system.

例如,第二系统中可以预置有第一密钥,第二系统在读取到合法解锁信息之后,可以基于该第一密钥对该合法解锁信息进行加密,并将加密后的合法解锁信息发送至第一系统。For example, the second system may be pre-installed with a first key. After reading the legal unlocking information, the second system may encrypt the legal unlocking information based on the first key and send the encrypted legal unlocking information to the first system.

对合法解锁信息加密后再发送的方式可以避免不法分子或者不法程序通过对第二系统和第一系统之间交互数据的拦截获取到合法解锁信息的明文,从而可以进一步保证合法解锁信息的数据安全性。The method of encrypting the legal unlocking information before sending it can prevent lawbreakers or illegal programs from obtaining the plain text of the legal unlocking information by intercepting the interactive data between the second system and the first system, thereby further ensuring the data security of the legal unlocking information.

在本申请的另一种可选的实现方式中,第二系统在读取到该合法解锁信息后,可以将该合法解锁信息直接发送至第一系统,这种直接发送的方式相较于加密后再发送的方式而言可以降低第二系统的运算量,从而可以降低第二系统的功耗,因此,可以起到提升可穿戴设备续航时间的效果。In another optional implementation of the present application, after reading the legal unlocking information, the second system can send the legal unlocking information directly to the first system. Compared with the method of encrypting and then sending, this direct sending method can reduce the amount of calculation of the second system, thereby reducing the power consumption of the second system, and therefore, can improve the battery life of the wearable device.

可选的,在将合法解锁信息发送至第一系统之后,第二系统可以切换至休眠状态。Optionally, after sending the legal unlocking information to the first system, the second system may switch to a dormant state.

由于在本申请实施例提供的技术方案中,由功耗较低的第一处理器中运行的第一系统具体实现解锁功能,而功耗较高的第二处理器中运行的第二系统只需要实现读取并发送合法解锁信息的功能,因此,第二系统在被唤醒后的较短时间内就可以重新进入休眠状态,故而,相较于在解锁时将第二系统唤醒,并令第二系统具体实现解锁功能的方式而言,本申请实施例提供的技术方案中,第二系统处于工作状态的时长较短,而由于运行第二系统的第二处理器的功耗大于运行第一系统的第一处理器的功耗,因此,在解锁过程中,可穿戴设备整体的功耗较低,故而,可以提升可穿戴设备的续航时间。Since in the technical solution provided in the embodiment of the present application, the first system running in the first processor with lower power consumption specifically implements the unlocking function, and the second system running in the second processor with higher power consumption only needs to implement the function of reading and sending legal unlocking information, the second system can re-enter the sleep state in a short time after being awakened. Therefore, compared with the method of waking up the second system when unlocking and making the second system specifically implement the unlocking function, in the technical solution provided in the embodiment of the present application, the second system is in the working state for a shorter time. Since the power consumption of the second processor running the second system is greater than the power consumption of the first processor running the first system, during the unlocking process, the overall power consumption of the wearable device is lower, thereby improving the battery life of the wearable device.

步骤103、第一系统接收合法解锁信息。Step 103: The first system receives legal unlocking information.

如上文所述,在本申请实施例中,第二系统可以采用加密后再发送的方式将合法解锁信息发送至第一系统,也可以采用直接发送的方式将合法解锁信息发送至第一系统。As described above, in the embodiment of the present application, the second system may send the legal unlocking information to the first system by encrypting it, or may send the legal unlocking information to the first system by directly sending it.

其中,若第二系统采用加密后再发送的方式将合法解锁信息发送至第一系统,则第一系统在接收到第二系统发送的加密后的合法解锁信息之后,可以对该加密后的合法解锁信息进行解密,从而得到该合法解锁信息。Among them, if the second system sends the legal unlocking information to the first system by encrypting it, then after receiving the encrypted legal unlocking information sent by the second system, the first system can decrypt the encrypted legal unlocking information to obtain the legal unlocking information.

例如,第一系统中可以预置有与上文所述的第一密钥相匹配的第二密钥,第一系统在接收到第二系统发送的加密后的合法解锁信息之后,可以基于该第二密钥对该加密后的合法解锁信息进行解密,从而得到该合法解锁信息。For example, the first system may be pre-installed with a second key matching the first key described above. After receiving the encrypted legal unlocking information sent by the second system, the first system may decrypt the encrypted legal unlocking information based on the second key to obtain the legal unlocking information.

在得到合法解锁信息之后,第一系统可以基于该合法解锁信息对用户输入的解锁信息进行合法性验证。After obtaining the legal unlocking information, the first system may verify the legality of the unlocking information input by the user based on the legal unlocking information.

例如,在一种可能的场景中,该合法解锁信息可以为合法解锁密码,第一系统可以基于该合法解锁密码对用户基于可穿戴设备的屏幕展示的解锁界面输入的解锁密码进行合法性验证。For example, in one possible scenario, the legal unlocking information may be a legal unlocking password, and the first system may verify the legitimacy of the unlocking password input by the user based on the unlocking interface displayed on the screen of the wearable device based on the legal unlocking password.

在另一种可能的场景中,该合法解锁信息可以为合法解锁生物信息,第一系统可以基于该合法解锁生物信息对可穿戴设备的生物信息采集组件所采集到的用户的生物信息进行合法性验证。In another possible scenario, the legal unlocking information may be legal unlocking biometric information, and the first system may verify the legitimacy of the user's biometric information collected by the biometric information collection component of the wearable device based on the legal unlocking biometric information.

在本实施例提供的解锁方法中,在对可穿戴设备进行解锁的过程中,第一系统向第二系统发送解锁请求,第二系统基于该解锁请求,在可信任执行环境中读取合法解锁信息,并将该合法解锁信息发送至第一系统,以供第一系统基于该合法解锁信息对用户输入的解锁信息进行合法性验证,其中,第一系统运行于功耗较小的第一处理器中,第二系统运行于功耗较大的第二处理器中,这样,就可以保证仅在第二处理器的可信任执行环境中存储有合法解锁信息的前提下实现可穿戴设备的成功解锁,而通常情况下,功耗较高的处理器性能通常较高,其具有可信任执行环境,故而其数据安全等级更高,而功耗较低的处理器性能通常较低,其数据安全等级也较低,因此,将合法解锁信息仅存储于功耗较高第二处理器的可信任执行环境,相较于现有技术中将合法解锁信息同时存储于第一系统和第二系统,可以保证合法解锁信息的数据安全性。In the unlocking method provided in this embodiment, during the process of unlocking the wearable device, the first system sends an unlocking request to the second system. Based on the unlocking request, the second system reads the legal unlocking information in the trusted execution environment, and sends the legal unlocking information to the first system, so that the first system can verify the legitimacy of the unlocking information input by the user based on the legal unlocking information. The first system runs in a first processor with lower power consumption, and the second system runs in a second processor with higher power consumption. In this way, it can be ensured that the wearable device is successfully unlocked only on the premise that the legal unlocking information is stored in the trusted execution environment of the second processor. Generally, the performance of a processor with higher power consumption is usually higher, and it has a trusted execution environment, so its data security level is higher, while the performance of a processor with lower power consumption is usually lower, and its data security level is also lower. Therefore, the legal unlocking information is only stored in the trusted execution environment of the second processor with higher power consumption. Compared with the prior art in which the legal unlocking information is stored in both the first system and the second system, the data security of the legal unlocking information can be guaranteed.

进一步地,第二系统可以对该合法解锁信息进行加密,并将加密后的合法解锁信息发送至第一系统,对合法解锁信息加密后再发送的方式可以避免不法分子或者不法程序通过对第二系统和第一系统之间交互数据的拦截获取到合法解锁信息的明文,从而可以进一步保证合法解锁信息的数据安全性。Furthermore, the second system can encrypt the legal unlocking information and send the encrypted legal unlocking information to the first system. The method of encrypting the legal unlocking information and then sending it can prevent criminals or illegal programs from obtaining the plaintext of the legal unlocking information by intercepting the interactive data between the second system and the first system, thereby further ensuring the data security of the legal unlocking information.

再进一步地,第二系统在将合法解锁信息发送至第一系统之后,可以切换至休眠状态。由于在本申请实施例提供的技术方案中,由功耗较低的第一处理器所运行的第一系统具体实现解锁功能,而功耗较高的第二处理器所运行的第二系统只需要实现读取并发送合法解锁信息的功能,因此,第二系统在被唤醒后的较短时间内就可以重新进入休眠状态,故而,相较于在解锁时将第二系统唤醒,并令第二系统具体实现解锁功能的方式而言,本申请实施例提供的技术方案中,第二系统处于工作状态的时长较短,故而,在解锁过程中,可穿戴设备整体的功耗较低,因此,可以提升可穿戴设备的续航时间。Furthermore, after sending the legal unlocking information to the first system, the second system can switch to a dormant state. Since in the technical solution provided in the embodiment of the present application, the first system operated by the first processor with lower power consumption specifically implements the unlocking function, and the second system operated by the second processor with higher power consumption only needs to implement the function of reading and sending the legal unlocking information, the second system can re-enter the dormant state in a short time after being awakened. Therefore, compared with the method of waking up the second system when unlocking and making the second system specifically implement the unlocking function, in the technical solution provided in the embodiment of the present application, the second system is in a shorter working state. Therefore, during the unlocking process, the overall power consumption of the wearable device is lower, and therefore, the battery life of the wearable device can be improved.

请参考图2,在本申请实施例中,第一系统在接收到第二系统发送的合法解锁信息之后,还可以执行如图2所示的技术过程,该技术过程包括以下步骤:Please refer to FIG. 2 . In the embodiment of the present application, after receiving the legal unlocking information sent by the second system, the first system may also perform the technical process shown in FIG. 2 . The technical process includes the following steps:

步骤201、第一系统检测在第一预设时长内用户是否输入解锁信息。Step 201: The first system detects whether the user inputs unlocking information within a first preset time period.

在一种可能的场景中,第一系统可以检测在第一预设时长内用户是否基于可穿戴设备的屏幕展示的解锁界面输入解锁密码。In a possible scenario, the first system may detect whether the user enters an unlock password based on an unlock interface displayed on the screen of the wearable device within a first preset time period.

在另一种可能的场景中,第一系统可以检测在第一预设时长内可穿戴设备的生物信息采集组件是否采集到用户的生物信息。In another possible scenario, the first system may detect whether the biometric information collection component of the wearable device has collected the user's biometric information within a first preset time period.

其中,第一预设时长可以根据用户输入解锁信息的时长的统计值进行设定,例如,该第一预设时长可以为5s钟等。需要指出的是,用户输入解锁信息的时长的统计值可以为用户输入解锁信息的时长的平均值、最大值等等,本申请实施例对此不作具体限定。The first preset time length can be set according to the statistical value of the time length of the user inputting the unlocking information, for example, the first preset time length can be 5 seconds, etc. It should be noted that the statistical value of the time length of the user inputting the unlocking information can be the average value, maximum value, etc. of the time length of the user inputting the unlocking information, which is not specifically limited in the embodiments of the present application.

步骤202、若在第一预设时长内用户未输入解锁信息,则第一系统对合法解锁信息进行删除处理。Step 202: If the user does not input unlocking information within a first preset time period, the first system deletes the legal unlocking information.

如上文所述,在实际应用中,第一处理器性能一般较差,通常其数据安全等级不高,因此,由第一系统长时间存放合法解锁信息会带来合法解锁信息泄露的风险,影响合法解锁信息的数据安全性。As mentioned above, in actual applications, the performance of the first processor is generally poor, and its data security level is usually not high. Therefore, storing the legal unlocking information by the first system for a long time will bring the risk of leakage of the legal unlocking information, affecting the data security of the legal unlocking information.

在本申请实施例中,在检测到第一预设时长内用户未输入解锁信息的情况下,第一系统可以确定用户当前并不存在解锁需求,此时,第一系统可以对该合法解锁信息进行删除处理。这样,就可以保证第一系统在获取到合法解锁信息的一段较短的时间之后,就可以对该合法解锁信息进行删除处理,避免合法解锁信息在第一系统中存放的时长过长而带来合法解锁信息泄露的风险,从而可以保证合法解锁信息的数据安全性。In the embodiment of the present application, when it is detected that the user has not input unlocking information within the first preset time period, the first system can determine that the user does not currently have an unlocking requirement, and at this time, the first system can delete the legal unlocking information. In this way, it can be ensured that the first system can delete the legal unlocking information after a short period of time after obtaining the legal unlocking information, avoiding the risk of legal unlocking information being leaked due to the legal unlocking information being stored in the first system for too long, thereby ensuring the data security of the legal unlocking information.

在实际应用中,第一系统在对合法解锁信息进行删除处理之后,用户可能重新出现了解锁需求,在用户重新出现解锁需求的情况下,第一系统可以重新向第二系统请求合法解锁信息,下面,本申请实施例将对这种情况下的两种场景一一进行说明。In actual applications, after the first system deletes the legal unlocking information, the user may have the need to unlock again. When the user has the need to unlock again, the first system can request the legal unlocking information from the second system again. Below, the embodiments of the present application will explain the two scenarios in this case one by one.

请参考图3,其示出了第一种场景所涉及的技术过程的流程图,如图3所示,第一种场景所涉及的技术过程可以包括以下步骤:Please refer to FIG. 3 , which shows a flow chart of the technical process involved in the first scenario. As shown in FIG. 3 , the technical process involved in the first scenario may include the following steps:

步骤301、第一系统检测在第二预设时长内可穿戴设备的解锁界面是否关闭。Step 301: The first system detects whether the unlocking interface of the wearable device is closed within a second preset time period.

需要指出的是,解锁界面的关闭指的可以是可穿戴设备的屏幕由展示解锁界面切换为展示其他界面,解锁界面的关闭指的也可以是可穿戴设备的屏幕由展示解锁界面转为息屏。It should be pointed out that closing the unlock interface may refer to the screen of the wearable device switching from displaying the unlock interface to displaying other interfaces, and closing the unlock interface may also refer to the screen of the wearable device switching from displaying the unlock interface to turning the screen off.

还需要指出的是,该第二预设时长可以由技术人员根据用户解锁行为的统计数据进行设定,本申请实施例不对第二预设时长的具体大小进行限定。It should also be pointed out that the second preset time length can be set by a technician based on statistical data of user unlocking behavior, and the embodiment of the present application does not limit the specific size of the second preset time length.

步骤302、若在第二预设时长内解锁界面未关闭,则第一系统唤醒第二系统,并向第二系统重新发送解锁请求。Step 302: If the unlocking interface is not closed within the second preset time period, the first system wakes up the second system and resends an unlocking request to the second system.

若在第二预设时长内解锁界面未关闭,则说明用户很可能只是未及时对可穿戴设备进行解锁,而不是没有对可穿戴设备进行解锁的需求,在这种情况下,第一系统可以唤醒第二系统,并向第二系统重新发送解锁请求。If the unlocking interface is not closed within the second preset time period, it means that the user may not have unlocked the wearable device in time, rather than not having the need to unlock the wearable device. In this case, the first system can wake up the second system and resend the unlocking request to the second system.

其中,第一系统唤醒第二系统,并向第二系统发送解锁请求的技术过程与上文所述的步骤101同理,本申请实施例在此不再赘述。The technical process of the first system waking up the second system and sending an unlock request to the second system is the same as step 101 described above, and will not be described in detail in the embodiment of the present application.

步骤303、第二系统在接收到解锁请求后,在可信任执行环境中读取合法解锁信息,并将合法解锁信息发送至第一系统。Step 303: After receiving the unlock request, the second system reads the legal unlock information in the trusted execution environment and sends the legal unlock information to the first system.

其中,第二系统在可信任执行环境中读取合法解锁信息,并将合法解锁信息发送至第一系统的技术过程与上文所述的步骤102同理,本申请实施例在此不再赘述。The technical process of the second system reading the legal unlocking information in the trusted execution environment and sending the legal unlocking information to the first system is the same as step 102 described above, and the embodiment of the present application will not be repeated here.

步骤304、第一系统接收合法解锁信息。Step 304: The first system receives legal unlocking information.

请参考图4,其示出了第二种场景所涉及的技术过程的流程图,如图4所示,第二种场景所涉及的技术过程可以包括以下步骤:Please refer to FIG. 4 , which shows a flow chart of the technical process involved in the second scenario. As shown in FIG. 4 , the technical process involved in the second scenario may include the following steps:

步骤401、若第一系统检测到用户输入解锁信息,则第一系统唤醒第二系统,并向第二系统重新发送解锁请求。Step 401: If the first system detects that the user inputs unlocking information, the first system wakes up the second system and resends an unlocking request to the second system.

在实际应用中,若检测到用户输入解锁信息,则说明用户当前就有解锁可穿戴设备的即时的需求,在这种情况下,第一系统可以唤醒第二系统,并可以向第二系统重新发送解锁请求。In actual applications, if it is detected that the user inputs unlocking information, it means that the user currently has an immediate need to unlock the wearable device. In this case, the first system can wake up the second system and resend the unlocking request to the second system.

在一种可能的场景中,第一系统可以在检测到用户基于可穿戴设备的屏幕展示的解锁界面输入解锁密码之后,唤醒第二系统,并向第二系统重新发送解锁请求。In one possible scenario, the first system may wake up the second system and resend an unlock request to the second system after detecting that the user enters an unlock password based on an unlock interface displayed on the screen of the wearable device.

在另一种可能的场景中,第一系统可以在检测到可穿戴设备的生物信息采集组件采集到用户的生物信息之后,唤醒第二系统,并向第二系统重新发送解锁请求。In another possible scenario, the first system may wake up the second system and resend an unlock request to the second system after detecting that the biometric information collection component of the wearable device has collected the biometric information of the user.

其中,第一系统唤醒第二处理,并向第二系统发送解锁请求的技术过程与上文所述的步骤101同理,本申请实施例在此不再赘述。Among them, the technical process of the first system waking up the second process and sending an unlock request to the second system is the same as step 101 described above, and the embodiment of the present application will not be repeated here.

步骤402、第二系统在接收到解锁请求后,在可信任执行环境中读取合法解锁信息,并将合法解锁信息发送至第一系统。Step 402: After receiving the unlock request, the second system reads the legal unlock information in the trusted execution environment and sends the legal unlock information to the first system.

其中,第二系统在可信任执行环境中读取合法解锁信息,并将合法解锁信息发送至第一系统的技术过程与上文所述的步骤102同理,本申请实施例在此不再赘述。The technical process of the second system reading the legal unlocking information in the trusted execution environment and sending the legal unlocking information to the first system is the same as step 102 described above, and the embodiment of the present application will not be repeated here.

步骤403、第一系统接收合法解锁信息。Step 403: The first system receives legal unlocking information.

如上文所述,第一系统在接收到第二系统发送的合法解锁信息之后,可以利用该合法解锁信息对用户输入的解锁信息进行合法性验证,请参考图5,其示出了一种利用该合法解锁信息对用户输入的解锁信息进行合法性验证的技术过程的流程图,如图5所示,该技术过程包括以下步骤:As described above, after receiving the legal unlocking information sent by the second system, the first system can use the legal unlocking information to verify the legitimacy of the unlocking information input by the user. Please refer to FIG5, which shows a flowchart of a technical process of using the legal unlocking information to verify the legitimacy of the unlocking information input by the user. As shown in FIG5, the technical process includes the following steps:

步骤501、第一系统获取用户输入的解锁信息。Step 501: The first system obtains unlocking information input by a user.

在一种可能的场景中,第一系统可以获取用户基于可穿戴设备的屏幕展示的解锁界面输入的解锁密码。In one possible scenario, the first system may obtain an unlock password input by the user based on an unlock interface displayed on the screen of the wearable device.

在另一种可能的场景中,第一系统可以获取可穿戴设备的生物信息采集组件采集到的用户的生物信息。In another possible scenario, the first system may obtain the user's biometric information collected by the biometric information collection component of the wearable device.

其中,该解锁密码和该用户的生物信息即为用户输入的解锁信息。The unlocking password and the user's biometric information are the unlocking information input by the user.

步骤502、第一系统基于解锁信息和合法解锁信息是否匹配确定解锁信息是否验证通过。Step 502: The first system determines whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information.

在一种可能的实现方式中,第一系统可以检测用户输入的解锁密码与合法解锁密码是否相同,若相同,则第一系统可以确定用户输入的解锁密码验证通过,反之,若不相同,则第一系统可以确定用户输入的解锁密码验证不通过。In one possible implementation, the first system can detect whether the unlock password entered by the user is the same as the valid unlock password. If they are the same, the first system can determine that the unlock password entered by the user has been verified. Otherwise, if they are not the same, the first system can determine that the unlock password entered by the user has failed the verification.

在另一种可能的实现方式中,第一系统可以检测可穿戴设备的生物信息采集组件所采集到的用户的生物信息与合法解锁生物信息的相似度是否大于预设相似度阈值,若大于等于预设相似度阈值,则第一系统可以确定穿戴设备的生物信息采集组件所采集到的用户的生物信息验证通过,反之,若小于预设相似度阈值,则第一系统可以确定穿戴设备的生物信息采集组件所采集到的用户的生物信息验证不通过。In another possible implementation, the first system can detect whether the similarity between the user's biometric information collected by the biometric information collection component of the wearable device and the legal unlocking biometric information is greater than a preset similarity threshold. If it is greater than or equal to the preset similarity threshold, the first system can determine that the user's biometric information collected by the biometric information collection component of the wearable device has been verified. Otherwise, if it is less than the preset similarity threshold, the first system can determine that the user's biometric information collected by the biometric information collection component of the wearable device has failed the verification.

可选的,在本申请实施例中,第一系统可以获取第三预设时长内对用户输入的解锁信息验证不通过的次数,若该次数小于预设次数阈值,则第一系统可以基于解锁信息和合法解锁信息是否匹配确定解锁信息是否验证通过,若该次数大于等于预设次数阈值,则第一系统可以检测当前时刻距离最近一次对用户输入的解锁信息验证不通过的时刻之间的时长是否大于预设时长阈值,若小于等于该预设时长阈值,则第一系统可以不对用户输入的解锁信息进行合法性验证,若大于该预设时长阈值,则第一系统可以基于解锁信息和合法解锁信息是否匹配确定解锁信息是否验证通过。Optionally, in an embodiment of the present application, the first system may obtain the number of times the unlocking information input by the user fails to be verified within a third preset time period. If the number is less than a preset number threshold, the first system may determine whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information. If the number is greater than or equal to the preset number threshold, the first system may detect whether the time between the current moment and the most recent time the unlocking information input by the user fails to be verified is greater than a preset time threshold. If it is less than or equal to the preset time threshold, the first system may not perform legality verification on the unlocking information input by the user. If it is greater than the preset time threshold, the first system may determine whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information.

步骤503、在确定用户输入的解锁信息是否验证通过后,第一系统对合法解锁信息进行删除处理。Step 503: After determining whether the unlocking information input by the user has been verified, the first system deletes the legal unlocking information.

如上文所述,在实际应用中,第一处理器性能一般较差,通常其数据安全等级不高,因此,由第一系统长时间存放合法解锁信息会带来合法解锁信息泄露的风险,影响合法解锁信息的数据安全性。因此,在确定用户输入的解锁信息是否验证通过后,第一系统可以对合法解锁信息进行删除处理,这样,就可以保证第一系统在获取到合法解锁信息的一段较短的时间之后,就可以对该合法解锁信息进行删除处理,避免合法解锁信息在第一系统中存放的时长过长而带来合法解锁信息泄露的风险,从而可以保证合法解锁信息的数据安全性。As mentioned above, in actual applications, the performance of the first processor is generally poor, and its data security level is usually not high. Therefore, if the first system stores the legal unlocking information for a long time, it will bring the risk of leakage of the legal unlocking information, affecting the data security of the legal unlocking information. Therefore, after determining whether the unlocking information input by the user has been verified, the first system can delete the legal unlocking information. In this way, it can be ensured that the first system can delete the legal unlocking information after a short period of time after obtaining the legal unlocking information, avoiding the risk of leakage of the legal unlocking information due to the legal unlocking information being stored in the first system for too long, thereby ensuring the data security of the legal unlocking information.

请参考图6,其示出了本申请实施例提供的一种可穿戴设备600的框图,该可穿戴设备600可以包括第一处理器601以及第二处理器602,其中,第一处理器601用于运行第一系统,第二处理器602用于运行第二系统,其中:Please refer to FIG. 6 , which shows a block diagram of a wearable device 600 provided in an embodiment of the present application. The wearable device 600 may include a first processor 601 and a second processor 602, wherein the first processor 601 is used to run a first system, and the second processor 602 is used to run a second system, wherein:

该第一系统,用于在对该可穿戴设备解锁的过程中,向该第二系统发送解锁请求。The first system is used to send an unlocking request to the second system during the process of unlocking the wearable device.

该第二系统,用于在接收到该解锁请求后,在可信任执行环境中读取合法解锁信息,并将该合法解锁信息发送至该第一系统。The second system is used to read legal unlocking information in a trusted execution environment after receiving the unlocking request, and send the legal unlocking information to the first system.

该第一系统,用于接收该合法解锁信息,其中,该合法解锁信息用于供该第一系统对用户输入的解锁信息进行合法性验证。The first system is used to receive the legal unlocking information, wherein the legal unlocking information is used by the first system to verify the legality of the unlocking information input by the user.

在本申请的一个可选实施例中,该第一系统,具体用于唤醒所述第二系统,在所述第二系统被唤醒后,所述第一系统向所述第二系统发送所述解锁请求。In an optional embodiment of the present application, the first system is specifically used to wake up the second system, and after the second system is woken up, the first system sends the unlock request to the second system.

在本申请的一个可选实施例中,该第二系统,还用于在将该合法解锁信息发送至该第一系统之后,切换至休眠状态。In an optional embodiment of the present application, the second system is further configured to switch to a dormant state after sending the legal unlocking information to the first system.

在本申请的一个可选实施例中,该第一系统,还用于在接收到该合法解锁信息后,检测在第一预设时长内用户是否输入解锁信息;In an optional embodiment of the present application, the first system is further configured to detect whether the user inputs unlocking information within a first preset time period after receiving the legal unlocking information;

该第一系统,还用于若在该第一预设时长内用户未输入解锁信息,则对接收到的该合法解锁信息进行删除处理。The first system is further configured to delete the received legal unlocking information if the user does not input unlocking information within the first preset time period.

在本申请的一个可选实施例中,该第一系统,还用于在对接收到的该合法解锁信息进行删除处理之后,若检测到在第二预设时长内解锁界面未关闭,则唤醒该第二系统,并向该第二系统重新发送该解锁请求;In an optional embodiment of the present application, the first system is further configured to wake up the second system and resend the unlock request to the second system if it is detected that the unlock interface is not closed within a second preset time period after deleting the received legal unlock information;

该第二系统,还用于在接收到该解锁请求后,在可信任执行环境中读取该合法解锁信息,并将该合法解锁信息发送至该第一系统;The second system is further configured to read the legal unlocking information in the trusted execution environment after receiving the unlocking request, and send the legal unlocking information to the first system;

该第一系统,该用于接收该合法解锁信息。The first system is used to receive the legal unlocking information.

在本申请的一个可选实施例中,该第一系统,还用于在对接收到的该合法解锁信息进行删除处理之后,若检测到用户输入解锁信息,则唤醒该第二系统,并向该第二系统重新发送该解锁请求;In an optional embodiment of the present application, the first system is further configured to, after deleting the received legal unlocking information, wake up the second system if it is detected that the user inputs unlocking information, and resend the unlocking request to the second system;

该第二系统,还用于在接收到该解锁请求后,在可信任执行环境中读取该合法解锁信息,并将该合法解锁信息发送至该第一系统;The second system is further configured to read the legal unlocking information in the trusted execution environment after receiving the unlocking request, and send the legal unlocking information to the first system;

该第一系统,还用于接收该合法解锁信息。The first system is further used to receive the legal unlocking information.

在本申请的一个可选实施例中,该第二系统,具体用于对该合法解锁信息进行加密,并将加密后的合法解锁信息发送至该第一系统;In an optional embodiment of the present application, the second system is specifically used to encrypt the legal unlocking information and send the encrypted legal unlocking information to the first system;

该第一系统,具体用于接收该加密后的合法解锁信息,并对该加密后的合法解锁信息进行解密,得到该合法解锁信息。The first system is specifically used to receive the encrypted legal unlocking information and decrypt the encrypted legal unlocking information to obtain the legal unlocking information.

在本申请的一个可选实施例中,该第一系统,还用于获取用户输入的解锁信息;In an optional embodiment of the present application, the first system is further used to obtain unlocking information input by a user;

该第一系统,还用于基于该解锁信息和该合法解锁信息是否匹配确定该解锁信息是否验证通过;The first system is further used to determine whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information;

该第一系统,还用于在确定该解锁信息是否验证通过后,对该合法解锁信息进行删除处理。The first system is also used to delete the legal unlocking information after determining whether the unlocking information has passed the verification.

在本申请的一个可选实施例中,该第一系统,还用于获取第三预设时长内对用户输入的解锁信息验证不通过的次数;In an optional embodiment of the present application, the first system is further used to obtain the number of times the unlocking information input by the user fails to be verified within a third preset time period;

该第一系统,具体用于若该次数小于预设次数阈值,则基于该解锁信息和该合法解锁信息是否匹配确定该解锁信息是否验证通过。The first system is specifically used to determine whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information if the number of times is less than a preset number threshold.

本申请实施例提供的可穿戴设备,可以实现上述方法实施例,其实现原理和技术效果类似,在此不再赘述。The wearable device provided in the embodiment of the present application can implement the above method embodiment, and its implementation principle and technical effect are similar, which will not be repeated here.

关于可穿戴设备的具体限定可以参见上文中对于解锁方法的限定,在此不再赘述。上述可穿戴设备中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。For the specific limitations of wearable devices, please refer to the limitations of unlocking methods above, which will not be repeated here. Each module in the above wearable device can be implemented in whole or in part by software, hardware and a combination thereof. The above modules can be embedded in or independent of the processor in the computer device in hardware form, or stored in the memory of the computer device in software form, so that the processor can call and execute the operations corresponding to the above modules.

在本申请的一个实施例中,提供了一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:In one embodiment of the present application, a computer-readable storage medium is provided, on which a computer program is stored. When the computer program is executed by a processor, the following steps are implemented:

在对该可穿戴设备解锁的过程中,该第一系统向该第二系统发送解锁请求;该第二系统在接收到该解锁请求后,在可信任执行环境中读取合法解锁信息,并将该合法解锁信息发送至该第一系统;该第一系统接收该合法解锁信息,其中,该合法解锁信息用于供该第一系统对用户输入的解锁信息进行合法性验证。During the process of unlocking the wearable device, the first system sends an unlock request to the second system; after receiving the unlock request, the second system reads legal unlock information in a trusted execution environment and sends the legal unlock information to the first system; the first system receives the legal unlock information, wherein the legal unlock information is used for the first system to verify the legitimacy of the unlock information input by the user.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:该第一系统唤醒该第二系统,在该第二系统被唤醒后,该第一系统向该第二系统发送该解锁请求。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are further implemented: the first system wakes up the second system, and after the second system is woken up, the first system sends the unlock request to the second system.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:该第二系统在将该合法解锁信息发送至该第一系统之后,切换至休眠状态。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are further implemented: after sending the legal unlocking information to the first system, the second system switches to a dormant state.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:该第一系统在接收到该合法解锁信息后,检测在第一预设时长内用户是否输入解锁信息;若在该第一预设时长内用户未输入解锁信息,则该第一系统对接收到的该合法解锁信息进行删除处理。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are also implemented: after receiving the legal unlocking information, the first system detects whether the user enters the unlocking information within a first preset time period; if the user does not enter the unlocking information within the first preset time period, the first system deletes the received legal unlocking information.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:在对接收到的该合法解锁信息进行删除处理之后,若在第二预设时长内解锁界面未关闭,则该第一系统唤醒该第二系统,并向该第二系统重新发送该解锁请求;该第二系统在接收到该解锁请求后,在可信任执行环境中读取该合法解锁信息,并将该合法解锁信息发送至该第一系统;该第一系统接收该合法解锁信息。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are also implemented: after deleting the received legal unlocking information, if the unlocking interface is not closed within a second preset time period, the first system wakes up the second system and resends the unlocking request to the second system; after receiving the unlocking request, the second system reads the legal unlocking information in a trusted execution environment and sends the legal unlocking information to the first system; the first system receives the legal unlocking information.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:在对接收到的该合法解锁信息进行删除处理之后,若该第一系统检测到用户输入解锁信息,则该第一系统唤醒该第二系统,并向该第二系统重新发送该解锁请求;该第二系统在接收到该解锁请求后,在可信任执行环境中读取该合法解锁信息,并将该合法解锁信息发送至该第一系统;该第一系统接收该合法解锁信息。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are also implemented: after deleting the received legal unlocking information, if the first system detects that the user inputs unlocking information, the first system wakes up the second system and resends the unlocking request to the second system; after receiving the unlocking request, the second system reads the legal unlocking information in a trusted execution environment and sends the legal unlocking information to the first system; the first system receives the legal unlocking information.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:该第二系统对该合法解锁信息进行加密,并将加密后的合法解锁信息发送至该第一系统;该第一系统接收该加密后的合法解锁信息,并对该加密后的合法解锁信息进行解密,得到该合法解锁信息。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are also implemented: the second system encrypts the legal unlocking information and sends the encrypted legal unlocking information to the first system; the first system receives the encrypted legal unlocking information and decrypts the encrypted legal unlocking information to obtain the legal unlocking information.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:该第一系统获取用户输入的解锁信息;该第一系统基于该解锁信息和该合法解锁信息是否匹配确定该解锁信息是否验证通过;在确定该解锁信息是否验证通过后,该第一系统对该合法解锁信息进行删除处理。In one embodiment of the present application, when the computer program is executed by a processor, the following steps are also implemented: the first system obtains unlocking information input by the user; the first system determines whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information; after determining whether the unlocking information is verified, the first system deletes the legal unlocking information.

在本申请的一个实施例中,计算机程序被处理器执行时还实现以下步骤:该第一系统获取第三预设时长内对用户输入的解锁信息验证不通过的次数;若该次数小于预设次数阈值,则该第一系统基于该解锁信息和该合法解锁信息是否匹配确定该解锁信息是否验证通过。In one embodiment of the present application, when the computer program is executed by the processor, the following steps are also implemented: the first system obtains the number of times the unlocking information input by the user fails to be verified within a third preset time period; if the number is less than a preset threshold, the first system determines whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information.

本实施例提供的计算机可读存储介质,其实现原理和技术效果与上述方法实施例类似,在此不再赘述。The computer-readable storage medium provided in this embodiment has similar implementation principles and technical effects to those of the above method embodiments, and will not be described in detail here.

本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以M种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(SyMchliMk)DRAM(SLDRAM)、存储器总线(RaMbus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the above-mentioned embodiment methods can be implemented by instructing related hardware through a computer program, and the computer program can be stored in a non-volatile computer-readable storage medium. When the computer program is executed, it can include the processes of the embodiments of the above-mentioned methods. Among them, any reference to memory, storage, database or other media used in the embodiments provided in this application may include non-volatile and/or volatile memory. Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM) or flash memory. Volatile memory may include random access memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in M forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SyMchliMk) DRAM (SLDRAM), memory bus (RaMbus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above-described embodiments may be arbitrarily combined. To make the description concise, not all possible combinations of the technical features in the above-described embodiments are described. However, as long as there is no contradiction in the combination of these technical features, they should be considered to be within the scope of this specification.

以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above-described embodiments only express several implementation methods of the present application, and the descriptions thereof are relatively specific and detailed, but they cannot be understood as limiting the scope of the patent application. It should be pointed out that, for a person of ordinary skill in the art, several variations and improvements can be made without departing from the concept of the present application, and these all belong to the protection scope of the present application. Therefore, the protection scope of the patent application shall be subject to the attached claims.

Claims (11)

1.一种解锁方法,其特征在于,用于可穿戴设备中,所述可穿戴设备包括第一处理器和第二处理器,所述第一处理器用于运行第一系统,所述第二处理器用于运行第二系统,所述第一处理器的功耗小于所述第二处理器的功耗,所述方法包括:1. An unlocking method, characterized in that it is used in a wearable device, the wearable device includes a first processor and a second processor, the first processor is used to run a first system, the second processor is used to run a second system, the power consumption of the first processor is less than the power consumption of the second processor, and the method includes: 在对所述可穿戴设备解锁的过程中,所述第一系统向所述第二系统发送解锁请求;In the process of unlocking the wearable device, the first system sends an unlock request to the second system; 所述第二系统在接收到所述解锁请求后,在可信任执行环境中读取合法解锁信息,并将所述合法解锁信息发送至所述第一系统;After receiving the unlock request, the second system reads legal unlock information in a trusted execution environment and sends the legal unlock information to the first system; 所述第一系统接收所述合法解锁信息,其中,所述合法解锁信息用于供所述第一系统对用户输入的解锁信息进行合法性验证。The first system receives the legal unlocking information, wherein the legal unlocking information is used by the first system to verify the legality of the unlocking information input by the user. 2.根据权利要求1所述的方法,其特征在于,所述第一系统向所述第二系统发送解锁请求,包括:2. The method according to claim 1, wherein the first system sends an unlock request to the second system, comprising: 所述第一系统唤醒所述第二系统,在所述第二系统被唤醒后,所述第一系统向所述第二系统发送所述解锁请求。The first system wakes up the second system, and after the second system is woken up, the first system sends the unlock request to the second system. 3.根据权利要求1或2所述的方法,其特征在于,所述方法还包括:3. The method according to claim 1 or 2, characterized in that the method further comprises: 所述第二系统在将所述合法解锁信息发送至所述第一系统之后,切换至休眠状态。After sending the legal unlocking information to the first system, the second system switches to a dormant state. 4.根据权利要求1所述的方法,其特征在于,所述方法还包括:4. The method according to claim 1, characterized in that the method further comprises: 所述第一系统在接收到所述合法解锁信息后,检测在第一预设时长内用户是否输入解锁信息;After receiving the legal unlocking information, the first system detects whether the user inputs unlocking information within a first preset time period; 若在所述第一预设时长内用户未输入解锁信息,则所述第一系统对接收到的所述合法解锁信息进行删除处理。If the user does not input unlocking information within the first preset time period, the first system deletes the received legal unlocking information. 5.根据权利要求4所述的方法,其特征在于,所述方法还包括:5. The method according to claim 4, characterized in that the method further comprises: 在对接收到的所述合法解锁信息进行删除处理之后,若检测到在第二预设时长内解锁界面未关闭,则所述第一系统唤醒所述第二系统,并向所述第二系统重新发送所述解锁请求;After deleting the received legal unlocking information, if it is detected that the unlocking interface is not closed within a second preset time period, the first system wakes up the second system and resends the unlocking request to the second system; 所述第二系统在接收到所述解锁请求后,在可信任执行环境中读取所述合法解锁信息,并将所述合法解锁信息发送至所述第一系统;After receiving the unlock request, the second system reads the legal unlock information in a trusted execution environment and sends the legal unlock information to the first system; 所述第一系统接收所述合法解锁信息。The first system receives the legal unlocking information. 6.根据权利要求4所述的方法,其特征在于,所述方法还包括:6. The method according to claim 4, characterized in that the method further comprises: 在对接收到的所述合法解锁信息进行删除处理之后,若所述第一系统检测到用户输入解锁信息,则所述第一系统唤醒所述第二系统,并向所述第二系统重新发送所述解锁请求;After deleting the received legal unlocking information, if the first system detects that the user inputs unlocking information, the first system wakes up the second system and resends the unlocking request to the second system; 所述第二系统在接收到所述解锁请求后,在可信任执行环境中读取所述合法解锁信息,并将所述合法解锁信息发送至所述第一系统;After receiving the unlock request, the second system reads the legal unlock information in a trusted execution environment and sends the legal unlock information to the first system; 所述第一系统接收所述合法解锁信息。The first system receives the legal unlocking information. 7.根据权利要求1所述的方法,其特征在于,所述将所述合法解锁信息发送至所述第一系统,包括:7. The method according to claim 1, characterized in that sending the legal unlocking information to the first system comprises: 所述第二系统对所述合法解锁信息进行加密,并将加密后的合法解锁信息发送至所述第一系统;The second system encrypts the legal unlocking information and sends the encrypted legal unlocking information to the first system; 对应地,所述第一系统接收所述合法解锁信息,包括:Correspondingly, the first system receives the legal unlocking information, including: 所述第一系统接收所述加密后的合法解锁信息,并对所述加密后的合法解锁信息进行解密,得到所述合法解锁信息。The first system receives the encrypted legal unlocking information, and decrypts the encrypted legal unlocking information to obtain the legal unlocking information. 8.根据权利要求1所述的方法,其特征在于,所述第一系统接收所述合法解锁信息之后,所述方法还包括:8. The method according to claim 1, characterized in that after the first system receives the legal unlocking information, the method further comprises: 所述第一系统获取用户输入的解锁信息;The first system acquires unlocking information input by a user; 所述第一系统基于所述解锁信息和所述合法解锁信息是否匹配确定所述解锁信息是否验证通过;The first system determines whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information; 在确定所述解锁信息是否验证通过后,所述第一系统对所述合法解锁信息进行删除处理。After determining whether the unlocking information has passed the verification, the first system deletes the legal unlocking information. 9.根据权利要求8所述的方法,其特征在于,所述第一系统基于所述解锁信息和所述合法解锁信息是否匹配确定所述解锁信息是否验证通过,包括:9. The method according to claim 8, characterized in that the first system determines whether the unlocking information is verified based on whether the unlocking information matches the legal unlocking information, comprising: 所述第一系统获取第三预设时长内对用户输入的解锁信息验证不通过的次数;The first system obtains the number of times the unlocking information input by the user fails to be verified within a third preset time period; 若所述次数小于预设次数阈值,则所述第一系统基于所述解锁信息和所述合法解锁信息是否匹配确定所述解锁信息是否验证通过。If the number of times is less than a preset number threshold, the first system determines whether the unlock information is verified based on whether the unlock information matches the legal unlock information. 10.一种可穿戴设备,其特征在于,包括第一处理器和第二处理器,所述第一处理器用于运行第一系统,所述第二处理器用于运行第二系统,所述第一处理器的功耗小于所述第二处理器的功耗;10. A wearable device, comprising a first processor and a second processor, wherein the first processor is used to run a first system, the second processor is used to run a second system, and the power consumption of the first processor is less than the power consumption of the second processor; 所述第一系统,用于执行权利要求1至9中所述第一系统执行的任一项方法;The first system is used to perform any one of the methods performed by the first system in claims 1 to 9; 所述第二系统,用于执行权利要求1至9中所述第二系统执行的任一项方法。The second system is used to execute any one of the methods executed by the second system in claims 1 to 9. 11.一种计算机可读存储介质,其特征在于,其上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至9任一所述的解锁方法。11. A computer-readable storage medium, characterized in that a computer program is stored thereon, and when the computer program is executed by a processor, the unlocking method according to any one of claims 1 to 9 is implemented.
CN202011636916.8A 2020-12-31 2020-12-31 Unlocking method, wearable device and storage medium Active CN114692127B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011636916.8A CN114692127B (en) 2020-12-31 2020-12-31 Unlocking method, wearable device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011636916.8A CN114692127B (en) 2020-12-31 2020-12-31 Unlocking method, wearable device and storage medium

Publications (2)

Publication Number Publication Date
CN114692127A CN114692127A (en) 2022-07-01
CN114692127B true CN114692127B (en) 2024-07-16

Family

ID=82134829

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011636916.8A Active CN114692127B (en) 2020-12-31 2020-12-31 Unlocking method, wearable device and storage medium

Country Status (1)

Country Link
CN (1) CN114692127B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118733126A (en) * 2023-03-29 2024-10-01 Oppo广东移动通信有限公司 Screen unlocking method, device, electronic device and computer-readable storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113192237A (en) * 2020-01-10 2021-07-30 阿里巴巴集团控股有限公司 Internet of things equipment supporting TEE and REE and method for realizing communication between TEE and REE

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9054874B2 (en) * 2011-12-01 2015-06-09 Htc Corporation System and method for data authentication among processors
WO2014112066A1 (en) * 2013-01-17 2014-07-24 富士通株式会社 Information processing device, memory management method, and program
CN103425918B (en) * 2013-08-05 2016-12-28 金硕澳门离岸商业服务有限公司 Electronic locking system and electronic locking method
US10064240B2 (en) * 2013-09-12 2018-08-28 The Boeing Company Mobile communication device and method of operating thereof
CN103531200B (en) * 2013-10-29 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Voice unlocking method and terminal
US9299072B2 (en) * 2014-05-29 2016-03-29 Apple Inc. Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions
CN105740002A (en) * 2014-12-12 2016-07-06 徐下兵 Screen-turnoff wakeup method
WO2016100095A1 (en) * 2014-12-15 2016-06-23 Good Technology Corporation Secure storage
CN104536836B (en) * 2015-01-16 2018-01-09 宇龙计算机通信科技(深圳)有限公司 Synchronizing unlocking method and system based on dual system
US9552564B1 (en) * 2015-03-19 2017-01-24 Amazon Technologies, Inc. Autonomous delivery transportation network
EP3537362A1 (en) * 2015-09-09 2019-09-11 Samsung Electronics Co., Ltd. Method and apparatus for performing payment
CN107105082B (en) * 2016-02-23 2020-11-03 中兴通讯股份有限公司 Method for unlocking network of terminal, method and device for starting terminal
CN106557677A (en) * 2016-11-29 2017-04-05 北京元心科技有限公司 Unlocking method and device for container system
CN106648772B (en) * 2016-12-15 2020-08-07 北京珠穆朗玛移动通信有限公司 Task processing method and mobile terminal based on dual system
US10491392B2 (en) * 2017-03-01 2019-11-26 Ford Global Technologies, Llc End-to-end vehicle secure ECU unlock in a semi-offline environment
CN106940770A (en) * 2017-03-06 2017-07-11 广东欧珀移动通信有限公司 A screen locking method, device and terminal
CN106991005A (en) * 2017-03-21 2017-07-28 北京小米移动软件有限公司 The switching method and device of operating system
TW201839646A (en) * 2017-04-26 2018-11-01 東隆五金工業股份有限公司 Password verification system and method of electronic lock to unlock when the two-word string matches with the preset password
CN107169326A (en) * 2017-05-19 2017-09-15 维沃移动通信有限公司 A kind of unlocking screen method and mobile terminal
CN107480501A (en) * 2017-08-21 2017-12-15 北京珠穆朗玛移动通信有限公司 Unlocking method, mobile terminal and storage medium based on dual system
KR20190033930A (en) * 2017-09-22 2019-04-01 삼성전자주식회사 Electronic device for encrypting security information and method for controlling thereof
CN109032675B (en) * 2018-06-25 2024-06-28 北京集创北方科技股份有限公司 Screen unlocking method and device of terminal equipment and terminal equipment
CN108920918A (en) * 2018-06-28 2018-11-30 努比亚技术有限公司 Double screen unlocking method, device and computer readable storage medium
CN110895612B (en) * 2018-09-13 2023-08-11 中兴通讯股份有限公司 Unlocking method and device and terminal equipment
CN110602309A (en) * 2019-08-02 2019-12-20 华为技术有限公司 Device unlocking method and system and related device
US11423171B2 (en) * 2019-12-23 2022-08-23 Intel Corporation Protection of privacy and data on smart edge devices

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113192237A (en) * 2020-01-10 2021-07-30 阿里巴巴集团控股有限公司 Internet of things equipment supporting TEE and REE and method for realizing communication between TEE and REE

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"A dual-system trusted computing node construction method based on ARM multi-core CPU architecture";HongYu等;《CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE》;20220830;第34卷(第19期);全文 *
"监管场所警务终端硬件双系统架构和软件安全技术的研究和实现";姚仕聪;中国优秀硕士学位论文全文数据库社会科学Ⅰ辑(月刊);20210215(第2021年第02期);G120-384 *

Also Published As

Publication number Publication date
CN114692127A (en) 2022-07-01

Similar Documents

Publication Publication Date Title
US20190172047A1 (en) System on chip and processing device
EP3332372B1 (en) Apparatus and method for trusted execution environment based secure payment transactions
CN110741370A (en) Biometric authentication using user input
US10073985B2 (en) Apparatus and method for trusted execution environment file protection
US8176159B2 (en) Habit-based authentication
US10591975B2 (en) Memory access management for low-power use cases of a system on chip via secure non-volatile random access memory
US9891969B2 (en) Method and apparatus for device state based encryption key
US20090100516A1 (en) Secure Bait and Switch Resume
KR102274962B1 (en) User authentication confidence based on multiple devices
KR20150098002A (en) Authentication method and apparatus based on biometric information in a electronic device
WO2022199475A1 (en) Data risk prevention and control method, apparatus and device based on privacy protection
CN101290644B (en) Electronic system and its digital rights management method
CN107395589A (en) Finger print information acquisition methods and terminal
CN105337729A (en) Encryption method and device of mobile terminal and mobile terminal
CN114692127B (en) Unlocking method, wearable device and storage medium
JP2007272506A (en) Authentication system, authentication information management apparatus, authentication information distribution method, and computer program
CN116015627A (en) A face recognition anti-tampering method and system based on symmetric algorithm
CN107770155A (en) A kind of short-message verification method and mobile terminal
WO2021139703A1 (en) Method and device for processing payment information, wearable apparatus, and computer readable storage medium
CN100334519C (en) Method for establishing credible input-output channels
WO2023142748A1 (en) Device unlocking method and apparatus, electronic device and computer-readable storage medium
CN105224885A (en) A kind of data processing method and terminal
CN115146254A (en) Unlocking method and device, wearable device and storage medium
CN116418566A (en) SM encryption algorithm-based image data storage method and device
CN115603943A (en) Method, device, storage medium and electronic equipment for offline identity verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant