CN107180173A - unlocking method and device - Google Patents

unlocking method and device Download PDF

Info

Publication number
CN107180173A
CN107180173A CN201710287807.1A CN201710287807A CN107180173A CN 107180173 A CN107180173 A CN 107180173A CN 201710287807 A CN201710287807 A CN 201710287807A CN 107180173 A CN107180173 A CN 107180173A
Authority
CN
China
Prior art keywords
authority
puk
visitor
terminal
data base
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710287807.1A
Other languages
Chinese (zh)
Inventor
程灏
江宏魁
杨丽娜
陆洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Yude Technology Co Ltd
Original Assignee
Shanghai Yude Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Yude Technology Co Ltd filed Critical Shanghai Yude Technology Co Ltd
Priority to CN201710287807.1A priority Critical patent/CN107180173A/en
Publication of CN107180173A publication Critical patent/CN107180173A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present embodiments relate to communication technique field, a kind of unlocking method and device are disclosed.In the present invention, unlocking method is applied to terminal, by when terminal is in the lock state, obtaining the PUK of user's input;Wherein, PUK is used for the lock-out state for releasing terminal, and determines the access rights of PUK;When PUK is matched with any PUK for allowing to prestore in unblock list, the lock-out state of terminal is released, and determine the corresponding access rights of PUK;Wherein, different access authority allows the application used different, respectively applies the corresponding database difference under different access authority, respectively applies the store path for the data for allowing operation under different access authority different.Unlocking method provided in an embodiment of the present invention and device so that the application that the user of different access authority accesses is different, and the independent storage management of data that can be accessed, so as to ensure that the security of data storage on mobile terminal device.

Description

Unlocking method and device
Technical field
The present embodiments relate to communication technique field, more particularly to unlocking method and device.
Background technology
With the development of mobile terminal, the mobile terminal such as mobile phone, tablet personal computer have become life in, work in can not or Scarce instrument.With the extensive use of mobile terminal, user is to preserving data and individual privacy on the mobile terminal device Security also increasingly pay close attention to.
At present, in order to ensure the security of storage data on the mobile terminal device and individual privacy, generally pass through Set and log in PUK to ensure not by other people acquisition data and individual privacy, such as the owner of mobile phone can pass through and set Traditional PUK unlocking manner, such as numeral unblock, image unblock mode realize the encryption to mobile phone;Can also be by setting Biological characteristic unlocking manner, such as unlocked by fingerprint, recognition of face unblock, iris unblock are (real by the iris for gathering user's glasses Now unlock) etc. mode realize encryption to mobile phone.
But during the present invention is realized, inventor has found there are problems that in the prior art:Using tradition solution Code-locked mode and biological characteristic mode are to mobile phone cipher, although reach and ensure data on file and individual privacy on owner's mobile phone Safety, but personal use can only be ensured, if household, friends and family want to be operated and entertained using mobile phone temporarily, such as Fruit is using traditional PUK mode to mobile phone cipher, it is necessary to inform that user's PUK is unlocked, and there is the personal unblock of leakage The risk of code, potential safety hazard is brought to user;If using biological characteristic mode to mobile phone cipher, needing to record for user Enter biological characteristic to mobile phone, but operate excessively cumbersome.In addition, mobile phone is being lent into other people in use, can also face other makes User view terminal owner storage privacy information, such as message registration, short message content, photo, equally can to user with Carry out potential safety hazard.
The content of the invention
The purpose of embodiment of the present invention is to provide a kind of unlocking method and device so that the user of different access authority The application of access is different, and the independent storage management of data that can be accessed, and number is stored on mobile terminal device so as to ensure that According to security.
In order to solve the above technical problems, embodiments of the present invention provide a kind of unlocking method, applied to terminal.The solution Locking method includes:When terminal is in the lock state, the PUK of user's input is obtained;Wherein, PUK is used to release terminal Lock-out state, and determine the access rights of PUK;In PUK any PUK prestored in list is unlocked with allowing Timing, releases the lock-out state of terminal, and determines the corresponding access rights of PUK;Wherein, different access authority allows to use Application it is different, respectively apply under different access authority that corresponding database is different, respectively apply allows under different access authority The store path of the data of operation is different.
Embodiments of the present invention, which additionally provide a kind of tripper, to be included:Acquisition module, first detection module, control mould Block and authority confirm module;Acquisition module is used for when terminal is in the lock state, and obtains the PUK of user's input;Wherein, PUK is used for the lock-out state for releasing terminal, and determines the access rights of PUK;First detection module, which is used to detect, to be obtained Whether the PUK that module is obtained matches with any PUK for allowing to prestore in unblock list, and is detecting PUK with permitting During any PUK matching prestored perhaps in unblock list, trigger control module and authority confirm module;Control module is used to solve Except the lock-out state of terminal;Authority confirms that module is used to determine the corresponding access rights of PUK;Wherein, different access authority permits Perhaps the application used is different, respectively applies the corresponding database difference under different access authority, respectively applies in different access authority The store path of the lower data for allowing to operate is different.
Embodiment of the present invention in terms of existing technologies, by be set for the PUK for releasing terminal locking state Different access rights are put, and set different access authority to allow the application used different, so as to what is inputted according to user PUK determines the application that can use after user's unblock, while each applying the corresponding number under different access authority by setting According to storehouse is different, peration data store path is different, the data sheet operated under the corresponding access rights of different PUKs is realized Solely management, haves no right user and accesses to be stored in data in terminal so as to avoid, and substantially increases the data that are stored in terminal Security.
Access rights include owner's authority and visitor's authority;Wherein, owner's authority has access visitor's authority corresponding The authority of database, also, under owner's authority, the application for allowing to access under visitor's authority is set;Determine that PUK is corresponding Access rights, are specifically included:It is that the main human rights are prescribed a time limit in the corresponding access rights of PUK, determines the corresponding database of owner's authority For raw data base, the store path of raw data base is first path;Wherein, raw data base is used to store in terminal and owned The data of application;When the corresponding access rights of PUK are visitor's authority, a newly-built volatile data base, and generate the second tunnel Footpath;And determining that the corresponding database of visitor's authority is volatile data base, the store path of volatile data base is the second path;Its In, volatile data base is used for the data for storing the application for allowing to access under visitor's authority.By the way that access rights are divided into owner Authority and visitor's authority, and set owner's authority that there is the authority for accessing the corresponding database of visitor's authority, and in master Under people's authority, the application for allowing to access under visitor's authority can be set, so as to ensure to hold to enjoy owner's authority PUK While the Information Security that user stores in the terminal, the user for enjoying visitor's authority PUK it has been also convenient for holding to terminal Use.In addition, it is determined that after the corresponding access rights of the PUK currently obtained, by determining the corresponding number of the access rights According to the store path in storehouse, and access database, and the data that each database can be stored, so that after unblock terminal, Ke Yigen Loaded data into according to the store path with current accessed permission match from corresponding database in corresponding application, by this Individually manage the data applied under each access rights, it is to avoid the data stored in raw data base are visited by the user without authority Ask, improve security.
It is determined that the corresponding database of owner's authority be raw data base after, detection terminal in whether there is ephemeral data Storehouse;When there is volatile data base in detecting terminal, the data stored in volatile data base are loaded into raw data base, And delete volatile data base.For hold enjoy owner's authority PUK user provide access raw data base authority it is same When, while the authority of ephemeral data can be accessed by giving owner's authority, it is possible to as needed, volatile data base is carried out corresponding Operation, can also be square while ensureing to hold Information Security of the user for enjoying owner's authority PUK in terminal storage Just use of the user for enjoying visitor's authority PUK to terminal is held.
Visitor's authority has two kinds, respectively commonly uses visitor's authority and temporary visitor authority;Wherein, visitor's authority correspondence is commonly used The term of validity of PUK start untill deleting since creating, the term of validity of the corresponding PUK of temporary visitor authority oneself establishment opens Beginning predetermined hold-time section.Set not by further refining visitor's authority, and for the different corresponding PUKs of visitor's authority The same term of validity, while other people using terminals are facilitated, also further ensures the security of the data stored in terminal.
Whether when it is determined that the corresponding access rights of PUK are visitor's authority, it is temporary visitor power to judge visitor's authority Limit;When the corresponding access rights of PUK are temporary visitor authority, the use time that monitoring terminal Self-unlocking starts;Using When time is more than preset time threshold, PUK is destroyed;When failing to reacquire the PUK of user's input in preset time, Locking terminal.When using duration more than its term of validity of the PUK used in temporary visitor authority, by destroying the PUK, And further determine whether that user have input new PUK at the appointed time, when there is no new PUK, directly By terminal locking, so as to further ensure the security of terminal, it is to avoid the data being stored in terminal are acquired.
Brief description of the drawings
One or more embodiments are illustrative by the picture in corresponding accompanying drawing, these exemplary theorys The element with same reference numbers label is expressed as similar element in the bright restriction not constituted to embodiment, accompanying drawing, removes Composition is not limited the non-figure having in special statement, accompanying drawing.
Fig. 1 is the flow chart of the unlocking method of first embodiment of the invention;
Fig. 2 is the flow chart of the unlocking method of second embodiment of the invention;
Fig. 3 is the flow chart of the unlocking method of third embodiment of the invention;
Fig. 4 is the flow chart of the unlocking method of four embodiment of the invention;
Fig. 5 is the structured flowchart of the tripper of fifth embodiment of the invention;
Fig. 6 is the structured flowchart of the tripper of sixth embodiment of the invention;
Fig. 7 is the structured flowchart of the tripper of seventh embodiment of the invention;
Fig. 8 is the structured flowchart of the tripper of eighth embodiment of the invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with each reality of the accompanying drawing to the present invention The mode of applying is explained in detail.However, it will be understood by those skilled in the art that in each embodiment of the invention, In order that reader more fully understands the application and proposes many ins and outs.But, even if without these ins and outs and base Many variations and modification in following embodiment, can also realize the application technical scheme claimed.
The first embodiment of the present invention is related to a kind of unlocking method, and idiographic flow is as shown in Figure 1.
Unlocking method shown in Fig. 1 can be used in the user terminal, and wherein the user terminal can be for example intelligent hand Machine, tablet personal computer, personal digital assistant, wearable electronic equipment etc..Specifically, the stream for the unlocking method that Fig. 1 is related to Journey can include:
In a step 101, the PUK of user's input is obtained.
It should be noted that in present embodiment, when terminal is in the lock state, the PUK of user's input of acquisition The lock-out state of terminal can be not only released, the access rights of PUK can also be determined.
Specifically, PUK can include unblock part and the verification portion of presetting digit capacity of presetting digit capacity.Wherein, solve Lock section point is used for the lock-out state for releasing terminal, and verification portion is used to determine the access rights after PUK unblock terminal.
In actual applications, the digit of unblock part and verification portion can be preset by system in PUK, also may be used Set with providing authority by user, specifically can according to actual needs be selected, be not limited herein.
In addition, in order to ensure that PUK has enough securities and facilitates user record, it will usually by the solution of PUK Lock section, which is set up separately, is set to 6 Arabic numerals, and verification portion is set into 4 Arabic numerals.
But in actual applications, the digit of PUK unblock part is not limited to 6, and verification portion is also not limited to 4 Position,, can be with order to be further ensured that the security of the data stored in terminal while PUK is also not limited to Arabic numerals By improve PUK unblock part and verification portion complexity, such as by PUK be set to by capitalization, lowercase, Any one in Arabic numerals, special symbol or any combination composition, can specifically be selected, herein not according to actual needs It is limited.
In a step 102, whether detection PUK matches with any PUK for allowing to prestore in unblock list.
Specifically, when any PUK for detecting PUK with allowing to prestore in unblock list is matched, into step Rapid 103;Whether otherwise return to step 101, reacquire the PUK of user's input, and detect PUK with allowing to unlock list In prestore any PUK matching, until enter step 103 untill.
In step 103, the lock-out state of terminal is released, and determines the corresponding access rights of PUK, terminates this solution Lock flow.
Specifically, when any PUK for detecting PUK with allowing to prestore in unblock list is matched, solution is utilized The lock-out state of the unblock past release terminal of code-locked, and according to the access rights of the verification portion of PUK confirmation PUK.
It is noted that in embodiment of the present invention, in order to reach what can be used after different PUK unblock terminals Using and the data that access it is different, when creating PUK, different access rights can be set for different PUKs, and set Put the application that different access rights allow to use different, and respectively apply under different access authority corresponding database not Together, respectively apply the store path for the data for allowing operation under different access authority different, shown in table specific as follows:
Such as, when the PUK that user inputs is 2222220101, now judge that PUK, can be with after unblock terminal The access rights enjoyed are access rights B, and can specifically be applied with the player in using terminal, browser, game etc., together When, these that can be used apply the data generated under current accessed authority to be stored according to path B in database B, and The data that the PUK can only be had access in database B, when wanting to open unauthorized application, such as are installed on the branch in terminal When paying the application with higher privacy such as treasured, prompt window can be directly ejected, points out user not have authority to use, and refuse Start the application, or directly the application that user under current accessed authority does not have authority to use can be hidden and do not show, so that The application difference that different PUKs can be used is realized, and the data that can be accessed individually are managed.
In addition, in actual applications, ensureing that it is interior in the data in terminal, and privacy application that terminal owner is stored in Appearance is not obtained by other people, in order to further lift Consumer's Experience, is installed in the user's using terminal for facilitating nonterminal owner All applications, can also be installed after nonterminal owner is using the PUK unblock terminal for distributing to him in using terminal When arbitrarily applying, access right is provided which to the user, but after user starts application, the data of the application loading are currently solution Data in the corresponding database of code-locked, when user is initially opened and applied, using when in a state of nature, i.e., in the absence of appointing What data, if user wants to use, can input the account of oneself, such as Alipay account carries out delivery operation, specifically may be used To be configured according to actual needs, no longer repeat one by one herein.
Limited it should be noted that these are only for example, not constituted to technical scheme.
In addition, in actual applications, the corresponding access rights of PUK of user's input are verified for convenience, can be in wound When building PUK, according to the access rights set for PUK, in the checking for the presetting digit capacity that script is set in verification portion Hold and directly replaced with a mark number, such as the PUK that terminal owner uses is marked as High or H, that is, using should PUK unlocks the user of terminal, can enjoy to terminal highest access rights;PUK that other users are used is tested Card part is labeled as Low or L, i.e., the user for unlocking terminal using the PUK for having the mark accesses the access rights of terminal most It is low;The verification portion that terminal owner is the PUK that household distributes is labeled as Normal or N, i.e., using the solution for having the mark Code-locked unlocks the user of terminal, can enjoy it is lower than labeled as High, specifically can be with than labeled as access rights high Low Set, be not limited herein according to actual needs.
Compared with prior art, the unlocking method provided in present embodiment, by for for releasing terminal locking state PUK different access rights are set, and set different access authority to allow the application used different, so as to basis The PUK of user's input determines the application that can be used after user's unblock, while by setting each apply in different access authority Under corresponding database is different, peration data store path is different, realize and grasped under the corresponding access rights of different PUKs The data of work are individually managed, and are accessed the data being stored in terminal so as to avoid and have no right user, are substantially increased in terminal and deposit The security of the data of storage.
Second embodiment of the present invention is related to a kind of unlocking method.Present embodiment is on the basis of first embodiment Further improvement is done, specific improvements are:Access rights include owner's authority and visitor's authority, defeated getting user After the PUK entered, the access rights confirmed according to PUK, so as to confirm the database and store path that can be accessed, specifically Flow is as shown in Figure 2.
In step 201, the PUK of user's input is obtained.
In step 202., whether detection PUK matches with any PUK for allowing to prestore in unblock list.In detection When being matched to PUK with any PUK for allowing to prestore in unblock list, into step 203;Otherwise user is reacquired defeated The PUK entered, and detect whether PUK matches with any PUK for allowing to prestore in unblock list, until entering step Untill 203.
Because step 201 and step 202 are roughly the same with the step 101 and step 102 in first embodiment, it is intended to when When terminal is in the lock state, the PUK of user's input is obtained, detects the PUK obtained whether with allowing in unblock list Any PUK matching prestored, here is omitted.
In step 203, the lock-out state of terminal is released.
In step 204, whether the corresponding access rights of detection PUK are main people's authority.Detecting PUK correspondence Access rights when being owner's authority, into step 205;Otherwise current PUK is judged as visitor's authority, into step 206.
Specifically, in order to ensure that the rights and interests of terminal owner and reaching facilitate the purpose of other people using terminals, this reality Apply in mode is that the access rights that PUK is set mainly include owner's authority and visitor's authority.
Wherein, owner's authority is the access rights for the PUK that terminal owner holds, i.e., under owner's authority, Ke Yizheng All applications in normal using terminal, and also there is the authority for accessing the corresponding database of visitor's authority, that is, using visitor After authority PUK unblock terminal, the data produced using corresponding application, if the user does not delete, when using access right It is limited to after the PUK of owner's authority unblock terminal, can conducts interviews.And use the corresponding PUK unblock of visitor's authority eventually Behind end, corresponding database can only be accessed, it is not possible to access the corresponding database of owner's authority.
In addition, it is necessary to which explanation, the PUK of correspondence owner's access rights is the solution that terminal is set in initial activation Code-locked, and in actual applications, in order to ensure to be used in security of the access rights for the PUK of main people's authority, the PUK User's setting or presetting digit capacity safety code can be not limited in the verification portion of authentication-access authority, can also be provided Inlet porting identifies finger print information of its identity etc. for user's input, and the fingerprint of typing can be one or any number of, It is not particularly limited herein.
In addition, in order to further improve security, the content of its verification portion can also be the voiceprint of owner, figure As information etc., and in use, if want the application or installation new opplication that discharging terminal is currently installed on, it is necessary to Input access rights can just carry out subsequent operation for the PUK of main people's authority, be used so as to avoid terminal by children When, applied because maloperation is unloaded, or the application for needing to charge is downloaded, unnecessary trouble is brought to terminal owner.
In addition, after being stolen by others in order to avoid terminal, stealing the data that this acquisition is stored in terminal, can also setting Terminal is shut down, during restarting, and subsequent operation can just be carried out for the PUK of main people's authority by only inputting access rights, So as to further improve security.
Visitor's authority is to be unlocked by the PUK using correspondence owner's authority after terminal, under owner's authority, setting, its The content of setting can be specifically:The PUK of correspondence visitor authority and accessed using being run after PUK unblock terminal Application etc., and manage for convenience, it is ensured that hold the rights and interests for the PUK user that access rights are main people's authority, Ke Yishe Put under visitor's authority, user can not change the PUK of correspondence visitor's authority, or after modification PUK, will can change PUK afterwards is updated under owner's authority in the tables of data of storage PUK, and informs terminal owner.
In step 205, it is raw data base to determine the corresponding data of owner's authority, and store path is first path, knot Shu Benci unlocks flow.
Specifically, when it is owner's authority to detect the corresponding access rights of PUK, determine that owner's authority is corresponding Database is raw data base, and the store path of raw data base is first path.That is, being released eventually using the PUK After the lock-out state at end, the database that the application that user uses is accessed is raw data base, i.e., own for storing in terminal The database of application data.The data for using application to produce under the access rights, or loaded data into accordingly from database Application in, be required for completing according to the first path path of raw data base (allow access).
In step 206, newly-built volatile data base, and generate the second path.
Specifically, when it is visitor's authority to detect the corresponding access rights of PUK, newly-built one is faced in the terminal When database, and produce the second path.
It should be noted that volatile data base newly-built in present embodiment is to allow what is accessed under objective authority for storing The data database of application, and in order to ensure to hold the use of different PUKs (access rights are the PUK of visitor's authority) The user that the data produced after family, using terminal are not enjoyed visitor's authority by it checks that each access rights is visitor's authority The corresponding volatile data base of PUK differ.
Because the corresponding volatile data base of the PUK of different visitor's authorities is different, therefore, visited under corresponding visitor's authority Database is asked, the second path stored to the data stored in database can also have multiple, and each PUK pair Answer a volatile data base for being specific to the PUK and access the volatile data base, the second path stored to data.
In addition, it is noted that when creating volatile data base, the second path of generation, can have two ways, specifically It is as follows:
1st, under owner's authority, when the PUK of visitor's authority is enjoyed in setting, visitor's authority is enjoyed for each of setting PUK corresponding volatile data base is set and the store path (the second path) of the volatile data base is accessed;
2nd, after the PUK of user's input is got, judge that the PUK can release terminal locking state, and its When access rights are visitor's authority, system creates a volatile data base for the PUK automatically, and produces the volatile data base Store path (the second path), terminal locking state is released in user, into after display interface, using the store path from facing When database in obtain data, be loaded into the application for running and using under visitor's authority.
Though it should be noted that using which kind of above-mentioned mode, can realize under different access authority, data it is independent Management, and in actual applications, according to actual needs suitable mode can be selected to be specific to visitor's authority to create Volatile data base and the second path, are not limited herein.
In step 207, it is volatile data base to determine the corresponding database of visitor's authority, and store path is the second path, Terminate this unblock flow.
Specifically, create volatile data base for the PUK that current accessed authority is visitor's authority, and generate the Behind two paths, the corresponding database of visitor's authority is defined as the volatile data base, and determines that the store path of database is Second path (allows the path for accessing ephemeral data).
Compared with prior art, the unlocking method provided in present embodiment, is weighed by the way that access rights are divided into owner Limit and visitor's authority, and set owner's authority that there is the authority for accessing the corresponding database of visitor's authority, and in owner Under authority, the application for allowing to access under visitor's authority can be set, so as to ensure to hold the use for enjoying owner's authority PUK While the Information Security that family is stored in the terminal, the user for enjoying visitor's authority PUK it has been also convenient for holding to terminal Use.In addition, it is determined that after the corresponding access rights of the PUK currently obtained, by determining the corresponding data of the access rights Storehouse, and access the store path of database, and data that each database can be stored, so that after unblock terminal, can basis Loaded data into the store path of current accessed permission match from corresponding database in corresponding application, pass through this list Solely manage the data applied under each access rights, it is to avoid the data stored in raw data base are visited by the user without authority Ask, improve security.
Third embodiment of the present invention is related to a kind of unlocking method.Present embodiment is on the basis of second embodiment Further improvement is done, specific improvements are:It is determined that the corresponding database of owner's authority be raw data base after, enter one It whether there is volatile data base in step detection terminal, and subsequent operation carried out according to testing result, idiographic flow is as shown in Figure 3.
In step 301, the PUK of user's input is obtained.
In step 302, whether detection PUK matches with any PUK for allowing to prestore in unblock list.In detection When being matched to PUK with any PUK for allowing to prestore in unblock list, into step 303;Otherwise user is reacquired defeated The PUK entered, and detect whether PUK matches with any PUK for allowing to prestore in unblock list, until entering step Untill 303.
In step 303, the lock-out state of terminal is released.
In step 304, whether the corresponding access rights of detection PUK are main people's authority.Detecting PUK correspondence Access rights when being owner's authority, into step 305;Otherwise current PUK is judged as visitor's authority, into step 308.
In step 305, it is raw data base to determine the corresponding database of owner's authority, and store path is first path.
Because step 301 to step 305 is roughly the same to step 205 with the step 201 in second embodiment, it is intended to when When terminal is in the lock state, the PUK of user's input is obtained, and prestored with allowing in unblock list in the PUK of acquisition Any PUK matching when, release terminal lock-out state, and the corresponding access rights of PUK be the main human rights prescribe a time limit, really The corresponding database of owner's authority is determined for raw data base, and store path is first path, and here is omitted.
Within step 306, it whether there is volatile data base in detection terminal.
Specifically, when there is volatile data base in detecting terminal, into step 307;Otherwise, this unblock is terminated Flow.
In step 307, the data stored in volatile data base are loaded into raw data base, and delete ephemeral data Storehouse, terminates this unblock flow.
In actual applications, when the access rights for the PUK for releasing terminal locking state are main people's authority, and detect When there is volatile data base into terminal, management of the user to volatile data base for convenience can provide one and check interim The entrance of database, such as when there is volatile data base in detecting terminal, there is ephemeral data in direct pop-up prompting user Storehouse, if needs are checked, if user's selection is checked, the data stored in display volatile data base, and further also It is that operation application is produced after which PUK releases terminal locking state that current data, which can be shown, while being shown currently Interface provides the operation entry to data, is such as loaded into the entrance of raw data base, entrance is not handled or deletes entrance.When with When family triggering is loaded into the entrance of raw data base, then the data stored in current volatile data base are loaded into raw data base In, and delete the volatile data base;When entrance is deleted in user's triggering, then the data that directly will be stored in the volatile data base are deleted Remove;When user's triggering does not handle entrance, then the data in the volatile data base are stored under the PUK for the database After secondary unblock terminal, current data can also be accessed.
Such as, the data stored in volatile data base are the household's solution for the terminal owner's setting for enjoying owner's authority Produce, then user may only be to look at, data will not be finally handled under code-locked, so when to should volatile data base PUK next using terminal when, the data stored before can also be accessed.
Also such as, the data stored in volatile data base for interim using terminal user operation application produce number According to when, then can directly delete, be not added with being downloaded to raw data base.
Limit, specifically should for example, not constituted to technical scheme it should be noted that these are only In, it can according to actual needs be configured, not enumerate herein, also be not particularly limited.
In step 308, newly-built volatile data base, and generate the second path.
In a step 309, it is volatile data base to determine the corresponding database of visitor's authority, and store path is the second path, Terminate this unblock flow.
Because step 308 and step 309 are roughly the same with the step 206 and step 207 in second embodiment, it is intended to sentence When settled preceding PUK is visitor's authority, a newly-built volatile data base, and the second path is produced, while determining visitor's authority pair The database answered is volatile data base, and the store path of volatile data base is the second path, and here is omitted.
Compared with prior art, the unlocking method provided in present embodiment, owner's authority PUK is being enjoyed to hold User provide while access raw data base authority, while the authority of ephemeral data can be accessed by giving owner's authority, and Can be as needed, corresponding operating is carried out to volatile data base, is ensureing to hold the user for enjoying owner's authority PUK at end While holding the Information Security of storage, it can also conveniently hold use of the user for enjoying visitor's authority PUK to terminal.
The 4th embodiment of the present invention is related to a kind of unlocking method.Present embodiment is in second or the 3rd in embodiment Further improvement is done on the basis of any one, specific improvements are:Visitor's authority is further divided into conventional visitor Authority and temporary visitor authority, when judging the corresponding visitor's authority of PUK as temporary visitor authority, by monitoring terminal certainly Unlock whether the use time started is more than its term of validity, and subsequent operation, idiographic flow such as Fig. 4 institutes are carried out according to monitoring result Show.
In step 401, the PUK of user's input is obtained.
In step 402, whether detection PUK matches with any PUK for allowing to prestore in unblock list.In detection When being matched to PUK with any PUK for allowing to prestore in unblock list, into step 403;Otherwise user is reacquired defeated The PUK entered, and detect whether PUK matches with any PUK for allowing to prestore in unblock list, until entering step Untill 403.
In step 403, the lock-out state of terminal is released.
In step 404, whether the corresponding access rights of detection PUK are main people's authority.Detecting PUK correspondence Access rights when being owner's authority, into step 405;Otherwise current PUK is judged as visitor's authority, into step 406.
In step 405, it is raw data base to determine the corresponding database of owner's authority, and store path is first path, Terminate this unblock flow.
In a step 406, newly-built volatile data base, and generate the second path.
In step 407, it is volatile data base to determine the corresponding database of visitor's authority, and store path is the second path.
Because step 401 to step 407 is roughly the same to step 207 with the step 201 in second embodiment, it is intended to when When terminal is in the lock state, the PUK of user's input is obtained, and prestored with allowing in unblock list in the PUK of acquisition Any PUK matching when, release terminal lock-out state, and the corresponding access rights of PUK be the main human rights prescribe a time limit, really The corresponding database of owner's authority is determined for raw data base, and store path is first path, in the corresponding access rights of PUK During for visitor's authority, a newly-built volatile data base, and the second path is produced, while determining that the corresponding database of visitor's authority is Volatile data base, the store path of volatile data base is the second path, and here is omitted.
In a step 408, whether detection visitor's authority is temporary visitor authority.
Specifically, when detecting visitor's authority for temporary visitor authority, into step 409;Otherwise, this solution is terminated Lock flow.
Need, in order to further refine visitor's authority, and the corresponding PUK of different visitor's authorities is set in solution After terminal locking state, the application that can be used is different, and facilitates offer in the management of terminal owner, present embodiment Visitor's authority have two kinds, respectively commonly use visitor's authority and temporary visitor authority.
So-called conventional visitor's authority, that is, hold to should access rights PUK user often use present terminal, The households such as companion, father and mother, the children of such as terminal owner;The temporary visitor authority, that is, hold to should access rights solution User's occasional of code-locked uses present terminal, such as some friend, the colleague of terminal owner etc..
In addition, the security in order to be further ensured that the data stored in terminal, can be different visitor's authority correspondences PUK the different terms of validity are set.Such as, commonly use the term of validity of the corresponding PUK of visitor authority from establishment to deleting Untill removing, the term of validity of the corresponding PUK of temporary visitor authority starts predetermined hold-time section since creating.
Further user operates for convenience, can also provide inlet porting, sets the corresponding solution of temporary visitor authority Code-locked has system to automatically create, and sets the term of validity of the PUK of generation automatically, or provides term of validity inlet porting, by with Family is arranged as required to, and specifically can according to actual needs be selected, is not limited herein.
In step 409, whether monitoring use time is more than the term of validity of PUK.
Specifically, when the corresponding access rights of PUK are temporary visitor authority, monitoring terminal Self-unlocking starts Use time, when monitoring that use time is more than the term of validity of the PUK of current unblock terminal, into step 410;Otherwise, Continue the use time that monitoring terminal Self-unlocking starts, until use time is more than the term of validity of the PUK, into step 410 Untill.
In step 410, PUK is destroyed.
Specifically, when in use between be more than PUK the term of validity when, destroy unblock, will currently release terminal locking The PUK of state is stored in the tables of data of PUK from terminal and deleted, and is sent triggering terminal and detected that releasing is current eventually again Hold the PUK of lock-out state.
In step 411, the PUK of user's input whether is got in preset time.
Specifically, the PUK of user's input is got in preset time, then return to step 402, detection is currently obtained Whether the PUK got matches with any PUK for allowing to prestore in unblock list;Otherwise, step 412 is directly entered, is locked Determine terminal, terminate this unblock flow.
In step 412, locking terminal, terminates this unblock flow.
Compared with prior art, the unlocking method provided in present embodiment, by further refining visitor's authority, and be The corresponding PUK of different visitor's authorities sets the different terms of validity, while other people using terminals are facilitated, also further It ensure that the security of the data stored in terminal.In addition, the PUK that is used in temporary visitor authority uses duration to be more than During its term of validity, by destroying the PUK, and further determine whether that user have input new PUK at the appointed time, When there is no new PUK, directly by terminal locking, so as to further ensure the security of terminal, it is to avoid storage Data in terminal are acquired.
The step of various methods are divided above, be intended merely to description it is clear, can be merged into when realizing a step or Some steps are split, multiple steps are decomposed into, as long as including identical logical relation, all protection domain in this patent It is interior;To adding inessential modification in algorithm or in flow or introducing inessential design, but its algorithm is not changed Core design with flow is all in the protection domain of the patent.
The 5th embodiment of the present invention is related to a kind of tripper, as shown in Figure 5.
Tripper 500 includes:Acquisition module 501, first detection module 502, control module 503 and authority confirm module 504。
Specifically, acquisition module 501 is used for when terminal is in the lock state, and obtains the PUK of user's input.
It should be noted that the PUK provided in present embodiment can be not only used for releasing the lock-out state of terminal, The access rights of PUK can also be determined.
In addition, whether first detection module 502 is used for the PUK for detecting the acquisition of acquisition module 501 with allowing to unlock list In any PUK matching for prestoring, and any PUK for prestoring is matched in detecting PUK and allowing unblock list When, trigger control module 503 and authority confirm module 504.
Wherein, control module 503 is used for the lock-out state for releasing terminal.Authority confirms that module 504 is used to determine PUK Corresponding access rights.
It should be noted that in present embodiment, different access authority allows the application used different, respectively applies in difference Corresponding database is different under access rights, respectively applies the store path for the data for allowing operation under different access authority not Together.
Compared with prior art, the tripper provided in present embodiment, by for for releasing terminal locking state PUK different access rights are set, and set different access authority to allow the application used different, so as to basis The PUK of user's input determines the application that can be used after user's unblock, while by setting each apply in different access authority Under corresponding database is different, peration data store path is different, realize and grasped under the corresponding access rights of different PUKs The data of work are individually managed, and are accessed the data being stored in terminal so as to avoid and have no right user, are substantially increased in terminal and deposit The security of the data of storage.
It is seen that, present embodiment is the device embodiment corresponding with first embodiment, and present embodiment can be with First embodiment is worked in coordination implementation.The relevant technical details mentioned in first embodiment still have in the present embodiment Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In first embodiment.
It is noted that each module involved in present embodiment is logic module, and in actual applications, one Individual logic unit can be a part for a physical location or a physical location, can also be with multiple physics lists The combination of member is realized.In addition, will not be with solving institute of the present invention in the innovative part in order to protrude the present invention, present embodiment The technical problem relation of proposition less close unit is introduced, but this be not intended that in present embodiment be not present it is other single Member.
The 6th embodiment of the present invention is related to a kind of tripper.Present embodiment is on the basis of the 5th embodiment Further improvement is done, specific improvements are:Access rights include owner's authority and visitor's authority, defeated getting user After the PUK entered, the access rights confirmed according to PUK, so as to confirm the database and store path that can be accessed.
It should be noted that owner's authority in present embodiment has the power for accessing the corresponding database of visitor's authority Limit, also, under owner's authority, the application for allowing to access under visitor's authority is set.
In order to which the PUK inputted according to user confirms the corresponding access rights of current PUK, as shown in fig. 6, this implementation Tripper 500 in mode confirms to specifically include in module 504 in addition to including the module shown in Fig. 5 in authority:Identity Confirm that submodule 5041, first confirms that submodule 5042 and second confirms submodule 5043.
Specifically, identity validation submodule 5041 be used to determine the corresponding access rights of PUK for main people's authority or Visitor's authority.First confirmation submodule 5042 is used to determine that the corresponding access rights of PUK are in identity validation submodule 5041 During owner's authority, it is raw data base to determine the corresponding database of owner's authority, and confirms the store path of raw data base For first path.Second confirms that submodule 5043 is used to determine the corresponding access rights of PUK in identity validation submodule 5041 During for visitor's authority, a newly-built volatile data base, and the second path is generated, and determine the corresponding database of visitor's authority to face When database, the store path of volatile data base is the second path.
It is noted that raw data base signified in present embodiment is the number for storing all applications in terminal According to volatile data base is the data for storing the application for allowing to access under visitor's authority.
Compared with prior art, the tripper provided in present embodiment, is weighed by the way that access rights are divided into owner Limit and visitor's authority, and set owner's authority that there is the authority for accessing the corresponding database of visitor's authority, and in owner Under authority, the application for allowing to access under visitor's authority can be set, so as to ensure to hold the use for enjoying owner's authority PUK While the Information Security that family is stored in the terminal, the user for enjoying visitor's authority PUK it has been also convenient for holding to terminal Use.In addition, it is determined that after the corresponding access rights of the PUK currently obtained, by determining the corresponding data of the access rights Storehouse, and access the store path of database, and data that each database can be stored, so that after unblock terminal, can basis Loaded data into the store path of current accessed permission match from corresponding database in corresponding application, pass through this list Solely manage the data applied under each access rights, it is to avoid the data stored in raw data base are visited by the user without authority Ask, improve security.
It is seen that, present embodiment is the device embodiment corresponding with second embodiment, and present embodiment can be with Second embodiment is worked in coordination implementation.The relevant technical details mentioned in second embodiment still have in the present embodiment Effect, in order to reduce repetition, is repeated no more here.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in In second embodiment.
The 7th embodiment of the present invention is related to a kind of tripper.Present embodiment is on the basis of the 6th embodiment Further improvement is done, specific improvements are:It is determined that the corresponding database of owner's authority be raw data base after, enter one It whether there is volatile data base in step detection terminal, and subsequent operation carried out according to testing result.
As shown in fig. 7, tripper 500 is in addition to including the module shown in Fig. 6, in addition to:Second detection module 505th, data load-on module 506, removing module 507.
Specifically, the second detection module 505 is used to confirm that submodule 5042 determines the corresponding number of owner's authority first According to storehouse be raw data base after, detection terminal in whether there is volatile data base.
Data load-on module 506 is used for when there is volatile data base during the second detection module 505 detects terminal, will face When database in the data that store be loaded into raw data base, and trigger removing module 507 and delete volatile data base.
Compared with prior art, the tripper provided in present embodiment, owner's authority PUK is being enjoyed to hold User provide while access raw data base authority, while the authority of ephemeral data can be accessed by giving owner's authority, and Can be as needed, corresponding operating is carried out to volatile data base, is ensureing to hold the user for enjoying owner's authority PUK at end While holding the Information Security of storage, it can also conveniently hold use of the user for enjoying visitor's authority PUK to terminal.
Because the 3rd embodiment is mutually corresponding with present embodiment, therefore present embodiment can be mutual with the 3rd embodiment It is engaged implementation.The relevant technical details mentioned in 3rd embodiment are still effective in the present embodiment, implement the 3rd The technique effect that can be reached in mode can similarly be realized in the present embodiment, in order to reduce repetition, no longer be gone to live in the household of one's in-laws on getting married here State.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in the 3rd embodiment.
The 8th embodiment of the present invention is related to a kind of tripper.Present embodiment is on the basis of the 6th embodiment Further improvement is done, specific improvements are:Visitor's authority is further divided into conventional visitor's authority and temporary visitor power Limit, when judging the corresponding visitor's authority of PUK as temporary visitor authority, during the use started by monitoring terminal Self-unlocking Between whether be more than its term of validity, and according to monitoring result carry out subsequent operation.
As shown in figure 8, tripper 500 is in addition to including the module shown in Fig. 6, in addition to:Setup module 508, Three detection modules 509, monitoring modular 510, the destruction detection module 512 of module 511 and the 4th.
Specifically, setup module 508 is used for the term of validity for setting the corresponding PUK of visitor's authority.
3rd detection module 509 is used to confirm that submodule 5043 determines that the corresponding access rights of PUK are visitor second During authority, whether detection visitor's authority is temporary visitor authority, and is judging the corresponding access rights of PUK as temporary visitor During authority, monitoring modular 510 is triggered.
Monitoring modular 510 is used for the use time that monitoring terminal Self-unlocking starts, and is set monitoring that use time is more than During the term of validity for the PUK for putting the setting of module 508, module 511 is destroyed in triggering.
Destroying module 511 is used to destroy PUK.
4th detection module 512 is used for after the destruction PUK of module 511 is destroyed, detection acquisition module in preset time 501 whether reacquire user input PUK, and detect fail in preset time reacquire user input During PUK, the locking terminal of trigger control module 503.
It should be noted that in present embodiment, visitor's authority there are two kinds, visitor's authority and temporary visitor are respectively commonly used Authority, and each visitor's authority possesses the different terms of validity.
Wherein, commonly use the term of validity of the corresponding PUK of visitor authority and start untill deletion from creating, temporary visitor is weighed Limit the term of validity of corresponding PUK and start predetermined hold-time section since creating.
Compared with prior art, the tripper provided in present embodiment, by further refining visitor's authority, and be The corresponding PUK of different visitor's authorities sets the different terms of validity, while other people using terminals are facilitated, also further It ensure that the security of the data stored in terminal.In addition, the PUK that is used in temporary visitor authority uses duration to be more than During its term of validity, by destroying the PUK, and further determine whether that user have input new PUK at the appointed time, When there is no new PUK, directly by terminal locking, so as to further ensure the security of terminal, it is to avoid storage Data in terminal are acquired.
Because the 4th embodiment is mutually corresponding with present embodiment, therefore present embodiment can be mutual with the 4th embodiment It is engaged implementation.The relevant technical details mentioned in 4th embodiment are still effective in the present embodiment, implement the 4th The technique effect that can be reached in mode can similarly be realized in the present embodiment, in order to reduce repetition, no longer be gone to live in the household of one's in-laws on getting married here State.Correspondingly, the relevant technical details mentioned in present embodiment are also applicable in the 4th embodiment.
It will be appreciated by those skilled in the art that realizing that all or part of step in above-described embodiment method can be by Program instructs the hardware of correlation to complete, and the program storage is in a storage medium, including some instructions are to cause one Individual equipment (can be single-chip microcomputer, chip etc.) or processor (processor) perform the whole of each embodiment method of the application Or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
It will be understood by those skilled in the art that the respective embodiments described above are to realize the specific embodiment of the present invention, And in actual applications, can to it, various changes can be made in the form and details, without departing from the spirit and scope of the present invention.

Claims (10)

1. a kind of unlocking method, it is characterised in that applied to terminal;The unlocking method includes:
When the terminal is in the lock state, the PUK of user's input is obtained;Wherein, the PUK is used to release described The lock-out state of terminal, and determine the access rights of the PUK;
When the PUK is matched with any PUK for allowing to prestore in unblock list, the locking shape of the terminal is released State, and determine the corresponding access rights of the PUK;
Wherein, the application that different access authority allows to use is different, respectively applies under different access authority corresponding database not Together, respectively apply the store path for the data for allowing operation under different access authority different.
2. unlocking method according to claim 1, it is characterised in that the access rights include owner's authority and visitor Authority;
Wherein, owner's authority has the authority for accessing the corresponding database of visitor's authority, also, in owner power Under limit, the application for allowing to access under visitor's authority is set;
It is described to determine the corresponding access rights of the PUK, specifically include:
When the corresponding access rights of the PUK are owner's authority, the corresponding data of owner's authority are determined Storehouse is raw data base, and the store path of the raw data base is first path;Wherein, the raw data base is used to store The data of all applications in the terminal;
When the corresponding access rights of the PUK are visitor's authority, a newly-built volatile data base, and generate Second path;And determine that the corresponding database of visitor's authority is the volatile data base, the storage of the volatile data base Path is second path;Wherein, the volatile data base is for storing the application for allowing to access under visitor's authority Data.
3. unlocking method according to claim 2, it is characterised in that the unlocking method also includes:
After it is determined that the corresponding database of owner's authority is raw data base, detect in the terminal with the presence or absence of described Volatile data base;
When there is the volatile data base in detecting the terminal, the data stored in the volatile data base are loaded into In the raw data base, and delete the volatile data base.
4. unlocking method according to claim 2, it is characterised in that visitor's authority has two kinds, respectively commonly uses and visits Objective authority and temporary visitor authority;
Wherein, the term of validity of the corresponding PUK of conventional visitor's authority since create start to deletion untill, it is described to face When the corresponding PUK of visitor's authority the term of validity start predetermined hold-time section since creating.
5. unlocking method according to claim 4, it is characterised in that the unlocking method also includes:
When it is determined that the corresponding access rights of the PUK are visitor's authority, detect visitor's authority whether be The temporary visitor authority;
When the corresponding access rights of the PUK are the temporary visitor authority, monitor the terminal Self-unlocking and start Use time;
When the use time is more than the term of validity of the PUK, the PUK is destroyed;
When failing to reacquire the PUK of user's input in preset time, the terminal is locked.
6. a kind of tripper, it is characterised in that including:Acquisition module, first detection module, control module and authority confirm mould Block;
The acquisition module is used for when the terminal is in the lock state, and obtains the PUK of user's input;Wherein, the solution Code-locked is used for the lock-out state for releasing the terminal, and determines the access rights of the PUK;
Whether the first detection module is used for the PUK for detecting the acquisition module acquisition with allowing in unblock list Any PUK matching prestored, and allow to unlock any PUK prestored in list with described detecting the PUK During matching, trigger the control module and the authority confirms module;
The control module is used for the lock-out state for releasing the terminal;
The authority confirms that module is used to determine the corresponding access rights of the PUK;Wherein, different access authority permits Perhaps the application used is different, respectively applies the corresponding database difference under different access authority, respectively applies in different access authority The store path of the lower data for allowing to operate is different.
7. tripper according to claim 6, it is characterised in that the access rights include owner's authority and visitor Authority;
Wherein, owner's authority has the authority for accessing the corresponding database of visitor's authority, also, in owner power Under limit, the application for allowing to access under visitor's authority is set;
The authority confirms that module is specifically included:Identity validation submodule, first confirm that submodule and second confirms submodule;
The identity validation submodule is used to determine that the corresponding access rights of the PUK are main people's authority or visitor's authority;
The first confirmation submodule is used to determine the corresponding access right of the PUK in the identity validation submodule When being limited to owner's authority, it is raw data base to determine the corresponding database of owner's authority, the raw data base Store path is first path;Wherein, the raw data base is used for the data for storing all applications in the terminal;
The second confirmation submodule is used to determine the corresponding access right of the PUK in the identity validation submodule When being limited to visitor's authority, a newly-built volatile data base, and the second path is generated, and determine that visitor's authority is corresponding Database is the volatile data base, and the store path of the volatile data base is second path;Wherein, the nonce It is used for the data for storing the application for allowing to access under visitor's authority according to storehouse.
8. tripper according to claim 7, it is characterised in that the tripper also includes:Second detection module, Data load-on module, removing module;
Second detection module is used to determine that the corresponding database of owner's authority is original in the described first confirmation submodule After beginning database, detect and whether there is the volatile data base in the terminal;
The data load-on module is used for there is the volatile data base in second detection module detects the terminal When, the data stored in the volatile data base are loaded into the raw data base, and trigger the removing module and are deleted The volatile data base.
9. tripper according to claim 7, it is characterised in that the tripper also includes setup module;
The setup module is used for the term of validity for setting the corresponding PUK of visitor's authority;
Wherein, visitor's authority has two kinds, respectively commonly uses visitor's authority and temporary visitor authority;Conventional visitor's authority The term of validity of the corresponding PUK starts untill deletion since creating, the corresponding PUK of the temporary visitor authority The term of validity start predetermined hold-time section since creating.
10. tripper according to claim 9, it is characterised in that the tripper also include the 3rd detection module, Monitoring modular, destruction module and the 4th detection module;
3rd detection module is used to determine the corresponding access rights of the PUK in the described second confirmation submodule During for visitor's authority, detect whether visitor's authority is the temporary visitor authority;And judging the PUK pair When the access rights answered are the temporary visitor authority, the monitoring modular is triggered;
The monitoring modular is used to monitor the use time that the terminal Self-unlocking starts;And monitoring that the use time is big During the term of validity of the PUK set in the setup module, the destruction module is triggered;
The destruction module is used to destroy the PUK;
4th detection module is used for after module destruction PUK is destroyed, and detection acquisition module in preset time is It is no to reacquire the PUK inputted to user, and detect the PUK for failing to reacquire user's input in preset time When, trigger the control module and lock the terminal.
CN201710287807.1A 2017-04-27 2017-04-27 unlocking method and device Pending CN107180173A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710287807.1A CN107180173A (en) 2017-04-27 2017-04-27 unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710287807.1A CN107180173A (en) 2017-04-27 2017-04-27 unlocking method and device

Publications (1)

Publication Number Publication Date
CN107180173A true CN107180173A (en) 2017-09-19

Family

ID=59832579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710287807.1A Pending CN107180173A (en) 2017-04-27 2017-04-27 unlocking method and device

Country Status (1)

Country Link
CN (1) CN107180173A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595977A (en) * 2018-03-30 2018-09-28 广东欧珀移动通信有限公司 User mode controlling method and device, readable storage medium storing program for executing, terminal
CN108647528A (en) * 2018-04-25 2018-10-12 上海与德科技有限公司 A kind of photo processing method, device, terminal and storage medium
CN110555302A (en) * 2019-07-22 2019-12-10 珠海格力电器股份有限公司 Unlocking method and device and electronic equipment
CN112003982A (en) * 2020-08-12 2020-11-27 厦门市美亚柏科信息股份有限公司 Mobile phone unlocking method and system based on chip detachment
CN116193020A (en) * 2023-04-27 2023-05-30 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN103793636A (en) * 2012-11-01 2014-05-14 华为技术有限公司 Equipment and method for protecting privacy thereof
CN104021352A (en) * 2014-05-14 2014-09-03 上海卓悠网络科技有限公司 Method and system for isolating applications through data
CN105184132A (en) * 2015-10-22 2015-12-23 上海斐讯数据通信技术有限公司 Electronic device privacy right management method and system
CN106055941A (en) * 2016-05-24 2016-10-26 珠海市魅族科技有限公司 Terminal method and apparatus
CN106096384A (en) * 2016-06-15 2016-11-09 北京握奇智能科技有限公司 A kind of data processing method and device
CN106126994A (en) * 2016-06-26 2016-11-16 深圳市智汇十方科技有限公司 The user management method of a kind of mobile terminal and system
WO2017024519A1 (en) * 2015-08-11 2017-02-16 华为技术有限公司 Startup method of smart terminal system, device and smart terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102457619A (en) * 2011-12-30 2012-05-16 广东欧珀移动通信有限公司 Method for setting permission password for mobile phone
CN103793636A (en) * 2012-11-01 2014-05-14 华为技术有限公司 Equipment and method for protecting privacy thereof
CN104021352A (en) * 2014-05-14 2014-09-03 上海卓悠网络科技有限公司 Method and system for isolating applications through data
WO2017024519A1 (en) * 2015-08-11 2017-02-16 华为技术有限公司 Startup method of smart terminal system, device and smart terminal
CN105184132A (en) * 2015-10-22 2015-12-23 上海斐讯数据通信技术有限公司 Electronic device privacy right management method and system
CN106055941A (en) * 2016-05-24 2016-10-26 珠海市魅族科技有限公司 Terminal method and apparatus
CN106096384A (en) * 2016-06-15 2016-11-09 北京握奇智能科技有限公司 A kind of data processing method and device
CN106126994A (en) * 2016-06-26 2016-11-16 深圳市智汇十方科技有限公司 The user management method of a kind of mobile terminal and system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108595977A (en) * 2018-03-30 2018-09-28 广东欧珀移动通信有限公司 User mode controlling method and device, readable storage medium storing program for executing, terminal
CN108647528A (en) * 2018-04-25 2018-10-12 上海与德科技有限公司 A kind of photo processing method, device, terminal and storage medium
CN110555302A (en) * 2019-07-22 2019-12-10 珠海格力电器股份有限公司 Unlocking method and device and electronic equipment
CN112003982A (en) * 2020-08-12 2020-11-27 厦门市美亚柏科信息股份有限公司 Mobile phone unlocking method and system based on chip detachment
CN116193020A (en) * 2023-04-27 2023-05-30 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system
CN116193020B (en) * 2023-04-27 2023-08-11 合肥智辉空间科技有限责任公司 Mobile phone screen unlocking method and system

Similar Documents

Publication Publication Date Title
CN107180173A (en) unlocking method and device
CN107403106A (en) Database fine-grained access control method based on terminal user
CN104820805B (en) A kind of method and device of subscriber identification card information theft-preventing
CN106169052B (en) Processing method, device and the mobile terminal of application program
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
WO2015097927A1 (en) Information processing device and information processing method
CN105809007A (en) Privacy protection method and device
CN105260657A (en) Privacy protection method and device
CN106603241A (en) Unlocking method, apparatus and electronic device
US9411949B2 (en) Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same
CN112905976A (en) User data protection method for security computer
CN105653918B (en) Method for safely carrying out, safe operating device and terminal
TWI534711B (en) Smart card and access method thereof
CN107180201A (en) The creation method and device of private space
CN106778160A (en) Data item display methods and device
CN106934300A (en) The safety control and method of a kind of data handling system
CN108512858A (en) Realize the dynamic input system and method for static password
CN108460872A (en) The control method and device of smart lock
CN107679411A (en) A kind of mobile terminal privacy processing method and mobile terminal
CN110349301A (en) Gate inhibition's open method and device
Herrera Biometric Passwords and the Fifth Amendment: How Technology Has Outgrown the Right to Be Free from Self-Incrimination
CN105007267A (en) Privacy protection method and device
CN106295362B (en) A kind of chip self-destroying device and method
JP4008626B2 (en) Integrated management system for entry / exit and equipment use
CN110246246A (en) Access control management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170919