WO2013000150A1 - Method, apparatus and computer program product for retrieval of lost or forgotten passwords - Google Patents
Method, apparatus and computer program product for retrieval of lost or forgotten passwords Download PDFInfo
- Publication number
- WO2013000150A1 WO2013000150A1 PCT/CN2011/076656 CN2011076656W WO2013000150A1 WO 2013000150 A1 WO2013000150 A1 WO 2013000150A1 CN 2011076656 W CN2011076656 W CN 2011076656W WO 2013000150 A1 WO2013000150 A1 WO 2013000150A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- password
- message
- locked state
- mobile terminal
- providing
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
- H04M1/673—Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Definitions
- Example embodiments of the present invention relate generally to the retrieval of lost or forgotten passwords, and more particularly, to a method of retrieving a password of a mobile device.
- Mobile devices such as cellular telephones, have become smaller and lighter while also becoming more capable of performing tasks that far exceed a traditional voice call.
- Mobile devices may be capable of sending and receiving email, accessing personal accounts, accessing secure networks, or other functions that may benefit from security features such as requiring a password.
- mobile devices themselves may be secured with a password preventing the use of any function of the mobile device without first entering the password.
- One drawback to securing a device with a password is that a user must remember the password in order to access the mobile device or the individual functions that are secured. A mechanism for the retrieval of a password may therefore be desirable.
- an example embodiment of the present invention provides an improved method retrieving a forgotten or lost password for a mobile terminal.
- the method of example embodiments includes providing for operation of a device in a locked state, requiring a password to be entered to transition from the locked state to an unlocked state, and providing for transmission of a password request message from the device while the device is in the locked state.
- the method may further include receiving a selection of a mechanism for receipt of a password message.
- the mechanism may be a phone call, an email message, or a text message.
- the phone call, email message, or text message may be received on a second device that was previously configured to receive the password message.
- the method may also include receiving a password message that includes a password hint in response to providing for transmission of a password request message.
- the password message containing the password hint may be received on the device and the password message may be retrievable by a user when the device is in the locked state.
- the method may optionally include receiving a password hint message and providing for display of the password hint message in response to providing for transmission of a password request message.
- an apparatus may include at least one processor and at least one memory including computer program code.
- the at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to provide for operation of the apparatus in a locked state, require a password to be entered to transition from the locked state to an unlocked state, and provide for transmission of a password request message from the apparatus while the apparatus is in the locked state.
- the apparatus may further be caused to receive a selection of a mechanism for receipt of a password message.
- the mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message.
- the apparatus may also be caused to receive a password message including a password hint in response to providing for transmission of a password request message.
- the password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state.
- the apparatus may also be configured to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
- a further embodiment of the invention may include a computer program product including at least one computer-readable storage medium having computer-executable program code instructions stored therein.
- the computer executable program code instructions may include program code instructions for providing for operation of a device in a locked state, program code instructions for requiring a password to be entered to transition from the locked state to an unlocked state, and program code instructions for providing for transmission of a password request message from the device while the device is in the locked state.
- the computer program product may further include program code instructions for receiving a selection of a mechanism for receipt of a password message.
- the mechanism may be a phone call, an email message, or a text message.
- the phone call, email message, and text message may be received on a second device previously configured for receipt of a password message.
- the computer program product may further include program code instructions for receiving a password message including a password hint in response to providing for transmission of a password request message.
- the password message may be received on a device and the password hint message may be retrievable when the device is
- an apparatus may include means to provide for operation of the apparatus in a locked state, means to require a password to be entered to transition from the locked state to an unlocked state, and means to provide for transmission of a password request message from the apparatus while the apparatus is in the locked state.
- the apparatus may include means to receive a selection of a mechanism for receipt of a password message.
- the mechanism may be a phone call, an email message, or a text message.
- the phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message.
- the apparatus may also include means to receive a password message including a password hint in response to providing for transmission of a password request message.
- the password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state.
- the apparatus may also include means to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
- FIG. 1 illustrates an communication system in accordance with an example embodiment of the present invention
- FIG. 2 is a schematic block diagram of a mobile device according to an example embodiment of the present invention
- FIG. 3 is an illustration of a mobile terminal in a locked state according to an example embodiment of the present invention.
- FIG. 4 is an illustration of a mobile terminal in a locked state and providing a
- FIG. 5 is an illustration of a mobile terminal in a locked state and providing options for password retrieval according to an example embodiment of the present invention.
- FIG. 6 is a flow chart of a method of retrieving a password according to an example embodiment of the present invention.
- circuitry refers to (a) hardware-only circuit implementations (e.g., implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present.
- This definition of 'circuitry' applies to all uses of this term herein, including in any claims.
- the term 'circuitry' also includes an implementation comprising one or more processors and/or portion(s) thereof and accompanying software and/or firmware.
- the term 'circuitry' as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
- a session may be supported by a network 30 as shown in FIG. 1 that may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces or in ad-hoc networks such as those functioning over Bluetooth® interfaces.
- FIG. 1 should be understood to be an example of a broad view of certain elements of a system that may incorporate example embodiments of the present invention and not an all inclusive or detailed view of the system or the network 30.
- the network 30 may be capable of supporting communication in accordance with any one or more of a number of first- generation (1G), second-generation (2.G), 2.5G, third-generation (3G), 3.5G, 3.9G, fourth- generation (4G) mobile communication protocols and/or the like.
- One or more communication terminals may be in communication with each other via the network 30 and each may include an antenna or antennas for transmitting signals to and for receiving signals from a base site, which could be, for example a base station that is part of one or more cellular or mobile networks or an access point that may be coupled to a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
- LAN local area network
- MAN metropolitan area network
- WAN wide area network
- other devices e.g., personal computers, server computers or the like
- the mobile terminal 10 and the second mobile terminal 20 may be enabled to communicate with the other devices or each other, for example, according to numerous communication protocols including Hypertext Transfer Protocol (HTTP) and/or the like, to thereby carry out various communication or other functions of the mobile terminal 10 and the second mobile terminal 20, respectively.
- HTTP Hypertext Transfer Protocol
- either of the mobile terminals may be mobile or fixed communication devices.
- the mobile terminal 10 and the second mobile terminal 20 could be, or be substituted by, any of personal computers (PCs), personal digital assistants (PDAs), wireless telephones, desktop computer, laptop computer, mobile computers, cameras, video recorders, audio/video players, positioning devices, game devices, television devices, radio devices, or various other devices or combinations thereof.
- PCs personal computers
- PDAs personal digital assistants
- wireless telephones desktop computer
- laptop computer mobile computers
- mobile computers cameras, video recorders, audio/video players, positioning devices, game devices, television devices, radio devices, or various other devices or combinations thereof.
- the mobile terminal 10 may be configured in various manners, one example of a mobile terminal that could benefit from an example embodiment of the invention is depicted in the block diagram of Figure 2. While several embodiments of the mobile terminal may be illustrated and hereinafter described for purposes of example, other types of mobile terminals, such as portable digital assistants (PDAs), pagers, mobile televisions, gaming devices, all types of computers (e.g., laptops or mobile computers), cameras, audio/video players, radios, global positioning system (GPS) devices, or any combination of the aforementioned, and other types of communication devices, may employ an example embodiment of the present invention.
- PDAs portable digital assistants
- pagers mobile televisions
- gaming devices e.g., gaming devices
- computers e.g., laptops or mobile computers
- GPS global positioning system
- the mobile terminal may include various means for performing one or more functions in accordance with an example embodiment of the present invention, including those more particularly shown and described herein. It should be understood, however, that a mobile terminal may include alternative means for performing one or more like functions, without departing from the spirit and scope of the present invention.
- the mobile terminal 10 illustrated in FIG. 2 may include an antenna 32 (or multiple antennas) in operable communication with a transmitter 34 and a receiver 36.
- the mobile terminal may further include an apparatus, such as a processor 40, that provides signals to and receives signals from the transmitter and receiver, respectively.
- the signals may include signaling information in accordance with the air interface standard of the applicable cellular system, and/or may also include data corresponding to user speech, received data and/or user generated data.
- the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, and access types.
- the mobile terminal may be capable of operating in accordance with any of a number of first, second, third and/or fourth-generation communication protocols or the like.
- the mobile terminal may be capable of operating in accordance with second-generation (2G) wireless communication protocols IS-136, GSM (Global System for Mobile communications) and IS-95, or with third-generation (3G) wireless communication protocols, such as UMTS
- the apparatus such as the processor 40
- the processor 40 may be embodied in a number of different ways.
- the processor 40 may be embodied as one or more of various processing means such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an
- the processor 40 may include one or more processing cores configured to perform independently.
- a multi-core processor may enable multiprocessing within a single physical package.
- the processor 40 may include one or more processors configured in tandem via the bus to enable independent execution of instructions, pipelining and/or multithreading.
- the processor 40 may be configured to execute instructions stored in the memory device 62 or otherwise accessible to the processor 40.
- the processor 40 may be configured to execute hard coded functionality. As such, whether configured by hardware or software methods, or by a
- the processor 40 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly.
- the processor 40 when the processor 40 is embodied as an ASIC, FPGA or the like, the processor 40 may be specifically configured hardware for conducting the operations described herein.
- the processor 40 when the processor 40 is embodied as an executor of software instructions, the instructions may specifically configure the processor 40 to perform the algorithms and/or operations described herein when the instructions are executed.
- the processor 40 may be a processor of a specific device (e.g., a mobile terminal or network device) adapted for employing embodiments of the present invention by further configuration of the processor 40 by instructions for performing the algorithms and/or operations described herein.
- the processor 40 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 40.
- ALU arithmetic logic unit
- processor 40 and, in some embodiments, a memory device such as volatile memory 60
- a memory device such as volatile memory 60
- processor 40 and optionally an associated memory device may comprise one or more physical packages (e.g., chips) including materials, components and/or wires on a structural assembly (e.g., a baseboard).
- the structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon.
- the processor 40 and optionally an associated memory device may therefore, in some cases, be configured to implement an embodiment of the present invention on a single chip or as a single "system on a chip.”
- a chip or chipset may constitute means for performing one or more operations for providing the functionalities described herein.
- the mobile terminal 10 may also comprise a user interface including an output device such as an earphone or speaker 44, a ringer 42, a microphone 46, a display 48, and a user input interface, which may be coupled to the processor 40.
- the mobile terminal 10 may further include sensor(s) 47 for detecting a stimulus such as a button for detecting a depression, a touch sensitive display for detecting a touch, or a motion sensor to detect motion.
- the user input interface which allows the mobile terminal to receive data, may include any of a number of devices allowing the mobile terminal to receive data, such as a keypad 50, a touch sensitive display (not shown) or other input device.
- the keypad may include numeric (0-9) and related keys (#, *), and other hard and soft keys used for operating the mobile terminal 10.
- the keypad may include a conventional QWERTY keypad arrangement.
- the keypad may also include various soft keys with associated functions.
- the mobile terminal may include an interface device such as a joystick or other user input interface.
- the mobile terminal may further include a battery 54, such as a vibrating battery pack, for powering various circuits that are used to operate the mobile terminal, as well as optionally providing mechanical vibration as a detectable output.
- the mobile terminal 10 may further include a user identity module (UIM) 58, which may generically be referred to as a smart card.
- the U may be a memory device having a processor built in.
- the UIM may include, for example, a subscriber identity module (SIM), a universal integrated circuit card (UICC), a universal subscriber identity module (USIM), a removable user identity module (R-UIM), or any other smart card.
- SIM subscriber identity module
- UICC universal integrated circuit card
- USIM universal subscriber identity module
- R-UIM removable user identity module
- the UIM may store information elements related to a mobile subscriber.
- the mobile terminal may be equipped with memory.
- the mobile terminal may include volatile memory 60, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data.
- RAM volatile Random Access Memory
- the mobile terminal may also include other non-volatile memory 62, which may be embedded and/or may be removable.
- the non-volatile memory may additionally or alternatively comprise an electrically erasable programmable read only memory (EEPROM), flash memory or the like.
- EEPROM electrically erasable programmable read only memory
- the memories may store any of a number of pieces of information, and data, used by the mobile terminal to implement the functions of the mobile terminal.
- the memories may include an identifier, such as an international mobile equipment identification ( ⁇ ) code, capable of uniquely identifying the mobile terminal.
- the memories may store instructions for determining cell id information.
- the memories may store an application program for execution by the processor 40, which determines an identity of the current cell, e.g., cell id identity or cell id information, with which the mobile terminal is in communication.
- the memories and in particular a UIM 58 that may include a memory, may contain sensitive or personal information, the UIM 58 may be password protected to preclude an unauthorized user from using the mobile terminal 10.
- Example embodiments of the present invention may provide a mechanism by which a password may be retrieved by or for a mobile terminal, such as mobile terminal 10.
- password is used to generically describe a variety of secure codes or patterns that may be used to gain access to a secured device or function.
- passwords may include a Personal Identification Number (PIN), a PIN Unlocking Key (PUK), an alphanumeric password, a specific sequence of user inputs or motions, a pattern drawn on a touch screen, or any such code used to gain access to a secure device or function.
- PIN Personal Identification Number
- alphanumeric password a specific sequence of user inputs or motions
- a pattern drawn on a touch screen or any such code used to gain access to a secure device or function.
- password may also be retrieved using embodiments of the present invention.
- the term "password” may generally refer to any such username or password.
- Mobile terminals may include security features that preclude unauthorized users from gaining access to applications or functions of the mobile terminal.
- Applications which provide an authorized user access to sensitive information may require a password to be entered in order to access the application.
- Applications such as email, a company intranet, or a file transfer program among many others may require a user to provide a password to access the application.
- access to any or all functions of a mobile terminal may be piOtected with a password such that the mobile terminal requires the entry of a password prior in order to transition from a locked state to an unlocked state. In the locked state, the mobile terminal may not allow a user to perform any functions other than enter the password (or functions associated with obtaining a password as outlined below) while in the unlocked state, the mobile terminal may allow access to all available functions.
- a mobile terminal may have limited functionality available while in the locked state.
- the functionality provided while in the locked state may be limited, particularly to functions which do not provide or convey sensitive information or access to features which may charge a fee for use.
- Such functionality may include a music player function which allows a user to play, pause, fast-forward or rewind music tracks while the mobile terminal is in the locked state.
- Additional functions available in the locked state may include a game for a child such that the child doesn't inadvertently perform unintended functions of the mobile terminal
- Other functions may be provided as configured by a user of the mobile terminal or by the settings of the mobile terminal.
- Example embodiments of the present invention provide a mechanism by which a user may retrieve their password that is required to cause a mobile terminal to transition from a locked state to an unlocked state.
- FIG. 3 illustrates a mobile terminal 300 including a display 310.
- the display may clearly show a user that it is in the locked state with an indicator 320 which may be text, a symbol, or the like.
- a mobile terminal may not illustrate that it is in the locked state, but merely preclude a user from performing any functions available in the unlocked state, thereby implying the locked state.
- the illustrated embodiment further includes a dialog box 330 for entry of a password via keypad 340.
- the password may be a text or alphanumeric password, but may also be a symbol or pattern drawn on the display 310 by a user.
- the password may be a motion or series of motions of the mobile terminal itself as registered by a sensor (such as sensor 47 of mobile terminal 10) which may be an accelerometer.
- a sensor such as sensor 47 of mobile terminal
- FIG. 4 illustrates the example embodiment illustrated in FIG. 3; however, an additional option is displayed below the keypad 340 offering an option to "retrieve password" 350.
- This additional option may be presented before the user attempts to enter the password for the first time, or the option 350 may be configured to appear only after a user has incorrectly entered the password a predefined number of times.
- the "retrieve password” option may be configured to enable the mobile terminal 300 to transmit a password request message via a network, such as network 30 of FIG. 1, to request a password message in the form of a password or a password hint via a preconfigured device or mechanism.
- the preconfigured device or mechanism may include sending a text message to another mobile terminal which the user has previously identified or associated with the user's account, sending an email to an email account that the user has previously identified or associated with the user's account, or placing a call to a user.
- a password message containing the password sent via email or text message may be retrieved via another mobile terminal or device as previously configured by the user
- a password message containing a password hint may be sent to the mobile terminal that the user is attempting to unlock and the password hint may be presented on the display of mobile terminal.
- a phone call regarding the password may be made by a live person or by an automated system to a phone which the user has previously considered or the call may be made to the mobile terminal that the user wishes to unlock.
- the mobile terminal may be configured to receive a call from a service provider of the mobile terminal while in the locked state and the call may be answered without requiring a user to unlock the mobile terminal.
- the user may;converse with a live person from the service provider or with an automated service of the service provider to retrieve the password of the mobile terminal in a secure manner, thus ensuring that the user is authenticated before providing the user with the password.
- the user may not require access to another mobile terminal, phone, or device in order to retrieve a password to unlock the device.
- FIG. 5 depicts an example embodiment in which a user may be offered options with regard to the retrieval of a password.
- the option menu 520 may be presented in response to an input received at the "retrieve password?" 520 text of FIG. 4.
- the option menu 520 may also be presented in response to receiving one or more incorrect password attempts.
- the option menu may include an option to "Send SMS to Kerry's Cell" at 530 directing the password to be sent via a short message service text message to another mobile terminal, in the instant embodiment, Kerry's cell phone.
- Another option may include "Voice Call to Kerry's Cell” 540 where a voice call may be made by the user's service provider via a live person or an automated service to Kerry's cell phone to provide the password or a hint to the password.
- An option to "Send Hint to My Device” 550 may send an SMS text message to the user's locked device providing the user with a hint as to the password. The hint maybe user configurable and may remind the user of what their password is.
- Another option for a "Voice Call to My Device” 560 may direct a phone call to be made to the device by the user's service provider either by a live person or an automated system.
- the phone call may be configured to provide the user with a hint as to the password of the mobile terminal 500 or may be configured to authenticate a user through a series of questions before providing the user with the password.
- An option to "Send e-mail to Address 1" 570 may be configured to send the password or a hint regarding the password to a preconfigured email address. In the instant embodiment, the email address has a nickname of "Address 1.”
- a further option may be provided to return to the password entry screen 580 where the user may again attempt to enter the password.
- FIG. 6 An example embodiment of a mechanism for performing an example embodiment of the present invention is presented in the flowchart of FIG. 6. It will -be understood that each block of the flowchart, and combinations of blocks in the flowchart, may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions. For example, one or more of the procedures described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus.
- any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the flowchart block(s).
- These computer program instructions may also be stored in a computer- readable memory that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the flowchart block(s).
- the computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the flowchart block(s).
- blocks of the flowchart support combinations of means for performing the specified functions, and combinations of operations for performing the specified functions. It will also be understood that one or more blocks of the flowchart, and combinations of blocks in the flowcharts, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
- an apparatus for performing the methods of FIG. 6, described further below may comprise a processor (e.g., the processor 40) configured to perform some or each of the operations (600-650) described below.
- the processor may, for example, be configured to perform the operations (600-650) by performing hardware implemented logical functions, executing stored instructions, or executing algorithms for performing each of the operations.
- the apparatus may comprise means for performing each of the operations described above.
- examples of means for performing operations 600-650 may comprise, for example, the processor 40 and/or a device or circuit for executing instructions or executing an algorithm for processing information as described further below.
- FIG. 6 depicts an example embodiment of the present invention showing a flowchart of operations that may be performed on a device (e.g., mobile terminal 10) where the operations may be performed by a processor (e.g. processor 40).
- a device may operate in a locked state at 600.
- the device may require a password to be entered to transition from the locked state to an unlocked state at 610.
- a password request message may be transmitted at 620 requesting assistance with determining the password.
- Additional operations may be performed independently or in cooperation with the operations 600-620.
- the optional operations, depicted in broken lines in FIG. 6, may include receiving a selection of a mechanism for receipt of a password message at 630.
- the device may receive a password message in response to providing for transmission of a password request message.
- the password message may also be received by a number of other devices as presented in the options for selection of a mechanism for receiving the password message.
- a password message containing the password may be received via the selected mechanism at 640.
- a password message containing a password hint may be received at the device at 650.
- embodiments of the present invention may be configured as a system, method or electronic device.
- embodiments of the present invention may be comprised of various means including entirely of hardware or any combination of software and hardware.
- embodiments of the present invention may take the form of a computer program product on a computer-readable storage medium having computer-readable program instructions (e.g., computer software) embodied in the tangible, non-transitory storage medium. Any suitable computer-readable storage medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Provided herein are a method, apparatus and computer program product for operating a device in a locked state, requiring a password to be entered to transition from the locked state to an unlocked state, and for providing for transmission of a password request message from the device while the device is in the locked state. Embodiments may further include receiving a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message which may be received on a second device that was previously configured to receive the password message. The method may also include receiving a password message that includes a password hint in response to providing for transmission of a password request message. The password message containing the password hint may be received on the device and the password message may be retrievable by a user when the device is in the locked state.
Description
METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR RETRIEVAL OF LOST OR FORGOTTEN PASSWORDS
TECHNOLOGICAL FIELD
[0001] Example embodiments of the present invention relate generally to the retrieval of lost or forgotten passwords, and more particularly, to a method of retrieving a password of a mobile device.
BACKGROUND
[0002] The modern communications era has brought about a tremendous expansion of wireline and wireless networks. Computer networks, television networks, and telephone networks are experiencing an unprecedented technological expansion, fueled by consumer demand. Wireless and mobile networking technologies have addressed consumer demands while providing more flexibility and immediacy of information transfer.
[0003] Mobile devices, such as cellular telephones, have become smaller and lighter while also becoming more capable of performing tasks that far exceed a traditional voice call. Mobile devices may be capable of sending and receiving email, accessing personal accounts, accessing secure networks, or other functions that may benefit from security features such as requiring a password. Further, mobile devices themselves may be secured with a password preventing the use of any function of the mobile device without first entering the password. One drawback to securing a device with a password is that a user must remember the password in order to access the mobile device or the individual functions that are secured. A mechanism for the retrieval of a password may therefore be desirable.
SUMMARY
[0004] In general, an example embodiment of the present invention provides an improved method retrieving a forgotten or lost password for a mobile terminal.
[0005] In particular, the method of example embodiments includes providing for operation of a device in a locked state, requiring a password to be entered to transition from the locked state to an unlocked state, and providing for transmission of a password request message from the
device while the device is in the locked state. The method may further include receiving a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, or text message may be received on a second device that was previously configured to receive the password message. The method may also include receiving a password message that includes a password hint in response to providing for transmission of a password request message. The password message containing the password hint may be received on the device and the password message may be retrievable by a user when the device is in the locked state. The method may optionally include receiving a password hint message and providing for display of the password hint message in response to providing for transmission of a password request message.
[0006] According to another embodiment of the present invention, an apparatus is provided. The apparatus may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to provide for operation of the apparatus in a locked state, require a password to be entered to transition from the locked state to an unlocked state, and provide for transmission of a password request message from the apparatus while the apparatus is in the locked state. The apparatus may further be caused to receive a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message. The apparatus may also be caused to receive a password message including a password hint in response to providing for transmission of a password request message. The password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state. The apparatus may also be configured to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
[0007] A further embodiment of the invention may include a computer program product including at least one computer-readable storage medium having computer-executable program code instructions stored therein. The computer executable program code instructions may include program code instructions for providing for operation of a device in a locked state, program code instructions for requiring a password to be entered to transition from the locked state to an
unlocked state, and program code instructions for providing for transmission of a password request message from the device while the device is in the locked state. The computer program product may further include program code instructions for receiving a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second device previously configured for receipt of a password message. The computer program product may further include program code instructions for receiving a password message including a password hint in response to providing for transmission of a password request message. The password message may be received on a device and the password hint message may be retrievable when the device is in the locked state.
[0008] According to another embodiment of the present invention, an apparatus is provided. The apparatus may include means to provide for operation of the apparatus in a locked state, means to require a password to be entered to transition from the locked state to an unlocked state, and means to provide for transmission of a password request message from the apparatus while the apparatus is in the locked state. The apparatus may include means to receive a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message. The apparatus may also include means to receive a password message including a password hint in response to providing for transmission of a password request message. The password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state. The apparatus may also include means to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
BRIEF DESCRIPTION OF THE DRAWING(S)
[0009] Having thus described certain example embodiments of the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
[0010] FIG. 1 illustrates an communication system in accordance with an example embodiment of the present invention;
[0011] FIG. 2 is a schematic block diagram of a mobile device according to an example embodiment of the present invention;
[0012] FIG. 3 is an illustration of a mobile terminal in a locked state according to an example embodiment of the present invention;
[0013] FIG. 4 is an illustration of a mobile terminal in a locked state and providing a
"request password" option to a user according to an example embodiment of the present invention;
[0014] FIG. 5 is an illustration of a mobile terminal in a locked state and providing options for password retrieval according to an example embodiment of the present invention; and
[0015] FIG. 6 is a flow chart of a method of retrieving a password according to an example embodiment of the present invention.
DETAILED DESCRIPTION
[0016] Some example embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, various embodiments of the invention may be embodied in many different forms and should not be construed as limited to the example embodiments set forth herein; rather, these example embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout As used herein, the terms "data," "content," "information" and similar terms may be used interchangeably to refer to data capable of being transmitted, received and/or stored in accordance with embodiments of the present invention.
[0017] Additionally, as used herein, the term 'circuitry' refers to (a) hardware-only circuit implementations (e.g., implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present. This definition of 'circuitry' applies to all uses of this term herein, including in any claims. As a further example, as used herein, the term 'circuitry' also includes an implementation comprising one or more
processors and/or portion(s) thereof and accompanying software and/or firmware. As another example, the term 'circuitry' as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
[0018] A session may be supported by a network 30 as shown in FIG. 1 that may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces or in ad-hoc networks such as those functioning over Bluetooth® interfaces. As such, FIG. 1 should be understood to be an example of a broad view of certain elements of a system that may incorporate example embodiments of the present invention and not an all inclusive or detailed view of the system or the network 30. Although not necessary, in some example embodiments, the network 30 may be capable of supporting communication in accordance with any one or more of a number of first- generation (1G), second-generation (2.G), 2.5G, third-generation (3G), 3.5G, 3.9G, fourth- generation (4G) mobile communication protocols and/or the like.
[0019] One or more communication terminals, such as the mobile terminal 10 and the second mobile terminal 20, may be in communication with each other via the network 30 and each may include an antenna or antennas for transmitting signals to and for receiving signals from a base site, which could be, for example a base station that is part of one or more cellular or mobile networks or an access point that may be coupled to a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet. In turn, other devices (e.g., personal computers, server computers or the like) may be coupled to the mobile terminal 10 and the second mobile terminal 20 via the network 30. By directly or indirectly connecting the mobile terminal 10 and the second mobile terminal 20 and other devices to the network 30, the mobile terminal 10 and the second mobile terminal 20 may be enabled to communicate with the other devices or each other, for example, according to numerous communication protocols including Hypertext Transfer Protocol (HTTP) and/or the like, to thereby carry out various communication or other functions of the mobile terminal 10 and the second mobile terminal 20, respectively.
[0020] In example embodiments, either of the mobile terminals may be mobile or fixed communication devices. Thus, for example, the mobile terminal 10 and the second mobile
terminal 20 could be, or be substituted by, any of personal computers (PCs), personal digital assistants (PDAs), wireless telephones, desktop computer, laptop computer, mobile computers, cameras, video recorders, audio/video players, positioning devices, game devices, television devices, radio devices, or various other devices or combinations thereof.
[0021] Although the mobile terminal 10 may be configured in various manners, one example of a mobile terminal that could benefit from an example embodiment of the invention is depicted in the block diagram of Figure 2. While several embodiments of the mobile terminal may be illustrated and hereinafter described for purposes of example, other types of mobile terminals, such as portable digital assistants (PDAs), pagers, mobile televisions, gaming devices, all types of computers (e.g., laptops or mobile computers), cameras, audio/video players, radios, global positioning system (GPS) devices, or any combination of the aforementioned, and other types of communication devices, may employ an example embodiment of the present invention. As described, the mobile terminal may include various means for performing one or more functions in accordance with an example embodiment of the present invention, including those more particularly shown and described herein. It should be understood, however, that a mobile terminal may include alternative means for performing one or more like functions, without departing from the spirit and scope of the present invention.
[0022] The mobile terminal 10 illustrated in FIG. 2 may include an antenna 32 (or multiple antennas) in operable communication with a transmitter 34 and a receiver 36. The mobile terminal may further include an apparatus, such as a processor 40, that provides signals to and receives signals from the transmitter and receiver, respectively. The signals may include signaling information in accordance with the air interface standard of the applicable cellular system, and/or may also include data corresponding to user speech, received data and/or user generated data. In this regard, the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, and access types. By way of illustration, the mobile terminal may be capable of operating in accordance with any of a number of first, second, third and/or fourth-generation communication protocols or the like. For example, the mobile terminal may be capable of operating in accordance with second-generation (2G) wireless communication protocols IS-136, GSM (Global System for Mobile communications) and IS-95, or with third-generation (3G) wireless communication protocols, such as UMTS
(Universal Mobile Telecommunications System), CDMA2000 (Code Division Multiple Access),
wideband CDMA (WCDMA) and time division-synchronous CDMA (TD-SCDMA), with 3.9G wireless communication protocols such as E-UTRAN (evolved- UMTS (Universal Mobile Telecommunications System) terrestrial radio access network), with fourth-generation (4G) wireless communication protocols or the like.
[0023] It is understood that the apparatus, such as the processor 40, may include circuitry implementing, among others, audio and logic functions of the mobile terminal 10. The processor 40 may be embodied in a number of different ways. For example, the processor 40 may be embodied as one or more of various processing means such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an
accompanying DSP, or various other processing circuitry including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like. As such, in some embodiments, the processor 40 may include one or more processing cores configured to perform independently. A multi-core processor may enable multiprocessing within a single physical package. Additionally or alternatively, the processor 40 may include one or more processors configured in tandem via the bus to enable independent execution of instructions, pipelining and/or multithreading.
[0024] In an example embodiment, the processor 40 may be configured to execute instructions stored in the memory device 62 or otherwise accessible to the processor 40.
Alternatively or additionally, the processor 40 may be configured to execute hard coded functionality. As such, whether configured by hardware or software methods, or by a
combination thereof, the processor 40 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly. Thus, for example, when the processor 40 is embodied as an ASIC, FPGA or the like, the processor 40 may be specifically configured hardware for conducting the operations described herein. Alternatively, as another example, when the processor 40 is embodied as an executor of software instructions, the instructions may specifically configure the processor 40 to perform the algorithms and/or operations described herein when the instructions are executed. However, in some cases, the processor 40 may be a processor of a specific device (e.g., a mobile terminal or network device) adapted for employing embodiments of the present invention by further configuration of the processor 40 by instructions for performing the
algorithms and/or operations described herein. The processor 40 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 40.
[0025] At least some components of the mobile terminal 10 including the processor 40 and, in some embodiments, a memory device, such as volatile memory 60, may be embodied as a chip or chipset. In other words, processor 40 and optionally an associated memory device may comprise one or more physical packages (e.g., chips) including materials, components and/or wires on a structural assembly (e.g., a baseboard). The structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon. The processor 40 and optionally an associated memory device may therefore, in some cases, be configured to implement an embodiment of the present invention on a single chip or as a single "system on a chip." As such, in some cases, a chip or chipset may constitute means for performing one or more operations for providing the functionalities described herein.
[0026] The mobile terminal 10 may also comprise a user interface including an output device such as an earphone or speaker 44, a ringer 42, a microphone 46, a display 48, and a user input interface, which may be coupled to the processor 40. The mobile terminal 10 may further include sensor(s) 47 for detecting a stimulus such as a button for detecting a depression, a touch sensitive display for detecting a touch, or a motion sensor to detect motion. The user input interface, which allows the mobile terminal to receive data, may include any of a number of devices allowing the mobile terminal to receive data, such as a keypad 50, a touch sensitive display (not shown) or other input device. In embodiments including the keypad, the keypad may include numeric (0-9) and related keys (#, *), and other hard and soft keys used for operating the mobile terminal 10. Alternatively, the keypad may include a conventional QWERTY keypad arrangement. The keypad may also include various soft keys with associated functions. In addition, or alternatively, the mobile terminal may include an interface device such as a joystick or other user input interface. The mobile terminal may further include a battery 54, such as a vibrating battery pack, for powering various circuits that are used to operate the mobile terminal, as well as optionally providing mechanical vibration as a detectable output.
[0027] The mobile terminal 10 may further include a user identity module (UIM) 58, which may generically be referred to as a smart card. The U may be a memory device having a processor built in. The UIM may include, for example, a subscriber identity module (SIM), a
universal integrated circuit card (UICC), a universal subscriber identity module (USIM), a removable user identity module (R-UIM), or any other smart card. The UIM may store information elements related to a mobile subscriber. In addition to the UIM, the mobile terminal may be equipped with memory. For example, the mobile terminal may include volatile memory 60, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data. The mobile terminal may also include other non-volatile memory 62, which may be embedded and/or may be removable. The non-volatile memory may additionally or alternatively comprise an electrically erasable programmable read only memory (EEPROM), flash memory or the like. The memories may store any of a number of pieces of information, and data, used by the mobile terminal to implement the functions of the mobile terminal. For example, the memories may include an identifier, such as an international mobile equipment identification (ΓΜΕΙ) code, capable of uniquely identifying the mobile terminal. Furthermore, the memories may store instructions for determining cell id information. Specifically, the memories may store an application program for execution by the processor 40, which determines an identity of the current cell, e.g., cell id identity or cell id information, with which the mobile terminal is in communication. As the memories, and in particular a UIM 58 that may include a memory, may contain sensitive or personal information, the UIM 58 may be password protected to preclude an unauthorized user from using the mobile terminal 10.
[0028] Example embodiments of the present invention may provide a mechanism by which a password may be retrieved by or for a mobile terminal, such as mobile terminal 10. It should be appreciated that the term password is used to generically describe a variety of secure codes or patterns that may be used to gain access to a secured device or function. For example, passwords may include a Personal Identification Number (PIN), a PIN Unlocking Key (PUK), an alphanumeric password, a specific sequence of user inputs or motions, a pattern drawn on a touch screen, or any such code used to gain access to a secure device or function. Further, while embodiments are directed generally to password retrieval, a username or other user identifier may also be retrieved using embodiments of the present invention. Thus, the term "password" may generally refer to any such username or password.
[0029] Mobile terminals according to example embodiments of the present invention may include security features that preclude unauthorized users from gaining access to applications or functions of the mobile terminal. Applications which provide an authorized user access to
sensitive information may require a password to be entered in order to access the application. Applications such as email, a company intranet, or a file transfer program among many others may require a user to provide a password to access the application. Further, access to any or all functions of a mobile terminal may be piOtected with a password such that the mobile terminal requires the entry of a password prior in order to transition from a locked state to an unlocked state. In the locked state, the mobile terminal may not allow a user to perform any functions other than enter the password (or functions associated with obtaining a password as outlined below) while in the unlocked state, the mobile terminal may allow access to all available functions.
[0030] Optionally, a mobile terminal may have limited functionality available while in the locked state. The functionality provided while in the locked state may be limited, particularly to functions which do not provide or convey sensitive information or access to features which may charge a fee for use. Such functionality may include a music player function which allows a user to play, pause, fast-forward or rewind music tracks while the mobile terminal is in the locked state. Additional functions available in the locked state may include a game for a child such that the child doesn't inadvertently perform unintended functions of the mobile terminal Other functions may be provided as configured by a user of the mobile terminal or by the settings of the mobile terminal.
[0031] People are often tasked with remembering multiple usemames and passwords for various accounts and memberships, such as online banking, email, online shopping, etc. As each of these passwords may have different requirements (such as the inclusion of numbers, password length, both upper and lower-case letters, etc.), a user may have difficulty remembering all of their passwords. As such, it may be desirable for a user to be able to retrieve their passwords (and possibly usernames) easily.
[0032] Typically, when a user is accessing a website that requires a username and password for access, the user may be offered options for when they cannot remember their password or username. In such cases, a reminder of the password may be set to an email address. However, when a user is on a mobile terminal and cannot remember their password to transition the mobile terminal from the locked state to the unlocked state, the mobile terminal may not allow access to an email program and therefore may not provide any options for retrieval of the password.
[0033] Example embodiments of the present invention provide a mechanism by which a user may retrieve their password that is required to cause a mobile terminal to transition from a locked state to an unlocked state. FIG. 3 illustrates a mobile terminal 300 including a display 310. The display may clearly show a user that it is in the locked state with an indicator 320 which may be text, a symbol, or the like. Optionally, a mobile terminal may not illustrate that it is in the locked state, but merely preclude a user from performing any functions available in the unlocked state, thereby implying the locked state. The illustrated embodiment further includes a dialog box 330 for entry of a password via keypad 340. As noted above, the password may be a text or alphanumeric password, but may also be a symbol or pattern drawn on the display 310 by a user. Optionally, the password may be a motion or series of motions of the mobile terminal itself as registered by a sensor (such as sensor 47 of mobile terminal 10) which may be an accelerometer. However, for illustration, embodiments of the present invention will be described with an alphanumeric password.
[0034] FIG. 4 illustrates the example embodiment illustrated in FIG. 3; however, an additional option is displayed below the keypad 340 offering an option to "retrieve password" 350. This additional option may be presented before the user attempts to enter the password for the first time, or the option 350 may be configured to appear only after a user has incorrectly entered the password a predefined number of times. The "retrieve password" option may be configured to enable the mobile terminal 300 to transmit a password request message via a network, such as network 30 of FIG. 1, to request a password message in the form of a password or a password hint via a preconfigured device or mechanism. The preconfigured device or mechanism may include sending a text message to another mobile terminal which the user has previously identified or associated with the user's account, sending an email to an email account that the user has previously identified or associated with the user's account, or placing a call to a user.
[0035] While the password message containing the password sent via email or text message may be retrieved via another mobile terminal or device as previously configured by the user, a password message containing a password hint may be sent to the mobile terminal that the user is attempting to unlock and the password hint may be presented on the display of mobile terminal. A phone call regarding the password may be made by a live person or by an automated system to a phone which the user has previously considered or the call may be made to the mobile terminal
that the user wishes to unlock. The mobile terminal may be configured to receive a call from a service provider of the mobile terminal while in the locked state and the call may be answered without requiring a user to unlock the mobile terminal. The user may;converse with a live person from the service provider or with an automated service of the service provider to retrieve the password of the mobile terminal in a secure manner, thus ensuring that the user is authenticated before providing the user with the password. In such an embodiment, the user may not require access to another mobile terminal, phone, or device in order to retrieve a password to unlock the device.
[0036] FIG. 5 depicts an example embodiment in which a user may be offered options with regard to the retrieval of a password. In the embodiment of FIG. 5, the option menu 520 may be presented in response to an input received at the "retrieve password?" 520 text of FIG. 4. The option menu 520 may also be presented in response to receiving one or more incorrect password attempts. The option menu may include an option to "Send SMS to Kerry's Cell" at 530 directing the password to be sent via a short message service text message to another mobile terminal, in the instant embodiment, Kerry's cell phone. Another option may include "Voice Call to Kerry's Cell" 540 where a voice call may be made by the user's service provider via a live person or an automated service to Kerry's cell phone to provide the password or a hint to the password. An option to "Send Hint to My Device" 550 may send an SMS text message to the user's locked device providing the user with a hint as to the password. The hint maybe user configurable and may remind the user of what their password is. Another option for a "Voice Call to My Device" 560 may direct a phone call to be made to the device by the user's service provider either by a live person or an automated system. The phone call may be configured to provide the user with a hint as to the password of the mobile terminal 500 or may be configured to authenticate a user through a series of questions before providing the user with the password. An option to "Send e-mail to Address 1" 570 may be configured to send the password or a hint regarding the password to a preconfigured email address. In the instant embodiment, the email address has a nickname of "Address 1." A further option may be provided to return to the password entry screen 580 where the user may again attempt to enter the password.
[0037] An example embodiment of a mechanism for performing an example embodiment of the present invention is presented in the flowchart of FIG. 6. It will -be understood that each block of the flowchart, and combinations of blocks in the flowchart, may be implemented by
various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions. For example, one or more of the procedures described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus. As will be appreciated, any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the flowchart block(s). These computer program instructions may also be stored in a computer- readable memory that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the flowchart block(s). The computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the flowchart block(s).
[0038] Accordingly, blocks of the flowchart support combinations of means for performing the specified functions, and combinations of operations for performing the specified functions. It will also be understood that one or more blocks of the flowchart, and combinations of blocks in the flowcharts, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
[0039] In an example embodiment, an apparatus for performing the methods of FIG. 6, described further below, may comprise a processor (e.g., the processor 40) configured to perform some or each of the operations (600-650) described below. The processor may, for example, be configured to perform the operations (600-650) by performing hardware implemented logical functions, executing stored instructions, or executing algorithms for performing each of the operations. Alternatively, the apparatus may comprise means for performing each of the operations described above. In this regard, according to an example embodiment, examples of
means for performing operations 600-650 may comprise, for example, the processor 40 and/or a device or circuit for executing instructions or executing an algorithm for processing information as described further below.
[0040] FIG. 6 depicts an example embodiment of the present invention showing a flowchart of operations that may be performed on a device (e.g., mobile terminal 10) where the operations may be performed by a processor (e.g. processor 40). A device may operate in a locked state at 600. The device may require a password to be entered to transition from the locked state to an unlocked state at 610. A password request message may be transmitted at 620 requesting assistance with determining the password.
[0041] Additional operations may be performed independently or in cooperation with the operations 600-620. The optional operations, depicted in broken lines in FIG. 6, may include receiving a selection of a mechanism for receipt of a password message at 630. The device may receive a password message in response to providing for transmission of a password request message. The password message may also be received by a number of other devices as presented in the options for selection of a mechanism for receiving the password message. A password message containing the password may be received via the selected mechanism at 640. Optionally, a password message containing a password hint may be received at the device at 650.
[0042] As described above and as will be appreciated by one skilled in the art, embodiments of the present invention may be configured as a system, method or electronic device.
Accordingly, embodiments of the present invention may be comprised of various means including entirely of hardware or any combination of software and hardware. Furthermore, embodiments of the present invention may take the form of a computer program product on a computer-readable storage medium having computer-readable program instructions (e.g., computer software) embodied in the tangible, non-transitory storage medium. Any suitable computer-readable storage medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.
[0043] Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the
appended claims. Moreover, although the foregoing descriptions and 'associated drawings describe example embodiments in the context of certain example combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the spirit and scope of the appended claims. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Claims
1. A method comprising:
providing for operation of a device in a locked state;
requiring a password to be entered to transition from the locked state to an unlocked state; and
providing for transmission of a password request message from the device while the device is in the locked state.
2. A method according to claim 1, further comprising receiving a selection of a mechanism for receipt of a password message.
3. A method according to claim 2, wherein the mechanism is selected from the group consisting of: a phone call, an email message, and a text message.
4. A method according to claim 3, wherein the phone call, email message, and text message may be received on a second device previously specified for receipt of a password message.
5. A method according to claim 1 , further comprising receiving a password message comprising a password hint in response to providing for transmission of a password request message.
6. A method according to claim 5, wherein the password message is received at the device and wherein the password message is retrievable by a user when the device is in the locked state.
7. A method according to claim 1, further comprising receiving a password hint message and providing for display of the password hint message in response to providing for transmission of a password request message.
8. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to:
provide for operation of the apparatus in a locked state;
require a password to be entered to transition from the locked state to an unlocked state; and
provide for transmission of a password request message from the apparatus while the apparatus is in the locked state.
9. An apparatus according to claim 8, the apparatus further caused to receive a selection of a mechanism for receipt of a password message.
10. An apparatus according to claim 9, wherein the mechanism is selected from the group consisting of: a phone call, an email message, and a text message.
11. An apparatus according to claim 10, wherein the phone call, email message, and text message may be received on a second apparatus previously specified for receipt of a password message.
12. An apparatus according to claim 8, the apparatus further caused to receive a password message comprising a password hint in response to providing for transmission of a password request message,
13. An apparatus according to claim 12, wherein the password message is received at the apparatus and wherein the password message is retrievable by a user when the apparatus is in the locked state.
14. An apparatus according to claim 8, the apparatus further configured to receive a password hint message and provide for display of the password hint message in response to providing for transmission of a password request message.
15. A computer program product comprising at least one computer-readable storage medium having computer-executable program code instructions stored therein, the computer- executable program code instructions comprising:
program code instructions for providing for operation of a device in a locked state;
program code instructions for requiring a password to be entered to transition from the locked state to an unlocked state; and
program code instructions for providing for transmission of a password request message from the device while the device is in the locked state.
16. A computer program product according to claim 15, further comprising program code instructions for receiving a selection of a mechanism for receipt of a password message.
17. A computer program product according to claim 16, wherein the mechanism is selected from the group consisting of: a phone call, an email message, and a text message.
18. A computer program product according to claim 17, wherein the phone call, email message, and text message may be received on a second device previously specified for receipt of a password message.
19. A computer program product according to claim 15, further comprising program code instructions for receiving a password message comprising a password hint in response to providing for transmission of a password request message.
20. A computer program product according to claim 19,'wherein the password message is received on the device and wherein the password hint message is retrievable when the device is in the locked state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2011/076656 WO2013000150A1 (en) | 2011-06-30 | 2011-06-30 | Method, apparatus and computer program product for retrieval of lost or forgotten passwords |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2011/076656 WO2013000150A1 (en) | 2011-06-30 | 2011-06-30 | Method, apparatus and computer program product for retrieval of lost or forgotten passwords |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2013000150A1 true WO2013000150A1 (en) | 2013-01-03 |
Family
ID=47423390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2011/076656 WO2013000150A1 (en) | 2011-06-30 | 2011-06-30 | Method, apparatus and computer program product for retrieval of lost or forgotten passwords |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2013000150A1 (en) |
Cited By (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016003066A1 (en) * | 2014-07-02 | 2016-01-07 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
EP3026593A1 (en) * | 2014-11-26 | 2016-06-01 | Kyocera Document Solutions Inc. | Authentication apparatus that assists input of user id and password, authentication method, and recording medium |
WO2017200846A1 (en) * | 2016-05-19 | 2017-11-23 | Apple Inc. | User interface for a device requesting remote authorization |
US9842330B1 (en) | 2016-09-06 | 2017-12-12 | Apple Inc. | User interfaces for stored-value accounts |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US10178234B2 (en) | 2014-05-30 | 2019-01-08 | Apple, Inc. | User interface for phone call routing among devices |
EP3457308A4 (en) * | 2016-06-07 | 2019-05-08 | Huawei Technologies Co., Ltd. | Method for improving information security and terminal |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10776500B2 (en) | 2018-08-22 | 2020-09-15 | International Business Machines Corporation | Autonomous hint generator |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US10992795B2 (en) | 2017-05-16 | 2021-04-27 | Apple Inc. | Methods and interfaces for home media control |
US10996917B2 (en) | 2019-05-31 | 2021-05-04 | Apple Inc. | User interfaces for audio media control |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US11126704B2 (en) | 2014-08-15 | 2021-09-21 | Apple Inc. | Authenticated device used to unlock another device |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11283916B2 (en) | 2017-05-16 | 2022-03-22 | Apple Inc. | Methods and interfaces for configuring a device in accordance with an audio tone signal |
US11392291B2 (en) | 2020-09-25 | 2022-07-19 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US11431836B2 (en) | 2017-05-02 | 2022-08-30 | Apple Inc. | Methods and interfaces for initiating media playback |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US11539831B2 (en) | 2013-03-15 | 2022-12-27 | Apple Inc. | Providing remote interactions with host device using a wireless device |
US11620103B2 (en) | 2019-05-31 | 2023-04-04 | Apple Inc. | User interfaces for audio media control |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US11683408B2 (en) | 2017-05-16 | 2023-06-20 | Apple Inc. | Methods and interfaces for home media control |
US11784956B2 (en) | 2021-09-20 | 2023-10-10 | Apple Inc. | Requests to add assets to an asset account |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
US11907013B2 (en) | 2014-05-30 | 2024-02-20 | Apple Inc. | Continuity of applications across devices |
US12002042B2 (en) | 2016-06-11 | 2024-06-04 | Apple, Inc | User interface for transactions |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6360322B1 (en) * | 1998-09-28 | 2002-03-19 | Symantec Corporation | Automatic recovery of forgotten passwords |
WO2003096605A1 (en) * | 2002-05-06 | 2003-11-20 | Thomson Licensing S.A. | Hand-held device forgotten password notification |
CN101860813A (en) * | 2009-04-08 | 2010-10-13 | 北京闻言科技有限公司 | Method for retrieving password by server push technology |
CN102096546A (en) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | Unlocking method and device of operating system |
-
2011
- 2011-06-30 WO PCT/CN2011/076656 patent/WO2013000150A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6360322B1 (en) * | 1998-09-28 | 2002-03-19 | Symantec Corporation | Automatic recovery of forgotten passwords |
WO2003096605A1 (en) * | 2002-05-06 | 2003-11-20 | Thomson Licensing S.A. | Hand-held device forgotten password notification |
CN101860813A (en) * | 2009-04-08 | 2010-10-13 | 北京闻言科技有限公司 | Method for retrieving password by server push technology |
CN102096546A (en) * | 2010-12-29 | 2011-06-15 | 华为终端有限公司 | Unlocking method and device of operating system |
Cited By (88)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11468155B2 (en) | 2007-09-24 | 2022-10-11 | Apple Inc. | Embedded authentication systems in an electronic device |
US10956550B2 (en) | 2007-09-24 | 2021-03-23 | Apple Inc. | Embedded authentication systems in an electronic device |
US11676373B2 (en) | 2008-01-03 | 2023-06-13 | Apple Inc. | Personal computing device control using face detection and recognition |
US11755712B2 (en) | 2011-09-29 | 2023-09-12 | Apple Inc. | Authentication with secondary approver |
US10516997B2 (en) | 2011-09-29 | 2019-12-24 | Apple Inc. | Authentication with secondary approver |
US11200309B2 (en) | 2011-09-29 | 2021-12-14 | Apple Inc. | Authentication with secondary approver |
US10484384B2 (en) | 2011-09-29 | 2019-11-19 | Apple Inc. | Indirect authentication |
US10419933B2 (en) | 2011-09-29 | 2019-09-17 | Apple Inc. | Authentication with secondary approver |
US10142835B2 (en) | 2011-09-29 | 2018-11-27 | Apple Inc. | Authentication with secondary approver |
US11539831B2 (en) | 2013-03-15 | 2022-12-27 | Apple Inc. | Providing remote interactions with host device using a wireless device |
US9898642B2 (en) | 2013-09-09 | 2018-02-20 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10410035B2 (en) | 2013-09-09 | 2019-09-10 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10803281B2 (en) | 2013-09-09 | 2020-10-13 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10055634B2 (en) | 2013-09-09 | 2018-08-21 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US10372963B2 (en) | 2013-09-09 | 2019-08-06 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs |
US11287942B2 (en) | 2013-09-09 | 2022-03-29 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces |
US11768575B2 (en) | 2013-09-09 | 2023-09-26 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10262182B2 (en) | 2013-09-09 | 2019-04-16 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US11494046B2 (en) | 2013-09-09 | 2022-11-08 | Apple Inc. | Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs |
US10438205B2 (en) | 2014-05-29 | 2019-10-08 | Apple Inc. | User interface for payments |
US10748153B2 (en) | 2014-05-29 | 2020-08-18 | Apple Inc. | User interface for payments |
US11836725B2 (en) | 2014-05-29 | 2023-12-05 | Apple Inc. | User interface for payments |
US10902424B2 (en) | 2014-05-29 | 2021-01-26 | Apple Inc. | User interface for payments |
US10977651B2 (en) | 2014-05-29 | 2021-04-13 | Apple Inc. | User interface for payments |
US10796309B2 (en) | 2014-05-29 | 2020-10-06 | Apple Inc. | User interface for payments |
US10616416B2 (en) | 2014-05-30 | 2020-04-07 | Apple Inc. | User interface for phone call routing among devices |
US11907013B2 (en) | 2014-05-30 | 2024-02-20 | Apple Inc. | Continuity of applications across devices |
US10178234B2 (en) | 2014-05-30 | 2019-01-08 | Apple, Inc. | User interface for phone call routing among devices |
WO2016003066A1 (en) * | 2014-07-02 | 2016-01-07 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
US9402183B2 (en) | 2014-07-02 | 2016-07-26 | Lg Electronics Inc. | Mobile terminal and method for controlling the same |
US11126704B2 (en) | 2014-08-15 | 2021-09-21 | Apple Inc. | Authenticated device used to unlock another device |
EP3026593A1 (en) * | 2014-11-26 | 2016-06-01 | Kyocera Document Solutions Inc. | Authentication apparatus that assists input of user id and password, authentication method, and recording medium |
US9847999B2 (en) | 2016-05-19 | 2017-12-19 | Apple Inc. | User interface for a device requesting remote authorization |
US11206309B2 (en) | 2016-05-19 | 2021-12-21 | Apple Inc. | User interface for remote authorization |
WO2017200846A1 (en) * | 2016-05-19 | 2017-11-23 | Apple Inc. | User interface for a device requesting remote authorization |
US10334054B2 (en) | 2016-05-19 | 2019-06-25 | Apple Inc. | User interface for a device requesting remote authorization |
EP3467695A1 (en) * | 2016-05-19 | 2019-04-10 | Apple Inc. | User interface for a device requesting remote authorization |
US10749967B2 (en) | 2016-05-19 | 2020-08-18 | Apple Inc. | User interface for remote authorization |
EP3457308A4 (en) * | 2016-06-07 | 2019-05-08 | Huawei Technologies Co., Ltd. | Method for improving information security and terminal |
US10831881B2 (en) | 2016-06-07 | 2020-11-10 | Huawei Technologies Co., Ltd. | Method and terminal for enhancing information security |
US11481769B2 (en) | 2016-06-11 | 2022-10-25 | Apple Inc. | User interface for transactions |
US12002042B2 (en) | 2016-06-11 | 2024-06-04 | Apple, Inc | User interface for transactions |
US11037150B2 (en) | 2016-06-12 | 2021-06-15 | Apple Inc. | User interfaces for transactions |
US11900372B2 (en) | 2016-06-12 | 2024-02-13 | Apple Inc. | User interfaces for transactions |
US11074572B2 (en) | 2016-09-06 | 2021-07-27 | Apple Inc. | User interfaces for stored-value accounts |
US9842330B1 (en) | 2016-09-06 | 2017-12-12 | Apple Inc. | User interfaces for stored-value accounts |
US12079458B2 (en) | 2016-09-23 | 2024-09-03 | Apple Inc. | Image data for enhanced user interactions |
US11574041B2 (en) | 2016-10-25 | 2023-02-07 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11995171B2 (en) | 2016-10-25 | 2024-05-28 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US10496808B2 (en) | 2016-10-25 | 2019-12-03 | Apple Inc. | User interface for managing access to credentials for use in an operation |
US11431836B2 (en) | 2017-05-02 | 2022-08-30 | Apple Inc. | Methods and interfaces for initiating media playback |
US11750734B2 (en) | 2017-05-16 | 2023-09-05 | Apple Inc. | Methods for initiating output of at least a component of a signal representative of media currently being played back by another device |
US11095766B2 (en) | 2017-05-16 | 2021-08-17 | Apple Inc. | Methods and interfaces for adjusting an audible signal based on a spatial position of a voice command source |
US10992795B2 (en) | 2017-05-16 | 2021-04-27 | Apple Inc. | Methods and interfaces for home media control |
US11412081B2 (en) | 2017-05-16 | 2022-08-09 | Apple Inc. | Methods and interfaces for configuring an electronic device to initiate playback of media |
US12107985B2 (en) | 2017-05-16 | 2024-10-01 | Apple Inc. | Methods and interfaces for home media control |
US11283916B2 (en) | 2017-05-16 | 2022-03-22 | Apple Inc. | Methods and interfaces for configuring a device in accordance with an audio tone signal |
US11201961B2 (en) | 2017-05-16 | 2021-12-14 | Apple Inc. | Methods and interfaces for adjusting the volume of media |
US11683408B2 (en) | 2017-05-16 | 2023-06-20 | Apple Inc. | Methods and interfaces for home media control |
US10410076B2 (en) | 2017-09-09 | 2019-09-10 | Apple Inc. | Implementation of biometric authentication |
US10395128B2 (en) | 2017-09-09 | 2019-08-27 | Apple Inc. | Implementation of biometric authentication |
US10521579B2 (en) | 2017-09-09 | 2019-12-31 | Apple Inc. | Implementation of biometric authentication |
US10783227B2 (en) | 2017-09-09 | 2020-09-22 | Apple Inc. | Implementation of biometric authentication |
US10872256B2 (en) | 2017-09-09 | 2020-12-22 | Apple Inc. | Implementation of biometric authentication |
US11765163B2 (en) | 2017-09-09 | 2023-09-19 | Apple Inc. | Implementation of biometric authentication |
US11386189B2 (en) | 2017-09-09 | 2022-07-12 | Apple Inc. | Implementation of biometric authentication |
US11393258B2 (en) | 2017-09-09 | 2022-07-19 | Apple Inc. | Implementation of biometric authentication |
US11170085B2 (en) | 2018-06-03 | 2021-11-09 | Apple Inc. | Implementation of biometric authentication |
US11928200B2 (en) | 2018-06-03 | 2024-03-12 | Apple Inc. | Implementation of biometric authentication |
US10776500B2 (en) | 2018-08-22 | 2020-09-15 | International Business Machines Corporation | Autonomous hint generator |
US11100349B2 (en) | 2018-09-28 | 2021-08-24 | Apple Inc. | Audio assisted enrollment |
US12105874B2 (en) | 2018-09-28 | 2024-10-01 | Apple Inc. | Device control using gaze information |
US11619991B2 (en) | 2018-09-28 | 2023-04-04 | Apple Inc. | Device control using gaze information |
US12124770B2 (en) | 2018-09-28 | 2024-10-22 | Apple Inc. | Audio assisted enrollment |
US11809784B2 (en) | 2018-09-28 | 2023-11-07 | Apple Inc. | Audio assisted enrollment |
US10860096B2 (en) | 2018-09-28 | 2020-12-08 | Apple Inc. | Device control using gaze information |
US11620103B2 (en) | 2019-05-31 | 2023-04-04 | Apple Inc. | User interfaces for audio media control |
US11853646B2 (en) | 2019-05-31 | 2023-12-26 | Apple Inc. | User interfaces for audio media control |
US11755273B2 (en) | 2019-05-31 | 2023-09-12 | Apple Inc. | User interfaces for audio media control |
US10996917B2 (en) | 2019-05-31 | 2021-05-04 | Apple Inc. | User interfaces for audio media control |
US11010121B2 (en) | 2019-05-31 | 2021-05-18 | Apple Inc. | User interfaces for audio media control |
US11816194B2 (en) | 2020-06-21 | 2023-11-14 | Apple Inc. | User interfaces for managing secure operations |
US11782598B2 (en) | 2020-09-25 | 2023-10-10 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US12112037B2 (en) | 2020-09-25 | 2024-10-08 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US11392291B2 (en) | 2020-09-25 | 2022-07-19 | Apple Inc. | Methods and interfaces for media control with dynamic feedback |
US12099586B2 (en) | 2021-01-25 | 2024-09-24 | Apple Inc. | Implementation of biometric authentication |
US11847378B2 (en) | 2021-06-06 | 2023-12-19 | Apple Inc. | User interfaces for audio routing |
US11784956B2 (en) | 2021-09-20 | 2023-10-10 | Apple Inc. | Requests to add assets to an asset account |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2013000150A1 (en) | Method, apparatus and computer program product for retrieval of lost or forgotten passwords | |
US11263303B1 (en) | Pattern-based mobile device unlocking | |
US11184359B2 (en) | Automated access control policy generation for computer resources | |
RU2618932C2 (en) | Method, installation and device of unblocking process for terminal | |
US11269981B2 (en) | Information displaying method for terminal device and terminal device | |
CN107079031B (en) | User authentication-based approval of a first device via communication with a second device | |
US8625847B2 (en) | Login method based on direction of gaze | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN103079000B (en) | Method and device for terminal unlocking | |
EP2503479B1 (en) | Login method based on direction of gaze | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN103745144A (en) | Terminal and terminal unlocking method | |
EP3166292B1 (en) | Partial enabling of functions in a mobile terminal | |
EP3178029B1 (en) | Mobile device, method for displaying screen thereof, wearable device, method for driving the same, and computer-readable recording medium | |
US9940448B2 (en) | Unlock processing method and device | |
US11562051B2 (en) | Varying computing device behavior for different authenticators | |
EP2927834A1 (en) | Information processing apparatus, information processing method, and recording medium | |
JP2012083829A (en) | Portable terminal, authentication method and program | |
CN103279272B (en) | A kind of method and device starting application program in an electronic | |
CN104104656B (en) | Give the method and device of account number for change | |
CN106534324A (en) | Data sharing method and cloud server | |
CN107479886A (en) | A kind of method for information display and mobile terminal | |
CN110084009B (en) | Digital unlocking method and device, storage medium and mobile terminal | |
JP6201835B2 (en) | Information processing apparatus, information processing method, and computer program | |
CN108573141B (en) | Information access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11868583 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 11868583 Country of ref document: EP Kind code of ref document: A1 |