Nothing Special   »   [go: up one dir, main page]

WO2013000150A1 - Method, apparatus and computer program product for retrieval of lost or forgotten passwords - Google Patents

Method, apparatus and computer program product for retrieval of lost or forgotten passwords Download PDF

Info

Publication number
WO2013000150A1
WO2013000150A1 PCT/CN2011/076656 CN2011076656W WO2013000150A1 WO 2013000150 A1 WO2013000150 A1 WO 2013000150A1 CN 2011076656 W CN2011076656 W CN 2011076656W WO 2013000150 A1 WO2013000150 A1 WO 2013000150A1
Authority
WO
WIPO (PCT)
Prior art keywords
password
message
locked state
mobile terminal
providing
Prior art date
Application number
PCT/CN2011/076656
Other languages
French (fr)
Inventor
Diego BALDINI
Original Assignee
Nokia Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Corporation filed Critical Nokia Corporation
Priority to PCT/CN2011/076656 priority Critical patent/WO2013000150A1/en
Publication of WO2013000150A1 publication Critical patent/WO2013000150A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • H04M1/673Preventing unauthorised calls from a telephone set by electronic means the user being required to key in a code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Definitions

  • Example embodiments of the present invention relate generally to the retrieval of lost or forgotten passwords, and more particularly, to a method of retrieving a password of a mobile device.
  • Mobile devices such as cellular telephones, have become smaller and lighter while also becoming more capable of performing tasks that far exceed a traditional voice call.
  • Mobile devices may be capable of sending and receiving email, accessing personal accounts, accessing secure networks, or other functions that may benefit from security features such as requiring a password.
  • mobile devices themselves may be secured with a password preventing the use of any function of the mobile device without first entering the password.
  • One drawback to securing a device with a password is that a user must remember the password in order to access the mobile device or the individual functions that are secured. A mechanism for the retrieval of a password may therefore be desirable.
  • an example embodiment of the present invention provides an improved method retrieving a forgotten or lost password for a mobile terminal.
  • the method of example embodiments includes providing for operation of a device in a locked state, requiring a password to be entered to transition from the locked state to an unlocked state, and providing for transmission of a password request message from the device while the device is in the locked state.
  • the method may further include receiving a selection of a mechanism for receipt of a password message.
  • the mechanism may be a phone call, an email message, or a text message.
  • the phone call, email message, or text message may be received on a second device that was previously configured to receive the password message.
  • the method may also include receiving a password message that includes a password hint in response to providing for transmission of a password request message.
  • the password message containing the password hint may be received on the device and the password message may be retrievable by a user when the device is in the locked state.
  • the method may optionally include receiving a password hint message and providing for display of the password hint message in response to providing for transmission of a password request message.
  • an apparatus may include at least one processor and at least one memory including computer program code.
  • the at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to provide for operation of the apparatus in a locked state, require a password to be entered to transition from the locked state to an unlocked state, and provide for transmission of a password request message from the apparatus while the apparatus is in the locked state.
  • the apparatus may further be caused to receive a selection of a mechanism for receipt of a password message.
  • the mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message.
  • the apparatus may also be caused to receive a password message including a password hint in response to providing for transmission of a password request message.
  • the password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state.
  • the apparatus may also be configured to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
  • a further embodiment of the invention may include a computer program product including at least one computer-readable storage medium having computer-executable program code instructions stored therein.
  • the computer executable program code instructions may include program code instructions for providing for operation of a device in a locked state, program code instructions for requiring a password to be entered to transition from the locked state to an unlocked state, and program code instructions for providing for transmission of a password request message from the device while the device is in the locked state.
  • the computer program product may further include program code instructions for receiving a selection of a mechanism for receipt of a password message.
  • the mechanism may be a phone call, an email message, or a text message.
  • the phone call, email message, and text message may be received on a second device previously configured for receipt of a password message.
  • the computer program product may further include program code instructions for receiving a password message including a password hint in response to providing for transmission of a password request message.
  • the password message may be received on a device and the password hint message may be retrievable when the device is
  • an apparatus may include means to provide for operation of the apparatus in a locked state, means to require a password to be entered to transition from the locked state to an unlocked state, and means to provide for transmission of a password request message from the apparatus while the apparatus is in the locked state.
  • the apparatus may include means to receive a selection of a mechanism for receipt of a password message.
  • the mechanism may be a phone call, an email message, or a text message.
  • the phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message.
  • the apparatus may also include means to receive a password message including a password hint in response to providing for transmission of a password request message.
  • the password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state.
  • the apparatus may also include means to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
  • FIG. 1 illustrates an communication system in accordance with an example embodiment of the present invention
  • FIG. 2 is a schematic block diagram of a mobile device according to an example embodiment of the present invention
  • FIG. 3 is an illustration of a mobile terminal in a locked state according to an example embodiment of the present invention.
  • FIG. 4 is an illustration of a mobile terminal in a locked state and providing a
  • FIG. 5 is an illustration of a mobile terminal in a locked state and providing options for password retrieval according to an example embodiment of the present invention.
  • FIG. 6 is a flow chart of a method of retrieving a password according to an example embodiment of the present invention.
  • circuitry refers to (a) hardware-only circuit implementations (e.g., implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present.
  • This definition of 'circuitry' applies to all uses of this term herein, including in any claims.
  • the term 'circuitry' also includes an implementation comprising one or more processors and/or portion(s) thereof and accompanying software and/or firmware.
  • the term 'circuitry' as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
  • a session may be supported by a network 30 as shown in FIG. 1 that may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces or in ad-hoc networks such as those functioning over Bluetooth® interfaces.
  • FIG. 1 should be understood to be an example of a broad view of certain elements of a system that may incorporate example embodiments of the present invention and not an all inclusive or detailed view of the system or the network 30.
  • the network 30 may be capable of supporting communication in accordance with any one or more of a number of first- generation (1G), second-generation (2.G), 2.5G, third-generation (3G), 3.5G, 3.9G, fourth- generation (4G) mobile communication protocols and/or the like.
  • One or more communication terminals may be in communication with each other via the network 30 and each may include an antenna or antennas for transmitting signals to and for receiving signals from a base site, which could be, for example a base station that is part of one or more cellular or mobile networks or an access point that may be coupled to a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet.
  • LAN local area network
  • MAN metropolitan area network
  • WAN wide area network
  • other devices e.g., personal computers, server computers or the like
  • the mobile terminal 10 and the second mobile terminal 20 may be enabled to communicate with the other devices or each other, for example, according to numerous communication protocols including Hypertext Transfer Protocol (HTTP) and/or the like, to thereby carry out various communication or other functions of the mobile terminal 10 and the second mobile terminal 20, respectively.
  • HTTP Hypertext Transfer Protocol
  • either of the mobile terminals may be mobile or fixed communication devices.
  • the mobile terminal 10 and the second mobile terminal 20 could be, or be substituted by, any of personal computers (PCs), personal digital assistants (PDAs), wireless telephones, desktop computer, laptop computer, mobile computers, cameras, video recorders, audio/video players, positioning devices, game devices, television devices, radio devices, or various other devices or combinations thereof.
  • PCs personal computers
  • PDAs personal digital assistants
  • wireless telephones desktop computer
  • laptop computer mobile computers
  • mobile computers cameras, video recorders, audio/video players, positioning devices, game devices, television devices, radio devices, or various other devices or combinations thereof.
  • the mobile terminal 10 may be configured in various manners, one example of a mobile terminal that could benefit from an example embodiment of the invention is depicted in the block diagram of Figure 2. While several embodiments of the mobile terminal may be illustrated and hereinafter described for purposes of example, other types of mobile terminals, such as portable digital assistants (PDAs), pagers, mobile televisions, gaming devices, all types of computers (e.g., laptops or mobile computers), cameras, audio/video players, radios, global positioning system (GPS) devices, or any combination of the aforementioned, and other types of communication devices, may employ an example embodiment of the present invention.
  • PDAs portable digital assistants
  • pagers mobile televisions
  • gaming devices e.g., gaming devices
  • computers e.g., laptops or mobile computers
  • GPS global positioning system
  • the mobile terminal may include various means for performing one or more functions in accordance with an example embodiment of the present invention, including those more particularly shown and described herein. It should be understood, however, that a mobile terminal may include alternative means for performing one or more like functions, without departing from the spirit and scope of the present invention.
  • the mobile terminal 10 illustrated in FIG. 2 may include an antenna 32 (or multiple antennas) in operable communication with a transmitter 34 and a receiver 36.
  • the mobile terminal may further include an apparatus, such as a processor 40, that provides signals to and receives signals from the transmitter and receiver, respectively.
  • the signals may include signaling information in accordance with the air interface standard of the applicable cellular system, and/or may also include data corresponding to user speech, received data and/or user generated data.
  • the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, and access types.
  • the mobile terminal may be capable of operating in accordance with any of a number of first, second, third and/or fourth-generation communication protocols or the like.
  • the mobile terminal may be capable of operating in accordance with second-generation (2G) wireless communication protocols IS-136, GSM (Global System for Mobile communications) and IS-95, or with third-generation (3G) wireless communication protocols, such as UMTS
  • the apparatus such as the processor 40
  • the processor 40 may be embodied in a number of different ways.
  • the processor 40 may be embodied as one or more of various processing means such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an
  • the processor 40 may include one or more processing cores configured to perform independently.
  • a multi-core processor may enable multiprocessing within a single physical package.
  • the processor 40 may include one or more processors configured in tandem via the bus to enable independent execution of instructions, pipelining and/or multithreading.
  • the processor 40 may be configured to execute instructions stored in the memory device 62 or otherwise accessible to the processor 40.
  • the processor 40 may be configured to execute hard coded functionality. As such, whether configured by hardware or software methods, or by a
  • the processor 40 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly.
  • the processor 40 when the processor 40 is embodied as an ASIC, FPGA or the like, the processor 40 may be specifically configured hardware for conducting the operations described herein.
  • the processor 40 when the processor 40 is embodied as an executor of software instructions, the instructions may specifically configure the processor 40 to perform the algorithms and/or operations described herein when the instructions are executed.
  • the processor 40 may be a processor of a specific device (e.g., a mobile terminal or network device) adapted for employing embodiments of the present invention by further configuration of the processor 40 by instructions for performing the algorithms and/or operations described herein.
  • the processor 40 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 40.
  • ALU arithmetic logic unit
  • processor 40 and, in some embodiments, a memory device such as volatile memory 60
  • a memory device such as volatile memory 60
  • processor 40 and optionally an associated memory device may comprise one or more physical packages (e.g., chips) including materials, components and/or wires on a structural assembly (e.g., a baseboard).
  • the structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon.
  • the processor 40 and optionally an associated memory device may therefore, in some cases, be configured to implement an embodiment of the present invention on a single chip or as a single "system on a chip.”
  • a chip or chipset may constitute means for performing one or more operations for providing the functionalities described herein.
  • the mobile terminal 10 may also comprise a user interface including an output device such as an earphone or speaker 44, a ringer 42, a microphone 46, a display 48, and a user input interface, which may be coupled to the processor 40.
  • the mobile terminal 10 may further include sensor(s) 47 for detecting a stimulus such as a button for detecting a depression, a touch sensitive display for detecting a touch, or a motion sensor to detect motion.
  • the user input interface which allows the mobile terminal to receive data, may include any of a number of devices allowing the mobile terminal to receive data, such as a keypad 50, a touch sensitive display (not shown) or other input device.
  • the keypad may include numeric (0-9) and related keys (#, *), and other hard and soft keys used for operating the mobile terminal 10.
  • the keypad may include a conventional QWERTY keypad arrangement.
  • the keypad may also include various soft keys with associated functions.
  • the mobile terminal may include an interface device such as a joystick or other user input interface.
  • the mobile terminal may further include a battery 54, such as a vibrating battery pack, for powering various circuits that are used to operate the mobile terminal, as well as optionally providing mechanical vibration as a detectable output.
  • the mobile terminal 10 may further include a user identity module (UIM) 58, which may generically be referred to as a smart card.
  • the U may be a memory device having a processor built in.
  • the UIM may include, for example, a subscriber identity module (SIM), a universal integrated circuit card (UICC), a universal subscriber identity module (USIM), a removable user identity module (R-UIM), or any other smart card.
  • SIM subscriber identity module
  • UICC universal integrated circuit card
  • USIM universal subscriber identity module
  • R-UIM removable user identity module
  • the UIM may store information elements related to a mobile subscriber.
  • the mobile terminal may be equipped with memory.
  • the mobile terminal may include volatile memory 60, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data.
  • RAM volatile Random Access Memory
  • the mobile terminal may also include other non-volatile memory 62, which may be embedded and/or may be removable.
  • the non-volatile memory may additionally or alternatively comprise an electrically erasable programmable read only memory (EEPROM), flash memory or the like.
  • EEPROM electrically erasable programmable read only memory
  • the memories may store any of a number of pieces of information, and data, used by the mobile terminal to implement the functions of the mobile terminal.
  • the memories may include an identifier, such as an international mobile equipment identification ( ⁇ ) code, capable of uniquely identifying the mobile terminal.
  • the memories may store instructions for determining cell id information.
  • the memories may store an application program for execution by the processor 40, which determines an identity of the current cell, e.g., cell id identity or cell id information, with which the mobile terminal is in communication.
  • the memories and in particular a UIM 58 that may include a memory, may contain sensitive or personal information, the UIM 58 may be password protected to preclude an unauthorized user from using the mobile terminal 10.
  • Example embodiments of the present invention may provide a mechanism by which a password may be retrieved by or for a mobile terminal, such as mobile terminal 10.
  • password is used to generically describe a variety of secure codes or patterns that may be used to gain access to a secured device or function.
  • passwords may include a Personal Identification Number (PIN), a PIN Unlocking Key (PUK), an alphanumeric password, a specific sequence of user inputs or motions, a pattern drawn on a touch screen, or any such code used to gain access to a secure device or function.
  • PIN Personal Identification Number
  • alphanumeric password a specific sequence of user inputs or motions
  • a pattern drawn on a touch screen or any such code used to gain access to a secure device or function.
  • password may also be retrieved using embodiments of the present invention.
  • the term "password” may generally refer to any such username or password.
  • Mobile terminals may include security features that preclude unauthorized users from gaining access to applications or functions of the mobile terminal.
  • Applications which provide an authorized user access to sensitive information may require a password to be entered in order to access the application.
  • Applications such as email, a company intranet, or a file transfer program among many others may require a user to provide a password to access the application.
  • access to any or all functions of a mobile terminal may be piOtected with a password such that the mobile terminal requires the entry of a password prior in order to transition from a locked state to an unlocked state. In the locked state, the mobile terminal may not allow a user to perform any functions other than enter the password (or functions associated with obtaining a password as outlined below) while in the unlocked state, the mobile terminal may allow access to all available functions.
  • a mobile terminal may have limited functionality available while in the locked state.
  • the functionality provided while in the locked state may be limited, particularly to functions which do not provide or convey sensitive information or access to features which may charge a fee for use.
  • Such functionality may include a music player function which allows a user to play, pause, fast-forward or rewind music tracks while the mobile terminal is in the locked state.
  • Additional functions available in the locked state may include a game for a child such that the child doesn't inadvertently perform unintended functions of the mobile terminal
  • Other functions may be provided as configured by a user of the mobile terminal or by the settings of the mobile terminal.
  • Example embodiments of the present invention provide a mechanism by which a user may retrieve their password that is required to cause a mobile terminal to transition from a locked state to an unlocked state.
  • FIG. 3 illustrates a mobile terminal 300 including a display 310.
  • the display may clearly show a user that it is in the locked state with an indicator 320 which may be text, a symbol, or the like.
  • a mobile terminal may not illustrate that it is in the locked state, but merely preclude a user from performing any functions available in the unlocked state, thereby implying the locked state.
  • the illustrated embodiment further includes a dialog box 330 for entry of a password via keypad 340.
  • the password may be a text or alphanumeric password, but may also be a symbol or pattern drawn on the display 310 by a user.
  • the password may be a motion or series of motions of the mobile terminal itself as registered by a sensor (such as sensor 47 of mobile terminal 10) which may be an accelerometer.
  • a sensor such as sensor 47 of mobile terminal
  • FIG. 4 illustrates the example embodiment illustrated in FIG. 3; however, an additional option is displayed below the keypad 340 offering an option to "retrieve password" 350.
  • This additional option may be presented before the user attempts to enter the password for the first time, or the option 350 may be configured to appear only after a user has incorrectly entered the password a predefined number of times.
  • the "retrieve password” option may be configured to enable the mobile terminal 300 to transmit a password request message via a network, such as network 30 of FIG. 1, to request a password message in the form of a password or a password hint via a preconfigured device or mechanism.
  • the preconfigured device or mechanism may include sending a text message to another mobile terminal which the user has previously identified or associated with the user's account, sending an email to an email account that the user has previously identified or associated with the user's account, or placing a call to a user.
  • a password message containing the password sent via email or text message may be retrieved via another mobile terminal or device as previously configured by the user
  • a password message containing a password hint may be sent to the mobile terminal that the user is attempting to unlock and the password hint may be presented on the display of mobile terminal.
  • a phone call regarding the password may be made by a live person or by an automated system to a phone which the user has previously considered or the call may be made to the mobile terminal that the user wishes to unlock.
  • the mobile terminal may be configured to receive a call from a service provider of the mobile terminal while in the locked state and the call may be answered without requiring a user to unlock the mobile terminal.
  • the user may;converse with a live person from the service provider or with an automated service of the service provider to retrieve the password of the mobile terminal in a secure manner, thus ensuring that the user is authenticated before providing the user with the password.
  • the user may not require access to another mobile terminal, phone, or device in order to retrieve a password to unlock the device.
  • FIG. 5 depicts an example embodiment in which a user may be offered options with regard to the retrieval of a password.
  • the option menu 520 may be presented in response to an input received at the "retrieve password?" 520 text of FIG. 4.
  • the option menu 520 may also be presented in response to receiving one or more incorrect password attempts.
  • the option menu may include an option to "Send SMS to Kerry's Cell" at 530 directing the password to be sent via a short message service text message to another mobile terminal, in the instant embodiment, Kerry's cell phone.
  • Another option may include "Voice Call to Kerry's Cell” 540 where a voice call may be made by the user's service provider via a live person or an automated service to Kerry's cell phone to provide the password or a hint to the password.
  • An option to "Send Hint to My Device” 550 may send an SMS text message to the user's locked device providing the user with a hint as to the password. The hint maybe user configurable and may remind the user of what their password is.
  • Another option for a "Voice Call to My Device” 560 may direct a phone call to be made to the device by the user's service provider either by a live person or an automated system.
  • the phone call may be configured to provide the user with a hint as to the password of the mobile terminal 500 or may be configured to authenticate a user through a series of questions before providing the user with the password.
  • An option to "Send e-mail to Address 1" 570 may be configured to send the password or a hint regarding the password to a preconfigured email address. In the instant embodiment, the email address has a nickname of "Address 1.”
  • a further option may be provided to return to the password entry screen 580 where the user may again attempt to enter the password.
  • FIG. 6 An example embodiment of a mechanism for performing an example embodiment of the present invention is presented in the flowchart of FIG. 6. It will -be understood that each block of the flowchart, and combinations of blocks in the flowchart, may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions. For example, one or more of the procedures described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus.
  • any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the flowchart block(s).
  • These computer program instructions may also be stored in a computer- readable memory that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the flowchart block(s).
  • the computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the flowchart block(s).
  • blocks of the flowchart support combinations of means for performing the specified functions, and combinations of operations for performing the specified functions. It will also be understood that one or more blocks of the flowchart, and combinations of blocks in the flowcharts, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
  • an apparatus for performing the methods of FIG. 6, described further below may comprise a processor (e.g., the processor 40) configured to perform some or each of the operations (600-650) described below.
  • the processor may, for example, be configured to perform the operations (600-650) by performing hardware implemented logical functions, executing stored instructions, or executing algorithms for performing each of the operations.
  • the apparatus may comprise means for performing each of the operations described above.
  • examples of means for performing operations 600-650 may comprise, for example, the processor 40 and/or a device or circuit for executing instructions or executing an algorithm for processing information as described further below.
  • FIG. 6 depicts an example embodiment of the present invention showing a flowchart of operations that may be performed on a device (e.g., mobile terminal 10) where the operations may be performed by a processor (e.g. processor 40).
  • a device may operate in a locked state at 600.
  • the device may require a password to be entered to transition from the locked state to an unlocked state at 610.
  • a password request message may be transmitted at 620 requesting assistance with determining the password.
  • Additional operations may be performed independently or in cooperation with the operations 600-620.
  • the optional operations, depicted in broken lines in FIG. 6, may include receiving a selection of a mechanism for receipt of a password message at 630.
  • the device may receive a password message in response to providing for transmission of a password request message.
  • the password message may also be received by a number of other devices as presented in the options for selection of a mechanism for receiving the password message.
  • a password message containing the password may be received via the selected mechanism at 640.
  • a password message containing a password hint may be received at the device at 650.
  • embodiments of the present invention may be configured as a system, method or electronic device.
  • embodiments of the present invention may be comprised of various means including entirely of hardware or any combination of software and hardware.
  • embodiments of the present invention may take the form of a computer program product on a computer-readable storage medium having computer-readable program instructions (e.g., computer software) embodied in the tangible, non-transitory storage medium. Any suitable computer-readable storage medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided herein are a method, apparatus and computer program product for operating a device in a locked state, requiring a password to be entered to transition from the locked state to an unlocked state, and for providing for transmission of a password request message from the device while the device is in the locked state. Embodiments may further include receiving a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message which may be received on a second device that was previously configured to receive the password message. The method may also include receiving a password message that includes a password hint in response to providing for transmission of a password request message. The password message containing the password hint may be received on the device and the password message may be retrievable by a user when the device is in the locked state.

Description

METHOD, APPARATUS AND COMPUTER PROGRAM PRODUCT FOR RETRIEVAL OF LOST OR FORGOTTEN PASSWORDS
TECHNOLOGICAL FIELD
[0001] Example embodiments of the present invention relate generally to the retrieval of lost or forgotten passwords, and more particularly, to a method of retrieving a password of a mobile device.
BACKGROUND
[0002] The modern communications era has brought about a tremendous expansion of wireline and wireless networks. Computer networks, television networks, and telephone networks are experiencing an unprecedented technological expansion, fueled by consumer demand. Wireless and mobile networking technologies have addressed consumer demands while providing more flexibility and immediacy of information transfer.
[0003] Mobile devices, such as cellular telephones, have become smaller and lighter while also becoming more capable of performing tasks that far exceed a traditional voice call. Mobile devices may be capable of sending and receiving email, accessing personal accounts, accessing secure networks, or other functions that may benefit from security features such as requiring a password. Further, mobile devices themselves may be secured with a password preventing the use of any function of the mobile device without first entering the password. One drawback to securing a device with a password is that a user must remember the password in order to access the mobile device or the individual functions that are secured. A mechanism for the retrieval of a password may therefore be desirable.
SUMMARY
[0004] In general, an example embodiment of the present invention provides an improved method retrieving a forgotten or lost password for a mobile terminal.
[0005] In particular, the method of example embodiments includes providing for operation of a device in a locked state, requiring a password to be entered to transition from the locked state to an unlocked state, and providing for transmission of a password request message from the device while the device is in the locked state. The method may further include receiving a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, or text message may be received on a second device that was previously configured to receive the password message. The method may also include receiving a password message that includes a password hint in response to providing for transmission of a password request message. The password message containing the password hint may be received on the device and the password message may be retrievable by a user when the device is in the locked state. The method may optionally include receiving a password hint message and providing for display of the password hint message in response to providing for transmission of a password request message.
[0006] According to another embodiment of the present invention, an apparatus is provided. The apparatus may include at least one processor and at least one memory including computer program code. The at least one memory and the computer program code may be configured to, with the at least one processor, cause the apparatus to provide for operation of the apparatus in a locked state, require a password to be entered to transition from the locked state to an unlocked state, and provide for transmission of a password request message from the apparatus while the apparatus is in the locked state. The apparatus may further be caused to receive a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message. The apparatus may also be caused to receive a password message including a password hint in response to providing for transmission of a password request message. The password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state. The apparatus may also be configured to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
[0007] A further embodiment of the invention may include a computer program product including at least one computer-readable storage medium having computer-executable program code instructions stored therein. The computer executable program code instructions may include program code instructions for providing for operation of a device in a locked state, program code instructions for requiring a password to be entered to transition from the locked state to an unlocked state, and program code instructions for providing for transmission of a password request message from the device while the device is in the locked state. The computer program product may further include program code instructions for receiving a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second device previously configured for receipt of a password message. The computer program product may further include program code instructions for receiving a password message including a password hint in response to providing for transmission of a password request message. The password message may be received on a device and the password hint message may be retrievable when the device is in the locked state.
[0008] According to another embodiment of the present invention, an apparatus is provided. The apparatus may include means to provide for operation of the apparatus in a locked state, means to require a password to be entered to transition from the locked state to an unlocked state, and means to provide for transmission of a password request message from the apparatus while the apparatus is in the locked state. The apparatus may include means to receive a selection of a mechanism for receipt of a password message. The mechanism may be a phone call, an email message, or a text message. The phone call, email message, and text message may be received on a second apparatus previously configured for receipt of a password message. The apparatus may also include means to receive a password message including a password hint in response to providing for transmission of a password request message. The password message including the password hint may be received at the apparatus and the password message may be retrievable by a user when the apparatus is in the locked state. The apparatus may also include means to receive a password hint message and provide for display of the password hint message in response to providing for transmission of the password request message.
BRIEF DESCRIPTION OF THE DRAWING(S)
[0009] Having thus described certain example embodiments of the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
[0010] FIG. 1 illustrates an communication system in accordance with an example embodiment of the present invention; [0011] FIG. 2 is a schematic block diagram of a mobile device according to an example embodiment of the present invention;
[0012] FIG. 3 is an illustration of a mobile terminal in a locked state according to an example embodiment of the present invention;
[0013] FIG. 4 is an illustration of a mobile terminal in a locked state and providing a
"request password" option to a user according to an example embodiment of the present invention;
[0014] FIG. 5 is an illustration of a mobile terminal in a locked state and providing options for password retrieval according to an example embodiment of the present invention; and
[0015] FIG. 6 is a flow chart of a method of retrieving a password according to an example embodiment of the present invention.
DETAILED DESCRIPTION
[0016] Some example embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, various embodiments of the invention may be embodied in many different forms and should not be construed as limited to the example embodiments set forth herein; rather, these example embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like reference numerals refer to like elements throughout As used herein, the terms "data," "content," "information" and similar terms may be used interchangeably to refer to data capable of being transmitted, received and/or stored in accordance with embodiments of the present invention.
[0017] Additionally, as used herein, the term 'circuitry' refers to (a) hardware-only circuit implementations (e.g., implementations in analog circuitry and/or digital circuitry); (b) combinations of circuits and computer program product(s) comprising software and/or firmware instructions stored on one or more computer readable memories that work together to cause an apparatus to perform one or more functions described herein; and (c) circuits, such as, for example, a microprocessor(s) or a portion of a microprocessor(s), that require software or firmware for operation even if the software or firmware is not physically present. This definition of 'circuitry' applies to all uses of this term herein, including in any claims. As a further example, as used herein, the term 'circuitry' also includes an implementation comprising one or more processors and/or portion(s) thereof and accompanying software and/or firmware. As another example, the term 'circuitry' as used herein also includes, for example, a baseband integrated circuit or applications processor integrated circuit for a mobile phone or a similar integrated circuit in a server, a cellular network device, other network device, and/or other computing device.
[0018] A session may be supported by a network 30 as shown in FIG. 1 that may include a collection of various different nodes, devices or functions that may be in communication with each other via corresponding wired and/or wireless interfaces or in ad-hoc networks such as those functioning over Bluetooth® interfaces. As such, FIG. 1 should be understood to be an example of a broad view of certain elements of a system that may incorporate example embodiments of the present invention and not an all inclusive or detailed view of the system or the network 30. Although not necessary, in some example embodiments, the network 30 may be capable of supporting communication in accordance with any one or more of a number of first- generation (1G), second-generation (2.G), 2.5G, third-generation (3G), 3.5G, 3.9G, fourth- generation (4G) mobile communication protocols and/or the like.
[0019] One or more communication terminals, such as the mobile terminal 10 and the second mobile terminal 20, may be in communication with each other via the network 30 and each may include an antenna or antennas for transmitting signals to and for receiving signals from a base site, which could be, for example a base station that is part of one or more cellular or mobile networks or an access point that may be coupled to a data network, such as a local area network (LAN), a metropolitan area network (MAN), and/or a wide area network (WAN), such as the Internet. In turn, other devices (e.g., personal computers, server computers or the like) may be coupled to the mobile terminal 10 and the second mobile terminal 20 via the network 30. By directly or indirectly connecting the mobile terminal 10 and the second mobile terminal 20 and other devices to the network 30, the mobile terminal 10 and the second mobile terminal 20 may be enabled to communicate with the other devices or each other, for example, according to numerous communication protocols including Hypertext Transfer Protocol (HTTP) and/or the like, to thereby carry out various communication or other functions of the mobile terminal 10 and the second mobile terminal 20, respectively.
[0020] In example embodiments, either of the mobile terminals may be mobile or fixed communication devices. Thus, for example, the mobile terminal 10 and the second mobile terminal 20 could be, or be substituted by, any of personal computers (PCs), personal digital assistants (PDAs), wireless telephones, desktop computer, laptop computer, mobile computers, cameras, video recorders, audio/video players, positioning devices, game devices, television devices, radio devices, or various other devices or combinations thereof.
[0021] Although the mobile terminal 10 may be configured in various manners, one example of a mobile terminal that could benefit from an example embodiment of the invention is depicted in the block diagram of Figure 2. While several embodiments of the mobile terminal may be illustrated and hereinafter described for purposes of example, other types of mobile terminals, such as portable digital assistants (PDAs), pagers, mobile televisions, gaming devices, all types of computers (e.g., laptops or mobile computers), cameras, audio/video players, radios, global positioning system (GPS) devices, or any combination of the aforementioned, and other types of communication devices, may employ an example embodiment of the present invention. As described, the mobile terminal may include various means for performing one or more functions in accordance with an example embodiment of the present invention, including those more particularly shown and described herein. It should be understood, however, that a mobile terminal may include alternative means for performing one or more like functions, without departing from the spirit and scope of the present invention.
[0022] The mobile terminal 10 illustrated in FIG. 2 may include an antenna 32 (or multiple antennas) in operable communication with a transmitter 34 and a receiver 36. The mobile terminal may further include an apparatus, such as a processor 40, that provides signals to and receives signals from the transmitter and receiver, respectively. The signals may include signaling information in accordance with the air interface standard of the applicable cellular system, and/or may also include data corresponding to user speech, received data and/or user generated data. In this regard, the mobile terminal may be capable of operating with one or more air interface standards, communication protocols, modulation types, and access types. By way of illustration, the mobile terminal may be capable of operating in accordance with any of a number of first, second, third and/or fourth-generation communication protocols or the like. For example, the mobile terminal may be capable of operating in accordance with second-generation (2G) wireless communication protocols IS-136, GSM (Global System for Mobile communications) and IS-95, or with third-generation (3G) wireless communication protocols, such as UMTS
(Universal Mobile Telecommunications System), CDMA2000 (Code Division Multiple Access), wideband CDMA (WCDMA) and time division-synchronous CDMA (TD-SCDMA), with 3.9G wireless communication protocols such as E-UTRAN (evolved- UMTS (Universal Mobile Telecommunications System) terrestrial radio access network), with fourth-generation (4G) wireless communication protocols or the like.
[0023] It is understood that the apparatus, such as the processor 40, may include circuitry implementing, among others, audio and logic functions of the mobile terminal 10. The processor 40 may be embodied in a number of different ways. For example, the processor 40 may be embodied as one or more of various processing means such as a coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing element with or without an
accompanying DSP, or various other processing circuitry including integrated circuits such as, for example, an ASIC (application specific integrated circuit), an FPGA (field programmable gate array), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like. As such, in some embodiments, the processor 40 may include one or more processing cores configured to perform independently. A multi-core processor may enable multiprocessing within a single physical package. Additionally or alternatively, the processor 40 may include one or more processors configured in tandem via the bus to enable independent execution of instructions, pipelining and/or multithreading.
[0024] In an example embodiment, the processor 40 may be configured to execute instructions stored in the memory device 62 or otherwise accessible to the processor 40.
Alternatively or additionally, the processor 40 may be configured to execute hard coded functionality. As such, whether configured by hardware or software methods, or by a
combination thereof, the processor 40 may represent an entity (e.g., physically embodied in circuitry) capable of performing operations according to embodiments of the present invention while configured accordingly. Thus, for example, when the processor 40 is embodied as an ASIC, FPGA or the like, the processor 40 may be specifically configured hardware for conducting the operations described herein. Alternatively, as another example, when the processor 40 is embodied as an executor of software instructions, the instructions may specifically configure the processor 40 to perform the algorithms and/or operations described herein when the instructions are executed. However, in some cases, the processor 40 may be a processor of a specific device (e.g., a mobile terminal or network device) adapted for employing embodiments of the present invention by further configuration of the processor 40 by instructions for performing the algorithms and/or operations described herein. The processor 40 may include, among other things, a clock, an arithmetic logic unit (ALU) and logic gates configured to support operation of the processor 40.
[0025] At least some components of the mobile terminal 10 including the processor 40 and, in some embodiments, a memory device, such as volatile memory 60, may be embodied as a chip or chipset. In other words, processor 40 and optionally an associated memory device may comprise one or more physical packages (e.g., chips) including materials, components and/or wires on a structural assembly (e.g., a baseboard). The structural assembly may provide physical strength, conservation of size, and/or limitation of electrical interaction for component circuitry included thereon. The processor 40 and optionally an associated memory device may therefore, in some cases, be configured to implement an embodiment of the present invention on a single chip or as a single "system on a chip." As such, in some cases, a chip or chipset may constitute means for performing one or more operations for providing the functionalities described herein.
[0026] The mobile terminal 10 may also comprise a user interface including an output device such as an earphone or speaker 44, a ringer 42, a microphone 46, a display 48, and a user input interface, which may be coupled to the processor 40. The mobile terminal 10 may further include sensor(s) 47 for detecting a stimulus such as a button for detecting a depression, a touch sensitive display for detecting a touch, or a motion sensor to detect motion. The user input interface, which allows the mobile terminal to receive data, may include any of a number of devices allowing the mobile terminal to receive data, such as a keypad 50, a touch sensitive display (not shown) or other input device. In embodiments including the keypad, the keypad may include numeric (0-9) and related keys (#, *), and other hard and soft keys used for operating the mobile terminal 10. Alternatively, the keypad may include a conventional QWERTY keypad arrangement. The keypad may also include various soft keys with associated functions. In addition, or alternatively, the mobile terminal may include an interface device such as a joystick or other user input interface. The mobile terminal may further include a battery 54, such as a vibrating battery pack, for powering various circuits that are used to operate the mobile terminal, as well as optionally providing mechanical vibration as a detectable output.
[0027] The mobile terminal 10 may further include a user identity module (UIM) 58, which may generically be referred to as a smart card. The U may be a memory device having a processor built in. The UIM may include, for example, a subscriber identity module (SIM), a universal integrated circuit card (UICC), a universal subscriber identity module (USIM), a removable user identity module (R-UIM), or any other smart card. The UIM may store information elements related to a mobile subscriber. In addition to the UIM, the mobile terminal may be equipped with memory. For example, the mobile terminal may include volatile memory 60, such as volatile Random Access Memory (RAM) including a cache area for the temporary storage of data. The mobile terminal may also include other non-volatile memory 62, which may be embedded and/or may be removable. The non-volatile memory may additionally or alternatively comprise an electrically erasable programmable read only memory (EEPROM), flash memory or the like. The memories may store any of a number of pieces of information, and data, used by the mobile terminal to implement the functions of the mobile terminal. For example, the memories may include an identifier, such as an international mobile equipment identification (ΓΜΕΙ) code, capable of uniquely identifying the mobile terminal. Furthermore, the memories may store instructions for determining cell id information. Specifically, the memories may store an application program for execution by the processor 40, which determines an identity of the current cell, e.g., cell id identity or cell id information, with which the mobile terminal is in communication. As the memories, and in particular a UIM 58 that may include a memory, may contain sensitive or personal information, the UIM 58 may be password protected to preclude an unauthorized user from using the mobile terminal 10.
[0028] Example embodiments of the present invention may provide a mechanism by which a password may be retrieved by or for a mobile terminal, such as mobile terminal 10. It should be appreciated that the term password is used to generically describe a variety of secure codes or patterns that may be used to gain access to a secured device or function. For example, passwords may include a Personal Identification Number (PIN), a PIN Unlocking Key (PUK), an alphanumeric password, a specific sequence of user inputs or motions, a pattern drawn on a touch screen, or any such code used to gain access to a secure device or function. Further, while embodiments are directed generally to password retrieval, a username or other user identifier may also be retrieved using embodiments of the present invention. Thus, the term "password" may generally refer to any such username or password.
[0029] Mobile terminals according to example embodiments of the present invention may include security features that preclude unauthorized users from gaining access to applications or functions of the mobile terminal. Applications which provide an authorized user access to sensitive information may require a password to be entered in order to access the application. Applications such as email, a company intranet, or a file transfer program among many others may require a user to provide a password to access the application. Further, access to any or all functions of a mobile terminal may be piOtected with a password such that the mobile terminal requires the entry of a password prior in order to transition from a locked state to an unlocked state. In the locked state, the mobile terminal may not allow a user to perform any functions other than enter the password (or functions associated with obtaining a password as outlined below) while in the unlocked state, the mobile terminal may allow access to all available functions.
[0030] Optionally, a mobile terminal may have limited functionality available while in the locked state. The functionality provided while in the locked state may be limited, particularly to functions which do not provide or convey sensitive information or access to features which may charge a fee for use. Such functionality may include a music player function which allows a user to play, pause, fast-forward or rewind music tracks while the mobile terminal is in the locked state. Additional functions available in the locked state may include a game for a child such that the child doesn't inadvertently perform unintended functions of the mobile terminal Other functions may be provided as configured by a user of the mobile terminal or by the settings of the mobile terminal.
[0031] People are often tasked with remembering multiple usemames and passwords for various accounts and memberships, such as online banking, email, online shopping, etc. As each of these passwords may have different requirements (such as the inclusion of numbers, password length, both upper and lower-case letters, etc.), a user may have difficulty remembering all of their passwords. As such, it may be desirable for a user to be able to retrieve their passwords (and possibly usernames) easily.
[0032] Typically, when a user is accessing a website that requires a username and password for access, the user may be offered options for when they cannot remember their password or username. In such cases, a reminder of the password may be set to an email address. However, when a user is on a mobile terminal and cannot remember their password to transition the mobile terminal from the locked state to the unlocked state, the mobile terminal may not allow access to an email program and therefore may not provide any options for retrieval of the password. [0033] Example embodiments of the present invention provide a mechanism by which a user may retrieve their password that is required to cause a mobile terminal to transition from a locked state to an unlocked state. FIG. 3 illustrates a mobile terminal 300 including a display 310. The display may clearly show a user that it is in the locked state with an indicator 320 which may be text, a symbol, or the like. Optionally, a mobile terminal may not illustrate that it is in the locked state, but merely preclude a user from performing any functions available in the unlocked state, thereby implying the locked state. The illustrated embodiment further includes a dialog box 330 for entry of a password via keypad 340. As noted above, the password may be a text or alphanumeric password, but may also be a symbol or pattern drawn on the display 310 by a user. Optionally, the password may be a motion or series of motions of the mobile terminal itself as registered by a sensor (such as sensor 47 of mobile terminal 10) which may be an accelerometer. However, for illustration, embodiments of the present invention will be described with an alphanumeric password.
[0034] FIG. 4 illustrates the example embodiment illustrated in FIG. 3; however, an additional option is displayed below the keypad 340 offering an option to "retrieve password" 350. This additional option may be presented before the user attempts to enter the password for the first time, or the option 350 may be configured to appear only after a user has incorrectly entered the password a predefined number of times. The "retrieve password" option may be configured to enable the mobile terminal 300 to transmit a password request message via a network, such as network 30 of FIG. 1, to request a password message in the form of a password or a password hint via a preconfigured device or mechanism. The preconfigured device or mechanism may include sending a text message to another mobile terminal which the user has previously identified or associated with the user's account, sending an email to an email account that the user has previously identified or associated with the user's account, or placing a call to a user.
[0035] While the password message containing the password sent via email or text message may be retrieved via another mobile terminal or device as previously configured by the user, a password message containing a password hint may be sent to the mobile terminal that the user is attempting to unlock and the password hint may be presented on the display of mobile terminal. A phone call regarding the password may be made by a live person or by an automated system to a phone which the user has previously considered or the call may be made to the mobile terminal that the user wishes to unlock. The mobile terminal may be configured to receive a call from a service provider of the mobile terminal while in the locked state and the call may be answered without requiring a user to unlock the mobile terminal. The user may;converse with a live person from the service provider or with an automated service of the service provider to retrieve the password of the mobile terminal in a secure manner, thus ensuring that the user is authenticated before providing the user with the password. In such an embodiment, the user may not require access to another mobile terminal, phone, or device in order to retrieve a password to unlock the device.
[0036] FIG. 5 depicts an example embodiment in which a user may be offered options with regard to the retrieval of a password. In the embodiment of FIG. 5, the option menu 520 may be presented in response to an input received at the "retrieve password?" 520 text of FIG. 4. The option menu 520 may also be presented in response to receiving one or more incorrect password attempts. The option menu may include an option to "Send SMS to Kerry's Cell" at 530 directing the password to be sent via a short message service text message to another mobile terminal, in the instant embodiment, Kerry's cell phone. Another option may include "Voice Call to Kerry's Cell" 540 where a voice call may be made by the user's service provider via a live person or an automated service to Kerry's cell phone to provide the password or a hint to the password. An option to "Send Hint to My Device" 550 may send an SMS text message to the user's locked device providing the user with a hint as to the password. The hint maybe user configurable and may remind the user of what their password is. Another option for a "Voice Call to My Device" 560 may direct a phone call to be made to the device by the user's service provider either by a live person or an automated system. The phone call may be configured to provide the user with a hint as to the password of the mobile terminal 500 or may be configured to authenticate a user through a series of questions before providing the user with the password. An option to "Send e-mail to Address 1" 570 may be configured to send the password or a hint regarding the password to a preconfigured email address. In the instant embodiment, the email address has a nickname of "Address 1." A further option may be provided to return to the password entry screen 580 where the user may again attempt to enter the password.
[0037] An example embodiment of a mechanism for performing an example embodiment of the present invention is presented in the flowchart of FIG. 6. It will -be understood that each block of the flowchart, and combinations of blocks in the flowchart, may be implemented by various means, such as hardware, firmware, processor, circuitry and/or other device associated with execution of software including one or more computer program instructions. For example, one or more of the procedures described above may be embodied by computer program instructions. In this regard, the computer program instructions which embody the procedures described above may be stored by a memory device of an apparatus employing an embodiment of the present invention and executed by a processor in the apparatus. As will be appreciated, any such computer program instructions may be loaded onto a computer or other programmable apparatus (e.g., hardware) to produce a machine, such that the resulting computer or other programmable apparatus embody means for implementing the functions specified in the flowchart block(s). These computer program instructions may also be stored in a computer- readable memory that may direct a computer or other programmable apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture the execution of which implements the function specified in the flowchart block(s). The computer program instructions may also be loaded onto a computer or other programmable apparatus to cause a series of operations to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide operations for implementing the functions specified in the flowchart block(s).
[0038] Accordingly, blocks of the flowchart support combinations of means for performing the specified functions, and combinations of operations for performing the specified functions. It will also be understood that one or more blocks of the flowchart, and combinations of blocks in the flowcharts, can be implemented by special purpose hardware-based computer systems which perform the specified functions, or combinations of special purpose hardware and computer instructions.
[0039] In an example embodiment, an apparatus for performing the methods of FIG. 6, described further below, may comprise a processor (e.g., the processor 40) configured to perform some or each of the operations (600-650) described below. The processor may, for example, be configured to perform the operations (600-650) by performing hardware implemented logical functions, executing stored instructions, or executing algorithms for performing each of the operations. Alternatively, the apparatus may comprise means for performing each of the operations described above. In this regard, according to an example embodiment, examples of means for performing operations 600-650 may comprise, for example, the processor 40 and/or a device or circuit for executing instructions or executing an algorithm for processing information as described further below.
[0040] FIG. 6 depicts an example embodiment of the present invention showing a flowchart of operations that may be performed on a device (e.g., mobile terminal 10) where the operations may be performed by a processor (e.g. processor 40). A device may operate in a locked state at 600. The device may require a password to be entered to transition from the locked state to an unlocked state at 610. A password request message may be transmitted at 620 requesting assistance with determining the password.
[0041] Additional operations may be performed independently or in cooperation with the operations 600-620. The optional operations, depicted in broken lines in FIG. 6, may include receiving a selection of a mechanism for receipt of a password message at 630. The device may receive a password message in response to providing for transmission of a password request message. The password message may also be received by a number of other devices as presented in the options for selection of a mechanism for receiving the password message. A password message containing the password may be received via the selected mechanism at 640. Optionally, a password message containing a password hint may be received at the device at 650.
[0042] As described above and as will be appreciated by one skilled in the art, embodiments of the present invention may be configured as a system, method or electronic device.
Accordingly, embodiments of the present invention may be comprised of various means including entirely of hardware or any combination of software and hardware. Furthermore, embodiments of the present invention may take the form of a computer program product on a computer-readable storage medium having computer-readable program instructions (e.g., computer software) embodied in the tangible, non-transitory storage medium. Any suitable computer-readable storage medium may be utilized including hard disks, CD-ROMs, optical storage devices, or magnetic storage devices.
[0043] Many modifications and other embodiments of the inventions set forth herein will come to mind to one skilled in the art to which these inventions pertain having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the inventions are not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Moreover, although the foregoing descriptions and 'associated drawings describe example embodiments in the context of certain example combinations of elements and/or functions, it should be appreciated that different combinations of elements and/or functions may be provided by alternative embodiments without departing from the spirit and scope of the appended claims. In this regard, for example, different combinations of elements and/or functions than those explicitly described above are also contemplated as may be set forth in some of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims

WHAT IS CLAIMED IS:
1. A method comprising:
providing for operation of a device in a locked state;
requiring a password to be entered to transition from the locked state to an unlocked state; and
providing for transmission of a password request message from the device while the device is in the locked state.
2. A method according to claim 1, further comprising receiving a selection of a mechanism for receipt of a password message.
3. A method according to claim 2, wherein the mechanism is selected from the group consisting of: a phone call, an email message, and a text message.
4. A method according to claim 3, wherein the phone call, email message, and text message may be received on a second device previously specified for receipt of a password message.
5. A method according to claim 1 , further comprising receiving a password message comprising a password hint in response to providing for transmission of a password request message.
6. A method according to claim 5, wherein the password message is received at the device and wherein the password message is retrievable by a user when the device is in the locked state.
7. A method according to claim 1, further comprising receiving a password hint message and providing for display of the password hint message in response to providing for transmission of a password request message.
8. An apparatus comprising at least one processor and at least one memory including computer program code, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to:
provide for operation of the apparatus in a locked state;
require a password to be entered to transition from the locked state to an unlocked state; and
provide for transmission of a password request message from the apparatus while the apparatus is in the locked state.
9. An apparatus according to claim 8, the apparatus further caused to receive a selection of a mechanism for receipt of a password message.
10. An apparatus according to claim 9, wherein the mechanism is selected from the group consisting of: a phone call, an email message, and a text message.
11. An apparatus according to claim 10, wherein the phone call, email message, and text message may be received on a second apparatus previously specified for receipt of a password message.
12. An apparatus according to claim 8, the apparatus further caused to receive a password message comprising a password hint in response to providing for transmission of a password request message,
13. An apparatus according to claim 12, wherein the password message is received at the apparatus and wherein the password message is retrievable by a user when the apparatus is in the locked state.
14. An apparatus according to claim 8, the apparatus further configured to receive a password hint message and provide for display of the password hint message in response to providing for transmission of a password request message.
15. A computer program product comprising at least one computer-readable storage medium having computer-executable program code instructions stored therein, the computer- executable program code instructions comprising:
program code instructions for providing for operation of a device in a locked state;
program code instructions for requiring a password to be entered to transition from the locked state to an unlocked state; and
program code instructions for providing for transmission of a password request message from the device while the device is in the locked state.
16. A computer program product according to claim 15, further comprising program code instructions for receiving a selection of a mechanism for receipt of a password message.
17. A computer program product according to claim 16, wherein the mechanism is selected from the group consisting of: a phone call, an email message, and a text message.
18. A computer program product according to claim 17, wherein the phone call, email message, and text message may be received on a second device previously specified for receipt of a password message.
19. A computer program product according to claim 15, further comprising program code instructions for receiving a password message comprising a password hint in response to providing for transmission of a password request message.
20. A computer program product according to claim 19,'wherein the password message is received on the device and wherein the password hint message is retrievable when the device is in the locked state.
PCT/CN2011/076656 2011-06-30 2011-06-30 Method, apparatus and computer program product for retrieval of lost or forgotten passwords WO2013000150A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/076656 WO2013000150A1 (en) 2011-06-30 2011-06-30 Method, apparatus and computer program product for retrieval of lost or forgotten passwords

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2011/076656 WO2013000150A1 (en) 2011-06-30 2011-06-30 Method, apparatus and computer program product for retrieval of lost or forgotten passwords

Publications (1)

Publication Number Publication Date
WO2013000150A1 true WO2013000150A1 (en) 2013-01-03

Family

ID=47423390

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2011/076656 WO2013000150A1 (en) 2011-06-30 2011-06-30 Method, apparatus and computer program product for retrieval of lost or forgotten passwords

Country Status (1)

Country Link
WO (1) WO2013000150A1 (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016003066A1 (en) * 2014-07-02 2016-01-07 Lg Electronics Inc. Mobile terminal and method for controlling the same
EP3026593A1 (en) * 2014-11-26 2016-06-01 Kyocera Document Solutions Inc. Authentication apparatus that assists input of user id and password, authentication method, and recording medium
WO2017200846A1 (en) * 2016-05-19 2017-11-23 Apple Inc. User interface for a device requesting remote authorization
US9842330B1 (en) 2016-09-06 2017-12-12 Apple Inc. User interfaces for stored-value accounts
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10142835B2 (en) 2011-09-29 2018-11-27 Apple Inc. Authentication with secondary approver
US10178234B2 (en) 2014-05-30 2019-01-08 Apple, Inc. User interface for phone call routing among devices
EP3457308A4 (en) * 2016-06-07 2019-05-08 Huawei Technologies Co., Ltd. Method for improving information security and terminal
US10395128B2 (en) 2017-09-09 2019-08-27 Apple Inc. Implementation of biometric authentication
US10438205B2 (en) 2014-05-29 2019-10-08 Apple Inc. User interface for payments
US10484384B2 (en) 2011-09-29 2019-11-19 Apple Inc. Indirect authentication
US10496808B2 (en) 2016-10-25 2019-12-03 Apple Inc. User interface for managing access to credentials for use in an operation
US10521579B2 (en) 2017-09-09 2019-12-31 Apple Inc. Implementation of biometric authentication
US10776500B2 (en) 2018-08-22 2020-09-15 International Business Machines Corporation Autonomous hint generator
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US10956550B2 (en) 2007-09-24 2021-03-23 Apple Inc. Embedded authentication systems in an electronic device
US10992795B2 (en) 2017-05-16 2021-04-27 Apple Inc. Methods and interfaces for home media control
US10996917B2 (en) 2019-05-31 2021-05-04 Apple Inc. User interfaces for audio media control
US11037150B2 (en) 2016-06-12 2021-06-15 Apple Inc. User interfaces for transactions
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US11126704B2 (en) 2014-08-15 2021-09-21 Apple Inc. Authenticated device used to unlock another device
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11283916B2 (en) 2017-05-16 2022-03-22 Apple Inc. Methods and interfaces for configuring a device in accordance with an audio tone signal
US11392291B2 (en) 2020-09-25 2022-07-19 Apple Inc. Methods and interfaces for media control with dynamic feedback
US11431836B2 (en) 2017-05-02 2022-08-30 Apple Inc. Methods and interfaces for initiating media playback
US11481769B2 (en) 2016-06-11 2022-10-25 Apple Inc. User interface for transactions
US11539831B2 (en) 2013-03-15 2022-12-27 Apple Inc. Providing remote interactions with host device using a wireless device
US11620103B2 (en) 2019-05-31 2023-04-04 Apple Inc. User interfaces for audio media control
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US11683408B2 (en) 2017-05-16 2023-06-20 Apple Inc. Methods and interfaces for home media control
US11784956B2 (en) 2021-09-20 2023-10-10 Apple Inc. Requests to add assets to an asset account
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations
US11847378B2 (en) 2021-06-06 2023-12-19 Apple Inc. User interfaces for audio routing
US11907013B2 (en) 2014-05-30 2024-02-20 Apple Inc. Continuity of applications across devices
US12002042B2 (en) 2016-06-11 2024-06-04 Apple, Inc User interface for transactions
US12079458B2 (en) 2016-09-23 2024-09-03 Apple Inc. Image data for enhanced user interactions
US12099586B2 (en) 2021-01-25 2024-09-24 Apple Inc. Implementation of biometric authentication

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6360322B1 (en) * 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
WO2003096605A1 (en) * 2002-05-06 2003-11-20 Thomson Licensing S.A. Hand-held device forgotten password notification
CN101860813A (en) * 2009-04-08 2010-10-13 北京闻言科技有限公司 Method for retrieving password by server push technology
CN102096546A (en) * 2010-12-29 2011-06-15 华为终端有限公司 Unlocking method and device of operating system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6360322B1 (en) * 1998-09-28 2002-03-19 Symantec Corporation Automatic recovery of forgotten passwords
WO2003096605A1 (en) * 2002-05-06 2003-11-20 Thomson Licensing S.A. Hand-held device forgotten password notification
CN101860813A (en) * 2009-04-08 2010-10-13 北京闻言科技有限公司 Method for retrieving password by server push technology
CN102096546A (en) * 2010-12-29 2011-06-15 华为终端有限公司 Unlocking method and device of operating system

Cited By (88)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11468155B2 (en) 2007-09-24 2022-10-11 Apple Inc. Embedded authentication systems in an electronic device
US10956550B2 (en) 2007-09-24 2021-03-23 Apple Inc. Embedded authentication systems in an electronic device
US11676373B2 (en) 2008-01-03 2023-06-13 Apple Inc. Personal computing device control using face detection and recognition
US11755712B2 (en) 2011-09-29 2023-09-12 Apple Inc. Authentication with secondary approver
US10516997B2 (en) 2011-09-29 2019-12-24 Apple Inc. Authentication with secondary approver
US11200309B2 (en) 2011-09-29 2021-12-14 Apple Inc. Authentication with secondary approver
US10484384B2 (en) 2011-09-29 2019-11-19 Apple Inc. Indirect authentication
US10419933B2 (en) 2011-09-29 2019-09-17 Apple Inc. Authentication with secondary approver
US10142835B2 (en) 2011-09-29 2018-11-27 Apple Inc. Authentication with secondary approver
US11539831B2 (en) 2013-03-15 2022-12-27 Apple Inc. Providing remote interactions with host device using a wireless device
US9898642B2 (en) 2013-09-09 2018-02-20 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10410035B2 (en) 2013-09-09 2019-09-10 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10803281B2 (en) 2013-09-09 2020-10-13 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10055634B2 (en) 2013-09-09 2018-08-21 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US10372963B2 (en) 2013-09-09 2019-08-06 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on fingerprint sensor inputs
US11287942B2 (en) 2013-09-09 2022-03-29 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces
US11768575B2 (en) 2013-09-09 2023-09-26 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10262182B2 (en) 2013-09-09 2019-04-16 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US11494046B2 (en) 2013-09-09 2022-11-08 Apple Inc. Device, method, and graphical user interface for manipulating user interfaces based on unlock inputs
US10438205B2 (en) 2014-05-29 2019-10-08 Apple Inc. User interface for payments
US10748153B2 (en) 2014-05-29 2020-08-18 Apple Inc. User interface for payments
US11836725B2 (en) 2014-05-29 2023-12-05 Apple Inc. User interface for payments
US10902424B2 (en) 2014-05-29 2021-01-26 Apple Inc. User interface for payments
US10977651B2 (en) 2014-05-29 2021-04-13 Apple Inc. User interface for payments
US10796309B2 (en) 2014-05-29 2020-10-06 Apple Inc. User interface for payments
US10616416B2 (en) 2014-05-30 2020-04-07 Apple Inc. User interface for phone call routing among devices
US11907013B2 (en) 2014-05-30 2024-02-20 Apple Inc. Continuity of applications across devices
US10178234B2 (en) 2014-05-30 2019-01-08 Apple, Inc. User interface for phone call routing among devices
WO2016003066A1 (en) * 2014-07-02 2016-01-07 Lg Electronics Inc. Mobile terminal and method for controlling the same
US9402183B2 (en) 2014-07-02 2016-07-26 Lg Electronics Inc. Mobile terminal and method for controlling the same
US11126704B2 (en) 2014-08-15 2021-09-21 Apple Inc. Authenticated device used to unlock another device
EP3026593A1 (en) * 2014-11-26 2016-06-01 Kyocera Document Solutions Inc. Authentication apparatus that assists input of user id and password, authentication method, and recording medium
US9847999B2 (en) 2016-05-19 2017-12-19 Apple Inc. User interface for a device requesting remote authorization
US11206309B2 (en) 2016-05-19 2021-12-21 Apple Inc. User interface for remote authorization
WO2017200846A1 (en) * 2016-05-19 2017-11-23 Apple Inc. User interface for a device requesting remote authorization
US10334054B2 (en) 2016-05-19 2019-06-25 Apple Inc. User interface for a device requesting remote authorization
EP3467695A1 (en) * 2016-05-19 2019-04-10 Apple Inc. User interface for a device requesting remote authorization
US10749967B2 (en) 2016-05-19 2020-08-18 Apple Inc. User interface for remote authorization
EP3457308A4 (en) * 2016-06-07 2019-05-08 Huawei Technologies Co., Ltd. Method for improving information security and terminal
US10831881B2 (en) 2016-06-07 2020-11-10 Huawei Technologies Co., Ltd. Method and terminal for enhancing information security
US11481769B2 (en) 2016-06-11 2022-10-25 Apple Inc. User interface for transactions
US12002042B2 (en) 2016-06-11 2024-06-04 Apple, Inc User interface for transactions
US11037150B2 (en) 2016-06-12 2021-06-15 Apple Inc. User interfaces for transactions
US11900372B2 (en) 2016-06-12 2024-02-13 Apple Inc. User interfaces for transactions
US11074572B2 (en) 2016-09-06 2021-07-27 Apple Inc. User interfaces for stored-value accounts
US9842330B1 (en) 2016-09-06 2017-12-12 Apple Inc. User interfaces for stored-value accounts
US12079458B2 (en) 2016-09-23 2024-09-03 Apple Inc. Image data for enhanced user interactions
US11574041B2 (en) 2016-10-25 2023-02-07 Apple Inc. User interface for managing access to credentials for use in an operation
US11995171B2 (en) 2016-10-25 2024-05-28 Apple Inc. User interface for managing access to credentials for use in an operation
US10496808B2 (en) 2016-10-25 2019-12-03 Apple Inc. User interface for managing access to credentials for use in an operation
US11431836B2 (en) 2017-05-02 2022-08-30 Apple Inc. Methods and interfaces for initiating media playback
US11750734B2 (en) 2017-05-16 2023-09-05 Apple Inc. Methods for initiating output of at least a component of a signal representative of media currently being played back by another device
US11095766B2 (en) 2017-05-16 2021-08-17 Apple Inc. Methods and interfaces for adjusting an audible signal based on a spatial position of a voice command source
US10992795B2 (en) 2017-05-16 2021-04-27 Apple Inc. Methods and interfaces for home media control
US11412081B2 (en) 2017-05-16 2022-08-09 Apple Inc. Methods and interfaces for configuring an electronic device to initiate playback of media
US12107985B2 (en) 2017-05-16 2024-10-01 Apple Inc. Methods and interfaces for home media control
US11283916B2 (en) 2017-05-16 2022-03-22 Apple Inc. Methods and interfaces for configuring a device in accordance with an audio tone signal
US11201961B2 (en) 2017-05-16 2021-12-14 Apple Inc. Methods and interfaces for adjusting the volume of media
US11683408B2 (en) 2017-05-16 2023-06-20 Apple Inc. Methods and interfaces for home media control
US10410076B2 (en) 2017-09-09 2019-09-10 Apple Inc. Implementation of biometric authentication
US10395128B2 (en) 2017-09-09 2019-08-27 Apple Inc. Implementation of biometric authentication
US10521579B2 (en) 2017-09-09 2019-12-31 Apple Inc. Implementation of biometric authentication
US10783227B2 (en) 2017-09-09 2020-09-22 Apple Inc. Implementation of biometric authentication
US10872256B2 (en) 2017-09-09 2020-12-22 Apple Inc. Implementation of biometric authentication
US11765163B2 (en) 2017-09-09 2023-09-19 Apple Inc. Implementation of biometric authentication
US11386189B2 (en) 2017-09-09 2022-07-12 Apple Inc. Implementation of biometric authentication
US11393258B2 (en) 2017-09-09 2022-07-19 Apple Inc. Implementation of biometric authentication
US11170085B2 (en) 2018-06-03 2021-11-09 Apple Inc. Implementation of biometric authentication
US11928200B2 (en) 2018-06-03 2024-03-12 Apple Inc. Implementation of biometric authentication
US10776500B2 (en) 2018-08-22 2020-09-15 International Business Machines Corporation Autonomous hint generator
US11100349B2 (en) 2018-09-28 2021-08-24 Apple Inc. Audio assisted enrollment
US12105874B2 (en) 2018-09-28 2024-10-01 Apple Inc. Device control using gaze information
US11619991B2 (en) 2018-09-28 2023-04-04 Apple Inc. Device control using gaze information
US12124770B2 (en) 2018-09-28 2024-10-22 Apple Inc. Audio assisted enrollment
US11809784B2 (en) 2018-09-28 2023-11-07 Apple Inc. Audio assisted enrollment
US10860096B2 (en) 2018-09-28 2020-12-08 Apple Inc. Device control using gaze information
US11620103B2 (en) 2019-05-31 2023-04-04 Apple Inc. User interfaces for audio media control
US11853646B2 (en) 2019-05-31 2023-12-26 Apple Inc. User interfaces for audio media control
US11755273B2 (en) 2019-05-31 2023-09-12 Apple Inc. User interfaces for audio media control
US10996917B2 (en) 2019-05-31 2021-05-04 Apple Inc. User interfaces for audio media control
US11010121B2 (en) 2019-05-31 2021-05-18 Apple Inc. User interfaces for audio media control
US11816194B2 (en) 2020-06-21 2023-11-14 Apple Inc. User interfaces for managing secure operations
US11782598B2 (en) 2020-09-25 2023-10-10 Apple Inc. Methods and interfaces for media control with dynamic feedback
US12112037B2 (en) 2020-09-25 2024-10-08 Apple Inc. Methods and interfaces for media control with dynamic feedback
US11392291B2 (en) 2020-09-25 2022-07-19 Apple Inc. Methods and interfaces for media control with dynamic feedback
US12099586B2 (en) 2021-01-25 2024-09-24 Apple Inc. Implementation of biometric authentication
US11847378B2 (en) 2021-06-06 2023-12-19 Apple Inc. User interfaces for audio routing
US11784956B2 (en) 2021-09-20 2023-10-10 Apple Inc. Requests to add assets to an asset account

Similar Documents

Publication Publication Date Title
WO2013000150A1 (en) Method, apparatus and computer program product for retrieval of lost or forgotten passwords
US11263303B1 (en) Pattern-based mobile device unlocking
US11184359B2 (en) Automated access control policy generation for computer resources
RU2618932C2 (en) Method, installation and device of unblocking process for terminal
US11269981B2 (en) Information displaying method for terminal device and terminal device
CN107079031B (en) User authentication-based approval of a first device via communication with a second device
US8625847B2 (en) Login method based on direction of gaze
CN106778175B (en) Interface locking method and device and terminal equipment
CN103079000B (en) Method and device for terminal unlocking
EP2503479B1 (en) Login method based on direction of gaze
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN103745144A (en) Terminal and terminal unlocking method
EP3166292B1 (en) Partial enabling of functions in a mobile terminal
EP3178029B1 (en) Mobile device, method for displaying screen thereof, wearable device, method for driving the same, and computer-readable recording medium
US9940448B2 (en) Unlock processing method and device
US11562051B2 (en) Varying computing device behavior for different authenticators
EP2927834A1 (en) Information processing apparatus, information processing method, and recording medium
JP2012083829A (en) Portable terminal, authentication method and program
CN103279272B (en) A kind of method and device starting application program in an electronic
CN104104656B (en) Give the method and device of account number for change
CN106534324A (en) Data sharing method and cloud server
CN107479886A (en) A kind of method for information display and mobile terminal
CN110084009B (en) Digital unlocking method and device, storage medium and mobile terminal
JP6201835B2 (en) Information processing apparatus, information processing method, and computer program
CN108573141B (en) Information access method and device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11868583

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 11868583

Country of ref document: EP

Kind code of ref document: A1