Nothing Special   »   [go: up one dir, main page]

WO2013174348A2 - Unlocking method and device - Google Patents

Unlocking method and device Download PDF

Info

Publication number
WO2013174348A2
WO2013174348A2 PCT/CN2013/080322 CN2013080322W WO2013174348A2 WO 2013174348 A2 WO2013174348 A2 WO 2013174348A2 CN 2013080322 W CN2013080322 W CN 2013080322W WO 2013174348 A2 WO2013174348 A2 WO 2013174348A2
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
specified
unlocking information
unlocking
detecting
Prior art date
Application number
PCT/CN2013/080322
Other languages
French (fr)
Chinese (zh)
Other versions
WO2013174348A3 (en
Inventor
祝勇
王利娜
张胜阁
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2013174348A2 publication Critical patent/WO2013174348A2/en
Publication of WO2013174348A3 publication Critical patent/WO2013174348A3/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means

Definitions

  • the present invention relates to the field of information security, and in particular to an unlocking method and apparatus.
  • BACKGROUND OF THE INVENTION With the popularity of computers and networks, more and more people are using computers and networks, with a large number of places where personal information and passwords (or unlocking information) need to be managed. According to the importance of the password, the password can usually be divided into two types, one is important, such as personal banking information, social insurance number, etc., while the other is not so important, such as landing only once in a few years. Forum, network, etc. The number of the latter may be much larger than the former.
  • the current cryptographic mechanism has certain requirements on the number of characters (for example, 6 bits, 8 bits or more), and usually requires special characters, etc., so that the user needs to memorize the above password.
  • the existing unlocking method has a certain impact on the user experience.
  • an effective solution has not yet been proposed.
  • the existing unlocking information requires a lot of effort to memorize and other technical problems.
  • the embodiment of the present invention provides an unlocking method and apparatus to solve at least the above problems.
  • an unlocking method including: detecting a specified action performed on a terminal; acquiring, when the specified action is detected, unlocking information previously stored by the terminal, wherein the specified action corresponds to the unlocking information; Unlock the specified application of the terminal by unlocking the information.
  • detecting the specified action performed on the terminal comprises: detecting a specified sliding track made on the touch screen of the terminal.
  • detecting the specified sliding track made on the touch screen comprises: detecting a specified sliding track made starting from a specified position of the touch screen.
  • the method before unlocking the specified application of the terminal by using the unlocking information, the method further includes: displaying the specified location.
  • the area displaying the specified location is random.
  • detecting the specified action performed on the terminal comprises: detecting a key operation performed on the terminal.
  • the key operation is a combined key operation.
  • the specified application of the terminal is unlocked by the unlocking information, including one of the following: displaying the unlocking information to the terminal user, the terminal user unlocking the specified application according to the unlocking information; and automatically unlocking the specified application according to the unlocking information.
  • the unlocking information corresponds to a plurality of designated applications, and/or the specified action corresponds to the plurality of unlocking information.
  • the method before acquiring the unlocking information pre-stored by the terminal, the method further includes: storing the unlocking information when the specified application is unlocked for the first time.
  • an unlocking apparatus including: a detecting module, configured to detect a specified action performed on the terminal; and an acquiring module, configured to acquire, before detecting the specified action, acquiring unlocking information pre-stored by the terminal The specified action corresponds to the unlocking information; the unlocking module is configured to unlock the specified application of the terminal by using the unlocking information.
  • the detecting module includes: a first detecting unit configured to detect a specified sliding track made on the touch screen when the terminal includes the touch screen.
  • the detecting module further includes: a second detecting unit configured to detect a key operation performed on the terminal.
  • the present invention solves the technical problem that the unlocking information pre-stored by the terminal is used to unlock the specified application of the terminal when the specified action is performed on the terminal, and the existing unlocking information needs to be consumed in a large amount. Energy to memory and other technical issues, thus saving the memory of the password and improving the user experience.
  • FIG. 2 is a block diagram showing the structure of an unlocking apparatus according to Embodiment 1 of the present invention
  • 3 is a block diagram showing another structure of an unlocking device according to Embodiment 1 of the present invention
  • FIG. 4 is a schematic diagram showing setting a storage position and a gesture (ie, a sliding track on a touch screen) according to Embodiment 2 of the present invention
  • FIG. 6 is a schematic diagram of a password input interface according to Embodiment 2 of the present invention
  • FIG. 7 is a schematic diagram of inputting a password by using a gesture according to Embodiment 2 of the present invention.
  • FIG. 1 is a flowchart of an unlocking method according to Embodiment 1 of the present invention. As shown in FIG.
  • the method includes: Step S102: Detecting a specified action performed on a terminal; Step S104: Acquire, before detecting a specified action, acquiring unlocking information pre-stored by the terminal, where the specified action corresponds to the unlocking information; S106: Unlock the specified application of the terminal by using the unlocking information.
  • the specified action may be in various implementation forms, for example: for a terminal provided with a gravity sensor or a level sensor, the unlocking information may be triggered by a rocking action of different postures; for a terminal provided with a touch screen, The specified sliding trajectory made on the touch screen of the terminal can be detected. In this case, the specified sliding trajectory made from the designated position of the touch screen can be detected.
  • different key operations can be considered as the specified action. : For example, using different key combinations, that is, combining key operations.
  • the above-mentioned area for displaying the specified position may be set to be random.
  • the representation of the step S106 may include, but is not limited to, the following two types: the first type, the unlocking information is displayed to the terminal user, and the terminal user unlocks the specified application according to the unlocking information; Specify the app to unlock.
  • the unlocking information may unlock multiple specified applications, and the same specified action may also acquire multiple unlocking information.
  • the unlocking information corresponds to multiple specified applications, and/or the specified action corresponds to multiple unlockings. information.
  • the storage of the unlocking information may be implemented by setting in the terminal in advance, or may be stored when the specified application of the terminal is unlocked for the first time.
  • an unlocking device is also provided for implementing the above-mentioned embodiments and preferred embodiments. The descriptions of the modules and the preferred embodiments have been omitted. The modules involved in the devices are described below. As used hereinafter, the term "module" may implement a combination of software and/or hardware of a predetermined function.
  • the device includes: a detecting module 20, connected to the obtaining module 22, configured to detect a specified action performed on the terminal; and an obtaining module 22 connected to the unlocking module 24, configured to acquire when the specified action is detected
  • the unlocking module 24 is configured to unlock the specified application of the terminal by using the unlocking information.
  • the foregoing detecting module 20 includes: a first detecting unit 200 configured to detect a specified sliding track made on the touch screen when the terminal includes the touch screen.
  • the foregoing detecting module 20 may further include: a second detecting unit 202 configured to detect a key operation performed on the terminal.
  • Embodiment 2 This embodiment provides a method of inputting unlock information (password) using a hidden method in a device having a display screen. This embodiment can be applied to a variety of screens, multiple layouts, and a variety of applications, and is not limited to the input of passwords, and is still effective for some inputs that require encrypted information.
  • the input of the above unlocking information can be divided into two steps. The first step is to select a location on the interface, and the second step is to initiate from the location, and the user initiates a means that the system can detect as an input action.
  • the means by which the system can detect can be a combination of several buttons, or a gesture operation on a touch screen.
  • the gesture operation on Android and the touch screen will be described as an example.
  • the details are as follows - Set the storage location and gestures as shown in Figure 4.
  • the first step of the solution is to set a storage location and gestures.
  • the effective area can be appropriately enlarged at the position selected by the user (when the next time you need to use this position, it is counted in this area) Be effective).
  • a gesture is drawn from the selected storage location as the starting point, and the system recognizes and memorizes (1.4). The system will save this starting point and gestures. The next time you need to enter your password, you will need the storage location and gestures for this step.
  • the password setting interface location reminder is shown in Figure 5.
  • an application or website login, etc.
  • the system will monitor the process. After entering the password point, the system will be on the screen.
  • the storage location with a certain explicit prompt password will store the current password in a certain field in the memory or in a file on the disk (actually the password is stored in the memory or hardware file, but here is given
  • the user's mental model is stored at this location on this interface).
  • Password input interface Figure 6 shows a typical password input interface, which requires the user to input the password.
  • the password that needs to be entered here actually refers to the password saved in the scheme shown in Figure 5. Enter the password using gestures. As shown in Figure 7, the user first moves the finger to the original password area (that is, the position set by the user in Figure 4 or the password position of the explicit prompt in Figure 5), and then draws a certain point from the area.
  • the gesture (the gesture set by the user in Figure 4), as shown in the middle image.
  • the system first compares the gesture input by the user with the gesture stored in FIG. 4. If it is correct, the password is extracted from the memory or file where the password was originally saved, and is filled in the input box, as shown in the right figure. Show. In this process, if the initial position selected by the user or the gesture drawn does not match any of FIG. 4, an error is considered, and a response operation of inputting a password is not performed.
  • the above embodiments achieve the following beneficial effects: Compared with the prior art, the prior art, such as a web browser, usually has the function of remembering passwords and saving passwords, but this function does not prevent others.
  • a password by a person when using the current account is actually equivalent to revealing personal information.
  • the above embodiment can effectively avoid this problem and provide security protection for personal information.
  • the location obtained after each password entry can be random, and the information security can be guaranteed to a certain extent.
  • software is also provided for performing the technical solutions described in the above embodiments and preferred embodiments.
  • a storage medium is provided, the software being stored, including but not limited to: an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like.
  • modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
  • the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module.
  • the invention is not limited to any specific combination of hardware and software.
  • the above are only the preferred embodiments of the present invention, and are not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present invention provides an unlocking method and device. The method comprises: detecting a specified action that is executed to a terminal; after detecting the specified action, obtaining unlocking information that is pre-stored in the terminal, wherein the specified action corresponds to the unlocking information; and unlocking a specified application of the terminal through the unlocking information. The technical solution of the present invention solves the technical problem of wasting a great amount of energy to memorize the existing unlocking information and the like in the related art, thereby saving the energy for memorizing a password and improving the user experience.

Description

解锁方法及装置 技术领域 本发明涉及信息安全领域, 具体而言, 涉及一种解锁方法及装置。 背景技术 随着计算机和网络的普及, 越来越多的人会使用到计算机和网络, 随着产生了大 量的需要管理个人信息和密码 (或称为解锁信息) 的地方。 按照密码的重要程度, 通 常可以将密码分为两种, 一类是很重要的, 例如个人银行信息, 社会保险号等;而另一 类则不是那么重要, 比如某些数年只登陆一次的论坛, 网络等。 而对于后者数量可能 远大于前者。 现在的密码机制对字符的位数会有一定的要求 (例如要求 6位、 8位或 以上), 通常还需要加入特殊字符等, 这样使得需要用户记忆上述密码。然而由于用户 对一些应用不是经常使用, 极易忘记密码。 因此, 现有的解锁方式给用户体验造成了 一定的影响。 针对相关技术中的上述问题, 目前尚未提出有效的解决方案。 发明内容 针对相关技术中, 现有的解锁信息需要耗费大量精力去记忆等技术问题, 本发明 实施例提供了一种解锁方法及装置, 以至少解决上述问题。 根据本发明的一个实施例, 提供了一种解锁方法, 包括: 检测对终端执行的指定 动作; 在检测到指定动作时, 获取终端预先存储的解锁信息, 其中, 指定动作与解锁 信息相对应; 通过解锁信息对终端的指定应用进行解锁。 优选地, 检测对终端执行的指定动作, 包括: 检测在终端的触摸屏上作出的指定 滑动轨迹。 优选地, 检测在触摸屏上作出的指定滑动轨迹, 包括: 检测以触摸屏的指定位置 为起点作出的指定滑动轨迹。 优选地, 通过解锁信息对终端的指定应用进行解锁之前, 还包括: 显示指定位置。 优选地, 显示指定位置的区域是随机的。 优选地, 检测对终端执行的指定动作, 包括: 检测对终端执行的按键操作。 优选地, 按键操作为组合按键操作。 优选地, 通过解锁信息对终端的指定应用进行解锁, 包括以下之一: 将解锁信息 显示给终端用户, 由终端用户根据解锁信息对指定应用进行解锁; 根据解锁信息自动 对指定应用进行解锁。 优选地, 解锁信息对应于多个指定应用, 和 /或, 指定动作对应于多个解锁信息。 优选地, 获取终端预先存储的解锁信息之前, 还包括: 在对指定应用进行首次解 锁时, 存储解锁信息。 根据本发明的另一个实施例, 提供了一种解锁装置, 包括: 检测模块, 设置为检 测对终端执行的指定动作; 获取模块, 设置为在检测到指定动作时, 获取终端预先存 储的解锁信息, 其中, 指定动作与解锁信息相对应; 解锁模块, 设置为通过解锁信息 对终端的指定应用进行解锁。 优选地, 上述检测模块包括: 第一检测单元, 设置为在终端包括触摸屏时, 检测 在触摸屏上作出的指定滑动轨迹。 优选地, 上述检测模块还包括: 第二检测单元, 设置为检测对终端执行的按键操 作。 通过本发明, 采用在检测到对终端执行的指定动作时, 通过获取的终端预先存储 的解锁信息对终端的指定应用进行解锁的技术手段, 解决了相关技术中, 现有的解锁 信息需要耗费大量精力去记忆等技术问题, 从而节省了记忆密码的精力, 提升了用户 体验。 附图说明 此处所说明的附图用来提供对本发明的进一步理解, 构成本申请的一部分, 本发 明的示意性实施例及其说明用于解释本发明, 并不构成对本发明的不当限定。 在附图 中- 图 1为根据本发明实施例 1的解锁方法的流程图; 图 2为根据本发明实施例 1的解锁装置的结构框图; 图 3为根据本发明实施例 1的解锁装置的另一结构框图; 图 4为根据本发明实施例 2的设置存储位置和手势 (即在触摸屏上的滑动轨迹) 的示意图; 图 5为根据本发明实施例 2的密码 (或称为解锁信息) 设置界面位置的示意图; 图 6根据本发明实施例 2的密码输入界面示意图; 图 7为根据本发明实施例 2的利用手势输入密码的示意图。 具体实施方式 下文中将参考附图并结合实施例来详细说明本发明。 需要说明的是, 在不冲突的 情况下, 本申请中的实施例及实施例中的特征可以相互组合。 考虑到相关技术中, 现有的解锁信息输入较为困难并且需要耗费大量精力去记忆 密码等技术问题, 以下结合实施例提供了相关的解决方案, 现详细说明。 实施例 1 图 1为根据本发明实施例 1的解锁方法的流程图。 如图 1所示, 该方法包括: 步骤 S102, 检测对终端执行的指定动作; 步骤 S104, 在检测到指定动作时, 获取终端预先存储的解锁信息, 其中, 指定动 作与解锁信息相对应; 步骤 S106, 通过解锁信息对终端的指定应用进行解锁。 通过上述各个处理步骤, 由于可以根据对终端执行的指定动作来获取终端自身存 储的相关解锁信息, 因此, 省略了记忆密码的步骤, 提升了用户体验。 在上述处理过程中, 上述指定动作可以为多种实现形式, 例如: 对于设置有重力 传感器或水平传感器的终端, 可以以不同姿势的摇摆动作触发获取上述解锁信息; 对 于设置有触摸屏的终端, 还可以检测在终端的触摸屏上作出的指定滑动轨迹, 在此种 情况下, 可以检测以触摸屏的指定位置为起点作出的上述指定滑动轨迹; 另外, 还可 以考虑利用不同的按键操作来作为上述指定动作: 例如, 利用不同的按键组合, 即组 合按键操作。 对于上述指定动作的不同实现形式, 当采用检测以触摸屏的指定位置为起点作出 的上述指定滑动轨时, 为了便于用户查找上述指定位置, 还需要执行显示上述指定位 置的步骤。 为了进一步保证解锁信息的安全性,上述显示指定位置的区域可以设置为随机的。 步骤 S106的表现形式可以包括但不限于以下两种:第一种,将上述解锁信息显示 给终端用户, 由终端用户根据解锁信息对指定应用进行解锁; 第二种, 根据上述解锁 信息自动对上述指定应用进行解锁。 上述解锁信息可以对多个指定应用进行解锁, 同一个指定动作也可以获取多个解 锁信息, 换而言之, 上述解锁信息对应于多个指定应用, 和 /或, 指定动作对应于多个 解锁信息。 对于上述解锁信息的存储, 可以通过预先在终端中设置实现, 也可以在对终端的 指定应用进行首次解锁时, 存储上述解锁信息。 在本实施例中还提供了一种解锁装置, 用于实现上述实施例及优选实施方式, 已 经进行过说明的不再赘述, 下面对该装置中涉及到的模块进行说明。如以下所使用的, 术语"模块"可以实现预定功能的软件和 /或硬件的组合。 尽管以下实施例所描述的装置 较佳地以软件来实现,但是硬件, 或者软件和硬件的组合的实现也是可能并被构想的。 图 2为根据本发明实施例 1的解锁装置的结构框图。 如图 2所示, 该装置包括: 检测模块 20, 连接至获取模块 22, 设置为检测对终端执行的指定动作; 获取模块 22, 连接至解锁模块 24, 设置为在检测到指定动作时, 获取终端预先存 储的解锁信息, 其中, 指定动作与解锁信息相对应; 解锁模块 24, 设置为通过解锁信息对终端的指定应用进行解锁。 通过上述各个模块实现的功能, 同样可以根据对终端执行的指定动作来获取终端 自身存储的相关解锁信息, 因此, 可以实现省略记忆密码的步骤, 提升用户体验。 在本实施例中, 如图 3所示, 上述检测模块 20包括: 第一检测单元 200, 设置为 在终端包括触摸屏时, 检测在触摸屏上作出的指定滑动轨迹。 在本实施例中, 如图 3所示, 上述检测模块 20还可以包括: 第二检测单元 202, 设置为检测对终端执行的按键操作 为了更好地理解上述实施例 1, 以下结合实施例 2和相关附图详细说明。 以下实 施例的主要设计思想在于, 用户在首次输入密码后, 在系统的一个内存区域将对这一 字段进行保存, 并同时在屏幕的某个区域给出一个显性的位置提示。 当下一次需要用 到密码时, 用户在这个位置(或附近区域), 通过特殊的手势或组合按键等手段, 将密 码取出, 然后进行后续操作。 实施例 2 本实施例提供一种在具有显示屏幕的设备中利用一种隐藏式方法输入解锁信息 (密码) 的方法。 本实施例可以适用于多种屏幕、 多种布局以及多种应用程序, 并不局限于密码的 输入, 对某些需要加密信息的输入, 仍然有效。 上述解锁信息的输入可以分为两个步 骤, 第一步是选择界面上的一个位置, 第二步是从这个位置发起, 用户发起一个系统 可以检测的手段作为输入动作。 这个系统可以检测的手段, 可以是几个按键的组合, 也可以是触摸屏上的手势操作等。 在本实施例中, 用 Android以及触摸屏上的手势操 作作为例子进行说明。 具体如下- 设置存储位置和手势 如图 4所示, 本方案第一步需要设置一个存储位置和手势, 按图 4中的步骤进行 设置: 在 1.1中空白处选择一个位置作为存储位置, 即 1.2, 这个位置并不需要精确到 像素级, 事实上, 为了减少用户的记忆负担, 可以在用户点选的位置适当地扩大有效 区域(当下次需要使用到这个位置时, 在这一片区域内都算作有效的)。然后选择下一 步到达 1.3。 在 1.3 中, 从选择的存储位置为起始点画出一个手势, 系统识别并记忆 ( 1.4)。 系统将把这个起始点和手势保存起来, 在下一次需要输入密码时, 需要用到 本步骤的存储位置和手势。 密码设置界面位置提醒 如图 5所示, 在某个应用中 (或网站登陆等) 将产生密码时, 系统将对这一过程 进行监视, 在输入密码点确定后, 系统会在屏幕的某个位置以一定的显性提示密码的 存储点, 将将当前的密码存储到内存中某一字段或磁盘上的某一文件中 (实际上密码 是存储在内存或硬件文件中的, 但在这里给用户的心理模型就是存储在此界面的这个 位置上的)。 需要说明的是, 给用户显性提示密码的存储点并不是必须的, 因为在图 4 上的步骤可以对位置和手势进行设置, 所以图 5所示流程, 主要起到提示用户"密码已 被系统记录, 下次可以直接取出使用"的作用。 密码输入界面 图 6所示为一个典型的密码输入界面, 需要用户对密码进行输入, 这里需要输入 的密码实际上指的是图 5所示方案中保存起来的密码。 利用手势输入密码 如图 7,使用者先将手指移动到原来的密码区域(即图 4中用户设置的位置或图 5 中显性提示的密码位置), 然后以该区域为起始点划出一定的手势 (图 4 中用户设置 的手势), 见中间图所示。在手势完成后, 首先系统将用户输入的手势与图 4中存储的 手势进行对比, 如果正确, 则从原来保存密码的内存或文件中提取密码, 并填入到输 入框中, 如右图所示。 在此过程中, 如果用户选择的初始位置或画出的手势与图 4中 任意一个不符时, 则认为出错, 不进行输入密码的响应操作。 通过上述实施例可以看出, 上述实施例实现了以下有益效果: 与现有技术相比较,现有技术例如网络浏览器通常有记住密码和保存密码的功能, 但这一功能并不能阻止其它人在使用当前账户时对密码的使用, 其实是相当于泄露了 个人信息。 而通过上述实施例则可以有效地避免此问题, 对个人信息起到安全保护使 用。 而在每次输入密码后的得到的位置可以是随机的, 也在一定程度上能够保障信息 安全。 在另外一个实施例中, 还提供了一种软件, 该软件用于执行上述实施例及优选实 施方式中描述的技术方案。 在另外一个实施例中, 还提供了一种存储介质, 该存储介质中存储有上述软件, 该存储介质包括但不限于: 光盘、 软盘、 硬盘、 可擦写存储器等。 显然, 本领域的技术人员应该明白, 上述的本发明的各模块或各步骤可以用通用 的计算装置来实现, 它们可以集中在单个的计算装置上, 或者分布在多个计算装置所 组成的网络上, 可选地, 它们可以用计算装置可执行的程序代码来实现, 从而, 可以 将它们存储在存储装置中由计算装置来执行, 并且在某些情况下, 可以以不同于此处 的顺序执行所示出或描述的步骤, 或者将它们分别制作成各个集成电路模块, 或者将 它们中的多个模块或步骤制作成单个集成电路模块来实现。 这样, 本发明不限制于任 何特定的硬件和软件结合。 以上仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本领域的技术人 员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和原则之内, 所作的任何 修改、 等同替换、 改进等, 均应包含在本发明的保护范围之内。 TECHNICAL FIELD The present invention relates to the field of information security, and in particular to an unlocking method and apparatus. BACKGROUND OF THE INVENTION With the popularity of computers and networks, more and more people are using computers and networks, with a large number of places where personal information and passwords (or unlocking information) need to be managed. According to the importance of the password, the password can usually be divided into two types, one is important, such as personal banking information, social insurance number, etc., while the other is not so important, such as landing only once in a few years. Forum, network, etc. The number of the latter may be much larger than the former. The current cryptographic mechanism has certain requirements on the number of characters (for example, 6 bits, 8 bits or more), and usually requires special characters, etc., so that the user needs to memorize the above password. However, since the user does not use it frequently for some applications, it is easy to forget the password. Therefore, the existing unlocking method has a certain impact on the user experience. In view of the above problems in the related art, an effective solution has not yet been proposed. SUMMARY OF THE INVENTION In the related art, the existing unlocking information requires a lot of effort to memorize and other technical problems. The embodiment of the present invention provides an unlocking method and apparatus to solve at least the above problems. According to an embodiment of the present invention, an unlocking method is provided, including: detecting a specified action performed on a terminal; acquiring, when the specified action is detected, unlocking information previously stored by the terminal, wherein the specified action corresponds to the unlocking information; Unlock the specified application of the terminal by unlocking the information. Preferably, detecting the specified action performed on the terminal comprises: detecting a specified sliding track made on the touch screen of the terminal. Preferably, detecting the specified sliding track made on the touch screen comprises: detecting a specified sliding track made starting from a specified position of the touch screen. Preferably, before unlocking the specified application of the terminal by using the unlocking information, the method further includes: displaying the specified location. Preferably, the area displaying the specified location is random. Preferably, detecting the specified action performed on the terminal comprises: detecting a key operation performed on the terminal. Preferably, the key operation is a combined key operation. Preferably, the specified application of the terminal is unlocked by the unlocking information, including one of the following: displaying the unlocking information to the terminal user, the terminal user unlocking the specified application according to the unlocking information; and automatically unlocking the specified application according to the unlocking information. Preferably, the unlocking information corresponds to a plurality of designated applications, and/or the specified action corresponds to the plurality of unlocking information. Preferably, before acquiring the unlocking information pre-stored by the terminal, the method further includes: storing the unlocking information when the specified application is unlocked for the first time. According to another embodiment of the present invention, an unlocking apparatus is provided, including: a detecting module, configured to detect a specified action performed on the terminal; and an acquiring module, configured to acquire, before detecting the specified action, acquiring unlocking information pre-stored by the terminal The specified action corresponds to the unlocking information; the unlocking module is configured to unlock the specified application of the terminal by using the unlocking information. Preferably, the detecting module includes: a first detecting unit configured to detect a specified sliding track made on the touch screen when the terminal includes the touch screen. Preferably, the detecting module further includes: a second detecting unit configured to detect a key operation performed on the terminal. The present invention solves the technical problem that the unlocking information pre-stored by the terminal is used to unlock the specified application of the terminal when the specified action is performed on the terminal, and the existing unlocking information needs to be consumed in a large amount. Energy to memory and other technical issues, thus saving the memory of the password and improving the user experience. BRIEF DESCRIPTION OF THE DRAWINGS The accompanying drawings, which are set to illustrate,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, 1 is a flowchart of an unlocking method according to Embodiment 1 of the present invention; FIG. 2 is a block diagram showing the structure of an unlocking apparatus according to Embodiment 1 of the present invention; 3 is a block diagram showing another structure of an unlocking device according to Embodiment 1 of the present invention; FIG. 4 is a schematic diagram showing setting a storage position and a gesture (ie, a sliding track on a touch screen) according to Embodiment 2 of the present invention; FIG. 6 is a schematic diagram of a password input interface according to Embodiment 2 of the present invention; FIG. 7 is a schematic diagram of inputting a password by using a gesture according to Embodiment 2 of the present invention. BEST MODE FOR CARRYING OUT THE INVENTION Hereinafter, the present invention will be described in detail with reference to the accompanying drawings. It should be noted that the embodiments in the present application and the features in the embodiments may be combined with each other without conflict. Considering the related art, the existing unlocking information input is difficult and requires a lot of effort to memorize the technical problems such as the password. The related solutions are provided below in conjunction with the embodiments, and will now be described in detail. Embodiment 1 FIG. 1 is a flowchart of an unlocking method according to Embodiment 1 of the present invention. As shown in FIG. 1 , the method includes: Step S102: Detecting a specified action performed on a terminal; Step S104: Acquire, before detecting a specified action, acquiring unlocking information pre-stored by the terminal, where the specified action corresponds to the unlocking information; S106: Unlock the specified application of the terminal by using the unlocking information. Through the above various processing steps, since the related unlock information stored by the terminal itself can be acquired according to the specified action performed on the terminal, the step of memorizing the password is omitted, and the user experience is improved. In the above process, the specified action may be in various implementation forms, for example: for a terminal provided with a gravity sensor or a level sensor, the unlocking information may be triggered by a rocking action of different postures; for a terminal provided with a touch screen, The specified sliding trajectory made on the touch screen of the terminal can be detected. In this case, the specified sliding trajectory made from the designated position of the touch screen can be detected. In addition, different key operations can be considered as the specified action. : For example, using different key combinations, that is, combining key operations. For the different implementation forms of the above specified actions, when detecting the specified slide track made from the designated position of the touch screen as a starting point, in order to facilitate the user to find the specified position, it is also necessary to perform the step of displaying the specified position. In order to further ensure the security of the unlock information, the above-mentioned area for displaying the specified position may be set to be random. The representation of the step S106 may include, but is not limited to, the following two types: the first type, the unlocking information is displayed to the terminal user, and the terminal user unlocks the specified application according to the unlocking information; Specify the app to unlock. The unlocking information may unlock multiple specified applications, and the same specified action may also acquire multiple unlocking information. In other words, the unlocking information corresponds to multiple specified applications, and/or the specified action corresponds to multiple unlockings. information. The storage of the unlocking information may be implemented by setting in the terminal in advance, or may be stored when the specified application of the terminal is unlocked for the first time. In the embodiment, an unlocking device is also provided for implementing the above-mentioned embodiments and preferred embodiments. The descriptions of the modules and the preferred embodiments have been omitted. The modules involved in the devices are described below. As used hereinafter, the term "module" may implement a combination of software and/or hardware of a predetermined function. Although the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and conceivable. 2 is a block diagram showing the structure of an unlocking apparatus according to Embodiment 1 of the present invention. As shown in FIG. 2, the device includes: a detecting module 20, connected to the obtaining module 22, configured to detect a specified action performed on the terminal; and an obtaining module 22 connected to the unlocking module 24, configured to acquire when the specified action is detected The unlocking information pre-stored by the terminal, wherein the specified action corresponds to the unlocking information; and the unlocking module 24 is configured to unlock the specified application of the terminal by using the unlocking information. Through the functions implemented by the foregoing modules, the related unlocking information stored by the terminal itself can be obtained according to the specified action performed on the terminal. Therefore, the step of omitting the memory password can be implemented to improve the user experience. In this embodiment, as shown in FIG. 3, the foregoing detecting module 20 includes: a first detecting unit 200 configured to detect a specified sliding track made on the touch screen when the terminal includes the touch screen. In this embodiment, as shown in FIG. 3, the foregoing detecting module 20 may further include: a second detecting unit 202 configured to detect a key operation performed on the terminal In order to better understand the above-described Embodiment 1, the following will be described in detail in conjunction with Embodiment 2 and related drawings. The main design idea of the following embodiment is that the user will save this field in a memory area of the system after entering the password for the first time, and at the same time give an explicit position prompt in a certain area of the screen. When the password is needed next time, the user removes the password at this location (or nearby area) by special gestures or combination of buttons, and then performs subsequent operations. Embodiment 2 This embodiment provides a method of inputting unlock information (password) using a hidden method in a device having a display screen. This embodiment can be applied to a variety of screens, multiple layouts, and a variety of applications, and is not limited to the input of passwords, and is still effective for some inputs that require encrypted information. The input of the above unlocking information can be divided into two steps. The first step is to select a location on the interface, and the second step is to initiate from the location, and the user initiates a means that the system can detect as an input action. The means by which the system can detect can be a combination of several buttons, or a gesture operation on a touch screen. In the present embodiment, the gesture operation on Android and the touch screen will be described as an example. The details are as follows - Set the storage location and gestures as shown in Figure 4. The first step of the solution is to set a storage location and gestures. Set according to the steps in Figure 4: Select a location in the blank space in 1.1 as the storage location, ie 1.2 This position does not need to be accurate to the pixel level. In fact, in order to reduce the user's memory burden, the effective area can be appropriately enlarged at the position selected by the user (when the next time you need to use this position, it is counted in this area) Be effective). Then choose the next step to reach 1.3. In 1.3, a gesture is drawn from the selected storage location as the starting point, and the system recognizes and memorizes (1.4). The system will save this starting point and gestures. The next time you need to enter your password, you will need the storage location and gestures for this step. The password setting interface location reminder is shown in Figure 5. When an application (or website login, etc.) will generate a password, the system will monitor the process. After entering the password point, the system will be on the screen. The storage location with a certain explicit prompt password will store the current password in a certain field in the memory or in a file on the disk (actually the password is stored in the memory or hardware file, but here is given The user's mental model is stored at this location on this interface). It should be noted that the storage point for the user to explicitly prompt the password is not necessary, because the steps in FIG. 4 can set the location and the gesture, so the flow shown in FIG. 5 mainly prompts the user that the password has been System records, the next time you can directly remove the use of "the role. Password input interface Figure 6 shows a typical password input interface, which requires the user to input the password. The password that needs to be entered here actually refers to the password saved in the scheme shown in Figure 5. Enter the password using gestures. As shown in Figure 7, the user first moves the finger to the original password area (that is, the position set by the user in Figure 4 or the password position of the explicit prompt in Figure 5), and then draws a certain point from the area. The gesture (the gesture set by the user in Figure 4), as shown in the middle image. After the gesture is completed, the system first compares the gesture input by the user with the gesture stored in FIG. 4. If it is correct, the password is extracted from the memory or file where the password was originally saved, and is filled in the input box, as shown in the right figure. Show. In this process, if the initial position selected by the user or the gesture drawn does not match any of FIG. 4, an error is considered, and a response operation of inputting a password is not performed. As can be seen from the above embodiments, the above embodiments achieve the following beneficial effects: Compared with the prior art, the prior art, such as a web browser, usually has the function of remembering passwords and saving passwords, but this function does not prevent others. The use of a password by a person when using the current account is actually equivalent to revealing personal information. The above embodiment can effectively avoid this problem and provide security protection for personal information. The location obtained after each password entry can be random, and the information security can be guaranteed to a certain extent. In another embodiment, software is also provided for performing the technical solutions described in the above embodiments and preferred embodiments. In another embodiment, a storage medium is provided, the software being stored, including but not limited to: an optical disk, a floppy disk, a hard disk, a rewritable memory, and the like. Obviously, those skilled in the art should understand that the above modules or steps of the present invention can be implemented by a general-purpose computing device, which can be concentrated on a single computing device or distributed over a network composed of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device, such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein. The steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps are fabricated as a single integrated circuit module. Thus, the invention is not limited to any specific combination of hardware and software. The above are only the preferred embodiments of the present invention, and are not intended to limit the present invention, and various modifications and changes can be made to the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims

权 利 要 求 书 Claim
1. 一种解锁方法, 包括: 1. An unlocking method, including:
检测对终端执行的指定动作;  Detecting a specified action performed on the terminal;
在检测到所述指定动作时, 获取所述终端预先存储的解锁信息, 其中, 所 述指定动作与所述解锁信息相对应;  Acquiring the unlocking information pre-stored by the terminal, when the specified action is detected, where the specified action corresponds to the unlocking information;
通过所述解锁信息对所述终端的指定应用进行解锁。  The specified application of the terminal is unlocked by the unlocking information.
2. 根据权利要求 1所述的方法, 其中, 检测对终端执行的指定动作, 包括: 2. The method according to claim 1, wherein detecting a specified action performed on the terminal comprises:
检测在所述终端的触摸屏上作出的指定滑动轨迹。  A specified sliding trajectory made on the touch screen of the terminal is detected.
3. 根据权利要求 2所述的方法,其中,检测在所述触摸屏上作出的指定滑动轨迹, 包括: 3. The method of claim 2, wherein detecting a specified sliding trajectory made on the touch screen comprises:
检测以触摸屏的指定位置为起点作出的所述指定滑动轨迹。  The specified sliding trajectory made starting from a specified position of the touch screen is detected.
4. 根据权利要求 3所述的方法, 其中, 通过所述解锁信息对所述终端的指定应用 进行解锁之前, 还包括: The method of claim 3, wherein before the unlocking information is used to unlock the specified application of the terminal, the method further includes:
显示所述指定位置。  The specified location is displayed.
5. 根据权利要求 4所述的方法, 其中, 显示所述指定位置的区域是随机的。 5. The method according to claim 4, wherein the area in which the specified position is displayed is random.
6. 根据权利要求 1所述的方法, 其中, 检测对终端执行的指定动作, 包括: 6. The method according to claim 1, wherein detecting a specified action performed on the terminal comprises:
检测对所述终端执行的按键操作。  A key operation performed on the terminal is detected.
7. 根据权利要求 6所述的方法, 其中, 所述按键操作为组合按键操作。 7. The method according to claim 6, wherein the button operation is a combined button operation.
8. 根据权利要求 1至 7任一项所述的方法, 其中, 通过所述解锁信息对所述终端 的指定应用进行解锁, 包括以下之一: The method according to any one of claims 1 to 7, wherein the specified application of the terminal is unlocked by the unlocking information, including one of the following:
将所述解锁信息显示给终端用户, 由终端用户根据所述解锁信息对所述指 定应用进行解锁;  And displaying the unlocking information to the terminal user, where the terminal user unlocks the specified application according to the unlocking information;
根据所述解锁信息自动对所述指定应用进行解锁。  The specified application is automatically unlocked according to the unlocking information.
9. 根据权利要求 1至 7任一项所述的方法, 其中, 所述解锁信息对应于多个所述 指定应用, 和 /或, 所述指定动作对应于多个所述解锁信息。 The method according to any one of claims 1 to 7, wherein the unlocking information corresponds to a plurality of the specified applications, and/or the specified action corresponds to a plurality of the unlocking information.
10. 根据权利要求 1至 7任一项所述的方法, 其中, 获取所述终端预先存储的解锁 信息之前, 还包括: The method according to any one of claims 1 to 7, further comprising: before acquiring the unlocking information pre-stored by the terminal,
在对所述指定应用进行首次解锁时, 存储所述解锁信息。  The unlocking information is stored when the specified application is unlocked for the first time.
11. 一种解锁装置, 包括: 11. An unlocking device comprising:
检测模块, 设置为检测对终端执行的指定动作;  a detecting module, configured to detect a specified action performed on the terminal;
获取模块, 设置为在检测到所述指定动作时, 获取所述终端预先存储的解 锁信息, 其中, 所述指定动作与所述解锁信息相对应;  An acquiring module, configured to acquire, before detecting the specified action, the unlocking information pre-stored by the terminal, where the specified action corresponds to the unlocking information;
解锁模块, 设置为通过所述解锁信息对所述终端的指定应用进行解锁。  The unlocking module is configured to unlock the specified application of the terminal by using the unlocking information.
12. 根据权利要求 11所述的装置, 其中, 所述检测模块包括: The device according to claim 11, wherein the detecting module comprises:
第一检测单元, 设置为在所述终端包括触摸屏时, 检测在所述触摸屏上作 出的指定滑动轨迹。  The first detecting unit is configured to detect a specified sliding track made on the touch screen when the terminal includes a touch screen.
13. 根据权利要求 11所述的装置, 其中, 所述检测模块还包括: The device of claim 11, wherein the detecting module further comprises:
第二检测单元, 设置为检测对所述终端执行的按键操作。  The second detecting unit is configured to detect a key operation performed on the terminal.
PCT/CN2013/080322 2012-12-06 2013-07-29 Unlocking method and device WO2013174348A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210519577.4A CN103034441B (en) 2012-12-06 2012-12-06 Unlocking method and device
CN201210519577.4 2012-12-06

Publications (2)

Publication Number Publication Date
WO2013174348A2 true WO2013174348A2 (en) 2013-11-28
WO2013174348A3 WO2013174348A3 (en) 2014-01-16

Family

ID=48021378

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/080322 WO2013174348A2 (en) 2012-12-06 2013-07-29 Unlocking method and device

Country Status (2)

Country Link
CN (1) CN103034441B (en)
WO (1) WO2013174348A2 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103034441B (en) * 2012-12-06 2019-02-01 中兴通讯股份有限公司 Unlocking method and device
CN106304266A (en) * 2015-05-29 2017-01-04 中兴通讯股份有限公司 WLAN method of attachment, mobile terminal and WAP
CN105763714B (en) * 2016-04-05 2020-06-30 北京京东尚科信息技术有限公司 Method and device for unlocking mobile phone screen
CN106714163B (en) * 2016-12-05 2020-07-14 同济大学 Gesture behavior authentication mode construction method and system based on posture change

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646047A (en) * 2012-04-20 2012-08-22 华为终端有限公司 Method for starting application program and terminal device having touch display screen
CN102681785A (en) * 2012-05-13 2012-09-19 曾晖 Unlocking method and mobile equipment
CN103034441A (en) * 2012-12-06 2013-04-10 中兴通讯股份有限公司 Method and device for unlocking

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7533264B2 (en) * 2003-08-20 2009-05-12 Microsoft Corporation Custom security tokens
CN101217375A (en) * 2008-01-16 2008-07-09 陈勇 A saving and acquisition method and device of accounts and passwords
CN101383704A (en) * 2008-04-23 2009-03-11 鲁东大学 Cipher module based on finger print recognition technology
CN101634925A (en) * 2008-07-22 2010-01-27 联想移动通信科技有限公司 Method for unlocking keypad through gestures
CN101916166B (en) * 2010-08-19 2013-12-04 中兴通讯股份有限公司 Method for starting application program and mobile terminal
CN102043587A (en) * 2010-12-23 2011-05-04 东莞宇龙通信科技有限公司 Touch screen unlocking method and mobile terminal

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102646047A (en) * 2012-04-20 2012-08-22 华为终端有限公司 Method for starting application program and terminal device having touch display screen
CN102681785A (en) * 2012-05-13 2012-09-19 曾晖 Unlocking method and mobile equipment
CN103034441A (en) * 2012-12-06 2013-04-10 中兴通讯股份有限公司 Method and device for unlocking

Also Published As

Publication number Publication date
WO2013174348A3 (en) 2014-01-16
CN103034441B (en) 2019-02-01
CN103034441A (en) 2013-04-10

Similar Documents

Publication Publication Date Title
US10798090B2 (en) User authentication method, system for implementing the same, and information communication terminal used in the same
JP5969012B2 (en) Image gesture authentication
US9514297B2 (en) Systems and methods for gesture lock obfuscation
TWI615781B (en) Fingerprint enrollment method, electronic apparatus and non-transitory computer-readable storage medium
US10574647B2 (en) User authentication method and system for implementing same
TWI510954B (en) A method and a device for generating a secret value
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
JP2015528668A (en) Pluggable authentication mechanism for mobile device applications
TWI581122B (en) Electronic device and password inputting method for electronic device
WO2014089993A1 (en) Method and apparatus for unlocking a touch screen
WO2013174348A2 (en) Unlocking method and device
US20150199527A1 (en) Method of inputting confidential data on a terminal
TWI579730B (en) System and method for unlocking screen.
US9858409B2 (en) Enhancing security of a mobile device using pre-authentication sequences
US9781104B2 (en) Working method of dynamic token
WO2016000323A1 (en) Method for operating soft keyboard, terminal and computer readable storage medium
TWI545495B (en) System and method for operating touch screens
JP7021790B2 (en) Providing access to structured stored data
KR102014408B1 (en) Method and computer program for user authentication using image touch password
TW201510762A (en) System and method for unlocking an electronic device
WO2015117364A1 (en) Mobile terminal and password input method therefor
JP2010160664A (en) Display device, and function restriction method and function restriction program for the display device

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13794708

Country of ref document: EP

Kind code of ref document: A2

122 Ep: pct application non-entry in european phase

Ref document number: 13794708

Country of ref document: EP

Kind code of ref document: A2