Unlock instant, AI-driven research and patent intelligence for your innovation.

A method, device and system for obtaining RSA key authorization when a terminal is locked

A terminal and key technology, which is applied to security devices and key distribution, can solve problems such as inconvenient use for users

Active Publication Date: 2018-07-20
GUANGDONG OPPO MOBILE TELECOMM CORP LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in actual use, it may be inconvenient for the user due to various reasons. For example, the user forgets the lock screen password. At this time, the mobile phone is sent to the after-sales service. The after-sales service needs to have other paths for RSA key authorization, and then help the user through ADB. Perform operations such as exporting data, clearing the lock screen password, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for obtaining RSA key authorization when a terminal is locked
  • A method, device and system for obtaining RSA key authorization when a terminal is locked
  • A method, device and system for obtaining RSA key authorization when a terminal is locked

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0137] When the terminal 20 is in an unlocked state, when the terminal 20 is connected to the server 10, the RSA authorization window can be displayed normally, and the user can operate normally to perform RSA key authorization, thereby establishing an ADB connection normally. Normal data interaction can be carried out between.

[0138] However, when the terminal 20 is in the locked state, when the terminal 20 is connected to the server 10, the RSA authorization window is blocked, so that the server 10 cannot obtain the data of the terminal 20, in order to protect user data or privacy, it needs to be unlocked first. Perform related operations on the RSA authorization window to obtain RSA authorization. However, if the user forgets the unlock password of the terminal 20 and cannot unlock it, this embodiment can provide a method for obtaining RSA key authorization when the terminal 20 is locked, so that the terminal 20 can obtain the RSA key when the screen is locked. key autho...

Embodiment 2

[0167] Please refer to image 3 , image 3 It is a flow chart of the method for obtaining RSA key authorization when the terminal 20 is locked on the screen in the second embodiment. The method includes:

[0168] Step S110 , the terminal 20 establishes a communication connection with the server 10 .

[0169] There are many ways to realize the communication connection between the terminal 20 and the server 10, and the most common ones are wired connection and wireless connection. Wireless connections include Bluetooth, NFC (Near Field Communication, near field communication) and the like. What this embodiment adopts is the wired connection mode, what use is to connect to server 10 by data wire, what data wire adopts is USB data wire, connect terminal 20 and USB interface 15 of server 10 respectively by data wire, realize communication connection and data communication.

[0170] Step S120, inputting a control instruction for acquiring the first encrypted data.

[0171] Whe...

Embodiment 3

[0194] In the first embodiment and the second embodiment, if the terminal 20 does not enable the USB function debugging function, the terminal 20 and the server 10 cannot establish a USB communication connection, cannot establish a specific message channel, and cannot transmit unique characteristic information such as the terminal 20 , the first encrypted data of the server 10 and other data. Therefore, when the terminal 20 is in the locked state and the USB function debugging function is not enabled, a method capable of enabling the USB function debugging function in the locked state is required.

[0195] Please refer to Figure 4 , Figure 4 A flow chart of a method for obtaining RSA key authorization when the terminal 20 is locked on the screen in the third embodiment.

[0196] Step S110 , the terminal 20 establishes a communication connection with the server 10 .

[0197] The terminal 20 is connected to the server 10 through a data line, and the data line is a USB data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, device and system for acquiring RSA secret key authorization when a terminal is locked. The method includes the steps that first encrypted data which are led into the terminal and original data before encryption are acquired, the first encrypted data and the original data are matched, if the first encrypted data and the original data are successfully matched, RSA secret key authorization is conducted on the terminal, or else RSA secret key authorization is not conducted on the terminal. RSA secret key authorization can be automatically conducted on the terminal by matching data information of the terminal and data information of a server under the condition that the terminal does not need to be unlocked when the terminal is locked and an RSA authorization window cannot be popped up, ADB connection is established, data are led out or a locking password of the terminal is removed through the ADB connection, the terminal can be unlocked without refurbishment or other complex modes, use is more convenient, and the requirements of users are met.

Description

technical field [0001] The invention relates to the field of data security protection of intelligent terminals, in particular to a method, device and system for obtaining RSA key authorization when a terminal is locked. Background technique [0002] Android system, also known as Android system, is a free and open source operating system based on Linux, mainly used in mobile devices and various intelligent terminals, such as smart phones and tablet computers, led by Google and the Open Handset Alliance develop. At present, Google has updated and added RSA key authorization in the new version of the Android system. The smart terminal installed with the Android system can only establish an ADB (Android Debug Bridge, Android Debug Bridge) connection normally if it is authorized by the RSA key. Among them, we can debug Android programs through ADB, which is a debugging tool for Android systems. [0003] When the smart terminal is in the locked state or the locked screen state, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08H04W12/04
Inventor 鲁强余骢骢
Owner GUANGDONG OPPO MOBILE TELECOMM CORP LTD