A method, device and system for obtaining RSA key authorization when a terminal is locked
A terminal and key technology, which is applied to security devices and key distribution, can solve problems such as inconvenient use for users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0137] When the terminal 20 is in an unlocked state, when the terminal 20 is connected to the server 10, the RSA authorization window can be displayed normally, and the user can operate normally to perform RSA key authorization, thereby establishing an ADB connection normally. Normal data interaction can be carried out between.
[0138] However, when the terminal 20 is in the locked state, when the terminal 20 is connected to the server 10, the RSA authorization window is blocked, so that the server 10 cannot obtain the data of the terminal 20, in order to protect user data or privacy, it needs to be unlocked first. Perform related operations on the RSA authorization window to obtain RSA authorization. However, if the user forgets the unlock password of the terminal 20 and cannot unlock it, this embodiment can provide a method for obtaining RSA key authorization when the terminal 20 is locked, so that the terminal 20 can obtain the RSA key when the screen is locked. key autho...
Embodiment 2
[0167] Please refer to image 3 , image 3 It is a flow chart of the method for obtaining RSA key authorization when the terminal 20 is locked on the screen in the second embodiment. The method includes:
[0168] Step S110 , the terminal 20 establishes a communication connection with the server 10 .
[0169] There are many ways to realize the communication connection between the terminal 20 and the server 10, and the most common ones are wired connection and wireless connection. Wireless connections include Bluetooth, NFC (Near Field Communication, near field communication) and the like. What this embodiment adopts is the wired connection mode, what use is to connect to server 10 by data wire, what data wire adopts is USB data wire, connect terminal 20 and USB interface 15 of server 10 respectively by data wire, realize communication connection and data communication.
[0170] Step S120, inputting a control instruction for acquiring the first encrypted data.
[0171] Whe...
Embodiment 3
[0194] In the first embodiment and the second embodiment, if the terminal 20 does not enable the USB function debugging function, the terminal 20 and the server 10 cannot establish a USB communication connection, cannot establish a specific message channel, and cannot transmit unique characteristic information such as the terminal 20 , the first encrypted data of the server 10 and other data. Therefore, when the terminal 20 is in the locked state and the USB function debugging function is not enabled, a method capable of enabling the USB function debugging function in the locked state is required.
[0195] Please refer to Figure 4 , Figure 4 A flow chart of a method for obtaining RSA key authorization when the terminal 20 is locked on the screen in the third embodiment.
[0196] Step S110 , the terminal 20 establishes a communication connection with the server 10 .
[0197] The terminal 20 is connected to the server 10 through a data line, and the data line is a USB data ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


