Method and system for decryption of user terminal

A user terminal and user technology, applied in the field of mobile communication, can solve the problem of time-consuming, labor-intensive and insecure decryption, and achieve the effect of saving unlocking time, ensuring security, and ensuring data security.

Pending Publication Date: 2017-11-21
ZTE CORP
View PDF11 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem solved by the present invention is to provide a decryption method for a user terminal to solve the problem of time-consuming and labor-intensive decryption after the current user forgets the terminal password.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for decryption of user terminal
  • Method and system for decryption of user terminal
  • Method and system for decryption of user terminal

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0038] Embodiment 1 of the present invention provides a decryption method for a user terminal, such as figure 1 Shown is the flowchart of the first embodiment of the present invention, specifically including,

[0039] Step S101, when the user forgets the user terminal password, the user terminal prompts the user to decrypt, and receives the user's start decryption instruction to start decryption;

[0040] As an embodiment, when the user forgets the password of the user terminal, the words "forgot password" are displayed on the lock screen interface of the user terminal to prompt the user to click, and the decryption starts after receiving the user's click instruction.

[0041] Step S102, the user terminal internally generates verification code information, and prompts the user for the verification code information;

[0042] As an example, the verification code information generated inside the user terminal is a random digital verification code, and different algorithms may be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides a method for decryption of a user terminal. The method comprises: when a user forgets a user terminal password, a user terminal prompts the user to perform decryption and receives a user decryption starting instruction to start decryption; identifying code information is generated in the user terminal, and the identifying code information is configured to prompt the user; the user terminal detects the received data information, extracts data information content and verify whether the data information content accords with the identifying code information or not; and when it is detected that the data information content accords with the identifying code information, the user terminal unlocks and clear the passwords of the user terminal. The present invention further provides the decryption system of a user terminal. According to the technical scheme, when a user forgets passwords, the method and system for decryption of the user terminal can conveniently perform unlocking so as to save the unlocking time, improve the efficiency and ensure the date safety; and moreover, multiple safety measures are employed to avoid illegal unlocking and effectively guarantee safety.

Description

technical field [0001] The invention relates to the field of mobile communication, in particular to a decryption method and system for a user terminal. Background technique [0002] At present, people use user terminals in their daily life, especially mobile terminals, which are becoming more and more common, and the usage time is getting longer and longer. With the popularization of smart terminals, in order to ensure the privacy of the terminal, people's encryption methods for user terminals are not limited to setting numeric or alphanumeric passwords, and various screen locking methods continue to appear, such as pattern unlocking, PIN unlocking, password unlock etc. Usually, after the user sets the unlocking method on the terminal, it often happens that the unlocking pattern or unlocking password is forgotten. In order to use the terminal equipment normally, the user needs to go to the after-sales service organization of the terminal to contact and lock it, which not o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32G06F21/31
CPCG06F21/31H04L9/3228H04L9/3271H04L9/32
Inventor 郭靖东
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products