Unlock instant, AI-driven research and patent intelligence for your innovation.

Data processing method, device, terminal and storage medium

A data processing and terminal technology, applied in network data management, security devices, secure communication devices, etc., can solve problems such as theft, insecurity, and poor user experience, and achieve the effect of increasing security

Active Publication Date: 2019-01-04
XIAN ZHONGXING NEW SOFTWARE
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, users need to go to the store or obtain the unlock code through the Internet, which is very troublesome and the user experience is poor.
[0003] In addition, it is not safe to store the unlocking parameters in the mobile terminal or server. If the unlocking parameters are stored in the mobile terminal, there is a risk of being stolen. Even if the unlocking parameters are encrypted, criminals may still steal the encrypted unlocking parameters. parameters to crack
If the unlocking parameters are stored in the server, the unlocking parameters may still be tampered with when the server sends the unlocking parameters to the mobile terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method, device, terminal and storage medium
  • Data processing method, device, terminal and storage medium
  • Data processing method, device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] A data processing method provided in this embodiment, figure 1 It is a schematic diagram of the implementation flow of a data processing method in the embodiment of the present invention Figure 1 ,Such as figure 1 As shown, the method includes:

[0065] Step S101, the terminal generates a lock flag and unlock parameters based on the lock object according to the user's lock operation;

[0066] Here, the user performs a locking operation on the locked object on the terminal, and the terminal generates a locking flag and an unlocking parameter according to the user's locking operation. The locked object may be a communication network provided by an operator, a private application such as a secure payment application, or a user's private data. Correspondingly, the locking operation may be a network locking operation, a private application locking operation, or a private data locking operation.

[0067] Here, the setting operation is included before the locking operatio...

Embodiment 2

[0081] This embodiment provides a data processing method, figure 2 It is a schematic diagram of the implementation flow of a data processing method in the embodiment of the present invention Figure II ,Such as figure 2 As shown, the method includes:

[0082] Step S201, when the terminal meets the preset third condition, sending a message that the terminal meets the preset third condition to the server;

[0083] Here, the preset third condition is the third condition set by the user in step S101, and the message that the terminal meets the preset third condition includes the terminal identifier of the terminal.

[0084] It should be understood that step S201 can be applied to a variety of different scenarios during the specific implementation process. The following will introduce it in detail based on the introduction of several scenarios. Of course, it can also be applied to other different scenarios during the specific implementation process. The scenarios are not limit...

Embodiment 3

[0103] This embodiment provides a data processing method, image 3 It is a schematic diagram of the implementation flow of a data processing method in the embodiment of the present invention Figure three ,Such as image 3 As shown, the method includes:

[0104] Step S301, when the terminal meets the preset third condition, sending a message that the terminal meets the preset third condition to the server;

[0105] Step S302, receiving the first parameter of the unlocking object and the first secret key of the unlocking object issued by the server;

[0106] It should be understood that step S301 is similar to step S201, and step S302 is similar to step S202, so details are not described here.

[0107] Step S303, reading the first parameter from the storage area on the modem side;

[0108] It should be understood that the first parameter and the first secret key issued by the server in step S302 are received by the modem processor in the terminal. The terminal stores the f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present invention provide a data processing method, a data processing apparatus, a terminal, and a storage medium. The method includes the following steps that: the first parameter of an unlocking object and the first key of the unlocking object which are issued by a server are received, wherein the first parameter and the first key are used to judge whether a terminal satisfies a data parsing condition; the second parameter of the unlocking object and the second key of the unlocking object which are located in the terminal are obtained; when the first parameter and thesecond parameter satisfy a preset first condition, and the first key and the second key satisfy a preset second condition, the unlocking object is unlocked.

Description

technical field [0001] The present invention relates to the technology in the field of mobile communication, and in particular to a data processing method and its device, terminal, and storage medium. Background technique [0002] With the development and evolution of smart mobile terminals, the mobile terminals support more and more functions. However, many functions on the mobile terminal need to be locked because they involve user privacy or require the authorization of the communication operator. For example, privacy application locking, user privacy data locking, and network locking technology, etc. In the process of locking and unlocking, it is necessary to use security data information such as secret keys, locking parameters, and unlocking parameters. Taking the unlocking network as an example, after the operator locks the network, the mobile terminal will generate a lock flag and unlock information. The unlock information includes unlock parameters. In the prior ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W8/24H04W12/02H04W12/04H04W12/03
CPCH04L63/0478H04L63/06H04W8/245H04W12/02H04W12/04H04L9/08H04W8/24H04L9/40
Inventor 魏明业
Owner XIAN ZHONGXING NEW SOFTWARE