Search

EP-4273721-B1 - ELECTRONIC DEVICE UNLOCKING METHOD AND DEVICE RELATED THERETO

EP4273721B1EP 4273721 B1EP4273721 B1EP 4273721B1EP-4273721-B1

Inventors

  • SHI, CHUNLEI
  • MA, XIAOSHUANG

Dates

Publication Date
20260506
Application Date
20220307

Claims (12)

  1. An electronic device unlocking method, applied to a first electronic device (10) and applied to a scenario in which the first electronic device (10) performs projection on a second electronic device (11), wherein the method comprises: receiving (303) operation information sent by the second electronic device (11), wherein the operation information indicates to open a to-be-unlocked object, wherein the operation information comprises a device identifier of the second electronic device; receiving (304) unlocked target information which indicates a to-be-unlocked object of the first electronic device; determining an authentication manner supported by the second electronic device based on the device identifier of the second electronic device, wherein the first electronic device presets different authentication manners for different to-be-unlocked objects; sending (308) first information to the second electronic device (11) when determining, based on the operation information, to unlock a to-be-unlocked object of the first electronic device (10), wherein the first information is used by the second electronic device (11) to collect authentication information required for unlocking the to-be-unlocked object; obtaining (313) the authentication information from the second electronic device (11) to perform authentication of a user; and unlocking (315) the to-be-unlocked object of the first electronic device (10) when the authentication of the user succeeds, wherein the first information is used to determine a target authentication information collector of the second electronic device (11), and the target authentication information collector is configured to collect the authentication information, wherein the first information comprises: a target authentication type corresponding to an authentication manner for unlocking the to-be-unlocked object, wherein the target authentication type is used by the second electronic device (11) to determine the target authentication information collector; and/or an identifier of the target authentication information collector.
  2. The electronic device unlocking method according to claim 1, wherein the obtaining the authentication information from the second electronic device to perform authentication of a user comprises: obtaining the authentication information from the second electronic device based on a password authentication protocol to perform authentication of the user.
  3. The electronic device unlocking method according to claim 2, wherein the obtaining the authentication information from the second electronic device based on a password authentication protocol to perform authentication of the user comprises: receiving (502) a remote attestation credential that is of the user and that is sent by the second electronic device, wherein the remote attestation credential comprises a salt value and a first base value; generating (503) a first public key and a first private key based on the first base value; generating (504) a random number as a first challenge value; sending (505) the salt value, the first public key, and the first challenge value to the second electronic device; receiving (511) a second public key, a second challenge value, and first signature data that are sent by the second electronic device, wherein the second public key is generated by the second electronic device based on a second base value, the second base value is generated by the second electronic device based on the salt value and the authentication information, the second challenge value is a random number generated by the second electronic device, the first signature data is generated by the second electronic device by performing signing on the first challenge value and the second challenge value using a first key, the first key is obtained by the second electronic device by performing an operation on a second private key and the first public key, and the second private key is generated by the second electronic device based on the second base value; performing (512) an operation on the first private key and the second public key to obtain a second key; performing (513) signing on the first challenge value and the second challenge value using the second key, to generate second signature data; and determining (514) an authentication result based on the first signature data and the second signature data.
  4. The electronic device unlocking method according to claim 1, wherein before the obtaining the authentication information from the second electronic device to perform authentication of a user, the method further comprises: receiving (501) an authentication request sent by the second electronic device.
  5. The electronic device unlocking method according to claim 1, wherein before the sending first information to the second electronic device, the method further comprises: determining an authentication manner used by the first electronic device; and determining a first authentication manner that is used by the first electronic device and supported by the second electronic device as the authentication manner for unlocking the to-be-unlocked object.
  6. The electronic device unlocking method according to claim 5, wherein the determining, based on the device identifier of the second electronic device, the authentication manner supported by the second electronic device comprises: obtaining collector information of the second electronic device based on the device identifier of the second electronic device, wherein the collector information of the second electronic device indicates an authentication information collector comprised in the second electronic device; and determining, based on the collector information of the second electronic device, the authentication manner supported by the second electronic device.
  7. The electronic device unlocking method according to claim 6, wherein the determining, based on the collector information of the second electronic device, the authentication manner supported by the second electronic device comprises: when determining, based on the collector information of the second electronic device, that the second electronic device comprises a face image collector, and/or a fingerprint collector, and/or a password collector, determining that the authentication manner supported by the second electronic device comprises password authentication, and/or fingerprint authentication, and/or face authentication.
  8. The electronic device unlocking method according to claim 5, wherein if a plurality of authentication manners are used by the first electronic device and supported by the second electronic device, the first authentication manner is an authentication manner with a highest priority in the plurality of authentication manners.
  9. The electronic device unlocking method according to claim 1, wherein the authentication manner for unlocking the to-be-unlocked object is password authentication, and the target authentication type is a four-digit numerical password, a six-digit numerical password, a user-defined numerical password, a pattern lock, or a hybrid password; the authentication manner for unlocking the to-be-unlocked object is face authentication, and the target authentication type is 2D face authentication or 3D face authentication; or the authentication manner for unlocking the to-be-unlocked object is fingerprint authentication, and the target authentication type is an in-screen fingerprint, a side fingerprint, or an under-screen fingerprint.
  10. An electronic device unlocking method, applied to a second electronic device (11), wherein the method comprises: sending (402) operation information of a user operation performed by using the second electronic device (11) to a first electronic device (10), wherein the user operation triggers unlocking of a to-be-unlocked object of the first electronic device (10), and the operation information comprises a device identifier of the second electronic device; receiving (407) first information from the first electronic device (10), wherein the first information is sent when the first electronic device (10) determines, based on the device identifier of the second electronic device, an authentication manner supported by the second electronic device, and determines, based on the operation information, to unlock the to-be-unlocked object of the first electronic device (10), and is used by the second electronic device (11) to collect authentication information required for unlocking the to-be-unlocked object; collecting (410), based on the first information, the authentication information required for unlocking the to-be-unlocked object; and providing (412) the authentication information to the first electronic device (10) to perform authentication of a user, wherein a result of the authentication of the user is used to determine whether to unlock the to-be-unlocked object, wherein the first information is used to determine a target authentication information collector of the second electronic device (11), and the target authentication information collector is configured to collect the authentication information, wherein the first information comprises: a target authentication type corresponding to an authentication manner for unlocking the to-be-unlocked object, wherein the target authentication type is used by the second electronic device (11) to determine the target authentication information collector; and/or an identifier of the target authentication information collector.
  11. A computer-readable storage medium, comprising computer instructions, wherein when the computer instructions are run on an electronic device, the electronic device is enabled to perform the electronic device unlocking method according to any one of claims 1 to 10.
  12. An electronic device (70), wherein the electronic device (70) comprises a processor (708) and a memory (702), the memory (702) is configured to store instructions, and the processor (708) is configured to invoke the instructions in the memory (702), to enable the electronic device (70) to perform the electronic device unlocking method according to any one of claims 1 to 10.

Description

TECHNICAL FIELD This application relates to the field of terminal technologies, and in particular, to an electronic device unlocking method, a computer-readable storage medium, and an electronic device. BACKGROUND In a distributed scenario, there are more scenarios for collaborative application between devices, and hardware mutual assistance and file sharing between devices become more frequent. For a security reason, when a device A (such as a computer) performs multi-screen collaboration with a device B (such as a mobile phone), and the device B enters a lock screen status, a user needs to perform an unlocking operation on the device B. Currently, this unlocking manner is inefficient and inconvenient for user operation. CN 107 153 534 A discloses an information processing method and a first electronic device. US 5 784 566 A discloses a system and a method for selecting and initiating security services for communication across computer networks. SUMMARY This application discloses an electronic device unlocking method, a computer-readable storage medium, and an electronic device, as defined in the appended set of claims, so that a first electronic device can be unlocked on a second electronic device, thereby ensuring unlocking security and convenience. According to a first aspect, this application discloses an electronic device unlocking method according to claim 1. The user inputs the authentication information on the second electronic device, and the first electronic device unlocks the first electronic device based on the authentication information inputted on the second electronic device, thereby ensuring unlocking security and convenience. In some optional implementations, the to-be-unlocked object is a screen of the first electronic device or a target application of the first electronic device, and the target application is a padlocked application. In some optional implementations, the determining, based on the operation information, to unlock a to-be-unlocked object of the first electronic device includes: determining that the operation information indicates to unlock the screen of the first electronic device; ordetermining that the operation information indicates to open the target application. In some optional implementations, the obtaining the authentication information from the second electronic device to perform authentication of a user includes: obtaining the authentication information from the second electronic device based on a password authentication protocol to perform authentication of the user. In some optional implementations, the obtaining the authentication information from the second electronic device based on a password authentication protocol to perform authentication of the user includes: receiving a remote attestation credential that is of the user and that is sent by the second electronic device, where the remote attestation credential includes a salt value and a first base value;generating a first public key and a first private key based on the first base value;generating a random number as a first challenge value;sending the salt value, the first public key, and the first challenge value to the second electronic device;receiving a second public key, a second challenge value, and first signature data that are sent by the second electronic device, where the second public key is generated by the second electronic device based on a second base value, the second base value is generated by the second electronic device based on the salt value and the authentication information, the second challenge value is a random number generated by the second electronic device, the first signature data is generated by the second electronic device by performing signing on the first challenge value and the second challenge value using a first key, the first key is obtained by the second electronic device by performing an operation on a second private key and the first public key, and the second private key is generated by the second electronic device based on the second base value;performing an operation on the first private key and the second public key to obtain a second key;performing signing on the first challenge value and the second challenge value using the second key, to generate second signature data; anddetermining an authentication result based on the first signature data and the second signature data. In some optional implementations, before the obtaining the authentication information from the second electronic device to perform authentication of a user, the method further includes: receiving an authentication request sent by the second electronic device. In some optional implementations, before the sending first information to the second electronic device, the method further includes: determining the authentication manner for unlocking the to-be-unlocked object. In some optional implementations, the determining the authentication manner for unlocking the to-be-unlocked object includes: