CN109033795B - Method for unlocking terminal with camera and terminal - Google Patents

Method for unlocking terminal with camera and terminal Download PDF

Info

Publication number
CN109033795B
CN109033795B CN201810820997.3A CN201810820997A CN109033795B CN 109033795 B CN109033795 B CN 109033795B CN 201810820997 A CN201810820997 A CN 201810820997A CN 109033795 B CN109033795 B CN 109033795B
Authority
CN
China
Prior art keywords
terminal
camera
pattern information
user
screen locking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810820997.3A
Other languages
Chinese (zh)
Other versions
CN109033795A (en
Inventor
张超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Mobile Communications Technology Co Ltd
Original Assignee
Hisense Mobile Communications Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Mobile Communications Technology Co Ltd filed Critical Hisense Mobile Communications Technology Co Ltd
Priority to CN201810820997.3A priority Critical patent/CN109033795B/en
Publication of CN109033795A publication Critical patent/CN109033795A/en
Application granted granted Critical
Publication of CN109033795B publication Critical patent/CN109033795B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • H04M1/0202Portable telephone sets, e.g. cordless phones, mobile phones or bar type handsets
    • H04M1/026Details of the structure or mounting of specific components
    • H04M1/0264Details of the structure or mounting of specific components for a camera module assembly
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The invention relates to the technical field of terminals, in particular to a method and a terminal for unlocking a terminal with a camera, which are used for solving the problems that in the prior art, after a user forgets a screen locking password, the password can only be cleared in a flashing mode, and data on a mobile phone cannot be reserved. The method of the invention comprises the following steps: after the terminal receives a scanning instruction in a screen locking state, scanning pattern information through a camera; if the terminal analyzes the terminal identification through the scanned pattern information, comparing the analyzed terminal identification with the prestored terminal identification; and if the analyzed terminal identification is the same as the pre-stored terminal identification, the terminal releases the screen locking state. According to the invention, the screen locking password is deleted only when the analyzed terminal identifier is the same as the pre-stored terminal identifier, so that higher safety guarantee can be provided, the screen locking password is not required to be refreshed, other data in the mobile phone can be retained while the screen locking password is cleared, and the method is more convenient and faster.

Description

Method for unlocking terminal with camera and terminal
Technical Field
The invention relates to the technical field of terminals, in particular to a method and a terminal for unlocking a terminal with a camera.
Background
In order to prevent misoperation in a dormant state, the original smart phone is provided with a screen locking password, the screen is locked to enable the smart phone to enter a locked state, and the smart phone can be operated after being unlocked. Along with the rapid development of mobile phone intellectualization, the mobile phone unlocking mode is more and more diversified and more convenient. At present, most mobile phones have fingerprint identification, and some mobile phones can realize facial identification unlocking, so that a user needs to set a screen locking password in advance before initially inputting fingerprint and facial information. The situation that a user forgets a screen locking password frequently occurs when the user uses the fingerprint to unlock the mobile phone for a long time, but the user needs to unlock the mobile phone by inputting the screen locking password after the mobile phone is turned off and restarted every time, and once the user forgets the screen locking password, the mobile phone cannot be unlocked.
In the prior art, if a user forgets a screen locking password and cannot unlock the mobile phone, the problem is mainly solved by flashing the mobile phone. One method is that corresponding software is downloaded at a computer end, then a mobile phone is connected with the computer end through a USB (Universal Serial BUS) data line, and the mobile phone is refreshed by using the software at the computer end; the other method is to directly refresh the mobile phone. The two methods can solve the problem of unlocking the mobile phone, but all data on the mobile phone is also cleared.
To sum up, at present, after a user forgets a screen locking password, the user can only unlock the mobile phone in a flashing mode, and data on the mobile phone cannot be reserved.
Disclosure of Invention
The invention provides a method and a terminal for unlocking a terminal with a camera, which are used for solving the problems that in the prior art, a user can only unlock the terminal by a flashing mode after forgetting a screen locking password and cannot keep data on a mobile phone.
In a first aspect, a method for unlocking a terminal including a camera provided in an embodiment of the present invention includes:
after the terminal receives a scanning instruction in a screen locking state, scanning pattern information through a camera; if the terminal analyzes the terminal identification through the scanned pattern information, comparing the analyzed terminal identification with the prestored terminal identification; and if the analyzed terminal identification is the same as the pre-stored terminal identification, the terminal releases the screen locking state.
According to the method for the pre-stored terminal identification, the pattern information is scanned through the camera after the terminal receives the scanning instruction in the screen locking state, so that the terminal identification is analyzed and compared with the pre-stored terminal identification, the screen locking state can be released only when the analyzed terminal identification is the same as the pre-stored terminal identification, higher safety guarantee can be provided, the screen locking state can be directly released without flashing, data in a mobile phone are reserved simultaneously, and the method is more convenient and fast. In a possible implementation manner, after the terminal receives the scanning instruction in the screen locking state, the terminal scans the pattern information through a camera, including:
the terminal starts a camera after receiving a scanning instruction in a screen locking state, and scans pattern information through the camera;
or the terminal determines that pattern information exists in the view-finding frame through the camera in the screen locking state, prompts a user whether to scan or not, and after receiving a scanning instruction, scans the pattern information through the camera.
According to the method, the terminal starts the camera after receiving the scanning instruction in the screen locking state, pattern information can be directly scanned through the camera, and the camera can also be used for determining that the pattern information exists in the view-finding frame and then scanning, so that a user is prompted to select whether unlocking is needed conveniently, and the method is more independent.
In a possible implementation manner, if the analyzed terminal identifier is the same as the pre-stored terminal identifier, after the terminal releases the screen locking state, the method further includes:
and the terminal deletes the original lock screen password.
According to the method, when the analyzed terminal identification is the same as the prestored terminal identification, the terminal releases the screen locking state and deletes the original screen locking password, and the method is more convenient and faster.
In a possible implementation manner, the parsing, by the terminal, a terminal identifier according to the scanned pattern information includes:
the terminal analyzes the scanned pattern information to obtain encrypted data; and the terminal decrypts the encrypted data to obtain the terminal identification.
According to the method, the data after the terminal identification is encrypted can be obtained by analyzing the scanned pattern information, the terminal identification is the unique identification code of the mobile phone, the uniqueness of the pattern information can be guaranteed, the screen locking password can be cleared only by scanning the pattern information, and meanwhile, the pattern information is obtained after the terminal identification is encrypted, so that the safety is enhanced.
In a possible implementation manner, after the terminal compares the analyzed terminal identifier with the pre-stored terminal identifier, the method further includes:
and if the analyzed terminal identification is different from the pre-stored terminal identification, the terminal prompts the user that the verification fails.
According to the method, the analyzed terminal identification is not consistent with the pre-stored terminal identification according to comparison, the fact that the pattern information scanned by the user is not of the mobile phone can be known, and the user can be reminded to check whether the scanned information is wrong or not by prompting that the verification of the user fails through the terminal.
In a second aspect, an embodiment of the present invention further provides a terminal for unlocking, where the terminal includes: a processor, a memory and a camera, wherein the memory stores program code that, when executed by the processor, causes the terminal to perform the following:
after receiving a scanning instruction in a screen locking state, scanning pattern information through a camera; analyzing a terminal identifier through the scanned pattern information, and comparing the analyzed terminal identifier with a prestored terminal identifier; and if the analyzed terminal identification is the same as the pre-stored terminal identification, the screen locking state is released.
In one possible implementation, the processor is configured to:
after receiving a scanning instruction in a screen locking state, starting a camera, and scanning pattern information through the camera;
or after receiving the scanning instruction in the screen locking state, prompting whether the user scans after determining that the pattern information exists in the view-finding frame through the camera in the screen locking state, and after receiving the scanning instruction, scanning the pattern information through the camera.
In one possible implementation, the processor is configured to:
and if the analyzed terminal identification is the same as the pre-stored terminal identification, deleting the original screen locking password after the screen locking state of the terminal is released.
In one possible implementation, the processor is configured to:
analyzing the scanned pattern information to obtain encrypted data; and decrypting the encrypted data to obtain the terminal identification.
In one possible implementation, the processor is further configured to:
and after comparing the analyzed terminal identification with the prestored terminal identification, if the analyzed terminal identification is different from the prestored terminal identification, prompting the user that the verification fails.
In a third aspect, an embodiment of the present invention further provides a terminal for unlocking a terminal including a camera, where the terminal includes: the terminal comprises an operation module, a comparison module and a display module, and the terminal has the functions of realizing the embodiments of the first aspect.
In a fourth aspect, the present application also provides a computer storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of the method of the first aspect.
In addition, for technical effects brought by any one implementation manner of the second aspect to the fourth aspect, reference may be made to technical effects brought by different implementation manners of the first aspect, and details are not described here.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic diagram of a method for unlocking according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a flow operation related to the generation of pattern information according to an embodiment of the present invention;
fig. 3A is a schematic diagram of a method for triggering and opening a camera by a sliding touch operation of a special symbol according to an embodiment of the present invention;
fig. 3B is a schematic diagram of a method for triggering and opening a camera by a single-finger upward sliding touch operation according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a text prompt for prompting a user whether to scan according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a text prompt when the user authentication failure times do not reach the threshold value according to the embodiment of the present invention;
fig. 6 is a schematic diagram of a text prompt when the number of user authentication failures reaches a threshold value according to an embodiment of the present invention;
fig. 7 is a schematic diagram illustrating a related flow operation of a method for unlocking according to an embodiment of the present invention; fig. 8 is a schematic structural diagram of a first unlocking terminal according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a second unlocking terminal according to the embodiment of the present invention;
fig. 10 is a schematic structural diagram of a third terminal for unlocking according to the embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Some of the words that appear in the text are explained below:
1. the "terminal" referred to in the embodiments of the present invention refers to a computer device that can be used in a mobile environment, that is, a mobile phone, a tablet, and the like.
2. The "terminal Identifier" referred in the embodiment of the present invention refers to a unique Identifier of a terminal, such as an IMEI (International Mobile Equipment identity Number), an IMSI (International Mobile Subscriber identity Number), an ESN (Electronic Serial Number), an MEID (Mobile Equipment identity), and the like.
3. The "pattern information" referred to in the embodiments of the present invention refers to a kind of figure, such as a one-dimensional barcode, a two-dimensional barcode, and the like, which can represent the terminal identifier.
4. The coding system referred in the embodiment of the invention, namely the arrangement rule of the bar code bars and the spaces, comprises the following steps: EAN Code (European Article Number, European Article barcode), Code 39, cross Code 25, UPC Code (Universal Product Code), Code 128, Code 93, and Codabar, etc., and commonly used two-dimensional bar codes have a Code system including: PDF417(Portable Data Files), QRCode (quick Response Code), Code 49, Code16K, Code One, and the like.
5. In the embodiment of the present application, the term "and/or" describes an association relationship of associated objects, and means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
6. The 'screen locking' referred by the embodiment of the invention is generally divided into two types, one type is computer screen locking, and the other type is mobile phone screen locking. The screen locking is used for protecting the data security of the system, and the screen locking of the mobile phone is used for preventing mistaken touch and mistaken pressing besides protecting the data security.
7. The "unlocked state" referred to in the embodiments of the present invention is a state in which the restriction of the mobile communication device on the operating network is released by software or hardware means.
8. The "screen locking state" referred to in the embodiments of the present invention refers to a state in which the mobile communication device is in a locked interface when the screen is lit.
The embodiments of the present invention will be described in further detail with reference to the drawings attached hereto.
As shown in fig. 1, an embodiment of the present invention provides an unlocking method, which specifically includes the following steps:
step 100, after receiving a scanning instruction in a screen locking state, the terminal scans pattern information through a camera;
step 101, if the terminal analyzes a terminal identifier through the scanned pattern information, comparing the analyzed terminal identifier with a prestored terminal identifier;
and 102, if the analyzed terminal identification is the same as the pre-stored terminal identification, the terminal releases the screen locking state.
Through above-mentioned scheme, receive scanning command back through the camera scanning pattern information under the lock screen state according to the terminal to analyze out the terminal identification and compare with the terminal identification that prestores, only when the terminal identification that analyzes out with the terminal identification that prestores just can remove the lock screen state when the same, can provide higher safety guarantee, and need not brush the machine, can direct unblock, remain the data in the cell-phone simultaneously, it is more convenient. If the analyzed terminal identification is different from the prestored terminal identification, the terminal refuses to start the camera, so that malicious unlocking can be prevented, and the safety is improved.
The storage mode of the pattern information in the embodiment of the invention includes but is not limited to part or all of the following modes:
and (4) putting the card of the pattern information into the mobile phone packaging box, and directly printing the pattern information on the packaging box.
It should be noted that any means that enables the user using the mobile phone to obtain the pattern information is applicable to the present invention.
The pattern information is exemplified by printing the pattern information on a packing box or a card in the packing box, as shown in fig. 2, the related flow operation of the generation of the pattern information according to the embodiment of the present invention includes:
step 200: acquiring a terminal identifier of a mobile phone;
step 201: generating pattern information by taking the acquired terminal identification as a data source;
step 202: and printing the generated pattern information into a packing box or a card in the box.
If the user forgets the password, the pattern information is directly scanned in the screen locking state and the terminal identification is analyzed, when the analyzed terminal identification is consistent with the pre-stored terminal identification, the mobile phone screen locking password can be directly cleared, if the user packaging box or the card is lost, a pattern information can be regenerated according to the terminal identification of the user and sent to the user for unlocking, the operation is very convenient, and because only the user owns the pattern information, the safety of the user after clearing the password is improved.
In the implementation, when a user clears a screen locking password by scanning pattern information in a screen locking state, the camera needs to be triggered to be opened first, if the user unlocks by using the screen locking password each time, and in the screen locking state, the user forgets the screen locking password and needs to trigger to be opened; or the user sets to unlock by using a human face or a fingerprint, but the user needs to input the screen locking password after restarting the mobile phone every time, and in this case, the user needs to trigger to turn on the camera after forgetting the screen locking password.
There are many ways to trigger the camera to be turned on, and several are listed below.
The first trigger mode is that the user automatically triggers when inputting the password continuously and wrongly.
Specifically, the terminal can set the error times that the user can continuously input the screen locking password, when the user continuously inputs the screen locking password in the screen locking state, the terminal judges the continuous input times, and if the set times are reached, the terminal automatically triggers to start the camera.
And a second triggering mode is sliding touch operation triggering.
Specifically, the terminal can be set with a sliding touch operation first, and when the user forgets the screen locking password, the user triggers to turn on the camera in the screen locking state when performing special sliding touch operation on the display area.
According to the specific setting of the terminal to the sliding touch operation, the sliding touch operation can be divided into the following steps:
(1) a special symbol sliding touch operation.
The terminal can set a special symbol first, and when a user forgets a screen locking password and in a screen locking state, when the user performs special symbol sliding touch operation on the display area, the camera is triggered to be started.
As shown in fig. 3A, it is assumed that the terminal sets the V-shaped sliding touch operation trajectory to trigger to turn on the camera according to a setting operation instruction triggered by the user, and when the user performs the V-shaped trajectory sliding touch operation on the display area, the camera is turned on in the screen locking state.
(2) And a single-finger upward sliding touch operation.
As shown in fig. 3B, it is assumed that the terminal sets the one-directional upward sliding touch operation as a response mechanism for triggering and opening the camera according to the setting operation instruction triggered by the user, and when the user performs the one-directional upward sliding touch operation on the display area, the camera is opened in the screen locking state.
It should be noted that the above description of the sliding touch manner is only an example, and any sliding touch operation manner that can be applied to the embodiment of the present invention to trigger the camera to be turned on is applicable to the embodiment of the present invention.
And triggering by a key.
Specifically, the terminal can set a specific key on the screen locking interface, and when the user forgets the screen locking password, the camera can be triggered to be opened by touching the key.
It should be noted that the above description of the manner of triggering to turn on the camera is only an example, and any manner of turning on the camera that can be applied to the embodiment of the present invention is applicable to the embodiment of the present invention.
In implementation, after a user triggers and starts the camera in a screen locking state, pattern information can be scanned in various modes.
The first method is as follows: and directly scanning after the camera is started.
Specifically, after the terminal receives the scanning instruction in the screen locking state, the camera is started through triggering operation, and the pattern information is directly scanned through the camera.
The second method comprises the following steps: it is determined whether there is pattern information in the finder frame.
After the terminal receives the scanning instruction in the screen locking state, the camera is started through triggering operation, whether pattern information exists in the view-finding frame or not is determined through scanning of the camera, and when the pattern information exists, a user is prompted whether to scan or not.
If the user determines to scan, a scanning instruction is triggered, and the terminal scans pattern information through the camera after receiving the scanning instruction; otherwise, the scanning instruction is not triggered, and the terminal does not scan.
As shown in fig. 4, it is assumed that in the screen locking state, after a user performs a one-finger upward sliding touch operation on a display area to trigger the start of a camera, a terminal receives a scanning instruction, determines that pattern information exists in a view finder through scanning of the camera, and prompts the user whether to perform scanning in a text mode.
It should be noted that the above-mentioned manner for the user to scan the pattern information after triggering to open the camera in the screen lock state is only an example, and any manner for triggering to scan the pattern information after triggering to open the camera in the screen lock state is applicable to the embodiment of the present invention.
There are many kinds of pattern information, including but not limited to some or all of the following patterns:
one-dimensional bar codes and two-dimensional bar codes.
The two-dimensional bar codes can be divided into the following types:
(1) linear heap two-dimensional code.
Specifically, after the terminal identifier of the user is obtained, the terminal identifier of the user is used as a data source of pattern information to be encoded, and a mark is formed by several groups of regularly arranged bars, spaces and corresponding characters, wherein the mark is a generated linear stacked two-dimensional code.
(2) Matrix type two-dimensional code.
Specifically, after the terminal identification of the user is obtained, the terminal identification of the user is used as a data source of pattern information, coding is carried out in a rectangular space through different distribution of black and white pixels in a matrix, on the corresponding element position of the matrix, binary '1' is represented by the appearance of a point, binary '0' is represented by the non-appearance of the point, and the generated matrix type two-dimensional bar code is determined by the arrangement and combination of the points.
Wherein the shape of the dots comprises square dots and/or circular dots.
It should be noted that the two-dimensional barcodes may exist simultaneously, that is, when one of the two-dimensional barcodes is satisfied, the terminal analyzes the scanned pattern information to obtain an analyzed terminal identifier.
In implementation, in order to prevent others from maliciously making pattern information, for example, making a two-dimensional code for unlocking after acquiring a terminal identifier of another person, an optional scheme is provided in the embodiment of the present invention, and the terminal identifier is encrypted according to a specific encryption algorithm.
Specifically, a step is added between step 200 and step 201 in fig. 2, after the terminal identifier of the mobile phone is obtained, the terminal identifier is encrypted according to a specific encryption algorithm to become an unreadable segment of code, and the terminal identifier can only be displayed after being decrypted by a corresponding key, so that someone can be prevented from unlocking the mobile phone by using wrong pattern information.
Wherein the specific encryption algorithm includes, but is not limited to, one of the following algorithms: DES algorithm, MD5 algorithm, RSA algorithm.
After the pattern information is scanned, the pattern information needs to be decoded, and the methods for decoding the pattern information obtained by adopting different code systems are different, and the decoding methods of the pattern information are various, including the following methods:
in the first mode, a unique decoding method is preset before shipment.
Specifically, after the terminal identifier of the mobile phone is acquired, the terminal identifier is encoded by using only one code system before shipping to generate the pattern information, and at this time, the decoding mode of the pattern information is also uniquely determined.
In the second method, all decoding methods are set in advance in the terminal.
Specifically, in order to further improve the security, all decoding methods may be preset in the terminal, pattern information obtained by coding with different code systems corresponds to different decoding methods, the terminal determines the type of the pattern information after scanning the pattern information, and selects different decoding methods for different types.
In this case, the type of the pattern information may be various, for example, the pattern information of different production batches is different, the pattern information of the first production batch is a one-dimensional barcode, and the pattern information of the second production batch is a two-dimensional barcode, and at this time, the type of the pattern information scanned by the camera, specifically, the one-dimensional barcode or the two-dimensional barcode, may be determined first, and then the specific decoding method may be determined.
Optionally, after the terminal identifier is analyzed, whether the analyzed terminal identifier is consistent with the prestored terminal identifier is judged, and if so, the screen locking password is deleted; otherwise, the screen locking password is not deleted.
Specifically, whether the analyzed terminal identifier is consistent with the pre-stored terminal identifier is judged by comparing whether the data of the position corresponding to the analyzed terminal identifier and the pre-stored terminal identifier are the same, and if the data of each bit are the same, the analyzed terminal identifier is consistent with the pre-stored terminal identifier; and if the data of at least one bit is different, the analyzed terminal identification is inconsistent with the pre-stored terminal identification.
There are many comparison results between the analyzed terminal identifier and the pre-stored terminal identifier, which are exemplified below.
Assuming that the analyzed terminal identifier is 869019034863357 and the pre-stored terminal identifier is 869019034863357, wherein the total length of the two terminal identifiers is 15 bits, the data of the relative positions are compared, and the data of each bit are the same as the result, that is, the comparison result between the analyzed terminal identifier and the pre-stored terminal identifier is consistent.
Assuming that the analyzed terminal identifier is a000008550221C and the pre-stored terminal identifier is 120a008550221C, where the total length of the two terminal identifiers is 14 bits, the data at the relative positions are compared, and the result data are different, that is, the comparison result between the analyzed terminal identifier and the pre-stored terminal identifier is inconsistent.
It should be noted that the above-mentioned result of comparing the analyzed terminal identifier with the pre-stored terminal identifier is only an example, and any result of comparing the analyzed terminal identifier with the pre-stored terminal identifier that can be applied to the embodiment of the present invention is applicable to the embodiment of the present invention.
Optionally, in order to prevent some users from unlocking maliciously, the embodiment of the present invention further sets a mode that the number of times of user authentication can be limited.
Specifically, the terminal refuses to start the camera after the number of times of user authentication failure reaches the number limit.
Wherein, a threshold value can be set for the number of times of user authentication failure, and there are various ways of setting the threshold value, which are listed as follows:
the first mode is set directly before delivery.
Specifically, the time length that the user can verify and the number of times that the user fails to verify are set by the manufacturer before the mobile phone leaves the factory.
If the manufacturer uniformly sets that the number of times of user authentication failure in 1 minute cannot exceed 5 times before the mobile phone leaves a factory, the user authentication failure in 1 minute cannot exceed 5 times, and the user authentication failure can be continuously verified by scanning the pattern information through the camera, otherwise, the terminal refuses to start the camera.
And the second mode is set by the user.
Specifically, after the user obtains the mobile phone, the user sets the verification time and the verification failure times, and the user can set the verification time according to the user's will, so that the mobile phone is more convenient to use.
If the user sets that the number of times of authentication failure in 1 minute cannot exceed 3 times, the user can continue to scan pattern information through the camera for authentication when the number of times of authentication failure in 1 minute does not exceed 3 times, otherwise the terminal refuses to start the camera.
It should be noted that the above-mentioned manner for setting the threshold is only an example, and any manner that can be applied to setting the threshold in the embodiment of the present invention is applicable to the embodiment of the present invention.
After the threshold value is set, after the terminal receives an instruction of scanning the terminal identification in a screen locking state, whether the number of times of user authentication failure in a set time length reaches the set threshold value is determined, if yes, the terminal refuses to start the camera, otherwise, the terminal prompts the user of authentication failure.
Assuming that the terminal sets prompt information for displaying user authentication failure in a text form, when the number of times of authentication failure of the user in 1 minute does not reach the threshold value of 5 times, the terminal prompts the user and displays the prompt information in a text and/or pattern form, where fig. 5 is an example of text display.
Assuming that the terminal sets prompt information for displaying user authentication failure in a text form, when the number of times of authentication failure of the user reaches a threshold value of 5 times within 1 minute, the terminal prompts the user, refuses to turn on a camera, and displays the prompt information in a text and/or pattern form, where fig. 6 is an example of text display.
It should be noted that the above prompt for the user authentication failure is only an example, and any prompt information for the user authentication failure that can be applied to the embodiment of the present invention is applicable to the embodiment of the present invention.
As shown in fig. 7, the relevant process operations of the method for unlocking according to the embodiment of the present invention include:
step 700: the terminal receives a scanning instruction in a screen locking state;
step 701: the terminal responds to the instruction to start the camera;
step 702: after the terminal detects the pattern information through the camera, the pattern information is decrypted to obtain the analyzed terminal identification;
step 703: the terminal compares the analyzed terminal identification with the prestored terminal identification;
step 704: the terminal judges whether the comparison result is consistent, if so, the step 705 is executed, otherwise, the step 707 is executed;
step 705: the terminal releases the screen locking state;
step 706: the terminal clears the original lock screen password;
step 707: the terminal does not release the screen locking state;
step 708: the terminal judges whether the number of times of user authentication reaches a threshold value, if so, step 709 is executed, otherwise, step 710 is executed;
step 709, the terminal closes the camera;
in step 710, the terminal prompts the user that the authentication fails, and returns to step 702.
In the embodiments provided in the present application, the method provided in the embodiments of the present application is described from the perspective of the terminal as an execution subject. In order to implement the functions in the method provided by the embodiment of the present application, the terminal may include a hardware structure and/or a software module, and implement the functions in the form of a hardware structure, a software module, or a hardware structure and a software module. Whether any of the above-described functions is implemented as a hardware structure, a software module, or a hardware structure plus a software module depends upon the particular application and design constraints imposed on the technical solution.
Based on the same concept, as shown in fig. 8, an embodiment of the present invention provides a terminal for unlocking, where the terminal includes: a processor 800 and a memory 801, wherein the memory 801 stores program code, and when one or more computer programs stored in the memory 801 are executed by the processor 800, the terminal is caused to perform the following processes:
after receiving an instruction of scanning a terminal identifier in a screen locking state, scanning pattern information through a camera; analyzing a terminal identifier through the scanned pattern information, and comparing the analyzed terminal identifier with a prestored terminal identifier; and if the analyzed terminal identification is the same as the pre-stored terminal identification, deleting the screen locking password.
Optionally, the processor 800 is configured to:
analyzing the scanned pattern information to obtain encrypted data; and decrypting the encrypted data to obtain the terminal identification.
Optionally, the processor 800 is further configured to:
and after comparing the analyzed terminal identification with the prestored terminal identification, if the analyzed terminal identification is different from the prestored terminal identification, prompting the user that the verification fails.
Optionally, the processor 800 is further configured to:
after receiving an instruction of scanning a terminal identifier in a screen locking state, if the number of times of user authentication failure in a set time length does not reach a set threshold value, scanning pattern information through a camera.
Optionally, the processor 800 is further configured to:
after receiving the instruction of the scanning terminal identification in the screen locking state, if the number of times of user verification failure in the set time length reaches the set threshold value, the camera is refused to be started.
As shown in fig. 9, another terminal 900 for unlocking according to an embodiment of the present invention includes: a Radio Frequency (RF) circuit 910, a power supply 920, a processor 930, a memory 940, an input unit 950, a display unit 960, a camera 970, a communication interface 990, and a Wireless Fidelity (WiFi) module 990. Those skilled in the art will appreciate that the configuration of the terminal shown in fig. 9 is not intended to be limiting, and that the terminal provided by the embodiments of the present application may include more or less components than those shown, or some components may be combined, or a different arrangement of components may be provided.
The following describes the various components of the terminal 900 in detail with reference to fig. 9:
the RF circuit 910 may be used for receiving and transmitting data during a communication or conversation. In particular, the RF circuit 910 sends the downlink data of the base station to the processor 930 for processing; and in addition, sending the uplink data to be sent to the base station. Generally, the RF circuit 910 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
In addition, the RF circuit 910 may also communicate with networks and other terminals through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The WiFi technology belongs to a short-distance wireless transmission technology, and the terminal 900 is accessed to an Access Point (AP) through a WiFi module 990, so as to achieve Access to a data network. The WiFi module 990 may be used for receiving and transmitting data during communication.
The terminal 900 may be physically connected to other terminals via the communication interface 990. Optionally, the communication interface 990 is connected to the communication interfaces of the other terminals through a cable, so as to implement data transmission between the terminal 900 and the other terminals.
In the embodiment of the present application, the terminal 900 can implement a communication service to send information to other contacts, so the terminal 900 needs to have a data transmission function, that is, the terminal 900 needs to include a communication module inside. Although fig. 9 shows communication modules such as the RF circuit 910, the WiFi module 990, and the communication interface 990, it is understood that at least one of the above components or other communication modules (such as a bluetooth module) for implementing communication exists in the terminal 900 for data transmission.
For example, when the terminal 900 is a mobile phone, the terminal 900 may include the RF circuit 910 and may further include the WiFi module 990; when the terminal 900 is a computer, the terminal 900 may include the communication interface 990, and may further include the WiFi module 990; when the terminal 900 is a tablet computer, the terminal 900 may include the WiFi module.
The memory 940 may be used to store software programs and modules. The processor 930 executes various functional applications and data processing of the terminal 900 by executing software programs and modules stored in the memory 940, and after the processor 930 executes the program codes in the memory 940, part or all of the processes in fig. 1 according to the embodiment of the present invention can be implemented.
Alternatively, the memory 940 may mainly include a program storage area and a data storage area. The storage program area can store an operating system, various application programs (such as communication application), a face recognition module and the like; the storage data area may store data (such as various multimedia files like pictures, video files, etc., and face information templates) created according to the use of the terminal, etc.
Further, the memory 940 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 950 may be used to receive numeric or character information input by a user and generate key signal inputs related to user settings and function control of the terminal 900.
Alternatively, the input unit 950 may include a touch panel 951 and other input terminals 952.
The touch panel 951, also referred to as a touch screen, can collect touch operations of a user (for example, operations of a user on or near the touch panel 951 using any suitable object or accessory such as a finger or a stylus pen) and drive a corresponding connection device according to a preset program. Alternatively, the touch panel 951 may include two parts, i.e., a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it into touch point coordinates, and sends the touch point coordinates to the processor 930, and can receive and execute commands sent from the processor 930. In addition, the touch panel 951 may be implemented in various types, such as resistive, capacitive, infrared, and surface acoustic wave.
Optionally, the other input terminals 952 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 960 may be used to display information input by a user or information provided to a user and various menus of the terminal 900. The display unit 960 is a display system of the terminal 900, and is configured to present an interface and implement human-computer interaction.
The display unit 960 may include a display panel 961. Alternatively, the Display panel 961 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
Further, the touch panel 951 may cover the display panel 961, and when the touch panel 951 detects a touch operation on or near the touch panel 951, the touch panel 951 transmits the touch operation to the processor 930 to determine the type of the touch event, and then the processor 930 provides a corresponding visual output on the display panel 961 according to the type of the touch event.
Although in fig. 9, the touch panel 951 and the display panel 961 are two independent components to implement the input and output functions of the terminal 900, in some embodiments, the touch panel 951 and the display panel 961 may be integrated to implement the input and output functions of the terminal 900.
The processor 930 is a control center of the terminal 900, connects each component using various interfaces and lines, performs various functions of the terminal 900 and processes data by operating or executing software programs and/or modules stored in the memory 940 and calling data stored in the memory 940, thereby implementing various services based on the terminal.
Optionally, the processor 930 may include one or more processing units. Optionally, the processor 930 may integrate an application processor and a modem processor, wherein the application processor mainly handles operating systems, user interfaces, application programs, and the like, and the modem processor mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 930.
The camera 970 is configured to implement a shooting function of the terminal 900 and shoot pictures or videos. The camera 970 can also be used for realizing the scanning function of the terminal 900 and scanning a scanning object (two-dimensional code/bar code).
The terminal 900 also includes a power supply 920 (e.g., a battery) for powering the various components. Optionally, the power supply 920 may be logically connected to the processor 930 through a power management system, so as to implement functions of managing charging, discharging, power consumption, and the like through the power management system.
Although not shown, the terminal 900 may further include at least one sensor, an audio circuit, etc., which will not be described herein.
As shown in fig. 10, another terminal for unlocking according to an embodiment of the present invention includes an operation module 1000, a comparison module 1001, and a display module 1002:
the operation module 1000: the device is used for scanning pattern information through the camera after receiving an instruction of a scanning terminal identifier in a screen locking state;
the comparison module 1001: analyzing a terminal identifier through the scanned pattern information, and comparing the analyzed terminal identifier with a prestored terminal identifier;
the display module 1002: and if the analyzed terminal identification is the same as the pre-stored terminal identification, deleting the screen locking password.
Optionally, the comparing module 1001 is specifically configured to:
analyzing the scanned pattern information to obtain encrypted data; and decrypting the encrypted data to obtain the terminal identification.
Optionally, the display module 1002 is specifically configured to:
and after comparing the analyzed terminal identification with the prestored terminal identification, if the analyzed terminal identification is different from the prestored terminal identification, prompting the user that the verification fails.
Optionally, the comparing module 1001 is further configured to:
after receiving an instruction of scanning a terminal identifier in a screen locking state, if the number of times of user authentication failure in a set time length does not reach a set threshold value, scanning pattern information through a camera.
Optionally, the comparing module 1001 is further configured to:
after receiving the instruction of the scanning terminal identification in the screen locking state, if the number of times of user verification failure in the set time length reaches the set threshold value, the camera is refused to be started.
The embodiment of the present invention further provides a computer-readable non-volatile storage medium, which includes a program code, and when the program code runs on a computing terminal, the program code is configured to enable the computing terminal to execute the steps of the method for unlocking according to the embodiment of the present invention.
The present application is described above with reference to block diagrams and/or flowchart illustrations of methods, apparatus (systems) and/or computer program products according to embodiments of the application. It will be understood that one block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, and/or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer and/or other programmable data processing apparatus, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks.
Accordingly, the subject application may also be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). Furthermore, the present application may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. In the context of this application, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or terminal.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (6)

1. A method for unlocking a terminal with a camera is characterized by comprising the following steps:
the terminal automatically triggers and starts a camera when detecting that a user inputs a password continuously and wrongly in a screen locking state;
after determining that pattern information exists in the view-finding frame through the camera, prompting a user whether to scan, and after receiving a scanning instruction, scanning the pattern information through the camera;
if the terminal analyzes the terminal identification through the scanned pattern information, comparing the analyzed terminal identification with the prestored terminal identification;
if the analyzed terminal identification is the same as the prestored terminal identification, the terminal releases the screen locking state;
if the analyzed terminal identification is different from the prestored terminal identification, the terminal determines that the user verification fails;
wherein after the terminal determines that the user authentication fails, the method further comprises:
if the verification failure times do not reach the time threshold value within the preset verification time, the terminal displays prompt information of the verification failure, the prompt information is in a form of characters and/or patterns, and the preset verification time and the time threshold value are set by a user;
and within the preset verification duration, if the verification failure times reach a time threshold, the terminal closes the camera.
2. The method of claim 1, wherein if the parsed terminal identifier is the same as the pre-stored terminal identifier, after the terminal releases the lock screen state, the method further comprises:
and the terminal deletes the original lock screen password.
3. The method of claim 1, wherein the terminal analyzes the terminal identifier through the scanned pattern information, and comprises:
the terminal analyzes the scanned pattern information to obtain encrypted data;
and the terminal decrypts the encrypted data to obtain the terminal identification.
4. A terminal for unlocking, the terminal comprising: a processor, a memory and a camera, wherein the memory stores program code that, when executed by the processor, causes the terminal to perform the following:
when detecting that a user inputs continuous errors of passwords in a screen locking state, automatically triggering to open a camera; after determining that pattern information exists in the view-finding frame through the camera, prompting a user whether to scan, and after receiving a scanning instruction, scanning the pattern information through the camera; analyzing a terminal identifier through the scanned pattern information, and comparing the analyzed terminal identifier with a prestored terminal identifier; if the analyzed terminal identification is the same as the prestored terminal identification, the screen locking state is released; if the analyzed terminal identification is different from the prestored terminal identification, the terminal determines that the user verification fails;
wherein, after the terminal determines that user authentication failed, the processor is further configured to:
if the verification failure times do not reach the time threshold value within the preset verification time, the terminal displays prompt information of the verification failure, the prompt information is in a form of characters and/or patterns, and the preset verification time and the time threshold value are set by a user;
and within the preset verification duration, if the verification failure times reach a time threshold, the terminal closes the camera.
5. The terminal of claim 4, wherein the processor is further configured to:
and if the analyzed terminal identification is the same as the pre-stored terminal identification, deleting the original screen locking password after the screen locking state of the terminal is released.
6. The terminal of claim 4, wherein the processor is configured to:
analyzing the scanned pattern information to obtain encrypted data; and decrypting the encrypted data to obtain the terminal identification.
CN201810820997.3A 2018-07-24 2018-07-24 Method for unlocking terminal with camera and terminal Active CN109033795B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810820997.3A CN109033795B (en) 2018-07-24 2018-07-24 Method for unlocking terminal with camera and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810820997.3A CN109033795B (en) 2018-07-24 2018-07-24 Method for unlocking terminal with camera and terminal

Publications (2)

Publication Number Publication Date
CN109033795A CN109033795A (en) 2018-12-18
CN109033795B true CN109033795B (en) 2022-04-22

Family

ID=64645588

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810820997.3A Active CN109033795B (en) 2018-07-24 2018-07-24 Method for unlocking terminal with camera and terminal

Country Status (1)

Country Link
CN (1) CN109033795B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110225377A (en) * 2019-06-18 2019-09-10 北京影谱科技股份有限公司 A kind of video method for implantation and device, equipment, medium, system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156648A (en) * 2014-08-25 2014-11-19 北京网秦天下科技有限公司 Screen unlocking method and device
CN107704182A (en) * 2017-09-29 2018-02-16 维沃移动通信有限公司 A kind of barcode scanning method and mobile terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016095438A1 (en) * 2014-12-19 2016-06-23 深圳市金立通信设备有限公司 Two dimension code operating method and terminal

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156648A (en) * 2014-08-25 2014-11-19 北京网秦天下科技有限公司 Screen unlocking method and device
CN107704182A (en) * 2017-09-29 2018-02-16 维沃移动通信有限公司 A kind of barcode scanning method and mobile terminal

Also Published As

Publication number Publication date
CN109033795A (en) 2018-12-18

Similar Documents

Publication Publication Date Title
CN1752887B (en) Computer security system and method
CN108093392B (en) Method for unlocking SIM card, mobile terminal and storage medium
CN103092484B (en) The method of unlock screen, device and terminal
US20150121510A1 (en) Method, device and system for entering data
US9686399B2 (en) Protection of a wireless communications device against unauthorized use
KR20110103598A (en) Terminal unlock system and terminal unlock method
EP2083399B1 (en) Method, system and mobile device employing enhanced user authentication
EP2437198B1 (en) Secure PIN reset process
CN104239804A (en) Data protecting method and device
CN105227439B (en) A kind of sharing method and user terminal of associated person information
CN105069333A (en) User domain access method, access system and terminal
CN103034417A (en) Unlocking method for touch screen and terminal equipment
EP2974119B1 (en) System and method for unified passcode processing
CN110728774A (en) Intelligent lock unlocking method, device and system, storage medium and electronic equipment
CN105450405A (en) Password setting and authentication method and system
CN103391195B (en) A kind of method of work of dynamic token
CN109033795B (en) Method for unlocking terminal with camera and terminal
CN106211070B (en) A kind of anti-theft protection method and mobile terminal of mobile terminal
CN103869996B (en) NFC-based virtual keyboard device safe and convenient to use
EP2985712B1 (en) Application encryption processing method, apparatus, and terminal
CN110708364B (en) Electronic equipment unlocking method and device, electronic equipment and storage medium
US10841797B2 (en) Method for generating and injecting SIMLOCK password and device for the same
CN110990821A (en) Identity type verification method, device and storage medium
CN108965472B (en) Account information pushing method and device
CN108990041B (en) Method and equipment for setting main card and auxiliary card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee after: Qingdao Hisense Mobile Communication Technology Co.,Ltd.

Address before: 266071 Shandong city of Qingdao province Jiangxi City Road No. 11

Patentee before: HISENSE MOBILE COMMUNICATIONS TECHNOLOGY Co.,Ltd.