CN109388928B - Screen locking control method, device, system, equipment and medium for computer equipment - Google Patents

Screen locking control method, device, system, equipment and medium for computer equipment Download PDF

Info

Publication number
CN109388928B
CN109388928B CN201811152168.9A CN201811152168A CN109388928B CN 109388928 B CN109388928 B CN 109388928B CN 201811152168 A CN201811152168 A CN 201811152168A CN 109388928 B CN109388928 B CN 109388928B
Authority
CN
China
Prior art keywords
screen locking
computer module
unlocking
module
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811152168.9A
Other languages
Chinese (zh)
Other versions
CN109388928A (en
Inventor
郑阿民
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Original Assignee
Guangzhou Shiyuan Electronics Thecnology Co Ltd
Guangzhou Shirui Electronics Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Shiyuan Electronics Thecnology Co Ltd, Guangzhou Shirui Electronics Co Ltd filed Critical Guangzhou Shiyuan Electronics Thecnology Co Ltd
Priority to CN201811152168.9A priority Critical patent/CN109388928B/en
Publication of CN109388928A publication Critical patent/CN109388928A/en
Application granted granted Critical
Publication of CN109388928B publication Critical patent/CN109388928B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The embodiment of the invention provides a screen locking control method, a device, a system, equipment and a medium of computer equipment, wherein the method comprises the following steps: when the screen locking condition is met, generating a screen locking starting instruction; sending the screen locking starting instruction to a screen locking application of a main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module; and the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top. By implementing the embodiment of the invention, after the screen of the computer equipment is locked, even if the computer module operated by the computer equipment is switched, the computer equipment can be used after the screen is unlocked.

Description

Screen locking control method, device, system, equipment and medium for computer equipment
Technical Field
The present invention relates to the field of screen lock applications, and in particular, to a screen lock control method, apparatus, system, device, and medium for a computer device.
Background
With the continuous development of computer technology, the application range of computer equipment is wider and wider, and the privacy and important data of users are inevitably involved. To protect the privacy and important data of the user, the computer device may be locked without the user using the computer device. And when the user needs to use the computer, the computer equipment is unlocked, so that the protection of privacy and important data can be realized through screen locking control.
However, in some scenarios, the computer devices running different computer modules can be switched, and the executed lock screen control has a big problem, which is described in detail below:
the computer equipment can be loaded with a plurality of computer modules, wherein one computer module is respectively connected with other computer modules through different display channels. The display channel mentioned here is matched with the connected computer module, such as: the connected computer module is a built-in PC module (the PC module refers to a computer module with an operating system of a windows system), the display channel is a PC channel, the connected computer module is an external PC module, and the display channel is a VGA channel or an HDMI channel.
The currently running computer module can lock the screen of the computer device through the screen locking application of the computer module per se under the condition that the user A does not use the computer device for the privacy and important data of the user A. However, the screen locking operation executed by the application only has a limiting effect on the system environment of the user and has no influence on other computer modules, and if the user B switches to another computer module for using the computer equipment next time, the privacy and important data of the user A are likely to be seen through the switched computer module.
Therefore, screen locking control of computer equipment with different computer modules can be switched to operate, so that the problems of low safety and easy exposure of privacy and important data of users exist.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, an apparatus, a device, and a medium for controlling screen locking of a computer device, so as to solve the problem of low security due to screen locking control of a computer device that can switch to run different computer modules.
According to a first aspect of the present invention, there is provided a lock screen control method for a computer device having a main computer module and a sub computer module mounted thereon, the method being applied to the sub computer module, comprising the steps of:
when the screen locking condition is met, generating a screen locking starting instruction;
sending the screen locking starting instruction to a screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module;
and the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top.
In one embodiment, the method further comprises the steps of:
requesting an unlock password from an associated server;
and receiving and storing the unlocking password returned by the server.
In one embodiment, the secondary computer module is connected with the main board of the main computer module sequentially through the USB selector switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard; the screen locking starting instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the main operating system.
In one embodiment, the primary computer module is an android module and the secondary computer module is a PC module.
In one embodiment, the secondary computer module is connected with the main board of the main computer module through a USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard; and the screen locking starting instruction is sent to the screen locking application through the USB selector switch and the main operating system.
According to a second aspect of the present invention, there is provided a lock screen control method for a computer apparatus having a main computer module and a sub computer module mounted thereon, the method being applied to the sub computer module, comprising the steps of:
performing verification operation on the acquired unlocking data;
if the verification is successful, generating a screen locking closing instruction;
sending the screen locking closing instruction to a screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of other computer modules;
and the screen locking closing instruction is used for controlling the screen locking application, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
In one embodiment, before performing the verification operation on the acquired unlocking data, the method comprises the following steps:
receiving an unlocking password sent by the screen locking application as unlocking data; the unlocking password is input into the main computer module by a user through the screen locking interface.
In one embodiment, before performing the verification operation on the acquired unlocking data, the method comprises the following steps:
receiving an unlocking file of unlocking equipment; the screen locking file is read by the auxiliary computer module and then forwarded, or the screen locking application receives the screen locking file from the main computer module and then forwards the screen locking file;
decrypting the unlocking file by adopting a preset decryption algorithm;
and if the decryption is successful, extracting the unlocking data from the decrypted unlocking file.
In one embodiment, performing a verification operation on the acquired unlock data includes:
sending the extracted unlocking data to an associated server;
and determining whether the verification of the unlocking data is successful or not according to the verification notice returned by the server.
In one embodiment, if the verification is successful, the method further comprises the steps of:
caching the extracted unlocking data serving as verification data to the local;
if the unlocking file in the unlocking device is read again and decrypted successfully, the unlocking data is extracted from the decrypted unlocking file;
if the network between the server and the mobile terminal is unavailable, comparing the extracted unlocking data with locally cached verification data;
if so, the verification is determined to be successful.
In one embodiment, the method further comprises the steps of:
and after the computer equipment is unlocked, updating the locally cached check data or unlocking an unlocking file in the equipment.
In one embodiment, the method further comprises the steps of:
when the check data are updated every time, the updated check data are synchronously stored in the partition of the local hard disk, and the updating time is recorded;
comparing the extracted unlock data with locally cached check data, comprising:
replacing the locally cached check data with the latest check data stored in the partition of the local hard disk according to the recorded updating time;
and comparing the extracted unlocking data with the replaced verification data.
In one embodiment, the unlocking data comprises login data, user permission data and an identity of the unlocking device; sending the extracted unlocking data to an associated server, including:
sending login data to a login server;
sending the user permission data and the identity to a permission verification server;
and if the login server and the authority verification server pass the verification, determining that the verification is successful.
In one embodiment, the method further comprises the steps of:
and sending the login data to the associated application so that the associated application can log in the login server.
In one embodiment, the unlocking data includes user authority data, and before performing a verification operation on the acquired unlocking data, the method includes the following steps:
responding to an unlocking trigger condition, and requesting an unlocking graphic code and an access token from a login server;
receiving the graphic code and the access token returned by the login server;
sending the graphic code to a screen locking application of the main computer module to control the screen locking application to output the graphic code to a screen locking interface;
sending an authority data request carrying the access token to the login server;
receiving user authority data returned by the login server; and the user authority data is generated by the login server according to the user login information after the user terminal scans the graphic code and successfully logs in the login server.
In one embodiment, after the unlocking data is verified, the method comprises the following steps:
requesting the login server for login data reported by the user terminal after scanning the graphic code;
and sending the requested login data to the associated application so that the associated application can log in the login server.
In one embodiment, before performing the verification operation on the acquired unlocking data, the method comprises the following steps:
receiving a biological data identification notice sent by the screen locking application;
generating and outputting a biological data identification interface displayed on the top;
sending a request for temporarily closing a screen locking interface to the screen locking application so as to control the screen locking application to temporarily remove the screen locking interface and switch and display output contents of the secondary computer module;
after the identification control of the biological data identification interface is triggered, informing biological data acquisition equipment to acquire biological data;
receiving biological data sent by the biological acquisition equipment, and informing the screen locking application to output a screen locking interface displayed on the top;
biometric data is extracted from the biometric data as unlock data.
In one embodiment, the secondary computer module is connected with the main board of the main computer module sequentially through the USB selector switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard; the screen locking closing instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the main operating system.
In one embodiment, the primary computer module is an android module and the secondary computer module is a PC module.
In one embodiment, the secondary computer module is connected with the main board of the main computer module through a USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard; and the screen locking closing instruction is sent to the screen locking application through the USB selector switch and the main operating system.
According to a third aspect of the present invention, there is provided a lock screen control method for a computer apparatus having a main computer module and a sub computer module mounted thereon, the main computer module having an output content whose display level is higher than that of the sub computer module; the screen locking control method comprises the following steps:
generating a screen locking starting instruction when the screen locking condition is met on the side of the auxiliary computer module, and sending the screen locking starting instruction to the screen locking application of the main computer module;
and receiving the screen locking starting instruction at the main computer module side, and outputting a screen locking interface displayed on the top.
According to a fourth aspect of the present invention, there is provided a lock screen control method for a computer apparatus having a main computer module and a sub computer module mounted thereon, the main computer module having an output content whose display level is higher than that of the sub computer module; the screen locking control method comprises the following steps:
on the side of the secondary computer module, performing verification operation on the acquired unlocking data, if the verification is successful, generating a screen locking closing instruction, and sending the screen locking closing instruction to the screen locking application of the main computer module;
and receiving the screen locking closing instruction at the main computer module side, canceling a screen locking interface displayed on the top, and unlocking the computer equipment.
According to a fifth aspect of the present invention, there is provided a lock screen control system, comprising a computer device having a main computer module and a sub computer module mounted thereon, the main computer module having an output content whose display level is higher than that of the sub computer module; the main computer module further comprises a screen locking module, the auxiliary computer module further comprises a screen locking control module, wherein:
the screen locking control module is used for generating a screen locking starting instruction when the screen locking condition is met, and sending the screen locking starting instruction to the screen locking module;
and the screen locking module is used for receiving the screen locking starting instruction and outputting a screen locking interface displayed on the top.
In one embodiment, the main computer module further comprises a main board, an MCU and a USB switch which are connected in sequence; the mainboard is provided with an operating system of a main computer module; the secondary computer module is connected with the USB selector switch; the screen locking starting instruction is an MCU instruction; and the screen locking control module sends the screen locking starting instruction to the screen locking module through the USB selector switch, the MCU and the main operating system.
In one embodiment, the secondary computer module further comprises a main board and a USB switch connected with each other; the mainboard is provided with an operating system of a main computer module; the secondary computer module is connected with the USB selector switch; and the screen locking control module sends the screen locking starting instruction to the screen locking module through the USB selector switch and the main operating system.
In one embodiment, the system further comprises an associated server, the screen locking control module requests an unlocking password from the server, the server returns the unlocking password, and the screen locking control module receives and stores the returned unlocking password
According to a sixth aspect of the present invention, there is provided a lock screen control system, comprising a computer device having a main computer module and a sub computer module mounted thereon, the main computer module having an output content whose display level is higher than that of the sub computer module; the main computer module further comprises a screen locking module, the auxiliary computer module further comprises a screen locking control module, wherein:
the screen locking control module is used for performing verification operation on the acquired unlocking data, generating a screen locking closing instruction if the verification is successful, and sending the screen locking closing instruction to the screen locking module;
and the screen locking module is used for receiving the screen locking closing instruction, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
In one embodiment, the main computer module further comprises a main board, an MCU and a USB switch which are connected in sequence; the mainboard is provided with an operating system of a main computer module; the secondary computer module is connected with the USB selector switch; the screen locking closing instruction is an MCU instruction; and the screen locking control module sends the screen locking starting instruction to the screen locking module through the USB selector switch, the MCU and the main operating system.
In one embodiment, the secondary computer module further comprises a main board and a USB switch connected with each other; the mainboard is provided with an operating system of a main computer module; the secondary computer module is connected with the USB selector switch; and the screen locking control module sends the screen locking closing instruction to the screen locking module through the USB selector switch and the main operating system.
In one embodiment, the system further comprises an unlocking device, wherein the unlocking device is connected with the main computer module or the auxiliary computer module;
after reading the unlocking file in the unlocking equipment, the auxiliary computer module sends the unlocking file to the screen locking control module;
the main computer module reads an unlocking file in the unlocking equipment, sends the unlocking file to the screen locking module, sends the unlocking file to the auxiliary computer module by the screen locking module, and sends the unlocking file to the screen locking control module by the auxiliary computer module;
the screen locking control module decrypts the unlocking file by adopting a preset decryption algorithm; and if the decryption is successful, extracting the unlocking data from the decrypted unlocking file.
In one embodiment, the system further comprises an associated server, and the screen locking control module sends the extracted unlocking data to the server; and the server sends a verification result to the screen locking control module after verifying the unlocking data, and the screen locking control module determines whether the unlocking data is successfully verified according to a verification notice returned by the server.
In one embodiment, the unlocking data comprises login data, user permission data and an identity of the unlocking device; the server comprises a login server and an authority verification server;
the screen locking control module sends login data to a login server and sends the user permission data and the identity identification to a permission verification server;
the login server performs login verification on the login data and returns a verification result;
the authority verification server carries out authority verification on the user authority data and the identity identification and returns a verification result;
and the screen locking control module determines that the unlocking data is successfully verified when the login server and the authority verification server are both verified.
In one embodiment, the unlocking data comprises user authority data, and the system further comprises a user terminal and a login server;
the screen locking control module responds to an unlocking trigger condition before executing verification operation on the acquired unlocking data and requests a graphic code and an access token from the login server;
the login server returns the graphic code and the access token after receiving the request;
the screen locking control module receives the graphic code and the access token returned by the login server and sends the graphic code to the screen locking module;
the screen locking module outputs the graphic code to a screen locking interface;
the user terminal sends user login information to the login server after scanning the graphic code;
the screen locking control module sends an authority data request carrying the access token to the login server;
and the login server generates user authority data according to the user login information and sends the user authority data to the screen locking control module.
In one embodiment, the system further comprises a right verification server;
the screen locking control module sends the user permission data to the permission verification server;
the authority verification server returns a verification result after verifying the user authority data;
and the screen locking control module confirms whether the unlocking data is successfully verified according to the verification result.
According to a seventh aspect of the present invention, there is provided a lock screen control apparatus for a computer device having a main computer module and a sub computer module mounted thereon, the apparatus being applied to the sub computer module, the apparatus including:
the screen locking instruction generating module is used for generating a screen locking starting instruction when the screen locking condition is met;
the screen locking instruction sending module is used for sending the screen locking starting instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module;
and the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top.
According to an eighth aspect of the present invention, there is provided a lock screen control device for a computer device having a main computer module and a sub-computer module mounted thereon, the device being applied to the sub-computer module, the device including:
the unlocking data verification module is used for executing verification operation on the acquired unlocking data;
the unlocking instruction generating module is used for generating a screen locking and closing instruction when the verification is passed;
the unlocking instruction sending module is used for sending the screen locking closing instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of other computer modules;
and the screen locking closing instruction is used for controlling the screen locking application, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
According to a ninth aspect of the present invention, there is provided a computer device having a main computer module and a sub-computer module mounted thereon, the sub-computer module comprising:
a processor;
a memory storing processor-executable instructions;
wherein the processor is coupled to the memory for reading program instructions stored by the memory and, in response, performing operations in the method as described above.
In one embodiment, the computer device is a smart interactive tablet.
In one embodiment, the secondary computer module is a hot-plug computer module or an external computer module of the computer device.
According to a tenth aspect of the present invention, there is provided a computer device having a main computer module and a sub-computer module mounted thereon, the sub-computer module and the main computer module each including:
a processor;
a memory storing processor-executable instructions;
wherein the processor is coupled to the memory for reading program instructions stored by the memory and, in response, performing operations in the method as described above.
In one embodiment, the computer device is a smart interactive tablet.
In one embodiment, the secondary computer module is a hot-plug computer module or an external computer module of the computer device.
According to an eleventh aspect of the invention, there is provided one or more machine-readable storage media having instructions stored thereon which, when executed by one or more processors, perform operations in a method as described above.
The embodiment provided by the invention is applied to an auxiliary computer module carried by computer equipment, and when a screen locking condition is met, a screen locking starting instruction is generated and sent to a screen locking application of a main computer module carried by the computer equipment, and the screen locking starting instruction sent to the screen locking application can control the screen locking application to output a screen locking interface. Because the display level of the output content of the main computer module is higher than that of the auxiliary computer module, the display level of the screen locking interface output by the screen locking application can be higher than that of the auxiliary computer module, the effect of top display is achieved, and the computer equipment can be used after the screen is unlocked no matter whether the computer module operated by the computer equipment is switched or not. Compared with the related screen locking control technology, the auxiliary computer module does not need to be independently provided with screen locking application, and each computer module can achieve the purpose of locking other computer modules through controlling the screen locking application of the main computer module.
Drawings
FIG. 1A is an architecture diagram illustrating a lock screen control system in accordance with an exemplary embodiment of the present invention;
FIG. 1B is an architecture diagram of a lock screen control system according to another exemplary embodiment of the present invention;
FIG. 1C is an architecture diagram of a lock screen control system according to another exemplary embodiment of the present invention;
FIG. 1D is an architecture diagram of a lock screen control system, according to another exemplary embodiment of the present invention;
FIG. 1E is an architecture diagram of a lock screen control system, according to another exemplary embodiment of the present invention;
FIG. 1F is an architectural diagram of a lock screen control system according to another exemplary embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for controlling screen locking of a computer device according to an exemplary embodiment of the present invention;
FIG. 3 is a flowchart illustrating a screen lock control method of a computer device according to another exemplary embodiment of the present invention;
FIG. 4 is an interaction diagram illustrating a method for screen lock control of a computer device in accordance with an exemplary embodiment of the present invention;
FIG. 5 is an interaction diagram illustrating a screen lock control method of a computer device according to another exemplary embodiment of the present invention;
FIG. 6 is an interaction diagram illustrating a screen lock control method of a computer device according to another exemplary embodiment of the present invention;
FIG. 7 is an interaction diagram illustrating a screen lock control method of a computer device according to another exemplary embodiment of the present invention;
FIG. 8 is an interaction diagram illustrating a screen lock control method of a computer device according to another exemplary embodiment of the present invention;
FIG. 9 is an interaction diagram illustrating a screen lock control method of a computer device according to another exemplary embodiment of the present invention;
fig. 10 is a block diagram illustrating a lock screen control apparatus of a computer device according to an exemplary embodiment of the present invention;
fig. 11 is a block diagram illustrating a lock screen control apparatus of a computer device according to another exemplary embodiment of the present invention;
FIG. 12 is a hardware block diagram of a computer device shown in an exemplary embodiment of the invention;
fig. 13 is a hardware configuration diagram of a computer device according to another exemplary embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present invention. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The computer device according to the embodiment of the present invention is provided with at least two computer modules. To facilitate the distinction between different computer modules, in one example, a computer module for performing the basic functions of a computer device may be referred to as a main computer module; the computer modules introduced to accommodate particular scenario requirements are referred to as secondary computer modules. In other examples, the main computer module and the sub-computer module may be further divided according to other principles, which is not limited in this embodiment of the present invention.
When the computer equipment carrying a plurality of computer modules protects the privacy and important data of a user, in order to avoid exposing the privacy of the user after switching the computer modules, the screen of each computer module needs to be locked by the screen locking application of each computer module, so that the operation is extremely complicated. The embodiment of the invention discloses a screen locking control method, a device, a system, equipment and storage, aiming at protecting privacy and important data of a user and reducing the complexity of screen locking operation.
The screen locking control method disclosed by the embodiment of the invention is applied to a secondary computer module carried by computer equipment, generates a screen locking starting instruction when a screen locking condition is met, sends the screen locking starting instruction to a screen locking application of a primary computer module carried by the computer equipment, and can control the screen locking application to output a screen locking interface by the screen locking starting instruction sent to the screen locking application. Because the display level of the output content of the main computer module is higher than that of the auxiliary computer module, the display level of the screen locking interface output by the screen locking application can be higher than that of the auxiliary computer module, the effect of top display is achieved, and the computer equipment can be used after the screen is unlocked no matter whether the computer module operated by the computer equipment is switched or not. Compared with the related screen locking control technology, the auxiliary computer module does not need to be independently provided with screen locking application, and each computer module can achieve the purpose of locking other computer modules through controlling the screen locking application of the main computer module. The following first introduces a system for realizing the screen locking control method of the present invention with reference to the accompanying drawings:
referring to fig. 1A, the lock screen control system shown in fig. 1A may include a computer device 100, where the computer device 100 may be loaded with a main computer module 110 and a sub-computer module 120, the sub-computer module 120 includes a lock screen control module 121, and the main computer module 110 includes a lock screen module 111.
The host computer module 120 belongs to the computer device 100, is built in the computer device, and may include various components of the host computer of the computer device 100, and may be used to execute the basic functions of the computer device 100 and other functions meeting the user's needs. The basic functions and other functions mentioned here are different depending on the device usage of the computer device, and the embodiment of the present invention is not limited to this, for example, the computer device is an intelligent interactive tablet, and other functions are as follows: switching the currently running secondary computer module, forwarding the touch data to the secondary computer module, and the like. The basic functions are as follows: touch control, display control, and the like.
In order to ensure the normal display function of the computer device 100, the designer considers that the main computer module 110 performs the display control function of the computer device 100, and the display level of the output content of the main computer module 110 can be higher than that of the sub-computer module 120 through software and hardware presetting. For example, the display policy of the whole computer architecture display system of the computer device 100 presets the output content of the main computer module 110 to be output to the graphics layer, the output content of the sub-computer module 120 to be output to the video layer, the graphics layer is located above the video layer, and if the graphics layer needs to display an interface, the graphics layer is displayed above the video layer, so as to form a top-setting effect. The screen locking module 111 outputs a screen locking interface, and can output the screen locking interface to the graphic layer by default to achieve the effect of top placement.
In the embodiment of the present invention, in view of the characteristic that the display level of the output content of the main computer module 110 is higher than that of the sub-computer module 120, the lock screen module 111 may be configured only in the main computer module 110, and the lock screen control module 121 may be configured in the sub-computer module 120.
The screen locking module 111 is a software program module, corresponds to a program code of a screen locking application, and is configured to lock a screen of the computer device 100, and may be formed by reading, by a processor (which may refer to a processor of a motherboard, an MCU, or a processor of another chip) of the main computer module 110, a corresponding computer program instruction in a readable storage medium such as a nonvolatile memory into an internal memory for running. In practical applications, after receiving the screen locking control instruction sent by the secondary computer module 120, the primary computer module 110 will control the processor to read the corresponding computer program instruction in the readable storage medium such as the non-volatile memory into the content for operation, so as to form the screen locking module 111. The screen locking control command mentioned here may be a screen locking start command, a screen locking close command, or other commands related to screen locking or unlocking.
The sub-computer module 120 that transmits the lock screen control instruction may be a computer module that is mounted on the computer apparatus 100 to meet its particular scene. The secondary computer module 120 may be built into the computer device 100 or may be external to the computer device 100. In one example, the secondary computer module 120 may be hot-plugged into the interface device corresponding to the primary computer device 100 when it is built into the computer device 100. In another example, when the sub-computer module 120 is externally disposed on the computer device 100, it can be connected to the computer device 100 through a corresponding connecting line, and can also be connected to the computer device 100 in a wireless manner through a peripheral device.
In addition, there may be more than two sub-computer modules 120 installed in the computer device 100, and the specific number is determined according to the requirements of the application scenario of the computer device 100. Different sub-computer modules 120 are respectively connected with the main computer module 110, and in order to realize the screen locking control, screen locking control instructions can be respectively sent to the main computer module 110. Wherein, the lock screen control instruction is generated by the lock screen control module 121 contained in the secondary computer module 120.
The screen locking control module 121 is a software program module, corresponds to a program code of a screen locking control application or a screen locking control plug-in, and is configured to control the screen locking module 111 of the main computer module 110 to lock a screen, and may be formed by reading, by the processor of the sub-computer module 120, a corresponding computer program instruction in a readable storage medium such as a non-volatile memory into an internal memory for operation. In practical applications, after the screen locking control condition is satisfied, the sub-computer module 120 controls the processor to read the corresponding computer program instructions in the readable storage medium such as the non-volatile memory into the content for operation, so as to form the screen locking control module 121. The lock screen control condition mentioned here may be a lock screen condition for triggering lock screen activation, an unlock condition for triggering lock screen deactivation, or other lock screen related conditions. After the screen locking control condition is satisfied, the screen locking control module 121 generates a corresponding screen locking control instruction, and sends the screen locking control instruction to the screen locking module 111 through the connection channel between the secondary computer module 120 and the primary computer module 110.
In practical application, in order to protect the privacy and important data of a user, the embodiment of the present invention may determine that a screen locking condition is satisfied when a touch operation of the user is detected, a predetermined time is reached, or another trigger event for triggering screen locking is detected, and the screen locking control module 121 generates a screen locking start instruction and sends the screen locking start instruction to the screen locking module 111. Specifically, when the lock screen start instruction is transmitted, the lock screen start instruction is transmitted through a connection channel between the sub-computer module 120 and the main computer module 110. The screen locking module 121 receives the screen locking starting instruction and outputs a screen locking interface displayed on the top. The screen locking interface may be randomly selected from a preset screen locking interface library, or after the selection is triggered by the user of the secondary computer module 120, the identifier of the selected screen locking interface may be sent to the screen locking module 111 along with a screen locking start instruction.
In addition, the time when the screen locking module 121 outputs the screen locking interface may be preset, or may be triggered by the user of the secondary computer module 120, and the triggered time information may be sent to the screen locking module 111 along with the screen locking start instruction. The time for outputting the screen locking interface may be different according to the application scenario and the preset after receiving the screen locking start instruction, or when the computer device continues for a predetermined time and is not used by the user, and is not limited herein.
After the computer device 100 is locked, and under the condition that a user needs to use the computer device 100, the computer device 100 displays a screen locking interface, after unlocking is triggered in a predetermined manner, the screen locking control module 121 can perform verification operation on the acquired unlocking data, and if verification is successful, a screen locking closing instruction is generated and sent to the screen locking module 111; the screen locking module 111 may receive the screen locking closing instruction, cancel the screen locking interface displayed on the top, and unlock the computer device.
Before performing the verification operation on the acquired unlocking data, the screen locking control module 121 needs to acquire the unlocking data, and the unlocking data, the mode of acquiring the unlocking data, and the mode of verifying the unlocking data may be determined by a predetermined unlocking mode, which is described in detail later.
The transmission path of the screen locking control command, the unlocking data, or other data related to screen locking/unlocking between the lower screen locking control module 121 and the screen locking module 111 is first described below:
the specific transmission path relates to the internal architecture of the computer device 100 and the connection between the secondary computer module 120 and the primary computer module 110, which are listed below, but it should be noted that the computer device according to the embodiment of the present invention may be an intelligent interactive tablet, a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a navigation device, an e-mail receiving and sending device, a game console, a tablet computer, an internet television, a smart locomotive, an unmanned vehicle, a smart home device, or a combination of any several of these devices, and the screen locking control system according to the embodiment of the present invention is not limited to the following two types:
referring to fig. 1B, please refer to fig. 1B, the computer device in the lock screen control system shown in fig. 1B takes the smart interactive tablet 200 as an example, and may be loaded with a main computer module and an auxiliary computer module, where the auxiliary computer module may be any one of an internal android module 220, an internal PC module 230, and an external PC/android module 240 of the smart interactive tablet 200, and the internal android module 220 and the internal PC module 230 may be pluggable modules.
The main computer module is also the main computer module 210 of the smart interactive tablet 200, the main computer module 210 may include a main chip 211, an MCU213 and a USB switch 214, and the smart interactive tablet 200 may further include a touch device 250 connected to the main chip 211.
The main chip 211 is loaded with an operating system of the main computer module, such as an Android system (Android system), and the main chip 211 may be connected to an MCU213(MicrocontrollerUnit, MCU for short), and connected to the built-in Android module 220 and the built-in PC module 230 through the MCU213 and the USB switch 214.
The main chip 211 can also be connected to at least one external android/PC module 240 through the MCU213 and the USB switch 214. The external android/PC module 240 includes, but is not limited to: smart phones, USB flash drives, laptops, desktop computers, tablet computers, Personal Digital Assistants (PDAs), and the like.
The communication mode of the data connection between the external android/PC module 240 and the smart interactive tablet 200 includes, but is not limited to, a USB connection, an internet, a local area network, a bluetooth, a Wi-Fi protocol (Wi-Fi) or a ZigBee protocol (ZigBee), and the embodiment of the present invention is not limited thereto.
Further, when data interaction occurs between the at least one external android/PC module 240 and the smart interactive tablet 200, the screen projection data is sent to the smart interactive tablet 200 so that the smart interactive tablet 200 displays screen projection content of the screen projection data, the external android/PC module 240 is equipped with a screen projection client, generally speaking, one or more screen projection clients may be provided, and the screen projection client is set according to a specific application scene, and the embodiment is not limited.
In other embodiments, the intelligent interactive tablet 200 according to the embodiments of the present invention may be an integrated device that integrates one or more functions of a projector, an electronic whiteboard, a curtain, a sound, a television, a video conference terminal, and the like.
In practical applications, when the screen locking control command, the unlocking data, or other data related to screen locking/unlocking are transmitted between the screen locking control module and the screen locking module, the transmission is performed through the USB switch 214, the MCU213, and the operating system of the main chip 211. For example, the screen locking control command may be transmitted from the secondary computer module to the USB switch 214 as an MCU command, the USB switch 214 is transmitted to the MCU213, and the MUC213 is transmitted to the operating system of the main chip 211 and then transmitted to the screen locking module.
Referring to fig. 1C, please refer to fig. 1C, the computer device in the lock screen control system shown in fig. 1C takes the smart interactive tablet 300 as an example, and may be loaded with a main computer module and an auxiliary computer module, where the auxiliary computer module may be any one of the built-in android module 320, the built-in PC module 330, and the external PC/android module 340 of the smart interactive tablet 300, and the built-in android module 320 and the built-in PC module 330 may be pluggable modules.
The main computer module may include a main chip 311, an MCU313 and a USB switch 314, and the smart interactive tablet 300 may further include a touch device 350 connected to the main chip 311.
The main chip 311 is loaded with an operating system of the main computer module, such as an Android system (Android system, main operating system), and the main chip 211 may be connected to the MCU213 and the USB switch, and connected to the built-in Android module 320 and the built-in PC module 330 through the USB switch 314.
The main chip 311 may further be connected to the OUT output module 360 and at least one external android/PC module 340 through the USB switch 314. The external android/PC module 340 is as described above and will not be described herein. The OUT output module 360 can be used for providing functions of the MCU313 for assisting the switching of the USB interface of the peripheral and LED indication.
In addition, in some examples, considering that the smart interactive tablet 300 may be equipped with a plurality of secondary computer modules, the MCU313 may be configured such that one end of the MCU313 is connected to the main chip 311 via a USB data cable and the other end of the MCU is connected to the key module 361, the infrared remote control module 362, the channel switching module 363, and the power control module 364 via GPIO. According to the embodiment of the invention, the setting and control of various functions among a plurality of secondary computer modules are realized through the key module 361, the infrared remote control module 362, the channel switching module 363 and the power supply control module 364.
It should be noted that the key module 361, the infrared remote control module 362, the channel switching module 363, and the power control 364 do not have an inclusion relationship and are independent and coexistent. The key module 361 may be a key platelet, and may include the following keys, for example: the present invention is not limited to the above, and the examples include power on/off, volume +/-, menu, etc., which may be physical keys or virtual keys.
In practical applications, when the screen locking control command, the unlocking data, or other data related to screen locking/unlocking are transmitted between the screen locking control module and the screen locking module, the data are transmitted to the operating system of the main chip 311 via the USB switch 314. For example, the secondary computer module may transmit the screen locking control command to the USB switch 314, and the USB switch 314 transmits the screen locking control command to the operating system of the main chip 311 and then transmits the screen locking control command to the screen locking module.
As described above, in a case that the lock screen control instruction is a lock screen close instruction, before the lock screen control module performs a verification operation on the acquired unlock data, the lock screen control module further needs to acquire the unlock data, and the unlock data, the manner of acquiring the unlock data, and the manner of verifying the unlock data may be determined by a predetermined unlock manner, which is described below with reference to the accompanying drawings, but it should be noted that the embodiments of the present invention are not limited to the following:
first, the predetermined unlocking mode is a password unlocking mode, a user can input a main computer module through a screen locking interface, or input a password into an auxiliary computer module through other input modes, and then the main computer module or the auxiliary computer module forwards the input password until the input password reaches a screen locking control module. The password mentioned here may be a character, a pattern, or biometric data such as audio, fingerprint, iris, human face, or other forms of passwords, and is not limited herein.
After the screen locking control module receives the password, the received password and the pre-stored unlocking password can be compared and verified, and after the verification is passed, a screen locking closing instruction is generated.
The unlocking password mentioned here may be preset by the lock screen control module, or may be obtained by the lock screen control system shown in fig. 1D.
The lock screen control system shown in fig. 1D may include a computer device 4100 and a server 4200, and the computer device 4100 and the server 4200 may be associated via a wired or wireless network.
The computer device 4100 may be loaded with a main computer module 4110 and a secondary computer module 4120, the secondary computer module 4120 includes a lock screen control module 4121, and the main computer module 4110 includes a lock screen module 4111.
In practical applications, after the screen locking control module 4121 sends the screen locking start instruction to the screen locking module 4111, the screen locking control module 4121 may request the server 4200 for an unlocking password, the server 4200 returns the unlocking password after receiving the request, and the screen locking control module 4121 receives and stores the returned unlocking password. And when unlocking is needed subsequently, comparing the acquired password with the stored unlocking password.
In other scenarios, the unlocking password may also be preset and stored by the server 4200 directly and notify the user needing to be unlocked, after the password is acquired by the lock screen control module 4121 and the verification operation is performed, the password may be sent to the server 4200, the received password is compared with the stored unlocking password by the server 4200, after the verification, the verification result is returned to the lock screen control module 4121, and the lock screen control module 4121 determines whether the verification is successful according to the verification result.
In the above embodiments, after the verification is successful, the screen locking control module 4121 of the secondary computer module 4120 generates a screen locking closing instruction, and sends the screen locking closing instruction to the screen locking module 4111, and the screen locking module 4111 cancels the screen locking interface displayed on the top to unlock the screen, so that the user may use the computer device 4100.
Secondly, the preset unlocking mode is unlocking of the unlocking device, the unlocking device can be a U disk, an NFC card and the like, and unlocking data are stored in the unlocking device. Unlocking may be accomplished by the lock screen control system shown in fig. 1E.
The lock screen control system shown in fig. 1E may include a computer device 5100 and an unlocking device 5300, where the computer device 5100 may be loaded with a main computer module 5110 and a sub-computer module 5120, the sub-computer module 5120 includes a lock screen control module 5121, and the main computer module 5110 includes a lock screen module 5111.
When unlocking is required, the unlocking device 5300 may be connected to the main computer module 5110 or the sub-computer module 5120 in a wired or wireless manner.
If the unlocking device 5300 is connected to the secondary computer module 5120, the secondary computer module 5120 reads the unlocking file in the unlocking device 5300 and then sends the unlocking file to the lock screen control module 5121.
If the unlocking device 5300 is connected with the main computer module 5110, the main computer module 5110 reads the unlocking file in the unlocking device 5300, sends the unlocking file to the screen locking module 5111, the screen locking module 5111 sends the unlocking file to the auxiliary computer module 5120, and the auxiliary computer module 5120 sends the unlocking file to the screen locking control module 5121;
after receiving the unlock file, the lock screen control module 5121 may decrypt the unlock file by using a predetermined decryption algorithm; and if the decryption is successful, extracting the unlocking data from the decrypted unlocking file. If the decryption fails, the unlocking device 5300 is indicated to have no unlocking right, and the unlocking is prohibited.
After the unlocking data is extracted, the screen locking control module 5121 may compare the unlocking data with the unlocking data pre-stored therein for verification.
In some examples, the lock screen control system shown in fig. 1E may further include a server 5200 connected to the computer device 5100, the lock screen control module 5121 may send unlocking data to the server 5200, the server 5200 sends a verification result to the lock screen control module 5121 after verifying the unlocking data, and the lock screen control module 5121 determines whether the verification of the unlocking data is successful according to the returned verification notification.
It should be noted that the unlocking data may be the aforementioned character password, and may also include at least one of the related login data, the user right data, and the identification of the unlocking device. Here, the identity of the unlocking device 5300 may refer to a unique identification code of the unlocking device 5300, which is assigned to be written into the unlocking device 5300 when the unlocking device 5300 is manufactured; the login data may be login data of a lock screen control application corresponding to the lock screen control module 5121, or login data of other applications installed in the secondary computer module 5120, which may be specifically determined by an application that a user wants to use; the user authority data is mainly used for verifying whether the user identity is authorized in the corresponding management platform by the related platform. For example, the application in the secondary computer module 5120 is an intelligent classroom application, the login data is a login account and a login password of the intelligent classroom application, and the user right data is a code of a school to which the computer device belongs, and is used for verifying whether the user identity is authorized in a management platform of the school.
In addition, the server 5200 may also have different implementations for different unlocking data, for example, the unlocking data only includes login data, and the server 5200 may be a login server and may verify the login data.
For another example, the unlocking data includes user right data and an identity of the unlocking device 5300, and the server 5200 may be a right authentication server, and only needs to authenticate the user right data and the identity of the unlocking device 5300.
Fig. 1E of the embodiment of the present invention illustrates that, for the case that the unlocking data includes login data, user right data, and an identity of the unlocking device 5300, the server 5200 may include a login server 5210 and a right verification server 5220.
After the screen locking control module extracts the unlocking data, it may send login data to the login server 4210, and send the user permission data and the identity to the permission verification server 5220. The login server 5210 performs login authentication on the login data, and returns an authentication result. The authority verification server 5220 performs authority verification on the user authority data and the identity, and returns a verification result. The screen locking control module 5121 determines that the unlocking data is successfully verified when the verification of the login server 5210 and the verification of the authority verification server 5220 are both passed according to the returned verification result.
In the above embodiments, after the verification is successful, the screen locking control module 5121 of the secondary computer module 5120 generates a screen locking closing instruction, and sends the screen locking closing instruction to the screen locking module 5111, and the screen locking module 5111 cancels the screen locking interface displayed on the top to unlock the screen, so that the user can use the computer device 5100.
Thirdly, the predetermined unlocking mode is code scanning unlocking, and unlocking can be realized through the screen locking control system shown in fig. 1F.
The screen locking control system shown in fig. 1F may include a computer device 6100 and a login server 6200 user terminal 6300, where the computer device 6100 may be equipped with a main computer module 6110 and an auxiliary computer module 6120, the auxiliary computer module 6120 includes a screen locking control module 6121, and the main computer module 6110 includes a screen locking module 6111.
The login server 6200 may connect the computer device 6100 and the user terminal 6300 in a wired or wireless manner, respectively.
In practical application, when unlocking is required, an unlocking trigger condition may be triggered, and the screen locking control module 6121 responds to the unlocking trigger condition to request the graphic code and the access token from the login server 6200. The unlocking triggering condition may be triggered by clicking a control of the screen locking interface, or may be triggered by other preset modes, which is not limited herein.
After receiving the request, the login server 6200 returns the graphic code and the access token.
The screen locking control module 6121 receives the returned graphic code and the access token, and sends the graphic code to the screen locking module 6111.
The screen locking module 6111 outputs the graphical code to a screen locking interface, the user terminal 6300 scans the graphical code after starting its scanning function, and sends user login information to the login server 6200 after scanning, where the user terminal 6300 may be a smart phone, a tablet computer, a PDA, or other handheld devices with a code scanning function, and the user login information may be a login account and a login password of an application with a scanning function, or an account and a password of a user at a cloud associated with the user terminal.
The login server 6200 generates user permission data according to the user login information.
The screen locking control module 6121 sends an authority data request carrying the access token to the login server 6200, and the login server 6200 responds to the authority data request and returns the user authority data.
After receiving the user permission data, the screen locking control module 6121 may directly compare the received user permission data with the pre-stored user permission data for verification.
In addition, as shown in fig. 1F of the embodiment of the present invention, the screen locking control system may further include an authority verification server 6400, and the screen locking control module 6121 may send the user authority data to the authority verification server 6400; the authority verification server returns a verification result after verifying 6400 the user authority data; the screen locking control module 6121 determines whether the verification of the unlocking data is successful according to the verification result.
In the above embodiments, after the verification is successful, the screen locking control module 6121 of the secondary computer module 6120 generates a screen locking closing instruction, and sends the screen locking closing instruction to the screen locking module 6111, and the screen locking module 6111 cancels the screen locking interface displayed on the top, so as to unlock the screen, and the user can use the computer device 6100.
The screen locking control systems shown in fig. 1A to fig. 1F are only some that may be related to the embodiments of the present invention, and in other scenarios, the screen locking control system implementing the scheme of the present invention may be in other forms, which are not described herein again. The following describes in detail a detailed screen locking process in the screen locking control method according to the embodiment of the present invention, in combination with a screen locking control system:
referring to fig. 2, fig. 2 is a flowchart illustrating a screen locking control method of a computer device according to an exemplary embodiment of the present invention.
The computer device related to the screen locking control method shown in fig. 2 may be the computer device in any embodiment of fig. 1A to 1F, the computer device is loaded with a main computer module and a sub-computer module, and the method shown in fig. 2 may be applied to the sub-computer module, and includes the following steps S201 to S202:
and step S201, generating a screen locking starting instruction when the screen locking condition is met.
Step S202, sending the screen locking starting instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module. And the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top.
Technical contents related to the embodiment of the present invention correspond to the technical contents related to fig. 1A to 1F, and are not described herein again.
The method of the embodiment of the invention can be executed by a screen locking control plug-in or a screen locking control application installed in the secondary computer module, and when the screen locking control plug-in or the screen locking control application determines that the screen locking condition is met, the screen locking starting instruction is sent to the screen locking application of the primary computer module.
The specific mode of sending the screen locking start instruction may be determined by the internal architecture of the computer device and the connection mode of the main computer module and the auxiliary computer module, and in an example, as shown in fig. 1B, the auxiliary computer module is connected to the main board of the main computer module sequentially through the USB switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard; and the screen locking starting instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the main operating system.
In another example, referring to fig. 1C, the secondary computer module is connected to the main board of the main computer module through the USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard; and sending a screen locking starting instruction to the screen locking application through the USB selector switch and the main operating system.
Aforementioned main computer module and auxiliary computer module can be for the android module, the PC module, linux module or carry on other operating system's computer module, specifically can be decided by the application scene, for example, computer equipment is intelligent mutual flat board, use at intelligent teaching scene, main computer module can be for the android module, can install intelligent teaching and use, for satisfying teacher's operation habit of operating personal computer, auxiliary computer module is the PC module, can install plug-in or the application of control intelligent teaching and use.
In addition, in order to facilitate subsequent unlocking, the embodiment of the invention can also make some preliminary preparations for subsequent unlocking operations.
In an example, if the unlocking manner is password unlocking, the embodiment of the present invention may notify the user to enter an unlocking password. In another example, embodiments of the present invention may request an unlock password from an associated server; and receiving and storing the unlocking password returned by the server.
In other examples, when the unlocking mode is scanning unlocking or equipment unlocking, if the unlocking data verification is performed on the screen locking control application or the screen locking control plug-in of the secondary computer module, the embodiment of the invention can request the scanning unlocking or equipment unlocking mode from the related server to perform the data required for the unlocking data verification; if the related server verifies the unlocking data, the related server can configure unlocking equipment and a graphic code which can be unlocked or data which are needed to be used for verifying the unlocking data.
It can be known from the foregoing embodiment that the screen locking control method according to the embodiment of the present invention can be applied to a secondary computer module carried by a computer device, and when a screen locking condition is satisfied, a screen locking start instruction is generated, the screen locking start instruction is sent to a screen locking application of a primary computer module carried by the computer device, and the screen locking start instruction sent to the screen locking application can control the screen locking application to output a screen locking interface. Because the display level of the output content of the main computer module is higher than that of the auxiliary computer module, the display level of the screen locking interface output by the screen locking application can be higher than that of the auxiliary computer module, the effect of top display is achieved, and the computer equipment can be used after the screen is unlocked no matter whether the computer module operated by the computer equipment is switched or not. Compared with the related screen locking control technology, the auxiliary computer module does not need to be independently provided with screen locking application, and each computer module can achieve the purpose of locking other computer modules through controlling the screen locking application of the main computer module.
After the screen is locked, if unlocking is needed subsequently, the embodiment of the invention can unlock the screen by the screen locking application of the main computer module according to a corresponding unlocking mode according to the existing unlocking method. However, the embodiment of the present invention further provides different unlocking methods, which are executed by the screen locking control application or the screen locking control plug-in of the secondary computer module, and the following describes in detail the detailed unlocking process in the screen locking control method according to the embodiment of the present invention in combination with the screen locking control system:
referring to fig. 3, fig. 3 is a flowchart illustrating a screen locking control method of a computer device according to another exemplary embodiment of the present invention.
The computer device related to the screen locking control method shown in fig. 3 may be the computer device in any embodiment of fig. 1A to 1F, the computer device is equipped with a main computer module and a sub-computer module, and the method shown in fig. 3 may be applied to the sub-computer module, and includes the following steps S301 to S303:
step S301, a verification operation is performed on the acquired unlock data.
And step S302, if the verification is successful, generating a screen locking closing instruction.
Step S303, sending the screen locking closing instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of other computer modules; and the screen locking closing instruction is used for controlling the screen locking application, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
Technical contents related to the embodiment of the present invention correspond to the technical contents related to fig. 1A to 1F, and are not described herein again.
The method of the embodiment of the invention can be executed by a screen locking control plug-in or a screen locking control application installed in the secondary computer module, and the screen locking control plug-in or the screen locking control application sends the screen locking closing instruction to the screen locking application of the primary computer module after the unlocking data is successfully verified.
Before verifying the acquired unlocking data, the embodiment of the present invention may execute the step of acquiring the unlocking data, where the manner of acquiring the unlocking data is determined by a predetermined unlocking manner and a currently operating computer module, and the following are some examples:
first, the unlocking method is password unlocking. If the unlocking password is a pattern or a character, in one example, the unlocking password can be input into the main computer module through a screen locking interface or a key on a keyboard, and then the main computer module is switched to a screen locking control application of the auxiliary computer module to complete the acquisition of the unlocking data. The specific unlocking process can be seen in fig. 4:
the user inputs the password into the screen locking application of the main computer module through the screen locking interface or keys on the keyboard (step S41), when the user specifically inputs the password, the touch device sends the touch data to the operating system of the main computer module, the operating system sends the touch data to the input subsystem, the input subsystem sends the touch data to the screen locking application, and the screen locking application determines that the character corresponding to the touch data is the password.
The screen locking application can send the password to the screen locking control application or the plug-in of the secondary computer module (step S42), the screen locking control application or the plug-in verifies the received password after receiving the input password (step S43), and during specific verification, the received password can be compared with a prestored unlocking password, if the received password is consistent with the prestored unlocking password, the verification is successful, and if the received password is inconsistent with the prestored unlocking password, the verification fails.
After the verification is successful, the screen locking control application or the plug-in generates a screen locking closing instruction and sends the screen locking closing instruction to the screen locking application (step S44), the screen locking application unlocks after receiving the instruction (step S45), and in some cases, the screen locking application can return an unlocking result to the screen locking control application or the plug-in (step S46).
In this example, the manner in which the screen locking application and the screen locking control application transmit data or instructions may refer to the embodiments shown in fig. 1A to fig. 1F, and is not described herein again.
In other examples, the screen locking control application or the plug-in may also send the password to the server, where the password is verified by the server, and a verification result is returned after verification, and the screen locking control application or the plug-in confirms whether the unlocking data is successfully verified according to the verification result, and successfully sends a screen locking closing instruction to the screen locking application, and the screen locking application unlocks after receiving the screen locking closing instruction.
In addition, when the method is applied to a specific scene, such as an intelligent teaching scene, a user can be a teacher, a main computer module can be an android module, an auxiliary computer module can be a PC module and can be plugged, and a server can be a C + +/web background.
In another example, the password is biological data such as audio, fingerprint, iris, face, etc., the screen locking interface of the embodiment of the present invention may include a UI interface for identifying the biological data, after the user triggers a corresponding identification manner on the UI interface, the screen locking module calls a corresponding biological data acquisition device, such as a microphone array, a fingerprint sensor, a camera, etc., after the identified biological data, in order to improve the unlocking efficiency, the screen locking application may directly perform verification, and after the verification passes, the biological data is directly unlocked; if the unlocking efficiency is not intended, the recognized biological data can be transmitted to the screen locking control application or the plug-in of the secondary computer module for verification, a screen locking closing instruction is generated after the verification is passed, and the screen locking closing instruction is sent to the screen locking application to realize unlocking.
In other examples, in order to improve the unlocking efficiency and verify the biometric data by the lock screen control application, the unlocking may be performed in the following manner, specifically referring to fig. 5:
the user triggers a corresponding biometric data recognition mode on the UI interface (step S51), which may be a biometric data recognition mode such as an audio recognition mode, a fingerprint recognition mode, an iris recognition mode, a face recognition mode, etc., and is not limited herein.
The lock screen application sends a notification to the lock screen control application or plug-in through which biometric data recognition is performed after detecting the trigger (step S52).
After receiving the biological data identification notification sent by the screen locking application, the screen locking control application or the plug-in generates and outputs a biological data identification interface displayed on the top (S53), and sends a request for temporarily closing the screen locking interface to the screen locking application (S54);
after receiving the request, the screen locking application temporarily removes the screen locking interface and switches and displays the output content of the secondary computer module (S55), wherein the specific switching can inform the operating system of the primary computer module to switch, and the biological data identification interface can be displayed after the switching.
The screen locking control application or the plug-in acquires the biological data (S56), and when the screen locking control application or the plug-in acquires the biological data, the biological data acquisition device is informed to acquire the biological data, the biological data sent by the biological data acquisition device is received, and the biological characteristic data is extracted from the biological data to be unlocking data.
The lock screen control application or plug-in then notifies the lock screen application to output the top displayed lock screen interface (S57).
Furthermore, the lock screen control application or the plug-in may authenticate the extracted biometric data by itself (S58), and after the authentication is successful, generate a lock screen closing instruction and send the lock screen closing instruction to the lock screen application (S59), and after the lock screen application receives the instruction, cancel the unlock interface and unlock (step S510).
In this example, the manner in which the screen locking application and the screen locking control application transmit data or instructions may refer to the embodiments shown in fig. 1A to fig. 1F, and is not described herein again.
In other examples, the screen locking control application or the plug-in can also send the biometric data to the server for verification, the server returns a verification result after verification, the screen locking control application or the plug-in confirms whether the unlocking number is verified successfully or not according to the verification result, a screen locking closing instruction is successfully sent to the screen locking application, and the screen locking application unlocks after receiving the instruction.
In addition, when the method is applied to a specific scene, such as an intelligent teaching scene, a user can be a teacher, a main computer module can be an android module, an auxiliary computer module can be a PC module and can be plugged, and a server can be a C + +/web background.
And secondly, the unlocking mode is unlocking of the unlocking device, the preset unlocking mode is unlocking of the unlocking device, the unlocking device can be a U disk, an NFC card and the like, and unlocking data are stored in the unlocking device. When unlocking is needed, the unlocking device can be connected with the main computer module or the auxiliary computer module in a wired or wireless mode.
In an example, before performing a verification operation on the acquired unlocking data, the embodiment of the present invention may acquire the unlocking data by:
receiving an unlocking file of unlocking equipment; the screen locking file is read by the auxiliary computer module and then forwarded, or the screen locking application receives the screen locking file from the main computer module and then forwards the screen locking file;
decrypting the unlocking file by adopting a preset decryption algorithm;
and if the decryption is successful, extracting the unlocking data from the decrypted unlocking file.
Further, the verification operation may be performed on the acquired unlock data by:
sending the extracted unlocking data to an associated server; the specific form of the server may be determined by the unlocking data or the application scenario, which is not described herein again, and reference may be made to the embodiment related to fig. 1E.
And determining whether the verification of the unlocking data is successful or not according to the verification notice returned by the server.
In the above embodiment, after the verification is successful, a screen locking closing instruction may be generated and sent to the screen locking application, and the screen locking application is controlled to cancel the screen locking interface displayed on the top, which is output by the screen locking application, so as to achieve unlocking.
In some cases, considering that a network between the computer device and the server may be offline, in order to ensure successful unlocking through the unlocking device during offline, after the unlocking data is successfully verified, the embodiment of the invention may further cache the extracted unlocking data as verification data to the local; if the unlocking file in the unlocking device is read again and decrypted successfully, the unlocking data is extracted from the decrypted unlocking file, and if the network between the unlocking file and the server is unavailable, the extracted unlocking data is compared with the locally cached verification data; if so, the verification is determined to be successful.
In addition, in some examples, the unlocking data includes login data, user permission data, and an identity of the unlocking device, and after the unlocking data is extracted, the login data may be sent to the login server, the user permission data and the identity of the unlocking device may be sent to the permission verification server, and if the sending fails or a returned verification result is not received within a predetermined time, it is determined that the network with the server is unavailable.
In one example, to improve the security of locking the screen, the locally cached verification data may be updated or the unlock file in the device may be unlocked after the computer device is unlocked.
In another example, in order to avoid the problem that the local cache check file is invalid due to the recovery software, when the check data is updated each time, the updated check data can be synchronously stored in the partition of the local hard disk, and the update time is recorded; when the extracted unlocking data is compared with the locally cached check data, the locally cached check data can be replaced by the latest stored check data of the partition of the local hard disk according to the recorded updating time; and comparing the extracted unlocking data with the replaced verification data. After the operation, as long as not all the partitions are restored, the offline unlocking can be normally used.
Whether the locally cached check data is consistent with the latest check data stored in the partition of the local hard disk or not can be judged; if the unlocking data is consistent with the verification data, the extracted unlocking data is compared with the verification data cached locally; and if the unlocking data are inconsistent, comparing the extracted unlocking data with the latest stored check data of the partition of the local hard disk.
In the above embodiment, after the verification is successful, a screen locking closing instruction may be generated and sent to the screen locking application, and the screen locking application is controlled to cancel the screen locking interface displayed on the top, which is output by the screen locking application, so as to achieve unlocking.
In other cases, the unlocking data includes login data, and in order to improve login efficiency of the relevant application in the secondary computer module, the embodiment of the present invention may further send the login data to the relevant application, so that the relevant application logs in the login server. Therefore, the unlocking can be realized while one-key login is realized.
The following may be said to unlock the unlocking device in conjunction with fig. 6 and the primary and secondary computer modules:
if the unlocking device is connected with the secondary computer module, the secondary computer module reads the unlocking file in the unlocking device and then sends the unlocking file to the screen locking control application or the plug-in (step S61). In this example, the unlocking device is taken as a usb disk as an example.
If the unlocking device is connected to the host computer module, the host computer module reads the unlocking file in the unlocking device (step S62), and then sends the unlocking file to the screen locking application, and the screen locking application sends the unlocking file to the screen locking control application or the plug-in (step S63).
After receiving the unlocking file, the screen locking control application or the plug-in can decrypt the unlocking file by adopting a preset decryption algorithm; if the decryption is successful, the unlock data is extracted from the decrypted unlock file (S64). If the decryption fails, the unlocking device is indicated to have no unlocking authority, and the unlocking is forbidden. The unlocking file can be encrypted by adopting an AES (advanced encryption standard) encryption algorithm of serial number information of the unlocking device, so that the unlocking file in the unlocking device is prevented from being copied, and the decryption adopts a corresponding decryption algorithm.
After the unlocking data is extracted, in an example, the screen locking control application or the plug-in may compare the unlocking data with the unlocking data pre-stored in the screen locking control application or the plug-in.
In some examples, the screen locking control application or the plug-in may send unlocking data to the server, the server sends a verification result to the screen locking control application or the plug-in after verifying the unlocking data, and the screen locking control application or the plug-in determines whether the verification of the unlocking data is successful according to a returned verification notification.
It should be noted that the unlocking data may be the aforementioned character password, and may also include at least one of the related login data, the user right data, and the identification of the unlocking device. Specifically, reference may be made to the embodiment shown in fig. 1E, which is not described herein again.
In addition, the server may have different implementation manners for different unlocking data, for example, the unlocking data only includes login data, and the server may be a login server to verify the login data.
For another example, the unlocking data includes user permission data and an identity of the unlocking device, and the server may be a permission verification server, and it is sufficient to verify the user permission data and the identity of the unlocking device.
Fig. 6 of the embodiment of the present invention illustrates that, for a case where the unlocking data includes login data, user right data, and an identity of the unlocking device, the server may include a login server and a right verification server.
After the unlocking data is extracted by the screen locking control application or the plug-in, login data may be sent to the login server (step S65), and the login server performs login verification on the login data and returns a verification result (step S66). The screen locking control application or the plug-in confirms whether login verification is successful according to a verification result, if not, the screen locking device is connected with the main computer module, the screen locking control application or the plug-in sends a screen locking file to be updated to the screen locking application (S67), the screen locking application prompts the screen locking device to update the screen locking file (S68), the screen locking device is connected with the main computer module again after updating the screen locking file, the main computer module reads an unlocking file in the unlocking device and sends the unlocking file to the screen locking application, the screen locking application sends the unlocking file to the screen locking control application or the plug-in (S69), and the screen locking control application or the plug-in can decrypt the unlocking file by adopting a preset decryption algorithm after receiving the unlocking file; if the decryption is successful, the unlocking data is extracted from the decrypted unlocking file (S610).
The lock screen control application or the plug-in may send login data to the login server again (step S611), and the login server performs login authentication on the login data (step S612), and returns an authentication result (step S613). And the screen locking control application or the plug-in confirms whether the login verification is successful according to the verification result, if so, authority data are sent to an authority verification server, the authority data comprise the user authority data and the identity (S614), the authority verification server performs authority verification, the user authority data and the identity are subjected to authority verification (step S615), and the verification result is returned (S616).
And the screen locking control application or the plug-in confirms whether the authority verification is successful according to the verification result, if so, a screen locking closing instruction is generated and sent to the screen locking application (S617), and the screen locking application cancels the screen locking interface after receiving the screen locking instruction and unlocks the screen locking interface (S618).
In addition, if the screen locking control application or the plug-in sends the login data to the login server for the first time, the login authentication is confirmed to be successful according to the returned authentication result, and the user permission data and the identity can be directly sent to the permission authentication server. And the authority verification server performs authority verification on the user authority data and the identity identification and returns a verification result. And the screen locking control application or the plug-in confirms whether the authority verification is successful according to the verification result, if so, a screen locking closing instruction is generated and sent to the screen locking application, and the screen locking application receives the screen locking interface which is cancelled and unlocks.
And thirdly, the preset unlocking mode is code scanning unlocking, wherein code scanning is code scanning by a user terminal, the user terminal can be a smart phone, a tablet computer, a PDA or other handheld devices with a code scanning function, and the scanned graph can be a two-dimensional code or a bar code with other dimensions, which is not limited herein.
In an example, the unlocking data includes user right data, and before performing a verification operation on the acquired unlocking data, the embodiment of the present invention may acquire the unlocking data through the following operations:
and responding to an unlocking trigger condition, and requesting the unlocking graphic code and the access token from the login server.
And receiving the graphic code and the access token returned by the login server.
And sending the graphic code to a screen locking application of a main computer module so as to control the screen locking application to output the graphic code to a screen locking interface.
And sending an authority data request carrying the access token to the login server.
Receiving user authority data returned by the login server; and the user authority data is generated by the login server according to the user login information after the user terminal scans the graphic code and successfully logs in the login server.
Furthermore, the screen locking control application or the plug-in can directly verify the user permission data and also can send the user permission data to the permission verification server, the permission verification server returns a verification result after verification, and the screen locking control application or the plug-in can confirm whether the unlocking data is successfully verified according to the returned verification result.
In other cases, in order to improve the login efficiency of the relevant applications in the secondary computer module, the embodiment of the present invention may also request the login server for login data reported by the user terminal after scanning the graphic code; and sending the requested login data to the associated application so that the associated application can log in the login server.
The following can be combined with fig. 7 and the main computer module and the sub-computer module to describe the following unlocking of the graphic code:
after the unlocking trigger condition is triggered, the screen locking control application or the plug-in of the secondary computer module responds to the unlocking trigger condition to request the graphic code and the access token from the login server (step S71). Upon receiving the request, the login server returns the graphic code and the access token (step S72). The screen locking control application or the plug-in receives the returned graphic code and the access token and transmits the graphic code to the screen locking application of the main computer module (step S73). And the screen locking application outputs the graphic code to a screen locking interface (step S74), and the user terminal scans the graphic code after starting the scanning function of the user terminal and scans the code to log in (step S75). Specifically, the user login information may be sent to the login server after the graphic code is scanned. Referring to the embodiment of fig. 1F, the unlocking trigger condition may be a predetermined unlocking time, an unlocking notification sent by the lock screen application after the user touches the lock screen interface, or other conditions, which are not limited herein.
After the login server verifies the login data, user authority data is generated based on the user login information (step S76).
The screen locking control application or the plug-in sends an authority data request carrying the access token to the login server, and the login server responds to the authority data request and returns the user authority data (step S77).
After receiving the user permission data, the screen locking control application or the plug-in sends the user permission data to the permission verification server (step S78). The right authentication server returns the authentication result after authenticating the user right data (step S79). And the screen locking control application or the plug-in confirms whether the verification of the unlocking data is successful or not according to the verification result. After the verification is successful, the screen locking control application or the plug-in generates a screen locking closing instruction and sends the screen locking closing instruction to the screen locking application (step S710), and the screen locking application cancels the screen locking interface which is output by the screen locking application and displayed on the top to realize unlocking (step S711). In some cases, the unlocking result may be returned to the screen locking control application or the plug-in after the screen locking application is unlocked.
The method of the embodiment of the invention can be executed by a screen locking control plug-in or a screen locking control application installed in the secondary computer module, and the screen locking control plug-in or the screen locking control plug-in is sent to the screen locking application of the main computer module when the screen locking control application or the plug-in generates a screen locking closing instruction after the screen locking control plug-in or the plug-in verifies that the unlocking data is successful.
The specific mode of sending the screen locking closing instruction and the data between the screen locking application and the screen locking control application or the plug-in can be determined by the internal architecture of the computer equipment and the connection mode of the main computer module and the auxiliary computer module, in one example, referring to fig. 1B, the auxiliary computer module is connected with the main board of the main computer module sequentially through the USB switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard; and the screen locking closing instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the main operating system.
In another example, referring to fig. 1C, the secondary computer module is connected to the main board of the main computer module through the USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard; and sending a screen locking closing instruction to the screen locking application through the USB selector switch and the main operating system.
Aforementioned main computer module and auxiliary computer module can be for the android module, the PC module, linux module or carry on other operating system's computer module, specifically can be decided by the application scene, for example, computer equipment is intelligent mutual flat board, use at intelligent teaching scene, main computer module can be for the android module, can install intelligent teaching and use, for satisfying teacher's operation habit of operating personal computer, auxiliary computer module is the PC module, can install plug-in or the application of control intelligent teaching and use.
The following description is combined to describe the bilateral interactive operation of the main computer module and the auxiliary computer module in the screen locking process:
referring to fig. 8, fig. 8 is a flowchart illustrating a screen locking control method of a computer device according to another exemplary embodiment of the present invention.
The computer device related to the screen locking control method shown in fig. 8 may be the computer device in any embodiment related to fig. 1A to 1F, and the computer device is equipped with a main computer module and a sub-computer module, and the method shown in fig. 8 may be applied to the sub-computer module, and includes the following steps S801 to S804:
and step S801, generating a screen locking starting instruction when the screen locking condition is met on the side of the secondary computer module.
Step S802, at the side of the secondary computer module, sending the screen locking starting instruction to the screen locking application of the primary computer module.
And step S803, receiving the screen locking starting instruction at the side of the main computer module.
Step S803, on the side of the main computer module, a screen lock interface for top display is output.
Technical contents related to the embodiment of the present invention correspond to the technical contents related to fig. 1A to 1F, and are not described herein again.
The embodiment of the invention can be executed by a screen locking control plug-in or a screen locking control application installed in the auxiliary computer module at the side of the auxiliary computer module, and can be executed by a screen locking application installed in the main computer module at the side of the main computer module. Reference may be made to the embodiments related to fig. 1A to fig. 7, which are not described herein again.
The following description is combined to describe bilateral interactive operation of the main computer module and the auxiliary computer module in the unlocking process:
referring to fig. 9, fig. 9 is a flowchart illustrating a screen locking control method of a computer device according to another exemplary embodiment of the present invention.
The computer device related to the screen locking control method shown in fig. 9 may be the computer device in any embodiment of fig. 1A to 1F, where the computer device is equipped with a main computer module and a sub-computer module, and the method shown in fig. 9 may be applied to the sub-computer module, and includes the following steps S901 to S905:
step S901, at the sub-computer module side, performs a verification operation on the acquired unlock data.
And step S902, generating a screen locking and closing instruction on the side of the secondary computer module if the verification is successful.
And step S903, sending the screen locking closing instruction to the screen locking application of the main computer module at the side of the auxiliary computer module.
Step S904, receiving the lock screen close command at the host computer module side,
and step S905, on the side of the main computer module, canceling the screen locking interface displayed on the top, and unlocking the computer equipment.
Technical contents related to the embodiment of the present invention correspond to the technical contents related to fig. 1A to 1F, and are not described herein again. If the verification fails, unlocking may be disabled.
The embodiment of the invention can be executed by a screen locking control plug-in or a screen locking control application installed in the auxiliary computer module at the side of the auxiliary computer module, and can be executed by a screen locking application installed in the main computer module at the side of the main computer module. Reference may be made to the embodiments related to fig. 1A to fig. 7, which are not described herein again.
Corresponding to the embodiments of the method described above, the invention also provides embodiments of the apparatus.
Referring to fig. 10, fig. 10 is a block diagram of a lock screen control device of a computer device according to an exemplary embodiment of the present invention, the computer device having a main computer module and a sub-computer module mounted thereon, the lock screen control device being applicable to the sub-computer module, the device including: a screen locking instruction generating module 1010 and a screen locking instruction sending module 1020.
The screen locking instruction generating module 1010 is configured to generate a screen locking start instruction when a screen locking condition is met.
A screen locking instruction sending module 1020, configured to send the screen locking start instruction to a screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module.
And the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top.
The technical content related to the embodiment of the present invention corresponds to the foregoing embodiment, and is not described herein again.
In one example, the screen locking control device according to the embodiment of the present invention further includes:
and the password request module is used for requesting an unlocking password from the associated server.
And the password receiving module is used for receiving and storing the unlocking password returned by the server.
In another example, the secondary computer module is connected with the main board of the main computer module sequentially through the USB switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard; the screen locking starting instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the main operating system.
In another example, the secondary computer module is connected with the main board of the main computer module through a USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard; and the screen locking starting instruction is sent to the screen locking application through the USB selector switch and the main operating system.
As an example, the main computer module is an android module, and the secondary computer module is a PC module.
Referring to fig. 11, fig. 11 is a block diagram of a lock screen control device of a computer device according to an exemplary embodiment of the present invention, the computer device having a main computer module and a sub-computer module mounted thereon, the lock screen control device being applicable to the sub-computer module, the device including: an unlocking data verification module 1110, an unlocking instruction generation module 1120, and an unlocking instruction sending module 1130.
And an unlocking data verifying module 1110, configured to perform a verifying operation on the acquired unlocking data.
And an unlocking instruction generating module 1120, configured to generate a screen locking and closing instruction when the verification passes.
An unlocking instruction sending module 1130, configured to send the screen locking closing instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the other computer modules.
And the screen locking closing instruction is used for controlling the screen locking application, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
The technical content related to the embodiment of the present invention corresponds to the foregoing embodiment, and is not described herein again.
In one example, the screen locking control device according to the embodiment of the present invention further includes:
the password receiving module is used for receiving an unlocking password sent by the screen locking application as unlocking data before the verification operation is carried out on the obtained unlocking data; the unlocking password is input into the main computer module by a user through the screen locking interface.
In another example, the lock screen control apparatus according to the embodiment of the present invention further includes:
the file receiving module is used for receiving an unlocking file of the unlocking device before the verification operation is performed on the obtained unlocking data; and the screen locking file is read by the auxiliary computer module and then forwarded, or the screen locking application receives the screen locking file from the main computer module and then forwards the screen locking file.
And the file decryption module is used for decrypting the unlocking file by adopting a preset decryption algorithm.
And the first data extraction module is used for extracting the unlocking data from the decrypted unlocking file when the decryption is successful.
As an example, the screen locking control device according to the embodiment of the present invention may further include:
and the first data sending module is used for sending the extracted unlocking data to the associated server.
And the first verification confirming module is used for determining whether the verification of the unlocking data is successful or not according to the verification notice returned by the server.
As an example, the screen locking control device according to the embodiment of the present invention may further include:
and the data caching module is used for caching the extracted unlocking data serving as the verification data to the local part when the unlocking data is successfully verified.
And the second data extraction module is used for extracting the unlocking data from the decrypted unlocking file after the unlocking file in the equipment is successfully unlocked by reading and decrypting again.
And the local verification module is used for comparing the extracted unlocking data with the locally cached verification data when the network between the local verification module and the server is unavailable.
And the second verification confirming module is used for confirming that the unlocking data is successfully verified when the unlocking data is consistent with the unlocking data.
As an example, the screen locking control device according to the embodiment of the present invention may further include:
and the cache updating module is used for updating the locally cached verification data or unlocking an unlocking file in the equipment after the computer equipment is unlocked.
As an example, the cache update module is further configured to:
and when the check data are updated every time, the updated check data are synchronously stored in the partition of the local hard disk, and the updating time is recorded.
The local verification module is further configured to: replacing the locally cached check data with the latest check data stored in the partition of the local hard disk according to the recorded updating time; and comparing the extracted unlocking data with the replaced verification data.
As an example, the unlocking data includes login data, user right data, and an identity of the unlocking device; the first data transmission module is configured to transmit login data to a login server; sending the user permission data and the identity to a permission verification server; and if the login server and the authority verification server pass the verification, determining that the verification is successful.
As an example, the screen locking control device according to the embodiment of the present invention may further include:
and the first associated login module is used for sending the login data to the associated application so that the associated application can log in the login server.
In another example, the unlocking data includes user right data, and the screen locking control device according to the embodiment of the present invention may further include:
and the first request sending module is used for responding to an unlocking trigger condition and requesting the unlocking graphic code and the access token from the login server before executing verification operation on the acquired unlocking data.
And the first data receiving module is used for receiving the graphic code and the access token returned by the login server.
And the second data sending module is used for sending the graphic code to the screen locking application of the main computer module so as to control the screen locking application to output the graphic code to a screen locking interface.
And the second request sending module is used for sending the authority data request carrying the access token to the login server.
The second data receiving module is used for receiving the user authority data returned by the login server; and the user authority data is generated by the login server according to the user login information after the user terminal scans the graphic code and successfully logs in the login server.
As an example, the screen locking control device according to the embodiment of the present invention may further include:
and the third request sending module is used for requesting the login server for login data reported after the user terminal scans the graphic code after the unlocking data is verified.
And the second associated login module is used for sending the requested login data to the associated application so that the associated application can log in the login server.
As an example, the screen locking control device according to the embodiment of the present invention may further include:
and the first notification receiving module is used for receiving a biological data identification notification sent by the screen locking application before the verification operation is performed on the acquired unlocking data.
And the identification interface generating module is used for generating and outputting the biological data identification interface displayed on the top.
And the fourth request sending module is used for sending a request for temporarily closing the screen locking interface to the screen locking application so as to control the screen locking application to temporarily remove the screen locking interface and switch and display the output content of the secondary computer module.
And the first notification sending module is used for notifying the biological data acquisition equipment to acquire the biological data after the identification control of the biological data identification interface is triggered.
The biological data receiving module is used for receiving biological data sent by the biological acquisition equipment and informing the screen locking application to output a screen locking interface displayed on the top;
and the characteristic extraction module is used for extracting the biological characteristic data from the biological data to be unlocking data.
In another example, the secondary computer module is connected with the main board of the main computer module sequentially through the USB switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard; the screen locking closing instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the main operating system.
In another example, the secondary computer module is connected with the main board of the main computer module through a USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard; and the screen locking closing instruction is sent to the screen locking application through the USB selector switch and the main operating system.
As an example, the main computer module is an android module, and the secondary computer module is a PC module.
The implementation process of the functions and actions of each unit (or module) in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units or modules described as separate parts may or may not be physically separate, and the parts displayed as the units or modules may or may not be physical units or modules, may be located in one place, or may be distributed on a plurality of network units or modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
The embodiment of the screen locking control device can be applied to computer equipment. In particular, it may be implemented by a computer chip or entity, or by an article of manufacture having some functionality. In a typical implementation, the computer device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a navigation device, an e-mail receiving and sending device, a game console, a tablet computer, an internet television, a smart car, an unmanned vehicle, a smart interactive tablet, a smart home device, or a combination of any of these devices. The computer device is provided with a main computer module and an auxiliary computer module, and the display level of the output content of the main computer module is higher than that of the auxiliary computer module. Specifically, refer to fig. 1A to fig. 11, which are not described herein again.
The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in a readable storage medium such as a nonvolatile memory into a memory for running through a processor of a computer device in which the software implementation is located. In an example, from a hardware aspect, as shown in fig. 12, the hardware structure diagram of a computer device in which the lock screen control apparatus of the present invention is located is shown, where the computer device is loaded with a main computer module and a sub-computer module, and the sub-computer module is in addition to the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 12, and the sub-computer module in which the apparatus is located in the embodiment may also include other hardware according to an actual function of the computer device, which is not described again. Wherein the memory and the non-volatile memory are computer readable memories, and the memory of the secondary computer module may store program instructions executable by the processor; the processor may be coupled to the memory for reading the program instructions stored in the storage medium and in response, performing the operations of the lock screen control method in any of the above embodiments.
In other embodiments, the operations performed by the processor may refer to the description related to the above embodiments of the lock screen control method, which is not repeated herein. As an example, the secondary computer module is a hot-plug computer module or an external computer module of the computer device.
In another example, from a hardware aspect, as shown in fig. 13, the present invention is a hardware structure diagram of a computer device where the lock screen control device is located, the computer device is equipped with a main computer module and a sub-computer module, the sub-computer module and the main computer module are in addition to the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 13, and the sub-computer module and the main computer module where the device is located in the embodiments may also include other hardware according to the actual function of the computer device, which is not described herein again. Wherein, the memory and the nonvolatile memory are computer readable memories, and the memories of the secondary computer module and the main computer module can store program instructions executable by the processor; the processor may be coupled to the memory for reading the program instructions stored in the storage medium and in response, performing the operations of the lock screen control method in any of the above embodiments.
In other embodiments, the operations performed by the processor may refer to the description related to the above embodiments of the lock screen control method, which is not repeated herein. As an example, the secondary computer module is a hot-plug computer module or an external computer module of the computer device.
In addition, an embodiment of the present invention further provides a machine-readable storage medium, where the machine-readable storage medium stores program instructions, and the program instructions include instructions corresponding to the steps of the above screen locking control method. When executed by one or more processors, cause the processors to perform the operations of the lockscreen control method described above.
Embodiments of the invention may take the form of a computer program product embodied on one or more readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having program code embodied therein. Computer-usable readable storage media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of machine-readable storage media include, but are not limited to: phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technologies, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium, may be used to store information that may be accessed by a computing device.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (20)

1. A screen locking control method of computer equipment is characterized in that the computer equipment is provided with a main computer module and an auxiliary computer module, the method is applied to the auxiliary computer module, and the method comprises the following steps:
when the screen locking condition is met, generating a screen locking starting instruction;
sending the screen locking starting instruction to a screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module;
and the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top.
2. The method according to claim 1, characterized in that the method further comprises the steps of:
requesting an unlock password from an associated server;
and receiving and storing the unlocking password returned by the server.
3. The method of claim 1, wherein the secondary computer module is connected to the main board of the main computer module sequentially through the USB switch and the MCU of the main computer module; an operating system of a main computer module is loaded on the mainboard;
the screen locking starting instruction is an MCU instruction and is sent to the screen locking application through the USB selector switch, the MCU and the operating system.
4. The method of claim 1, wherein the secondary computer module is connected to the main board of the main computer module through a USB switch of the main computer module; an operating system of a main computer module is loaded on the mainboard;
and the screen locking starting instruction is sent to the screen locking application through the USB selector switch and the operating system.
5. A screen locking control method of computer equipment is characterized in that the computer equipment is provided with a main computer module and an auxiliary computer module, the method is applied to the auxiliary computer module, and the method comprises the following steps:
performing verification operation on the acquired unlocking data;
if the verification is successful, generating a screen locking closing instruction;
sending the screen locking closing instruction to a screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of other computer modules;
and the screen locking closing instruction is used for controlling the screen locking application, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
6. The method according to claim 5, wherein before performing the verification operation on the acquired unlocking data, the method comprises the steps of:
receiving an unlocking password sent by the screen locking application as unlocking data; the unlocking password is input into the main computer module by a user through the screen locking interface.
7. The method according to claim 5, wherein before performing the verification operation on the acquired unlocking data, the method comprises the steps of:
receiving an unlocking file of unlocking equipment; the unlocking file is read by the auxiliary computer module and then forwarded, or the unlocking file is received by the screen locking application from the main computer module and then forwarded;
decrypting the unlocking file by adopting a preset decryption algorithm;
and if the decryption is successful, extracting the unlocking data from the decrypted unlocking file.
8. The method of claim 7, wherein if the verification is successful, the method further comprises the steps of:
caching the extracted unlocking data serving as verification data to the local;
if the unlocking file in the unlocking device is read again and decrypted successfully, the unlocking data is extracted from the decrypted unlocking file;
if the network between the server and the mobile terminal is unavailable, comparing the extracted unlocking data with the locally cached verification data; if so, the verification is determined to be successful.
9. The method of claim 8, further comprising the steps of:
and after the computer equipment is unlocked, updating the locally cached check data or unlocking an unlocking file in the equipment.
10. The method of claim 9, further comprising the steps of:
when the check data are updated every time, the updated check data are synchronously stored in the partition of the local hard disk, and the updating time is recorded;
comparing the extracted unlock data with locally cached check data, comprising:
replacing the locally cached check data with the latest check data stored in the partition of the local hard disk according to the recorded updating time;
and comparing the extracted unlocking data with the replaced verification data.
11. The method of claim 5, wherein the unlock data comprises user permission data, and wherein the method comprises the following steps before performing a verification operation on the acquired unlock data:
responding to an unlocking trigger condition, and requesting an unlocking graphic code and an access token from a login server;
receiving the graphic code and the access token returned by the login server;
sending the graphic code to a screen locking application of the main computer module to control the screen locking application to output the graphic code to a screen locking interface;
sending an authority data request carrying the access token to the login server;
receiving user authority data returned by the login server; and the user authority data is generated by the login server according to the user login information after the user terminal scans the graphic code and successfully logs in the login server.
12. The method according to claim 5, wherein before performing the verification operation on the acquired unlocking data, the method comprises the steps of:
receiving a biological data identification notice sent by the screen locking application;
generating and outputting a biological data identification interface displayed on the top;
sending a request for temporarily closing a screen locking interface to the screen locking application so as to control the screen locking application to temporarily remove the screen locking interface and switch and display output contents of the secondary computer module;
informing the biological data acquisition equipment to acquire biological data;
receiving biological data sent by the biological data acquisition equipment, and informing the screen locking application to output a screen locking interface displayed on the top;
biometric data is extracted from the biometric data as unlock data.
13. A screen locking control method of computer equipment is characterized in that the computer equipment is provided with a main computer module and an auxiliary computer module, and the display level of the output content of the main computer module is higher than that of the auxiliary computer module; the screen locking control method comprises the following steps:
generating a screen locking starting instruction when the screen locking condition is met on the side of the auxiliary computer module, and sending the screen locking starting instruction to the screen locking application of the main computer module;
and receiving the screen locking starting instruction at the main computer module side, and outputting a screen locking interface displayed on the top.
14. A screen locking control method of computer equipment is characterized in that the computer equipment is provided with a main computer module and an auxiliary computer module, and the display level of the output content of the main computer module is higher than that of the auxiliary computer module; the screen locking control method comprises the following steps:
on the side of the secondary computer module, performing verification operation on the acquired unlocking data, if the verification is successful, generating a screen locking closing instruction, and sending the screen locking closing instruction to the screen locking application of the main computer module;
and receiving the screen locking closing instruction at the main computer module side, canceling a screen locking interface displayed on the top, and unlocking the computer equipment.
15. A screen locking control system is characterized by comprising computer equipment, wherein the computer equipment is loaded with a main computer module and an auxiliary computer module, and the display level of the output content of the main computer module is higher than that of the auxiliary computer module; the main computer module further comprises a screen locking module, the auxiliary computer module further comprises a screen locking control module, wherein:
the screen locking control module is used for generating a screen locking starting instruction when the screen locking condition is met, and sending the screen locking starting instruction to the screen locking module;
and the screen locking module is used for receiving the screen locking starting instruction and outputting a screen locking interface displayed on the top.
16. A screen locking control device for a computer device having a main computer module and a sub-computer module mounted thereon, the device being applied to the sub-computer module, comprising:
the screen locking instruction generating module is used for generating a screen locking starting instruction when the screen locking condition is met;
the screen locking instruction sending module is used for sending the screen locking starting instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of the auxiliary computer module;
and the screen locking starting instruction is used for controlling the screen locking application to output a screen locking interface displayed on the top.
17. A screen locking control device for a computer device having a main computer module and a sub-computer module mounted thereon, the device being applied to the sub-computer module, comprising:
the unlocking data verification module is used for executing verification operation on the acquired unlocking data;
the unlocking instruction generating module is used for generating a screen locking and closing instruction when the verification is passed;
the unlocking instruction sending module is used for sending the screen locking closing instruction to the screen locking application of the main computer module; the display level of the output content of the main computer module is higher than that of other computer modules;
and the screen locking closing instruction is used for controlling the screen locking application, cancelling a screen locking interface displayed on the top and unlocking the computer equipment.
18. A computer device having a main computer module and a sub-computer module mounted thereon, the sub-computer module comprising:
a processor;
a memory storing processor-executable instructions;
wherein the processor is coupled to the memory for reading program instructions stored by the memory and, in response, performing operations in the method of any of claims 1-12.
19. A computer device having a main computer module and a sub-computer module mounted thereon, wherein the sub-computer module and the main computer module each include:
a processor;
a memory storing processor-executable instructions;
wherein the processor is coupled to the memory for reading program instructions stored by the memory and, in response, performing operations in the method of claim 13 or 14.
20. One or more machine-readable storage media having instructions stored thereon, which when executed by one or more processors perform the operations of any one of the methods recited in claims 1-14.
CN201811152168.9A 2018-09-29 2018-09-29 Screen locking control method, device, system, equipment and medium for computer equipment Active CN109388928B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811152168.9A CN109388928B (en) 2018-09-29 2018-09-29 Screen locking control method, device, system, equipment and medium for computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811152168.9A CN109388928B (en) 2018-09-29 2018-09-29 Screen locking control method, device, system, equipment and medium for computer equipment

Publications (2)

Publication Number Publication Date
CN109388928A CN109388928A (en) 2019-02-26
CN109388928B true CN109388928B (en) 2021-05-18

Family

ID=65418907

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811152168.9A Active CN109388928B (en) 2018-09-29 2018-09-29 Screen locking control method, device, system, equipment and medium for computer equipment

Country Status (1)

Country Link
CN (1) CN109388928B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110381280B (en) * 2019-07-03 2022-05-17 苏州佳世达电通有限公司 Electronic device with display unit and display system
CN110708364B (en) * 2019-09-19 2022-05-20 RealMe重庆移动通信有限公司 Electronic equipment unlocking method and device, electronic equipment and storage medium
CN112558905B (en) * 2020-12-09 2023-11-10 深圳乐播科技有限公司 Screen projection method, device and system
CN114265660B (en) * 2022-03-01 2022-05-03 成都鲁易科技有限公司 Desktop screen locking method and device, storage medium and computer equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731399A (en) * 2004-08-06 2006-02-08 佳能株式会社 Information processing apparatus, control method therefor, and program
CN103235658A (en) * 2013-04-07 2013-08-07 广州视睿电子科技有限公司 All-in-one machine and method for realizing quick touch of all channels in all-in-one machine
CN103634109A (en) * 2013-10-31 2014-03-12 小米科技有限责任公司 Operation right authentication method and device
CN106911846A (en) * 2017-02-21 2017-06-30 广州视源电子科技股份有限公司 Dual system termi-nal and its control method
CN107391008A (en) * 2015-06-07 2017-11-24 苹果公司 For the apparatus and method navigated between user interface
CN107770360A (en) * 2016-08-18 2018-03-06 联想(北京)有限公司 Control method, terminal device and the wearable device of terminal device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009176255A (en) * 2008-01-28 2009-08-06 Fujitsu Component Ltd Multi-user kvm switch
US20140189855A1 (en) * 2012-12-31 2014-07-03 Conduit, Ltd. Gestures for Unlocking a Mobile Device
CN104866193A (en) * 2015-05-12 2015-08-26 深圳市金立通信设备有限公司 Terminal
CN106485127A (en) * 2016-10-27 2017-03-08 北京小米移动软件有限公司 The control method of electronic equipment, device, electronic equipment and system
CN108319839B (en) * 2018-04-18 2020-08-25 青岛海信移动通信技术股份有限公司 Fingerprint unlocking method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1731399A (en) * 2004-08-06 2006-02-08 佳能株式会社 Information processing apparatus, control method therefor, and program
CN103235658A (en) * 2013-04-07 2013-08-07 广州视睿电子科技有限公司 All-in-one machine and method for realizing quick touch of all channels in all-in-one machine
CN103634109A (en) * 2013-10-31 2014-03-12 小米科技有限责任公司 Operation right authentication method and device
CN107391008A (en) * 2015-06-07 2017-11-24 苹果公司 For the apparatus and method navigated between user interface
CN107770360A (en) * 2016-08-18 2018-03-06 联想(北京)有限公司 Control method, terminal device and the wearable device of terminal device
CN106911846A (en) * 2017-02-21 2017-06-30 广州视源电子科技股份有限公司 Dual system termi-nal and its control method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Fast interface electronics for a resistive touch-screen;R.N.Aguilar 等;《SENSORS, 2002 IEEE》;20021107;全文 *
基于51单片机的多色点阵显示系统设计;郑棣 等;《自动化技术与应用》;20150210;第33卷(第12期);全文 *
基于带USB Host功能的MCU软件设计与应用;欧凡 等;《交通与计算机》;20070305;第24卷(第6期);全文 *

Also Published As

Publication number Publication date
CN109388928A (en) 2019-02-26

Similar Documents

Publication Publication Date Title
CN109388928B (en) Screen locking control method, device, system, equipment and medium for computer equipment
EP3657370B1 (en) Methods and devices for authenticating smart card
US20210243603A1 (en) Wireless network access method, apparatus, device, equipment and system
US10127751B2 (en) Controlling physical access to secure areas via client devices in a networked environment
US9003185B2 (en) Client computer, remote control system, and remote control method
CN104115152B (en) The method and apparatus that digital content is protected for use device certification
KR102452528B1 (en) Access control system and access control method using the same
US20230334452A1 (en) Security key input system and method using one-time keypad
JPWO2008129765A1 (en) Monitoring equipment control system
US20100180335A1 (en) Self-protecting storage
CN112398824B (en) Authority verification method, storage medium and electronic equipment
KR102356474B1 (en) Systems that support smart work
CN113378119A (en) Software authorization method, device, equipment and storage medium
EP3528152A1 (en) Method and apparatus for user authentication
CN113724424A (en) Control method and device for equipment
CN110807186A (en) Method, device, equipment and storage medium for safe storage of storage equipment
EP2806370A1 (en) Portable authentication tool and method
KR20160114964A (en) Intelligent lock method, portable communication device and door lock using the same
CN112165706B (en) Equipment connection management method and device and Bluetooth equipment
JP6873143B2 (en) Devices and methods for camera-based user authentication for content access
JP7343680B2 (en) Authentication device, authentication support method, and program
JP7012190B1 (en) Authentication device, authentication method, authentication system, and program
US20230098969A1 (en) Sim, communication device, and writing method for application
KR101392692B1 (en) User authentication device using virtual account and one time password and method for controlling thereof
JP6962676B2 (en) Authentication-related information transmission control program, authentication-related information transmission control device, and authentication-related information transmission control method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant