CN104392157A - Method and device for locking screen by using passwords - Google Patents

Method and device for locking screen by using passwords Download PDF

Info

Publication number
CN104392157A
CN104392157A CN201410654940.2A CN201410654940A CN104392157A CN 104392157 A CN104392157 A CN 104392157A CN 201410654940 A CN201410654940 A CN 201410654940A CN 104392157 A CN104392157 A CN 104392157A
Authority
CN
China
Prior art keywords
verification
frequency
identity
state
coded lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410654940.2A
Other languages
Chinese (zh)
Other versions
CN104392157B (en
Inventor
赵磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Computer Systems Co Ltd
Original Assignee
Shenzhen Tencent Computer Systems Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Computer Systems Co Ltd filed Critical Shenzhen Tencent Computer Systems Co Ltd
Priority to CN201410654940.2A priority Critical patent/CN104392157B/en
Publication of CN104392157A publication Critical patent/CN104392157A/en
Application granted granted Critical
Publication of CN104392157B publication Critical patent/CN104392157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the invention discloses a method for locking a screen by using passwords. The method comprises the steps of receiving an input password unlocking command, and obtaining corresponding identity verification information; verifying the identity verification information, and calculating a verification pass frequency, wherein the verification pass frequency is identity verification pass times within unit time; judging whether the verification pass frequency is greater than or equal to a first threshold value or not, and setting a verification state to be pause if the verification pass frequency is greater than or equal to the first threshold value; detecting an unlocking trigger event, judging whether the verification state is pause or not, and displaying an unlocking interface corresponding to the unlocking trigger event if the verification state is not pause. The embodiment of the invention also discloses a device for locking the screen by using the passwords. By adopting the method and the device, disclosed by the invention, the operation convenience can be increased.

Description

Password screen locking method and device
Technical field
The present invention relates to mobile internet technical field, particularly relate to a kind of password screen locking method and device
Background technology
Along with the development of development of Mobile Internet technology; the particularly rise of mobile payment and Mobile banking; the protection of privacy of user becomes the very general core demand of mobile phone users, and being pinned by some privacy informations is way very general to of secret protection at present.Existing mobile terminal (such as smart mobile phone, panel computer etc.) generally adopts and locks this method to protect privacy of user to the application that may produce privacy.Such as in some online payments application, when user clicks the icon startup of this application or switches to this application, mobile terminal can show mode (namely cannot switch to another window of this application interface) coded lock control, user just can enter this application after needing input password to carry out authentication, thus prevent mobile terminal idle or lose time other users start this application and spy on privacy.
But; inventor finds that in conventional art, at least there are the following problems: due to the development along with mobile Internet terminal technology; intelligent operating system on mobile terminal can run multiple application simultaneously; and when user is when carrying out application and switching; switch to the application relating to payment, Net silver etc. and need to carry out secret protection at every turn and then can show coded lock screen interface, and point out user to input unlock password.The essence of carrying out unlock password is to confirm user identity, but when user identity is legal, repeatedly carries out verifying, and will cause more meaningless unlocking operation, thus reduces the input efficiency of user, makes the convenience deficiency operated.
Summary of the invention
Based on this, in order to solve the technical matters of the convenience deficiency of aforesaid operations, spy provides a kind of password screen locking method.
A kind of password screen locking method, comprising:
Receive the unlock password instruction of input, obtain corresponding identity verifying information;
Verify described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
Judge whether described verification is more than or equal to first threshold by frequency, if so, verification state is then set for suspending;
Detect and unlock trigger event, judge whether described verification state is time-out, if not, then show the unlock interface corresponding with described unblock trigger event.
Correspondingly, in order to solve the technical matters of the convenience deficiency of aforesaid operations, spy provides a kind of coded lock screen device.
A kind of coded lock screen device, comprising:
Unlock command receiver module, for receiving the unlock password instruction of input, obtains corresponding identity verifying information;
By frequency computation part module, for verifying described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
First verification state updating module, for judging whether described verification is more than or equal to first threshold by frequency, if so, then arranges verification state for suspending;
Coded lock panel module, for detecting unblock trigger event, judges whether described verification state is time-out, if not, then shows the unlock interface corresponding with described unblock trigger event.
Implement the embodiment of the present invention, following beneficial effect will be had:
Repeatedly unlocking operation is carried out at short notice user, and when having higher verification by frequency within this short time, be then that time-out temporarily cancels unlocking operation by arranging verification state, make under the prerequisite guaranteeing user's legal identity, in subsequent operation process, directly can enter application or switch to application and operate., therefore, both ensure that the legitimacy of operator's identity, and additionally reduced the number of times that mobile terminal in use frequently carries out unlocking operation, thus improve the convenience of operation.
In addition, because releasing process reduces, mobile terminal is also used for showing the unlock interface corresponding with described unblock trigger event and carrying out verify calculation by expending less computational resource, therefore makes the power consumption of mobile terminal also reduce, thus improves the battery life of mobile terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Wherein:
Fig. 1 is the process flow diagram of a kind of password screen locking method in an embodiment;
Fig. 2 is the schematic diagram at word unlock password interface in an application scenarios;
Fig. 3 is the schematic diagram of graphical passwords unlock interface in an application scenarios;
Fig. 4 points out the interface schematic diagram whether suspending password screen locking in an application scenarios;
Fig. 5 is the interface schematic diagram that in an application scenarios, prompting selects to suspend duration parameters;
Fig. 6 is the structural representation of a kind of coded lock screen device in an embodiment;
Fig. 7 is the structural representation of a kind of coded lock screen device in another embodiment;
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In one embodiment, be the problem of convenience deficiency solving aforesaid operations, spy proposes a kind of password screen locking method, and the execution of the method depends on computer program, on the computer system that can run on von Neumann system.This computer system can be smart mobile phone, the super of panel computer, touch function this etc. run the mobile device of intelligent operating system, particularly run the terminal device of the systems such as android, ios and windows phone.
Concrete, the method as shown in Figure 1, comprising:
Step S102: the unlock password instruction receiving input, obtains corresponding identity verifying information;
Step S104: the identity verifying information obtained is verified, calculation check is by frequency, and verifying by frequency is number of times by proof of identity in the unit time;
Unlock password instruction is the instruction comprising identity verifying information that user inputs when unlocking pin is locked.
Such as, as shown in Figures 2 and 3, coded lock can be word coded lock, figure lock, Fingerprint Lock, voiceprint lock etc.If user have input the identity verifying information of correct password, sliding trace, fingerprint or vocal print, then pass through the proof of identity of this user, user then can start application smoothly or switch to application window and operate.If user inputs code error, then proof of identity failure, can point out user again to input correct identity verifying information.Also can add the link of " forgetting Password " or " replacement password " on the coded lock page, facilitate user to reset it when forgetting Password.
Verification is the number of times by proof of identity in the unit interval by frequency.Such as, if user inputted password continuously in 5 minutes carry out proof of identity 5 times, and have 4 proof of identity to pass through, one-touch mistake causes proof of identity failure, then its verification is 8 times/10 minutes by frequency.
In the present embodiment, calculation check by the method for frequency can be: preset timing statistics interval, after the identity verifying information obtained is verified, record the timestamp of this proof of identity, and the number of the timestamp that proof of identity is passed through in the timing statistics interval of statistics before this timestamp, thus obtain verification and pass through frequency.
Such as, if the timing statistics interval preset is 10 minutes, the timestamp that the proof of identity recorded during certain verification succeeds is passed through is 13:10:00, then obtain part calibration tails of its timestamp between 13:00:00 to 13:10:00.If the calibration tails got is respectively:
Verification is passed through, 12:48:45;
Verify unsuccessfully, 13:01:42;
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
Verify unsuccessfully, 13:09:55;
Verification is passed through, 13:10:00;
Then, what the proof of identity of timestamp between 13:00:00 to 13:10:00 was passed through is recorded as:
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
Verification is passed through, 13:10:00;
Have 4 records, namely verify by frequency 4 times/10 minutes.
Adopting calculation check in this way by the benefit of frequency is, only add up the verification that (namely presets in timing statistics interval) within cycle short period by frequency, and eliminate impact current operation user judged according to history long-term cumulative data.That is, for certain user, if its within a short period of time, verification was passed through, then intelligence determines that it is validated user identity within this short time.
Preferably, after the timestamp that record proof of identity is passed through, the timestamp that also proof of identity outside the timing statistics interval before this timestamp can be passed through removes.As above in example, be when verifying failed timestamp 13:01:42 recording check results, then can remove exceeding the timing statistics 12:48:45 of interval 10 minutes record, thus save storage space.
Step S106: judge whether verification is more than or equal to first threshold by frequency, if so, then perform step S108: verification state is set for suspending; Otherwise, perform step S110: do not operate.
In the present embodiment, verification state can comprise the states such as time-out, operation.Namely halted state means when startup or switch application, no longer shows coded lock window; Running status then means to be needed to show coded lock window.
Such as, if first threshold is 3 times/10 minutes, and the verification calculated is 4 times/10 minutes by frequency, then verification state be set to suspend.
In the present embodiment, arranging verification state is that the step suspended also comprises: receive the time-out duration parameters buffer memory that input.In the present embodiment, whether overtimely also can detect time-out duration parameters, if so, then verification state is set to run.
Such as, as shown in Figure 4, when detecting that verification is more than or equal to first threshold by frequency, can eject prompting frame, whether inquiry user suspends function of cipher lock, if user selects to suspend, then as shown in Figure 5, can eject and suspend duration parameters choice box.User is namely by choosing default time-out duration parameters input.
If the time-out duration parameters that user chooses is 1 hour, then as a child verification state can be changed back running status 1.Such as, in android system, Timer class (the timer class in android system, function repeatedly triggers the timer event of specified window within the time interval of specifying) can be used to carry out time-out to time-out duration parameters and to detect.
Step S112: detect and unlock trigger event, judge whether verification state is time-out, if not, then performs step S114: show the unlock interface corresponding with unlocking trigger event; If so, then perform step S116, do not process.
Unlock trigger event be startup application or switch to a certain event needing to trigger during the application being provided with unlock password.Namely define in the event handling function of this event and show the unlock interface corresponding with unlocking trigger event (such as, it can be the UnLockScreen interface that system provides in android system, namely the interface of unblanking provided in android system also can be self-defining unblock window interface) logical code.Can before the logical code of displaying in this event handling function unlock interface corresponding with unlocking trigger event, add the code judging verification state, if verification state is for suspending, then do not perform the logical code of displaying in this event handling function unlock interface corresponding with unlocking trigger event, if run, then perform.
That is, if user repeatedly carries out unlocking operation at short notice, and within this short time, have higher verification by frequency, then arrange verification state by abovementioned steps S102 to S110 and suspend unlocking operation, user then directly can enter application or switch to application and operate.And owing to being provided with time-out duration parameters, make in the time-out duration of this setting, assert that the user of operating mobile terminal is validated user, therefore, both ensure that the legitimacy of operator's identity, additionally reduce the number of times that mobile terminal in use frequently carries out unlocking operation, thus improve the convenience of operation.
It should be noted that, abovementioned steps S102 to S110 and the process of step S112 to S116 do not have dividing of strict sequencing, step S102 to S110 is the process arranging halted state according to the calibration tails in releasing process, step S112 to S116 is the process of whether showing unlock interface according to verification condition adjudgement, therefore for replacing place of execution process.
Preferably, mobile terminal also can detect wireless network access point when changing, and arranges verification state for running.
Such as, if user repeatedly unlocks in the short time under wifi environment A, then can only judge this user in wifi environment A as validated user, if user migrates to wifi environment B by wifi environment A at short notice or changes into use mobile network 3G or 4G online, then may for lawless person steal its mobile terminal after leave current place, therefore need to reaffirm its identity.
Preferably, mobile terminal also can detection check state be suspend time geographic position change displacement, if this displacement be greater than distance displacement threshold value, then arrange verification state for run.
Such as, if mobile terminal can detect change in location according to GPS, if be in 1 hour of time-out in verification state, user's moving displacement is comparatively far away, then may for lawless person steal its mobile terminal after leave current place, therefore need to reaffirm its identity.
Change verification state by the change detecting wireless network access point and geographic position, the security of secret protection in small probability mobile terminal loss event can be improved.
Further, in the present embodiment, also comprised after the step that identity verifying information is verified: calculate verification continuously by frequency, verification is the number of times continuing through proof of identity in the unit time by frequency continuously.And mobile terminal also can judge whether verification is more than or equal to Second Threshold by frequency continuously, if so, verification state is then set for suspending.
As in precedent, if the calibration tails got is respectively:
Verification is passed through, 12:48:45;
Verify unsuccessfully, 13:01:42;
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
Verify unsuccessfully, 13:09:55;
Verification is passed through, 13:10:00;
Then when moment 13:06:42, detect that verifying the number of times passed through continuously in 10 minutes is 3 times:
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
If Second Threshold is 3, then when moment 13:06:42, verification state can be set to suspend.
It should be noted that, use verification by frequency and continuously verification can be walked abreast to the process that verification state is arranged by frequency and carry out, if certain verification by after detect verification by frequency be greater than first threshold or continuously verification be greater than Second Threshold by frequency, all verification state can be set to suspend, and there will not be conflict.
In one embodiment, verification state also comprises lock-out state, and it means that the operating system of application or mobile terminal is locked, no longer shows unlock password interface, even if user knows that password also cannot enter application or system.
In the present embodiment, then can record verify the frequency of failure continuously to identity verifying information after the step verify, the verification frequency of failure is the number of times of continuous proof of identity failure continuously.
Mobile terminal also can judge whether verify the frequency of failure is continuously more than or equal to the 3rd threshold value, if so, then arranges verification state for locking.
Such as, if user is when unlocking, the continuous input error number of times of input password reaches 5 times, then by application or mobile terminal locking, and can arrange the locking time of 1 hour, 1 as a child then provided unlock interface again.
In another embodiment, show that the method for the unlock interface corresponding with unlocking trigger event is: generating the unblock window corresponding with unlocking trigger event, being shown by the stack top of being added to window stack.
Such as, based in the application scenarios of Android system, third-party unlocking tool can be used to show independently self-defining unblock window to application.This unblock window is based on the activity object (window object) in Android system, developer can customize and comprises cryptographic check assembly (by input characters password, PIN code, the approach such as mailbox checking carry out the verification assembly verified), sliding trace verification assembly (being carried out the assembly verified by the default graphics track that slides out at touch-screen), the unblock window interface of vocal print verification assembly (carry out phonetic entry by microphone and carry out the verification assembly of vocal print comparison) and/or finger-mark check assembly (being carried out the assembly verified by fingerprint sensor), then added to the stack top of the window stack of Android system and shown, then user could remove this unblock window from the stack top of window stack after must completing verification on this unblock window, and the stack top making the window of the application of waiting to enter/switch to transplant window stack is shown.
That is, said method not only based on the primary unlocking mechanism of intelligent operating system on mobile terminal, also based on the self-defining password screen locking method of third party, can have very high versatility.
In one embodiment, as shown in Figure 6, a kind of coded lock screen device, comprises unlock command receiver module 102, verifies state updating module 106 and coded lock panel module 108 by frequency computation part module 104, first, wherein:
Unlock command receiver module 102, for receiving the unlock password instruction of input, obtains corresponding identity verifying information.
By frequency computation part module 104, for verifying described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency.
First verification state updating module 106, for judging whether described verification is more than or equal to first threshold by frequency, if so, then arranges verification state for suspending.
Coded lock panel module 108, for detecting unblock trigger event, judges whether described verification state is time-out, if not, then shows the unlock interface corresponding with described unblock trigger event.
In the present embodiment, the first verification state updating module 106 is also for receiving the time-out duration parameters of input and buffer memory.
Whether as shown in Figure 7, coded lock screen device also comprises state detection module 110, overtime for detecting described time-out duration parameters, if so, then described verification state is set to run.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises wireless network access point detection module 112, for detect wireless network access point change time, arrange described verification state for run.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises geographic position detection module 114, the displacement of geographic position change when being time-out for detection check state, if described displacement is greater than distance displacement threshold value, then arranges described verification state for running.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises verification continuously by frequency computation part module 116, and for calculating continuously, verification is by frequency, and described continuous verification is the number of times continuing through proof of identity in the unit time by frequency.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises the second verification state updating module 118, for judging whether described continuous verification is more than or equal to Second Threshold by frequency, if so, then arranges verification state for suspending.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises verification frequency of failure statistical module 120 continuously, and verify the frequency of failure continuously for recording, the described continuous verification frequency of failure is the number of times of continuous proof of identity failure.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises the 3rd verification state updating module 122, for judging whether the described continuous verification frequency of failure is more than or equal to the 3rd threshold value, if so, then arranges verification state for locking.
In one embodiment, coded lock panel module 108 also for generating the unblock window corresponding with described unblock trigger event, is shown by the stack top of being added to window stack.
In sum, implement the embodiment of the present invention, following beneficial effect will be had:
Repeatedly unlocking operation is carried out at short notice user, and when having higher verification by frequency within this short time, be then that time-out temporarily cancels unlocking operation by arranging verification state, make under the prerequisite guaranteeing user's legal identity, in subsequent operation process, directly can enter application or switch to application and operate., therefore, both ensure that the legitimacy of operator's identity, and additionally reduced the number of times that mobile terminal in use frequently carries out unlocking operation, thus improve the convenience of operation.
In addition, because releasing process reduces, mobile terminal is also used for showing the unlock interface corresponding with described unblock trigger event and carrying out verify calculation by expending less computational resource, therefore makes the power consumption of mobile terminal also reduce, thus improves the battery life of mobile terminal.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.

Claims (18)

1. a password screen locking method, comprising:
Receive unlock password instruction, obtain corresponding identity verifying information;
Verify described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
Judge whether described verification is more than or equal to first threshold by frequency, if so, verification state is then set for suspending;
Detect and unlock trigger event, judge whether described verification state is time-out, if not, then show the unlock interface corresponding with described unblock trigger event.
2. according to the password screen locking method shown in claim 1, it is characterized in that, the described verification state that arranges is that the step suspended also comprises:
Receive the time-out duration parameters buffer memory that input;
Described method also comprises:
Whether overtimely detect described time-out duration parameters, if so, then described verification state is set to run.
3. according to the password screen locking method shown in claim 1, it is characterized in that, described method also comprises:
When detection wireless network access point changes, described verification state is set for running.
4. according to the password screen locking method shown in claim 1, it is characterized in that, described method also comprises:
The displacement of geographic position change when detection check state is time-out, if described displacement is greater than distance displacement threshold value, then arranges described verification state for running.
5. according to the password screen locking method shown in claim 1, it is characterized in that, also comprise after the described step that described identity verifying information is verified:
Calculate and verify by frequency continuously, described continuous verification is the number of times continuing through proof of identity in the unit time by frequency.
6. according to the password screen locking method shown in claim 5, it is characterized in that, described method also comprises:
Judge whether described continuous verification is more than or equal to Second Threshold by frequency, if so, verification state is then set for suspending.
7. according to the password screen locking method shown in claim 1, it is characterized in that, also comprise after the described step that described identity verifying information is verified:
Record verifies the frequency of failure continuously, and the described continuous verification frequency of failure is the number of times of continuous proof of identity failure.
8. according to the password screen locking method shown in claim 7, it is characterized in that, described method also comprises:
Judge whether the described continuous verification frequency of failure is more than or equal to the 3rd threshold value, if so, verification state is then set for locking.
9. according to the password screen locking method shown in claim 1, it is characterized in that, the method for the unlock interface that described displaying is corresponding with described unblock trigger event is:
Generate the unblock window corresponding with described unblock trigger event, shown by the stack top of being added to window stack.
10. a coded lock screen device, is characterized in that, comprising:
Unlock command receiver module, for receiving unlock password instruction, obtains corresponding identity verifying information;
By frequency computation part module, for verifying described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
First verification state updating module, for judging whether described verification is more than or equal to first threshold by frequency, if so, then arranges verification state for suspending;
Coded lock panel module, for detecting unblock trigger event, judges whether described verification state is time-out, if not, then shows the unlock interface corresponding with described unblock trigger event.
11., according to the coded lock screen device shown in claim 10, is characterized in that, described first verification state updating module is also for receiving the time-out duration parameters of input and buffer memory;
Whether described device also comprises state detection module, overtime for detecting described time-out duration parameters, if so, then described verification state is set to run.
12., according to the coded lock screen device shown in claim 10, is characterized in that, described device also comprises wireless network access point detection module, for detect wireless network access point change time, arrange described verification state for run.
13. according to the coded lock screen device shown in claim 10, it is characterized in that, described device also comprises geographic position detection module, the displacement of geographic position change when being time-out for detection check state, if described displacement is greater than distance displacement threshold value, then described verification state is set for running.
14. according to the coded lock screen device shown in claim 10, it is characterized in that, described device also comprises verification continuously by frequency computation part module, and for calculating continuously, verification is by frequency, and described continuous verification is the number of times continuing through proof of identity in the unit time by frequency.
15., according to the coded lock screen device shown in claim 14, is characterized in that, described device also comprises the second verification state updating module, for judging whether described continuous verification is more than or equal to Second Threshold by frequency, if so, verification state is then set for suspending.
16., according to the coded lock screen device shown in claim 10, is characterized in that, described device also comprises verification frequency of failure statistical module continuously, and verify the frequency of failure continuously for recording, the described continuous verification frequency of failure is the number of times of continuous proof of identity failure.
17. according to the coded lock screen device shown in claim 16, it is characterized in that, described device also comprises the 3rd verification state updating module, for judging whether the described continuous verification frequency of failure is more than or equal to the 3rd threshold value, if so, verification state is then set for locking.
18., according to the coded lock screen device shown in claim 10, is characterized in that, described coded lock panel module also for generating the unblock window corresponding with described unblock trigger event, is shown by the stack top of being added to window stack.
CN201410654940.2A 2014-11-18 2014-11-18 Method and device for locking screen by using passwords Active CN104392157B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410654940.2A CN104392157B (en) 2014-11-18 2014-11-18 Method and device for locking screen by using passwords

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410654940.2A CN104392157B (en) 2014-11-18 2014-11-18 Method and device for locking screen by using passwords

Publications (2)

Publication Number Publication Date
CN104392157A true CN104392157A (en) 2015-03-04
CN104392157B CN104392157B (en) 2017-04-12

Family

ID=52610059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410654940.2A Active CN104392157B (en) 2014-11-18 2014-11-18 Method and device for locking screen by using passwords

Country Status (1)

Country Link
CN (1) CN104392157B (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095743A (en) * 2015-09-09 2015-11-25 北京金山安全软件有限公司 Method and device for setting locking strategy and electronic equipment
CN105608364A (en) * 2015-12-16 2016-05-25 北京奇虎科技有限公司 Application security protection method and apparatus
CN106384029A (en) * 2016-09-22 2017-02-08 乐视控股(北京)有限公司 Terminal screen-locking setting processing method and apparatus
CN106778143A (en) * 2017-01-17 2017-05-31 广东欧珀移动通信有限公司 Mobile terminal unlocking method, device and mobile terminal
CN106951759A (en) * 2017-03-07 2017-07-14 青岛海信移动通信技术股份有限公司 Unlocked by fingerprint control method and device
CN106980454A (en) * 2017-03-30 2017-07-25 北京小米移动软件有限公司 Unlocking method and device
CN106980784A (en) * 2017-03-24 2017-07-25 北京小米移动软件有限公司 Screen locking control method, device and smart machine
WO2018000768A1 (en) * 2016-06-28 2018-01-04 北京金山安全软件有限公司 Method and apparatus for setting screen-lock password, and electronic device
CN107729742A (en) * 2017-10-11 2018-02-23 广州视源电子科技股份有限公司 Equipment solution lock control method, device, equipment and storage medium
CN108182354A (en) * 2018-01-31 2018-06-19 平安科技(深圳)有限公司 Terminal unlock method, device, equipment and readable storage medium storing program for executing
CN108256856A (en) * 2017-12-08 2018-07-06 五八有限公司 A kind of method of payment, equipment and computer readable storage medium
CN108985022A (en) * 2017-05-31 2018-12-11 北京小米移动软件有限公司 Fingerprint identification method and device
CN110264597A (en) * 2019-06-13 2019-09-20 北京深思数盾科技股份有限公司 Intelligent lock and its method of unlocking
CN110417615A (en) * 2019-06-21 2019-11-05 中国平安财产保险股份有限公司 Verify method of controlling switch, device, equipment and computer readable storage medium
CN114611118A (en) * 2022-05-12 2022-06-10 麒麟软件有限公司 Android multi-window application screen locking method based on Linux system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945114A (en) * 2012-10-17 2013-02-27 广东欧珀移动通信有限公司 Regular unlocking method and mobile terminal thereof
CN102981723A (en) * 2012-11-07 2013-03-20 北京百度网讯科技有限公司 Unlocking method and unlocking device for mobile terminal and mobile terminal
CN103049181A (en) * 2012-12-20 2013-04-17 广东欧珀移动通信有限公司 Method and system for dynamically unlocking mobile terminal
WO2013152136A1 (en) * 2012-04-03 2013-10-10 Verayo, Inc. Authentication token
CN103679070A (en) * 2013-12-05 2014-03-26 小米科技有限责任公司 Anti-theft method and device of terminal and terminal equipment
CN103885688A (en) * 2014-03-27 2014-06-25 深圳市国华光电科技有限公司 Screen unlocking method and device
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
CN104021327A (en) * 2014-06-19 2014-09-03 中科创达软件股份有限公司 Method and device for unlocking intelligent device
CN104077508A (en) * 2013-09-25 2014-10-01 苏州天鸣信息科技有限公司 Unlocking device and method thereof
CN104102864A (en) * 2014-07-30 2014-10-15 宇龙计算机通信科技(深圳)有限公司 Terminal screen locking password resetting method, resetting system and terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013152136A1 (en) * 2012-04-03 2013-10-10 Verayo, Inc. Authentication token
CN102945114A (en) * 2012-10-17 2013-02-27 广东欧珀移动通信有限公司 Regular unlocking method and mobile terminal thereof
CN102981723A (en) * 2012-11-07 2013-03-20 北京百度网讯科技有限公司 Unlocking method and unlocking device for mobile terminal and mobile terminal
CN103049181A (en) * 2012-12-20 2013-04-17 广东欧珀移动通信有限公司 Method and system for dynamically unlocking mobile terminal
CN104077508A (en) * 2013-09-25 2014-10-01 苏州天鸣信息科技有限公司 Unlocking device and method thereof
CN103679070A (en) * 2013-12-05 2014-03-26 小米科技有限责任公司 Anti-theft method and device of terminal and terminal equipment
CN103885688A (en) * 2014-03-27 2014-06-25 深圳市国华光电科技有限公司 Screen unlocking method and device
CN104010088A (en) * 2014-06-16 2014-08-27 中国地质大学(武汉) Smart-phone anti-theft method and system
CN104021327A (en) * 2014-06-19 2014-09-03 中科创达软件股份有限公司 Method and device for unlocking intelligent device
CN104102864A (en) * 2014-07-30 2014-10-15 宇龙计算机通信科技(深圳)有限公司 Terminal screen locking password resetting method, resetting system and terminal

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105095743A (en) * 2015-09-09 2015-11-25 北京金山安全软件有限公司 Method and device for setting locking strategy and electronic equipment
CN105095743B (en) * 2015-09-09 2018-09-25 北京金山安全软件有限公司 Method and device for setting locking strategy and electronic equipment
CN105608364A (en) * 2015-12-16 2016-05-25 北京奇虎科技有限公司 Application security protection method and apparatus
CN105608364B (en) * 2015-12-16 2018-09-25 北京奇虎科技有限公司 The safety protection method and device of application program
WO2018000768A1 (en) * 2016-06-28 2018-01-04 北京金山安全软件有限公司 Method and apparatus for setting screen-lock password, and electronic device
CN106384029A (en) * 2016-09-22 2017-02-08 乐视控股(北京)有限公司 Terminal screen-locking setting processing method and apparatus
CN106778143A (en) * 2017-01-17 2017-05-31 广东欧珀移动通信有限公司 Mobile terminal unlocking method, device and mobile terminal
CN106951759A (en) * 2017-03-07 2017-07-14 青岛海信移动通信技术股份有限公司 Unlocked by fingerprint control method and device
CN106980784A (en) * 2017-03-24 2017-07-25 北京小米移动软件有限公司 Screen locking control method, device and smart machine
CN106980454B (en) * 2017-03-30 2020-12-04 北京小米移动软件有限公司 Unlocking method and device
CN106980454A (en) * 2017-03-30 2017-07-25 北京小米移动软件有限公司 Unlocking method and device
CN108985022A (en) * 2017-05-31 2018-12-11 北京小米移动软件有限公司 Fingerprint identification method and device
CN107729742A (en) * 2017-10-11 2018-02-23 广州视源电子科技股份有限公司 Equipment solution lock control method, device, equipment and storage medium
CN108256856A (en) * 2017-12-08 2018-07-06 五八有限公司 A kind of method of payment, equipment and computer readable storage medium
CN108182354A (en) * 2018-01-31 2018-06-19 平安科技(深圳)有限公司 Terminal unlock method, device, equipment and readable storage medium storing program for executing
CN110264597A (en) * 2019-06-13 2019-09-20 北京深思数盾科技股份有限公司 Intelligent lock and its method of unlocking
CN110264597B (en) * 2019-06-13 2021-04-09 北京深思数盾科技股份有限公司 Intelligent lock and unlocking method thereof
CN110417615A (en) * 2019-06-21 2019-11-05 中国平安财产保险股份有限公司 Verify method of controlling switch, device, equipment and computer readable storage medium
CN110417615B (en) * 2019-06-21 2022-04-12 中国平安财产保险股份有限公司 Check switch control method, device and equipment and computer readable storage medium
CN114611118A (en) * 2022-05-12 2022-06-10 麒麟软件有限公司 Android multi-window application screen locking method based on Linux system

Also Published As

Publication number Publication date
CN104392157B (en) 2017-04-12

Similar Documents

Publication Publication Date Title
CN104392157A (en) Method and device for locking screen by using passwords
US11089012B2 (en) Event driven second factor credential authentication
EP3147768B1 (en) Screen interface unlocking method and screen interface unlocking device
CN104375836A (en) Method and device for showing lock screen window
KR101552587B1 (en) Location-based access control for portable electronic device
CN104049897B (en) Touch panel device unlock method and device
CN104992102A (en) Message display method and apparatus
CN103927466A (en) Method and device for controlling mobile terminal
CN103765368A (en) Mobile terminal for performing screen unlock based on motion and method thereof
US10479320B2 (en) Method for controlling access to at least one function of a motor vehicle
EP3401823B1 (en) Security verification method and device for smart card application
CN102880820A (en) Method for accessing application program of mobile terminal and mobile terminal
CN105678147B (en) Touch operation method and device
CN104021358A (en) Anti-theft control method and device for mobile terminal
CN103559435A (en) Method and device for controlling debugging ports of terminal equipment
CN107422838B (en) Wearable device, unlocking control system and unlocking control method
CN104599116A (en) Mobile terminal gesture payment control method and mobile terminal
JP2018512083A (en) Multi-granular authentication technique
CN102075627A (en) Information prompting method and mobile terminal
CN105929974A (en) Password input management method and mobile terminal
US20210287221A1 (en) Systems and methods for active signature detection
CN104809402A (en) Fuzzy display method for information and terminal
CN105574396A (en) Electronic equipment unlocking system and method
CN109559415A (en) A kind of intelligent door lock control method and intelligent door lock
CN105337995B (en) A kind of quick personalization method of smart card and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant