CN104392157A - Method and device for locking screen by using passwords - Google Patents
Method and device for locking screen by using passwords Download PDFInfo
- Publication number
- CN104392157A CN104392157A CN201410654940.2A CN201410654940A CN104392157A CN 104392157 A CN104392157 A CN 104392157A CN 201410654940 A CN201410654940 A CN 201410654940A CN 104392157 A CN104392157 A CN 104392157A
- Authority
- CN
- China
- Prior art keywords
- verification
- frequency
- identity
- state
- coded lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Social Psychology (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses a method for locking a screen by using passwords. The method comprises the steps of receiving an input password unlocking command, and obtaining corresponding identity verification information; verifying the identity verification information, and calculating a verification pass frequency, wherein the verification pass frequency is identity verification pass times within unit time; judging whether the verification pass frequency is greater than or equal to a first threshold value or not, and setting a verification state to be pause if the verification pass frequency is greater than or equal to the first threshold value; detecting an unlocking trigger event, judging whether the verification state is pause or not, and displaying an unlocking interface corresponding to the unlocking trigger event if the verification state is not pause. The embodiment of the invention also discloses a device for locking the screen by using the passwords. By adopting the method and the device, disclosed by the invention, the operation convenience can be increased.
Description
Technical field
The present invention relates to mobile internet technical field, particularly relate to a kind of password screen locking method and device
Background technology
Along with the development of development of Mobile Internet technology; the particularly rise of mobile payment and Mobile banking; the protection of privacy of user becomes the very general core demand of mobile phone users, and being pinned by some privacy informations is way very general to of secret protection at present.Existing mobile terminal (such as smart mobile phone, panel computer etc.) generally adopts and locks this method to protect privacy of user to the application that may produce privacy.Such as in some online payments application, when user clicks the icon startup of this application or switches to this application, mobile terminal can show mode (namely cannot switch to another window of this application interface) coded lock control, user just can enter this application after needing input password to carry out authentication, thus prevent mobile terminal idle or lose time other users start this application and spy on privacy.
But; inventor finds that in conventional art, at least there are the following problems: due to the development along with mobile Internet terminal technology; intelligent operating system on mobile terminal can run multiple application simultaneously; and when user is when carrying out application and switching; switch to the application relating to payment, Net silver etc. and need to carry out secret protection at every turn and then can show coded lock screen interface, and point out user to input unlock password.The essence of carrying out unlock password is to confirm user identity, but when user identity is legal, repeatedly carries out verifying, and will cause more meaningless unlocking operation, thus reduces the input efficiency of user, makes the convenience deficiency operated.
Summary of the invention
Based on this, in order to solve the technical matters of the convenience deficiency of aforesaid operations, spy provides a kind of password screen locking method.
A kind of password screen locking method, comprising:
Receive the unlock password instruction of input, obtain corresponding identity verifying information;
Verify described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
Judge whether described verification is more than or equal to first threshold by frequency, if so, verification state is then set for suspending;
Detect and unlock trigger event, judge whether described verification state is time-out, if not, then show the unlock interface corresponding with described unblock trigger event.
Correspondingly, in order to solve the technical matters of the convenience deficiency of aforesaid operations, spy provides a kind of coded lock screen device.
A kind of coded lock screen device, comprising:
Unlock command receiver module, for receiving the unlock password instruction of input, obtains corresponding identity verifying information;
By frequency computation part module, for verifying described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
First verification state updating module, for judging whether described verification is more than or equal to first threshold by frequency, if so, then arranges verification state for suspending;
Coded lock panel module, for detecting unblock trigger event, judges whether described verification state is time-out, if not, then shows the unlock interface corresponding with described unblock trigger event.
Implement the embodiment of the present invention, following beneficial effect will be had:
Repeatedly unlocking operation is carried out at short notice user, and when having higher verification by frequency within this short time, be then that time-out temporarily cancels unlocking operation by arranging verification state, make under the prerequisite guaranteeing user's legal identity, in subsequent operation process, directly can enter application or switch to application and operate., therefore, both ensure that the legitimacy of operator's identity, and additionally reduced the number of times that mobile terminal in use frequently carries out unlocking operation, thus improve the convenience of operation.
In addition, because releasing process reduces, mobile terminal is also used for showing the unlock interface corresponding with described unblock trigger event and carrying out verify calculation by expending less computational resource, therefore makes the power consumption of mobile terminal also reduce, thus improves the battery life of mobile terminal.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Wherein:
Fig. 1 is the process flow diagram of a kind of password screen locking method in an embodiment;
Fig. 2 is the schematic diagram at word unlock password interface in an application scenarios;
Fig. 3 is the schematic diagram of graphical passwords unlock interface in an application scenarios;
Fig. 4 points out the interface schematic diagram whether suspending password screen locking in an application scenarios;
Fig. 5 is the interface schematic diagram that in an application scenarios, prompting selects to suspend duration parameters;
Fig. 6 is the structural representation of a kind of coded lock screen device in an embodiment;
Fig. 7 is the structural representation of a kind of coded lock screen device in another embodiment;
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, be clearly and completely described the technical scheme in the embodiment of the present invention, obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
In one embodiment, be the problem of convenience deficiency solving aforesaid operations, spy proposes a kind of password screen locking method, and the execution of the method depends on computer program, on the computer system that can run on von Neumann system.This computer system can be smart mobile phone, the super of panel computer, touch function this etc. run the mobile device of intelligent operating system, particularly run the terminal device of the systems such as android, ios and windows phone.
Concrete, the method as shown in Figure 1, comprising:
Step S102: the unlock password instruction receiving input, obtains corresponding identity verifying information;
Step S104: the identity verifying information obtained is verified, calculation check is by frequency, and verifying by frequency is number of times by proof of identity in the unit time;
Unlock password instruction is the instruction comprising identity verifying information that user inputs when unlocking pin is locked.
Such as, as shown in Figures 2 and 3, coded lock can be word coded lock, figure lock, Fingerprint Lock, voiceprint lock etc.If user have input the identity verifying information of correct password, sliding trace, fingerprint or vocal print, then pass through the proof of identity of this user, user then can start application smoothly or switch to application window and operate.If user inputs code error, then proof of identity failure, can point out user again to input correct identity verifying information.Also can add the link of " forgetting Password " or " replacement password " on the coded lock page, facilitate user to reset it when forgetting Password.
Verification is the number of times by proof of identity in the unit interval by frequency.Such as, if user inputted password continuously in 5 minutes carry out proof of identity 5 times, and have 4 proof of identity to pass through, one-touch mistake causes proof of identity failure, then its verification is 8 times/10 minutes by frequency.
In the present embodiment, calculation check by the method for frequency can be: preset timing statistics interval, after the identity verifying information obtained is verified, record the timestamp of this proof of identity, and the number of the timestamp that proof of identity is passed through in the timing statistics interval of statistics before this timestamp, thus obtain verification and pass through frequency.
Such as, if the timing statistics interval preset is 10 minutes, the timestamp that the proof of identity recorded during certain verification succeeds is passed through is 13:10:00, then obtain part calibration tails of its timestamp between 13:00:00 to 13:10:00.If the calibration tails got is respectively:
Verification is passed through, 12:48:45;
Verify unsuccessfully, 13:01:42;
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
Verify unsuccessfully, 13:09:55;
Verification is passed through, 13:10:00;
Then, what the proof of identity of timestamp between 13:00:00 to 13:10:00 was passed through is recorded as:
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
Verification is passed through, 13:10:00;
Have 4 records, namely verify by frequency 4 times/10 minutes.
Adopting calculation check in this way by the benefit of frequency is, only add up the verification that (namely presets in timing statistics interval) within cycle short period by frequency, and eliminate impact current operation user judged according to history long-term cumulative data.That is, for certain user, if its within a short period of time, verification was passed through, then intelligence determines that it is validated user identity within this short time.
Preferably, after the timestamp that record proof of identity is passed through, the timestamp that also proof of identity outside the timing statistics interval before this timestamp can be passed through removes.As above in example, be when verifying failed timestamp 13:01:42 recording check results, then can remove exceeding the timing statistics 12:48:45 of interval 10 minutes record, thus save storage space.
Step S106: judge whether verification is more than or equal to first threshold by frequency, if so, then perform step S108: verification state is set for suspending; Otherwise, perform step S110: do not operate.
In the present embodiment, verification state can comprise the states such as time-out, operation.Namely halted state means when startup or switch application, no longer shows coded lock window; Running status then means to be needed to show coded lock window.
Such as, if first threshold is 3 times/10 minutes, and the verification calculated is 4 times/10 minutes by frequency, then verification state be set to suspend.
In the present embodiment, arranging verification state is that the step suspended also comprises: receive the time-out duration parameters buffer memory that input.In the present embodiment, whether overtimely also can detect time-out duration parameters, if so, then verification state is set to run.
Such as, as shown in Figure 4, when detecting that verification is more than or equal to first threshold by frequency, can eject prompting frame, whether inquiry user suspends function of cipher lock, if user selects to suspend, then as shown in Figure 5, can eject and suspend duration parameters choice box.User is namely by choosing default time-out duration parameters input.
If the time-out duration parameters that user chooses is 1 hour, then as a child verification state can be changed back running status 1.Such as, in android system, Timer class (the timer class in android system, function repeatedly triggers the timer event of specified window within the time interval of specifying) can be used to carry out time-out to time-out duration parameters and to detect.
Step S112: detect and unlock trigger event, judge whether verification state is time-out, if not, then performs step S114: show the unlock interface corresponding with unlocking trigger event; If so, then perform step S116, do not process.
Unlock trigger event be startup application or switch to a certain event needing to trigger during the application being provided with unlock password.Namely define in the event handling function of this event and show the unlock interface corresponding with unlocking trigger event (such as, it can be the UnLockScreen interface that system provides in android system, namely the interface of unblanking provided in android system also can be self-defining unblock window interface) logical code.Can before the logical code of displaying in this event handling function unlock interface corresponding with unlocking trigger event, add the code judging verification state, if verification state is for suspending, then do not perform the logical code of displaying in this event handling function unlock interface corresponding with unlocking trigger event, if run, then perform.
That is, if user repeatedly carries out unlocking operation at short notice, and within this short time, have higher verification by frequency, then arrange verification state by abovementioned steps S102 to S110 and suspend unlocking operation, user then directly can enter application or switch to application and operate.And owing to being provided with time-out duration parameters, make in the time-out duration of this setting, assert that the user of operating mobile terminal is validated user, therefore, both ensure that the legitimacy of operator's identity, additionally reduce the number of times that mobile terminal in use frequently carries out unlocking operation, thus improve the convenience of operation.
It should be noted that, abovementioned steps S102 to S110 and the process of step S112 to S116 do not have dividing of strict sequencing, step S102 to S110 is the process arranging halted state according to the calibration tails in releasing process, step S112 to S116 is the process of whether showing unlock interface according to verification condition adjudgement, therefore for replacing place of execution process.
Preferably, mobile terminal also can detect wireless network access point when changing, and arranges verification state for running.
Such as, if user repeatedly unlocks in the short time under wifi environment A, then can only judge this user in wifi environment A as validated user, if user migrates to wifi environment B by wifi environment A at short notice or changes into use mobile network 3G or 4G online, then may for lawless person steal its mobile terminal after leave current place, therefore need to reaffirm its identity.
Preferably, mobile terminal also can detection check state be suspend time geographic position change displacement, if this displacement be greater than distance displacement threshold value, then arrange verification state for run.
Such as, if mobile terminal can detect change in location according to GPS, if be in 1 hour of time-out in verification state, user's moving displacement is comparatively far away, then may for lawless person steal its mobile terminal after leave current place, therefore need to reaffirm its identity.
Change verification state by the change detecting wireless network access point and geographic position, the security of secret protection in small probability mobile terminal loss event can be improved.
Further, in the present embodiment, also comprised after the step that identity verifying information is verified: calculate verification continuously by frequency, verification is the number of times continuing through proof of identity in the unit time by frequency continuously.And mobile terminal also can judge whether verification is more than or equal to Second Threshold by frequency continuously, if so, verification state is then set for suspending.
As in precedent, if the calibration tails got is respectively:
Verification is passed through, 12:48:45;
Verify unsuccessfully, 13:01:42;
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
Verify unsuccessfully, 13:09:55;
Verification is passed through, 13:10:00;
Then when moment 13:06:42, detect that verifying the number of times passed through continuously in 10 minutes is 3 times:
Verification is passed through, 13:01:46;
Verification is passed through, 13:02:42;
Verification is passed through, 13:06:42;
If Second Threshold is 3, then when moment 13:06:42, verification state can be set to suspend.
It should be noted that, use verification by frequency and continuously verification can be walked abreast to the process that verification state is arranged by frequency and carry out, if certain verification by after detect verification by frequency be greater than first threshold or continuously verification be greater than Second Threshold by frequency, all verification state can be set to suspend, and there will not be conflict.
In one embodiment, verification state also comprises lock-out state, and it means that the operating system of application or mobile terminal is locked, no longer shows unlock password interface, even if user knows that password also cannot enter application or system.
In the present embodiment, then can record verify the frequency of failure continuously to identity verifying information after the step verify, the verification frequency of failure is the number of times of continuous proof of identity failure continuously.
Mobile terminal also can judge whether verify the frequency of failure is continuously more than or equal to the 3rd threshold value, if so, then arranges verification state for locking.
Such as, if user is when unlocking, the continuous input error number of times of input password reaches 5 times, then by application or mobile terminal locking, and can arrange the locking time of 1 hour, 1 as a child then provided unlock interface again.
In another embodiment, show that the method for the unlock interface corresponding with unlocking trigger event is: generating the unblock window corresponding with unlocking trigger event, being shown by the stack top of being added to window stack.
Such as, based in the application scenarios of Android system, third-party unlocking tool can be used to show independently self-defining unblock window to application.This unblock window is based on the activity object (window object) in Android system, developer can customize and comprises cryptographic check assembly (by input characters password, PIN code, the approach such as mailbox checking carry out the verification assembly verified), sliding trace verification assembly (being carried out the assembly verified by the default graphics track that slides out at touch-screen), the unblock window interface of vocal print verification assembly (carry out phonetic entry by microphone and carry out the verification assembly of vocal print comparison) and/or finger-mark check assembly (being carried out the assembly verified by fingerprint sensor), then added to the stack top of the window stack of Android system and shown, then user could remove this unblock window from the stack top of window stack after must completing verification on this unblock window, and the stack top making the window of the application of waiting to enter/switch to transplant window stack is shown.
That is, said method not only based on the primary unlocking mechanism of intelligent operating system on mobile terminal, also based on the self-defining password screen locking method of third party, can have very high versatility.
In one embodiment, as shown in Figure 6, a kind of coded lock screen device, comprises unlock command receiver module 102, verifies state updating module 106 and coded lock panel module 108 by frequency computation part module 104, first, wherein:
Unlock command receiver module 102, for receiving the unlock password instruction of input, obtains corresponding identity verifying information.
By frequency computation part module 104, for verifying described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency.
First verification state updating module 106, for judging whether described verification is more than or equal to first threshold by frequency, if so, then arranges verification state for suspending.
Coded lock panel module 108, for detecting unblock trigger event, judges whether described verification state is time-out, if not, then shows the unlock interface corresponding with described unblock trigger event.
In the present embodiment, the first verification state updating module 106 is also for receiving the time-out duration parameters of input and buffer memory.
Whether as shown in Figure 7, coded lock screen device also comprises state detection module 110, overtime for detecting described time-out duration parameters, if so, then described verification state is set to run.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises wireless network access point detection module 112, for detect wireless network access point change time, arrange described verification state for run.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises geographic position detection module 114, the displacement of geographic position change when being time-out for detection check state, if described displacement is greater than distance displacement threshold value, then arranges described verification state for running.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises verification continuously by frequency computation part module 116, and for calculating continuously, verification is by frequency, and described continuous verification is the number of times continuing through proof of identity in the unit time by frequency.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises the second verification state updating module 118, for judging whether described continuous verification is more than or equal to Second Threshold by frequency, if so, then arranges verification state for suspending.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises verification frequency of failure statistical module 120 continuously, and verify the frequency of failure continuously for recording, the described continuous verification frequency of failure is the number of times of continuous proof of identity failure.
In the present embodiment, as shown in Figure 7, coded lock screen device also comprises the 3rd verification state updating module 122, for judging whether the described continuous verification frequency of failure is more than or equal to the 3rd threshold value, if so, then arranges verification state for locking.
In one embodiment, coded lock panel module 108 also for generating the unblock window corresponding with described unblock trigger event, is shown by the stack top of being added to window stack.
In sum, implement the embodiment of the present invention, following beneficial effect will be had:
Repeatedly unlocking operation is carried out at short notice user, and when having higher verification by frequency within this short time, be then that time-out temporarily cancels unlocking operation by arranging verification state, make under the prerequisite guaranteeing user's legal identity, in subsequent operation process, directly can enter application or switch to application and operate., therefore, both ensure that the legitimacy of operator's identity, and additionally reduced the number of times that mobile terminal in use frequently carries out unlocking operation, thus improve the convenience of operation.
In addition, because releasing process reduces, mobile terminal is also used for showing the unlock interface corresponding with described unblock trigger event and carrying out verify calculation by expending less computational resource, therefore makes the power consumption of mobile terminal also reduce, thus improves the battery life of mobile terminal.
One of ordinary skill in the art will appreciate that all or part of flow process realized in above-described embodiment method, that the hardware that can carry out instruction relevant by computer program has come, described program can be stored in a computer read/write memory medium, this program, when performing, can comprise the flow process of the embodiment as above-mentioned each side method.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosedly be only present pre-ferred embodiments, certainly can not limit the interest field of the present invention with this, therefore according to the equivalent variations that the claims in the present invention are done, still belong to the scope that the present invention is contained.
Claims (18)
1. a password screen locking method, comprising:
Receive unlock password instruction, obtain corresponding identity verifying information;
Verify described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
Judge whether described verification is more than or equal to first threshold by frequency, if so, verification state is then set for suspending;
Detect and unlock trigger event, judge whether described verification state is time-out, if not, then show the unlock interface corresponding with described unblock trigger event.
2. according to the password screen locking method shown in claim 1, it is characterized in that, the described verification state that arranges is that the step suspended also comprises:
Receive the time-out duration parameters buffer memory that input;
Described method also comprises:
Whether overtimely detect described time-out duration parameters, if so, then described verification state is set to run.
3. according to the password screen locking method shown in claim 1, it is characterized in that, described method also comprises:
When detection wireless network access point changes, described verification state is set for running.
4. according to the password screen locking method shown in claim 1, it is characterized in that, described method also comprises:
The displacement of geographic position change when detection check state is time-out, if described displacement is greater than distance displacement threshold value, then arranges described verification state for running.
5. according to the password screen locking method shown in claim 1, it is characterized in that, also comprise after the described step that described identity verifying information is verified:
Calculate and verify by frequency continuously, described continuous verification is the number of times continuing through proof of identity in the unit time by frequency.
6. according to the password screen locking method shown in claim 5, it is characterized in that, described method also comprises:
Judge whether described continuous verification is more than or equal to Second Threshold by frequency, if so, verification state is then set for suspending.
7. according to the password screen locking method shown in claim 1, it is characterized in that, also comprise after the described step that described identity verifying information is verified:
Record verifies the frequency of failure continuously, and the described continuous verification frequency of failure is the number of times of continuous proof of identity failure.
8. according to the password screen locking method shown in claim 7, it is characterized in that, described method also comprises:
Judge whether the described continuous verification frequency of failure is more than or equal to the 3rd threshold value, if so, verification state is then set for locking.
9. according to the password screen locking method shown in claim 1, it is characterized in that, the method for the unlock interface that described displaying is corresponding with described unblock trigger event is:
Generate the unblock window corresponding with described unblock trigger event, shown by the stack top of being added to window stack.
10. a coded lock screen device, is characterized in that, comprising:
Unlock command receiver module, for receiving unlock password instruction, obtains corresponding identity verifying information;
By frequency computation part module, for verifying described identity verifying information, calculation check is by frequency, and described verification is the number of times by proof of identity in the unit time by frequency;
First verification state updating module, for judging whether described verification is more than or equal to first threshold by frequency, if so, then arranges verification state for suspending;
Coded lock panel module, for detecting unblock trigger event, judges whether described verification state is time-out, if not, then shows the unlock interface corresponding with described unblock trigger event.
11., according to the coded lock screen device shown in claim 10, is characterized in that, described first verification state updating module is also for receiving the time-out duration parameters of input and buffer memory;
Whether described device also comprises state detection module, overtime for detecting described time-out duration parameters, if so, then described verification state is set to run.
12., according to the coded lock screen device shown in claim 10, is characterized in that, described device also comprises wireless network access point detection module, for detect wireless network access point change time, arrange described verification state for run.
13. according to the coded lock screen device shown in claim 10, it is characterized in that, described device also comprises geographic position detection module, the displacement of geographic position change when being time-out for detection check state, if described displacement is greater than distance displacement threshold value, then described verification state is set for running.
14. according to the coded lock screen device shown in claim 10, it is characterized in that, described device also comprises verification continuously by frequency computation part module, and for calculating continuously, verification is by frequency, and described continuous verification is the number of times continuing through proof of identity in the unit time by frequency.
15., according to the coded lock screen device shown in claim 14, is characterized in that, described device also comprises the second verification state updating module, for judging whether described continuous verification is more than or equal to Second Threshold by frequency, if so, verification state is then set for suspending.
16., according to the coded lock screen device shown in claim 10, is characterized in that, described device also comprises verification frequency of failure statistical module continuously, and verify the frequency of failure continuously for recording, the described continuous verification frequency of failure is the number of times of continuous proof of identity failure.
17. according to the coded lock screen device shown in claim 16, it is characterized in that, described device also comprises the 3rd verification state updating module, for judging whether the described continuous verification frequency of failure is more than or equal to the 3rd threshold value, if so, verification state is then set for locking.
18., according to the coded lock screen device shown in claim 10, is characterized in that, described coded lock panel module also for generating the unblock window corresponding with described unblock trigger event, is shown by the stack top of being added to window stack.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410654940.2A CN104392157B (en) | 2014-11-18 | 2014-11-18 | Method and device for locking screen by using passwords |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410654940.2A CN104392157B (en) | 2014-11-18 | 2014-11-18 | Method and device for locking screen by using passwords |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104392157A true CN104392157A (en) | 2015-03-04 |
CN104392157B CN104392157B (en) | 2017-04-12 |
Family
ID=52610059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410654940.2A Active CN104392157B (en) | 2014-11-18 | 2014-11-18 | Method and device for locking screen by using passwords |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104392157B (en) |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095743A (en) * | 2015-09-09 | 2015-11-25 | 北京金山安全软件有限公司 | Method and device for setting locking strategy and electronic equipment |
CN105608364A (en) * | 2015-12-16 | 2016-05-25 | 北京奇虎科技有限公司 | Application security protection method and apparatus |
CN106384029A (en) * | 2016-09-22 | 2017-02-08 | 乐视控股(北京)有限公司 | Terminal screen-locking setting processing method and apparatus |
CN106778143A (en) * | 2017-01-17 | 2017-05-31 | 广东欧珀移动通信有限公司 | Mobile terminal unlocking method, device and mobile terminal |
CN106951759A (en) * | 2017-03-07 | 2017-07-14 | 青岛海信移动通信技术股份有限公司 | Unlocked by fingerprint control method and device |
CN106980454A (en) * | 2017-03-30 | 2017-07-25 | 北京小米移动软件有限公司 | Unlocking method and device |
CN106980784A (en) * | 2017-03-24 | 2017-07-25 | 北京小米移动软件有限公司 | Screen locking control method, device and smart machine |
WO2018000768A1 (en) * | 2016-06-28 | 2018-01-04 | 北京金山安全软件有限公司 | Method and apparatus for setting screen-lock password, and electronic device |
CN107729742A (en) * | 2017-10-11 | 2018-02-23 | 广州视源电子科技股份有限公司 | Equipment solution lock control method, device, equipment and storage medium |
CN108182354A (en) * | 2018-01-31 | 2018-06-19 | 平安科技(深圳)有限公司 | Terminal unlock method, device, equipment and readable storage medium storing program for executing |
CN108256856A (en) * | 2017-12-08 | 2018-07-06 | 五八有限公司 | A kind of method of payment, equipment and computer readable storage medium |
CN108985022A (en) * | 2017-05-31 | 2018-12-11 | 北京小米移动软件有限公司 | Fingerprint identification method and device |
CN110264597A (en) * | 2019-06-13 | 2019-09-20 | 北京深思数盾科技股份有限公司 | Intelligent lock and its method of unlocking |
CN110417615A (en) * | 2019-06-21 | 2019-11-05 | 中国平安财产保险股份有限公司 | Verify method of controlling switch, device, equipment and computer readable storage medium |
CN114611118A (en) * | 2022-05-12 | 2022-06-10 | 麒麟软件有限公司 | Android multi-window application screen locking method based on Linux system |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945114A (en) * | 2012-10-17 | 2013-02-27 | 广东欧珀移动通信有限公司 | Regular unlocking method and mobile terminal thereof |
CN102981723A (en) * | 2012-11-07 | 2013-03-20 | 北京百度网讯科技有限公司 | Unlocking method and unlocking device for mobile terminal and mobile terminal |
CN103049181A (en) * | 2012-12-20 | 2013-04-17 | 广东欧珀移动通信有限公司 | Method and system for dynamically unlocking mobile terminal |
WO2013152136A1 (en) * | 2012-04-03 | 2013-10-10 | Verayo, Inc. | Authentication token |
CN103679070A (en) * | 2013-12-05 | 2014-03-26 | 小米科技有限责任公司 | Anti-theft method and device of terminal and terminal equipment |
CN103885688A (en) * | 2014-03-27 | 2014-06-25 | 深圳市国华光电科技有限公司 | Screen unlocking method and device |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
CN104021327A (en) * | 2014-06-19 | 2014-09-03 | 中科创达软件股份有限公司 | Method and device for unlocking intelligent device |
CN104077508A (en) * | 2013-09-25 | 2014-10-01 | 苏州天鸣信息科技有限公司 | Unlocking device and method thereof |
CN104102864A (en) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | Terminal screen locking password resetting method, resetting system and terminal |
-
2014
- 2014-11-18 CN CN201410654940.2A patent/CN104392157B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2013152136A1 (en) * | 2012-04-03 | 2013-10-10 | Verayo, Inc. | Authentication token |
CN102945114A (en) * | 2012-10-17 | 2013-02-27 | 广东欧珀移动通信有限公司 | Regular unlocking method and mobile terminal thereof |
CN102981723A (en) * | 2012-11-07 | 2013-03-20 | 北京百度网讯科技有限公司 | Unlocking method and unlocking device for mobile terminal and mobile terminal |
CN103049181A (en) * | 2012-12-20 | 2013-04-17 | 广东欧珀移动通信有限公司 | Method and system for dynamically unlocking mobile terminal |
CN104077508A (en) * | 2013-09-25 | 2014-10-01 | 苏州天鸣信息科技有限公司 | Unlocking device and method thereof |
CN103679070A (en) * | 2013-12-05 | 2014-03-26 | 小米科技有限责任公司 | Anti-theft method and device of terminal and terminal equipment |
CN103885688A (en) * | 2014-03-27 | 2014-06-25 | 深圳市国华光电科技有限公司 | Screen unlocking method and device |
CN104010088A (en) * | 2014-06-16 | 2014-08-27 | 中国地质大学(武汉) | Smart-phone anti-theft method and system |
CN104021327A (en) * | 2014-06-19 | 2014-09-03 | 中科创达软件股份有限公司 | Method and device for unlocking intelligent device |
CN104102864A (en) * | 2014-07-30 | 2014-10-15 | 宇龙计算机通信科技(深圳)有限公司 | Terminal screen locking password resetting method, resetting system and terminal |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105095743A (en) * | 2015-09-09 | 2015-11-25 | 北京金山安全软件有限公司 | Method and device for setting locking strategy and electronic equipment |
CN105095743B (en) * | 2015-09-09 | 2018-09-25 | 北京金山安全软件有限公司 | Method and device for setting locking strategy and electronic equipment |
CN105608364A (en) * | 2015-12-16 | 2016-05-25 | 北京奇虎科技有限公司 | Application security protection method and apparatus |
CN105608364B (en) * | 2015-12-16 | 2018-09-25 | 北京奇虎科技有限公司 | The safety protection method and device of application program |
WO2018000768A1 (en) * | 2016-06-28 | 2018-01-04 | 北京金山安全软件有限公司 | Method and apparatus for setting screen-lock password, and electronic device |
CN106384029A (en) * | 2016-09-22 | 2017-02-08 | 乐视控股(北京)有限公司 | Terminal screen-locking setting processing method and apparatus |
CN106778143A (en) * | 2017-01-17 | 2017-05-31 | 广东欧珀移动通信有限公司 | Mobile terminal unlocking method, device and mobile terminal |
CN106951759A (en) * | 2017-03-07 | 2017-07-14 | 青岛海信移动通信技术股份有限公司 | Unlocked by fingerprint control method and device |
CN106980784A (en) * | 2017-03-24 | 2017-07-25 | 北京小米移动软件有限公司 | Screen locking control method, device and smart machine |
CN106980454B (en) * | 2017-03-30 | 2020-12-04 | 北京小米移动软件有限公司 | Unlocking method and device |
CN106980454A (en) * | 2017-03-30 | 2017-07-25 | 北京小米移动软件有限公司 | Unlocking method and device |
CN108985022A (en) * | 2017-05-31 | 2018-12-11 | 北京小米移动软件有限公司 | Fingerprint identification method and device |
CN107729742A (en) * | 2017-10-11 | 2018-02-23 | 广州视源电子科技股份有限公司 | Equipment solution lock control method, device, equipment and storage medium |
CN108256856A (en) * | 2017-12-08 | 2018-07-06 | 五八有限公司 | A kind of method of payment, equipment and computer readable storage medium |
CN108182354A (en) * | 2018-01-31 | 2018-06-19 | 平安科技(深圳)有限公司 | Terminal unlock method, device, equipment and readable storage medium storing program for executing |
CN110264597A (en) * | 2019-06-13 | 2019-09-20 | 北京深思数盾科技股份有限公司 | Intelligent lock and its method of unlocking |
CN110264597B (en) * | 2019-06-13 | 2021-04-09 | 北京深思数盾科技股份有限公司 | Intelligent lock and unlocking method thereof |
CN110417615A (en) * | 2019-06-21 | 2019-11-05 | 中国平安财产保险股份有限公司 | Verify method of controlling switch, device, equipment and computer readable storage medium |
CN110417615B (en) * | 2019-06-21 | 2022-04-12 | 中国平安财产保险股份有限公司 | Check switch control method, device and equipment and computer readable storage medium |
CN114611118A (en) * | 2022-05-12 | 2022-06-10 | 麒麟软件有限公司 | Android multi-window application screen locking method based on Linux system |
Also Published As
Publication number | Publication date |
---|---|
CN104392157B (en) | 2017-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104392157A (en) | Method and device for locking screen by using passwords | |
US11089012B2 (en) | Event driven second factor credential authentication | |
EP3147768B1 (en) | Screen interface unlocking method and screen interface unlocking device | |
CN104375836A (en) | Method and device for showing lock screen window | |
KR101552587B1 (en) | Location-based access control for portable electronic device | |
CN104049897B (en) | Touch panel device unlock method and device | |
CN104992102A (en) | Message display method and apparatus | |
CN103927466A (en) | Method and device for controlling mobile terminal | |
CN103765368A (en) | Mobile terminal for performing screen unlock based on motion and method thereof | |
US10479320B2 (en) | Method for controlling access to at least one function of a motor vehicle | |
EP3401823B1 (en) | Security verification method and device for smart card application | |
CN102880820A (en) | Method for accessing application program of mobile terminal and mobile terminal | |
CN105678147B (en) | Touch operation method and device | |
CN104021358A (en) | Anti-theft control method and device for mobile terminal | |
CN103559435A (en) | Method and device for controlling debugging ports of terminal equipment | |
CN107422838B (en) | Wearable device, unlocking control system and unlocking control method | |
CN104599116A (en) | Mobile terminal gesture payment control method and mobile terminal | |
JP2018512083A (en) | Multi-granular authentication technique | |
CN102075627A (en) | Information prompting method and mobile terminal | |
CN105929974A (en) | Password input management method and mobile terminal | |
US20210287221A1 (en) | Systems and methods for active signature detection | |
CN104809402A (en) | Fuzzy display method for information and terminal | |
CN105574396A (en) | Electronic equipment unlocking system and method | |
CN109559415A (en) | A kind of intelligent door lock control method and intelligent door lock | |
CN105337995B (en) | A kind of quick personalization method of smart card and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |