CN105100094B - A kind of solution lock control method and terminal - Google Patents
A kind of solution lock control method and terminal Download PDFInfo
- Publication number
- CN105100094B CN105100094B CN201510416766.2A CN201510416766A CN105100094B CN 105100094 B CN105100094 B CN 105100094B CN 201510416766 A CN201510416766 A CN 201510416766A CN 105100094 B CN105100094 B CN 105100094B
- Authority
- CN
- China
- Prior art keywords
- terminal
- unlock
- request
- server
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
- H04L67/125—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
Abstract
The embodiment of the invention discloses a kind of solution lock control method, terminal and servers.Method therein includes: when first terminal receives the unlocking request for carrying unlock fingerprint, and the unlock fingerprint in the unlocking request is sent to server and verified by the first terminal;When receiving the unlock fingerprint of the server feedback by verifying message, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges whether the request time meets preset effective unlocked time range, and feed back judging result;The first terminal executes solution lock control operation according to the judging result of the server feedback.Using the present invention, it can be verified by remote fingerprint and time threshold is come the unlock of controlling terminal, improve the flexibility and high efficiency to terminal control management.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of solution lock control methods, terminal and server.
Background technique
Fingerprint identification technology is a kind of by the way that the fingerprint of typing and the fingerprint pre-saved to be compared, to verify typing
The identification technology of person's identity, with the development of terminal hardware and the promotion of fingerprint identification technology, fingerprint identification technology is answered extensively
For in each Terminal Type.
Currently, since the general self-control of child is not strong enough, and parent's work is relatively busy, can not be in the work and rest for controlling child when
Between, therefore how current urgent need to resolve become by the control that parent's terminal carries out the starting time come the terminal to child one end
Problem.The way of current ordinary circumstance is to carry out password setting to child terminal by parent, when child needs to carry out password solution
When lock, then password is obtained to parent otherwise, terminal can be only unlocked when child gets password
Operation.Although aforesaid way can be managed control to the unlock of terminal, pipe can be reached by needing to frequently replace password
Reason control purpose, thus it is inflexible to the solution lock control of terminal, and needing can be by close by asking for the operation of password
Code is unlocked, and parent needs to spend the time to be managed terminal, reduces the efficiency of terminal management.
Summary of the invention
The embodiment of the present invention provides a kind of solution lock control method, terminal and server, with by remote fingerprint verifying and
Time threshold carrys out the unlock of controlling terminal, improves flexibility and high efficiency to terminal control management.
First aspect of the embodiment of the present invention provides a kind of solution lock control method, comprising:
When first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal will be in the unlocking request
Unlock fingerprint be sent to server and verified;
When receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by the unlock
The request time of request is sent to the server, so that whether the server judges the request time and meet and preset have
Unlocked time range is imitated, and feeds back judging result;
The first terminal executes solution lock control operation according to the judging result of the server feedback.
Second aspect of the embodiment of the present invention provides a kind of solution lock control method, comprising:
When server receives the unlock fingerprint of first terminal transmission, the server tests the unlock fingerprint
Card, the unlock fingerprint are entrained by unlocking request received by the first terminal;
If the unlock fingerprint authentication passes through, the unlock fingerprint is sent to described by the server by verifying message
First terminal, so that the first terminal returns to the request time of the unlocking request;
The server judges whether the request time meets preset effective unlocked time range, and by the judgement
As a result the first terminal is fed back to, so that the first terminal executes solution lock control according to the judging result of the server feedback
System operation.
The third aspect of the embodiment of the present invention provides a kind of terminal, comprising:
Transmission unit is verified, for when first terminal receives the unlocking request for carrying unlock fingerprint, described first eventually
Unlock fingerprint in the unlocking request is sent to server and verified by end;
Request time transmission unit, for when receiving the unlock fingerprint of the server feedback by verifying message,
The request time of the unlocking request is sent to the server by the first terminal, so as to ask described in server judgement
Whether seeking time meets preset effective unlocked time range, and feeds back judging result;
Execution unit executes solution lock control behaviour according to the judging result of the server feedback for the first terminal
Make.
Fourth aspect of the embodiment of the present invention provides a kind of server, comprising:
Authentication unit, when for receiving the unlock fingerprint of first terminal transmission when server, the server is to described
Unlock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal;
Transmission unit, if passing through for the unlock fingerprint authentication, the unlock fingerprint is passed through verifying by the server
Message is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request;
Feedback unit judges whether the request time meets preset effective unlocked time model for the server
It encloses, and the judging result is fed back into the first terminal, so that the first terminal sentencing according to the server feedback
Disconnected result executes solution lock control operation.
Institute can be passed through when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention
It states first terminal the unlock fingerprint in the unlocking request is sent to server and verify, the server is anti-when receiving
When the unlock fingerprint of feedback is by verifying message, the request time of the unlocking request is sent to the service by the first terminal
Device so that the server judges whether the request time meets preset effective unlocked time range, and feeds back judgement knot
Fruit, the last first terminal execute solution lock control operation according to the judging result of the server feedback, by by the solution
The judgement of request time is verified and unlocked to lock to automatically process to unlocking request, improves to the flexible of terminal control management
Property and high efficiency.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability
For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is a kind of flow diagram for solving lock control method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another solution lock control method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another solution lock control method provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another solution lock control method provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another terminal provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of execution unit provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram of feedback unit provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
In following all examples, terminal may include smart phone, tablet computer, laptop, palm PC with
And mobile internet device (Mobile Internet Device, MID) etc..Terminal in the present embodiment is referred mainly to such as intelligent hand
The intelligent mobile communication terminal equipment of machine or tablet computer etc..
Fig. 1 is please referred to, for a kind of flow diagram for solving lock control method provided in an embodiment of the present invention, this method includes
Following steps S101-S103.
S101, when first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal is by the unlock
Unlock fingerprint in request is sent to server and is verified.
In the specific implementation, the first terminal is by institute when first terminal receives the unlocking request for carrying unlock fingerprint
It states the unlock fingerprint in unlocking request and is sent to server and verified.It, can be by child handset or controlled person in the present embodiment
Mobile phone is as first terminal, using parent's mobile phone or the mobile phone of controller as second terminal, when child or controlled person need using
When mobile phone, need the fingerprint for inputting itself by the fingerprint input position in first terminal to trigger unlocking request, when the first end
When termination receives the unlocking request for carrying unlock fingerprint, the first terminal can obtain the unlock fingerprint in unlocking request automatically,
And the unlock fingerprint is sent to server, verified by server the unlock fingerprint whether with it is preset in server
Fingerprint matches, to judge whether the unlock fingerprint is verified.
S102, when receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by institute
The request time for stating unlocking request is sent to the server, so as to judge whether the request time meets pre- for the server
If effective unlocked time range, and feed back judging result.
In the specific implementation, when the unlock fingerprint that the first terminal receives the server feedback passes through verifying message
When, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges institute
It states whether request time meets preset effective unlocked time range, and feeds back judging result.When the unlock fingerprint passes through
When the verifying of server, the first terminal can receive the message that the unlock fingerprint that the server is sent passes through verifying.By
Wish that child can wish controlled person in the time of defined in suitable time range using mobile phone or controller in parent
Interior to unlock mobile phone to use mobile phone, in the present embodiment, after unlocking fingerprint authentication and passing through, the first terminal can wish to asking
Seeking time is judged that the unlocking request time can be sent in the server by that is, described terminal, so that server comes
Judge whether current request time meets preset effective unlocked time range, in the present embodiment, is also possible to the solution
The request time and unlock fingerprint for locking request send the result verified and judged, and feed back judgement simultaneously simultaneously.
S103, the first terminal execute solution lock control according to the judging result of the server feedback and operate.
It is operated in the specific implementation, the first terminal executes solution lock control according to the judging result of the server feedback.
In the present embodiment, when the judging result of the server feedback can be there are two types of situation: the first situation is discontented for current time
Sufficient unlocked time requirement, can not carry out unlocked by fingerprint, the result of current unlock can be fed back to first terminal by server
And second terminal, artificially decide whether to unlock by second terminal;Second situation is that current time meets unlocked time requirement, can
It is automatic to send unlock feedback information, first terminal is unlocked.
It can be by described when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention
Unlock fingerprint in the unlocking request is sent to server and verified by first terminal, to judge that current unlock fingerprint is
It is no to can have terminal unlocking permission, when receiving the unlock fingerprint of the server feedback by verifying message, described the
The request time of the unlocking request is sent to the server by one terminal, so that the server judges the request time
Whether meet preset effective unlocked time range, and feed back judging result, to judge current unlock from current unlocked time
Whether the time is effective unlocked time, finally executes unlock according to the judging result of the server feedback by the first terminal
Control operation improves the spirit to terminal control management by remote fingerprint verifying and time threshold come the unlock of controlling terminal
Activity and high efficiency.
It referring to figure 2., is the flow diagram of another solution lock control method provided in an embodiment of the present invention, this method packet
Include following steps S201-S205.
S201, when first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal is by the unlock
Unlock fingerprint in request is sent to server and is verified.
In the specific implementation, the first terminal is by institute when first terminal receives the unlocking request for carrying unlock fingerprint
It states the unlock fingerprint in unlocking request and is sent to server and verified.It, can be by child handset or controlled person in the present embodiment
Mobile phone is as first terminal, using parent's mobile phone or the mobile phone of controller as second terminal, when child or controlled person need using
When mobile phone, need the fingerprint for inputting itself by the fingerprint input position in first terminal to trigger unlocking request, when the first end
When termination receives the unlocking request for carrying unlock fingerprint, the first terminal can obtain the unlock fingerprint in unlocking request automatically,
And the unlock fingerprint is sent to server, verified by server the unlock fingerprint whether with it is preset in server
Fingerprint matches, to judge whether the unlock fingerprint is verified.
S202, when receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by institute
The request time for stating unlocking request is sent to the server, so as to judge whether the request time meets pre- for the server
If effective unlocked time range, and feed back judging result.
In the specific implementation, when the unlock fingerprint that the first terminal receives the server feedback passes through verifying message
When, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges institute
It states whether request time meets preset effective unlocked time range, and feeds back judging result.When the unlock fingerprint passes through
When the verifying of server, the first terminal can receive the message that the unlock fingerprint that the server is sent passes through verifying.By
Wish that child can wish controlled person in the time of defined in suitable time range using mobile phone or controller in parent
It is interior that mobile phone is unlocked to use mobile phone, in the present embodiment, after unlocking fingerprint authentication and passing through, when the first terminal can be to request
Between judged, i.e., the unlocking request time can be sent in the server by the described terminal, so that server judges
Whether current request time meets preset effective unlocked time range, in the present embodiment, is also possible to ask the unlock
The request time asked sends the result verified and judged, and feed back judgement simultaneously with unlock fingerprint simultaneously.
S203, when receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal is defeated
Unlock failure prompting message out.
In the specific implementation, when receiving the unlock fingerprint authentication failure news of the server feedback, described first
Terminal output unlock failure prompting message.When receiving the unlock fingerprint authentication failure news of the server feedback, say
The fingerprint of bright current typing can not be unlocked the first terminal, and the first terminal can export " unlock mistake by screen
Lose " message, such as request unlock again then needs to re-enter new finger print information and is sent to server and judged.
S204, if the judging result indicates the request time and meets preset effective unlocked time range, described the
One terminal executes unlock operation, and unlock result is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range,
The first terminal executes unlock operation, and unlock result is sent to second terminal.If server judges the request
Between meet preset effective unlocked time range, then the first terminal will receive the judging result be the request time
Meeting preset effective unlocked time range, then the first terminal can execute unlock operation automatically, and unlock is completed
As a result it is sent to the second terminal.
S205, it is described if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range
The unlock control message that first terminal is sent according to the second terminal received, execution unlock operation simultaneously send out unlock result
Give second terminal, or output unlock failure prompting message.
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model
It encloses, the unlock control message that the first terminal is sent according to the second terminal received, execution unlock operation simultaneously will solution
Lock result is sent to second terminal, or output unlock failure prompting message.If server judges that the request time is discontented
The preset effective unlocked time range of foot, the then judging result that the first terminal receives are unsatisfactory for pre- for the request time
If effective unlocked time range, the first terminal will hold according to the solution lock control request that the second terminal that receives is sent
Unlock result is simultaneously sent to second terminal, or output unlock failure prompting message by row unlock operation.For example, working as described first
When the agreement solution lock control request that the second terminal that terminal receives is sent, then the first terminal will execute unlock operation, and
Unlock result is sent to the second terminal;When the refusal solution lock control that the second terminal that the first terminal receives is sent
When request, then output is unlocked failure prompting message by the first terminal.
Institute can be passed through when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention
It states first terminal the unlock fingerprint in the unlocking request is sent to server and verify, the server is anti-when receiving
When the unlock fingerprint of feedback is by verifying message, the request time of the unlocking request is sent to the service by the first terminal
Device so that the server judges whether the request time meets preset effective unlocked time range, and feeds back judgement knot
Fruit, when receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal output unlock failure
Prompting message, if the judging result indicates that the request time meets preset effective unlocked time range, described first eventually
End executes unlock operation, and unlock result is sent to second terminal, if the judging result indicates that the request time is discontented
The preset effective unlocked time range of foot, the first terminal disappear according to the solution lock control that the second terminal received is sent
Breath executes unlock operation and unlock result is sent to second terminal, or output unlock failure prompting message, passes through server
Fingerprint authentication is carried out, and judges automatically whether meet time requirement by server by the time of request unlock, is simplified
Judging result is sent to second terminal by server when then failing by unlock by the management process of terminal, eventually by second
End decides whether to be unlocked, to enhance the flexibility of unlock.
It referring to figure 3., is the flow diagram of another solution lock control method provided in an embodiment of the present invention, this method packet
Include following steps S301-S303.
S301, when server receives the unlock fingerprint of first terminal transmission, the server is to the unlock fingerprint
It is verified, the unlock fingerprint is entrained by unlocking request received by the first terminal.
In the specific implementation, the server is to the solution when server receives the unlock fingerprint of first terminal transmission
Lock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal.In the present embodiment,
Unlock fingerprint entrained by unlocking request can be got from first terminal by server, and will unlock fingerprint and preset solution
Lock fingerprint is compared, and then carries out fingerprint authentication according to comparison result.
S302, if the unlock fingerprint authentication passes through, the server sends the unlock fingerprint by verifying message
To the first terminal, so that the first terminal returns to the request time of the unlocking request.
In the specific implementation, the server disappears the unlock fingerprint by verifying if the unlock fingerprint authentication passes through
Breath is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.When the unlock refers to
When line is consistent with preset unlock fingerprint comparison, the unlock fingerprint is sent to first eventually by verifying message by the server
End.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller
Mobile phone is unlocked in time to use mobile phone, in the present embodiment, when first terminal receives the verifying message, described first eventually
End can wish to judge request time, therefore can return to the request time of the unlocking request.
S303, the server judge whether the request time meets preset effective unlocked time range, and by institute
It states judging result and feeds back to the first terminal, so that the first terminal is executed according to the judging result of the server feedback
Solve lock control operation.
In the specific implementation, the server judges whether the request time meets preset effective unlocked time range,
And the judging result is fed back into the first terminal, so that judgement knot of the first terminal according to the server feedback
Fruit executes solution lock control operation.The server is sentenced by the request time of the unlocking request of the reception first terminal feedback
Whether the request time that breaks meets preset effective unlocked time range, such as when the request time that server receives is
13:00 when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, therefore may determine that institute
Request time is stated not within the scope of preset effective unlocked time, the server can feed back to the judging result
The first terminal, the first terminal will be unable to successfully be unlocked;When the request time that the server receives is 15:
When 00, for the request time within the scope of preset effective unlocked time, the server can be anti-by the judging result
It is fed to the first terminal, the first terminal can be unlocked successfully.
Using the embodiment of the present invention, when server receives the unlock fingerprint of first terminal transmission, the server can
With by verifying to the unlock fingerprint, unlock fingerprint unlocking request received by the first terminal is taken
Band, if the unlock fingerprint authentication passes through, the unlock fingerprint is sent to described first by verifying message by the server
Terminal, so that the first terminal returns to the request time of the unlocking request, the server judges that the request time is
It is no to meet preset effective unlocked time range, and the judging result is fed back into the first terminal, so that described first
Terminal executes solution lock control operation according to the judging result of the server feedback, and the server is by receiving unlock fingerprint simultaneously
It is verified, and by judging whether the request time meets preset effective unlocked time range, to assist first terminal
It is unlocked control management, improves the flexibility and high efficiency of terminal unlocking.
It referring to figure 4., is the flow diagram of another solution lock control method provided in an embodiment of the present invention, this method packet
Include following steps S401-S405.
S401, when server receives the unlock fingerprint of first terminal transmission, the server is to the unlock fingerprint
It is verified, the unlock fingerprint is entrained by unlocking request received by the first terminal.
In the specific implementation, the server is to the solution when server receives the unlock fingerprint of first terminal transmission
Lock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal.In the present embodiment,
Unlock fingerprint entrained by unlocking request can be got from first terminal by server, and will unlock fingerprint and preset solution
Lock fingerprint is compared, and then carries out fingerprint authentication according to comparison result.
S402, if the unlock fingerprint authentication passes through, the server sends the unlock fingerprint by verifying message
To the first terminal, so that the first terminal returns to the request time of the unlocking request.
In the specific implementation, the server disappears the unlock fingerprint by verifying if the unlock fingerprint authentication passes through
Breath is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.When the unlock refers to
When line is consistent with preset unlock fingerprint comparison, the unlock fingerprint is sent to first eventually by verifying message by the server
End.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller
Mobile phone is unlocked in time to use mobile phone, in the present embodiment, when first terminal receives the verifying message, described first eventually
End can wish to judge request time, therefore can return to the request time of the unlocking request.
S403, the server judge whether the request time meets preset effective unlocked time range.
In the specific implementation, the server judges whether the request time meets preset effective unlocked time range.
Preset effective unlocked time can be preset by second terminal, be also possible to enter after unlocking by first terminal corresponding
Unlocked time set interface selected, the server can judge whether to be wrapped according to value at the time of the request time
Contained within the scope of preset effective unlocked time, so that controlling the first terminal executes corresponding operation.If YES, then it holds
Otherwise row S404 executes S405.
S404, if the judging result indicates that the request time meets preset effective unlocked time range, the clothes
The judging result is fed back to the first terminal by business device, so that the first terminal executes unlock operation, and will unlock knot
Fruit is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range,
The judging result is fed back to the first terminal by the server, so that the first terminal executes unlock operation, and will
Unlock result is sent to second terminal.In the present embodiment, the request time received when the server is 15:00, described
When preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then the judging result indicates the request
Time meets preset effective unlocked time range, and the above results will be fed back to first terminal, make first terminal by server
Unlock operation is executed, and successful information will be unlocked and be automatically transmitted to second terminal.
S405, it is described if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range
Server sends unlock confirmation request message to second terminal, so that the second terminal is according to the unlock confirmation request message
Unlock control message is sent to the first terminal.
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model
It encloses, the server sends unlock confirmation request message to second terminal, so that the second terminal confirms according to the unlock
Request message sends unlock control message to the first terminal.In the present embodiment, when the request that the server receives
Time is 12:00, when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then the judgement
As a result indicate that the request time is unsatisfactory for preset effective unlocked time range, then the first terminal unlock failure, in order to
Further confirm that whether be unlocked, the server can send unlock confirmation request message, institute from second terminal described in trend
The user for stating second terminal manually agrees to or refuses request, which can be transmitted directly to by second terminal
The first terminal is also possible to be sent to first terminal after being forwarded by server, to be unlocked first terminal
Further control.
Using the embodiment of the present invention, when server receives the unlock fingerprint of first terminal transmission, the server pair
The unlock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal, if institute
Unlock fingerprint authentication to be stated to pass through, the unlock fingerprint is sent to the first terminal by verifying message by the server, with
The first terminal is set to return to the request time of the unlocking request, then the server judges whether the request time is full
The preset effective unlocked time range of foot, to make server in terms of unlock fingerprint and request time two to whether to described the
One terminal, which is unlocked, to be judged, if the judging result indicates that the request time meets preset effective unlocked time model
It encloses, the judging result is fed back to the first terminal by the server, so that the first terminal executes unlock operation, and
Unlock result is sent to second terminal, if the judging result indicates that the request time is unsatisfactory for preset effective unlock
Between range, the server to second terminal send unlock confirmation request message so that the second terminal is according to the unlock
Confirmation request message sends unlock control message to the first terminal, by the second terminal selectively to first terminal
Unlock controlled, improve the flexibility of terminal unlocking.
Below in conjunction with Fig. 5-Fig. 9, describe in detail to terminal provided in an embodiment of the present invention.It should be noted that
Fig. 5-terminal shown in Fig. 7, the method for executing Fig. 1 of the present invention and embodiment illustrated in fig. 2, Fig. 8-server shown in Fig. 9,
Method for executing Fig. 3 of the present invention and embodiment illustrated in fig. 4 illustrates only and phase of the embodiment of the present invention for ease of description
The part of pass, it is disclosed by specific technical details, please refer to Fig. 1-of the present invention embodiment shown in Fig. 4.
It referring to figure 5., is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention, which includes such as placing an order
Member: verifying transmission unit 11, request time transmission unit 12 and execution unit 13.
Transmission unit 11 is verified, when for receiving the unlocking request of carrying unlock fingerprint when first terminal, described first
Unlock fingerprint in the unlocking request is sent to server and verified by terminal.
In the specific implementation, when first terminal receives the unlocking request for carrying unlock fingerprint, the verifying transmission unit
Unlock fingerprint in the unlocking request is sent to server by 11 to be verified.In the present embodiment, can by child handset or by
The mobile phone of control person is as first terminal, using parent's mobile phone or the mobile phone of controller as second terminal, when child or controlled person need
When using mobile phone, need the fingerprint for inputting itself by the fingerprint input position in first terminal to trigger unlocking request, when
When first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal can obtain the unlock in unlocking request automatically
Fingerprint, and the unlock fingerprint is sent to server, verified by server the unlock fingerprint whether in server
Preset fingerprint matches, to judge whether the unlock fingerprint is verified.
Request time transmission unit 12, for passing through verifying message when the unlock fingerprint for receiving the server feedback
When, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges institute
It states whether request time meets preset effective unlocked time range, and feeds back judging result.
In the specific implementation, when the unlock fingerprint that the first terminal receives the server feedback passes through verifying message
When, the request time of the unlocking request is sent to the server by request time transmission unit 12, so that the server
Judge whether the request time meets preset effective unlocked time range, and feeds back judging result.When the unlock fingerprint
When having passed through the verifying of server, the first terminal can receive the unlock fingerprint that the server is sent and be disappeared by what is verified
Breath.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller
Mobile phone is unlocked in time to use mobile phone, in the present embodiment, after unlocking fingerprint authentication and passing through, the first terminal can wish
Request time is judged, i.e., the unlocking request time can be sent in the server by the described terminal, so that service
Device judges whether current request time meets preset effective unlocked time range, in the present embodiment, is also possible to institute
The request time and unlock fingerprint for stating unlocking request send the result verified and judged, and feed back judgement simultaneously simultaneously.
Execution unit 13 executes solution lock control behaviour according to the judging result of the server feedback for the first terminal
Make.
It is operated in the specific implementation, execution unit 13 executes solution lock control according to the judging result of the server feedback.This
In embodiment, when the judging result of the server feedback can be there are two types of situation: the first situation is unsatisfactory for for current time
Unlocked time requirement, unlocked by fingerprint can not be carried out, can by server by the result of current unlock feed back to first terminal and
Second terminal is artificially decided whether to unlock by second terminal;Second situation is that current time meets unlocked time requirement, can be certainly
It is dynamic to send unlock feedback information, first terminal is unlocked.
It can be by described when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention
Unlock fingerprint in the unlocking request is sent to server and verified by first terminal, to judge that current unlock fingerprint is
It is no to can have terminal unlocking permission, when receiving the unlock fingerprint of the server feedback by verifying message, described the
The request time of the unlocking request is sent to the server by one terminal, so that the server judges the request time
Whether meet preset effective unlocked time range, and feed back judging result, to judge current unlock from current unlocked time
Whether the time is effective unlocked time, finally executes unlock according to the judging result of the server feedback by the first terminal
Control operation improves the spirit to terminal control management by remote fingerprint verifying and time threshold come the unlock of controlling terminal
Activity and high efficiency.
Fig. 6 is referred to, for the embodiment of the invention provides the structural schematic diagrams of another terminal.As shown in fig. 6, the terminal
It may include: verifying transmission unit 11, request time transmission unit 12, execution unit 13 and output unit 14, wherein verifying hair
The description for sending the specific structure of unit 11, request time transmission unit 12 and execution unit 13 to may refer to embodiment illustrated in fig. 5,
Herein without repeating.
Output unit 14, it is described for when receiving the unlock fingerprint authentication failure news of the server feedback
First terminal output unlock failure prompting message.
In the specific implementation, when receiving the unlock fingerprint authentication failure news of the server feedback, output unit
14 output unlock failure prompting messages.When receiving the unlock fingerprint authentication failure news of the server feedback, explanation
The fingerprint of current typing can not be unlocked the first terminal, and the first terminal can export " unlock failure " by screen
Message, such as request unlock again then needs to re-enter new finger print information and is sent to server and judged.
Execution unit 13 executes solution lock control behaviour according to the judging result of the server feedback for the first terminal
Make.
Specifically, please with reference to Fig. 7, for the embodiment of the invention provides the structural schematic diagrams of execution unit.Such as Fig. 7 institute
Show, the execution unit 13 may include: that the first execution subelement 131 and second executes subelement 132.
First executes subelement 131, if indicating that the request time meets preset effective solution for the judging result
Time range is locked, the first terminal executes unlock operation, and unlock result is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range,
First, which executes subelement 131, executes unlock operation, and unlock result is sent to second terminal.If asked described in server judgement
Seeking time meets preset effective unlocked time range, then it is the request that the first terminal, which will receive the judging result,
Time meets preset effective unlocked time range, then the first terminal can execute unlock operation automatically, and will unlock
At result be sent to the second terminal.
Second executes subelement 132, if it is preset effective to indicate that the request time is unsatisfactory for for the judging result
Unlocked time range, the unlock control message that the first terminal is sent according to the second terminal received, executes unlock
It operates and unlock result is sent to second terminal, or output unlock failure prompting message.
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model
It encloses, the unlock control message that the second execution subelement 132 is sent according to the second terminal received executes unlock operation simultaneously
Unlock result is sent to second terminal, or output unlock failure prompting message.If server judges the request time
It is unsatisfactory for preset effective unlocked time range, then the judging result that the first terminal receives is discontented for the request time
The preset effective unlocked time range of foot, the first terminal ask the solution lock control sent according to the second terminal received
It asks, execute unlock operation and unlock result is sent to second terminal, or output unlock failure prompting message.For example, working as institute
When stating the agreement solution lock control request that the second terminal that first terminal receives is sent, then the first terminal will execute unlock behaviour
Make, and unlock result is sent to the second terminal;When the refusal solution that the second terminal that the first terminal receives is sent
When lock control is requested, then output is unlocked failure prompting message by the first terminal.
Institute can be passed through when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention
It states first terminal the unlock fingerprint in the unlocking request is sent to server and verify, the server is anti-when receiving
When the unlock fingerprint of feedback is by verifying message, the request time of the unlocking request is sent to the service by the first terminal
Device so that the server judges whether the request time meets preset effective unlocked time range, and feeds back judgement knot
Fruit, when receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal output unlock failure
Prompting message, if the judging result indicates that the request time meets preset effective unlocked time range, described first eventually
End executes unlock operation, and unlock result is sent to second terminal, if the judging result indicates that the request time is discontented
The preset effective unlocked time range of foot, the first terminal disappear according to the solution lock control that the second terminal received is sent
Breath executes unlock operation and unlock result is sent to second terminal, or output unlock failure prompting message, passes through server
Fingerprint authentication is carried out, and judges automatically whether meet time requirement by server by the time of request unlock, is simplified
Judging result is sent to second terminal by server when then failing by unlock by the management process of terminal, eventually by second
End decides whether to be unlocked, to enhance the flexibility of unlock.
Fig. 8 is referred to, for the embodiment of the invention provides a kind of structural schematic diagrams of server.As shown in figure 8, the service
Device may include: authentication unit 21, transmission unit 22 and feedback unit 23.
Authentication unit 21, when for receiving the unlock fingerprint of first terminal transmission when server, the server is to institute
It states unlock fingerprint to be verified, the unlock fingerprint is entrained by unlocking request received by the first terminal.
In the specific implementation, authentication unit 21 is to the solution when server receives the unlock fingerprint of first terminal transmission
Lock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal.In the present embodiment,
Unlock fingerprint entrained by unlocking request can be got from first terminal by server, and will unlock fingerprint and preset solution
Lock fingerprint is compared, and then carries out fingerprint authentication according to comparison result.
Transmission unit 22, if passing through for the unlock fingerprint authentication, the server is by the unlock fingerprint by testing
Card message is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.
In the specific implementation, transmission unit 22 disappears the unlock fingerprint by verifying if the unlock fingerprint authentication passes through
Breath is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.When the unlock refers to
When line is consistent with preset unlock fingerprint comparison, the unlock fingerprint is sent to first eventually by verifying message by the server
End.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller
Mobile phone is unlocked in time to use mobile phone, in the present embodiment, when first terminal receives the verifying message, described first eventually
End can wish to judge request time, therefore can return to the request time of the unlocking request.
Feedback unit 23 judges whether the request time meets preset effective unlocked time model for the server
It encloses, and the judging result is fed back into the first terminal, so that the first terminal sentencing according to the server feedback
Disconnected result executes solution lock control operation.
In the specific implementation, feedback unit 23 judges whether the request time meets preset effective unlocked time range,
And the judging result is fed back into the first terminal, so that judgement knot of the first terminal according to the server feedback
Fruit executes solution lock control operation.The server is sentenced by the request time of the unlocking request of the reception first terminal feedback
Whether the request time that breaks meets preset effective unlocked time range, such as when the request time that server receives is
13:00 when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, therefore may determine that institute
Request time is stated not within the scope of preset effective unlocked time, the server can feed back to the judging result
The first terminal, the first terminal will be unable to successfully be unlocked;When the request time that the server receives is 15:
When 00, for the request time within the scope of preset effective unlocked time, the server can be anti-by the judging result
It is fed to the first terminal, the first terminal can be unlocked successfully.
Specifically, please with reference to Fig. 9, for the embodiment of the invention provides the structural schematic diagrams of feedback unit.Such as Fig. 9 institute
Show, the feedback unit 23 may include: the first feedback unit 231 and the second feedback unit 232.
First feedback unit 231, if indicating that the request time meets preset effective unlock for the judging result
The judging result is fed back to the first terminal by time range, the server, so that the first terminal executes unlock
Operation, and unlock result is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range,
The judging result is fed back to the first terminal by the first feedback unit 231, so that the first terminal executes unlock operation,
And unlock result is sent to second terminal.In the present embodiment, the request time received when the server is 15:00,
When preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then described in the judging result instruction
Request time meets preset effective unlocked time range, and the above results will be fed back to first terminal, make first by server
Terminal executes unlock operation, and will unlock successful information and be automatically transmitted to second terminal.
Second feedback unit 232, if indicating that the request time meets preset effective unlock for the judging result
The judging result is fed back to the first terminal by time range, the server, so that the first terminal executes unlock
Operation, and unlock result is sent to second terminal
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model
It encloses, the second feedback unit 232 sends unlock confirmation request message to second terminal, so that the second terminal is according to the unlock
Confirmation request message sends unlock control message to the first terminal.In the present embodiment, it is received when the server
Request time is 12:00, when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then described
Judging result indicates that the request time is unsatisfactory for preset effective unlocked time range, then the first terminal unlock failure,
In order to further confirm that whether be unlocked, the server can send unlock confirmation request from second terminal described in trend and disappear
Breath, the user of the second terminal manually agree to or refuse request, which can be direct by second terminal
Be sent to the first terminal, be also possible to be sent to first terminal after being forwarded by server, with to first terminal into
The further control of row unlock.
Using the embodiment of the present invention, when server receives the unlock fingerprint of first terminal transmission, the server pair
The unlock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal, if institute
Unlock fingerprint authentication to be stated to pass through, the unlock fingerprint is sent to the first terminal by verifying message by the server, with
The first terminal is set to return to the request time of the unlocking request, then the server judges whether the request time is full
The preset effective unlocked time range of foot, to make server in terms of unlock fingerprint and request time two to whether to described the
One terminal, which is unlocked, to be judged, if the judging result indicates that the request time meets preset effective unlocked time model
It encloses, the judging result is fed back to the first terminal by the server, so that the first terminal executes unlock operation, and
Unlock result is sent to second terminal, if the judging result indicates that the request time is unsatisfactory for preset effective unlock
Between range, the server to second terminal send unlock confirmation request message so that the second terminal is according to the unlock
Confirmation request message sends unlock control message to the first terminal, by the second terminal selectively to first terminal
Unlock controlled, improve the flexibility of terminal unlocking.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly
It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.
Claims (4)
1. a kind of solution lock control method characterized by comprising
When first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal is by the solution in the unlocking request
Lock fingerprint is sent to server and is verified;
When receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by the unlocking request
Request time be sent to the server so that the server judges whether the request time meets preset effective solution
Time range is locked, and feeds back judging result, the first terminal receives the judging result;Effective unlocked time range by
Second terminal is default;
If the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range, described first eventually
When termination receives the agreement solution lock control request of second terminal transmission, then the first terminal will execute unlock operation, and will solution
Lock result is sent to the second terminal;
If the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range, described first eventually
When termination receives the refusal solution lock control request of second terminal transmission, then by output unlock, unsuccessfully prompt disappears the first terminal
Breath;
The agreement solution lock control request and refusal solution lock control request are the second terminals according to the unlock received
Confirmation request message is sent to the first terminal, and the unlock confirmation request message is the server in the request
Between be unsatisfactory for being sent to the second terminal when effective unlocked time range.
2. the method according to claim 1, wherein further include:
When receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal output unlock failure
Prompting message.
3. a kind of terminal characterized by comprising
Transmission unit is verified, for when first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal will
Unlock fingerprint in the unlocking request is sent to server and is verified;
Request time transmission unit, it is described for when receiving the unlock fingerprint of the server feedback by verifying message
The request time of the unlocking request is sent to the server by first terminal, when so that the server judging the request
Between whether meet preset effective unlocked time range, and feed back judging result, the first terminal receives the judging result;
Effective unlocked time range is preset by second terminal;
Execution unit includes the second execution subelement, if it is described pre- to indicate that the request time is unsatisfactory for for the judging result
If effective unlocked time range, when the first terminal receives the agreement solution lock control request of second terminal transmission, then institute
Unlock operation will be executed by stating first terminal, and unlock result is sent to the second terminal, if the judging result indicates institute
It states request time and is unsatisfactory for preset effective unlocked time range, the first terminal receives refusing for second terminal transmission
When solution lock control is requested absolutely, then output is unlocked failure prompting message by the first terminal;
The agreement solution lock control request and refusal solution lock control request are the second terminals according to the unlock received
Confirmation request message is sent to the first terminal, and the unlock confirmation request message is the server in the request
Between be unsatisfactory for being sent to the second terminal when effective unlocked time range.
4. terminal according to claim 3, which is characterized in that further include:
Output unit, for when receiving the unlock fingerprint authentication failure news of the server feedback, described first eventually
End output unlock failure prompting message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510416766.2A CN105100094B (en) | 2015-07-15 | 2015-07-15 | A kind of solution lock control method and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510416766.2A CN105100094B (en) | 2015-07-15 | 2015-07-15 | A kind of solution lock control method and terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105100094A CN105100094A (en) | 2015-11-25 |
CN105100094B true CN105100094B (en) | 2019-04-12 |
Family
ID=54579639
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510416766.2A Expired - Fee Related CN105100094B (en) | 2015-07-15 | 2015-07-15 | A kind of solution lock control method and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105100094B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105631294B (en) * | 2015-12-29 | 2018-09-04 | 广东欧珀移动通信有限公司 | A kind of unlocking screen method and user terminal |
CN105824743B (en) * | 2016-03-14 | 2018-06-29 | 广东欧珀移动通信有限公司 | A kind of method and mobile terminal for testing unlocked time |
CN108416197A (en) * | 2017-02-09 | 2018-08-17 | 北京小米移动软件有限公司 | Unlock the method and device of mobile terminal |
CN107315938A (en) * | 2017-06-26 | 2017-11-03 | 上海斐讯数据通信技术有限公司 | A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device |
CN109962877B (en) * | 2017-12-14 | 2021-09-10 | 上海赛印信息技术股份有限公司 | Intelligent reagent management method and system |
CN108337258A (en) * | 2018-01-31 | 2018-07-27 | 中电福富信息科技有限公司 | A method of the remote control vehicle based on long-range actuating code |
CN111814125A (en) * | 2019-04-12 | 2020-10-23 | 奇酷互联网络科技(深圳)有限公司 | Terminal unlocking method, processing terminal and storage device |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070283389A1 (en) * | 2006-06-01 | 2007-12-06 | Sharp Laboratories Of America, Inc. | Method and system for helping operate a media-playing set |
CN103813326A (en) * | 2012-11-09 | 2014-05-21 | 青岛海信移动通信技术股份有限公司 | Network accessing and locking method and network accessing and locking equipment for terminal |
CN103546636B (en) * | 2013-10-22 | 2017-07-28 | 深圳Tcl新技术有限公司 | The control method of intelligent display device |
CN103618803A (en) * | 2013-12-13 | 2014-03-05 | 南京守护宝信息技术有限公司 | Smart phone managing method |
CN104703031A (en) * | 2015-03-11 | 2015-06-10 | 小米科技有限责任公司 | Smart television control method and device |
-
2015
- 2015-07-15 CN CN201510416766.2A patent/CN105100094B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
CN105100094A (en) | 2015-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105100094B (en) | A kind of solution lock control method and terminal | |
US9503903B2 (en) | Server and method for remotely controlling working of communications terminal, and communications terminal | |
CN103152402A (en) | Method and system for logging in through mobile terminal and cloud server | |
CN104539806A (en) | Mobile terminals and emergency unlocking method thereof | |
CN107592314A (en) | A kind of order line authority control method and device | |
CN105407041A (en) | Method for adding group or friend, server, client and system | |
CN110176091A (en) | A method of smart lock safety is improved by mobile terminal device code | |
CN108462703A (en) | Password update method, smart lock and server | |
CN110703621A (en) | Household appliance control method, household appliance control device, server and computer readable storage medium | |
CN108920919A (en) | Control method, the device and system of interactive intelligence equipment | |
CN107148021A (en) | A kind of wireless access authentication method and a kind of radio reception device | |
CN113824628A (en) | User identity authentication method, device, server and storage medium based on IM | |
CN105591999A (en) | Verification method and device | |
CN105608354A (en) | Authentication method and system, terminal and server | |
CN104796874B (en) | Information binding method and device | |
US10938806B2 (en) | Communication method and device | |
EP2894912A1 (en) | Method and apparatus for gateway management terminal | |
CN105142141A (en) | Terminal equipment, authentication server, system and method for mobile office identity verification | |
CN102780978B (en) | Unlocking method and system of smart card | |
CN107710673A (en) | The method and apparatus of authenticating user identification | |
CN108711205A (en) | A kind of conference system visitor Verification System | |
CN110446197B (en) | Communication control method, device, equipment and storage medium of intelligent equipment | |
CN101800985A (en) | Authentication method and system, terminal, server and data downloading method and device | |
CN111859320A (en) | Cross-system login-free method, device, equipment and readable storage medium | |
CN102263797B (en) | Session control method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190412 |
|
CF01 | Termination of patent right due to non-payment of annual fee |