CN105100094B - A kind of solution lock control method and terminal - Google Patents

A kind of solution lock control method and terminal Download PDF

Info

Publication number
CN105100094B
CN105100094B CN201510416766.2A CN201510416766A CN105100094B CN 105100094 B CN105100094 B CN 105100094B CN 201510416766 A CN201510416766 A CN 201510416766A CN 105100094 B CN105100094 B CN 105100094B
Authority
CN
China
Prior art keywords
terminal
unlock
request
server
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510416766.2A
Other languages
Chinese (zh)
Other versions
CN105100094A (en
Inventor
张海平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201510416766.2A priority Critical patent/CN105100094B/en
Publication of CN105100094A publication Critical patent/CN105100094A/en
Application granted granted Critical
Publication of CN105100094B publication Critical patent/CN105100094B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Abstract

The embodiment of the invention discloses a kind of solution lock control method, terminal and servers.Method therein includes: when first terminal receives the unlocking request for carrying unlock fingerprint, and the unlock fingerprint in the unlocking request is sent to server and verified by the first terminal;When receiving the unlock fingerprint of the server feedback by verifying message, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges whether the request time meets preset effective unlocked time range, and feed back judging result;The first terminal executes solution lock control operation according to the judging result of the server feedback.Using the present invention, it can be verified by remote fingerprint and time threshold is come the unlock of controlling terminal, improve the flexibility and high efficiency to terminal control management.

Description

A kind of solution lock control method and terminal
Technical field
The present invention relates to field of communication technology more particularly to a kind of solution lock control methods, terminal and server.
Background technique
Fingerprint identification technology is a kind of by the way that the fingerprint of typing and the fingerprint pre-saved to be compared, to verify typing The identification technology of person's identity, with the development of terminal hardware and the promotion of fingerprint identification technology, fingerprint identification technology is answered extensively For in each Terminal Type.
Currently, since the general self-control of child is not strong enough, and parent's work is relatively busy, can not be in the work and rest for controlling child when Between, therefore how current urgent need to resolve become by the control that parent's terminal carries out the starting time come the terminal to child one end Problem.The way of current ordinary circumstance is to carry out password setting to child terminal by parent, when child needs to carry out password solution When lock, then password is obtained to parent otherwise, terminal can be only unlocked when child gets password Operation.Although aforesaid way can be managed control to the unlock of terminal, pipe can be reached by needing to frequently replace password Reason control purpose, thus it is inflexible to the solution lock control of terminal, and needing can be by close by asking for the operation of password Code is unlocked, and parent needs to spend the time to be managed terminal, reduces the efficiency of terminal management.
Summary of the invention
The embodiment of the present invention provides a kind of solution lock control method, terminal and server, with by remote fingerprint verifying and Time threshold carrys out the unlock of controlling terminal, improves flexibility and high efficiency to terminal control management.
First aspect of the embodiment of the present invention provides a kind of solution lock control method, comprising:
When first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal will be in the unlocking request Unlock fingerprint be sent to server and verified;
When receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by the unlock The request time of request is sent to the server, so that whether the server judges the request time and meet and preset have Unlocked time range is imitated, and feeds back judging result;
The first terminal executes solution lock control operation according to the judging result of the server feedback.
Second aspect of the embodiment of the present invention provides a kind of solution lock control method, comprising:
When server receives the unlock fingerprint of first terminal transmission, the server tests the unlock fingerprint Card, the unlock fingerprint are entrained by unlocking request received by the first terminal;
If the unlock fingerprint authentication passes through, the unlock fingerprint is sent to described by the server by verifying message First terminal, so that the first terminal returns to the request time of the unlocking request;
The server judges whether the request time meets preset effective unlocked time range, and by the judgement As a result the first terminal is fed back to, so that the first terminal executes solution lock control according to the judging result of the server feedback System operation.
The third aspect of the embodiment of the present invention provides a kind of terminal, comprising:
Transmission unit is verified, for when first terminal receives the unlocking request for carrying unlock fingerprint, described first eventually Unlock fingerprint in the unlocking request is sent to server and verified by end;
Request time transmission unit, for when receiving the unlock fingerprint of the server feedback by verifying message, The request time of the unlocking request is sent to the server by the first terminal, so as to ask described in server judgement Whether seeking time meets preset effective unlocked time range, and feeds back judging result;
Execution unit executes solution lock control behaviour according to the judging result of the server feedback for the first terminal Make.
Fourth aspect of the embodiment of the present invention provides a kind of server, comprising:
Authentication unit, when for receiving the unlock fingerprint of first terminal transmission when server, the server is to described Unlock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal;
Transmission unit, if passing through for the unlock fingerprint authentication, the unlock fingerprint is passed through verifying by the server Message is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request;
Feedback unit judges whether the request time meets preset effective unlocked time model for the server It encloses, and the judging result is fed back into the first terminal, so that the first terminal sentencing according to the server feedback Disconnected result executes solution lock control operation.
Institute can be passed through when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention It states first terminal the unlock fingerprint in the unlocking request is sent to server and verify, the server is anti-when receiving When the unlock fingerprint of feedback is by verifying message, the request time of the unlocking request is sent to the service by the first terminal Device so that the server judges whether the request time meets preset effective unlocked time range, and feeds back judgement knot Fruit, the last first terminal execute solution lock control operation according to the judging result of the server feedback, by by the solution The judgement of request time is verified and unlocked to lock to automatically process to unlocking request, improves to the flexible of terminal control management Property and high efficiency.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the invention, for ability For the those of ordinary skill of domain, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 is a kind of flow diagram for solving lock control method provided in an embodiment of the present invention;
Fig. 2 is the flow diagram of another solution lock control method provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of another solution lock control method provided in an embodiment of the present invention;
Fig. 4 is the flow diagram of another solution lock control method provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 6 is the structural schematic diagram of another terminal provided in an embodiment of the present invention;
Fig. 7 is the structural schematic diagram of execution unit provided in an embodiment of the present invention;
Fig. 8 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;
Fig. 9 is the structural schematic diagram of feedback unit provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
In following all examples, terminal may include smart phone, tablet computer, laptop, palm PC with And mobile internet device (Mobile Internet Device, MID) etc..Terminal in the present embodiment is referred mainly to such as intelligent hand The intelligent mobile communication terminal equipment of machine or tablet computer etc..
Fig. 1 is please referred to, for a kind of flow diagram for solving lock control method provided in an embodiment of the present invention, this method includes Following steps S101-S103.
S101, when first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal is by the unlock Unlock fingerprint in request is sent to server and is verified.
In the specific implementation, the first terminal is by institute when first terminal receives the unlocking request for carrying unlock fingerprint It states the unlock fingerprint in unlocking request and is sent to server and verified.It, can be by child handset or controlled person in the present embodiment Mobile phone is as first terminal, using parent's mobile phone or the mobile phone of controller as second terminal, when child or controlled person need using When mobile phone, need the fingerprint for inputting itself by the fingerprint input position in first terminal to trigger unlocking request, when the first end When termination receives the unlocking request for carrying unlock fingerprint, the first terminal can obtain the unlock fingerprint in unlocking request automatically, And the unlock fingerprint is sent to server, verified by server the unlock fingerprint whether with it is preset in server Fingerprint matches, to judge whether the unlock fingerprint is verified.
S102, when receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by institute The request time for stating unlocking request is sent to the server, so as to judge whether the request time meets pre- for the server If effective unlocked time range, and feed back judging result.
In the specific implementation, when the unlock fingerprint that the first terminal receives the server feedback passes through verifying message When, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges institute It states whether request time meets preset effective unlocked time range, and feeds back judging result.When the unlock fingerprint passes through When the verifying of server, the first terminal can receive the message that the unlock fingerprint that the server is sent passes through verifying.By Wish that child can wish controlled person in the time of defined in suitable time range using mobile phone or controller in parent Interior to unlock mobile phone to use mobile phone, in the present embodiment, after unlocking fingerprint authentication and passing through, the first terminal can wish to asking Seeking time is judged that the unlocking request time can be sent in the server by that is, described terminal, so that server comes Judge whether current request time meets preset effective unlocked time range, in the present embodiment, is also possible to the solution The request time and unlock fingerprint for locking request send the result verified and judged, and feed back judgement simultaneously simultaneously.
S103, the first terminal execute solution lock control according to the judging result of the server feedback and operate.
It is operated in the specific implementation, the first terminal executes solution lock control according to the judging result of the server feedback. In the present embodiment, when the judging result of the server feedback can be there are two types of situation: the first situation is discontented for current time Sufficient unlocked time requirement, can not carry out unlocked by fingerprint, the result of current unlock can be fed back to first terminal by server And second terminal, artificially decide whether to unlock by second terminal;Second situation is that current time meets unlocked time requirement, can It is automatic to send unlock feedback information, first terminal is unlocked.
It can be by described when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention Unlock fingerprint in the unlocking request is sent to server and verified by first terminal, to judge that current unlock fingerprint is It is no to can have terminal unlocking permission, when receiving the unlock fingerprint of the server feedback by verifying message, described the The request time of the unlocking request is sent to the server by one terminal, so that the server judges the request time Whether meet preset effective unlocked time range, and feed back judging result, to judge current unlock from current unlocked time Whether the time is effective unlocked time, finally executes unlock according to the judging result of the server feedback by the first terminal Control operation improves the spirit to terminal control management by remote fingerprint verifying and time threshold come the unlock of controlling terminal Activity and high efficiency.
It referring to figure 2., is the flow diagram of another solution lock control method provided in an embodiment of the present invention, this method packet Include following steps S201-S205.
S201, when first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal is by the unlock Unlock fingerprint in request is sent to server and is verified.
In the specific implementation, the first terminal is by institute when first terminal receives the unlocking request for carrying unlock fingerprint It states the unlock fingerprint in unlocking request and is sent to server and verified.It, can be by child handset or controlled person in the present embodiment Mobile phone is as first terminal, using parent's mobile phone or the mobile phone of controller as second terminal, when child or controlled person need using When mobile phone, need the fingerprint for inputting itself by the fingerprint input position in first terminal to trigger unlocking request, when the first end When termination receives the unlocking request for carrying unlock fingerprint, the first terminal can obtain the unlock fingerprint in unlocking request automatically, And the unlock fingerprint is sent to server, verified by server the unlock fingerprint whether with it is preset in server Fingerprint matches, to judge whether the unlock fingerprint is verified.
S202, when receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by institute The request time for stating unlocking request is sent to the server, so as to judge whether the request time meets pre- for the server If effective unlocked time range, and feed back judging result.
In the specific implementation, when the unlock fingerprint that the first terminal receives the server feedback passes through verifying message When, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges institute It states whether request time meets preset effective unlocked time range, and feeds back judging result.When the unlock fingerprint passes through When the verifying of server, the first terminal can receive the message that the unlock fingerprint that the server is sent passes through verifying.By Wish that child can wish controlled person in the time of defined in suitable time range using mobile phone or controller in parent It is interior that mobile phone is unlocked to use mobile phone, in the present embodiment, after unlocking fingerprint authentication and passing through, when the first terminal can be to request Between judged, i.e., the unlocking request time can be sent in the server by the described terminal, so that server judges Whether current request time meets preset effective unlocked time range, in the present embodiment, is also possible to ask the unlock The request time asked sends the result verified and judged, and feed back judgement simultaneously with unlock fingerprint simultaneously.
S203, when receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal is defeated Unlock failure prompting message out.
In the specific implementation, when receiving the unlock fingerprint authentication failure news of the server feedback, described first Terminal output unlock failure prompting message.When receiving the unlock fingerprint authentication failure news of the server feedback, say The fingerprint of bright current typing can not be unlocked the first terminal, and the first terminal can export " unlock mistake by screen Lose " message, such as request unlock again then needs to re-enter new finger print information and is sent to server and judged.
S204, if the judging result indicates the request time and meets preset effective unlocked time range, described the One terminal executes unlock operation, and unlock result is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range, The first terminal executes unlock operation, and unlock result is sent to second terminal.If server judges the request Between meet preset effective unlocked time range, then the first terminal will receive the judging result be the request time Meeting preset effective unlocked time range, then the first terminal can execute unlock operation automatically, and unlock is completed As a result it is sent to the second terminal.
S205, it is described if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range The unlock control message that first terminal is sent according to the second terminal received, execution unlock operation simultaneously send out unlock result Give second terminal, or output unlock failure prompting message.
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model It encloses, the unlock control message that the first terminal is sent according to the second terminal received, execution unlock operation simultaneously will solution Lock result is sent to second terminal, or output unlock failure prompting message.If server judges that the request time is discontented The preset effective unlocked time range of foot, the then judging result that the first terminal receives are unsatisfactory for pre- for the request time If effective unlocked time range, the first terminal will hold according to the solution lock control request that the second terminal that receives is sent Unlock result is simultaneously sent to second terminal, or output unlock failure prompting message by row unlock operation.For example, working as described first When the agreement solution lock control request that the second terminal that terminal receives is sent, then the first terminal will execute unlock operation, and Unlock result is sent to the second terminal;When the refusal solution lock control that the second terminal that the first terminal receives is sent When request, then output is unlocked failure prompting message by the first terminal.
Institute can be passed through when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention It states first terminal the unlock fingerprint in the unlocking request is sent to server and verify, the server is anti-when receiving When the unlock fingerprint of feedback is by verifying message, the request time of the unlocking request is sent to the service by the first terminal Device so that the server judges whether the request time meets preset effective unlocked time range, and feeds back judgement knot Fruit, when receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal output unlock failure Prompting message, if the judging result indicates that the request time meets preset effective unlocked time range, described first eventually End executes unlock operation, and unlock result is sent to second terminal, if the judging result indicates that the request time is discontented The preset effective unlocked time range of foot, the first terminal disappear according to the solution lock control that the second terminal received is sent Breath executes unlock operation and unlock result is sent to second terminal, or output unlock failure prompting message, passes through server Fingerprint authentication is carried out, and judges automatically whether meet time requirement by server by the time of request unlock, is simplified Judging result is sent to second terminal by server when then failing by unlock by the management process of terminal, eventually by second End decides whether to be unlocked, to enhance the flexibility of unlock.
It referring to figure 3., is the flow diagram of another solution lock control method provided in an embodiment of the present invention, this method packet Include following steps S301-S303.
S301, when server receives the unlock fingerprint of first terminal transmission, the server is to the unlock fingerprint It is verified, the unlock fingerprint is entrained by unlocking request received by the first terminal.
In the specific implementation, the server is to the solution when server receives the unlock fingerprint of first terminal transmission Lock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal.In the present embodiment, Unlock fingerprint entrained by unlocking request can be got from first terminal by server, and will unlock fingerprint and preset solution Lock fingerprint is compared, and then carries out fingerprint authentication according to comparison result.
S302, if the unlock fingerprint authentication passes through, the server sends the unlock fingerprint by verifying message To the first terminal, so that the first terminal returns to the request time of the unlocking request.
In the specific implementation, the server disappears the unlock fingerprint by verifying if the unlock fingerprint authentication passes through Breath is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.When the unlock refers to When line is consistent with preset unlock fingerprint comparison, the unlock fingerprint is sent to first eventually by verifying message by the server End.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller Mobile phone is unlocked in time to use mobile phone, in the present embodiment, when first terminal receives the verifying message, described first eventually End can wish to judge request time, therefore can return to the request time of the unlocking request.
S303, the server judge whether the request time meets preset effective unlocked time range, and by institute It states judging result and feeds back to the first terminal, so that the first terminal is executed according to the judging result of the server feedback Solve lock control operation.
In the specific implementation, the server judges whether the request time meets preset effective unlocked time range, And the judging result is fed back into the first terminal, so that judgement knot of the first terminal according to the server feedback Fruit executes solution lock control operation.The server is sentenced by the request time of the unlocking request of the reception first terminal feedback Whether the request time that breaks meets preset effective unlocked time range, such as when the request time that server receives is 13:00 when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, therefore may determine that institute Request time is stated not within the scope of preset effective unlocked time, the server can feed back to the judging result The first terminal, the first terminal will be unable to successfully be unlocked;When the request time that the server receives is 15: When 00, for the request time within the scope of preset effective unlocked time, the server can be anti-by the judging result It is fed to the first terminal, the first terminal can be unlocked successfully.
Using the embodiment of the present invention, when server receives the unlock fingerprint of first terminal transmission, the server can With by verifying to the unlock fingerprint, unlock fingerprint unlocking request received by the first terminal is taken Band, if the unlock fingerprint authentication passes through, the unlock fingerprint is sent to described first by verifying message by the server Terminal, so that the first terminal returns to the request time of the unlocking request, the server judges that the request time is It is no to meet preset effective unlocked time range, and the judging result is fed back into the first terminal, so that described first Terminal executes solution lock control operation according to the judging result of the server feedback, and the server is by receiving unlock fingerprint simultaneously It is verified, and by judging whether the request time meets preset effective unlocked time range, to assist first terminal It is unlocked control management, improves the flexibility and high efficiency of terminal unlocking.
It referring to figure 4., is the flow diagram of another solution lock control method provided in an embodiment of the present invention, this method packet Include following steps S401-S405.
S401, when server receives the unlock fingerprint of first terminal transmission, the server is to the unlock fingerprint It is verified, the unlock fingerprint is entrained by unlocking request received by the first terminal.
In the specific implementation, the server is to the solution when server receives the unlock fingerprint of first terminal transmission Lock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal.In the present embodiment, Unlock fingerprint entrained by unlocking request can be got from first terminal by server, and will unlock fingerprint and preset solution Lock fingerprint is compared, and then carries out fingerprint authentication according to comparison result.
S402, if the unlock fingerprint authentication passes through, the server sends the unlock fingerprint by verifying message To the first terminal, so that the first terminal returns to the request time of the unlocking request.
In the specific implementation, the server disappears the unlock fingerprint by verifying if the unlock fingerprint authentication passes through Breath is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.When the unlock refers to When line is consistent with preset unlock fingerprint comparison, the unlock fingerprint is sent to first eventually by verifying message by the server End.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller Mobile phone is unlocked in time to use mobile phone, in the present embodiment, when first terminal receives the verifying message, described first eventually End can wish to judge request time, therefore can return to the request time of the unlocking request.
S403, the server judge whether the request time meets preset effective unlocked time range.
In the specific implementation, the server judges whether the request time meets preset effective unlocked time range. Preset effective unlocked time can be preset by second terminal, be also possible to enter after unlocking by first terminal corresponding Unlocked time set interface selected, the server can judge whether to be wrapped according to value at the time of the request time Contained within the scope of preset effective unlocked time, so that controlling the first terminal executes corresponding operation.If YES, then it holds Otherwise row S404 executes S405.
S404, if the judging result indicates that the request time meets preset effective unlocked time range, the clothes The judging result is fed back to the first terminal by business device, so that the first terminal executes unlock operation, and will unlock knot Fruit is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range, The judging result is fed back to the first terminal by the server, so that the first terminal executes unlock operation, and will Unlock result is sent to second terminal.In the present embodiment, the request time received when the server is 15:00, described When preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then the judging result indicates the request Time meets preset effective unlocked time range, and the above results will be fed back to first terminal, make first terminal by server Unlock operation is executed, and successful information will be unlocked and be automatically transmitted to second terminal.
S405, it is described if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range Server sends unlock confirmation request message to second terminal, so that the second terminal is according to the unlock confirmation request message Unlock control message is sent to the first terminal.
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model It encloses, the server sends unlock confirmation request message to second terminal, so that the second terminal confirms according to the unlock Request message sends unlock control message to the first terminal.In the present embodiment, when the request that the server receives Time is 12:00, when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then the judgement As a result indicate that the request time is unsatisfactory for preset effective unlocked time range, then the first terminal unlock failure, in order to Further confirm that whether be unlocked, the server can send unlock confirmation request message, institute from second terminal described in trend The user for stating second terminal manually agrees to or refuses request, which can be transmitted directly to by second terminal The first terminal is also possible to be sent to first terminal after being forwarded by server, to be unlocked first terminal Further control.
Using the embodiment of the present invention, when server receives the unlock fingerprint of first terminal transmission, the server pair The unlock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal, if institute Unlock fingerprint authentication to be stated to pass through, the unlock fingerprint is sent to the first terminal by verifying message by the server, with The first terminal is set to return to the request time of the unlocking request, then the server judges whether the request time is full The preset effective unlocked time range of foot, to make server in terms of unlock fingerprint and request time two to whether to described the One terminal, which is unlocked, to be judged, if the judging result indicates that the request time meets preset effective unlocked time model It encloses, the judging result is fed back to the first terminal by the server, so that the first terminal executes unlock operation, and Unlock result is sent to second terminal, if the judging result indicates that the request time is unsatisfactory for preset effective unlock Between range, the server to second terminal send unlock confirmation request message so that the second terminal is according to the unlock Confirmation request message sends unlock control message to the first terminal, by the second terminal selectively to first terminal Unlock controlled, improve the flexibility of terminal unlocking.
Below in conjunction with Fig. 5-Fig. 9, describe in detail to terminal provided in an embodiment of the present invention.It should be noted that Fig. 5-terminal shown in Fig. 7, the method for executing Fig. 1 of the present invention and embodiment illustrated in fig. 2, Fig. 8-server shown in Fig. 9, Method for executing Fig. 3 of the present invention and embodiment illustrated in fig. 4 illustrates only and phase of the embodiment of the present invention for ease of description The part of pass, it is disclosed by specific technical details, please refer to Fig. 1-of the present invention embodiment shown in Fig. 4.
It referring to figure 5., is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention, which includes such as placing an order Member: verifying transmission unit 11, request time transmission unit 12 and execution unit 13.
Transmission unit 11 is verified, when for receiving the unlocking request of carrying unlock fingerprint when first terminal, described first Unlock fingerprint in the unlocking request is sent to server and verified by terminal.
In the specific implementation, when first terminal receives the unlocking request for carrying unlock fingerprint, the verifying transmission unit Unlock fingerprint in the unlocking request is sent to server by 11 to be verified.In the present embodiment, can by child handset or by The mobile phone of control person is as first terminal, using parent's mobile phone or the mobile phone of controller as second terminal, when child or controlled person need When using mobile phone, need the fingerprint for inputting itself by the fingerprint input position in first terminal to trigger unlocking request, when When first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal can obtain the unlock in unlocking request automatically Fingerprint, and the unlock fingerprint is sent to server, verified by server the unlock fingerprint whether in server Preset fingerprint matches, to judge whether the unlock fingerprint is verified.
Request time transmission unit 12, for passing through verifying message when the unlock fingerprint for receiving the server feedback When, the request time of the unlocking request is sent to the server by the first terminal, so that the server judges institute It states whether request time meets preset effective unlocked time range, and feeds back judging result.
In the specific implementation, when the unlock fingerprint that the first terminal receives the server feedback passes through verifying message When, the request time of the unlocking request is sent to the server by request time transmission unit 12, so that the server Judge whether the request time meets preset effective unlocked time range, and feeds back judging result.When the unlock fingerprint When having passed through the verifying of server, the first terminal can receive the unlock fingerprint that the server is sent and be disappeared by what is verified Breath.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller Mobile phone is unlocked in time to use mobile phone, in the present embodiment, after unlocking fingerprint authentication and passing through, the first terminal can wish Request time is judged, i.e., the unlocking request time can be sent in the server by the described terminal, so that service Device judges whether current request time meets preset effective unlocked time range, in the present embodiment, is also possible to institute The request time and unlock fingerprint for stating unlocking request send the result verified and judged, and feed back judgement simultaneously simultaneously.
Execution unit 13 executes solution lock control behaviour according to the judging result of the server feedback for the first terminal Make.
It is operated in the specific implementation, execution unit 13 executes solution lock control according to the judging result of the server feedback.This In embodiment, when the judging result of the server feedback can be there are two types of situation: the first situation is unsatisfactory for for current time Unlocked time requirement, unlocked by fingerprint can not be carried out, can by server by the result of current unlock feed back to first terminal and Second terminal is artificially decided whether to unlock by second terminal;Second situation is that current time meets unlocked time requirement, can be certainly It is dynamic to send unlock feedback information, first terminal is unlocked.
It can be by described when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention Unlock fingerprint in the unlocking request is sent to server and verified by first terminal, to judge that current unlock fingerprint is It is no to can have terminal unlocking permission, when receiving the unlock fingerprint of the server feedback by verifying message, described the The request time of the unlocking request is sent to the server by one terminal, so that the server judges the request time Whether meet preset effective unlocked time range, and feed back judging result, to judge current unlock from current unlocked time Whether the time is effective unlocked time, finally executes unlock according to the judging result of the server feedback by the first terminal Control operation improves the spirit to terminal control management by remote fingerprint verifying and time threshold come the unlock of controlling terminal Activity and high efficiency.
Fig. 6 is referred to, for the embodiment of the invention provides the structural schematic diagrams of another terminal.As shown in fig. 6, the terminal It may include: verifying transmission unit 11, request time transmission unit 12, execution unit 13 and output unit 14, wherein verifying hair The description for sending the specific structure of unit 11, request time transmission unit 12 and execution unit 13 to may refer to embodiment illustrated in fig. 5, Herein without repeating.
Output unit 14, it is described for when receiving the unlock fingerprint authentication failure news of the server feedback First terminal output unlock failure prompting message.
In the specific implementation, when receiving the unlock fingerprint authentication failure news of the server feedback, output unit 14 output unlock failure prompting messages.When receiving the unlock fingerprint authentication failure news of the server feedback, explanation The fingerprint of current typing can not be unlocked the first terminal, and the first terminal can export " unlock failure " by screen Message, such as request unlock again then needs to re-enter new finger print information and is sent to server and judged.
Execution unit 13 executes solution lock control behaviour according to the judging result of the server feedback for the first terminal Make.
Specifically, please with reference to Fig. 7, for the embodiment of the invention provides the structural schematic diagrams of execution unit.Such as Fig. 7 institute Show, the execution unit 13 may include: that the first execution subelement 131 and second executes subelement 132.
First executes subelement 131, if indicating that the request time meets preset effective solution for the judging result Time range is locked, the first terminal executes unlock operation, and unlock result is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range, First, which executes subelement 131, executes unlock operation, and unlock result is sent to second terminal.If asked described in server judgement Seeking time meets preset effective unlocked time range, then it is the request that the first terminal, which will receive the judging result, Time meets preset effective unlocked time range, then the first terminal can execute unlock operation automatically, and will unlock At result be sent to the second terminal.
Second executes subelement 132, if it is preset effective to indicate that the request time is unsatisfactory for for the judging result Unlocked time range, the unlock control message that the first terminal is sent according to the second terminal received, executes unlock It operates and unlock result is sent to second terminal, or output unlock failure prompting message.
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model It encloses, the unlock control message that the second execution subelement 132 is sent according to the second terminal received executes unlock operation simultaneously Unlock result is sent to second terminal, or output unlock failure prompting message.If server judges the request time It is unsatisfactory for preset effective unlocked time range, then the judging result that the first terminal receives is discontented for the request time The preset effective unlocked time range of foot, the first terminal ask the solution lock control sent according to the second terminal received It asks, execute unlock operation and unlock result is sent to second terminal, or output unlock failure prompting message.For example, working as institute When stating the agreement solution lock control request that the second terminal that first terminal receives is sent, then the first terminal will execute unlock behaviour Make, and unlock result is sent to the second terminal;When the refusal solution that the second terminal that the first terminal receives is sent When lock control is requested, then output is unlocked failure prompting message by the first terminal.
Institute can be passed through when first terminal receives the unlocking request for carrying unlock fingerprint using the embodiment of the present invention It states first terminal the unlock fingerprint in the unlocking request is sent to server and verify, the server is anti-when receiving When the unlock fingerprint of feedback is by verifying message, the request time of the unlocking request is sent to the service by the first terminal Device so that the server judges whether the request time meets preset effective unlocked time range, and feeds back judgement knot Fruit, when receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal output unlock failure Prompting message, if the judging result indicates that the request time meets preset effective unlocked time range, described first eventually End executes unlock operation, and unlock result is sent to second terminal, if the judging result indicates that the request time is discontented The preset effective unlocked time range of foot, the first terminal disappear according to the solution lock control that the second terminal received is sent Breath executes unlock operation and unlock result is sent to second terminal, or output unlock failure prompting message, passes through server Fingerprint authentication is carried out, and judges automatically whether meet time requirement by server by the time of request unlock, is simplified Judging result is sent to second terminal by server when then failing by unlock by the management process of terminal, eventually by second End decides whether to be unlocked, to enhance the flexibility of unlock.
Fig. 8 is referred to, for the embodiment of the invention provides a kind of structural schematic diagrams of server.As shown in figure 8, the service Device may include: authentication unit 21, transmission unit 22 and feedback unit 23.
Authentication unit 21, when for receiving the unlock fingerprint of first terminal transmission when server, the server is to institute It states unlock fingerprint to be verified, the unlock fingerprint is entrained by unlocking request received by the first terminal.
In the specific implementation, authentication unit 21 is to the solution when server receives the unlock fingerprint of first terminal transmission Lock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal.In the present embodiment, Unlock fingerprint entrained by unlocking request can be got from first terminal by server, and will unlock fingerprint and preset solution Lock fingerprint is compared, and then carries out fingerprint authentication according to comparison result.
Transmission unit 22, if passing through for the unlock fingerprint authentication, the server is by the unlock fingerprint by testing Card message is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.
In the specific implementation, transmission unit 22 disappears the unlock fingerprint by verifying if the unlock fingerprint authentication passes through Breath is sent to the first terminal, so that the first terminal returns to the request time of the unlocking request.When the unlock refers to When line is consistent with preset unlock fingerprint comparison, the unlock fingerprint is sent to first eventually by verifying message by the server End.Since parent wishes that child can wish controlled person in defined in suitable time range using mobile phone or controller Mobile phone is unlocked in time to use mobile phone, in the present embodiment, when first terminal receives the verifying message, described first eventually End can wish to judge request time, therefore can return to the request time of the unlocking request.
Feedback unit 23 judges whether the request time meets preset effective unlocked time model for the server It encloses, and the judging result is fed back into the first terminal, so that the first terminal sentencing according to the server feedback Disconnected result executes solution lock control operation.
In the specific implementation, feedback unit 23 judges whether the request time meets preset effective unlocked time range, And the judging result is fed back into the first terminal, so that judgement knot of the first terminal according to the server feedback Fruit executes solution lock control operation.The server is sentenced by the request time of the unlocking request of the reception first terminal feedback Whether the request time that breaks meets preset effective unlocked time range, such as when the request time that server receives is 13:00 when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, therefore may determine that institute Request time is stated not within the scope of preset effective unlocked time, the server can feed back to the judging result The first terminal, the first terminal will be unable to successfully be unlocked;When the request time that the server receives is 15: When 00, for the request time within the scope of preset effective unlocked time, the server can be anti-by the judging result It is fed to the first terminal, the first terminal can be unlocked successfully.
Specifically, please with reference to Fig. 9, for the embodiment of the invention provides the structural schematic diagrams of feedback unit.Such as Fig. 9 institute Show, the feedback unit 23 may include: the first feedback unit 231 and the second feedback unit 232.
First feedback unit 231, if indicating that the request time meets preset effective unlock for the judging result The judging result is fed back to the first terminal by time range, the server, so that the first terminal executes unlock Operation, and unlock result is sent to second terminal.
In the specific implementation, if the judging result indicates that the request time meets preset effective unlocked time range, The judging result is fed back to the first terminal by the first feedback unit 231, so that the first terminal executes unlock operation, And unlock result is sent to second terminal.In the present embodiment, the request time received when the server is 15:00, When preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then described in the judging result instruction Request time meets preset effective unlocked time range, and the above results will be fed back to first terminal, make first by server Terminal executes unlock operation, and will unlock successful information and be automatically transmitted to second terminal.
Second feedback unit 232, if indicating that the request time meets preset effective unlock for the judging result The judging result is fed back to the first terminal by time range, the server, so that the first terminal executes unlock Operation, and unlock result is sent to second terminal
In the specific implementation, if the judging result indicates that the request time is unsatisfactory for preset effective unlocked time model It encloses, the second feedback unit 232 sends unlock confirmation request message to second terminal, so that the second terminal is according to the unlock Confirmation request message sends unlock control message to the first terminal.In the present embodiment, it is received when the server Request time is 12:00, when preset effective unlocked time range is 9:00-11:30 and 14:00-18:00, then described Judging result indicates that the request time is unsatisfactory for preset effective unlocked time range, then the first terminal unlock failure, In order to further confirm that whether be unlocked, the server can send unlock confirmation request from second terminal described in trend and disappear Breath, the user of the second terminal manually agree to or refuse request, which can be direct by second terminal Be sent to the first terminal, be also possible to be sent to first terminal after being forwarded by server, with to first terminal into The further control of row unlock.
Using the embodiment of the present invention, when server receives the unlock fingerprint of first terminal transmission, the server pair The unlock fingerprint is verified, and the unlock fingerprint is entrained by unlocking request received by the first terminal, if institute Unlock fingerprint authentication to be stated to pass through, the unlock fingerprint is sent to the first terminal by verifying message by the server, with The first terminal is set to return to the request time of the unlocking request, then the server judges whether the request time is full The preset effective unlocked time range of foot, to make server in terms of unlock fingerprint and request time two to whether to described the One terminal, which is unlocked, to be judged, if the judging result indicates that the request time meets preset effective unlocked time model It encloses, the judging result is fed back to the first terminal by the server, so that the first terminal executes unlock operation, and Unlock result is sent to second terminal, if the judging result indicates that the request time is unsatisfactory for preset effective unlock Between range, the server to second terminal send unlock confirmation request message so that the second terminal is according to the unlock Confirmation request message sends unlock control message to the first terminal, by the second terminal selectively to first terminal Unlock controlled, improve the flexibility of terminal unlocking.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (4)

1. a kind of solution lock control method characterized by comprising
When first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal is by the solution in the unlocking request Lock fingerprint is sent to server and is verified;
When receiving the unlock fingerprint of the server feedback by verifying message, the first terminal is by the unlocking request Request time be sent to the server so that the server judges whether the request time meets preset effective solution Time range is locked, and feeds back judging result, the first terminal receives the judging result;Effective unlocked time range by Second terminal is default;
If the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range, described first eventually When termination receives the agreement solution lock control request of second terminal transmission, then the first terminal will execute unlock operation, and will solution Lock result is sent to the second terminal;
If the judging result indicates that the request time is unsatisfactory for preset effective unlocked time range, described first eventually When termination receives the refusal solution lock control request of second terminal transmission, then by output unlock, unsuccessfully prompt disappears the first terminal Breath;
The agreement solution lock control request and refusal solution lock control request are the second terminals according to the unlock received Confirmation request message is sent to the first terminal, and the unlock confirmation request message is the server in the request Between be unsatisfactory for being sent to the second terminal when effective unlocked time range.
2. the method according to claim 1, wherein further include:
When receiving the unlock fingerprint authentication failure news of the server feedback, the first terminal output unlock failure Prompting message.
3. a kind of terminal characterized by comprising
Transmission unit is verified, for when first terminal receives the unlocking request for carrying unlock fingerprint, the first terminal will Unlock fingerprint in the unlocking request is sent to server and is verified;
Request time transmission unit, it is described for when receiving the unlock fingerprint of the server feedback by verifying message The request time of the unlocking request is sent to the server by first terminal, when so that the server judging the request Between whether meet preset effective unlocked time range, and feed back judging result, the first terminal receives the judging result; Effective unlocked time range is preset by second terminal;
Execution unit includes the second execution subelement, if it is described pre- to indicate that the request time is unsatisfactory for for the judging result If effective unlocked time range, when the first terminal receives the agreement solution lock control request of second terminal transmission, then institute Unlock operation will be executed by stating first terminal, and unlock result is sent to the second terminal, if the judging result indicates institute It states request time and is unsatisfactory for preset effective unlocked time range, the first terminal receives refusing for second terminal transmission When solution lock control is requested absolutely, then output is unlocked failure prompting message by the first terminal;
The agreement solution lock control request and refusal solution lock control request are the second terminals according to the unlock received Confirmation request message is sent to the first terminal, and the unlock confirmation request message is the server in the request Between be unsatisfactory for being sent to the second terminal when effective unlocked time range.
4. terminal according to claim 3, which is characterized in that further include:
Output unit, for when receiving the unlock fingerprint authentication failure news of the server feedback, described first eventually End output unlock failure prompting message.
CN201510416766.2A 2015-07-15 2015-07-15 A kind of solution lock control method and terminal Expired - Fee Related CN105100094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510416766.2A CN105100094B (en) 2015-07-15 2015-07-15 A kind of solution lock control method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510416766.2A CN105100094B (en) 2015-07-15 2015-07-15 A kind of solution lock control method and terminal

Publications (2)

Publication Number Publication Date
CN105100094A CN105100094A (en) 2015-11-25
CN105100094B true CN105100094B (en) 2019-04-12

Family

ID=54579639

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510416766.2A Expired - Fee Related CN105100094B (en) 2015-07-15 2015-07-15 A kind of solution lock control method and terminal

Country Status (1)

Country Link
CN (1) CN105100094B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631294B (en) * 2015-12-29 2018-09-04 广东欧珀移动通信有限公司 A kind of unlocking screen method and user terminal
CN105824743B (en) * 2016-03-14 2018-06-29 广东欧珀移动通信有限公司 A kind of method and mobile terminal for testing unlocked time
CN108416197A (en) * 2017-02-09 2018-08-17 北京小米移动软件有限公司 Unlock the method and device of mobile terminal
CN107315938A (en) * 2017-06-26 2017-11-03 上海斐讯数据通信技术有限公司 A kind of emergent unlocked by fingerprint method and system of smart machine based on third party device
CN109962877B (en) * 2017-12-14 2021-09-10 上海赛印信息技术股份有限公司 Intelligent reagent management method and system
CN108337258A (en) * 2018-01-31 2018-07-27 中电福富信息科技有限公司 A method of the remote control vehicle based on long-range actuating code
CN111814125A (en) * 2019-04-12 2020-10-23 奇酷互联网络科技(深圳)有限公司 Terminal unlocking method, processing terminal and storage device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070283389A1 (en) * 2006-06-01 2007-12-06 Sharp Laboratories Of America, Inc. Method and system for helping operate a media-playing set
CN103813326A (en) * 2012-11-09 2014-05-21 青岛海信移动通信技术股份有限公司 Network accessing and locking method and network accessing and locking equipment for terminal
CN103546636B (en) * 2013-10-22 2017-07-28 深圳Tcl新技术有限公司 The control method of intelligent display device
CN103618803A (en) * 2013-12-13 2014-03-05 南京守护宝信息技术有限公司 Smart phone managing method
CN104703031A (en) * 2015-03-11 2015-06-10 小米科技有限责任公司 Smart television control method and device

Also Published As

Publication number Publication date
CN105100094A (en) 2015-11-25

Similar Documents

Publication Publication Date Title
CN105100094B (en) A kind of solution lock control method and terminal
US9503903B2 (en) Server and method for remotely controlling working of communications terminal, and communications terminal
CN103152402A (en) Method and system for logging in through mobile terminal and cloud server
CN104539806A (en) Mobile terminals and emergency unlocking method thereof
CN107592314A (en) A kind of order line authority control method and device
CN105407041A (en) Method for adding group or friend, server, client and system
CN110176091A (en) A method of smart lock safety is improved by mobile terminal device code
CN108462703A (en) Password update method, smart lock and server
CN110703621A (en) Household appliance control method, household appliance control device, server and computer readable storage medium
CN108920919A (en) Control method, the device and system of interactive intelligence equipment
CN107148021A (en) A kind of wireless access authentication method and a kind of radio reception device
CN113824628A (en) User identity authentication method, device, server and storage medium based on IM
CN105591999A (en) Verification method and device
CN105608354A (en) Authentication method and system, terminal and server
CN104796874B (en) Information binding method and device
US10938806B2 (en) Communication method and device
EP2894912A1 (en) Method and apparatus for gateway management terminal
CN105142141A (en) Terminal equipment, authentication server, system and method for mobile office identity verification
CN102780978B (en) Unlocking method and system of smart card
CN107710673A (en) The method and apparatus of authenticating user identification
CN108711205A (en) A kind of conference system visitor Verification System
CN110446197B (en) Communication control method, device, equipment and storage medium of intelligent equipment
CN101800985A (en) Authentication method and system, terminal, server and data downloading method and device
CN111859320A (en) Cross-system login-free method, device, equipment and readable storage medium
CN102263797B (en) Session control method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190412

CF01 Termination of patent right due to non-payment of annual fee