CN105100173B - Screen locking and unlocking screen method, screen management system and equipment - Google Patents
Screen locking and unlocking screen method, screen management system and equipment Download PDFInfo
- Publication number
- CN105100173B CN105100173B CN201410219213.3A CN201410219213A CN105100173B CN 105100173 B CN105100173 B CN 105100173B CN 201410219213 A CN201410219213 A CN 201410219213A CN 105100173 B CN105100173 B CN 105100173B
- Authority
- CN
- China
- Prior art keywords
- screen
- client
- lock password
- password
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses a kind of screen lockings and unlocking screen method, screen management system and equipment, are related to equipment management field.By the length for increasing screen-lock password, so that the length of screen-lock password is greater than the length in the settable screen-lock password of user interface, to which user itself can not unlock from terminal interface after using longer screen-lock password locking terminal screen, it can only be unlocked by Server remote, realize the screen locking technology of terminal management rank.
Description
Technical field
The present invention relates to equipment management field, in particular to a kind of screen locking and unlocking screen method, screen management system and
Equipment.
Background technique
With popularizing for the mobile terminals such as smart phone, tablet computer, many users protect oneself using screen locking technology
Privacy, prevent maloperation etc..
Have a kind of screen locking technology at present, using management system to intelligent terminal carry out remote lock, the technology mainly by
Management system issues the instruction that locks or unlocks to intelligent terminal, intelligent terminal receives lock or unlock instruction after execute screen
Lock operation or unlocking screen operation.For this method after the screen of management system locking intelligent terminal, user passes through terminal operation
Or remote operation input screen-lock password can realize unlocking screen.
At present there are also a kind of screen locking technology, referred to as " getting back mobile phone application ", which allows user defeated after mobile phone loss
Enter the private ID of oneself, then remotely sends locking information to mobile phone and lock mobile phone, and can remotely delete the data on mobile phone.
This method is after user locks mobile phone, if other users have known that unlocking screen still may be implemented in screen-lock password.
Above two screen locking technology belongs to user class locking, i.e., user can be from terminal unlocking or long-range after screen locking
Unlock.However, user itself can not unlock from terminal interface after client wishes terminal remote locking in application scenes.
For example, the plate in examination period student may need to disable, and it is not intended to student oneself that can arbitrarily unlock use.Again
For example, such as Party, government and army's meeting, the mobile phone of personnel participating in the meeting needs to disable in some session, and it is not intended to personnel participating in the meeting certainly
Oneself can arbitrarily unlock use.
However, the prior art is had no idea, user itself after accomplishing terminal screen locking can not unlock from terminal interface.
Summary of the invention
One technical problem to be solved by the embodiment of the invention is that: a kind of screen locking technology is provided, so that terminal screen is locked
User itself can not unlock from terminal interface after fixed.
According to an aspect of an embodiment of the present invention, a kind of screen locking method is proposed, comprising: client receives server and sends
Screen locking instruction and system screen-lock password, the length of system screen-lock password is greater than the length in the settable screen-lock password of user interface
Degree;System screen-lock password is set the current screen-lock password of the affiliated terminal of client by client, and responds screen locking instruction execution
Screen locking operation.
Another aspect according to an embodiment of the present invention proposes a kind of unlocking screen method, comprising: client receives service
The screen-unlock instruction that device is sent;Client end response screen-unlock instruction removes system screen-lock password, executes unlocking screen behaviour
Make.
Another aspect according to an embodiment of the present invention proposes a kind of unlocking screen method, comprising: client receives service
The screen-unlock instruction and unlocking screen password that device is sent;Client end response screen-unlock instruction, by unlocking screen password be
System screen-lock password is compared, and in response to unlocking screen password and the consistent comparison result of system screen-lock password, removes system lock
Shield password, executes unlocking screen operation.
Other side according to an embodiment of the present invention proposes a kind of screen locking method, comprising: server generates system screen locking
Password, the length of system screen-lock password are greater than the length in the settable screen-lock password of user interface;Server is sent out to client
Screen locking instruction and system screen-lock password are sent, so that system screen-lock password is set the current lock of the affiliated terminal of client by client
Shield password, and responds the operation of screen locking instruction execution screen locking.
Another aspect according to an embodiment of the present invention proposes a kind of unlocking screen method, comprising: server is to client
Screen-unlock instruction is sent, so as to client end response screen-unlock instruction, removes system screen-lock password, executes unlocking screen behaviour
Make.
Another aspect according to an embodiment of the present invention proposes a kind of unlocking screen method, comprising: server is to client
Screen-unlock instruction and unlocking screen password are sent, so as to client end response screen-unlock instruction, and according to unlocking screen password
Unlocking screen operation is executed with the comparison result of system screen-lock password.
Other side according to an embodiment of the present invention proposes a kind of screen locking method, comprising: client receives server hair
The screen locking instruction sent;Client end response screen locking instructs generation system screen-lock password, and the length of system screen-lock password is greater than in user
The length of the settable screen-lock password in interface;System screen-lock password is set the current screen locking of the affiliated terminal of client by client
Password, and execute screen locking operation.
Another aspect according to an embodiment of the present invention proposes a kind of unlocking screen method, comprising: client receives service
The screen-unlock instruction that device is sent;Client end response screen-unlock instruction removes system screen-lock password, executes unlocking screen behaviour
Make.
Another aspect according to an embodiment of the present invention proposes a kind of client, comprising: receiving module, for receiving clothes
The length of the screen locking instruction and system screen-lock password that business device is sent, system screen-lock password is greater than the screen locking settable in user interface
The length of password;Screen lock module for setting the current screen-lock password of the affiliated terminal of client for system screen-lock password, and is rung
Screen locking instruction execution screen locking is answered to operate.
Another aspect according to an embodiment of the present invention proposes a kind of server, comprising: secret generation module, for giving birth to
At system screen-lock password, the length of system screen-lock password is greater than the length in the settable screen-lock password of user interface;Send mould
Block, for sending screen locking instruction and system screen-lock password to client, so that system screen-lock password is set client by client
The current screen-lock password of terminal belonging to holding, and respond the operation of screen locking instruction execution screen locking.
Another aspect according to an embodiment of the present invention proposes a kind of client, comprising: receiving module, for receiving clothes
The screen locking instruction that business device is sent;Secret generation module, for responding screen locking instruction generation system screen-lock password, system screen-lock password
Length be greater than the settable screen-lock password of user interface length;Screen lock module, for setting system screen-lock password to
The current screen-lock password of the affiliated terminal of client, and execute screen locking operation.
Other side according to an embodiment of the present invention proposes a kind of screen management system, comprising: client above-mentioned and
Server above-mentioned.
The embodiment of the present invention passes through the length for increasing screen-lock password, so that the length of screen-lock password can greater than in user interface
The length of the screen-lock password of setting, thus using user itself after longer screen-lock password locking terminal screen from terminal interface
It can not unlock, can only be unlocked by Server remote, realize the screen locking technology of terminal management rank.
By referring to the drawings to the detailed description of exemplary embodiment of the present invention, other feature of the invention and its
Advantage will become apparent.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art
To obtain other drawings based on these drawings.
Fig. 1 is the flow diagram of screen locking method one embodiment of the present invention.
Fig. 2 is the flow chart of unlocking screen method one embodiment corresponding with Fig. 1.
Fig. 3 is the flow chart of unlocking screen method further embodiment corresponding with Fig. 1
Fig. 4 is the flow diagram of screen locking method further embodiment of the present invention.
Fig. 5 is the structural schematic diagram of screen management system one embodiment of the present invention.
Fig. 6 is the structural schematic diagram of server one embodiment of the present invention.
Fig. 7 is the structural schematic diagram of client one embodiment of the present invention.
Fig. 8 is the structural schematic diagram of client further embodiment of the present invention.
Fig. 9 is the structural schematic diagram of another embodiment of client of the present invention.
Figure 10 is the structural schematic diagram of another embodiment of client of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Below
Description only actually at least one exemplary embodiment be it is illustrative, never as to the present invention and its application or make
Any restrictions.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Unless specifically stated otherwise, positioned opposite, the digital table of the component and step that otherwise illustrate in these embodiments
It is not limited the scope of the invention up to formula and numerical value.
Simultaneously, it should be appreciated that for ease of description, the size of various pieces shown in attached drawing is not according to reality
Proportionate relationship draw.
Technology, method and apparatus known to person of ordinary skill in the relevant may be not discussed in detail, but suitable
In the case of, the technology, method and apparatus should be considered as authorizing part of specification.
It is shown here and discuss all examples in, any occurrence should be construed as merely illustratively, without
It is as limitation.Therefore, the other examples of exemplary embodiment can have different values.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, then in subsequent attached drawing does not need that it is further discussed.
In order to achieve the purpose that user itself can not unlock from terminal interface after terminal screen locking, the embodiment of the present invention is mentioned
A kind of screen locking technology and corresponding unlocking method out.The screen locking technology that the embodiment of the present invention proposes, by increasing screen-lock password
Length so that the length of screen-lock password be greater than the settable screen-lock password of user interface length, thus longer in utilization
Screen-lock password locking terminal screen after user itself can not be unlocked from terminal interface, can only be unlocked by Server remote, realize
The screen locking technology of terminal management rank.
In embodiments of the present invention, the longer screen-lock password of Password Length is known as system screen-lock password, system screen-lock password
It can be generated, can also be generated by client by server.Illustrate both screen locking technologies separately below.
Fig. 1 is the flow diagram of screen locking method one embodiment of the present invention.System screen-lock password in the present embodiment by
Server generates.As shown in Figure 1, the screen locking method of the present embodiment is for example including following steps:
Step S101, server generate system screen-lock password, and the length of system screen-lock password is greater than can set in user interface
The length for the screen-lock password set.
The method that the present invention does not limit generation system screen-lock password, such as the character of a preset length can be generated at random
String, using the character string as system screen-lock password.In addition, being greater than in the length for meeting system screen-lock password can set in user interface
Under the primary condition of the length for the screen-lock password set, those skilled in the art as needed can be with flexible setting system screen-lock password
Length, in general, the length of system screen-lock password is bigger, and safety is better, and a possibility that being cracked is smaller, conversely, being
A possibility that length for screen-lock password of uniting is smaller, and safety is poorer, is cracked is bigger.For example, the length of system screen-lock password is
12, be 4 in the length of the settable screen-lock password of user interface.
Step S102, server send screen locking instruction and system screen-lock password to client.
As illustrative sending method, server can send screen locking instruction and system screen-lock password simultaneously, can also be with
Screen locking instruction and system screen-lock password are sent respectively.
Step S103, client receive the screen locking instruction and system screen-lock password that server is sent.
Step S104, system screen-lock password is set the current screen-lock password of the affiliated terminal of client by client, and rings
Screen locking instruction execution screen locking is answered to operate.
After lock-screen, since the length of current screen-lock password is greater than in the settable screen-lock password of user interface
Length, therefore user itself can not unlock from terminal interface, can only be unlocked by Server remote, realize terminal management rank
Screen locking technology.
It can for screen-lock password (that is, screen-lock password by UI Preferences in the affiliated terminal of client) before
To use different processing methods.A kind of processing method can be removed in the affiliated terminal of client and pass through UI Preferences
Screen-lock password.Another processing method, can be by the screen-lock password by UI Preferences in the affiliated terminal of client
It is saved in another storage region, wherein another storage region is the memory block except storage region where current screen-lock password
Domain.Second of processing method can use the letter that another storage region saves after the locking and unlock of terminal management rank
Breath restores the screen-lock password being arranged before user, restores the function that user itself unlocks from terminal interface.
For the screen locking technology of terminal management rank, can all be opened to all terminals, it can also be only to having applied for the function
The open-destination of energy.For the first case, terminal can obtain management of the server to terminal screen without doing what work
Power.For second situation, the client in terminal can be initiated to register to server, with authorization server to belonging to client
The screen of terminal is managed.
For aforementioned screen locking method, the embodiment of the present invention also proposes corresponding unlocking screen method.Two are given below to show
The unlocking screen method of example property.
Fig. 2 is the flow chart of unlocking screen method one embodiment corresponding with Fig. 1.In the present embodiment, server
Screen-unlock instruction need to be sent to client remote can be realized unlock.As shown in Fig. 2, the unlocking screen method packet of the present embodiment
Include following steps:
Step S201, server send screen-unlock instruction to client.
Step S202, client receive the screen-unlock instruction that server is sent.
Step S203, client end response screen-unlock instruction remove system screen-lock password, execute unlocking screen operation.
Fig. 3 is the flow chart of unlocking screen method further embodiment corresponding with Fig. 1.In the present embodiment, server
It not only needs to send screen-unlock instruction to client remote, it is also necessary to send unlocking screen password to client and just be able to achieve solution
Lock.As shown in figure 3, the unlocking screen method of the present embodiment the following steps are included:
Step S301, server send screen-unlock instruction and unlocking screen password to client.
Step S302, client receive the screen-unlock instruction and unlocking screen password that server is sent.
Unlocking screen password is compared by step S303, client end response screen-unlock instruction with system screen-lock password,
If comparison result is consistent, step S304 is executed, if comparison result is inconsistent, executes step S305.
Step S304, client remove system screen-lock password, execute unlocking screen operation and can return to solution to server
Lock success response.
Step S305, client does not execute unlocking screen operation, and unlock failure response can be returned to server.
After unlocking screen, user can carry out screen locking to screen from terminal interface or unlock operates.If before
Screen-lock password removed, then user can reset screen-lock password by terminal interface, and based on the lock reset
Shield password and carries out screen locking or unlock.It, then can be with if screen-lock password before is not removed, and is stored in another storage region
The screen-lock password by UI Preferences that another storage region is stored is set as current screen-lock password, then user is still
Screen locking or unlock are carried out using the screen-lock password being arranged before oneself.
Fig. 4 is the flow diagram of screen locking method further embodiment of the present invention.System screen-lock password in the present embodiment
It is generated by client.As shown in figure 4, the screen locking method of the present embodiment is for example including following steps:
Step S401, server send screen locking instruction to client.
Step S402, client receive the screen locking instruction that server is sent.
Step S403, client end response screen locking instruct generation system screen-lock password, and the length of system screen-lock password is greater than
The length of the settable screen-lock password of user interface.Wherein, the specific generation method present invention of system screen-lock password without limitation,
It can refer to aforementioned.
Step S404, system screen-lock password is set the current screen-lock password of the affiliated terminal of client by client, and holds
The operation of row screen locking.
After lock-screen, since the length of current screen-lock password is greater than in the settable screen-lock password of user interface
Length, therefore user itself can not unlock from terminal interface, can only be unlocked by Server remote, realize terminal management rank
Screen locking technology.
For screen-lock password (that is, screen-lock password by UI Preferences in the affiliated terminal of client) before
Another storage region is removed or be saved in processing method, can be with reference to aforementioned, and which is not described herein again.
The unlocking screen method that screen locking method correspondence shown in Fig. 4 can use is refering to what is shown in Fig. 2, which is not described herein again.
Fig. 5 is the structural schematic diagram of screen management system one embodiment of the present invention.As shown in figure 5, the present embodiment is
System includes server 60 and client 70.In the case that system screen-lock password is generated by server 60 in screen management system,
Server 60 and the structural schematic diagram of client 70 are respectively referring to shown in Fig. 6, Fig. 7 and Fig. 8;System screen-lock password is by client 70
In the case where generation, the structural schematic diagram of client 70 is respectively referring to shown in Fig. 9 and Figure 10.
Fig. 6 is the structural schematic diagram of server one embodiment of the present invention.As shown in fig. 6, the server 60 of the present embodiment
Include:
Secret generation module 601, for generating system screen-lock password, the length of system screen-lock password is greater than in user interface
The length of settable screen-lock password;
Sending module 602, for sending screen locking instruction and system screen-lock password to client, so that client is by system lock
Screen password is set as the current screen-lock password of the affiliated terminal of client, and responds the operation of screen locking instruction execution screen locking.
In one embodiment, sending module 602 are also used to send screen-unlock instruction to client, so as to client
Response screen unlock instruction removes system screen-lock password, executes unlocking screen operation.
In one embodiment, sending module 602 are also used to send screen-unlock instruction to client and unlocking screen are close
Code so as to client end response screen-unlock instruction, and is executed according to unlocking screen password and the comparison result of system screen-lock password
Unlocking screen operation.
Fig. 7 is the structural schematic diagram of client one embodiment of the present invention.As shown in fig. 7, the client 70 of the present embodiment
Include:
Receiving module 701, for receiving the screen locking instruction and system screen-lock password of server transmission, system screen-lock password
Length is greater than the length in the settable screen-lock password of user interface;
Screen lock module 702 for setting the current screen-lock password of the affiliated terminal of client for system screen-lock password, and is rung
Screen locking instruction execution screen locking is answered to operate.
In one embodiment, screen lock module 702 are also used to set client institute for system screen-lock password in client
Before belonging to the current screen-lock password of terminal, the screen-lock password by UI Preferences in the affiliated terminal of client is removed;Or
The screen-lock password by UI Preferences in the affiliated terminal of client is saved in another storage region, another storage by person
Region is the storage region except storage region where current screen-lock password.
Fig. 8 is the structural schematic diagram of client further embodiment of the present invention.As shown in figure 8, client 70 further include: note
Volume module 803, and/or, unlocked state 804.
In one embodiment, registration module 803, for initiating to register to server, with authorization server to client
The screen of affiliated terminal is managed.
In one embodiment, receiving module 701 are also used to receive the screen-unlock instruction of server transmission;Solve mode locking
Block 804 is used for response screen unlock instruction, removes system screen-lock password, executes unlocking screen operation.
In one embodiment, receiving module 701 are also used to receive the screen-unlock instruction and screen solution of server transmission
Lock cipher;Unlocked state 804 is used for response screen unlock instruction, unlocking screen password is compared with system screen-lock password,
In response to unlocking screen password and the consistent comparison result of system screen-lock password, system screen-lock password is removed, executes unlocking screen
Operation.
In one embodiment, after unlocking, screen lock module 702 are also used to pass through what another storage region stored
The screen-lock password of UI Preferences is set as the current screen-lock password of the affiliated terminal of client.
Fig. 9 is the structural schematic diagram of another embodiment of client of the present invention.As shown in figure 9, the client of the present embodiment
70 include:
Receiving module 901, for receiving the screen locking instruction of server transmission;
Secret generation module 902, for responding screen locking instruction generation system screen-lock password, the length of system screen-lock password is big
In the length in the settable screen-lock password of user interface;
Screen lock module 903 for setting the current screen-lock password of the affiliated terminal of client for system screen-lock password, and is held
The operation of row screen locking.
In one embodiment, screen lock module 903 are also used to set client institute for system screen-lock password in client
Before belonging to the current screen-lock password of terminal, the screen-lock password by UI Preferences in the affiliated terminal of client is removed;Or
The screen-lock password by UI Preferences in the affiliated terminal of client is saved in another storage region, another storage by person
Region is the storage region except storage region where current screen-lock password.
Figure 10 is the structural schematic diagram of another embodiment of client of the present invention.As shown in Figure 10, client 70 further include:
Registration module 1004, and/or, unlocked state 1005.
In one embodiment, registration module 1004, for initiating to register to server, with authorization server to client
The screen of affiliated terminal is managed.
In one embodiment, receiving module 901 are also used to receive the screen-unlock instruction of server transmission;Solve mode locking
Block 1005 is used for response screen unlock instruction, removes system screen-lock password, executes unlocking screen operation.
In one embodiment, after unlocking, screen lock module 903 are also used to pass through what another storage region stored
The screen-lock password of UI Preferences is set as the current screen-lock password of the affiliated terminal of client.
After lock-screen, since the length of current screen-lock password is greater than in the settable screen-lock password of user interface
Length, therefore user itself can not unlock from terminal interface, can only be unlocked by Server remote, realize terminal management rank
Screen locking technology.
After unlocking screen, user can carry out screen locking to screen from terminal interface or unlock operates.If before
Screen-lock password removed, then user can reset screen-lock password by terminal interface, and based on the lock reset
Shield password and carries out screen locking or unlock.It, then can be with if screen-lock password before is not removed, and is stored in another storage region
The screen-lock password by UI Preferences that another storage region is stored is set as current screen-lock password, then user is still
Screen locking or unlock are carried out using the screen-lock password being arranged before oneself.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (31)
1. a kind of screen locking method, comprising:
Client receives the screen locking instruction and system screen-lock password that server is sent, and the length of the system screen-lock password is greater than
The length of the settable screen-lock password of user interface;
The system screen-lock password is set the current screen-lock password of the affiliated terminal of the client by the client, and responds
The screen locking instruction execution screen locking operation.
2. the method according to claim 1, wherein setting the system screen-lock password in the client
Before the current screen-lock password of the affiliated terminal of client, further includes:
The client removes the screen-lock password by UI Preferences in the affiliated terminal of the client;Alternatively,
The screen-lock password by UI Preferences in the affiliated terminal of the client is saved in another deposit by the client
Storage area domain, another storage region are the storage regions except storage region where current screen-lock password.
3. the method according to claim 1, wherein further include:
The client is initiated to register to the server, to authorize the server to the screen of the affiliated terminal of the client
It is managed.
4. a kind of unlocking screen method realized based on any one of claim 1-3, comprising:
The client receives the screen-unlock instruction that server is sent;
Screen-unlock instruction described in the client end response removes the system screen-lock password, executes unlocking screen operation.
5. according to the method described in claim 4, it is characterized by further comprising:
The screen-lock password by UI Preferences that another storage region is stored is set as the affiliated terminal of the client and works as
Preceding screen-lock password.
6. a kind of unlocking screen method realized based on any one of claim 1-3, comprising:
The client receives the screen-unlock instruction and unlocking screen password that server is sent;
Screen-unlock instruction described in the client end response compares the unlocking screen password and the system screen-lock password
Compared with it is close to remove the system screen locking in response to the unlocking screen password and the consistent comparison result of system screen-lock password
Code executes unlocking screen operation.
7. according to the method described in claim 6, it is characterized by further comprising:
The screen-lock password by UI Preferences that another storage region is stored is set as the affiliated terminal of the client and works as
Preceding screen-lock password.
8. a kind of screen locking method, comprising:
Server generates system screen-lock password, and the length of the system screen-lock password is greater than close in the settable screen locking of user interface
The length of code;
The server sends screen locking instruction and the system screen-lock password to client, so that the client is by the system
Screen-lock password is set as the current screen-lock password of the affiliated terminal of the client, and responds the screen locking instruction execution screen locking
Operation.
9. a kind of unlocking screen method realized based on claim 8, comprising:
The server sends screen-unlock instruction to the client, so that unlocking screen described in the client end response refers to
It enables, removes the system screen-lock password, execute unlocking screen operation.
10. a kind of unlocking screen method realized based on claim 8, comprising:
The server sends screen-unlock instruction and unlocking screen password to the client, so as to the client end response institute
Screen-unlock instruction is stated, and unlocking screen is executed according to the unlocking screen password and the comparison result of the system screen-lock password
Operation.
11. a kind of screen locking method, comprising:
Client receives the screen locking instruction that server is sent;
Screen locking described in the client end response instructs generation system screen-lock password, the length of the system screen-lock password be greater than with
The length of the settable screen-lock password in family interface;
The system screen-lock password is set the current screen-lock password of the affiliated terminal of the client by the client, and executes
Screen locking operation.
12. according to the method for claim 11, which is characterized in that the system screen-lock password is arranged in the client
Before the current screen-lock password of the affiliated terminal of the client, further includes:
The client removes the screen-lock password by UI Preferences in the affiliated terminal of the client;Alternatively,
The screen-lock password by UI Preferences in the affiliated terminal of the client is saved in another deposit by the client
Storage area domain, another storage region are the storage regions except storage region where current screen-lock password.
13. according to the method for claim 11, which is characterized in that further include:
The client is initiated to register to the server, to authorize the server to the screen of the affiliated terminal of the client
It is managed.
14. a kind of unlocking screen method realized based on any one of claim 11-13, comprising:
The client receives the screen-unlock instruction that server is sent;
Screen-unlock instruction described in the client end response removes the system screen-lock password, executes unlocking screen operation.
15. according to the method for claim 14, which is characterized in that further include:
The screen-lock password by UI Preferences that another storage region is stored is set as the affiliated terminal of the client and works as
Preceding screen-lock password.
16. a kind of client, comprising:
Receiving module, for receiving the screen locking instruction and system screen-lock password of server transmission, the length of the system screen-lock password
Degree is greater than the length in the settable screen-lock password of user interface;
Screen lock module, for setting the current screen-lock password of the affiliated terminal of the client for the system screen-lock password, and
Respond the screen locking instruction execution screen locking operation.
17. client according to claim 16, which is characterized in that the screen lock module is also used in the client
Before setting the current screen-lock password of the affiliated terminal of the client for the system screen-lock password,
Remove the screen-lock password by UI Preferences in the affiliated terminal of the client;
Alternatively,
The screen-lock password by UI Preferences in the affiliated terminal of the client is saved in another storage region, it is described
Another storage region is the storage region except storage region where current screen-lock password.
18. client according to claim 16, which is characterized in that further include:
Registration module, for initiating to register to the server, to authorize the server to the affiliated terminal of the client
Screen is managed.
19. client according to claim 16, which is characterized in that
The receiving module is also used to receive the screen-unlock instruction of server transmission;
The client further includes unlocked state, for responding the screen-unlock instruction, removes the system screen-lock password, holds
The operation of row unlocking screen.
20. client according to claim 16, which is characterized in that
The receiving module is also used to receive the screen-unlock instruction and unlocking screen password of server transmission;
The client further includes unlocked state, for responding the screen-unlock instruction, by the unlocking screen password and institute
The system screen-lock password of stating is compared, in response to the unlocking screen password it is consistent with the system screen-lock password compared with tie
Fruit removes the system screen-lock password, executes unlocking screen operation.
21. client according to claim 20, which is characterized in that
The screen lock module, the screen-lock password by UI Preferences for being also used to store another storage region are set as institute
State the current screen-lock password of the affiliated terminal of client.
22. a kind of server, comprising:
Secret generation module, for generating system screen-lock password, the length of the system screen-lock password is greater than can in user interface
The length of the screen-lock password of setting;
Sending module, for sending screen locking instruction and the system screen-lock password to client, so that the client will be described
System screen-lock password is set as the current screen-lock password of the affiliated terminal of the client, and responds the screen locking instruction execution screen
Lock operation.
23. server according to claim 22, which is characterized in that
The sending module is also used to send screen-unlock instruction to the client, to shield described in the client end response
Curtain unlock instruction, removes the system screen-lock password, executes unlocking screen operation.
24. server according to claim 22, which is characterized in that
The sending module is also used to send screen-unlock instruction and unlocking screen password to the client, so as to the visitor
Family end responds the screen-unlock instruction, and is held according to the unlocking screen password and the comparison result of the system screen-lock password
The operation of row unlocking screen.
25. a kind of client, comprising:
Receiving module, for receiving the screen locking instruction of server transmission;
Secret generation module, for responding the screen locking instruction generation system screen-lock password, the length of the system screen-lock password
Greater than the length in the settable screen-lock password of user interface;
Screen lock module, for setting the current screen-lock password of the affiliated terminal of the client for the system screen-lock password, and
Execute screen locking operation.
26. client according to claim 25, which is characterized in that the screen lock module is also used in the client
Before setting the current screen-lock password of the affiliated terminal of the client for the system screen-lock password,
Remove the screen-lock password by UI Preferences in the affiliated terminal of the client;
Alternatively,
The screen-lock password by UI Preferences in the affiliated terminal of the client is saved in another storage region, it is described
Another storage region is the storage region except storage region where current screen-lock password.
27. client according to claim 25, which is characterized in that further include:
Registration module, for initiating to register to the server, to authorize the server to the affiliated terminal of the client
Screen is managed.
28. client according to claim 25, which is characterized in that
The receiving module is also used to receive the screen-unlock instruction of server transmission;
The client further includes unlocked state, for responding the screen-unlock instruction, removes the system screen-lock password, holds
The operation of row unlocking screen.
29. client according to claim 28, which is characterized in that
The screen lock module, the screen-lock password by UI Preferences for being also used to store another storage region are set as institute
State the current screen-lock password of the affiliated terminal of client.
30. a kind of screen management system, comprising: the described in any item clients of claim 16-21 and claim 22-24 appoint
Server described in one.
31. a kind of screen management system, comprising: the described in any item client and servers of claim 25-29, the service
Device is used to send screen locking instruction or screen-unlock instruction to the client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410219213.3A CN105100173B (en) | 2014-05-23 | 2014-05-23 | Screen locking and unlocking screen method, screen management system and equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410219213.3A CN105100173B (en) | 2014-05-23 | 2014-05-23 | Screen locking and unlocking screen method, screen management system and equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105100173A CN105100173A (en) | 2015-11-25 |
CN105100173B true CN105100173B (en) | 2018-12-25 |
Family
ID=54579697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410219213.3A Active CN105100173B (en) | 2014-05-23 | 2014-05-23 | Screen locking and unlocking screen method, screen management system and equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105100173B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105388845B (en) * | 2015-12-30 | 2018-02-23 | 青海模具制造科技有限公司 | A kind of touch screen locking key security system applied on Digit Control Machine Tool |
CN105487485B (en) * | 2015-12-30 | 2018-10-23 | 青海模具制造科技有限公司 | A kind of numerically-controlled machine tool security system that can be directly unlocked based on remote control |
CN107577926A (en) * | 2017-08-14 | 2018-01-12 | 北京小米移动软件有限公司 | Intelligent terminal control method and device |
CN110611909B (en) * | 2019-09-25 | 2023-03-24 | 山东鲁能软件技术有限公司 | Identity recognition method and system based on mobile terminal |
CN114125850B (en) * | 2021-11-25 | 2024-04-16 | 中国电信股份有限公司 | Terminal locking method, terminal unlocking method, mobile terminal and server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594997A (en) * | 2012-04-05 | 2012-07-18 | 何乙诚 | Method for remotely controlling computer by using mobile phone |
CN103392328A (en) * | 2012-12-21 | 2013-11-13 | 华为技术有限公司 | Communication terminal work remote control server and method and communication terminal |
CN103728894A (en) * | 2014-01-22 | 2014-04-16 | 广东欧珀移动通信有限公司 | Remote control method and system of terminal device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100361456C (en) * | 2005-10-13 | 2008-01-09 | 华为技术有限公司 | Terminal equipment managing method |
CN102968343A (en) * | 2012-11-14 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method and system for switching users |
-
2014
- 2014-05-23 CN CN201410219213.3A patent/CN105100173B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102594997A (en) * | 2012-04-05 | 2012-07-18 | 何乙诚 | Method for remotely controlling computer by using mobile phone |
CN103392328A (en) * | 2012-12-21 | 2013-11-13 | 华为技术有限公司 | Communication terminal work remote control server and method and communication terminal |
CN103728894A (en) * | 2014-01-22 | 2014-04-16 | 广东欧珀移动通信有限公司 | Remote control method and system of terminal device |
Also Published As
Publication number | Publication date |
---|---|
CN105100173A (en) | 2015-11-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10735964B2 (en) | Associating services to perimeters | |
CN105100173B (en) | Screen locking and unlocking screen method, screen management system and equipment | |
JP2022017542A (en) | Device and method for resonant encryption | |
US10659226B2 (en) | Data encryption method, decryption method, apparatus, and system | |
WO2021184755A1 (en) | Application access method and apparatus, and electronic device and storage medium | |
CN102761870A (en) | Terminal authentication and service authentication method, system and terminal | |
EP4211864A2 (en) | Systems and methods for non-deterministic multi-party, multi-user sender-receiver authentication and non-repudiatable resilient authorized access to secret data | |
CN104834867B (en) | The method and system of electronic equipment privacy protection are realized based on bluetooth | |
CN104836794B (en) | The method and system of electronic equipment privacy protection are realized based on WIFI hot spot | |
KR101087698B1 (en) | Method for authenticating security of smart-phone | |
CN103780756B (en) | The method of client identification card data secrecy and mobile terminal thereof | |
CN109087415A (en) | A kind of method and apparatus of the data transmission based on cloud | |
WO2016052959A1 (en) | Online secret data management system and method therefor | |
KR101867326B1 (en) | Method and system for providing social media using partition function | |
CN108268761B (en) | Password verification method and device | |
CN105072084A (en) | Method for building data connection between mobile terminal and external equipment | |
EP3598689B1 (en) | Managing central secret keys of a plurality of user devices associated with a single public key | |
KR102137540B1 (en) | Method and system for providing social media using partition function | |
CN106330897A (en) | Information storage method and system | |
CN106357595A (en) | Encryption method and encryption system based on SIM card | |
CN103905390A (en) | Permission acquisition method, device, electronic equipment and system | |
Dinesha et al. | Evaluation of secure cloud transmission protocol | |
CN108901023B (en) | Method and system for sharing WiFi among Internet of things devices | |
CN115276991B (en) | Secure chip dynamic key generation method, secure chip device, equipment and medium | |
WO2023053164A1 (en) | Information processing system, information processing device, information processing method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |