CN105208210B - Unlocking method, device and the mobile terminal of mobile terminal - Google Patents

Unlocking method, device and the mobile terminal of mobile terminal Download PDF

Info

Publication number
CN105208210B
CN105208210B CN201510624550.5A CN201510624550A CN105208210B CN 105208210 B CN105208210 B CN 105208210B CN 201510624550 A CN201510624550 A CN 201510624550A CN 105208210 B CN105208210 B CN 105208210B
Authority
CN
China
Prior art keywords
mobile terminal
user
angle
point
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510624550.5A
Other languages
Chinese (zh)
Other versions
CN105208210A (en
Inventor
吉喆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510624550.5A priority Critical patent/CN105208210B/en
Publication of CN105208210A publication Critical patent/CN105208210A/en
Application granted granted Critical
Publication of CN105208210B publication Critical patent/CN105208210B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of unlocking methods of mobile terminal, comprising: the decryption oprerations that detection user is triggered at mobile terminal back, and Personal Unlocking Key is formed according to the decryption oprerations;The mobile terminal is unlocked according to the Personal Unlocking Key.The invention also discloses a kind of tripper of mobile terminal and mobile terminals.The present invention is realized to be unlocked from the back of mobile terminal, improves the safety and convenience being unlocked to mobile terminal.

Description

Unlocking method, device and the mobile terminal of mobile terminal
Technical field
The present invention relates to terminal device technical field more particularly to a kind of unlocking methods of mobile terminal, device and movement Terminal.
Background technique
Currently, in the unlocking method of mobile terminal, usually using fingerprint input module preset on mobile terminal, defeated It is unlocked after entering matched fingerprint.The unlocking method is only limitted to be provided with the mobile terminal of fingerprint input module and recorded to refer to The user of line operates, and has some limitations, not convenient enough.In addition, there is also a kind of screens according to mobile terminal Upper shown figure palace lattice carry out completing the unlocking method unlocked after sliding forms preset pattern.The above unlocking method is in mobile phone Front screen shows that unlocking process, the risk for inevitably having password to be stolen a glance at reduce the safety of mobile terminal unlock.
Summary of the invention
The main purpose of the present invention is to provide a kind of unlocking method of mobile terminal, device and mobile terminals, it is intended to real It is now unlocked from the back of mobile terminal, improves the safety and convenience being unlocked to mobile terminal.
To achieve the above object, the present invention provides a kind of trippers of mobile terminal, comprising:
Key Acquisition Module, the decryption oprerations triggered for detecting user at mobile terminal back, and according to the solution Close operation forms Personal Unlocking Key;
Unlocked state, the Personal Unlocking Key for being obtained according to Key Acquisition Module solve the mobile terminal Lock.
Optionally, the Key Acquisition Module includes:
A decryption point acquisition submodule, the decryption point triggered at the mobile terminal back for successively obtaining user and its With the connecting line between default origin;
Angle forms submodule, for the frame shape of each connecting line and the specified mobile terminal is angled as solution Lock key;
The unlocked state is also used to, and the size between sequencing and all angles occurred according to the decryption point is closed System is unlocked the mobile terminal.
Optionally, the tripper of the mobile terminal further include:
Angle obtains module, after entering specified encryption set interface in the mobile terminal, obtains user in institute The first pass point and its first connecting line between the default origin that mobile terminal back is triggered are stated, and described in acquisition The frame of first connecting line and the specified mobile terminal is formed by first angle;
User is obtained in the second pass point that the mobile terminal back is triggered and its between the default origin Second connecting line, and the frame for obtaining second connecting line and the specified mobile terminal is formed by second angle;
Encrypting module, for recording the size relation between the first angle and the second angle, and so on, After the angle for obtaining predetermined number, the size relation between all angles is successively recorded according to the sequencing that pass point occurs, To be formed and the matched cryptographic keys of the Personal Unlocking Key.
Optionally, the Key Acquisition Module is also used to, and obtains the track that user is triggered at the mobile terminal back Characteristic information forms Personal Unlocking Key according to the track characteristic information.
Optionally, the Key Acquisition Module is also used to, in the front display screen display decryption behaviour of the mobile terminal The information of work.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal includes above-mentioned knot The tripper of the mobile terminal of structure.
Optionally, the mobile terminal is mobile phone and iPad.
In addition, to achieve the above object, the present invention also provides a kind of unlocking methods of mobile terminal, comprising:
The decryption oprerations that detection user is triggered at mobile terminal back, and it is close according to decryption oprerations formation unlock Key;
The mobile terminal is unlocked according to the Personal Unlocking Key.
Optionally, the decryption oprerations that the detection user is triggered at mobile terminal back, and according to the decryption oprerations Forming Personal Unlocking Key includes:
It successively obtains user and decrypts point and its connection between default origin what the mobile terminal back was triggered Line;
The frame shape of each connecting line and the specified mobile terminal is angled as Personal Unlocking Key.
Optionally, described be unlocked according to the Personal Unlocking Key to the mobile terminal includes:
According to it is described decryption point occur sequencing and all angles between size relation to the mobile terminal into Row unlock.
Optionally, include: before executing all steps
After entering specified encryption set interface in the mobile terminal, obtains user and touched at the mobile terminal back Hair the first pass point and its first connecting line between the default origin, and obtain first connecting line with it is specified The frame of the mobile terminal is formed by first angle;
User is obtained in the second pass point that the mobile terminal back is triggered and its between the default origin Second connecting line, and the frame for obtaining second connecting line and the specified mobile terminal is formed by second angle;
The size relation between the first angle and the second angle is recorded, and so on, obtaining predetermined number Angle after, according to pass point occur sequencing successively record the size relation between all angles, with formed with it is described The matched cryptographic keys of Personal Unlocking Key.
Optionally, described be unlocked according to the Personal Unlocking Key to the mobile terminal includes:
The track characteristic information that user is triggered at the mobile terminal back is obtained, according to the track characteristic information shape At Personal Unlocking Key.
Optionally, the decryption oprerations that the detection user is triggered at mobile terminal back, and according to the decryption oprerations Forming Personal Unlocking Key includes:
The information of decryption oprerations is shown in the front display screen of the mobile terminal.
The decryption oprerations that the embodiment of the present invention is triggered by detecting user at mobile terminal back, and according to decryption oprerations Form Personal Unlocking Key.Then mobile terminal is unlocked according to the Personal Unlocking Key.It realizes and is solved at mobile terminal back Lock, i.e., by the blind operation of carry out in mobile terminal, can easily unlock, and can not be in mobile terminal without accurately clicking Display screen shows decryption oprerations, improves the safety and convenience being unlocked to mobile terminal.
Detailed description of the invention
The hardware structural diagram of Fig. 1 mobile terminal of each embodiment to realize the present invention;
Fig. 2 is the wireless communication device schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is circuit diagram of the invention;
Fig. 4 is the setting structure schematic diagram of pressure sensor on mobile terminal of the invention;
Fig. 5 is the functional block diagram of the tripper first embodiment of mobile terminal of the present invention;
Fig. 6 is the structural schematic diagram that mobile terminal of the invention is unlocked;
Fig. 7 is the functional block diagram of the tripper second embodiment of mobile terminal of the present invention;
Fig. 8 is the schematic diagram of the selection of origin during the present invention encrypts;
Fig. 9 is the schematic diagram that first pass point is chosen during the present invention encrypts;
Figure 10 is the schematic diagram that first pass point and origin form connecting line during the present invention encrypts;
Figure 11 is the schematic diagram that second pass point determines during the present invention encrypts;
Figure 12 is the schematic diagram that third pass point determines during the present invention encrypts;
Figure 13 is the schematic diagram that the 4th pass point determines during the present invention encrypts;
Figure 14 is the flow diagram of the unlocking method first embodiment of mobile terminal of the present invention;
Figure 15 is the flow diagram of the unlocking method second embodiment of mobile terminal of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The mobile terminal of each embodiment of the present invention is realized in description with reference to the drawings.In subsequent description, use For indicate element such as " module ", " component " or " unit " suffix only for being conducive to explanation of the invention, itself There is no specific meanings.Therefore, " module " can be used mixedly with " component ".
Mobile terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as moving Phone, smart phone, laptop, digit broadcasting receiver, PDA (personal digital assistant), PAD (tablet computer), PMP The mobile terminal of (portable media player), navigation device etc. and such as number TV, desktop computer etc. are consolidated Determine terminal.Hereinafter it is assumed that terminal is mobile terminal.However, it will be understood by those skilled in the art that in addition to being used in particular for moving Except the element of purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Fig. 1 to realize the present invention the mobile terminal of each embodiment hardware configuration signal.
Mobile terminal 100 may include wireless communication unit 110, A/V (audio/video) input unit 120, user's input Unit 130, sensing unit 140, output unit 150, memory 160, interface unit 170, controller 180 and power supply unit 190 Etc..Fig. 1 shows the mobile terminal with various assemblies, it should be understood that being not required for implementing all groups shown Part.More or fewer components can alternatively be implemented.The element of mobile terminal will be discussed in more detail below.
Wireless communication unit 110 generally includes one or more components, allows mobile terminal 100 and wireless communication device Or the radio communication between network.For example, wireless communication unit may include broadcasting reception module 111, mobile communication module 112, at least one of wireless Internet module 113, short range communication module 114 and location information module 115.
Broadcasting reception module 111 receives broadcast singal and/or broadcast from external broadcast management server via broadcast channel Relevant information.Broadcast channel may include satellite channel and/or terrestrial channel.Broadcast management server, which can be, to be generated and sent The broadcast singal and/or broadcast related information generated before the server or reception of broadcast singal and/or broadcast related information And send it to the server of terminal.Broadcast singal may include TV broadcast singal, radio signals, data broadcasting Signal etc..Moreover, broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast phase Closing information can also provide via mobile communications network, and in this case, broadcast related information can be by mobile communication mould Block 112 receives.Broadcast singal can exist in a variety of manners, for example, it can be with the electronics of digital multimedia broadcasting (DMB) Program guide (EPG), digital video broadcast-handheld (DVB-H) electronic service guidebooks (ESG) etc. form and exist.Broadcast Receiving module 111 can receive signal broadcast by using various types of broadcasters.Particularly, broadcasting reception module 111 It can be wide by using such as multimedia broadcasting-ground (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video It broadcasts-holds (DVB-H), forward link media (MediaFLO@) data broadcasting device, received terrestrial digital broadcasting integrated service (ISDB-T) etc. digital broadcast apparatus receives digital broadcasting.Broadcasting reception module 111, which may be constructed such that, to be adapted to provide for extensively Broadcast the various broadcasters and above-mentioned digital broadcast apparatus of signal.Via the received broadcast singal of broadcasting reception module 111 and/ Or broadcast related information can store in memory 160 (or other types of storage medium).
Mobile communication module 112 sends radio signals to base station (for example, access point, node B etc.), exterior terminal And at least one of server and/or receive from it radio signal.Such radio signal may include that voice is logical Talk about signal, video calling signal or according to text and/or Multimedia Message transmission and/or received various types of data.
The Wi-Fi (Wireless Internet Access) of the support mobile terminal of wireless Internet module 113.The module can be internally or externally It is couple to terminal.Wi-Fi (Wireless Internet Access) technology involved in the module may include WLAN (Wireless LAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave accesses), HSDPA (high-speed downlink packet access) etc..
Short range communication module 114 is the module for supporting short range communication.Some examples of short-range communication technology include indigo plant ToothTM, radio frequency identification (RFID), Infrared Data Association (IrDA), ultra wide band (UWB), purple honeybeeTMEtc..
Location information module 115 is the module for checking or obtaining the location information of mobile terminal.Location information module Typical case be GPS (global pick device).According to current technology, GPS module 115, which calculates, comes from three or more satellites Range information and correct time information and the Information application triangulation for calculating, thus according to longitude, latitude Highly accurately calculate three-dimensional current location information.Currently, it is defended for the method for calculating position and temporal information using three Star and the error that calculated position and temporal information are corrected by using an other satellite.In addition, GPS module 115 It can be by Continuous plus current location information in real time come calculating speed information.
A/V input unit 120 is for receiving audio or video signal.A/V input unit 120 may include 121 He of camera Microphone 122, camera 121 is to the static images obtained in video acquisition mode or image capture mode by image capture apparatus Or the image data of video is handled.Treated, and picture frame may be displayed on display unit 151.It is handled through camera 121 Picture frame afterwards can store in memory 160 (or other storage mediums) or be sent out via wireless communication unit 110 It send, two or more cameras 121 can be provided according to the construction of mobile terminal.Microphone 122 can be in telephone calling model, note Sound (audio data) is received via microphone in record mode, speech recognition mode etc. operational mode, and can will in this way Acoustic processing be audio data.Audio that treated (voice) data can be converted in the case where telephone calling model can The format output of mobile communication base station is sent to via mobile communication module 112.Various types of make an uproar can be implemented in microphone 122 Sound eliminates (or inhibition) algorithm to eliminate the noise or do that (or inhibition) generates during sending and receiving audio signal It disturbs.
The order that user input unit 130 can be inputted according to user generates key input data to control each of mobile terminal Kind operation.User input unit 130 allows user to input various types of information, and may include keyboard, metal dome, triggering Plate (for example, the sensitive component of detection due to the variation of resistance, pressure, capacitor etc. caused by being contacted), idler wheel, rocking bar etc. Deng.Particularly, when trigger board is superimposed upon in the form of layer on display unit 151, triggering screen can be formed.
Sensing unit 140 detects the current state of mobile terminal 100, (for example, mobile terminal 100 opens or closes shape State), the position of mobile terminal 100, user is for the presence or absence of contact (that is, triggering input) of mobile terminal 100, mobile terminal 100 orientation, the acceleration of mobile terminal 100 or by fast movement and direction etc., and generate for controlling mobile terminal 100 The order of operation or signal.For example, sensing unit 140 can sense when mobile terminal 100 is embodied as sliding-type mobile phone The sliding-type phone is to open or close.In addition, sensing unit 140 be able to detect power supply unit 190 whether provide electric power or Whether person's interface unit 170 couples with external device (ED).Sensing unit 140 may include that proximity sensor 141 will combine below Triggering screen is to be described this.
Interface unit 170 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Identification module can be storage and use each of mobile terminal 100 for verifying user It plants information and may include subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) Etc..In addition, the device (hereinafter referred to as " identification device ") with identification module can take the form of smart card, therefore, know Other device can be connect via port or other attachment devices with mobile terminal 100.Interface unit 170, which can be used for receiving, to be come from The input (for example, data information, electric power etc.) of external device (ED) and the input received is transferred in mobile terminal 100 One or more elements can be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connect with external base, interface unit 170 may be used as allowing will be electric by it Power, which is provided from pedestal to the path or may be used as of mobile terminal 100, allows the various command signals inputted from pedestal to pass through it It is transferred to the path of mobile terminal.The various command signals or electric power inputted from pedestal, which may be used as mobile terminal for identification, is The no signal being accurately fitted on pedestal.Output unit 150 is configured to provide with vision, audio and/or tactile manner defeated Signal (for example, audio signal, vision signal, alarm signal, vibration signal etc.) out.Output unit 150 may include display Unit 151, audio output module 152, alarm unit 153 etc..
Display unit 151 may be displayed on the information handled in mobile terminal 100.For example, when mobile terminal 100 is in electricity When talking about call mode, display unit 151 can show and converse or other communicate (for example, text messaging, multimedia file Downloading etc.) relevant user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling mode Or when image capture mode, display unit 151 can show captured image and/or received image, show video or figure Picture and the UI or GUI of correlation function etc..
Meanwhile when display unit 151 and trigger board the triggering screen superposed on one another with formation in the form of layer, display unit 151 may be used as input unit and output device.Display unit 151 may include liquid crystal display (LCD), thin film transistor (TFT) In LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc. at least It is a kind of.Some in these displays may be constructed such that transparence to allow user to watch from outside, this is properly termed as transparent Display, typical transparent display can be, for example, TOLED (transparent organic light emitting diode) display etc..According to specific Desired embodiment, mobile terminal 100 may include two or more display units (or other display devices), for example, moving Dynamic terminal may include outernal display unit (not shown) and inner display unit (not shown).Triggering screen can be used for detecting triggering Input pressure and triggering input position and triggering input area.
Audio output module 152 can mobile terminal be in call signal reception pattern, call mode, logging mode, It is when under the isotypes such as speech recognition mode, broadcast reception mode, wireless communication unit 110 is received or in memory 160 The audio data transducing audio signal of middle storage and to export be sound.Moreover, audio output module 152 can provide and movement The relevant audio output of specific function (for example, call signal receives sound, message sink sound etc.) that terminal 100 executes. Audio output module 152 may include sound pick-up, buzzer etc..
Alarm unit 153 can provide output notifying event to mobile terminal 100.Typical event can be with Including calling reception, message sink, key signals input, triggering input etc..Other than audio or video output, alarm unit 153 can provide output in different ways with the generation of notification event.For example, alarm unit 153 can be in the form of vibration Output is provided, when receiving calling, message or some other entrance communications (incoming communication), alarm list Member 153 can provide tactile output (that is, vibration) to notify to user.By providing such tactile output, even if When the mobile phone of user is in the pocket of user, user also can recognize that the generation of various events.Alarm unit 153 The output of the generation of notification event can be provided via display unit 151 or audio output module 152.
Memory 160 can store the software program etc. of the processing and control operation that are executed by controller 180, Huo Zheke Temporarily to store oneself data (for example, telephone directory, message, still image, video etc.) through exporting or will export.And And memory 160 can store about the vibration and audio signal for being applied to the various modes exported when triggering is shielded when triggering Data.
Memory 160 may include the storage medium of at least one type, and the storage medium includes flash memory, hard disk, more Media card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access storage Device (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc..Moreover, mobile terminal 100 can execute memory with by network connection The network storage device of 160 store function cooperates.
The overall operation of the usually control mobile terminal of controller 180.For example, controller 180 executes and voice communication, data Communication, video calling etc. relevant control and processing.In addition, controller 180 may include for reproducing (or playback) more matchmakers The multi-media module 181 of volume data, multi-media module 181 can construct in controller 180, or can be structured as and control Device 180 separates.Controller 180 can be with execution pattern identifying processing, by the handwriting input executed on triggering screen or picture It draws input and is identified as character or image.
Power supply unit 190 receives external power or internal power under the control of controller 180 and provides operation each member Electric power appropriate needed for part and component.
Various embodiments described herein can be to use the calculating of such as computer software, hardware or any combination thereof Machine readable medium is implemented.Hardware is implemented, embodiment described herein can be by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), scene can Programming gate array (FPGA), controller, microcontroller, microprocessor, is designed to execute function described herein processor At least one of electronic unit is implemented, and in some cases, such embodiment can be implemented in controller 180. For software implementation, the embodiment of such as process or function can with allow to execute the individual of at least one functions or operations Software module is implemented.Software code can by the software application (or program) write with any programming language appropriate Lai Implement, software code can store in memory 160 and be executed by controller 180.
So far, oneself is through describing mobile terminal according to its function.In the following, for the sake of brevity, will description such as folded form, Slide type mobile terminal in various types of mobile terminals of board-type, oscillating-type, slide type mobile terminal etc., which is used as, to be shown Example.Therefore, the present invention can be applied to any kind of mobile terminal, and be not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 may be constructed such that using via frame or grouping send data it is all if any Line and wireless communication device and satellite-based communication device operate.
Referring now to Fig. 2 description communication device that wherein mobile terminal according to the present invention can operate.
Different air interface and/or physical layer can be used in such communication device.For example, used by communication device Air interface includes such as frequency division multiple access (FDMA), time division multiple acess (TDMA), CDMA (CDMA) and universal mobile communications dress Set (UMTS) (particularly, long term evolution (LTE)), global mobile communication device (GSM) etc..As non-limiting example, under The description in face is related to cdma communication device, but such introduction is equally applicable to other types of device.
With reference to Fig. 2, cdma wireless communication device may include multiple mobile terminals 100, multiple base stations (BS) 270, base station Controller (BSC) 275 and mobile switching centre (MSC) 280.MSC280 is configured to and Public Switched Telephony Network (PSTN) 290 form interface.MSC280 is also structured to form interface with the BSC275 that can be couple to base station 270 via back haul link. Back haul link can be constructed according to any in several known interfaces, and the interface includes such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.It will be appreciated that device may include multiple BSC275 as shown in Figure 2.
Each BS270 can service one or more subregions (or region), by multidirectional antenna or the day of direction specific direction Each subregion of line covering is radially far from BS270.Alternatively, each subregion can be by two or more for diversity reception Antenna covering.Each BS270, which may be constructed such that, supports multiple frequency distribution, and the distribution of each frequency has specific frequency spectrum (for example, 1.25MHz, 5MHz etc.).
What subregion and frequency were distributed, which intersects, can be referred to as CDMA Channel.BS270 can also be referred to as base station transceiver Device (BTS) or other equivalent terms.In this case, term " base station " can be used for broadly indicating single BSC275 and at least one BS270.Base station can also be referred to as " cellular station ".Alternatively, each subregion of specific BS270 can be claimed For multiple cellular stations.
As shown in Figure 2, broadcast singal is sent to the mobile terminal operated in the device by broadcsting transmitter (BT) 295 100.Broadcasting reception module 111 as shown in Figure 1 is arranged at mobile terminal 100 to receive the broadcast sent by BT295 Signal.In fig. 2 it is shown that several global pick device (GPS) satellites 300.The help of satellite 300 positions multiple mobile terminals At least one of 100.
In Fig. 2, multiple satellites 300 are depicted, but it is understood that, it can use any number of satellite and obtain Useful location information.GPS module 115 as shown in Figure 1 is generally configured to cooperate with satellite 300 to obtain and desired determine Position information.It substitutes GPS tracking technique or except GPS tracking technique, the position that can track mobile terminal can be used Other technologies.In addition, at least one 300 property of can choose of GPS satellite or extraly processing satellite dmb transmission.
As a typical operation of wireless communication device, BS270 receives the reverse link from various mobile terminals 100 Signal.Mobile terminal 100 usually participates in call, information receiving and transmitting and other types of communication.Certain base station 270 is received each anti- It is handled in specific BS270 to link signal.The data of acquisition are forwarded to relevant BSC275.BSC provides call The mobile management function of resource allocation and the coordination including the soft switching process between BS270.The number that BSC275 will also be received According to MSC280 is routed to, the additional route service for forming interface with PSTN290 is provided.Similarly, PSTN290 with MSC280 forms interface, and MSC and BSC275 form interface, and BSC275 controls BS270 correspondingly with by forward link signals It is sent to mobile terminal 100.
It is circuit diagram of the invention referring to Fig. 3, Fig. 3.
Firstly, pressure sensor is generated by the deformation on mobile terminal and exports corresponding voltage change;
Secondly, signal amplifier amplifies the voltage for the variation that pressure sensor exports;
Then, amplified signal through ADC analog-digital converter be converted into digital signal and export to microprocessor into Row processing;
Finally, the compressing time control corresponding with pressure value generation that microprocessor is different according to corresponding to digital signal Output, the output include: switching signal, the communication bus etc. that interruption, GPIO universal input/output are simulated, wherein communication is total Line can be serial ports, the interfaces such as I2C, SPI, but be not limited to above-mentioned interface.
In the present invention, the quantity of pressure sensor and setting position are unlimited, for example setting is one or more, and setting is moving Shell side, the screen lower section of dynamic terminal, or the back of mobile terminal, the lower section of key are set etc..
Preferably, pressure sensor includes multiple, and is relatively arranged on the shell two sides of mobile terminal respectively, such as Fig. 4 institute Show, it should be noted that be only only intended to illustrate but be not intended to limit the specific setting such as Fig. 4 shown in Fig. 4.
In the present embodiment, the simplicity based on user's operation control selects multiple sensors relative to one biography of selection Control mode corresponding to sensor is more simplified, for example different sequence and combination can be formed between multiple sensors.Together When, the control and adjusting of a variety of different mobile terminal parameters, such as a kind of sensing can also be carried out respectively by multiple sensors Device is used to carry out the adjusting of mobile terminal display parameters, and another kind of sensor is then used to carry out the tune of audio frequency of mobile terminal parameter Section.
Further, to operate and avoiding maloperation convenient for user's simplicity, accordingly the setting of multiple sensors can moved The shell two sides of mobile terminal are arranged in the different location of dynamic terminal, such as shown in Figure 4 respectively corresponding.For example, left side Sensor is used to carry out the adjusting of mobile terminal display parameters, and the sensor on right side is then used to carry out audio frequency of mobile terminal parameter Adjusting.Meanwhile to improve the usage experience of user, user can also be arranged sensor to be triggered according to itself use habit Parameter regulation, for example, user gets used to carrying out the adjusting of mobile terminal brightness in left side, then settable left sensor triggering Carry out brightness regulation;If user gets used to carrying out the adjusting of mobile terminal font, settable right sensor triggering on right side Carry out font adjusting.
Based on above-mentioned mobile terminal hardware configuration, the structure of communication device, the setting structure of circuit diagram, sensor, It is proposed each embodiment of the method for the present invention.
As shown in figure 5, showing a kind of tripper first embodiment of mobile terminal of the present invention.The movement of the embodiment The tripper of terminal includes:
Key Acquisition Module 10, the decryption oprerations triggered for detecting user at mobile terminal back, and according to described Decryption oprerations form Personal Unlocking Key;
In the present embodiment, the type of the mobile terminal can be configured according to actual needs, for example, the mobile terminal can wrap Mobile phone, iPad etc. are included, will use mobile phones as an example be described in detail below.Backside pressure sensing will be preset at the back side of mobile phone Device, for detecting pressure value suffered by mobile phone back.The backside pressure sensor can be distributed in the whole region at mobile phone back, Backside pressure sensor can also be arranged in the specified region at mobile phone back as the case may be, will be sensed below with backside pressure The whole region that device is distributed in mobile phone back is described in detail.
During mobile phone is decrypted, when mobile phone back, pressure sensor detects that user is touched at mobile phone back The decryption oprerations of hair, Key Acquisition Module 10 is using the decryption oprerations as Personal Unlocking Key.The decryption oprerations may include clicking, pressing And the operation such as sliding.
Further, in one embodiment, above-mentioned Key Acquisition Module 10 can include:
A decryption point acquisition submodule, the decryption point triggered at the mobile terminal back for successively obtaining user and its With the connecting line between default origin;
Angle forms submodule, for the frame shape of each connecting line and the specified mobile terminal is angled as solution Lock key.
In the present embodiment, Key Acquisition Module 10 can be formed by by connecting line where obtaining decryption point with a certain frame Angle and obtain Personal Unlocking Key.Specifically, when mobile phone back, pressure sensor detects that user carries out a little in cell phone back radical Hit/pressing operation caused by pressure value when reaching the first preset pressure value, a decryption point acquisition submodule can determine generation first Point is decrypted, which can flexible setting as the case may be.The first solution can be obtained after determining the first decryption point Connecting line between close point and default origin forms certain one side that submodule obtains the connecting line and specified mobile phone by angle Frame is formed by angle.The default origin may be configured as the upper left corner at mobile phone back, the upper right corner, the lower left corner, four of the lower right corner Any one angle in angle, any one where a certain frame of specified mobile phone may be configured as the default origin in frame Frame.Obtain the coordinate points where the position of the first decryption point, and the triangle meter formed according to coordinate points and default origin The frame for calculating connecting line and specified mobile phone is formed by angle.For example, passing through the coordinate points where the position of the first decryption point (x, y), the transverse and longitudinal coordinate and origin that coordinate points can be obtained are formed by right angled triangle, it is known that two right-angle sides can utilize triangle Connecting line where the arc tangent theorem of shape calculates the first decryption point and default origin, is formed by first angle with abscissa, will The a part of the first angle as Personal Unlocking Key.The calculating of angle can also be calculated by other methods, do not limited The present invention.
If in the first prefixed time interval, detect user carry out clicking again at mobile phone back/pressing operation produced When raw pressure value reaches the first preset pressure value, a decryption point acquisition submodule can determine generation the second decryption point, this is first pre- If time interval flexible setting can may be alternatively provided as not limiting for example, may be configured as 3 seconds, 5 minutes etc. as the case may be Time interval.It determines the connecting line that can be obtained after the second decryption point where the second decryption point and default origin, and is formed by angle Submodule according to the coordinate points where the position of the second pass point calculate the connecting line with when encryption specified mobile phone it is a certain Frame (i.e. abscissa) is formed by second angle, using the second angle as a portion of Personal Unlocking Key.Then compare Size relation between first angle and second angle continues to decrypt if meeting default size relation, otherwise, decryption Failure can show the relevant information of decryption failure in mobile phone screen at this time, or pass through voice prompting user.The default size is closed Size relation of the system between angle caused by encryption.If just receiving the second decryption after the first prefixed time interval Point then unlocks failure, or the second decryption point at this time is re-started decryption as the first decryption point.And so on, until Complete the size relation between set each angle.
Further, in another embodiment, above-mentioned Key Acquisition Module 10 is also used to, and obtains user described mobile whole The track characteristic information that end back is triggered forms Personal Unlocking Key according to the track characteristic information.
In the present embodiment, Key Acquisition Module 10 can be formed by track characteristic information as solution by the back in mobile phone Key is locked, track characteristic information may include the information such as the size of track, shape.Specifically, user can be slided at mobile phone back Dynamic operation is to draw the patterns such as circle, triangle, polygon, fork, hook, or writes, when the backside pressure sensor of mobile phone is examined User is measured when mobile phone back carries out slide generation pressure, the track characteristic information of pressure produced by recording, and should Track characteristic information is as Personal Unlocking Key.
Further, maloperation caused by blind operation unlock, above-mentioned key are carried out in order to reduce user at mobile phone back It obtains module 10 to be also used to, shows the information of decryption oprerations in the front display screen of the mobile terminal.
Due to consideration that the posture that user holds carries out after cell phone back during being unlocked under normal circumstances to mobile phone Unlock operation have certain maloperation may, therefore, user can open " front in specified set interface according to their own needs Show the information of decryption oprerations on screen " function assist user to be unlocked.The information of the decryption oprerations can be decryption The position of point, is also possible to sliding trace.In an above-mentioned embodiment, when being unlocked to mobile phone, key is called to obtain mould Block 10 can show that screen shows the corresponding position of each decryption point in the front of mobile phone.I.e. user carries out a little at mobile phone back every time Hit/pressing operation produced by unlock point when, the front screen of mobile phone will successively show it is each unlock point position, can also show Show each unlock point and origin be formed by connecting line, user is facilitated to understand the layout of each decryption point of oneself triggering, with into Row reasonable operation.In above-mentioned another embodiment, when being unlocked to mobile phone, user, which needs to draw in mobile phone dorsal glide, to justify When enclosing, square, or writing, call Key Acquisition Module 10 that will show latticed dot matrix auxiliary in the front screen of mobile phone User draws the graphics track of standard, and trace information caused by display user's operation.
Unlocked state 20, the Personal Unlocking Key for being obtained according to Key Acquisition Module 10 carry out the mobile terminal Unlock.
After above-mentioned Key Acquisition Module 10 obtains Personal Unlocking Key, unlocked state 20 will be according to the Personal Unlocking Key to mobile phone It is unlocked.Further, in one embodiment, above-mentioned 20 unlocked state 20 of unlocked state is also used to, according to the decryption point Size relation between the sequencing and all angles of appearance is unlocked the mobile terminal.
Key Acquisition Module 10 is obtaining user after the formed Personal Unlocking Key of decryption point that mobile phone back is triggered, unlock Module 20 according to decryption point occur a sequencing, when above-mentioned click/pressing decryption point number and each decryption point with Connecting line between default origin is formed by angle with the frame of specified mobile phone, meets each angle set when encryption When size relation between degree, mobile phone is unlocked successfully, otherwise, unlock failure.
It is illustrated below, as shown in Figure 6, it is assumed that using the lower right corner at mobile phone back as origin, where origin The boundary frame area of mobile phone is abscissa, and is provided with four pass points in encryption.User, can be at mobile phone back when being unlocked In arbitrarily click choose one o'clock as first decryption point.Cell phone system will be according to first decryption point and origin institute at this time The first connecting line back is distinguished into two parts, and is calculated between abscissa and the first connecting line first angle a1.At the same time, can default second decryption point according to the regular cell phone system of encryption should click/press half of area on back Domain, if second decryption point of user's click/pressing is can to continue to unlock in upper half area, and be calculated first The second connecting line where a decryption point and origin, the second angle a2 between abscissa, and meet a2 > a1.If user Second decryption point of click/pressing at this time is in lower half region, then a1 > a2, determines unlock failure.Second decryption point just In the case where really, mobile phone back is divided into three regions.And so on, user continues to click/press according to preset sequence Any position in the prescribed limit of mobile phone back is pressed, is meeting a1 < a2, unlock can be smoothly completed after a3 < a1, a1 < a4 < a2. Sensitivity of the present embodiment in view of manpower at back is obviously poorer than in front-operated, is solved using the determination of angular dimension relationship Lock, has Position Approximate is sympathetic can easily unlock without accurately clicking.
Further, in another embodiment, Key Acquisition Module 10 is in the rail for obtaining user and being triggered at mobile phone back After the formed Personal Unlocking Key of mark, as long as unlocked state 20 verifies the shape feature in the track and meets track set when encryption Shape feature it is consistent, mobile phone can be unlocked successfully, and the size and location etc. of track are not required.For example, with Family can draw the circle that radius is 1 centimetre or draw the circle that radius is 2 centimetres and can be carried out unlocking at mobile phone back.It is understood that It is that when trajectory shape can also be arranged according to actual needs to meet similarity arrival preset threshold, can be unlocked.The preset threshold Can flexible setting as the case may be, for example, may be configured as 90%.The present embodiment is solved using the determination of the shape of track Lock, has approximate shape is sympathetic can easily unlock without accurately sliding.
Further, set each when user has forgotten based on encryption in order to prevent in an above-mentioned embodiment Size relation between angle and can not be unlocked, user can be arranged in specified set interface when the errors number of unlock reach When to preset times, after inputting correct user name and password, the position of each pass point produced when encryption can be shown, Or the pre-set unlock prompt of display user.The preset times can flexible setting as the case may be, for example, default time Number may be configured as 6 times.When user, which carries out 6 times, decrypts all failed, it will the input dialogue frame of display user name and password, when After user inputs correct user name and password, the position of each pass point produced when encryption can be shown, to prompt user It carries out correct to unlock operation.It realizes and is designed using mobile phone back pressure sensor, pass through the difference at mobile phone back Angle carries out preset click/pressing operation, achievees the purpose that be unlocked after cell phone back, promotes user and unlocks impression.? In above-mentioned another embodiment, user has forgotten based on set trajectory shape when encrypting and can not solve in order to prevent Lock, user can be arranged in specified set interface when the errors number of unlock reaches 3 times or other numbers, correct by inputting User name and password after, can show the trajectory shape being arranged when encryption, can also show that user presets trajectory shape pair The name answered is referred to as unlocking prompt, allows users to carry out correct to unlock operation.It realizes and utilizes mobile phone back pressure sensing Device is designed, and is unlocked after cell phone back, is promoted user and is unlocked impression.
The decryption oprerations that the embodiment of the present invention is triggered by detecting user at mobile phone back, and formed according to decryption oprerations Personal Unlocking Key.Then mobile phone is unlocked according to the Personal Unlocking Key.Realize using mobile phone back pressure sensor, by Mobile phone back carries out blind operation, does not have to accurate click, size relation or trajectory shape according only to angle can be solved easily Lock.And decryption point can not be shown in the display screen of mobile phone, improve the safety and convenience being unlocked to mobile phone.
Further, as shown in fig. 7, being based on above-mentioned first embodiment, in the present embodiment, the unlock of above-mentioned mobile terminal is filled It sets further include:
Angle obtains module 30, after entering specified encryption set interface in the mobile terminal, obtains user and exists The first pass point and its first connecting line between the default origin that the mobile terminal back is triggered, and obtain institute The frame for stating the first connecting line and the specified mobile terminal is formed by first angle;
User is obtained in the second pass point that the mobile terminal back is triggered and its between the default origin Second connecting line, and the frame for obtaining second connecting line and the specified mobile terminal is formed by second angle;
Encrypting module 40, for recording the size relation between the first angle and the second angle, and so on, After the angle for obtaining predetermined number, the size between all angles is successively recorded according to the sequencing that pass point occurs and is closed System, to be formed and the matched cryptographic keys of the Personal Unlocking Key.
When mobile phone enters specified encryption set interface, when the backside pressure sensor of mobile phone detects user in mobile phone When the first pass point that back is triggered reaches the second preset pressure value, angle obtains module 30 and obtains the first pass point and preset The frame of connecting line and the connecting line and specified mobile phone between origin is formed by first angle.It should be noted that this Default origin in embodiment is consistent with default origin mentioned above, which may be configured as and above-mentioned One preset pressure value is consistent, may be alternatively provided as inconsistent, carries out flexible setting according to actual needs.
When backside pressure sensor is in the second prefixed time interval, user is triggered at mobile phone back second is detected When pass point reaches the second preset pressure value, angle obtains the connection between the second pass point of acquisition of module 30 and default origin The frame of line and the connecting line and specified mobile phone is formed by second angle, and records between first angle and second angle Size relation.Second prefixed time interval may be configured as consistent with the first above-mentioned prefixed time interval, may be alternatively provided as not Unanimously, flexible setting is carried out according to actual needs.The rest may be inferred, after the setting for completing predetermined number pass point, encrypting module 40 successively records the size pass between all angles corresponding with each pass point according to the sequencing that pass point occurs System forms cryptographic keys.
It is illustrated below, as shown in Fig. 8 to Figure 13, when carrying out encryption setting, control mobile phone enters finger The upper left corner, the upper right corner, the lower left corner, the bottom right at mobile phone back can be arranged in fixed encryption set interface, user as the case may be Wherein any one angle in four angles at angle is as origin, for example, selecting the vertex in the lower right corner for origin in Fig. 8.Then it selects For boundary frame area where selecting origin as abscissa, left frame is as ordinate, certainly, can also be according to the original of cell phone system default setting Point and transverse and longitudinal coordinate select to be arranged without user.
During encrypting setting, pass point position is shown in the screen of mobile phone, it is to be arranged that origin and mobile phone is following For frame is as abscissa, user can click/press a point in any position at back in Fig. 9, when mobile phone backside pressure passes When sensor detects that the pressure value of the point reaches the second preset pressure value, angle encrypting module 30 can determine this o'clock as first Pass point, first pass point and the first connecting line where origin are mobile phone back portion at two parts up and down at this time.So Angle encrypting module 30 is formed according to the coordinate points where the position of the first pass point by the transverse and longitudinal coordinate and origin of coordinate points afterwards Right angled triangle in, it is known that two articles of right-angle sides can calculate the first connecting line using arc tangent theorem and abscissa be formed by the One angle a1, as shown in Figure 10.After determining first pass point, in the second prefixed time interval, in upper and lower two parts It selects a region and at will chooses second pass point.Determine second in Figure 11 in upper region by angle encrypting module 30 Pass point, back is divided into three regions by two pass points and origin at this time, and second encryption is calculated with same method The angle that point and abscissa generate is a2, and cell phone system calls encrypting module 40 to record a1 < a2 at this time.If in the second preset time Second pass point is not chosen also in interval, then failed encryption, and prompt user.It should be noted that when the first pass point with Second pass point on the same line when, prompt failed encryption.
After determining second pass point, then arbitrarily select a little to incite somebody to action as third pass point in three new regions Mobile phone back portion is four regions, and as shown in figure 12, the angle that third pass point and abscissa generate is a3, at this time mobile phone system System calls encrypting module 40 to record a3 < a1.And so on, it can continue to select pass point to be added in the region branched away Close, Figure 13 is the example of an encrypted result, is provided with 4 pass points, and the angle that the 4th pass point and abscissa generate is A4, system calls encrypting module 40 to record a1 < a4 < a2 at this time.It is understood that theoretically have unlimited encryption possibility, User can also have at least that 3 to 6 pass points are encrypted according to mobile phone size and the use habit of user in practice, can also Flexible setting as the case may be does not limit the present invention.Specifically, during mobile phone cipher, in the point of user each time When hitting/press mobile phone back generation pass point, each pressing position angle generated is recorded, and record angle in sequence Between size relation, i.e. a1 < a2, a3 < a1, a1 < a4 < a2 can click/press according to user so that user is when unlocking mobile phone The position of pressure carrys out instant computing and generates the angle of angle, and verifies above-mentioned size relation in order, can be smooth after being verified Unlock.
It is understood that when user is during the mobile phone used, it can be right according to oneself hobby and use habit The angular relationship for completing each pass point of encryption is updated.After entering specified encryption and updating interface, mode one: input Pass point originally, on the basis of existing pass point, selection " addition pass point " can click/pressing one in arbitrary region A or multiple pass points are added.Mode two: inputting original pass point, and on the basis of existing pass point, selection " is deleted Except pass point ", one or more of which pass point can be clicked and deleted.Mode three: after inputting original pass point, clearly Empty original pass point, user need to redefine each pass point.The mode of above-mentioned update encryption is only specific embodiment It enumerates, the mode for other updates encryption that those skilled in the art propose is within the scope of the invention.
Above-mentioned cipher mode is added by appearance sequence between recording of encrypted point and the angular relationship to correspond to each other It is close, as long as having certain space and distance perception, specific encryption click/pressing position is not required, is highly suitable for The progress of mobile phone back is blind to be operated with, and is unlocked operation according to nine grids scheduled on mobile phone screen without stringent, Improve unlock experience.
Accordingly, a kind of mobile terminal of the present invention is proposed, which includes the unlock of the mobile terminal of above structure Device includes Key Acquisition Module 10, unlocked state 20, angle acquisition module 30, encrypting module 40, wherein key obtains Module 10 includes decryption point acquisition submodule and angle forms submodule, which can be mobile phone, iPad etc..
Accordingly, as shown in figure 14, a kind of unlocking method first embodiment of mobile terminal of the present invention is proposed.The embodiment The unlocking method of mobile terminal include:
Step S10, the decryption oprerations that detection user is triggered at mobile terminal back, and formed according to the decryption oprerations Personal Unlocking Key;
In the present embodiment, the type of the mobile terminal can be configured according to actual needs, for example, the mobile terminal can wrap Mobile phone, iPad etc. are included, will use mobile phones as an example be described in detail below.Backside pressure sensing will be preset at the back side of mobile phone Device, for detecting pressure value suffered by mobile phone back.The backside pressure sensor can be distributed in the whole region at mobile phone back, Backside pressure sensor can also be arranged in the specified region at mobile phone back as the case may be, will be sensed below with backside pressure The whole region that device is distributed in mobile phone back is described in detail.
During mobile phone is decrypted, when mobile phone back, pressure sensor detects that user is touched at mobile phone back The decryption oprerations of hair, using the decryption oprerations as Personal Unlocking Key.The decryption oprerations may include the operation such as clicking, pressing and slide.
Further, in one embodiment, above-mentioned steps S10 can include: successively obtain user and carried on the back in the mobile terminal The decryption point and its connecting line between default origin that portion is triggered;By the side of each connecting line and the specified mobile terminal Frame forms angle as Personal Unlocking Key.
In the present embodiment, angle can be formed by with a certain frame by a connecting line where obtaining decryption point and be unlocked Key.Specifically, when mobile phone back pressure sensor detect user click in cell phone back radical/pressing operation produced When raw pressure value reaches the first preset pressure value, it may be determined that generate the first decryption point, which can be according to tool Body situation and flexible setting.Available first decryption is put and the connecting line between default origin, acquisition after determining the first decryption point The a certain frame of the connecting line and specified mobile phone is formed by angle.The default origin may be configured as the upper left at mobile phone back Angle, the upper right corner, the lower left corner, the lower right corner four angles in any one angle, a certain frame of specified mobile phone may be configured as Any one frame where the default origin in frame.
Then the coordinate points where the position of the first decryption point, and the triangle formed according to coordinate points and default origin are obtained Shape calculates connecting line and the frame of specified mobile phone is formed by angle.Pass through the coordinate points where the position of the first decryption point (x, y), the transverse and longitudinal coordinate and origin that coordinate points can be obtained are formed by right angled triangle, it is known that two right-angle sides can utilize triangle Connecting line where the arc tangent theorem of shape calculates the first decryption point and default origin, is formed by first angle with abscissa, will The a part of the first angle as Personal Unlocking Key.The calculating of angle can also be calculated by other methods, do not limited The present invention.
If in the first prefixed time interval, detect user carry out clicking again at mobile phone back/pressing operation produced When raw pressure value reaches the first preset pressure value, it may be determined that generate the second decryption point, which can basis Concrete condition and flexible setting may be alternatively provided as not limiting time interval for example, may be configured as 3 seconds, 5 minutes etc..Determine second The connecting line where the second decryption point and default origin can be obtained after decryption point, and according to the seat where the position of the second pass point The a certain frame (i.e. abscissa) of punctuate mobile phone specified when calculating the connecting line and encryption is formed by second angle, by this The a portion of second angle as Personal Unlocking Key.Then compare the size relation between first angle and second angle, if Meet default size relation, then continue to decrypt, otherwise, decryption failure can show decryption failure in mobile phone screen at this time Relevant information, or pass through voice prompting user.The default size relation is the size relation encrypted between generated angle. If just receiving the second decryption point after the first prefixed time interval, failure is unlocked, or second at this time is decrypted into point Decryption is re-started as the first decryption point.And so on, until completing the size relation between set each angle.
Further, in another embodiment, above-mentioned steps S10 can include: obtain user at the mobile terminal back The track characteristic information triggered forms Personal Unlocking Key according to the track characteristic information.
In the present embodiment, track characteristic information can be formed by by the back in mobile phone as Personal Unlocking Key, track is special Reference breath may include the information such as size, the shape of track.Specifically, user can carry out slide at mobile phone back to draw circle The patterns such as shape, triangle, polygon, fork, hook, or write, when the backside pressure sensor of mobile phone detects user in mobile phone When back carries out slide generation pressure, the track characteristic information of pressure produced by recording, and the track characteristic information is made For Personal Unlocking Key.
Further, maloperation caused by blind operation unlock, above-mentioned steps are carried out in order to reduce user at mobile phone back S10 can include: show the information of decryption oprerations in the front display screen of the mobile terminal.
Due to consideration that the posture that user holds carries out after cell phone back during being unlocked under normal circumstances to mobile phone Unlock operation have certain maloperation may, therefore, user can open " front in specified set interface according to their own needs Show the information of decryption oprerations on screen " function assist user to be unlocked.The information of the decryption oprerations can be decryption The position of point, is also possible to sliding trace.It is aobvious in the front of mobile phone when being unlocked to mobile phone in an above-mentioned embodiment Display screen curtain shows the corresponding position of each decryption point.I.e. user click at mobile phone back every time/pressing operation produced by solution When lock point, the position of each unlock point will be successively shown in the front screen of mobile phone, can also show each unlock point and origin It is formed by connecting line, facilitates user to understand the layout of each decryption point of oneself triggering, to carry out reasonable operation.Above-mentioned another In one embodiment, when being unlocked to mobile phone, user needs to draw circle, square in mobile phone dorsal glide, or when writing, The front screen of mobile phone will show that latticed dot matrix auxiliary user draws the graphics track of standard, and display user's operation institute The trace information of generation.
Step S20, the mobile terminal is unlocked according to the Personal Unlocking Key.
It is above-mentioned obtain Personal Unlocking Key after, it will mobile phone is unlocked according to the Personal Unlocking Key.Further, real one It applies in example, above-mentioned steps S20 can include: the size relation between sequencing and all angles occurred according to the decryption point The mobile terminal is unlocked.
User is being obtained after the formed Personal Unlocking Key of decryption point that mobile phone back is triggered, the elder generation occurred according to decryption point Sequence afterwards, the connecting line between the number and each decryption point and default origin of the decryption point of above-mentioned click/pressing, with The frame of specified mobile phone is formed by angle, when meeting the size relation between all angles set when encryption, opponent Machine unlocks successfully, otherwise, unlock failure.
It is illustrated below, as shown in Figure 6, it is assumed that using the lower right corner at mobile phone back as origin, where origin The boundary frame area of mobile phone is abscissa, and is provided with four pass points in encryption.User, can be at mobile phone back when being unlocked In arbitrarily click choose one o'clock as first decryption point.Cell phone system will be according to first decryption point and origin institute at this time The first connecting line back is distinguished into two parts, and is calculated between abscissa and the first connecting line first angle a1.At the same time, can default second decryption point according to the regular cell phone system of encryption should click/press half of area on back Domain, if second decryption point of user's click/pressing is can to continue to unlock in upper half area, and be calculated first The second connecting line where a decryption point and origin, the second angle a2 between abscissa, and meet a2 > a1.If user Second decryption point of click/pressing at this time is in lower half region, then a1 > a2, determines unlock failure.Second decryption point just In the case where really, mobile phone back is divided into three regions.And so on, user continues to click/press according to preset sequence Any position in the prescribed limit of mobile phone back is pressed, is meeting a1 < a2, unlock can be smoothly completed after a3 < a1, a1 < a4 < a2. Sensitivity of the present embodiment in view of manpower at back is obviously poorer than in front-operated, is solved using the determination of angular dimension relationship Lock, has Position Approximate is sympathetic can easily unlock without accurately clicking.
Further, in another embodiment, obtain user the track that mobile phone back is triggered formed unlock it is close It, can be to mobile phone solution as long as the shape feature that the shape feature in the track meets track set when encryption is consistent after key It locks successfully, and the size and location etc. of track is not required.For example, it is 1 centimetre that user, which can draw radius at mobile phone back, Circle or to draw radius be that 2 centimetres of circle can be carried out unlocking.It is understood that track shape can also be arranged according to actual needs When shape meets similarity arrival preset threshold, it can be unlocked.The preset threshold can flexible setting as the case may be, example Such as, it may be configured as 90%.The present embodiment is unlocked using the determination of the shape of track, has approximate shape without accurately sliding It is sympathetic easily to unlock.
Further, set each when user has forgotten based on encryption in order to prevent in an above-mentioned embodiment Size relation between angle and can not be unlocked, user can be arranged in specified set interface when the errors number of unlock reach When to preset times, after inputting correct user name and password, the position of each pass point produced when encryption can be shown, Or the pre-set unlock prompt of display user.The preset times can flexible setting as the case may be, for example, default time Number may be configured as 6 times.When user, which carries out 6 times, decrypts all failed, it will the input dialogue frame of display user name and password, when After user inputs correct user name and password, the position of each pass point produced when encryption can be shown, to prompt user It carries out correct to unlock operation.It realizes and is designed using mobile phone back pressure sensor, pass through the difference at mobile phone back Angle carries out preset click/pressing operation, achievees the purpose that be unlocked after cell phone back, promotes user and unlocks impression.? In above-mentioned another embodiment, user has forgotten based on set trajectory shape when encrypting and can not solve in order to prevent Lock, user can be arranged in specified set interface when the errors number of unlock reaches 3 times or other numbers, correct by inputting User name and password after, can show the trajectory shape being arranged when encryption, can also show that user presets trajectory shape pair The name answered is referred to as unlocking prompt, allows users to carry out correct to unlock operation.It realizes and utilizes mobile phone back pressure sensing Device is designed, and is unlocked after cell phone back, is promoted user and is unlocked impression.
The decryption oprerations that the embodiment of the present invention is triggered by detecting user at mobile phone back, and formed according to decryption oprerations Personal Unlocking Key.Then mobile phone is unlocked according to the Personal Unlocking Key.Realize using mobile phone back pressure sensor, by Mobile phone back carries out blind operation, does not have to accurate click, size relation or trajectory shape according only to angle can be solved easily Lock.And decryption point can not be shown in the display screen of mobile phone, improve the safety and convenience being unlocked to mobile phone.
Further, as shown in figure 15, above-mentioned first embodiment, in the present embodiment, the unlock of above-mentioned mobile terminal are based on Method further include:
Step S30, after entering specified encryption set interface in the mobile terminal, user is obtained in the mobile terminal The first pass point and its first connecting line between the default origin that back is triggered, and obtain first connecting line First angle is formed by with the frame of the specified mobile terminal;
Step S40, obtain the second pass point that user is triggered at the mobile terminal back and its with the default original The second connecting line between point, and the frame for obtaining second connecting line and the specified mobile terminal is formed by second Angle;
Step S50, the size relation between the first angle and the second angle is recorded, and so on, it is obtaining After the angle of predetermined number, the size relation between all angles is successively recorded according to the sequencing that pass point occurs, with shape At with the matched cryptographic keys of the Personal Unlocking Key.
When mobile phone enters specified encryption set interface, when the backside pressure sensor of mobile phone detects user in mobile phone When the first pass point that back is triggered reaches the second preset pressure value, the connection between the first pass point and default origin is obtained The frame of line and the connecting line and specified mobile phone is formed by first angle.It should be noted that default in the present embodiment Origin is consistent with default origin mentioned above, which may be configured as and the first above-mentioned preset pressure value one It causes, may be alternatively provided as inconsistent, carry out flexible setting according to actual needs.
When backside pressure sensor is in the second prefixed time interval, user is triggered at mobile phone back second is detected When pass point reaches the second preset pressure value, obtain connecting line between the second pass point and default origin and the connecting line with The frame of specified mobile phone is formed by second angle, and records the size relation between first angle and second angle.Second Prefixed time interval may be configured as it is consistent with the first above-mentioned prefixed time interval, may be alternatively provided as it is inconsistent, according to practical need Carry out flexible setting.The rest may be inferred, after the setting for completing predetermined number pass point, according to the sequencing of pass point appearance The size relation successively recorded between all angles corresponding with each pass point forms cryptographic keys.
It is illustrated below, as shown in Fig. 8 to Figure 13, when carrying out encryption setting, control mobile phone enters finger The upper left corner, the upper right corner, the lower left corner, the bottom right at mobile phone back can be arranged in fixed encryption set interface, user as the case may be Wherein any one angle in four angles at angle is as origin, for example, selecting the vertex in the lower right corner for origin in Fig. 8.Then it selects For boundary frame area where selecting origin as abscissa, left frame is as ordinate, certainly, can also be according to the original of cell phone system default setting Point and transverse and longitudinal coordinate select to be arranged without user.
During encrypting setting, pass point position is shown in the screen of mobile phone, it is to be arranged that origin and mobile phone is following For frame is as abscissa, user can click/press a point in any position at back in Fig. 9, when mobile phone backside pressure passes When sensor detects that the pressure value of the point reaches the second preset pressure value, it may be determined that this o'clock as first pass point, at this time The first connecting line where one pass point and origin is mobile phone back portion at two parts up and down.Then according to the first encryption Coordinate points where the position of point, by the transverse and longitudinal coordinate and the right angled triangle that is formed of origin of coordinate points, it is known that two right angles Side can calculate the first connecting line using arc tangent theorem and abscissa is formed by first angle a1, as shown in Figure 10.In determination After first pass point, in the second prefixed time interval, a region is selected in upper and lower two parts and at will chooses second A pass point.Second pass point is chosen in Figure 11 in upper region, back is divided into three by two pass points and origin at this time Region, it is a2 that the angle that second pass point and abscissa generate, which is calculated, with same method, and cell phone system records at this time a1<a2.If not choosing second pass point, failed encryption also in the second prefixed time interval, and prompt user.It needs It is bright, when the first pass point and the second pass point on the same line when, prompt failed encryption.
After determining second pass point, then arbitrarily select a little to incite somebody to action as third pass point in three new regions Mobile phone back portion is four regions, and as shown in figure 12, the angle that third pass point and abscissa generate is a3, at this time mobile phone system System record a3 < a1.And so on, it can continue to select pass point to be encrypted in the region branched away, Figure 13 is one and adds The example of close result is provided with 4 pass points, and the angle that the 4th pass point and abscissa generate is a4, and system records at this time a1<a4<a2.It is understood that theoretically there is unlimited encryption possibility, user can be according to mobile phone size and user in practice Use habit can also have at least that 3 to 6 pass points are encrypted, can also flexible setting as the case may be, and it is unlimited The fixed present invention.Specifically, during mobile phone cipher, when user each time clicks/presses mobile phone back and generates pass point, note Record each pressing position angle generated, and the size relation between record angle in sequence, i.e. a1 < a2, a3 < a1, A1 < a4 < a2 can generate the angle of angle so that user is when unlocking mobile phone according to user's click/pressing position come instant computing Degree, and above-mentioned size relation is verified in order, it can smoothly be unlocked after being verified.
It is understood that when user is during the mobile phone used, it can be right according to oneself hobby and use habit The angular relationship for completing each pass point of encryption is updated.After entering specified encryption and updating interface, mode one: input Pass point originally, on the basis of existing pass point, selection " addition pass point " can click/pressing one in arbitrary region A or multiple pass points are added.Mode two: inputting original pass point, and on the basis of existing pass point, selection " is deleted Except pass point ", one or more of which pass point can be clicked and deleted.Mode three: after inputting original pass point, clearly Empty original pass point, user need to redefine each pass point.The mode of above-mentioned update encryption is only specific embodiment It enumerates, the mode for other updates encryption that those skilled in the art propose is within the scope of the invention.
Above-mentioned cipher mode is added by appearance sequence between recording of encrypted point and the angular relationship to correspond to each other It is close, as long as having certain space and distance perception, specific encryption click/pressing position is not required, is highly suitable for The progress of mobile phone back is blind to be operated with, and is unlocked operation according to nine grids scheduled on mobile phone screen without stringent, Improve unlock experience.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal device (can be mobile phone, computer, clothes Business device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of tripper of mobile terminal, which is characterized in that the tripper of the mobile terminal includes:
Key Acquisition Module, the decryption oprerations triggered for detecting user at mobile terminal back, and grasped according to the decryption Form Personal Unlocking Key;
Unlocked state, the Personal Unlocking Key for being obtained according to Key Acquisition Module are unlocked the mobile terminal;
Wherein, the Key Acquisition Module includes:
A decryption point acquisition submodule, the decryption point triggered at the mobile terminal back for successively obtaining user and its with it is pre- If the connecting line between origin;
Angle forms submodule, close as unlocking for being at an angle of the frame shape of each connecting line and the specified mobile terminal Key;
The unlocked state is also used to, the size relation pair between sequencing and all angles occurred according to the decryption point The mobile terminal is unlocked.
2. the tripper of mobile terminal as described in claim 1, which is characterized in that the tripper of the mobile terminal is also Include:
Angle obtains module, after entering specified encryption set interface in the mobile terminal, obtains user in the shifting The first pass point and its first connecting line between the default origin that dynamic terminal back is triggered, and obtain described first The frame of connecting line and the specified mobile terminal is formed by first angle;
Obtain user the second pass point that the mobile terminal back is triggered and its between the default origin second Connecting line, and the frame for obtaining second connecting line and the specified mobile terminal is formed by second angle;
Encrypting module, for recording the size relation between the first angle and the second angle, and so on, it is obtaining After the angle of predetermined number, the size relation between all angles is successively recorded according to the sequencing that pass point occurs, with shape At with the matched cryptographic keys of the Personal Unlocking Key.
3. the tripper of mobile terminal as described in claim 1, which is characterized in that the Key Acquisition Module is also used to, The track characteristic information that user is triggered at the mobile terminal back is obtained, it is close to form unlock according to the track characteristic information Key.
4. the tripper of mobile terminal as claimed any one in claims 1 to 3, which is characterized in that the key obtains Module is also used to, and shows the information of decryption oprerations in the front display screen of the mobile terminal.
5. a kind of mobile terminal, which is characterized in that the mobile terminal includes moving according to any one of claims 1 to 4 The tripper of dynamic terminal.
6. mobile terminal as claimed in claim 5, which is characterized in that the mobile terminal is mobile phone or iPad.
7. a kind of unlocking method of mobile terminal, which is characterized in that the unlocking method of the mobile terminal the following steps are included:
The decryption oprerations that detection user is triggered at mobile terminal back, and Personal Unlocking Key is formed according to the decryption oprerations;
The mobile terminal is unlocked according to the Personal Unlocking Key;
Wherein, the decryption oprerations that the detection user is triggered at mobile terminal back, and formed and solved according to the decryption oprerations Locking key includes:
It successively obtains user and decrypts point and its connecting line between default origin what the mobile terminal back was triggered;
The frame shape of each connecting line and the specified mobile terminal is angled as Personal Unlocking Key;
Described be unlocked according to the Personal Unlocking Key to the mobile terminal include:
The size relation between sequencing and all angles occurred according to the decryption point solves the mobile terminal Lock.
8. the unlocking method of mobile terminal as claimed in claim 7, which is characterized in that include: before executing all steps
After entering specified encryption set interface in the mobile terminal, obtain what user was triggered at the mobile terminal back First pass point and its first connecting line between the default origin, and obtain first connecting line with it is specified described The frame of mobile terminal is formed by first angle;
Obtain user the second pass point that the mobile terminal back is triggered and its between the default origin second Connecting line, and the frame for obtaining second connecting line and the specified mobile terminal is formed by second angle;
The size relation between the first angle and the second angle is recorded, and so on, at the angle for obtaining predetermined number After degree, the size relation between all angles is successively recorded according to the sequencing that pass point occurs, to be formed and the unlock The cryptographic keys of cipher key match.
9. the unlocking method of mobile terminal as claimed in claim 7, which is characterized in that it is described according to the Personal Unlocking Key to institute It states mobile terminal and is unlocked and include:
The track characteristic information that user is triggered at the mobile terminal back is obtained, is formed and is solved according to the track characteristic information Lock key.
10. the unlocking method of mobile terminal as claimed in any one of claims 7-9, which is characterized in that the detection user In the decryption oprerations that mobile terminal back is triggered, and Personal Unlocking Key is formed according to the decryption oprerations and includes:
The information of decryption oprerations is shown in the front display screen of the mobile terminal.
CN201510624550.5A 2015-09-25 2015-09-25 Unlocking method, device and the mobile terminal of mobile terminal Active CN105208210B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510624550.5A CN105208210B (en) 2015-09-25 2015-09-25 Unlocking method, device and the mobile terminal of mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510624550.5A CN105208210B (en) 2015-09-25 2015-09-25 Unlocking method, device and the mobile terminal of mobile terminal

Publications (2)

Publication Number Publication Date
CN105208210A CN105208210A (en) 2015-12-30
CN105208210B true CN105208210B (en) 2019-01-25

Family

ID=54955628

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510624550.5A Active CN105208210B (en) 2015-09-25 2015-09-25 Unlocking method, device and the mobile terminal of mobile terminal

Country Status (1)

Country Link
CN (1) CN105208210B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106384032A (en) * 2016-09-29 2017-02-08 努比亚技术有限公司 Unlocking method and apparatus for terminal
CN106445148A (en) * 2016-09-29 2017-02-22 努比亚技术有限公司 Method and device for triggering terminal application
CN109753786A (en) * 2018-12-29 2019-05-14 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN111428222A (en) * 2020-03-19 2020-07-17 闻泰通讯股份有限公司 Gesture control method and device of mobile terminal, mobile terminal and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101634925A (en) * 2008-07-22 2010-01-27 联想移动通信科技有限公司 Method for unlocking keypad through gestures
CN101984384B (en) * 2010-10-27 2012-11-14 大连工业大学 Mobile terminal and design method of operation and control technology thereof
US8941601B2 (en) * 2011-04-21 2015-01-27 Nokia Corporation Apparatus and associated methods
CN103186333B (en) * 2011-12-28 2018-05-22 深圳富泰宏精密工业有限公司 Electronic equipment unlocking system and method
CN103186340B (en) * 2012-01-02 2017-07-28 深圳富泰宏精密工业有限公司 Electronic equipment unlocking system and method

Also Published As

Publication number Publication date
CN105208210A (en) 2015-12-30

Similar Documents

Publication Publication Date Title
CN104899494B (en) Method of controlling operation thereof and mobile terminal based on multifunction push key
CN104915582B (en) unlocking method and device
CN104808944B (en) Touch operation inducing method and device
CN105160264B (en) Photo encryption device and method
CN106231087B (en) A kind of method and apparatus of front and back sides dual-screen display device false-touch prevention
CN104915119B (en) Terminal desktop icon method of adjustment and device
CN105094532B (en) Data access method and device
CN104898959B (en) A kind of method and apparatus for adjusting virtual push button position
CN105242847B (en) Mobile terminal and its quickly starting method of application
CN105138874B (en) Unlocking screen control device and method
CN105187642B (en) The device and method of fast dialing telephone in the state of the lock screen
CN104636030B (en) Method and device for starting application programs and mobile terminal
CN104618605B (en) Mobile terminal locating method and device
CN105095708B (en) A kind of unlocking method and device of mobile terminal
CN105208210B (en) Unlocking method, device and the mobile terminal of mobile terminal
CN104915063B (en) The method and apparatus for controlling intelligent terminal
CN105118201A (en) Mobile terminal theft prevention method and device
CN106843724A (en) A kind of mobile terminal screen anti-error-touch device and method, mobile terminal
CN105138880B (en) The processing unit and method of terminal operation data
CN104735254B (en) terminal screen locking method and system
CN105049582B (en) A kind of save set of calling record, method and display methods
CN104820797B (en) Using the management method and device of account
CN109240579A (en) A kind of touch operation method, equipment and computer can storage mediums
CN105117638B (en) Tripper and method
CN109542317A (en) A kind of display control method, equipment and the storage medium of double-sided screen mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant