CN105630277B - Unlocking screen method and tripper for terminal - Google Patents

Unlocking screen method and tripper for terminal Download PDF

Info

Publication number
CN105630277B
CN105630277B CN201510297024.2A CN201510297024A CN105630277B CN 105630277 B CN105630277 B CN 105630277B CN 201510297024 A CN201510297024 A CN 201510297024A CN 105630277 B CN105630277 B CN 105630277B
Authority
CN
China
Prior art keywords
operating system
operator
terminal
unlock
authorized user
Prior art date
Application number
CN201510297024.2A
Other languages
Chinese (zh)
Other versions
CN105630277A (en
Inventor
聂道聪
Original Assignee
南京酷派软件技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南京酷派软件技术有限公司 filed Critical 南京酷派软件技术有限公司
Priority to CN201510297024.2A priority Critical patent/CN105630277B/en
Publication of CN105630277A publication Critical patent/CN105630277A/en
Application granted granted Critical
Publication of CN105630277B publication Critical patent/CN105630277B/en

Links

Abstract

The present invention provides a kind of unlocking screen method and tripper for terminal, the terminal includes the first operating system and the second operating system, the unlocking screen method, including:In the instruction that the locked screen received to the terminal is unlocked, identify whether the operator of the terminal is authorized user;If recognizing the operator is the authorized user, display corresponds to the unlock interface of first operating system and the unlock interface corresponding to second operating system simultaneously;If recognizing the operator not is the authorized user, only display corresponds to the unlock interface of first operating system.The present invention shows different unlock interfaces according to the identity of terminal operator; avoid the unlock interface shown to all operators corresponding to two operating system; cause unauthorized user to know the presence of secure operating system and maliciously obtain the data in secure operating system, is effectively protected the safety of data in secure operating system.

Description

Unlocking screen method and tripper for terminal

Technical field

The present invention relates to field of terminal technology, in particular to a kind of unlocking screen method and one kind for terminal Screen unlocking device for terminal.

Background technique

With the development of terminal technology, the mobile terminal configured with dual operating systems (such as smart phone, tablet computer) It is more and more.

Currently, the unlock scheme for dual operating systems terminal mainly includes the following three types mode:

Mode one:As shown in Figure 1A, the screen of terminal is divided into two parts up and down, the unlock corresponding to secure operating system Interface 104 and unlock interface 102 corresponding to normal operating system respectively account for half;

Scheme two:As shown in Figure 1B, the screen of terminal is divided into two parts in left and right, the unlock corresponding to secure operating system Interface 104 and unlock interface 102 corresponding to normal operating system respectively account for half;

Scheme three:As shown in Figure 1 C, the screen of terminal is divided into the region of two overlappings, the solution corresponding to secure operating system Lock interface 104 and the unlock interface 102 corresponding to normal operating system overlap.

In view of the purpose of design dual operating systems is the data safety in order to protect user, therefore above-mentioned scheme exists Following problems:

1) unlock interface is dull, cannot show different unlock interfaces according to the identity of the currently used person of terminal.

2) after due to the unlock operation of anyone triggering terminal, the interface that terminal is shown is identical, other people is caused to will appreciate that peace The presence of full operation system, and then will increase the possibility that secure operating system is decrypted.

Therefore, how different unlock interfaces shown according to the identity of the currently used person of terminal, to avoid illegally making The data that user knows the presence of secure operating system and maliciously obtains in secure operating system are asked as technology urgently to be resolved Topic.

Summary of the invention

The present invention is based at least one above-mentioned technical problem, proposes a kind of new unlocking screen side for terminal Case can show different unlock interfaces according to the identity of terminal operator, avoid and show correspondence to all operators In the unlock interface of two operating system, unauthorized user is caused to know the presence of secure operating system and maliciously obtain safe behaviour Make the data in system, is effectively protected the safety of data in secure operating system.

In view of this, the terminal includes the first operation the invention proposes a kind of unlocking screen method for terminal System and the second operating system, the unlocking screen method, including:The terminal is unlocked locked screen receiving Instruction when, identify whether the operator of the terminal is authorized user;If recognizing the operator is the authorized user, Then display corresponds to the unlock interface of first operating system and the unlock interface corresponding to second operating system simultaneously; If recognizing the operator not is the authorized user, only display corresponds to the unlock interface of first operating system.

In the technical scheme, the first operating system can be normal operating system, and the second operating system can be safety Operating system, by receive that the locked screen to terminal is unlocked it is specified when, identification terminal operator whether be Authorized user, and corresponding unlock interface is shown according to the identity of terminal operator, so that being authorized user in terminal operator When, while showing the unlock interface for corresponding to the first operating system and the unlock interface corresponding to the second operating system, to award It weighs after user unlocks terminal and enters corresponding operation system;Make only to show when terminal operator is unauthorized user simultaneously Corresponding to the unlock interface of the first operating system (such as normal operating system), so that unauthorized user can not know the second operation system System (such as secure operating system) whether there is, and then can be avoided and show all operators corresponding to the first operating system With the unlock interface of the second operating system, unauthorized user is caused to know the presence of the second operating system and maliciously obtain the second behaviour The problem of making the data in system.

In the above-mentioned technical solutions, it is preferable that recognizing the operator be not the screen after the authorized user Curtain unlocking method further include:The unlock operation for acquiring the operator, according to operator described in the unlock operation judges to institute Whether the screen for stating terminal unlocks success;When determining unlock success of the operator to the screen of the terminal, start institute The first operating system is stated, and hides second operating system.

In the technical scheme, it is unauthorized user by recognizing terminal operator, and is determining terminal operator couple When the unlocking screen success of terminal, start the first operating system, and hide the second operating system, so that being non-in terminal operator When authorized user, even if unlocking screen success of the unauthorized user to terminal, can not also know the presence of the second operating system, into One step protects the safety of data in the second operating system.

In the above-mentioned technical solutions, it is preferable that described to hide second operating system and specifically include:Hide described second Data in operating system and/or hide the trigger button that second operating system is switched in first operating system.

In the above-mentioned technical solutions, it is preferable that after recognizing the operator and being the authorized user, the screen Unlocking method further includes:The operator is acquired to the unlock interface of first operating system and second operating system The unlock operation of any unlock interface in unlock interface;According to operator described in the unlock operation judges to the screen of the terminal Whether curtain unlocks success;When determining unlock success of the operator to the screen of the terminal, start the unlock operation Corresponding operating system.

In the technical scheme, if recognizing terminal operator is authorized user, determining authorized user for any When the unlock operation of operating system is unlocked successfully, it can enter in any operation system.

In the above-mentioned technical solutions, it is preferable that whether the operator of the identification terminal is the authorized user Step is specially:Acquire the image information and/or vocal print feature of the operator;Judge the image of the collected operator Information and/or vocal print feature whether be the stored authorized user image information and/or vocal print feature, if so, sentencing The operator of the fixed terminal is the authorized user, otherwise, it is determined that the operator of the terminal is not the authorized user.

According to the second aspect of the invention, it is also proposed that a kind of screen unlocking device for terminal, the terminal include First operating system and the second operating system, the screen unlocking device, including:Recognition unit, for receiving to described When the instruction that the locked screen of terminal is unlocked, identify whether the operator of the terminal is authorized user;Display unit, For when it is the authorized user that the recognition unit, which recognizes the operator, while showing and corresponding to first operation The unlock interface of system and unlock interface corresponding to second operating system, and for recognizing institute in the recognition unit When to state operator not be the authorized user, only display corresponds to the unlock interface of first operating system.

In the technical scheme, the first operating system can be normal operating system, and the second operating system can be safety Operating system, by receive that the locked screen to terminal is unlocked it is specified when, identification terminal operator whether be Authorized user, and corresponding unlock interface is shown according to the identity of terminal operator, so that being authorized user in terminal operator When, while showing the unlock interface for corresponding to the first operating system and the unlock interface corresponding to the second operating system, to award It weighs after user unlocks terminal and enters corresponding operation system;Make only to show when terminal operator is unauthorized user simultaneously Corresponding to the unlock interface of the first operating system (such as normal operating system), so that unauthorized user can not know the second operation system System (such as secure operating system) whether there is, and then can be avoided and show all operators corresponding to the first operating system With the unlock interface of the second operating system, unauthorized user is caused to know the presence of the second operating system and maliciously obtain the second behaviour The problem of making the data in system.

In the above-mentioned technical solutions, it is preferable that further include:First acquisition unit, for being recognized in the recognition unit After the operator is not the authorized user, the unlock operation of the operator is acquired;First judging unit is used for basis Whether operator described in the collected unlock operation judges of the first acquisition unit unlocks into the screen of the terminal Function;First processing units, for first judging unit determine the operator to the unlock of the screen of the terminal at When function, start first operating system, and hide second operating system.

In the technical scheme, it is unauthorized user by recognizing terminal operator, and is determining terminal operator couple When the unlocking screen success of terminal, start the first operating system, and hide the second operating system, so that being non-in terminal operator When authorized user, even if unlocking screen success of the unauthorized user to terminal, can not also know the presence of the second operating system, into One step protects the safety of data in the second operating system.

In the above-mentioned technical solutions, it is preferable that hiding operation of the first processing units to second operating system Including:It hides the data in second operating system and/or hides and switch to second behaviour in first operating system Make the trigger button of system.

In the above-mentioned technical solutions, it is preferable that further include:Second acquisition unit, for being recognized in the recognition unit After the operator is the authorized user, the operator is acquired to the unlock interface of first operating system and described The unlock operation of any unlock interface in the unlock interface of second operating system;Second judgment unit, for according to described second Whether operator described in the collected unlock operation judges of acquisition unit unlocks success to the screen of the terminal;At second Unit is managed, for starting any unlock operation when determining unlock success of the operator to the screen of the terminal Corresponding operating system.

In the technical scheme, if recognizing terminal operator is authorized user, determining authorized user for any When the unlock operation of operating system is unlocked successfully, it can enter in any operation system.

In the above-mentioned technical solutions, it is preferable that the recognition unit includes:Third acquisition unit, for acquiring the behaviour The image information and/or vocal print feature of author;Third judging unit, for judging that the third acquisition unit is collected described The image information and/or vocal print feature of operator whether be the stored authorized user image information and/or vocal print it is special Sign, if so, determining that the operator of the terminal is the authorized user, otherwise, it is determined that the operator of the terminal is not institute State authorized user.

According to the third aspect of the invention we, it is also proposed that a kind of terminal, including:Described in any of the above-described technical solution Screen unlocking device for terminal.

By above technical scheme, different unlock interfaces can be shown according to the identity of terminal operator, avoided pair All operators show the unlock interface corresponding to two operating system, and unauthorized user is caused to know secure operating system Presence and malice obtains data in secure operating system, be effectively protected the safety of data in secure operating system.

Detailed description of the invention

Figure 1A to Fig. 1 C shows the interface schematic diagram of the three kinds of unlock schemes proposed in the related technology;

Fig. 2 shows the schematic flow diagrams of the unlocking screen method for terminal of embodiment according to the present invention;

Fig. 3 shows the schematic block diagram of the screen unlocking device for terminal of embodiment according to the present invention;

Fig. 4 shows the schematic block diagram of the tripper of the dual operating systems terminal of embodiment according to the present invention;

Fig. 5 shows the schematic flow diagram of the unlocking method of the dual operating systems terminal of embodiment according to the present invention.

Specific embodiment

To better understand the objects, features and advantages of the present invention, with reference to the accompanying drawing and specific real Applying mode, the present invention is further described in detail.It should be noted that in the absence of conflict, the implementation of the application Feature in example and embodiment can be combined with each other.

In the following description, numerous specific details are set forth in order to facilitate a full understanding of the present invention, still, the present invention may be used also To be implemented using other than the one described here other modes, therefore, protection scope of the present invention is not by described below Specific embodiment limitation.

Heretofore described terminal includes the first operating system and the second operating system, and the first operating system can be general Logical operating system, the second operating system can be secure operating system.

Fig. 2 shows the schematic flow diagrams of the unlocking screen method for terminal of embodiment according to the present invention.

As shown in Fig. 2, the unlocking screen method for terminal of embodiment according to the present invention, including:Step 202, institute Terminal is stated when receiving the instruction being unlocked to locked screen, identifies whether the operator of the terminal is that authorization is used Family;Step 204, if recognizing the operator is the authorized user, display corresponds to first operating system simultaneously Unlock interface and unlock interface corresponding to second operating system;Step 206, if recognizing the operator not is institute Authorized user is stated, then only shows the unlock interface for corresponding to first operating system.

In the technical scheme, by receive that the locked screen to terminal is unlocked it is specified when, identification is eventually It holds whether operator is authorized user, and corresponding unlock interface is shown according to the identity of terminal operator, so that being grasped in terminal When author is authorized user, while showing the unlock interface for corresponding to the first operating system and the solution corresponding to the second operating system Interface is locked, enters corresponding operation system after unlocking terminal so as to authorized user;Simultaneously in terminal operator to be unauthorized When user, only display corresponds to the unlock interface of the first operating system (such as normal operating system), so that unauthorized user can not Know that the second operating system (such as secure operating system) whether there is, and then can be avoided and correspondence is shown to all operators In the unlock interface of the first operating system and the second operating system, cause unauthorized user know the second operating system presence and Malice obtains the problem of data in the second operating system.

In the above-mentioned technical solutions, it is preferable that recognizing the operator be not the screen after the authorized user Curtain unlocking method further include:The unlock operation for acquiring the operator, according to operator described in the unlock operation judges to institute Whether the screen for stating terminal unlocks success;When determining unlock success of the operator to the screen of the terminal, start institute The first operating system is stated, and hides second operating system.

In the technical scheme, it is unauthorized user by recognizing terminal operator, and is determining terminal operator couple When the unlocking screen success of terminal, start the first operating system, and hide the second operating system, so that being non-in terminal operator When authorized user, even if unlocking screen success of the unauthorized user to terminal, can not also know the presence of the second operating system, into One step protects the safety of data in the second operating system.

In the above-mentioned technical solutions, it is preferable that described to hide second operating system and specifically include:Hide described second Data in operating system and/or hide the trigger button that second operating system is switched in first operating system.

In the above-mentioned technical solutions, it is preferable that after recognizing the operator and being the authorized user, the screen Unlocking method further includes:The operator is acquired to the unlock interface of first operating system and second operating system The unlock operation of any unlock interface in unlock interface;According to operator described in the unlock operation judges to the screen of the terminal Whether curtain unlocks success;When determining unlock success of the operator to the screen of the terminal, start the unlock operation Corresponding operating system.

In the technical scheme, if recognizing terminal operator is authorized user, determining authorized user for any When the unlock operation of operating system is unlocked successfully, it can enter in any operation system.

In the above-mentioned technical solutions, it is preferable that whether the operator of the identification terminal is the authorized user Step is specially:Acquire the image information and/or vocal print feature of the operator;Judge the image of the collected operator Information and/or vocal print feature whether be the stored authorized user image information and/or vocal print feature, if so, sentencing The operator of the fixed terminal is the authorized user, otherwise, it is determined that the operator of the terminal is not the authorized user.

Fig. 3 shows the schematic block diagram of the screen unlocking device for terminal of embodiment according to the present invention.

As shown in figure 3, the screen unlocking device 300 for terminal of embodiment according to the present invention, including:Recognition unit 302, when instruction for being unlocked in the locked screen received to the terminal, identify that the operator of the terminal is No is authorized user;Display unit 304 is the authorized user for recognizing the operator in the recognition unit 302 When, while showing the unlock interface for corresponding to first operating system and unlock circle corresponding to second operating system Face, and for when it is the authorized user that the recognition unit 302, which recognizes the operator not, only display to correspond to described The unlock interface of first operating system.

In the technical scheme, by receive that the locked screen to terminal is unlocked it is specified when, identification is eventually It holds whether operator is authorized user, and corresponding unlock interface is shown according to the identity of terminal operator, so that being grasped in terminal When author is authorized user, while showing the unlock interface for corresponding to the first operating system and the solution corresponding to the second operating system Interface is locked, enters corresponding operation system after unlocking terminal so as to authorized user;Simultaneously in terminal operator to be unauthorized When user, only display corresponds to the unlock interface of the first operating system (such as normal operating system), so that unauthorized user can not Know that the second operating system (such as secure operating system) whether there is, and then can be avoided and correspondence is shown to all operators In the unlock interface of the first operating system and the second operating system, cause unauthorized user know the second operating system presence and Malice obtains the problem of data in the second operating system.

In the above-mentioned technical solutions, it is preferable that further include:First acquisition unit 306, in the recognition unit 302 After recognizing the operator not and being the authorized user, the unlock operation of the operator is acquired;First judging unit 308, for the operator according to the first acquisition unit 306 collected unlock operation judges to the terminal Whether screen unlocks success;First processing units 310, for determining the operator to institute in first judging unit 308 When stating the unlock success of the screen of terminal, start first operating system, and hide second operating system.

In the technical scheme, it is unauthorized user by recognizing terminal operator, and is determining terminal operator couple When the unlocking screen success of terminal, start the first operating system, and hide the second operating system, so that being non-in terminal operator When authorized user, even if unlocking screen success of the unauthorized user to terminal, can not also know the presence of the second operating system, into One step protects the safety of data in the second operating system.

In the above-mentioned technical solutions, it is preferable that hiding behaviour of the first processing units 310 to second operating system Work includes:It hides the data in second operating system and/or hides in first operating system and switch to described second The trigger button of operating system.

In the above-mentioned technical solutions, it is preferable that further include:Second acquisition unit 312, in the recognition unit 302 After recognizing the operator and being the authorized user, the operator is acquired to the unlock interface of first operating system With the unlock operation of any unlock interface in the unlock interface of second operating system;Second judgment unit 314 is used for basis Whether operator described in the collected unlock operation judges of the second acquisition unit 312 unlocks the screen of the terminal Success;The second processing unit 316, for starting institute when determining unlock success of the operator to the screen of the terminal State the corresponding operating system of any unlock operation.

In the technical scheme, if recognizing terminal operator is authorized user, determining authorized user for any When the unlock operation of operating system is unlocked successfully, it can enter in any operation system.

In the above-mentioned technical solutions, it is preferable that the recognition unit 302 includes:Third acquisition unit 3022, for acquiring The image information and/or vocal print feature of the operator;Third judging unit 3024, for judging the third acquisition unit The image information and/or vocal print feature of the 3022 collected operators whether be the stored authorized user image Information and/or vocal print feature, if so, determining that the operator of the terminal is the authorized user, otherwise, it is determined that the terminal Operator be not the authorized user.

The invention also provides a kind of terminal (not shown)s, including:Unlocking screen for terminal as shown in Figure 3 Device 300.

Technical solution according to an embodiment of the invention is described in detail below in conjunction with Fig. 4 and Fig. 5.

Fig. 4 shows the schematic block diagram of the tripper of the dual operating systems terminal of embodiment according to the present invention.

As shown in figure 4, the tripper of the dual operating systems terminal of embodiment according to the present invention, including:Recognition of face Unit 402, unlocking unit 404 and secure operating system hidden unit 406.

Face identification unit 402 is mainly used for operating (such as user lights terminal screen) in the unlock of user's triggering terminal When, the facial image of terminal current operator is acquired and is identified.

Secure operating system hidden unit 406, for choosing whether to hide according to the recognition result of face identification unit 402 Secure operating system hides safety behaviour that is, when it is unauthorized user that face identification unit 402, which recognizes terminal current operator, Make system.

Unlocking unit 404, the identity of the current operator for being recognized according to face identification unit 402, display are different Unlock interface.

Specific flow chart is referring to Figure 5.

Fig. 5 shows the schematic flow diagram of the unlocking method of the dual operating systems terminal of embodiment according to the present invention.

As shown in figure 5, the unlocking method of the dual operating systems terminal of embodiment according to the present invention, including:

Step 502, the preset human face photo of user, is added in comparison database.Wherein, the preset human face photo of user can be The picture shot by camera is also possible to the picture downloaded from network or receives the photo etc. that other users are sent.

Step 504, terminal operator opens a terminal light screen after, the human face photo of capture terminal user.

Step 506, judge whether terminal operator is authorized user, if so, thening follow the steps 510;Otherwise, step is executed 508.Wherein, terminal is compared by capturing the human face photo of user with the photo in comparison database, if can be in comparison database Compare corresponding photo, it is determined that be authorized user;Otherwise, it determines being unauthorized user.

Step 508, when determining terminal operator is unauthorized user, secure operating system is hidden, setting Status Flag is 0.Wherein, hiding secure operating system, which is hidden, can be since unlock interface, to after entering operating system, as long as can cut The entrance for changing two kinds of operating system, is all shielded, to ensure that unauthorized user can not perceive the presence of secure operating system.

Step 510, when determining terminal operator is authorized user, setting Status Flag is 1.

Step 512, judge the value of Status Flag, if Status Flag is 1, then follow the steps 516;If Status Flag is 0, Execute step 514.

Step 514, when the value for determining Status Flag is 0, the unlock interface of normal operating system is only shown.

Step 516, when the value for determining Status Flag is 1, the unlock interface of dual operating systems is shown, that is, showing both can be with Into secure operating system, and the unlock interface of normal operating system can be entered.

It is subsequent to be operated according to the unlock of user, judge whether to be unlocked the interface of terminal.

In the above-described embodiments, the owner of terminal need to only pre-save the human face photo of authorized user, need to solve subsequent When lock, terminal can show corresponding unlock interface automatically according to the identification situation to operator's face, and then can not increase Under the premise of other operation bidirectionals, so that it may be effectively protected the concealment of secure operating system.In addition, for passing through vocal print spy Sign identification operator whether be authorized user scheme it is similar with above scheme, repeat no more.

The technical scheme of the present invention has been explained in detail above with reference to the attached drawings, it is contemplated that the solution of existing dual operating systems terminal It is dull to lock interface, cannot show different unlock interfaces according to the identity of the currently used person of terminal, and triggers end at anyone After the unlock operation at end, the interface that terminal is shown is identical, causes other people to will appreciate that the presence of secure operating system, and then will increase The possibility that secure operating system is decrypted.It therefore, can the invention proposes a kind of new unlocking screen scheme for terminal Different unlock interfaces is shown according to the identity of terminal operator, is avoided and is shown that corresponding to two grasps to all operators The unlock interface for making system causes unauthorized user to know the presence of secure operating system and maliciously obtain in secure operating system Data, be effectively protected the safety of data in secure operating system.

Embodiment according to the present invention additionally provides a kind of program production being stored in nonvolatile machine-readable media Product are unlocked for the screen to terminal, and described program product includes the machine for making computer system execute following steps Device executable instruction:When receiving the instruction being unlocked to locked screen, identify the terminal operator whether be Authorized user;If recognizing the operator is the authorized user, display simultaneously corresponds to the first operation of the terminal The unlock interface of the unlock interface of system and the second operating system corresponding to the terminal;If recognizing the operator is not The authorized user then only shows the unlock interface for corresponding to the first operating system of the terminal.

Embodiment according to the present invention additionally provides a kind of non-volatile machine readable media, is stored with for terminal The program product operated, described program product include the executable finger of machine for making computer system execute following steps It enables:When receiving the instruction being unlocked to locked screen, identify whether the operator of the terminal is authorized user;If Recognizing the operator is the authorized user, then display simultaneously corresponds to unlock circle of the first operating system of the terminal The unlock interface in face and the second operating system corresponding to the terminal;If recognizing the operator not is that the authorization is used Family then only shows the unlock interface for corresponding to the first operating system of the terminal.

Embodiment according to the present invention additionally provides a kind of machine readable program, and it is as above that described program executes machine Any unlocking screen method in the technical solution.

Embodiment according to the present invention additionally provides a kind of storage medium for being stored with machine readable program, wherein institute Stating machine readable program makes machine execute any unlocking screen method in technical solution as described above.

The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (6)

1. a kind of unlocking screen method for terminal, the terminal includes the first operating system and the second operating system, spy Sign is, the unlocking screen method, including:
The terminal identifies whether the operator of the terminal is to award when receiving the instruction being unlocked to locked screen Weigh user;
If recognizing the operator is the authorized user, display corresponds to unlock circle of first operating system simultaneously Face and unlock interface corresponding to second operating system;
If recognizing the operator not is the authorized user, only display corresponds to unlock circle of first operating system Face;After recognizing the operator not and being the authorized user, the unlocking screen method further includes:
The unlock for acquiring the operator operates, and is to the screen of the terminal according to operator described in the unlock operation judges It is no to unlock successfully;
When determining unlock success of the operator to the screen of the terminal, start first operating system, and hide Second operating system;
It is described to hide second operating system and specifically include:
It hides the data in second operating system and/or hides and switch to second operation in first operating system The trigger button of system.
2. the unlocking screen method according to claim 1 for terminal, which is characterized in that recognizing the operator It is after the authorized user, the unlocking screen method further includes:
The operator is acquired in the unlock interface of first operating system and the unlock interface of second operating system The unlock of any unlock interface operates;
Whether success is unlocked to the screen of the terminal according to operator described in the unlock operation judges;
When determining unlock success of the operator to the screen of the terminal, start the corresponding operation of the unlock operation System.
3. the unlocking screen method according to claim 1 or 2 for terminal, which is characterized in that the identification end The step of whether operator at end is the authorized user be specially:
Acquire the image information and/or vocal print feature of the operator;
Whether the image information and/or vocal print feature for judging the collected operator are the stored authorized user Image information and/or vocal print feature, if so, determining that the operator of the terminal is the authorized user, otherwise, it is determined that described The operator of terminal is not the authorized user.
4. a kind of screen unlocking device for terminal, the terminal includes the first operating system and the second operating system, spy Sign is, the screen unlocking device, including:
Recognition unit when instruction for being unlocked in the locked screen received to the terminal, identifies the terminal Operator whether be authorized user;
Display unit for when it is the authorized user that the recognition unit, which recognizes the operator, while showing correspondence Unlock interface in first operating system and the unlock interface corresponding to second operating system, and in the knowledge Other unit recognizes the operator not when being the authorized user, and only display corresponds to unlock circle of first operating system Face;Further include:
First acquisition unit is acquisition after the authorized user for recognizing the operator not in the recognition unit The unlock of the operator operates;
First judging unit is used for the operator couple according to the first acquisition unit collected unlock operation judges Whether the screen of the terminal unlocks success;
First processing units, for first judging unit determine the operator to the unlock of the screen of the terminal at When function, start first operating system, and hide second operating system;The first processing units are to second behaviour The hiding operation for making system includes:
It hides the data in second operating system and/or hides and switch to second operation in first operating system The trigger button of system.
5. the screen unlocking device according to claim 4 for terminal, which is characterized in that further include:
Second acquisition unit is acquisition institute after the authorized user for recognizing the operator in the recognition unit Operator is stated to any unlock circle in the unlock interface of first operating system and the unlock interface of second operating system The unlock in face operates;
Second judgment unit is used for the operator couple according to the second acquisition unit collected unlock operation judges Whether the screen of the terminal unlocks success;
The second processing unit, for starting the solution when determining unlock success of the operator to the screen of the terminal The corresponding operating system of lock operation.
6. the screen unlocking device according to claim 4 or 5 for terminal, which is characterized in that the recognition unit packet It includes:
Third acquisition unit, for acquiring the image information and/or vocal print feature of the operator;
Third judging unit, for judging the image information and/or sound of the collected operator of the third acquisition unit Whether line feature is the image information and/or vocal print feature of the stored authorized user, if so, determining the terminal Operator is the authorized user, otherwise, it is determined that the operator of the terminal is not the authorized user.
CN201510297024.2A 2015-06-02 2015-06-02 Unlocking screen method and tripper for terminal CN105630277B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510297024.2A CN105630277B (en) 2015-06-02 2015-06-02 Unlocking screen method and tripper for terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510297024.2A CN105630277B (en) 2015-06-02 2015-06-02 Unlocking screen method and tripper for terminal

Publications (2)

Publication Number Publication Date
CN105630277A CN105630277A (en) 2016-06-01
CN105630277B true CN105630277B (en) 2018-11-30

Family

ID=56045290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510297024.2A CN105630277B (en) 2015-06-02 2015-06-02 Unlocking screen method and tripper for terminal

Country Status (1)

Country Link
CN (1) CN105630277B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106022077B (en) * 2016-07-22 2019-05-14 深圳市金立通信设备有限公司 A kind of unlocking screen method and terminal
CN106775326A (en) * 2016-12-27 2017-05-31 上海与德信息技术有限公司 Screen control method and device for mobile terminal
CN106951769A (en) * 2017-02-28 2017-07-14 华为机器有限公司 Multi-system access method and apparatus, and terminal
CN107329678A (en) * 2017-06-22 2017-11-07 深圳传音通讯有限公司 Unlocking method and device of electronic terminal and electronic terminal
CN108537058A (en) * 2018-03-29 2018-09-14 广东欧珀移动通信有限公司 The polygonal color application method and device, computer readable storage medium, terminal of terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751519A (en) * 2008-12-09 2010-06-23 纬创资通股份有限公司 Method for improving information security of computer system and relative computer system thereof
CN103246454A (en) * 2012-02-01 2013-08-14 深圳市天方信安电子科技有限公司 Screen double-unblocking method
CN103856636A (en) * 2014-03-21 2014-06-11 中国联合网络通信集团有限公司 Screen unlocking method, screen unlocking device and mobile terminal
CN104077512A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Personnel information safety management method and management device
CN104537291A (en) * 2015-01-09 2015-04-22 宇龙计算机通信科技(深圳)有限公司 Screen interface unlocking method and screen interface unlocking device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI528162B (en) * 2011-01-26 2016-04-01 Via Tech Inc Computer system and its operating system switching method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751519A (en) * 2008-12-09 2010-06-23 纬创资通股份有限公司 Method for improving information security of computer system and relative computer system thereof
CN103246454A (en) * 2012-02-01 2013-08-14 深圳市天方信安电子科技有限公司 Screen double-unblocking method
CN104077512A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Personnel information safety management method and management device
CN103856636A (en) * 2014-03-21 2014-06-11 中国联合网络通信集团有限公司 Screen unlocking method, screen unlocking device and mobile terminal
CN104537291A (en) * 2015-01-09 2015-04-22 宇龙计算机通信科技(深圳)有限公司 Screen interface unlocking method and screen interface unlocking device

Also Published As

Publication number Publication date
CN105630277A (en) 2016-06-01

Similar Documents

Publication Publication Date Title
CN103823632B (en) A kind of unlocking screen method and its terminal
US20140165187A1 (en) Method, Apparatus, and Computer-Readable Recording Medium for Authenticating a User
JP4198602B2 (en) Operating method and system using a video
US8149089B2 (en) Method for unlocking a locked computing device and computing device thereof
KR20090008256A (en) Face recognition system
US20070086626A1 (en) Individual identity authentication systems
CN102812498B (en) Inlet control means
CN101763671B (en) System for monitoring persons by using cameras
JP4924603B2 (en) Face authentication device, face authentication method and program
WO2007119818A1 (en) Function unlocking system, function unlocking method, and function unlocking program
GB2394341A (en) Access control system
KR20140012474A (en) Apparatus and method for protecting privacy based on face recognition
EP1635307A1 (en) Information processing apparatus
CN104167040B (en) A method and a system for remote control of the electronic lock
Ferrara et al. The magic passport
JP2000348227A (en) Gate devices
JP2015026357A (en) Method and apparatus for protection of application program
JP2004213087A (en) Device and method for personal identification
CN101494690A (en) Mobile terminal and unlocking method thereof
JP5837232B2 (en) Device and method for user authentication and user existence verification based on Turing test
WO2017031812A1 (en) Fingerprint verification method, fingerprint verification device, and terminal
CN102946481A (en) Method and system for unlocking human face expression
TWI324757B (en) Autheritication device, autheritication system, and confirmation method for the autheritication device
CN105631275B (en) information display method, information display device and terminal
US10438053B2 (en) Biometric identification systems and methods

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination
GR01 Patent grant
GR01 Patent grant