CN105760723B - Mobile terminal and its unlocking method - Google Patents

Mobile terminal and its unlocking method Download PDF

Info

Publication number
CN105760723B
CN105760723B CN201410777403.7A CN201410777403A CN105760723B CN 105760723 B CN105760723 B CN 105760723B CN 201410777403 A CN201410777403 A CN 201410777403A CN 105760723 B CN105760723 B CN 105760723B
Authority
CN
China
Prior art keywords
mobile terminal
wearable device
intelligent wearable
unlocking
safe distance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410777403.7A
Other languages
Chinese (zh)
Other versions
CN105760723A (en
Inventor
张晓楠
齐普
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leadcore Technology Co Ltd
Original Assignee
Leadcore Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Leadcore Technology Co Ltd filed Critical Leadcore Technology Co Ltd
Priority to CN201410777403.7A priority Critical patent/CN105760723B/en
Publication of CN105760723A publication Critical patent/CN105760723A/en
Application granted granted Critical
Publication of CN105760723B publication Critical patent/CN105760723B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

It is in a mobile terminal execution, method includes the following steps: the unlock operation of detection user the present invention relates to a kind of unlocking method of mobile terminal;Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance;When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, unlocking request is initiated to the intelligent wearable device in the case where no user is intervened;Receive the first verification information of intelligent wearable device return;And the second verification information saved in first verification information and mobile terminal is compared, decide whether to receive unlock operation.

Description

Mobile terminal and its unlocking method
Technical field
The present invention relates to mobile terminals, more particularly, to the unlocking method of mobile terminal.
Background technique
Increasingly mature with the communication technology and chip technology, global mobile communication growth momentum is powerful, global according to statistics Number of mobile phone users has broken through 5,000,000,000, accounts for about the 77% of population in the world.In recent years advancing by leaps and bounds with the Low-power Technology of chip, Intelligence wearing will also enter ordinary consumption field.
Digitlization and globalization have had become irreversible trend, such as mobile terminal of smart phone, tablet computer Become indispensable a part in our lives.A large amount of individual privacy data are stored in these mobile terminals, are disappeared The person of expense increasingly payes attention to the safety of mobile terminal, and privacy problem becomes digitized bottleneck.Due to smart phone It is small in size, it is easily lost and is stolen, safety problem more becomes the focus of consumer.At present major part manufacturer using fingerprint, The form that pattern, password unlock increases the safety of smart phone, but this requires user to require every time using smart phone It is unlocked.And these modes can be generally bypassed by way of root or brush machine, not be obviously improved intelligent hand The unlock safety of machine.
Summary of the invention
It is an object of the present invention to provide a kind of unlocking method and systems of safer, convenient and fast mobile terminal.
The present invention to solve above-mentioned technical problem and the technical solution adopted is that a kind of unlocking method of mobile terminal, be One mobile terminal execution, method includes the following steps: the unlock operation of detection user;Inquiry and the associated intelligence of the mobile terminal Whether energy wearable device is in safe distance;When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance When, unlocking request is initiated to the intelligent wearable device in the case where no user is intervened;Receive intelligent wearable device return First verification information;And the second verification information saved in first verification information and mobile terminal is compared, decide whether to connect It is operated by the unlock.
In one embodiment of this invention, when confirmation and the associated intelligent wearable device of the mobile terminal be not in safe distance When interior, it is desirable that user carries out additional verification operation.
In one embodiment of this invention, which includes input password, input pattern or input fingerprint.
In one embodiment of this invention, whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance Interior step includes being inquired by the short-range wireless communication protocol of the mobile terminal.
In one embodiment of this invention, whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance Interior step includes passing through the mobile communication protocol of the mobile terminal and inquiring via a security server.
In one embodiment of this invention, the above method further includes encrypting the unlocking request, and decryption is by encryption First verification information.
In one embodiment of this invention, the above method further includes instructing the mobile terminal after refusing unlock operation It shoots photo and obtains geographical location information, and send the photo and the geographical location information to a security server.
In one embodiment of this invention, the above method further includes the instruction after judging the additional verification operation failure The mobile terminal shoots photo and obtains geographical location information, and sends the photo and the geographical location information to a security service Device.
In one embodiment of this invention, the above method is that the application program for being installed on the mobile terminal by one executes.
In one embodiment of this invention, which is forced to start after suspension.
The present invention also proposes a kind of unlocking method of mobile terminal, is between an intelligent wearable device and a mobile terminal It executes, method includes the following steps: in the unlock operation of mobile terminal detection user;In the mobile terminal enquiry intelligence Whether wearable device is in safe distance;When confirming that the intelligent wearable device is in safe distance, the mobile terminal is useless Family executes in the case where intervening: initiating unlocking request to the intelligent wearable device;Movement end is received in the intelligent wearable device The unlocking request at end;The first verifying letter that the intelligent wearable device stores is returned from the intelligent wearable device to the mobile terminal Breath;The first verification information of intelligent wearable device return is received in the mobile terminal;And the mobile terminal compare this The second verification information saved in one verification information and mobile terminal decides whether to receive unlock operation.
In one embodiment of this invention, when the mobile terminal confirms the intelligent wearable device not in safe distance, It is required that user carries out additional verification operation.
In one embodiment of this invention, which includes input password, input pattern or input fingerprint.
In one embodiment of this invention, in the mobile terminal enquiry intelligent wearable device whether in safe distance Step includes being inquired by the short-range wireless communication protocol of the mobile terminal to the intelligent wearable device.
In one embodiment of this invention, in the mobile terminal enquiry intelligent wearable device whether in safe distance Step includes passing through the mobile communication protocol of the mobile terminal and inquiring via a security server to the intelligent wearable device.
In one embodiment of this invention, the above method further includes the shooting after the mobile terminal refuses unlock operation Photo and acquisition geographical location information, and the photo and the geographical location information are sent to a security server.
In one embodiment of this invention, the above method further includes judging the additional verification operation in the mobile terminal After failure, shoots photo and obtain geographical location information, and send the photo and the geographical location information to a security server.
In one embodiment of this invention, the above method further includes that a notification information is sent from the security server to the intelligence It can wearable device.
The present invention also proposes a kind of system for unlocking of mobile terminal, including mobile terminal and intelligent wearable device, the movement Terminal is configured as: detecting the unlock operation of user;Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safety In distance;When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, the case where no user is intervened Lower execution: unlocking request is initiated to the intelligent wearable device;Receive the first verification information of intelligent wearable device return;And The second verification information saved in first verification information and mobile terminal is compared, decides whether to receive unlock operation.The intelligence Energy wearable device is configured as: receiving the unlocking request of the mobile terminal;And intelligence wearing is returned to the mobile terminal and is set First verification information of standby storage.
In one embodiment of this invention, above-mentioned system for unlocking further includes a security server, security server forwarding Inquiry of the mobile terminal to the intelligent wearable device.
In one embodiment of this invention, above-mentioned system for unlocking further includes a security server, which also configures To shoot photo and obtaining geographical location information, and send the photo and the geographical location information after refusing unlock operation To the security server.
In one embodiment of this invention, which is when confirmation and the associated intelligence of the mobile terminal are dressed When equipment is not in safe distance, it is desirable that user carries out additional verification operation.
In one embodiment of this invention, above-mentioned system for unlocking further includes a security server, which also configures To shoot photo and obtaining geographical location information, and send the photo and the ground after judging the additional verification operation failure Location information is managed to a security server.
The present invention due to using the technology described above, be allowed to compared with prior art, by combine intelligent wearable device and The safety unlock for the mobile terminal that mobile terminal is realized, is able to solve personal privacy protection problem, and in safe distance range Interior user does not need input password or mobile phone safe unlock can be realized in fingerprint recognition, has taken into account safety and convenience.
Detailed description of the invention
For the above objects, features and advantages of the present invention can be clearer and more comprehensible, below in conjunction with attached drawing to tool of the invention Body embodiment elaborates, in which:
Fig. 1 is the system for unlocking framework of the mobile terminal of first embodiment of the invention.
Fig. 2 is the system for unlocking framework of the mobile terminal of second embodiment of the invention.
Fig. 3 is the system for unlocking framework of the mobile terminal of third embodiment of the invention.
Fig. 4 is the unlocking method of the mobile terminal of first embodiment of the invention.
Fig. 5 is the unlocking method of the mobile terminal of second embodiment of the invention.
Specific embodiment
The embodiment of the present invention proposes a kind of unlocking method of mobile terminal, by combining intelligent wearable device and movement Terminal is realized.
Such as the intelligent wearable device of smartwatch, Intelligent bracelet and intelligent glasses etc. and such as smart phone, plate electricity The mobile terminal of brain is compared, more inseparable with user.Such as smartwatch, Intelligent bracelet and intelligent glasses are in the most of the time It all wears on the user's body, it is not easy to pass into silence or steal.Therefore intelligent wearable device is suitable as unlock mobile terminal Tool.
Fig. 1 is the system for unlocking framework of the mobile terminal of first embodiment of the invention.Refering to what is shown in Fig. 1, system for unlocking frame Structure may include mobile terminal 10 and with the associated intelligent wearable device 20 of mobile terminal 10.Mobile terminal 10 is, for example, intelligence above-mentioned Energy mobile phone peace plate computer, is also possible to other mobile electronic devices with similar functions.Mobile terminal 10 has operation system System, and various application programs can be run on an operating system.Mobile terminal 10 also has short-distance wireless communication ability.Such as it moves Dynamic terminal 10 can be communicated by Bluetooth protocol, WIFI agreement or NFC protocol with neighbouring other electronic equipments.Intelligence wearing is set Standby 20 also have short-distance wireless communication ability, so as to carry out short haul connection with mobile terminal 10.
Continue to refer to figure 1, the internal structure of the mobile terminal 10 of the present embodiment include processing module 11, memory module 12, Encryption/decryption module 13 and wireless communication module 14.In memory module 12 can storage program area and application program, and can be loaded into It is executed in processing module 11.Wireless communication module 14 can be sent out information and receive information.Encryption/decryption module 13 can be right The information of transmission is encrypted, and received information is decrypted.In the operating system or application program of mobile terminal 10 In can set a safe distance.This safe distance is the safe distance between mobile terminal 10 and intelligent wearable device 20. In this safe distance, unlock operation can be completed by the cooperation between intelligent wearable device 20 and mobile terminal 10, and this One cooperation need not be intervened by user.Outside this safe distance, unlock operation requires user to carry out additional verification operation, example Such as input password, input pattern, input fingerprint or other verification informations.Safe distance can be by user's self-defining.Example Such as, safe distance can be set in tens cm, and when this is that user operates mobile terminal 10, mobile terminal 10 is set with intelligence wearing Standby 20 usual distance.Certainly, allow user that longer safe distance, such as several meters, even more than ten are set according to its preference Rice.Certainly, safe distance needs to consider the communication distance of short-distance wireless communication ability.
It continues to refer to figure 1, the intelligent wearable device 20 of the present embodiment may include verification information module 21, encryption/decryption module 22, wireless communication module 23 and power supply module 24.The first verification information can be stored in verification information module 21, first verifying Information is used to issue when needing to unlock to mobile terminal 10, the voucher as unlock.Correspondingly, is stored in mobile terminal 10 Two verification informations.There is pairing relationship, such as identical or satisfaction one between first verification information and the second verification information Fixed conversion relation.First verification information can be the identity information of user, and be preferably provided with uniqueness.In reality of the invention It applies in example, the first verification information can be defined by user.
Preferably, encryption/decryption module 22 can encrypt the first verification information, then defeated outward through wireless communication module 23 Out.Power supply module 24 can power for verification information module 21, encryption/decryption module 22 and wireless communication module 23.
It will be understood by those skilled in the art that encryption/decryption module 13 and encryption/decryption module 22 are to improve information and transmit Safety, in the occasion not high to security requirement, encryption/decryption module 13 and encryption/decryption module 22 be can be omitted, and directly be transmitted Not encrypted information.
Mobile terminal 10 can receive the unlocking request of user to start unlocking process.Such as user passes through pressing The specific keys of mobile terminal 10, as power supply is strong, Home key to unlock mobile phone or user passes through the touching in mobile terminal 10 It touches and is slided on screen to unlock mobile phone, mobile terminal 10 receives these signals to start unlock.
Fig. 4 is the unlocking method of the mobile terminal of first embodiment of the invention.Refering to what is shown in Fig. 4, the movement of the present embodiment The unlocking method of terminal the following steps are included:
In step 401, the unlock operation of user is detected in mobile terminal 10.
Such as user presses the specific keys of mobile terminal 10, as power supply is strong, Home key unlocks mobile phone, or uses Person unlocks mobile phone by being slided on the touch screen of mobile terminal 10.
In step 402, intelligent wearable device 20 is inquired whether in safe distance in mobile terminal 10.
The operation of inquiry can be from mobile terminal 10 and send signal to surrounding by its wireless communication module 14, and by intelligence The wireless communication module 23 of energy wearable device 20 is responded.
In step 403, when mobile terminal 10 confirms that intelligent wearable device 20 is in safe distance, mobile terminal 10 is in nothing Unlocking request is initiated to intelligent wearable device 20 in the case where user intervention.
Correspondingly, in step 404, intelligent wearable device 20 receives the unlocking request of mobile terminal 10.
In step 405, intelligent wearable device 20 stores first is returned from intelligent wearable device 20 to mobile terminal 10 and is tested Demonstrate,prove information.
Correspondingly, in step 406, the first verification information that intelligent wearable device 20 returns is received in mobile terminal 10.
In step 407, the second verification information saved in the first verification information and mobile terminal is compared in mobile terminal 10, Judge whether the two matches, decides whether to receive unlock operation.
In step 410, if the two matches, receive unlock operation.
In step 411, if the two mismatches, refuse to receive unlock operation.
On the other hand, confirm with the associated intelligent wearable device of the mobile terminal not in safe distance when in step 402 When, then enter step 408, it is desirable that user carries out additional verification operation.Such as user is required to input password, input figure Case, input fingerprint or other verification informations.Step 409, if be proved to be successful, such as password is correct or pattern, fingerprint Match, then equally receives unlock operation in step 410, otherwise refusal receives unlock operation.
In the preferred embodiment, it is being transmitted between mobile terminal 10 and intelligent wearable device 20 in step 403,404 Information, such as unlocking request and verification information, can be encrypted in transmitting terminal, and are decrypted in receiving end, to improve peace Quan Xing.
In the present embodiment, in terms of 10 angle of mobile terminal, the unlocking method implemented includes: to detect the unlock behaviour of user Make;Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance;It is associated with mobile terminal when confirming It when intelligent wearable device is in safe distance, is executed in the case where no user intervention: initiating to unlock to the intelligent wearable device Request;Receive the first verification information that intelligent wearable device returns;And it compares in the first verification information and mobile terminal and saves The second verification information, decide whether receive unlock operation.In one embodiment, this unlocking method can apply journey at one Implement in sequence.
Fig. 2 is the system for unlocking framework of the mobile terminal of second embodiment of the invention.Refering to what is shown in Fig. 2, the present embodiment First embodiment one shown in system for unlocking framework and Fig. 1 the difference is that, safety zone 16 is set, and by encryption/decryption module 13 settings are run in safety zone 16, in case encryption/decryption module 13 is stolen, modifies and destroys.Shown in the present embodiment and Fig. 1 First embodiment another difference is that, in safety zone 16 be arranged real-time monitoring module 15, be responsible for monitoring implement solution Whether the application program of locking method is running, if the application program kills process, real-time monitoring module 15 by Malware The process is restarted in pressure.
By the unlocking method of the unlock framework and first embodiment of first embodiment and second embodiment, can use The assistance of intelligent wearable device 20 of user is unlocked mobile terminal 10, this not only ensure that the safety of unlock, but also can allow User realizes and safely and conveniently unlocks from additional verification operations such as input password, input pattern, fingerprints.
In above-mentioned first embodiment and second embodiment, to avoid illegally obtaining taker and pass through root for mobile terminal 10 Or brush machine enters mobile terminal 10, can configure anti-brush machine technology and guarantee to carry out the system integrity of mobile terminal 10.
Fig. 3 is the system for unlocking framework of the mobile terminal of third embodiment of the invention.Refering to what is shown in Fig. 3, system for unlocking frame Structure may include mobile terminal 10, intelligent wearable device 20, security server 30 and trusted service management platform 40.Mobile terminal 10 Smart phone and tablet computer e.g. above-mentioned, are also possible to other mobile electronic devices with similar functions.It is mobile whole End 10 has operating system, and can run various application programs on an operating system.Mobile terminal 10 also has short-distance wireless Communication capacity.Such as mobile terminal 10 can pass through Bluetooth protocol, WIFI agreement or NFC protocol and neighbouring other electronic equipments Communication.Intelligent wearable device 20 also has short-distance wireless communication ability, so as to which it is logical to carry out short distance with mobile terminal 10 Letter.Mobile terminal 10 and intelligent wearable device 20 also have mobile communication ability, that is, utilize various 2G, 3G or 4G mobile communication Agreement, by network 50 and remote equipment, the ability communicated such as security server 30.
With continued reference to Fig. 3, the internal structure of the mobile terminal 10 of the present embodiment include processing module 11, memory module 12, Encryption/decryption module 13, wireless communication module 14 and mobile communication module 17.It can storage program area and application in memory module 12 Program, and can be loaded into processing module 11 and execute.Wireless communication module 14 and mobile communication module 17 can be sent out Information and reception information.Encryption/decryption module 13 can encrypt the information of transmission, and received information is decrypted. A safe distance can be set in the operating system or application program of mobile terminal 10.This safe distance is mobile terminal Safe distance between 10 and intelligent wearable device 20.In this safe distance, unlock operation can be by intelligent wearable device 20 Cooperation between mobile terminal 10 is completed, and this cooperation need not intervene by user.Outside this safe distance, unlock behaviour It is required user and carries out additional verification operation, such as input password, input fingerprint or other verification informations.Safe distance It can be by user's self-defining.For example, safe distance can be set in tens cm, this is that user operates mobile terminal 10 When, the usual distance of mobile terminal 10 and intelligent wearable device 20.Certainly, allow user that longer peace is set according to its preference Full distance, such as several meters, even more than ten meters.When safe distance can be more than the communication distance of short-distance wireless communication ability, this When mobile terminal 10 and intelligent wearable device 20 between interaction can by security server 30 carry out transfer.
One function of security server 30 is the safe distance in user's setting beyond short-range wireless communication module When the transmission range of (wifi, bluetooth, NFC etc.), information transfer is carried out between mobile terminal 10 and intelligent wearable device 20. Another function of security server 30 is the information for receiving mobile terminal 10 and sending, such as the photo and ground that will describe hereinafter Information is managed, and sends notification information to intelligent wearable device 20.
Trusted service management platform 40 be responsible for mobile terminal 10, in intelligent wearable device 20 application program deployment, guarantee The legitimacy of application program is installed, or guarantees the legitimacy of application program in such a way that mobile phone dispatches from the factory preset application.Citing comes It says, mobile terminal 10 and intelligent wearable device 20 are application program needed for implementing unlock, can only manage platform from trusted service 40 obtain.
It continues to refer to figure 1, the intelligent wearable device 20 of the present embodiment may include verification information module 21, encryption/decryption module 22, wireless communication module 23, mobile communication module 25 and power supply module 24.The first verifying can be stored in verification information module 21 Information, first verification information are used to issue when needing to unlock to mobile terminal 10, the voucher as unlock.Correspondingly, it moves The second verification information is stored in dynamic terminal 10.There is pairing relationship, such as complete between first verification information and the second verification information It is exactly the same or meet certain conversion relation.First verification information can be the identity information of user, and be preferably provided with only One property.In an embodiment of the present invention, the first verification information can be defined by user.
Preferably, encryption/decryption module 22 can encrypt the first verification information, then through wireless communication module 23 and movement Communication module 25 exports outward.Power supply module 24 can be verification information module 21, encryption/decryption module 22, wireless communication module 23 It powers with mobile communication module 25.
It will be understood by those skilled in the art that encryption/decryption module 13 and encryption/decryption module 22 are to improve information and transmit Safety, in the occasion not high to security requirement, encryption/decryption module 13 and encryption/decryption module 22 be can be omitted, and directly be transmitted Not encrypted information.
Mobile terminal 10 can receive the unlocking request of user to start unlocking process.Such as user passes through pressing The specific keys of mobile terminal 10, as power supply is strong, Home key to unlock mobile phone or user passes through the touching in mobile terminal 10 It touches and is slided on screen to unlock mobile phone, mobile terminal 10 receives these signals to start unlock.
Fig. 5 is the unlocking method of the mobile terminal of second embodiment of the invention.Refering to what is shown in Fig. 5, the movement of the present embodiment The unlocking method of terminal the following steps are included:
In step 501, the unlock operation of user is detected in mobile terminal 10.
Such as user presses the specific keys of mobile terminal 10, as power supply is strong, Home key unlocks mobile phone, or uses Person unlocks mobile phone by being slided on the touch screen of mobile terminal 10.
In step 502, intelligent wearable device 20 is inquired whether in safe distance in mobile terminal 10.
The operation of inquiry can be from mobile terminal 10 and send signal to surrounding by its wireless communication module 14, and by intelligence The wireless communication module 23 of energy wearable device 20 is responded.
The operation of inquiry can also be from mobile terminal 10 and be sent by its mobile communication module 17 to security server 30 Signal is transmitted to intelligent wearable device 20 by security server 30, is carried out by the mobile communication module 25 of intelligent wearable device 20 Response.
In step 503, when mobile terminal 10 confirms that intelligent wearable device 20 is in safe distance, mobile terminal 10 is in nothing Unlocking request is initiated to intelligent wearable device 20 in the case where user intervention.
Correspondingly, in step 504, intelligent wearable device 20 receives the unlocking request of mobile terminal 10.
In step 505, intelligent wearable device 20 stores first is returned from intelligent wearable device 20 to mobile terminal 10 and is tested Demonstrate,prove information.
Correspondingly, in step 506, the first verification information that intelligent wearable device 20 returns is received in mobile terminal 10.
In step 507, the second verification information saved in the first verification information and mobile terminal is compared in mobile terminal 10, Judge whether the two matches, decides whether to receive unlock operation.
In step 510, if the two matches, receive unlock operation.
In step 511, if the two mismatches, refuse to receive unlock operation.
On the other hand, confirm with the associated intelligent wearable device of the mobile terminal not in safe distance when in step 502 When, then enter step 508, it is desirable that user carries out additional verification operation.Such as user is required to input password, input fingerprint Or other verification informations.Step 5 09, if be proved to be successful, such as password is correct or fingerprint matching, then equally in step 510 receive unlock operation, and otherwise refusal receives unlock operation.
In step 511, refusal, which receives unlock operation, means that this time unlocking operation is illegal operation, and then in step 512 It instructs mobile terminal 10 to shoot photo and obtains geographical location information, and send photo and geographical location information to security server 30.Here, the photo that the front camera that shooting photo should include mobile terminal 10 is shot, to capture back street operators at this time Portrait.The acquisition of geographical location information can also pass through shifting by the satellite positioning module configured in mobile terminal 10 The interaction of the mobile communication module 17 and network of dynamic terminal 10.
Correspondingly, in security server 30, photo and geography information are received in step 512.And further, it may also include Step 513, notification information is sent to intelligent wearable device 20 from security server 30.Correspondingly, in step 514, intelligence is dressed Equipment 20 receives notification information, so that the present situation of mobile terminal 10 is notified user.
The embodiment of the present invention passes through the mobile phone safe unlocking method in conjunction with intelligent wearable device and intelligent terminal realization, energy Enough solve the problems, such as personal privacy protection, and user does not need input password within the scope of safe distance or fingerprint recognition can be real Existing mobile phone safe unlock.In the preferred embodiment, if unlock unsuccessfully can also be by the photo and mobile phone position information of illegal unlock person Security server is uploaded to, and intelligent wearable device is informed by mobile network.Relatively traditional mobile phone unlocking method, the present invention Embodiment the user experience is improved, and substantially increase safety.
Although the present invention is described with reference to current specific embodiment, those of ordinary skill in the art It should be appreciated that above embodiment is intended merely to illustrate the present invention, can also make in the case where no disengaging spirit of that invention Various equivalent change or replacement out, therefore, as long as to the variation of above-described embodiment, change in spirit of the invention Type will all be fallen in the range of following claims.

Claims (20)

1. a kind of unlocking method of mobile terminal, be in a mobile terminal execution, method includes the following steps:
Detect the unlock operation of user;
Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance;
When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, held in the case where no user intervention Row:
Unlocking request is initiated to the intelligent wearable device;
Receive the first verification information of intelligent wearable device return;And
The second verification information saved in first verification information and mobile terminal is compared, decides whether to receive unlock operation;
Wherein, whether the step in safe distance includes with the associated intelligent wearable device of the mobile terminal for inquiry, by this The mobile communication protocol of mobile terminal is simultaneously inquired via a security server, and the safe distance is more than short-distance wireless communication energy The communication distance of power, wherein interaction between the mobile terminal and the intelligent wearable device by the security server into Row transfer.
2. the unlocking method of mobile terminal as described in claim 1, which is characterized in that when confirmation and the associated intelligence of the mobile terminal When energy wearable device is not in safe distance, it is desirable that user carries out additional verification operation.
3. the unlocking method of mobile terminal as claimed in claim 2, which is characterized in that the verification operation includes input password or defeated Enter fingerprint.
4. the unlocking method of mobile terminal as described in claim 1, which is characterized in that inquiry and the associated intelligence of the mobile terminal Whether the step in safe distance includes wearable device, is inquired by the short-range wireless communication protocol of the mobile terminal.
5. the unlocking method of mobile terminal as described in claim 1, which is characterized in that it further include the encryption unlocking request, and First verification information of decryption by encryption.
6. the unlocking method of mobile terminal as described in claim 1, which is characterized in that further include refuse the unlock operation after, It instructs mobile terminal shooting photo and obtains geographical location information, and send the photo and the geographical location information to the safety Server.
7. the unlocking method of mobile terminal as claimed in claim 2, which is characterized in that further include judging the additional verifying behaviour It after work fails, instructs mobile terminal shooting photo and obtains geographical location information, and send the photo and geographical location letter It ceases to the security server.
8. the unlocking method of mobile terminal as described in claim 1, which is characterized in that be to be installed on answering for the mobile terminal by one It is executed with program.
9. the unlocking method of mobile terminal as claimed in claim 8, which is characterized in that the application program is forced to open after suspension It is dynamic.
10. a kind of unlocking method of mobile terminal is executed between an intelligent wearable device and a mobile terminal, this method packet Include following steps:
In the unlock operation of mobile terminal detection user;
In the mobile terminal enquiry intelligent wearable device whether in safe distance;
When confirming that the intelligent wearable device is in safe distance, the mobile terminal is in the case where no user is intervened to the intelligence Wearable device initiates unlocking request;
The unlocking request of the mobile terminal is received in the intelligent wearable device;
The first verification information that the intelligent wearable device stores is returned from the intelligent wearable device to the mobile terminal;
The first verification information of intelligent wearable device return is received in the mobile terminal;And
The second verification information saved in first verification information and mobile terminal is compared in the mobile terminal, decides whether to receive Unlock operation;
Wherein, in the mobile terminal enquiry intelligent wearable device, whether the step in safe distance includes, and passes through the movement The mobile communication protocol of terminal is simultaneously inquired via a security server to the intelligent wearable device, and the safe distance is more than short distance Communication distance from wireless communication ability, wherein the interaction between the mobile terminal and the intelligent wearable device is described in Security server carries out transfer.
11. the unlocking method of mobile terminal as claimed in claim 10, which is characterized in that when the mobile terminal confirms that the intelligence is worn When wearing equipment not in safe distance, it is desirable that user carries out additional verification operation.
12. the unlocking method of mobile terminal as claimed in claim 11, which is characterized in that the verification operation include input password or Input fingerprint.
13. the unlocking method of mobile terminal as claimed in claim 10, which is characterized in that in the mobile terminal enquiry, the intelligence is worn Wearing equipment, whether the step in safe distance includes, and is worn by the short-range wireless communication protocol of the mobile terminal to the intelligence Wear equipment query.
14. the unlocking method of mobile terminal as claimed in claim 10, which is characterized in that further including should in mobile terminal refusal After unlock operation, shoots photo and obtain geographical location information, and send the photo and the geographical location information to the safety clothes Business device.
15. the unlocking method of mobile terminal as claimed in claim 11, which is characterized in that further include judging in the mobile terminal It after the additional verification operation failure, shoots photo and obtains geographical location information, and send the photo and geographical location letter It ceases to the security server.
16. the unlocking method of mobile terminal as described in claims 14 or 15, which is characterized in that further include from the security server A notification information is sent to the intelligent wearable device.
17. a kind of system for unlocking of mobile terminal, comprising:
Mobile terminal is configured as:
Detect the unlock operation of user;
Whether with the associated intelligent wearable device of the mobile terminal in safe distance, the safe distance is more than short distance for inquiry The communication distance of wireless communication ability, wherein by the mobile communication protocol of the mobile terminal and via a security server to this Intelligent wearable device inquiry;
When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, held in the case where no user intervention Row: unlocking request is initiated to the intelligent wearable device;Receive the first verification information of intelligent wearable device return;And it compares The second verification information saved in first verification information and mobile terminal decides whether to receive unlock operation;
Intelligent wearable device is configured as:
Receive the unlocking request of the mobile terminal;
The first verification information that the intelligent wearable device stores is returned to the mobile terminal;
Security server is configured as:
The inquiry of the mobile terminal to the intelligent wearable device, the mobile terminal and institute are forwarded to the intelligent wearable device The interaction stated between intelligent wearable device carries out transfer by the security server.
18. the system for unlocking of mobile terminal as claimed in claim 17, which is characterized in that the mobile terminal is additionally configured to refusing After unlock operation, shoots photo and obtain geographical location information, and send the photo and the geographical location information to the safety Server.
19. the system for unlocking of mobile terminal as claimed in claim 17, which is characterized in that the mobile terminal configuration be when confirmation with When the associated intelligent wearable device of the mobile terminal is not in safe distance, it is desirable that user carries out additional verification operation.
20. the system for unlocking of mobile terminal as claimed in claim 19, which is characterized in that the mobile terminal is additionally configured to judging It after the additional verification operation failure, shoots photo and obtains geographical location information, and send the photo and geographical location letter It ceases to the security server.
CN201410777403.7A 2014-12-15 2014-12-15 Mobile terminal and its unlocking method Active CN105760723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410777403.7A CN105760723B (en) 2014-12-15 2014-12-15 Mobile terminal and its unlocking method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410777403.7A CN105760723B (en) 2014-12-15 2014-12-15 Mobile terminal and its unlocking method

Publications (2)

Publication Number Publication Date
CN105760723A CN105760723A (en) 2016-07-13
CN105760723B true CN105760723B (en) 2019-10-25

Family

ID=56336831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410777403.7A Active CN105760723B (en) 2014-12-15 2014-12-15 Mobile terminal and its unlocking method

Country Status (1)

Country Link
CN (1) CN105760723B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9961499B2 (en) * 2016-06-29 2018-05-01 Cyber Group USA Inc. Mobile device reminder/controller system
JP6964658B2 (en) * 2016-08-25 2021-11-10 ジョン,ジェ ラク Data processing terminals that can operate in a variety of modes and related methods
CN106886724B (en) * 2017-02-13 2020-04-07 广东小天才科技有限公司 Multi-dimensional unlocking method for user equipment and user equipment
CN107124515A (en) * 2017-05-15 2017-09-01 上海与德科技有限公司 A kind of intelligent unlocking method and device
CN108880817A (en) * 2017-11-24 2018-11-23 北京视联动力国际信息技术有限公司 A kind of decryption method and device
CN108632433B (en) * 2018-05-03 2020-07-14 中国联合网络通信集团有限公司 Mobile terminal unlocking method and device
CN109033781A (en) * 2018-07-04 2018-12-18 Oppo(重庆)智能科技有限公司 A kind of electronic equipment control method, electronic appliance controlling device and electronic equipment
CN112566031B (en) * 2020-12-16 2023-08-01 深圳市沃特沃德股份有限公司 Antitheft method and device of associated intelligent wearable equipment and computer equipment
CN116760632B (en) * 2023-08-10 2023-11-03 腾讯科技(深圳)有限公司 Data processing method, device, equipment and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831340A (en) * 2012-07-24 2012-12-19 华为终端有限公司 Unlock device and unlock method of electronic device
CN103347133A (en) * 2013-07-15 2013-10-09 上海果壳电子有限公司 Method for achieving mobile phone automatic unlocking and answering calls by identity ring
CN103442120A (en) * 2013-08-09 2013-12-11 北京纽曼腾飞科技有限公司 Smart phone locking and unlocking method
CN103647587A (en) * 2013-12-30 2014-03-19 华为终端有限公司 Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device
CN104050402A (en) * 2014-06-12 2014-09-17 深圳市汇顶科技股份有限公司 Mobile terminal security certification method and system and mobile terminal
CN104090710A (en) * 2014-06-25 2014-10-08 广东欧珀移动通信有限公司 Intelligent terminal unlocking method and intelligent terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8452260B2 (en) * 2010-03-25 2013-05-28 Hewlett-Packard Development Company, L.P. Methods and apparatus for unlocking an electronic device
CN102868593A (en) * 2012-09-12 2013-01-09 北京百纳威尔科技有限公司 Method and terminal for information acquisition

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831340A (en) * 2012-07-24 2012-12-19 华为终端有限公司 Unlock device and unlock method of electronic device
CN103347133A (en) * 2013-07-15 2013-10-09 上海果壳电子有限公司 Method for achieving mobile phone automatic unlocking and answering calls by identity ring
CN103442120A (en) * 2013-08-09 2013-12-11 北京纽曼腾飞科技有限公司 Smart phone locking and unlocking method
CN103647587A (en) * 2013-12-30 2014-03-19 华为终端有限公司 Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device
CN104050402A (en) * 2014-06-12 2014-09-17 深圳市汇顶科技股份有限公司 Mobile terminal security certification method and system and mobile terminal
CN104090710A (en) * 2014-06-25 2014-10-08 广东欧珀移动通信有限公司 Intelligent terminal unlocking method and intelligent terminal

Also Published As

Publication number Publication date
CN105760723A (en) 2016-07-13

Similar Documents

Publication Publication Date Title
CN105760723B (en) Mobile terminal and its unlocking method
US11605275B2 (en) Gateway-based anti-theft security system and method
EP2804153B1 (en) Electronic lock, locking system and method of operating an electronic lock
US11216549B2 (en) Security verification method and device
CN103838992B (en) A kind of fingerprint identification method and terminal
TWI491790B (en) A smart lock structure and an operating method thereof
US10785040B2 (en) Secure communications
CN203278811U (en) Mobile terminal using NFC to transfer WIFI hotspot secret key or certificate
KR101300788B1 (en) Method and System for Controlling a Car using Smart Phone
US9137659B2 (en) Method and system for decoupling user authentication and data encryption on mobile devices
CN105227516A (en) The access method of Smart Home, control centre's equipment and dress terminal
CN102930188A (en) Screen unlocking method and device as well as terminal
CN103488920B (en) A kind of wireless messages safety equipment realize method and system
US20170230365A1 (en) Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN104270758A (en) Method for safely establishing connection with server and conducting authorization through WIFI
CN101185308A (en) Method for controlling connection of a peripheral to an access point, corresponding access point and peripheral
CN102945526A (en) Device and method for improving online payment security of mobile equipment
CN105325021A (en) Method and apparatus for remote portable wireless device authentication
CN103702323B (en) A kind of wireless messages security equipment system and method
CN104063323A (en) Mobile terminal and equipment controlling method and system thereof
CN210605460U (en) Safe type intelligence house control system
EP2811426B1 (en) Radio frequency identification notification system
US11258859B2 (en) Systems and methods for pairing network devices

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20160713

Assignee: Shanghai Li Ke Semiconductor Technology Co., Ltd.

Assignor: Leadcore Technology Co., Ltd.

Contract record no.: 2018990000159

Denomination of invention: Mobile terminal and unlocking method thereof

License type: Common License

Record date: 20180615

EE01 Entry into force of recordation of patent licensing contract
GR01 Patent grant
GR01 Patent grant