CN105760723B - Mobile terminal and its unlocking method - Google Patents
Mobile terminal and its unlocking method Download PDFInfo
- Publication number
- CN105760723B CN105760723B CN201410777403.7A CN201410777403A CN105760723B CN 105760723 B CN105760723 B CN 105760723B CN 201410777403 A CN201410777403 A CN 201410777403A CN 105760723 B CN105760723 B CN 105760723B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- wearable device
- intelligent wearable
- unlocking
- safe distance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
It is in a mobile terminal execution, method includes the following steps: the unlock operation of detection user the present invention relates to a kind of unlocking method of mobile terminal;Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance;When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, unlocking request is initiated to the intelligent wearable device in the case where no user is intervened;Receive the first verification information of intelligent wearable device return;And the second verification information saved in first verification information and mobile terminal is compared, decide whether to receive unlock operation.
Description
Technical field
The present invention relates to mobile terminals, more particularly, to the unlocking method of mobile terminal.
Background technique
Increasingly mature with the communication technology and chip technology, global mobile communication growth momentum is powerful, global according to statistics
Number of mobile phone users has broken through 5,000,000,000, accounts for about the 77% of population in the world.In recent years advancing by leaps and bounds with the Low-power Technology of chip,
Intelligence wearing will also enter ordinary consumption field.
Digitlization and globalization have had become irreversible trend, such as mobile terminal of smart phone, tablet computer
Become indispensable a part in our lives.A large amount of individual privacy data are stored in these mobile terminals, are disappeared
The person of expense increasingly payes attention to the safety of mobile terminal, and privacy problem becomes digitized bottleneck.Due to smart phone
It is small in size, it is easily lost and is stolen, safety problem more becomes the focus of consumer.At present major part manufacturer using fingerprint,
The form that pattern, password unlock increases the safety of smart phone, but this requires user to require every time using smart phone
It is unlocked.And these modes can be generally bypassed by way of root or brush machine, not be obviously improved intelligent hand
The unlock safety of machine.
Summary of the invention
It is an object of the present invention to provide a kind of unlocking method and systems of safer, convenient and fast mobile terminal.
The present invention to solve above-mentioned technical problem and the technical solution adopted is that a kind of unlocking method of mobile terminal, be
One mobile terminal execution, method includes the following steps: the unlock operation of detection user;Inquiry and the associated intelligence of the mobile terminal
Whether energy wearable device is in safe distance;When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance
When, unlocking request is initiated to the intelligent wearable device in the case where no user is intervened;Receive intelligent wearable device return
First verification information;And the second verification information saved in first verification information and mobile terminal is compared, decide whether to connect
It is operated by the unlock.
In one embodiment of this invention, when confirmation and the associated intelligent wearable device of the mobile terminal be not in safe distance
When interior, it is desirable that user carries out additional verification operation.
In one embodiment of this invention, which includes input password, input pattern or input fingerprint.
In one embodiment of this invention, whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance
Interior step includes being inquired by the short-range wireless communication protocol of the mobile terminal.
In one embodiment of this invention, whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance
Interior step includes passing through the mobile communication protocol of the mobile terminal and inquiring via a security server.
In one embodiment of this invention, the above method further includes encrypting the unlocking request, and decryption is by encryption
First verification information.
In one embodiment of this invention, the above method further includes instructing the mobile terminal after refusing unlock operation
It shoots photo and obtains geographical location information, and send the photo and the geographical location information to a security server.
In one embodiment of this invention, the above method further includes the instruction after judging the additional verification operation failure
The mobile terminal shoots photo and obtains geographical location information, and sends the photo and the geographical location information to a security service
Device.
In one embodiment of this invention, the above method is that the application program for being installed on the mobile terminal by one executes.
In one embodiment of this invention, which is forced to start after suspension.
The present invention also proposes a kind of unlocking method of mobile terminal, is between an intelligent wearable device and a mobile terminal
It executes, method includes the following steps: in the unlock operation of mobile terminal detection user;In the mobile terminal enquiry intelligence
Whether wearable device is in safe distance;When confirming that the intelligent wearable device is in safe distance, the mobile terminal is useless
Family executes in the case where intervening: initiating unlocking request to the intelligent wearable device;Movement end is received in the intelligent wearable device
The unlocking request at end;The first verifying letter that the intelligent wearable device stores is returned from the intelligent wearable device to the mobile terminal
Breath;The first verification information of intelligent wearable device return is received in the mobile terminal;And the mobile terminal compare this
The second verification information saved in one verification information and mobile terminal decides whether to receive unlock operation.
In one embodiment of this invention, when the mobile terminal confirms the intelligent wearable device not in safe distance,
It is required that user carries out additional verification operation.
In one embodiment of this invention, which includes input password, input pattern or input fingerprint.
In one embodiment of this invention, in the mobile terminal enquiry intelligent wearable device whether in safe distance
Step includes being inquired by the short-range wireless communication protocol of the mobile terminal to the intelligent wearable device.
In one embodiment of this invention, in the mobile terminal enquiry intelligent wearable device whether in safe distance
Step includes passing through the mobile communication protocol of the mobile terminal and inquiring via a security server to the intelligent wearable device.
In one embodiment of this invention, the above method further includes the shooting after the mobile terminal refuses unlock operation
Photo and acquisition geographical location information, and the photo and the geographical location information are sent to a security server.
In one embodiment of this invention, the above method further includes judging the additional verification operation in the mobile terminal
After failure, shoots photo and obtain geographical location information, and send the photo and the geographical location information to a security server.
In one embodiment of this invention, the above method further includes that a notification information is sent from the security server to the intelligence
It can wearable device.
The present invention also proposes a kind of system for unlocking of mobile terminal, including mobile terminal and intelligent wearable device, the movement
Terminal is configured as: detecting the unlock operation of user;Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safety
In distance;When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, the case where no user is intervened
Lower execution: unlocking request is initiated to the intelligent wearable device;Receive the first verification information of intelligent wearable device return;And
The second verification information saved in first verification information and mobile terminal is compared, decides whether to receive unlock operation.The intelligence
Energy wearable device is configured as: receiving the unlocking request of the mobile terminal;And intelligence wearing is returned to the mobile terminal and is set
First verification information of standby storage.
In one embodiment of this invention, above-mentioned system for unlocking further includes a security server, security server forwarding
Inquiry of the mobile terminal to the intelligent wearable device.
In one embodiment of this invention, above-mentioned system for unlocking further includes a security server, which also configures
To shoot photo and obtaining geographical location information, and send the photo and the geographical location information after refusing unlock operation
To the security server.
In one embodiment of this invention, which is when confirmation and the associated intelligence of the mobile terminal are dressed
When equipment is not in safe distance, it is desirable that user carries out additional verification operation.
In one embodiment of this invention, above-mentioned system for unlocking further includes a security server, which also configures
To shoot photo and obtaining geographical location information, and send the photo and the ground after judging the additional verification operation failure
Location information is managed to a security server.
The present invention due to using the technology described above, be allowed to compared with prior art, by combine intelligent wearable device and
The safety unlock for the mobile terminal that mobile terminal is realized, is able to solve personal privacy protection problem, and in safe distance range
Interior user does not need input password or mobile phone safe unlock can be realized in fingerprint recognition, has taken into account safety and convenience.
Detailed description of the invention
For the above objects, features and advantages of the present invention can be clearer and more comprehensible, below in conjunction with attached drawing to tool of the invention
Body embodiment elaborates, in which:
Fig. 1 is the system for unlocking framework of the mobile terminal of first embodiment of the invention.
Fig. 2 is the system for unlocking framework of the mobile terminal of second embodiment of the invention.
Fig. 3 is the system for unlocking framework of the mobile terminal of third embodiment of the invention.
Fig. 4 is the unlocking method of the mobile terminal of first embodiment of the invention.
Fig. 5 is the unlocking method of the mobile terminal of second embodiment of the invention.
Specific embodiment
The embodiment of the present invention proposes a kind of unlocking method of mobile terminal, by combining intelligent wearable device and movement
Terminal is realized.
Such as the intelligent wearable device of smartwatch, Intelligent bracelet and intelligent glasses etc. and such as smart phone, plate electricity
The mobile terminal of brain is compared, more inseparable with user.Such as smartwatch, Intelligent bracelet and intelligent glasses are in the most of the time
It all wears on the user's body, it is not easy to pass into silence or steal.Therefore intelligent wearable device is suitable as unlock mobile terminal
Tool.
Fig. 1 is the system for unlocking framework of the mobile terminal of first embodiment of the invention.Refering to what is shown in Fig. 1, system for unlocking frame
Structure may include mobile terminal 10 and with the associated intelligent wearable device 20 of mobile terminal 10.Mobile terminal 10 is, for example, intelligence above-mentioned
Energy mobile phone peace plate computer, is also possible to other mobile electronic devices with similar functions.Mobile terminal 10 has operation system
System, and various application programs can be run on an operating system.Mobile terminal 10 also has short-distance wireless communication ability.Such as it moves
Dynamic terminal 10 can be communicated by Bluetooth protocol, WIFI agreement or NFC protocol with neighbouring other electronic equipments.Intelligence wearing is set
Standby 20 also have short-distance wireless communication ability, so as to carry out short haul connection with mobile terminal 10.
Continue to refer to figure 1, the internal structure of the mobile terminal 10 of the present embodiment include processing module 11, memory module 12,
Encryption/decryption module 13 and wireless communication module 14.In memory module 12 can storage program area and application program, and can be loaded into
It is executed in processing module 11.Wireless communication module 14 can be sent out information and receive information.Encryption/decryption module 13 can be right
The information of transmission is encrypted, and received information is decrypted.In the operating system or application program of mobile terminal 10
In can set a safe distance.This safe distance is the safe distance between mobile terminal 10 and intelligent wearable device 20.
In this safe distance, unlock operation can be completed by the cooperation between intelligent wearable device 20 and mobile terminal 10, and this
One cooperation need not be intervened by user.Outside this safe distance, unlock operation requires user to carry out additional verification operation, example
Such as input password, input pattern, input fingerprint or other verification informations.Safe distance can be by user's self-defining.Example
Such as, safe distance can be set in tens cm, and when this is that user operates mobile terminal 10, mobile terminal 10 is set with intelligence wearing
Standby 20 usual distance.Certainly, allow user that longer safe distance, such as several meters, even more than ten are set according to its preference
Rice.Certainly, safe distance needs to consider the communication distance of short-distance wireless communication ability.
It continues to refer to figure 1, the intelligent wearable device 20 of the present embodiment may include verification information module 21, encryption/decryption module
22, wireless communication module 23 and power supply module 24.The first verification information can be stored in verification information module 21, first verifying
Information is used to issue when needing to unlock to mobile terminal 10, the voucher as unlock.Correspondingly, is stored in mobile terminal 10
Two verification informations.There is pairing relationship, such as identical or satisfaction one between first verification information and the second verification information
Fixed conversion relation.First verification information can be the identity information of user, and be preferably provided with uniqueness.In reality of the invention
It applies in example, the first verification information can be defined by user.
Preferably, encryption/decryption module 22 can encrypt the first verification information, then defeated outward through wireless communication module 23
Out.Power supply module 24 can power for verification information module 21, encryption/decryption module 22 and wireless communication module 23.
It will be understood by those skilled in the art that encryption/decryption module 13 and encryption/decryption module 22 are to improve information and transmit
Safety, in the occasion not high to security requirement, encryption/decryption module 13 and encryption/decryption module 22 be can be omitted, and directly be transmitted
Not encrypted information.
Mobile terminal 10 can receive the unlocking request of user to start unlocking process.Such as user passes through pressing
The specific keys of mobile terminal 10, as power supply is strong, Home key to unlock mobile phone or user passes through the touching in mobile terminal 10
It touches and is slided on screen to unlock mobile phone, mobile terminal 10 receives these signals to start unlock.
Fig. 4 is the unlocking method of the mobile terminal of first embodiment of the invention.Refering to what is shown in Fig. 4, the movement of the present embodiment
The unlocking method of terminal the following steps are included:
In step 401, the unlock operation of user is detected in mobile terminal 10.
Such as user presses the specific keys of mobile terminal 10, as power supply is strong, Home key unlocks mobile phone, or uses
Person unlocks mobile phone by being slided on the touch screen of mobile terminal 10.
In step 402, intelligent wearable device 20 is inquired whether in safe distance in mobile terminal 10.
The operation of inquiry can be from mobile terminal 10 and send signal to surrounding by its wireless communication module 14, and by intelligence
The wireless communication module 23 of energy wearable device 20 is responded.
In step 403, when mobile terminal 10 confirms that intelligent wearable device 20 is in safe distance, mobile terminal 10 is in nothing
Unlocking request is initiated to intelligent wearable device 20 in the case where user intervention.
Correspondingly, in step 404, intelligent wearable device 20 receives the unlocking request of mobile terminal 10.
In step 405, intelligent wearable device 20 stores first is returned from intelligent wearable device 20 to mobile terminal 10 and is tested
Demonstrate,prove information.
Correspondingly, in step 406, the first verification information that intelligent wearable device 20 returns is received in mobile terminal 10.
In step 407, the second verification information saved in the first verification information and mobile terminal is compared in mobile terminal 10,
Judge whether the two matches, decides whether to receive unlock operation.
In step 410, if the two matches, receive unlock operation.
In step 411, if the two mismatches, refuse to receive unlock operation.
On the other hand, confirm with the associated intelligent wearable device of the mobile terminal not in safe distance when in step 402
When, then enter step 408, it is desirable that user carries out additional verification operation.Such as user is required to input password, input figure
Case, input fingerprint or other verification informations.Step 409, if be proved to be successful, such as password is correct or pattern, fingerprint
Match, then equally receives unlock operation in step 410, otherwise refusal receives unlock operation.
In the preferred embodiment, it is being transmitted between mobile terminal 10 and intelligent wearable device 20 in step 403,404
Information, such as unlocking request and verification information, can be encrypted in transmitting terminal, and are decrypted in receiving end, to improve peace
Quan Xing.
In the present embodiment, in terms of 10 angle of mobile terminal, the unlocking method implemented includes: to detect the unlock behaviour of user
Make;Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance;It is associated with mobile terminal when confirming
It when intelligent wearable device is in safe distance, is executed in the case where no user intervention: initiating to unlock to the intelligent wearable device
Request;Receive the first verification information that intelligent wearable device returns;And it compares in the first verification information and mobile terminal and saves
The second verification information, decide whether receive unlock operation.In one embodiment, this unlocking method can apply journey at one
Implement in sequence.
Fig. 2 is the system for unlocking framework of the mobile terminal of second embodiment of the invention.Refering to what is shown in Fig. 2, the present embodiment
First embodiment one shown in system for unlocking framework and Fig. 1 the difference is that, safety zone 16 is set, and by encryption/decryption module
13 settings are run in safety zone 16, in case encryption/decryption module 13 is stolen, modifies and destroys.Shown in the present embodiment and Fig. 1
First embodiment another difference is that, in safety zone 16 be arranged real-time monitoring module 15, be responsible for monitoring implement solution
Whether the application program of locking method is running, if the application program kills process, real-time monitoring module 15 by Malware
The process is restarted in pressure.
By the unlocking method of the unlock framework and first embodiment of first embodiment and second embodiment, can use
The assistance of intelligent wearable device 20 of user is unlocked mobile terminal 10, this not only ensure that the safety of unlock, but also can allow
User realizes and safely and conveniently unlocks from additional verification operations such as input password, input pattern, fingerprints.
In above-mentioned first embodiment and second embodiment, to avoid illegally obtaining taker and pass through root for mobile terminal 10
Or brush machine enters mobile terminal 10, can configure anti-brush machine technology and guarantee to carry out the system integrity of mobile terminal 10.
Fig. 3 is the system for unlocking framework of the mobile terminal of third embodiment of the invention.Refering to what is shown in Fig. 3, system for unlocking frame
Structure may include mobile terminal 10, intelligent wearable device 20, security server 30 and trusted service management platform 40.Mobile terminal 10
Smart phone and tablet computer e.g. above-mentioned, are also possible to other mobile electronic devices with similar functions.It is mobile whole
End 10 has operating system, and can run various application programs on an operating system.Mobile terminal 10 also has short-distance wireless
Communication capacity.Such as mobile terminal 10 can pass through Bluetooth protocol, WIFI agreement or NFC protocol and neighbouring other electronic equipments
Communication.Intelligent wearable device 20 also has short-distance wireless communication ability, so as to which it is logical to carry out short distance with mobile terminal 10
Letter.Mobile terminal 10 and intelligent wearable device 20 also have mobile communication ability, that is, utilize various 2G, 3G or 4G mobile communication
Agreement, by network 50 and remote equipment, the ability communicated such as security server 30.
With continued reference to Fig. 3, the internal structure of the mobile terminal 10 of the present embodiment include processing module 11, memory module 12,
Encryption/decryption module 13, wireless communication module 14 and mobile communication module 17.It can storage program area and application in memory module 12
Program, and can be loaded into processing module 11 and execute.Wireless communication module 14 and mobile communication module 17 can be sent out
Information and reception information.Encryption/decryption module 13 can encrypt the information of transmission, and received information is decrypted.
A safe distance can be set in the operating system or application program of mobile terminal 10.This safe distance is mobile terminal
Safe distance between 10 and intelligent wearable device 20.In this safe distance, unlock operation can be by intelligent wearable device 20
Cooperation between mobile terminal 10 is completed, and this cooperation need not intervene by user.Outside this safe distance, unlock behaviour
It is required user and carries out additional verification operation, such as input password, input fingerprint or other verification informations.Safe distance
It can be by user's self-defining.For example, safe distance can be set in tens cm, this is that user operates mobile terminal 10
When, the usual distance of mobile terminal 10 and intelligent wearable device 20.Certainly, allow user that longer peace is set according to its preference
Full distance, such as several meters, even more than ten meters.When safe distance can be more than the communication distance of short-distance wireless communication ability, this
When mobile terminal 10 and intelligent wearable device 20 between interaction can by security server 30 carry out transfer.
One function of security server 30 is the safe distance in user's setting beyond short-range wireless communication module
When the transmission range of (wifi, bluetooth, NFC etc.), information transfer is carried out between mobile terminal 10 and intelligent wearable device 20.
Another function of security server 30 is the information for receiving mobile terminal 10 and sending, such as the photo and ground that will describe hereinafter
Information is managed, and sends notification information to intelligent wearable device 20.
Trusted service management platform 40 be responsible for mobile terminal 10, in intelligent wearable device 20 application program deployment, guarantee
The legitimacy of application program is installed, or guarantees the legitimacy of application program in such a way that mobile phone dispatches from the factory preset application.Citing comes
It says, mobile terminal 10 and intelligent wearable device 20 are application program needed for implementing unlock, can only manage platform from trusted service
40 obtain.
It continues to refer to figure 1, the intelligent wearable device 20 of the present embodiment may include verification information module 21, encryption/decryption module
22, wireless communication module 23, mobile communication module 25 and power supply module 24.The first verifying can be stored in verification information module 21
Information, first verification information are used to issue when needing to unlock to mobile terminal 10, the voucher as unlock.Correspondingly, it moves
The second verification information is stored in dynamic terminal 10.There is pairing relationship, such as complete between first verification information and the second verification information
It is exactly the same or meet certain conversion relation.First verification information can be the identity information of user, and be preferably provided with only
One property.In an embodiment of the present invention, the first verification information can be defined by user.
Preferably, encryption/decryption module 22 can encrypt the first verification information, then through wireless communication module 23 and movement
Communication module 25 exports outward.Power supply module 24 can be verification information module 21, encryption/decryption module 22, wireless communication module 23
It powers with mobile communication module 25.
It will be understood by those skilled in the art that encryption/decryption module 13 and encryption/decryption module 22 are to improve information and transmit
Safety, in the occasion not high to security requirement, encryption/decryption module 13 and encryption/decryption module 22 be can be omitted, and directly be transmitted
Not encrypted information.
Mobile terminal 10 can receive the unlocking request of user to start unlocking process.Such as user passes through pressing
The specific keys of mobile terminal 10, as power supply is strong, Home key to unlock mobile phone or user passes through the touching in mobile terminal 10
It touches and is slided on screen to unlock mobile phone, mobile terminal 10 receives these signals to start unlock.
Fig. 5 is the unlocking method of the mobile terminal of second embodiment of the invention.Refering to what is shown in Fig. 5, the movement of the present embodiment
The unlocking method of terminal the following steps are included:
In step 501, the unlock operation of user is detected in mobile terminal 10.
Such as user presses the specific keys of mobile terminal 10, as power supply is strong, Home key unlocks mobile phone, or uses
Person unlocks mobile phone by being slided on the touch screen of mobile terminal 10.
In step 502, intelligent wearable device 20 is inquired whether in safe distance in mobile terminal 10.
The operation of inquiry can be from mobile terminal 10 and send signal to surrounding by its wireless communication module 14, and by intelligence
The wireless communication module 23 of energy wearable device 20 is responded.
The operation of inquiry can also be from mobile terminal 10 and be sent by its mobile communication module 17 to security server 30
Signal is transmitted to intelligent wearable device 20 by security server 30, is carried out by the mobile communication module 25 of intelligent wearable device 20
Response.
In step 503, when mobile terminal 10 confirms that intelligent wearable device 20 is in safe distance, mobile terminal 10 is in nothing
Unlocking request is initiated to intelligent wearable device 20 in the case where user intervention.
Correspondingly, in step 504, intelligent wearable device 20 receives the unlocking request of mobile terminal 10.
In step 505, intelligent wearable device 20 stores first is returned from intelligent wearable device 20 to mobile terminal 10 and is tested
Demonstrate,prove information.
Correspondingly, in step 506, the first verification information that intelligent wearable device 20 returns is received in mobile terminal 10.
In step 507, the second verification information saved in the first verification information and mobile terminal is compared in mobile terminal 10,
Judge whether the two matches, decides whether to receive unlock operation.
In step 510, if the two matches, receive unlock operation.
In step 511, if the two mismatches, refuse to receive unlock operation.
On the other hand, confirm with the associated intelligent wearable device of the mobile terminal not in safe distance when in step 502
When, then enter step 508, it is desirable that user carries out additional verification operation.Such as user is required to input password, input fingerprint
Or other verification informations.Step 5 09, if be proved to be successful, such as password is correct or fingerprint matching, then equally in step
510 receive unlock operation, and otherwise refusal receives unlock operation.
In step 511, refusal, which receives unlock operation, means that this time unlocking operation is illegal operation, and then in step 512
It instructs mobile terminal 10 to shoot photo and obtains geographical location information, and send photo and geographical location information to security server
30.Here, the photo that the front camera that shooting photo should include mobile terminal 10 is shot, to capture back street operators at this time
Portrait.The acquisition of geographical location information can also pass through shifting by the satellite positioning module configured in mobile terminal 10
The interaction of the mobile communication module 17 and network of dynamic terminal 10.
Correspondingly, in security server 30, photo and geography information are received in step 512.And further, it may also include
Step 513, notification information is sent to intelligent wearable device 20 from security server 30.Correspondingly, in step 514, intelligence is dressed
Equipment 20 receives notification information, so that the present situation of mobile terminal 10 is notified user.
The embodiment of the present invention passes through the mobile phone safe unlocking method in conjunction with intelligent wearable device and intelligent terminal realization, energy
Enough solve the problems, such as personal privacy protection, and user does not need input password within the scope of safe distance or fingerprint recognition can be real
Existing mobile phone safe unlock.In the preferred embodiment, if unlock unsuccessfully can also be by the photo and mobile phone position information of illegal unlock person
Security server is uploaded to, and intelligent wearable device is informed by mobile network.Relatively traditional mobile phone unlocking method, the present invention
Embodiment the user experience is improved, and substantially increase safety.
Although the present invention is described with reference to current specific embodiment, those of ordinary skill in the art
It should be appreciated that above embodiment is intended merely to illustrate the present invention, can also make in the case where no disengaging spirit of that invention
Various equivalent change or replacement out, therefore, as long as to the variation of above-described embodiment, change in spirit of the invention
Type will all be fallen in the range of following claims.
Claims (20)
1. a kind of unlocking method of mobile terminal, be in a mobile terminal execution, method includes the following steps:
Detect the unlock operation of user;
Whether inquiry is with the associated intelligent wearable device of the mobile terminal in safe distance;
When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, held in the case where no user intervention
Row:
Unlocking request is initiated to the intelligent wearable device;
Receive the first verification information of intelligent wearable device return;And
The second verification information saved in first verification information and mobile terminal is compared, decides whether to receive unlock operation;
Wherein, whether the step in safe distance includes with the associated intelligent wearable device of the mobile terminal for inquiry, by this
The mobile communication protocol of mobile terminal is simultaneously inquired via a security server, and the safe distance is more than short-distance wireless communication energy
The communication distance of power, wherein interaction between the mobile terminal and the intelligent wearable device by the security server into
Row transfer.
2. the unlocking method of mobile terminal as described in claim 1, which is characterized in that when confirmation and the associated intelligence of the mobile terminal
When energy wearable device is not in safe distance, it is desirable that user carries out additional verification operation.
3. the unlocking method of mobile terminal as claimed in claim 2, which is characterized in that the verification operation includes input password or defeated
Enter fingerprint.
4. the unlocking method of mobile terminal as described in claim 1, which is characterized in that inquiry and the associated intelligence of the mobile terminal
Whether the step in safe distance includes wearable device, is inquired by the short-range wireless communication protocol of the mobile terminal.
5. the unlocking method of mobile terminal as described in claim 1, which is characterized in that it further include the encryption unlocking request, and
First verification information of decryption by encryption.
6. the unlocking method of mobile terminal as described in claim 1, which is characterized in that further include refuse the unlock operation after,
It instructs mobile terminal shooting photo and obtains geographical location information, and send the photo and the geographical location information to the safety
Server.
7. the unlocking method of mobile terminal as claimed in claim 2, which is characterized in that further include judging the additional verifying behaviour
It after work fails, instructs mobile terminal shooting photo and obtains geographical location information, and send the photo and geographical location letter
It ceases to the security server.
8. the unlocking method of mobile terminal as described in claim 1, which is characterized in that be to be installed on answering for the mobile terminal by one
It is executed with program.
9. the unlocking method of mobile terminal as claimed in claim 8, which is characterized in that the application program is forced to open after suspension
It is dynamic.
10. a kind of unlocking method of mobile terminal is executed between an intelligent wearable device and a mobile terminal, this method packet
Include following steps:
In the unlock operation of mobile terminal detection user;
In the mobile terminal enquiry intelligent wearable device whether in safe distance;
When confirming that the intelligent wearable device is in safe distance, the mobile terminal is in the case where no user is intervened to the intelligence
Wearable device initiates unlocking request;
The unlocking request of the mobile terminal is received in the intelligent wearable device;
The first verification information that the intelligent wearable device stores is returned from the intelligent wearable device to the mobile terminal;
The first verification information of intelligent wearable device return is received in the mobile terminal;And
The second verification information saved in first verification information and mobile terminal is compared in the mobile terminal, decides whether to receive
Unlock operation;
Wherein, in the mobile terminal enquiry intelligent wearable device, whether the step in safe distance includes, and passes through the movement
The mobile communication protocol of terminal is simultaneously inquired via a security server to the intelligent wearable device, and the safe distance is more than short distance
Communication distance from wireless communication ability, wherein the interaction between the mobile terminal and the intelligent wearable device is described in
Security server carries out transfer.
11. the unlocking method of mobile terminal as claimed in claim 10, which is characterized in that when the mobile terminal confirms that the intelligence is worn
When wearing equipment not in safe distance, it is desirable that user carries out additional verification operation.
12. the unlocking method of mobile terminal as claimed in claim 11, which is characterized in that the verification operation include input password or
Input fingerprint.
13. the unlocking method of mobile terminal as claimed in claim 10, which is characterized in that in the mobile terminal enquiry, the intelligence is worn
Wearing equipment, whether the step in safe distance includes, and is worn by the short-range wireless communication protocol of the mobile terminal to the intelligence
Wear equipment query.
14. the unlocking method of mobile terminal as claimed in claim 10, which is characterized in that further including should in mobile terminal refusal
After unlock operation, shoots photo and obtain geographical location information, and send the photo and the geographical location information to the safety clothes
Business device.
15. the unlocking method of mobile terminal as claimed in claim 11, which is characterized in that further include judging in the mobile terminal
It after the additional verification operation failure, shoots photo and obtains geographical location information, and send the photo and geographical location letter
It ceases to the security server.
16. the unlocking method of mobile terminal as described in claims 14 or 15, which is characterized in that further include from the security server
A notification information is sent to the intelligent wearable device.
17. a kind of system for unlocking of mobile terminal, comprising:
Mobile terminal is configured as:
Detect the unlock operation of user;
Whether with the associated intelligent wearable device of the mobile terminal in safe distance, the safe distance is more than short distance for inquiry
The communication distance of wireless communication ability, wherein by the mobile communication protocol of the mobile terminal and via a security server to this
Intelligent wearable device inquiry;
When confirmation and the associated intelligent wearable device of the mobile terminal are in safe distance, held in the case where no user intervention
Row: unlocking request is initiated to the intelligent wearable device;Receive the first verification information of intelligent wearable device return;And it compares
The second verification information saved in first verification information and mobile terminal decides whether to receive unlock operation;
Intelligent wearable device is configured as:
Receive the unlocking request of the mobile terminal;
The first verification information that the intelligent wearable device stores is returned to the mobile terminal;
Security server is configured as:
The inquiry of the mobile terminal to the intelligent wearable device, the mobile terminal and institute are forwarded to the intelligent wearable device
The interaction stated between intelligent wearable device carries out transfer by the security server.
18. the system for unlocking of mobile terminal as claimed in claim 17, which is characterized in that the mobile terminal is additionally configured to refusing
After unlock operation, shoots photo and obtain geographical location information, and send the photo and the geographical location information to the safety
Server.
19. the system for unlocking of mobile terminal as claimed in claim 17, which is characterized in that the mobile terminal configuration be when confirmation with
When the associated intelligent wearable device of the mobile terminal is not in safe distance, it is desirable that user carries out additional verification operation.
20. the system for unlocking of mobile terminal as claimed in claim 19, which is characterized in that the mobile terminal is additionally configured to judging
It after the additional verification operation failure, shoots photo and obtains geographical location information, and send the photo and geographical location letter
It ceases to the security server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410777403.7A CN105760723B (en) | 2014-12-15 | 2014-12-15 | Mobile terminal and its unlocking method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410777403.7A CN105760723B (en) | 2014-12-15 | 2014-12-15 | Mobile terminal and its unlocking method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105760723A CN105760723A (en) | 2016-07-13 |
CN105760723B true CN105760723B (en) | 2019-10-25 |
Family
ID=56336831
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410777403.7A Active CN105760723B (en) | 2014-12-15 | 2014-12-15 | Mobile terminal and its unlocking method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105760723B (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9961499B2 (en) * | 2016-06-29 | 2018-05-01 | Cyber Group USA Inc. | Mobile device reminder/controller system |
JP6964658B2 (en) * | 2016-08-25 | 2021-11-10 | ジョン,ジェ ラク | Data processing terminals that can operate in a variety of modes and related methods |
CN106886724B (en) * | 2017-02-13 | 2020-04-07 | 广东小天才科技有限公司 | Multi-dimensional unlocking method for user equipment and user equipment |
CN107124515A (en) * | 2017-05-15 | 2017-09-01 | 上海与德科技有限公司 | A kind of intelligent unlocking method and device |
CN108880817A (en) * | 2017-11-24 | 2018-11-23 | 北京视联动力国际信息技术有限公司 | A kind of decryption method and device |
CN108632433B (en) * | 2018-05-03 | 2020-07-14 | 中国联合网络通信集团有限公司 | Mobile terminal unlocking method and device |
CN109033781A (en) * | 2018-07-04 | 2018-12-18 | Oppo(重庆)智能科技有限公司 | A kind of electronic equipment control method, electronic appliance controlling device and electronic equipment |
CN112566031B (en) * | 2020-12-16 | 2023-08-01 | 深圳市沃特沃德股份有限公司 | Antitheft method and device of associated intelligent wearable equipment and computer equipment |
CN116760632B (en) * | 2023-08-10 | 2023-11-03 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and readable storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831340A (en) * | 2012-07-24 | 2012-12-19 | 华为终端有限公司 | Unlock device and unlock method of electronic device |
CN103347133A (en) * | 2013-07-15 | 2013-10-09 | 上海果壳电子有限公司 | Method for achieving mobile phone automatic unlocking and answering calls by identity ring |
CN103442120A (en) * | 2013-08-09 | 2013-12-11 | 北京纽曼腾飞科技有限公司 | Smart phone locking and unlocking method |
CN103647587A (en) * | 2013-12-30 | 2014-03-19 | 华为终端有限公司 | Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device |
CN104050402A (en) * | 2014-06-12 | 2014-09-17 | 深圳市汇顶科技股份有限公司 | Mobile terminal security certification method and system and mobile terminal |
CN104090710A (en) * | 2014-06-25 | 2014-10-08 | 广东欧珀移动通信有限公司 | Intelligent terminal unlocking method and intelligent terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8452260B2 (en) * | 2010-03-25 | 2013-05-28 | Hewlett-Packard Development Company, L.P. | Methods and apparatus for unlocking an electronic device |
CN102868593A (en) * | 2012-09-12 | 2013-01-09 | 北京百纳威尔科技有限公司 | Method and terminal for information acquisition |
-
2014
- 2014-12-15 CN CN201410777403.7A patent/CN105760723B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102831340A (en) * | 2012-07-24 | 2012-12-19 | 华为终端有限公司 | Unlock device and unlock method of electronic device |
CN103347133A (en) * | 2013-07-15 | 2013-10-09 | 上海果壳电子有限公司 | Method for achieving mobile phone automatic unlocking and answering calls by identity ring |
CN103442120A (en) * | 2013-08-09 | 2013-12-11 | 北京纽曼腾飞科技有限公司 | Smart phone locking and unlocking method |
CN103647587A (en) * | 2013-12-30 | 2014-03-19 | 华为终端有限公司 | Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device |
CN104050402A (en) * | 2014-06-12 | 2014-09-17 | 深圳市汇顶科技股份有限公司 | Mobile terminal security certification method and system and mobile terminal |
CN104090710A (en) * | 2014-06-25 | 2014-10-08 | 广东欧珀移动通信有限公司 | Intelligent terminal unlocking method and intelligent terminal |
Also Published As
Publication number | Publication date |
---|---|
CN105760723A (en) | 2016-07-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105760723B (en) | Mobile terminal and its unlocking method | |
US11605275B2 (en) | Gateway-based anti-theft security system and method | |
EP2804153B1 (en) | Electronic lock, locking system and method of operating an electronic lock | |
US11216549B2 (en) | Security verification method and device | |
CN103838992B (en) | A kind of fingerprint identification method and terminal | |
TWI491790B (en) | A smart lock structure and an operating method thereof | |
US10785040B2 (en) | Secure communications | |
CN203278811U (en) | Mobile terminal using NFC to transfer WIFI hotspot secret key or certificate | |
KR101300788B1 (en) | Method and System for Controlling a Car using Smart Phone | |
US9137659B2 (en) | Method and system for decoupling user authentication and data encryption on mobile devices | |
CN105227516A (en) | The access method of Smart Home, control centre's equipment and dress terminal | |
CN102930188A (en) | Screen unlocking method and device as well as terminal | |
CN103488920B (en) | A kind of wireless messages safety equipment realize method and system | |
US20170230365A1 (en) | Method and system for securing electronic data exchange between an industrial programmable device and a portable programmable device | |
CN104952128A (en) | Intelligent handheld terminal based electronic unlocking system and unlocking method thereof | |
CN205121680U (en) | Bluetooth lock system based on intelligent terminal | |
CN104270758A (en) | Method for safely establishing connection with server and conducting authorization through WIFI | |
CN101185308A (en) | Method for controlling connection of a peripheral to an access point, corresponding access point and peripheral | |
CN102945526A (en) | Device and method for improving online payment security of mobile equipment | |
CN105325021A (en) | Method and apparatus for remote portable wireless device authentication | |
CN103702323B (en) | A kind of wireless messages security equipment system and method | |
CN104063323A (en) | Mobile terminal and equipment controlling method and system thereof | |
CN210605460U (en) | Safe type intelligence house control system | |
EP2811426B1 (en) | Radio frequency identification notification system | |
US11258859B2 (en) | Systems and methods for pairing network devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
EE01 | Entry into force of recordation of patent licensing contract |
Application publication date: 20160713 Assignee: Shanghai Li Ke Semiconductor Technology Co., Ltd. Assignor: Leadcore Technology Co., Ltd. Contract record no.: 2018990000159 Denomination of invention: Mobile terminal and unlocking method thereof License type: Common License Record date: 20180615 |
|
EE01 | Entry into force of recordation of patent licensing contract | ||
GR01 | Patent grant | ||
GR01 | Patent grant |