CN105787309A - Unlocking method and device, and screen locking method and device - Google Patents

Unlocking method and device, and screen locking method and device Download PDF

Info

Publication number
CN105787309A
CN105787309A CN201410816183.4A CN201410816183A CN105787309A CN 105787309 A CN105787309 A CN 105787309A CN 201410816183 A CN201410816183 A CN 201410816183A CN 105787309 A CN105787309 A CN 105787309A
Authority
CN
China
Prior art keywords
user
password
allow
content
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410816183.4A
Other languages
Chinese (zh)
Inventor
李刚
高甜甜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur LG Digital Mobile Communications Co Ltd
Original Assignee
Inspur LG Digital Mobile Communications Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur LG Digital Mobile Communications Co Ltd filed Critical Inspur LG Digital Mobile Communications Co Ltd
Priority to CN201410816183.4A priority Critical patent/CN105787309A/en
Publication of CN105787309A publication Critical patent/CN105787309A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides an unlocking method and device, and a screen locking method and device, wherein the unlocking method comprises following steps of obtaining an unlocking operation of a user; entering into a master interface if the unlocking operation matches with a first password; hiding preset contents and application programs corresponding to the first password, wherein the user is not allowed to view the preset contents and to operate the application programs; entering into the master interface if the unlocking operation matches with a second password; and hiding preset contents and application programs corresponding to the second password, wherein the user is not allowed to view the preset contents and to operate the application programs, wherein the first password and the second password are different. According to the methods and the devices, the technical problem in the prior art that an effective privacy protection scheme not liable to detect cannot be provided for an intelligent terminal is solved, and the technical effect that the privacy is effectively protected and cannot be detected is realized.

Description

Unlock method and apparatus, screen locking method and device
Technical field
The present invention relates to encryption and decryption technology field, unlock method and apparatus, screen locking method and device particularly to one.
Background technology
Mobile phone increasingly becomes the requisite instrument of people's daily life, constantly perfect along with cell-phone function, mobile phone is more and more intelligent, also allows for any being stored in mobile phone by more information, and some the custom operations in mobile phone wait also gradually can the custom that reflect people etc..
But; the cipher protection function of current phone imperfection; cause great puzzlement also to the user of mobile phone; major part mobile phone is all without effective secret protection scheme at present; even if some mobile phone possesses the protection scheme of some similar guest's patterns; but it is easy to be discovered by other user, it is easy to cause embarrassment.
At present, for the secret protection scheme how to provide effectively for mobile phone or other intelligent terminal, to be not easily noticeable, effective solution is not yet proposed.
For the problems referred to above, effective solution is not yet proposed at present.
Summary of the invention
Embodiments providing a kind of solution locking method, the technical problem of the secret protection scheme cannot provide effectively in prior art, being not easily noticeable for intelligent terminal, this solution locking method includes:
Obtain the solution latching operation of user;
If described solution latching operation mates with first password, then enter main interface, and hide the content not allowing user to check corresponding to first password set in advance and described and do not allow the application program of user operation;
If described solution latching operation and the second password match, then enter main interface, and hide the content not allowing user to check corresponding to the second password set in advance and described and do not allow the application program of user operation, wherein, described first password is different from described second password.
In one embodiment, the content that do not allow user check corresponding with described first password and do not allow the application program of user operation, and the content that do not allow user check corresponding from described second password and not allow the application program of user operation be different.
In one embodiment, described solution latching operation includes at least one of: input unlocks numerical ciphers, input unlocks graphical passwords, knocks.
The embodiment of the present invention additionally provides a kind of screen locking method, the technical problem of the secret protection scheme cannot provide effectively in prior art, being not easily noticeable for intelligent terminal, and this screen locking method includes:
Receive the first password of user's input;
Receive the content that do not allow user check corresponding with described first password of user's input and do not allow the application program of user operation;
Receive the second password of user's input;
Receive the content that do not allow user check corresponding with described second password of user's input and do not allow the application program of user operation;
Arranging and store between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation first and mate corresponding relation, second between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password mates corresponding relation.
In one embodiment, after arranging and store described first coupling corresponding relation and described second coupling corresponding relation, described method also includes:
Obtain user's input to the content that do not allow user check corresponding with described first password and do not allow the application program of user operation modifies first to revise instruction;Revise instruction according to described first reset the content that do not allow user check corresponding with described first password and do not allow the application program of user operation;
Or, obtain user's input to the content that do not allow user check corresponding with described second password and do not allow the application program of user operation modifies second to revise instruction;Revise instruction according to described second reset the content that do not allow user check corresponding with described second password and do not allow the application program of user operation.
In one embodiment, user is allowed to check all of content at current device, and when allowing user that all of application program is operated, operation of modifying.
The embodiment of the present invention additionally provides a kind of tripper, the technical problem of the secret protection scheme cannot provide effectively in prior art, being not easily noticeable for intelligent terminal, and this tripper includes:
Acquiring unit, for obtaining the solution latching operation of user;
First solves lock unit, for when described solution latching operation mates with first password, entering main interface, and hide the content not allowing user to check corresponding to first password set in advance and described and do not allow the application program of user operation;
Second solves lock unit, for when described solution latching operation and the second password match, enter main interface, and hide the content not allowing user to check corresponding to the second password set in advance and described and do not allow the application program of user operation, wherein, described first password is different from described second password.
In one embodiment, the content that do not allow user check corresponding with described first password and do not allow the application program of user operation, and the content that do not allow user check corresponding from described second password and not allow the application program of user operation be different.
The embodiment of the present invention additionally provides a kind of screen locking device, the technical problem of the secret protection scheme cannot provide effectively in prior art, being not easily noticeable for intelligent terminal, and this screen locking device includes:
First receives unit, for receiving the first password of user's input;
Second receives unit, for receiving the content that do not allow user check corresponding with described first password of user's input and not allowing the application program of user operation;
3rd receives unit, for receiving the second password of user's input;
4th receives unit, for receiving the content that do not allow user check corresponding with described second password of user's input and not allowing the application program of user operation;
Unit is set, for arranging and store the corresponding relation that mates between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation, between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password, mate corresponding relation.
In one embodiment, above-mentioned screen locking device also includes:
Amendment unit, for mating corresponding relation between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation arranging and store, between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password mate corresponding relation after, perform following operation:
Obtain user's input to the content that do not allow user check corresponding with described first password and do not allow the application program of user operation modifies first to revise instruction;Revise instruction according to described first reset the content that do not allow user check corresponding with described first password and do not allow the application program of user operation;
Or, obtain user's input to the content that do not allow user check corresponding with described second password and do not allow the application program of user operation modifies second to revise instruction;Revise instruction according to described second reset the content that do not allow user check corresponding with described second password and do not allow the application program of user operation.
In embodiments of the present invention; by unblock interface arranging two unlocking pins same treating; and different operating rights is set for different unlocking pins; thus solving in prior art the technical problem of secret protection scheme that cannot provide effectively for intelligent terminal, not easily be noticeable, reach the technique effect that effective protection privacy will not be noticeable again.
Accompanying drawing explanation
Accompanying drawing described herein is used for providing a further understanding of the present invention, constitutes the part of the application, is not intended that limitation of the invention.In the accompanying drawings:
Fig. 1 is unblock method flow diagram according to embodiments of the present invention;
Fig. 2 is screen locking method flow chart according to embodiments of the present invention;
Fig. 3 be according to embodiments of the present invention a Main screen locking pattern schematic diagram is set;
Fig. 4 be according to embodiments of the present invention the second screen locking pattern schematic diagram is set;
Fig. 5 is the schematic diagram arranging privacy item according to embodiments of the present invention;
Fig. 6 is the first Xie Ping interface schematic diagram according to embodiments of the present invention;
Fig. 7 is the second Xie Ping interface schematic diagram according to embodiments of the present invention;
Fig. 8 is the structured flowchart of tripper according to embodiments of the present invention;
Fig. 9 is the structured flowchart of screen locking device according to embodiments of the present invention.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention clearly understand, below in conjunction with embodiment and accompanying drawing, the present invention is described in further details.At this, the exemplary embodiment of the present invention and explanation thereof are used for explaining the present invention, but not as a limitation of the invention.
Consider mobile phone or other intelligent terminal, such as: panel computer etc., user can be used for interface and be encrypted, could normally use only after decryption, but be typically all and a password is set, as long as having solved this password, so can all functions of terminal being used, even if there is the mode arranging double code, doublet code is also easily found, in order to solve this problem, in this example, it is proposed that a kind of encipher-decipher method, as shown in Figure 1, this solution locking method, including:
Step 101: obtain the solution latching operation of user;
Step 102: if described solution latching operation mates with first password, then enter main interface, and hide the content not allowing user to check corresponding to first password set in advance and described and do not allow the application program of user operation;
Step 103: if described solution latching operation and the second password match, then enter main interface, and hide the content not allowing user to check corresponding to the second password set in advance and described and do not allow the application program of user operation, wherein, described first password is different from described second password.
Namely, it is provided with two unlocking pins simultaneously, two unlocking pins realize unlocking on same interface, the no matter first password of user's input or the second password, all can realize unlocking and enter main interface, but by behind two main interfaces of passwords entrance, content or the application program of permission user operation that permission user checks are different, these needs preset, and the content being simultaneously not allowed to and application program are in hidden state, and user will not discover.In this way, if the user desired that the partial information in oneself intelligent terminal to be stranger sightless, such as: note, message registration etc., two passwords so can be set, such as: first password is 123, second password is 456, if the password of user input is 123, then all the elements in mobile phone are shown, if the password of user input is 456, then will not show that the note in intelligent terminal, message registration etc. are set in advance as sightless function items.
In the above-described embodiments; by unblock interface arranging two unlocking pins same treating; and different operating rights is set for different unlocking pins; thus solving in prior art the technical problem of secret protection scheme that cannot provide effectively for intelligent terminal, not easily be noticeable, reach the technique effect that effective protection privacy will not be noticeable again.
Concrete, in the process realized, operating right that certain first unlocking pin is corresponding and operating right corresponding to the second unlocking pin can also be different, can also be identical, if it is identical, mean that mobile phone exists two unlocking pins, each password can realize the unblock completely to mobile phone, if two authority differences, such as: first unlocks interface can all functions of display device and data, second unlocks interface only shows the function allowing display set in advance and data, so mean that first password can realize unlocking completely, second password achievement unit can decompose lock.
Further, in order to improve motility and the controllability of encryption, it is also possible to arrange the 3rd unlocking pin, the 4th unlocking pin etc., for different passwords, different operating rights is set, hide the content in not operation authority, i.e. set different operations or display authority.
Consider the multiformity of existing encryption and decryption mode, such as: numeral encryption and decryption, figure encryption and decryption, gesture encryption and decryption or knock encryption and decryption etc., the technical scheme of this example is adapted to the encryption and decryption mode of Most current, for instance: solve latching operation and can be, but not limited to: input unlocks numerical ciphers, input unlocks graphical passwords, knocks.
It is important to note, however, that encryption and decryption mode cited in the above-described embodiments is merely to be better described the present invention, it is not intended that inappropriate limitation of the present invention, it is also possible to adopt other encryption and decryption mode.
Concrete, necessarily there is the screen locking of preamble to arrange to realize solving shielding, in this example, as shown in Figure 2, it is provided that a kind of screen locking method, comprise the following steps:
Step 201: receive the first password of user's input;
Step 202: receive the content that do not allow user check corresponding with described first password of user's input and do not allow the application program of user operation;
Step 203: receive the second password of user's input;
Step 204: receive the content that do not allow user check corresponding with described second password of user's input and do not allow the application program of user operation;
Step 205: arranging and store between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation first and mate corresponding relation, second between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password mates corresponding relation.
That is, what be introduced in advance is arrange interface, and in arranging interface, user can arrange two passwords, and arrange unblock interface associated there for the two password simultaneously.Such as: first password 123 is set, second password 456, then arrange after first password unlocks as to unlock completely, user can use and check all of function and information, arrange after the second password unlocks as not exclusively unlocking, and the function that wherein cannot use and check and information are set, password and the display after unlocking and operating right are associated, to ensure follow-up to unlock according to this being set for simultaneously.
Further, in order to improve the motility of encryption and decryption, the password set and the matching relationship unlocked between interface are adjustable in, such as, start to think that photograph item can arbitrarily be checked when setting, but expected later or photograph item was set as checking item, or being set as some photo can not arbitrarily checking item.Authority after just can the second password being unlocked this time is modified, revise the matching relationship between the authority after the second password and the unblock of the second password simultaneously, concrete, the photograph item in authority after being unlocked by second password is set as invisible item, so when user unlocks again by the second password, the photo in equipment will be can't see.
That is, after arranging and store after described first coupling corresponding relation and described second mates corresponding relation, above-mentioned screen locking method also includes:
Obtain user's input to the content that do not allow user check corresponding with described first password and do not allow the application program of user operation modifies first to revise instruction;Revise instruction according to described first reset the content that do not allow user check corresponding with described first password and do not allow the application program of user operation;
Or, obtain user's input to the content that do not allow user check corresponding with described second password and do not allow the application program of user operation modifies second to revise instruction;Revise instruction according to described second reset the content that do not allow user check corresponding with described second password and do not allow the application program of user operation.
With a specific embodiment, above-mentioned solution locking method and screen locking method are illustrated below, it is important to note, however, that this specific embodiment is merely to be better described the present invention, be not intended that inappropriate limitation of the present invention.
In this example; thinking that mobile phone arranges two unlocking pins is that example illustrates; wherein; first password can untie all of locking, is defined as: Main screen locking, and second password only can untie the function of part; it is defined as the second screen locking; so that mobile phone can realize the secret protection based on different screen locking/unlocking manners, thus effectively hiding APP, the data etc. that are not desired to be seen by other people, reach more efficiently secret protection.
Concrete, it is possible to comprise the following steps:
Step 1: user enters setting-lock-screen, arranges mobile phone screen locking mode;
Step 2: the screen locking mode that first time sets, for the Main screen locking of user, so-called Main screen locking is only simple screen locking, can use the repertoire of mobile phone after unlocking;
Step 3: after setting up Main screen locking; can select to arrange the second screen locking (this setting option can also be set as privacy protection mode) in setting-lock-screen; wherein; second screen locking and Main screen locking are suitable for same type unlocking manner (such as: password, pattern, knock); but, the second screen locking and the unlocking pin of Main screen locking (password screen locking mode) or pattern (pattern screen locking mode) or to knock mode (rapping unlocking manner) different;
Step 4: after setting up the second screen locking, ejects protection bootstrap, guides user setup to need privacy content to be protected, concrete, it is possible to first the content that can protect to be carried out brief explanation, allows user understand the scope that can protect;
Step 5: user carries out privacy settings:
1) entering procedure Selection list, user chooses the program needing to hide protection;
2) entering multimedia list, user chooses the multimedia file (such as: video, music etc.) needing to hide;
3) entering file management list, user chooses the file or file that need to hide;
4) entering contact management's list, user chooses the contact person needing to hide;
5) entering other list, user chooses the other types data needing to hide;
Step 6: screen locking arranges end.
After above-mentioned setting, if unlocking Main screen locking, it is possible to use the repertoire of mobile phone and program, if unlocking the second screen locking, then enter secret protection and use pattern.Wherein, screen locking wallpaper, every setting (such as: WIFI password, incoming ring tone etc.) and Main unlock after be on all four.
Wherein, the icon of the APP that the need chosen are hidden is hidden at desktop/application program interface and is disappeared, and needs the widget parts of concealing program to hide at widget interface and disappears, and in setting-application program, the APP relevant information that need to hide also is hidden and disappeared;Hide APP at the need of running background during unblock and continue running background, but do not pop up any information;Multimedia Program (such as: music player, video player etc.) inner media list, does not show the multimedia file concealed;In file manager, do not show the hiding content of setting;In contact person, not showing the hiding contact person of setting, meanwhile, the note/message registration relevant to hiding contact person etc. is also hidden and is disappeared.
Further, enter in setting-screen locking screen, it is possible to the content that arbitrarily increase and decrease the second screen locking is hidden, it is also possible to cancel the second screen locking, it is also possible to continue to arrange the 3rd or the 4th screen locking, concrete function and setting steps and the second screen locking is identical, do not repeat them here.
In actually used process, after user only unlocks main screen locking, setting-lock-screen just there is the second screen locking function is set and show.
In this example, by relying on merely different password/patterns under same unlocking manner/knock mode, it is achieved that facilitation, personalization, safe secret protection.Interface time below in conjunction with practical application is that example illustrates:
As it is shown on figure 3, be that user enters setting-lock-screen, mobile phone Main screen locking is set;As shown in Figure 4, it is after setting up Main screen locking, can select to arrange the second screen locking in setting-lock-screen;As it is shown in figure 5, be after setting up the second screen locking, ejecting protection bootstrap, guide user setup to need privacy content to be protected, enter procedure Selection list, user chooses the program needing to hide protection.
After screen locking arranges end, unlocking Main screen locking, then show interface as shown in Figure 6, user can use repertoire and the program of mobile phone, after unlocking the second screen locking, then shows interface as shown in Figure 7, enters secret protection and uses pattern.By the comparison of Fig. 6 and Fig. 7 it can be seen that Fig. 7 does not show three application programs, i.e. screen locking wallpapers being set to privacy mode, Main unlock after completely the same, and the need chosen hide APP icon table Application Program Interface hide disappear.
Based on same inventive concept, the embodiment of the present invention additionally provides a kind of unblock, screen locking device, as described in the following examples.Due to tripper, to solve principle and the unblock of problem, screen locking method similar, therefore unlocks, the enforcement of screen locking device may refer to unlock, the enforcement of screen locking method, and repetition part repeats no more.Used below, term " unit " or " module " can realize the software of predetermined function and/or the combination of hardware.Although the device described by following example preferably realizes with software, but hardware, or the realization of the combination of software and hardware is also likely to and is contemplated.Fig. 8 is a kind of structured flowchart of the tripper of the embodiment of the present invention, and Fig. 9 is a kind of structured flowchart of the screen locking device of the embodiment of the present invention.
As shown in Figure 8, this tripper includes:
Acquiring unit 801, for obtaining the solution latching operation of user;
First solves lock unit 802, for when described solution latching operation mates with first password, entering main interface, and hide the content not allowing user to check corresponding to first password set in advance and described and do not allow the application program of user operation;
Second solves lock unit 803, for when described solution latching operation and the second password match, enter main interface, and hide the content not allowing user to check corresponding to the second password set in advance and described and do not allow the application program of user operation, wherein, described first password is different from described second password.
As it is shown in figure 9, screen locking device includes:
First receives unit 901, for receiving the first password of user's input;
Second receives unit 902, for receiving the content that do not allow user check corresponding with described first password of user's input and not allowing the application program of user operation;
3rd receives unit 903, for receiving the second password of user's input;
4th receives unit 904, for receiving the content that do not allow user check corresponding with described second password of user's input and not allowing the application program of user operation;
Unit 905 is set, for arranging and store the corresponding relation that mates between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation, between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password, mate corresponding relation.
In another embodiment, additionally providing a kind of software, this software is for performing the technical scheme described in above-described embodiment and preferred implementation.
In another embodiment, additionally providing a kind of storage medium, in this storage medium, storage has above-mentioned software, and this storage medium includes but not limited to: CD, floppy disk, hard disk, scratch pad memory etc..
In from the description above; can be seen that; the embodiment of the present invention achieves following technique effect: by arranging two unlocking pins same treating in unblock interface; and different operating rights is set for different unlocking pins; thus solving in prior art the technical problem of secret protection scheme that cannot provide effectively for intelligent terminal, not easily be noticeable, reach the technique effect that effective protection privacy will not be noticeable again.
Obviously, those skilled in the art should be understood that, each module of the above-mentioned embodiment of the present invention or each step can realize with general calculation element, they can concentrate on single calculation element, or it is distributed on the network that multiple calculation element forms, alternatively, they can realize with the executable program code of calculation element, thus, can be stored in storage device is performed by calculation element, and in some cases, shown or described step can be performed with the order being different from herein, or they are fabricated to respectively each integrated circuit modules, or the multiple modules in them or step are fabricated to single integrated circuit module realize.So, the embodiment of the present invention is not restricted to the combination of any specific hardware and software.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for a person skilled in the art, the embodiment of the present invention can have various modifications and variations.All within the spirit and principles in the present invention, any amendment of making, equivalent replacement, improvement etc., should be included within protection scope of the present invention.

Claims (10)

1. one kind solves locking method, it is characterised in that including:
Obtain the solution latching operation of user;
If described solution latching operation mates with first password, then enter main interface, and hide the content not allowing user to check corresponding to first password set in advance and described and do not allow the application program of user operation;
If described solution latching operation and the second password match, then enter main interface, and hide the content not allowing user to check corresponding to the second password set in advance and described and do not allow the application program of user operation, wherein, described first password is different from described second password.
2. the method for claim 1, it is characterized in that, the content that do not allow user check corresponding with described first password and do not allow the application program of user operation, and the content that do not allow user check corresponding from described second password and not allow the application program of user operation be different.
3. method as claimed in claim 1 or 2, it is characterised in that described solution latching operation includes at least one of: input unlocks numerical ciphers, input unlocks graphical passwords, knocks.
4. a screen locking method, it is characterised in that including:
Receive the first password of user's input;
Receive the content that do not allow user check corresponding with described first password of user's input and do not allow the application program of user operation;
Receive the second password of user's input;
Receive the content that do not allow user check corresponding with described second password of user's input and do not allow the application program of user operation;
Arranging and store between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation first and mate corresponding relation, second between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password mates corresponding relation.
5. method as claimed in claim 4, it is characterised in that after arranging and store described first coupling corresponding relation and described second coupling corresponding relation, described method also includes:
Obtain user's input to the content that do not allow user check corresponding with described first password and do not allow the application program of user operation modifies first to revise instruction;Revise instruction according to described first reset the content that do not allow user check corresponding with described first password and do not allow the application program of user operation;
Or, obtain user's input to the content that do not allow user check corresponding with described second password and do not allow the application program of user operation modifies second to revise instruction;Revise instruction according to described second reset the content that do not allow user check corresponding with described second password and do not allow the application program of user operation.
6. method as claimed in claim 5, it is characterised in that allow user to check all of content at current device, and when allowing user that all of application program is operated, operation of modifying.
7. a tripper, it is characterised in that including:
Acquiring unit, for obtaining the solution latching operation of user;
First solves lock unit, for when described solution latching operation mates with first password, entering main interface, and hide the content not allowing user to check corresponding to first password set in advance and described and do not allow the application program of user operation;
Second solves lock unit, for when described solution latching operation and the second password match, enter main interface, and hide the content not allowing user to check corresponding to the second password set in advance and described and do not allow the application program of user operation, wherein, described first password is different from described second password.
8. device as claimed in claim 7, it is characterized in that, the content that do not allow user check corresponding with described first password and do not allow the application program of user operation, and the content that do not allow user check corresponding from described second password and not allow the application program of user operation be different.
9. a screen locking device, it is characterised in that including:
First receives unit, for receiving the first password of user's input;
Second receives unit, for receiving the content that do not allow user check corresponding with described first password of user's input and not allowing the application program of user operation;
3rd receives unit, for receiving the second password of user's input;
4th receives unit, for receiving the content that do not allow user check corresponding with described second password of user's input and not allowing the application program of user operation;
Unit is set, for arranging and store the corresponding relation that mates between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation, between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password, mate corresponding relation.
10. device as claimed in claim 9, it is characterised in that also include:
Amendment unit, for mating corresponding relation between the described first password content not allowing user to check corresponding with described first password and the application program not allowing user operation arranging and store, between the content not allowing user to check and the application program not allowing user operation that described second password is corresponding with described second password mate corresponding relation after, perform following operation:
Obtain user's input to the content that do not allow user check corresponding with described first password and do not allow the application program of user operation modifies first to revise instruction;Revise instruction according to described first reset the content that do not allow user check corresponding with described first password and do not allow the application program of user operation;
Or, obtain user's input to the content that do not allow user check corresponding with described second password and do not allow the application program of user operation modifies second to revise instruction;Revise instruction according to described second reset the content that do not allow user check corresponding with described second password and do not allow the application program of user operation.
CN201410816183.4A 2014-12-24 2014-12-24 Unlocking method and device, and screen locking method and device Pending CN105787309A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410816183.4A CN105787309A (en) 2014-12-24 2014-12-24 Unlocking method and device, and screen locking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410816183.4A CN105787309A (en) 2014-12-24 2014-12-24 Unlocking method and device, and screen locking method and device

Publications (1)

Publication Number Publication Date
CN105787309A true CN105787309A (en) 2016-07-20

Family

ID=56377509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410816183.4A Pending CN105787309A (en) 2014-12-24 2014-12-24 Unlocking method and device, and screen locking method and device

Country Status (1)

Country Link
CN (1) CN105787309A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570364A (en) * 2016-10-28 2017-04-19 上海斐讯数据通信技术有限公司 Method and system for unlocking mobile terminal and mobile terminal
CN106708366A (en) * 2016-12-28 2017-05-24 上海斐讯数据通信技术有限公司 Mobile terminal desktop application-based protection enabling apparatus and method
CN107045604A (en) * 2017-02-22 2017-08-15 北京小米移动软件有限公司 Information processing method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103699830A (en) * 2013-12-30 2014-04-02 中科创达软件股份有限公司 Operating system unlocking method and operating system unlocking device
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device
CN103873668A (en) * 2012-12-17 2014-06-18 三星电子(中国)研发中心 Method used for protecting user data of portable terminal and portable terminal
CN103886232A (en) * 2012-12-20 2014-06-25 联想(北京)有限公司 Terminal and method for safely utilizing same

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103873668A (en) * 2012-12-17 2014-06-18 三星电子(中国)研发中心 Method used for protecting user data of portable terminal and portable terminal
CN103886232A (en) * 2012-12-20 2014-06-25 联想(北京)有限公司 Terminal and method for safely utilizing same
CN103699830A (en) * 2013-12-30 2014-04-02 中科创达软件股份有限公司 Operating system unlocking method and operating system unlocking device
CN103745147A (en) * 2013-12-30 2014-04-23 华为技术有限公司 System mode starting method and application program starting method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106570364A (en) * 2016-10-28 2017-04-19 上海斐讯数据通信技术有限公司 Method and system for unlocking mobile terminal and mobile terminal
CN106708366A (en) * 2016-12-28 2017-05-24 上海斐讯数据通信技术有限公司 Mobile terminal desktop application-based protection enabling apparatus and method
CN107045604A (en) * 2017-02-22 2017-08-15 北京小米移动软件有限公司 Information processing method and device

Similar Documents

Publication Publication Date Title
CN106462718B (en) Store the rapid data protection of equipment
AU2019262187B2 (en) Systems and methods for providing data loss prevention via an embedded browser
CN101529366B (en) Identification and visualization of trusted user interface objects
CN103763313B (en) File protection method and system
US7941861B2 (en) Permitting multiple tasks requiring elevated rights
CN103617382A (en) Privacy protection method and device
WO2017148341A1 (en) Authority management system, authority management method and electronic device
CN103699830A (en) Operating system unlocking method and operating system unlocking device
US20220405355A1 (en) Network and device security system, method, and apparatus
US20120179915A1 (en) System and method for full disk encryption authentication
CN104573536A (en) File protection method and device
CN103455761A (en) File encryption and decryption method and device and electronic device
KR20150079392A (en) E-mobile device executing function-level lock for mobile device security, method of mobile device security, and non-transitory computer readable medium
CN105809000A (en) Information processing method and electronic device
CN105184132A (en) Electronic device privacy right management method and system
KR20230064623A (en) Mobile devices with secure personal memory
CN103701614A (en) Authentication method and device
CN105787309A (en) Unlocking method and device, and screen locking method and device
WO2016050118A1 (en) Information processing method and information processing device
Mueller Security for Web Developers: Using JavaScript, HTML, and CSS
CN105574423A (en) Terminal device and file management method thereof
CN106790128A (en) A kind of resource share method and device
US10614240B2 (en) Accessing an encrypted file system
CN109033848A (en) Storing data method for safe operation and system
CN104281797A (en) Application program execution system and method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160720