CN105825123A - Unlocking method and mobile terminal - Google Patents
Unlocking method and mobile terminal Download PDFInfo
- Publication number
- CN105825123A CN105825123A CN201610108869.7A CN201610108869A CN105825123A CN 105825123 A CN105825123 A CN 105825123A CN 201610108869 A CN201610108869 A CN 201610108869A CN 105825123 A CN105825123 A CN 105825123A
- Authority
- CN
- China
- Prior art keywords
- unlocking pin
- password
- mobile terminal
- benchmark
- unlocking
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
Abstract
The invention provides an unlocking method and a mobile terminal. The unlocking method comprises the following steps: acquiring an unlocking password input by a user, judging whether the unlocking password is the same as a last unlocking password obtained from the mobile terminal or not, judging whether the unlocking password contains standard password information of a preset password in the mobile terminal when the unlocking password is different from the last unlocking password, and unlocking when the unlocking password contains the standard password information. According to the invention, not only can the mobile terminal be unlocked by the unlocking password encrypted autonomously, but also other people watching the unlocking process of the mobile terminal by the user can be prevented from imitating the unlocking password and unlocking the mobile terminal, that is, unlocking password leakage is avoided.
Description
Technical field
The present invention relates to field of terminal technology, particularly relate to a kind of unlocking method and mobile terminal.
Background technology
Along with the development of terminal technology, the unlocking manner of existing mobile terminal there has also been the biggest progress.Concrete, unlocking from initial slip unblock, numerical ciphers, graphical passwords till now unlocks, and unlocked by fingerprint, and the safety of unlocking manner is improving constantly.In simple terms, slip unlocking manner can be sayed substantially free of safety, and the safety of unlocked by fingerprint mode is the strongest.But unlocked by fingerprint mode is the highest to the hardware requirement of mobile terminal, so, for current most of mobile terminal, conventional unlocking manner is that numerical ciphers unlocks and graphical passwords unlocks.
Wherein, numerical ciphers unlocks and graphical passwords unblock is to utilize the numerical ciphers preset and graphical passwords to be unlocked.But the safety of the method that the numerical ciphers that this utilization has preset or graphical passwords are unlocked is extremely limited, especially after other people see the mobile phone users releasing process to mobile terminal, easily imitate out correct unlocking pin mobile terminal is unlocked, cause the leakage of unlocking pin.
Summary of the invention
It is an object of the invention to provide a kind of unlocking method and mobile terminal, low for solving the safety of numerical ciphers that utilization of the prior art preset or the method that graphical passwords is unlocked, technical problem that unlocking pin is easily revealed.
In order to realize above-mentioned purpose, the embodiment of the present invention provides a kind of unlocking method, is applied to a mobile terminal, including:
Obtain the unlocking pin of user's input;
Judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal;
When described unlocking pin is different from a described upper unlocking pin, it is judged that whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal;
When described unlocking pin comprises described benchmark encrypted message, perform unblock.
Additionally, the embodiment of the present invention also provides for a kind of mobile terminal, including:
Acquisition module, for obtaining the unlocking pin of user's input;
First judge module, for judging that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal;
Second judge module, for when described unlocking pin is different from a described upper unlocking pin, it is judged that whether comprise the benchmark encrypted message of the benchmark password preset in described mobile terminal in described unlocking pin;
First unlocked state, for when comprising described benchmark encrypted message in described unlocking pin, performs unblock.
By the technique scheme of the present invention, the beneficial effects of the present invention is:
The unlocking method of the embodiment of the present invention, by obtaining the unlocking pin of user's input, judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal, when described unlocking pin is different from a described upper unlocking pin, judge whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal, when described unlocking pin comprises described benchmark encrypted message, perform unblock, the unlocking pin after main encryption can not only be utilized to unlock mobile terminal, can also prevent other people after seeing the mobile phone users releasing process to mobile terminal, imitate out unlocking pin mobile terminal is unlocked, avoid the leakage of unlocking pin.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the accompanying drawing used required in embodiment will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 represents the flow chart of the unlocking method of first embodiment of the invention.
Fig. 2 represents the schematic diagram of the reference pattern password preset when unlocking pin is graphical passwords of the specific embodiment of the invention.
The schematic diagram of the unlocking pin that user when Fig. 3 represents the reference pattern password in benchmark password is Fig. 2 of the specific embodiment of the invention inputs.
The schematic diagram of another unlocking pin that user when Fig. 4 represents the reference pattern password in benchmark password is Fig. 2 of the specific embodiment of the invention inputs.
Fig. 5 represents the structural representation of the mobile terminal of second embodiment of the invention.
Fig. 6 represents the structural representation of the mobile terminal of third embodiment of the invention.
Detailed description of the invention
In order to be illustrated more clearly that the technical scheme of the embodiment of the present invention, the accompanying drawing used required in embodiment will be briefly described below, apparently, accompanying drawing in describing below is only some embodiments of the present invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
First embodiment
Shown in Figure 1, the embodiment of the present invention provides a kind of unlocking method, is applied to a mobile terminal, and including step 101~step 104, details are as follows.
Step 101: obtain the unlocking pin of user's input.
In the embodiment of the present invention, the benchmark password preset in mobile terminal is the compulsive unlocking password of described mobile terminal, simply enters benchmark password, it becomes possible to unlock described mobile terminal.And the unlocking pin that can unlock mobile terminal is obtaining after being encrypted benchmark password, the unlocking method of the embodiment of the present invention seeks to utilize the unlocking pin after correct encryption to unlock mobile terminal.
Wherein, when unlocking mobile terminal, if the residing environment of mobile phone users perception self is safer, such as when surrounding is stayed alone without stranger, just can be unlocked with input reference password, if and the residing environment of mobile phone users perception self is dangerous, there is the probability revealing password, so that it may the unlocking pin after benchmark password is encrypted by input unlocks mobile terminal.
Step 102: judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal.
In the embodiment of the present invention, in order to prevent other people after seeing the mobile phone users releasing process to mobile terminal, unlocking pin can be imitated out mobile terminal is unlocked, unlocking pin (unlocking pin to being formed after benchmark password encryption) can be set and can not reuse twice by continuous print.That is, after utilizing a unlocking pin to unlock mobile terminal, when unlocking described mobile terminal again, described unlocking pin can not be used continuously to unlock described mobile terminal, the unlocking pin the most this time inputted can not be identical with the unlocking pin of last time input, if the unlocking pin of double input is identical, the unlocking pin of second time input cannot unlock described mobile terminal.Wherein, the identical unlocking pin after correct encryption, when discontinuously using, can unlock mobile terminal.
Concrete, described unlocking method also includes:
When described unlocking pin is identical with a described upper unlocking pin, lock described mobile terminal.
And when described mobile terminal is in the lock state, after the unlocking pin obtaining user's input, described unlocking method includes:
Judge password on the basis of described unlocking pin is whether;
On the basis of described unlocking pin during password, perform unblock.
It is to say, when described mobile terminal is in the lock state, only described mobile terminal could be unlocked by benchmark password.Even if in this manner it is ensured that other people see the mobile phone users releasing process to mobile terminal, can not attempt unlocking mobile terminal by imitating.
Step 103: when described unlocking pin is different from a described upper unlocking pin, it is judged that whether comprise the benchmark encrypted message of the benchmark password preset in described mobile terminal in described unlocking pin.
In the embodiment of the present invention, the benchmark encrypted message of benchmark password is the attribute information that described benchmark password is had, and, as long as after benchmark password determines, the benchmark encrypted message of described benchmark password will uniquely determine.
Concrete, in the embodiment of the present invention, if unlocking pin is graphical passwords, graphical passwords on the basis of benchmark password, then, the benchmark encrypted message of reference pattern password just can include the junction point in described reference pattern password.
For example, shown in Figure 2, the unlocking pin of mobile terminal A i.e. graphical passwords is formed by connecting by the junction point of nine grids shape.Convenience and clear for statement, it is stipulated that as follows: numbered the 1 of first junction point in the upper left corner of nine grids, numbered the 2 of the first row second junction point from left to right, numbered the 3 of 3rd junction point, numbered the 4 of second first junction point of row ..., the like.And the unlocking pattern in Fig. 2, " L " that i.e. put upside down is shaped as benchmark image password.So, the junction point 4,5,6 and 9 during the benchmark encrypted message of the reference pattern password in Fig. 2 includes described reference pattern password.
So, as long as the image password of acquisition for mobile terminal includes described junction point 4,5,6 and 9, it becomes possible to unlock described mobile terminal.For example, with reference to shown in Fig. 3, the unlocking pattern in Fig. 3 is to be formed by connecting by junction point 4,2,5,8,6 and 9, and owing to containing junction point 4,5,6 and 9, the graphical passwords in Fig. 3 just can successfully unlock mobile terminal.Referring back to shown in Fig. 4, the unlocking pattern in Fig. 4 is to be formed by connecting by junction point 4,8,9,6 and 5, and owing to containing junction point 4,5,6 and 9, the graphical passwords in Fig. 4 also is able to successfully unlock mobile terminal.
Wherein, the benchmark encrypted message of described reference pattern password, in addition to the junction point included in described reference pattern password, may also include the sequencing of junction point in described reference pattern password, to strengthen the safety of unlocking pin.
For example, shown in Figure 2, the sequencing of the junction point in reference pattern password in Fig. 2 is 4,5,6 and 9.In this case, shown in Figure 3, the graphical passwords in Fig. 3 not only contains junction point 4,5,6 and 9, and the sequencing of these junction points is 4,5,6 and 9, so, the graphical passwords in Fig. 3 can successfully unlock mobile terminal.Referring back to shown in Fig. 4, although the graphical passwords in Fig. 4 contains junction point 4,5,6 and 9, but the sequencing of these junction points is 4,9,6 and 5, the i.e. sequencing 4,5,6 and 9 with the junction point in the reference pattern password in Fig. 2 differs, so, the graphical passwords in Fig. 4 can not successfully unlock mobile terminal.
In the embodiment of the present invention, unlocking pin can be also character password, corresponding, character password on the basis of benchmark password, and the benchmark encrypted message of benchmark character password includes the character in described benchmark character password.Wherein, the character in character password can be numeral, letter, symbol etc., and the present invention is not limited.
With character password for numerical ciphers for example, the benchmark numerical ciphers preset in mobile terminal can be 4569, and so, the benchmark encrypted message of described benchmark numerical ciphers includes numeral 4,5,6 and 9.If user inputs numerical ciphers 425869, owing to containing numeral 4,5,6 and 9, it becomes possible to successfully unlock mobile terminal.And if user inputs numerical ciphers 48965, owing to containing numeral 4,5,6 and 9, it is also possible to successfully unlock mobile terminal.In this case, it is stipulated that numerical ciphers 123456789 or 987654321 etc. (including whole numerical character), it is impossible to unlock mobile terminal.
Concrete, the benchmark encrypted message of described benchmark character password, in addition to the character included in described benchmark character password, may also include the sequencing of character in described benchmark character password, to strengthen the safety of unlocking pin.
For example, when benchmark numerical ciphers is 4569, the benchmark encrypted message of described benchmark numerical ciphers, in addition to including numeral 4,5,6 and 9, also includes the sequencing 4,5,6 and 9 of numeral.In this case, numerical ciphers 425869 not only contains numeral 4,5,6 and 9, and the sequencing of these numerals is 4,5,6 and 9, so, numerical ciphers 425869 can successfully unlock mobile terminal.And numerical ciphers 48965, although contain numeral 4,5,6 and 9, but the sequencing of these numerals be in 4,9,6 and 5, with benchmark numerical ciphers numeral sequencing 4,5,6 and 9 differ, so, numerical ciphers 48965 can not successfully unlock mobile terminal.
Step 104: when comprising described benchmark encrypted message in described unlocking pin, perform unblock.
Concrete, if described unlocking pin comprises described benchmark encrypted message, indicate that described unlocking pin is after correct encryption, it is possible to unlock mobile terminal.
The unlocking method of the embodiment of the present invention, by obtaining the unlocking pin of user's input, judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal, when described unlocking pin is different from a described upper unlocking pin, judge whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal, when described unlocking pin comprises described benchmark encrypted message, perform unblock, the unlocking pin after main encryption can not only be utilized to unlock mobile terminal, can also prevent other people after seeing the mobile phone users releasing process to mobile terminal, imitate out unlocking pin mobile terminal is unlocked, avoid the leakage of unlocking pin.
Second embodiment
Shown in Figure 5, the embodiment of the present invention also provides for a kind of mobile terminal, and corresponding with the unlocking method shown in Fig. 1, described mobile terminal includes acquisition module the 51, first judge module the 52, second judge module 53 and the first unlocked state 54, and details are as follows.
Wherein, described acquisition module 51, for obtaining the unlocking pin of user's input.
In the embodiment of the present invention, the benchmark password preset in mobile terminal is the compulsive unlocking password of described mobile terminal, simply enters benchmark password, it becomes possible to unlock described mobile terminal.And the unlocking pin that can unlock mobile terminal is obtaining after being encrypted benchmark password, the unlocking method of the embodiment of the present invention seeks to utilize the unlocking pin after correct encryption to unlock mobile terminal.
Wherein, when unlocking mobile terminal, if the residing environment of mobile phone users perception self is safer, such as when surrounding is stayed alone without stranger, just can be unlocked with input reference password, if and the residing environment of mobile phone users perception self is dangerous, there is the probability revealing password, so that it may the unlocking pin after benchmark password is encrypted by input unlocks mobile terminal.
Described first judge module 52, for judging that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal.
In the embodiment of the present invention, in order to prevent other people after seeing the mobile phone users releasing process to mobile terminal, unlocking pin can be imitated out mobile terminal is unlocked, unlocking pin (unlocking pin to being formed after benchmark password encryption) can be set and can not reuse twice by continuous print.That is, after utilizing a unlocking pin to unlock mobile terminal, when unlocking described mobile terminal again, described unlocking pin can not be used continuously to unlock described mobile terminal, the unlocking pin the most this time inputted can not be identical with the unlocking pin of last time input, if the unlocking pin of double input is identical, the unlocking pin of second time input cannot unlock described mobile terminal.Wherein, the identical unlocking pin after correct encryption, when discontinuously using, can unlock mobile terminal.
Described second judge module 53, for when described unlocking pin is different from a described upper unlocking pin, it is judged that whether comprise the benchmark encrypted message of the benchmark password preset in described mobile terminal in described unlocking pin.
In the embodiment of the present invention, the benchmark encrypted message of benchmark password is the attribute information that described benchmark password is had, and, as long as after benchmark password determines, the benchmark encrypted message of described benchmark password will uniquely determine.
Concrete, in the embodiment of the present invention, if unlocking pin is graphical passwords, graphical passwords on the basis of benchmark password, then, the benchmark encrypted message of reference pattern password just can include the junction point in described reference pattern password.Wherein, the benchmark encrypted message of described reference pattern password, in addition to the junction point included in described reference pattern password, may also include the sequencing of junction point in described reference pattern password, to strengthen the safety of unlocking pin.
Additionally, unlocking pin can be also character password, corresponding, character password on the basis of benchmark password, and the benchmark encrypted message of benchmark character password includes the character in described benchmark character password.Wherein, the benchmark encrypted message of described benchmark character password, in addition to the character included in described benchmark character password, may also include the sequencing of character in described benchmark character password, to strengthen the safety of unlocking pin.
Described first unlocked state 54, for when comprising described benchmark encrypted message in described unlocking pin, performs unblock.
Concrete, if described unlocking pin comprises described benchmark encrypted message, indicate that described unlocking pin is after correct encryption, it is possible to unlock mobile terminal.
In the embodiment of the present invention, described mobile terminal also includes locking module, and described locking module, for when described unlocking pin is identical with a described upper unlocking pin, locks described mobile terminal.
Concrete, described mobile terminal also includes the 3rd judge module and the second unlocked state.
Wherein, described 3rd judge module, for when described mobile terminal is in the lock state, it is judged that described unlocking pin whether on the basis of password.
Described second unlocked state, for during password, performing unblock on the basis of described unlocking pin.
The mobile terminal of the embodiment of the present invention, it is possible to realize each process that in the embodiment of the method for Fig. 1, mobile terminal realizes, for avoiding repeating, repeats no more here.The mobile terminal of the embodiment of the present invention, by obtaining the unlocking pin of user's input, judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal, when described unlocking pin is different from a described upper unlocking pin, judge whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal, when described unlocking pin comprises described benchmark encrypted message, perform unblock, the unlocking pin after main encryption can not only be utilized to unlock mobile terminal, can also prevent other people after seeing the mobile phone users releasing process to mobile terminal, imitate out unlocking pin mobile terminal is unlocked, avoid the leakage of unlocking pin.
3rd embodiment
Fig. 6 is the structural representation of the mobile terminal of third embodiment of the invention.Mobile terminal 600 shown in Fig. 6 includes: at least one processor 601, memorizer 602, at least one network interface 604 and user interface 603.Each assembly in mobile terminal 600 is coupled by bus system 605.It is understood that bus system 605 is for realizing the connection communication between these assemblies.Bus system 605, in addition to including data/address bus, also includes power bus, controls bus and status signal bus in addition.But for the sake of understanding explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 can include display, keyboard or pointing device (such as, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
The memorizer 602 being appreciated that in the embodiment of the present invention can be volatile memory or nonvolatile memory, maybe can include volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read only memory (Read-OnlyMemory, ROM), programmable read only memory (ProgrammableROM, PROM), Erasable Programmable Read Only Memory EPROM (ErasablePROM, EPROM), Electrically Erasable Read Only Memory (ElectricallyEPROM, EEPROM) or flash memory.Volatile memory can be random access memory (RandomAccessMemory, RAM), and it is used as External Cache.nullBy exemplary but be not restricted explanation,The RAM of many forms can use,Such as static RAM (StaticRAM,SRAM)、Dynamic random access memory (DynamicRAM,DRAM)、Synchronous Dynamic Random Access Memory (SynchronousDRAM,SDRAM)、Double data speed synchronous dynamic RAM (DoubleDataRateSDRAM,DDRSDRAM)、Enhancement mode Synchronous Dynamic Random Access Memory (EnhancedSDRAM,ESDRAM)、Synchronized links dynamic random access memory (SynchlinkDRAM,And direct rambus random access memory (DirectRambusRAM SLDRAM),DRRAM).The memorizer 602 of system and method described herein is intended to include but not limited to these and the memorizer of other applicable type any.
In some embodiments, memorizer 602 stores following element, executable module or data structure, or their subset, or their superset: operating system 6021 and application program 6022.
Wherein, operating system 6021, comprise various system program, such as ccf layer, core library layer, driving layer etc., be used for realizing various basic business and processing hardware based task.Application program 6022, comprises various application program, and such as media player (MediaPlayer), browser (Browser) etc., be used for realizing various applied business.The program realizing embodiment of the present invention method may be embodied in application program 6022.
In embodiments of the present invention, by calling program or the instruction of memorizer 602 storage, concrete, can be program or the instruction of storage in application program 6022, processor 601 is for obtaining the unlocking pin that user is inputted by user interface 603, judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal, when described unlocking pin is different from a described upper unlocking pin, judge whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal, when described unlocking pin comprises described benchmark encrypted message, perform unblock.
Wherein, in the embodiment of the present invention, described unlocking pin is graphical passwords, graphical passwords on the basis of described benchmark password, and described benchmark encrypted message includes the junction point in described reference pattern password.Preferably, the sequencing of the junction point during described benchmark encrypted message also includes described reference pattern password.
Or, described unlocking pin is character password, character password on the basis of described benchmark password, and described benchmark encrypted message includes the character in described benchmark character password.Preferably, the sequencing of the character during described benchmark encrypted message also includes described benchmark character password.
The method that the invention described above embodiment discloses can apply in processor 601, or is realized by processor 601.Processor 601 is probably a kind of IC chip, has the disposal ability of signal.During realizing, each step of said method can be completed by the instruction of the integrated logic circuit of the hardware in processor 601 or software form.Above-mentioned processor 601 can be general processor, digital signal processor (DigitalSignalProcessor, DSP), special IC (ApplicationSpecificIntegratedCircuit, ASIC), ready-made programmable gate array (FieldProgrammableGateArray, FPGA) or other PLDs, discrete gate or transistor logic, discrete hardware components.Can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.The processor etc. that general processor can be microprocessor or this processor can also be any routine.Hardware decoding processor can be embodied directly in conjunction with the step of the method disclosed in the embodiment of the present invention to have performed, or combine execution by the hardware in decoding processor and software module and complete.Software module may be located at random access memory, flash memory, read only memory, in the storage medium that this area such as programmable read only memory or electrically erasable programmable memorizer, depositor is ripe.This storage medium is positioned at memorizer 602, and processor 601 reads the information in memorizer 602, completes the step of said method in conjunction with its hardware.
It is understood that embodiments described herein can realize by hardware, software, firmware, middleware, microcode or a combination thereof.nullHardware is realized,Processing unit can be implemented in one or more special IC (ApplicationSpecificIntegratedCircuits,ASIC)、Digital signal processor (DigitalSignalProcessing,DSP)、Digital signal processing appts (DSPDevice,DSPD)、Programmable logic device (ProgrammableLogicDevice,PLD)、Field programmable gate array (Field-ProgrammableGateArray,FPGA)、General processor、Controller、Microcontroller、Microprocessor、In other electronic unit performing herein described function or a combination thereof.
Software is realized, the techniques described herein can be realized by the module (such as process, function etc.) performing function described herein.Software code is storable in performing in memorizer and by processor.Memorizer can within a processor or realize outside processor.
Alternatively, processor 601 is additionally operable to: when described unlocking pin is identical with a described upper unlocking pin, lock described mobile terminal.
Alternatively, processor 601 is additionally operable to: when described mobile terminal is in the lock state, after the unlocking pin obtaining user's input, it is judged that described unlocking pin whether on the basis of password, on the basis of described unlocking pin during password, perform unblock.
Mobile terminal 600 is capable of each process that in previous embodiment, mobile terminal realizes, and for avoiding repeating, repeats no more here.The mobile terminal 600 of the embodiment of the present invention, by obtaining the unlocking pin of user's input, judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal, when described unlocking pin is different from a described upper unlocking pin, judge whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal, when described unlocking pin comprises described benchmark encrypted message, perform unblock, the unlocking pin after main encryption can not only be utilized to unlock mobile terminal, can also prevent other people after seeing the mobile phone users releasing process to mobile terminal, imitate out unlocking pin mobile terminal is unlocked, avoid the leakage of unlocking pin.
Those of ordinary skill in the art are it is to be appreciated that combine the unit of each example and the algorithm steps that the embodiments described herein describes, it is possible to being implemented in combination in of electronic hardware or computer software and electronic hardware.These functions perform with hardware or software mode actually, depend on application-specific and the design constraint of technical scheme.Professional and technical personnel can use different methods to realize described function to each specifically should being used for, but this realization is it is not considered that beyond the scope of this invention.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, the specific works process of the system of foregoing description, device and unit, it is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, can realize by another way.Such as, device embodiment described above is only schematically, such as, the division of described unit, be only a kind of logic function to divide, actual can have when realizing other dividing mode, the most multiple unit or assembly can in conjunction with or be desirably integrated into another system, or some features can ignore, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be the INDIRECT COUPLING by some interfaces, device or unit or communication connection, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, and the parts shown as unit can be or may not be physical location, i.e. may be located at a place, or can also be distributed on multiple NE.Some or all of unit therein can be selected according to the actual needs to realize the purpose of the present embodiment scheme.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to be that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.
If described function is using the form realization of SFU software functional unit and as independent production marketing or use, can be stored in a computer read/write memory medium.Based on such understanding, part or the part of this technical scheme that prior art is contributed by technical scheme the most in other words can embody with the form of software product, this computer software product is stored in a storage medium, including some instructions with so that a computer equipment (can be personal computer, server, or the network equipment etc.) perform all or part of step of method described in each embodiment of the present invention.And aforesaid storage medium includes: the various media that can store program code such as USB flash disk, portable hard drive, ROM, RAM, magnetic disc or CDs.
The above; being only the detailed description of the invention of the present invention, but protection scope of the present invention is not limited thereto, any those familiar with the art is in the technical scope that the invention discloses; change can be readily occurred in or replace, all should contain within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with scope of the claims.
Claims (14)
1. a unlocking method, is applied to a mobile terminal, it is characterised in that including:
Obtain the unlocking pin of user's input;
Judge that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal;
When described unlocking pin is different from a described upper unlocking pin, it is judged that whether described unlocking pin comprises the benchmark encrypted message of the benchmark password preset in described mobile terminal;
When described unlocking pin comprises described benchmark encrypted message, perform unblock.
Unlocking method the most according to claim 1, it is characterised in that described unlocking pin is graphical passwords, graphical passwords on the basis of described benchmark password, described benchmark encrypted message includes the junction point in described reference pattern password.
Unlocking method the most according to claim 2, it is characterised in that described benchmark encrypted message also includes the sequencing of the junction point in described reference pattern password.
Unlocking method the most according to claim 1, it is characterised in that described unlocking pin is character password, character password on the basis of described benchmark password, described benchmark encrypted message includes the character in described benchmark character password.
Unlocking method the most according to claim 4, it is characterised in that described benchmark encrypted message also includes the sequencing of the character in described benchmark character password.
Unlocking method the most according to claim 1, it is characterised in that described unlocking method also includes:
When described unlocking pin is identical with a described upper unlocking pin, lock described mobile terminal.
Unlocking method the most according to claim 6, it is characterised in that when described mobile terminal is in the lock state, after the unlocking pin obtaining user's input, described unlocking method includes:
Judge password on the basis of described unlocking pin is whether;
On the basis of described unlocking pin during password, perform unblock.
8. a mobile terminal, it is characterised in that including:
Acquisition module, for obtaining the unlocking pin of user's input;
First judge module, for judging that described unlocking pin is the most identical with a upper unlocking pin of described acquisition for mobile terminal;
Second judge module, for when described unlocking pin is different from a described upper unlocking pin, it is judged that whether comprise the benchmark encrypted message of the benchmark password preset in described mobile terminal in described unlocking pin;
First unlocked state, for when comprising described benchmark encrypted message in described unlocking pin, performs unblock.
Mobile terminal the most according to claim 8, it is characterised in that described unlocking pin is graphical passwords, graphical passwords on the basis of described benchmark password, described benchmark encrypted message includes the junction point in described reference pattern password.
Mobile terminal the most according to claim 9, it is characterised in that described benchmark encrypted message also includes the sequencing of the junction point in described reference pattern password.
11. mobile terminals according to claim 8, it is characterised in that described unlocking pin is character password, character password on the basis of described benchmark password, described benchmark encrypted message includes the character in described benchmark character password.
12. unlocking methods according to claim 11, it is characterised in that described benchmark encrypted message also includes the sequencing of the character in described benchmark character password.
13. mobile terminals according to claim 8, it is characterised in that described mobile terminal also includes:
Locking module, for when described unlocking pin is identical with a described upper unlocking pin, locks described mobile terminal.
14. mobile terminals according to claim 13, it is characterised in that described mobile terminal also includes:
3rd judge module, for when described mobile terminal is in the lock state, it is judged that described unlocking pin whether on the basis of password;
Second unlocked state, for during password, performing unblock on the basis of described unlocking pin.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610108869.7A CN105825123B (en) | 2016-02-26 | 2016-02-26 | Unlocking method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610108869.7A CN105825123B (en) | 2016-02-26 | 2016-02-26 | Unlocking method and mobile terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105825123A true CN105825123A (en) | 2016-08-03 |
CN105825123B CN105825123B (en) | 2020-01-10 |
Family
ID=56987451
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610108869.7A Active CN105825123B (en) | 2016-02-26 | 2016-02-26 | Unlocking method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105825123B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778222A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | Unlocking method and device |
CN112199664A (en) * | 2020-09-21 | 2021-01-08 | 珠海格力电器股份有限公司 | Account unlocking method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102968343A (en) * | 2012-11-14 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method and system for switching users |
US20130333053A1 (en) * | 2012-06-07 | 2013-12-12 | Askey Computer Corp. | Method for protecting firmware being updated |
CN103632110A (en) * | 2012-08-20 | 2014-03-12 | 联想(北京)有限公司 | Electronic device and method for starting same |
CN104063169A (en) * | 2014-04-09 | 2014-09-24 | 苏州天鸣信息科技有限公司 | Unlocking method based on touch screen |
CN104392158A (en) * | 2014-11-27 | 2015-03-04 | 上海斐讯数据通信技术有限公司 | Mobile terminal unlocking method and mobile terminal |
-
2016
- 2016-02-26 CN CN201610108869.7A patent/CN105825123B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130333053A1 (en) * | 2012-06-07 | 2013-12-12 | Askey Computer Corp. | Method for protecting firmware being updated |
CN103632110A (en) * | 2012-08-20 | 2014-03-12 | 联想(北京)有限公司 | Electronic device and method for starting same |
CN102968343A (en) * | 2012-11-14 | 2013-03-13 | 广东欧珀移动通信有限公司 | Method and system for switching users |
CN104063169A (en) * | 2014-04-09 | 2014-09-24 | 苏州天鸣信息科技有限公司 | Unlocking method based on touch screen |
CN104392158A (en) * | 2014-11-27 | 2015-03-04 | 上海斐讯数据通信技术有限公司 | Mobile terminal unlocking method and mobile terminal |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106778222A (en) * | 2016-12-20 | 2017-05-31 | 北京小米移动软件有限公司 | Unlocking method and device |
CN106778222B (en) * | 2016-12-20 | 2020-06-02 | 北京小米移动软件有限公司 | Unlocking method and device |
CN112199664A (en) * | 2020-09-21 | 2021-01-08 | 珠海格力电器股份有限公司 | Account unlocking method and device |
Also Published As
Publication number | Publication date |
---|---|
CN105825123B (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103975335B (en) | Utilize the certification of two level ratifier | |
US9606650B2 (en) | Method and device for locking and unlocking with touch graphic | |
US9485255B1 (en) | Authentication using remote device locking | |
CN105956431B (en) | A kind of application protection processing method and mobile terminal | |
CN104536686A (en) | Screen unlocking method and device | |
CN105204763A (en) | Unlocking method of terminal and terminal | |
CN102968602A (en) | Setting method and device for keyboard | |
CN102982272B (en) | keyboard layout method and device | |
CN104991716A (en) | Mobile terminal unlocking method and apparatus | |
CN104657655A (en) | Unlocking method of mobile terminal and mobile terminal | |
CN107924439B (en) | Apparatus, method, and computer program product for coordinating device boot security | |
CN105929974A (en) | Password input management method and mobile terminal | |
CN105809007A (en) | Privacy protection method and device | |
CN106778223A (en) | A kind of cryptographic check method and mobile terminal | |
CN105809000A (en) | Information processing method and electronic device | |
CN104331650A (en) | Information processing method and electronic equipment | |
CN104407803A (en) | Screen unlocking method and device based on handwriting recognition and electronic equipment | |
CN106131000A (en) | Identifying code fill method and mobile terminal thereof | |
CN107103224A (en) | A kind of unlocking method and mobile terminal | |
CN105825123A (en) | Unlocking method and mobile terminal | |
CN105204755A (en) | Soft keyboard operation method and terminal | |
CN104182349A (en) | Information processing method and electronic device | |
CN103034441B (en) | Unlocking method and device | |
CN106648370A (en) | Encrypting method for screenshots and mobile terminal | |
CN104615267B (en) | password input management method, system and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |