CN106095469B - Mobile terminal unlocking method and mobile terminal - Google Patents

Mobile terminal unlocking method and mobile terminal Download PDF

Info

Publication number
CN106095469B
CN106095469B CN201610601661.9A CN201610601661A CN106095469B CN 106095469 B CN106095469 B CN 106095469B CN 201610601661 A CN201610601661 A CN 201610601661A CN 106095469 B CN106095469 B CN 106095469B
Authority
CN
China
Prior art keywords
user
mobile terminal
key
preset
judging
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610601661.9A
Other languages
Chinese (zh)
Other versions
CN106095469A (en
Inventor
何山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201610601661.9A priority Critical patent/CN106095469B/en
Publication of CN106095469A publication Critical patent/CN106095469A/en
Application granted granted Critical
Publication of CN106095469B publication Critical patent/CN106095469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/4401Bootstrapping
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2203/00Aspects of automatic or semi-automatic exchanges
    • H04M2203/60Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
    • H04M2203/6054Biometric subscriber identification

Abstract

The invention provides a method for unlocking a mobile terminal and the mobile terminal, wherein the method comprises the following steps: when the mobile terminal is in a screen locking state, receiving the operation of a user on an appointed key; judging whether the operation of the user on the specified key is a preset operation or not; and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal. The embodiment of the invention can enable the mobile terminal to receive the preset operation of the user on the appointed key, and enable the mobile terminal to be unlocked quickly.

Description

Mobile terminal unlocking method and mobile terminal
Technical Field
The present invention relates to the field of communications, and in particular, to a method for unlocking a mobile terminal and a mobile terminal.
Background
With the rapid development of electronic information technology, mobile terminals are more and more widely used and play a vital role in daily life and work of people. Most mobile terminals have a locking function, and unlocking can include password unlocking and password-free unlocking. The password unlocking requires that the mobile terminal is unlocked after a user inputs a password, and the unlocking without the password requires that the user slides the screen to operate the mobile terminal to unlock. When a user unlocks the mobile terminal through the method, the time consumed for unlocking is often long.
Disclosure of Invention
The embodiment of the invention provides a method for unlocking a mobile terminal and the mobile terminal, and aims to solve the problem that the unlocking time is long.
In a first aspect, an embodiment of the present invention provides a method for unlocking a mobile terminal, where the method includes:
when the mobile terminal is in a screen locking state, receiving the operation of a user on an appointed key;
judging whether the operation of the user on the specified key is a preset operation or not;
and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal.
In a second aspect, an embodiment of the present invention further provides a mobile terminal, including:
the receiving module is used for receiving the operation of a user on the appointed key when the mobile terminal is in a screen locking state;
the first judgment module is used for judging whether the operation of the user on the specified key is a preset operation;
and the first unlocking module is used for unlocking the mobile terminal if the operation of the user on the appointed key is the preset operation.
Therefore, in the embodiment of the invention, when the mobile terminal is in the screen locking state, the operation of the user on the appointed key is received; judging whether the operation of the user on the specified key is a preset operation or not; and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal. Therefore, the mobile terminal receives the operation of the user on the designated key, so that the mobile terminal can be unlocked quickly.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive exercise.
Fig. 1 is a flowchart of a method for unlocking a mobile terminal according to an embodiment of the present invention;
fig. 2 is a flowchart of another method for unlocking a mobile terminal according to an embodiment of the present invention;
fig. 3 is a block diagram of a mobile terminal according to an embodiment of the present invention;
fig. 4 is a block diagram of another mobile terminal according to an embodiment of the present invention;
fig. 5 is a block diagram of another mobile terminal according to an embodiment of the present invention;
fig. 6 is a block diagram of another mobile terminal according to an embodiment of the present invention;
fig. 7 is a block diagram of another mobile terminal according to an embodiment of the present invention;
fig. 8 is a block diagram of another mobile terminal according to an embodiment of the present invention;
fig. 9 is a block diagram of a mobile terminal according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
First embodiment
Referring to fig. 1, fig. 1 is a flowchart of a method for unlocking a mobile terminal according to an embodiment of the present invention, as shown in fig. 1, including the following steps:
and step 101, receiving the operation of a user on an appointed key when the mobile terminal is in a screen locking state.
In the embodiment of the present invention, the designated key may be one key or a plurality of keys. The key may be one or more of a start key, an ok key, or a cancel key.
And 102, judging whether the operation of the user on the appointed key is a preset operation.
In the embodiment of the present invention, the preset operation is an operation that a user sets a specific key in advance. The preset operation may be a single pressing of the start key, multiple pressing of the start key, or pressing of both the ok key and the cancel key. The user can set the operation of self-defining the keys as the preset operation.
And 103, if the operation of the user on the designated key is the preset operation, unlocking the mobile terminal.
In the embodiment of the invention, the user can operate the mobile terminal after the mobile terminal is unlocked.
In the embodiment of the present invention, the mobile terminal may be any mobile terminal having a human body feature acquisition component and a screen, for example: a Mobile phone, a Tablet Personal Computer (Tablet Personal Computer), a Laptop Computer (Laptop Computer), a Personal Digital Assistant (PDA), a Mobile Internet Device (MID), a Wearable Device (Wearable Device), or the like.
The method for unlocking the mobile terminal comprises the steps of receiving the operation of a user on an appointed key when the mobile terminal is in a screen locking state; judging whether the operation of the user on the specified key is a preset operation or not; and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal. Therefore, the mobile terminal receives the operation of the user on the designated key, so that the mobile terminal can be unlocked quickly.
Second embodiment
Referring to fig. 2, fig. 2 is a flowchart of another method for unlocking a mobile terminal according to an embodiment of the present invention, and as shown in fig. 2, the method includes the following steps:
step 201, when the mobile terminal is in a screen locking state, receiving an operation of a user on a key.
In the embodiment of the present invention, the one key is an assigned key, and the receiving of the operation of the user on the one key may be performed by receiving a combined operation of the user on at least two keys. When the user operates one key, one key of the start key, the confirm key and the cancel key can be operated. The button can be pressed once, pressed two times continuously or pressed three times quickly, and the button can be pressed by the user as long as the button is customized by the user.
The combination operation of at least two keys, for example, selecting two keys, namely, the start key and the confirm key, may be to simultaneously press the start key and the confirm key, or to press the start key first and then press the confirm key, or to press the confirm key first and then press the start key, and the embodiment of the present invention is not limited to this.
Step 202, judging whether the operation of the user on the specified key is a preset operation.
In the embodiment of the present invention, the preset operation is an operation that a user sets a specific key in advance. The preset operation may be a single pressing of the start key, or multiple pressing of the start key, or may be a single pressing or multiple pressing of the determination key, or may be a single pressing or multiple pressing of the cancel key. The user can set the operation of self-defining the keys as the preset operation.
And 203, if the operation of the user on the designated key is the preset operation, unlocking the mobile terminal.
According to the embodiment of the invention, the security of the mobile terminal is improved by unlocking the combined operation of different keys.
Optionally, after the mobile terminal is unlocked, the method further includes:
and displaying the desktop of the Nth page, wherein N is an integer larger than 0, and the desktop of the Nth page is bound with the preset operation.
In the embodiment of the invention, the desktop on the nth page can be understood in this way, when a plurality of applications of the mobile terminal exist, a plurality of application icons naturally exist, the number of the application icons displayed on one page is limited, too many application icons can be stored by sliding and turning pages left and right, and the desktop on the nth page can be understood by sliding and turning the displayed interface left and right. If a mobile terminal has three interfaces for storing application icons, the three interfaces can be represented as a first page desktop, a second page desktop and a third page desktop.
In the embodiment of the present invention, it can be understood that the desktop on the nth page is a desktop bound to the preset operation. For example: clicking the start key can display the desktop of the first page, double clicking the start key can display the desktop of the second page, and continuously pressing the start key three times can display the desktop of the third page.
According to the embodiment of the invention, by displaying the desktop bound with the preset operation, the mobile terminal can be unlocked to enter the desktop quickly, and the page of the desktop wanted by the user can be displayed, so that the user is more convenient.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the method further includes:
detecting a pressure parameter generated by the operation of a user on the appointed key, judging whether the pressure parameter is matched with a preset pressure parameter, and if so, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
In an embodiment of the present invention, the pressure parameter may include a magnitude of the pressure and a duration of the pressing. The pressure can be 1, 2 or 3 newtons, or any custom size. The pressing time can be 2 seconds, 3 seconds or 4 seconds, and can also be any customized time.
In the embodiment of the present invention, the determining whether the pressure parameter matches a preset pressure parameter may be understood as follows, for example: the pressure of the preset pressure parameter is 1 Newton, the pressing time is 2 seconds, and when the pressure generated when the fingerprint information is input is also 1 Newton and the pressing time is also 2 seconds, the matching is successful. When the pressure and the pressing time are only one which does not meet the preset conditions, the matching is not successful.
According to the embodiment of the invention, the safety of the mobile terminal is improved by matching the pressure parameters.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the method further includes:
detecting the position of the mobile terminal;
judging whether the position is located in a safe area;
and if the position is located in the safe area, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
In the embodiment of the present invention, the detection of the position of the mobile terminal may be performed according to a positioning system provided in the mobile terminal, or may be performed by downloading a certain positioning software, and the detection is performed by using the positioning software, which is not limited in the embodiment of the present invention.
In the embodiment of the invention, the safe area can be understood as an area which is self-defined by a user and is safe. For example: the user feels the office safety, and the office department can be defined as a safety area; the user feels the safety of his house, and can define the house as a safety area. The areas that the user customizes to be secure may all be secure areas.
According to the embodiment of the invention, the safety of the mobile terminal is improved by judging whether the mobile terminal is in the safety area.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the method further includes:
detecting a wireless fidelity network connected with the mobile terminal;
judging whether the wireless fidelity network is a safe wireless fidelity network or not;
and if the wireless fidelity network is the safe wireless fidelity network, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
In the embodiment of the invention, the Wireless Fidelity (WI-FI) network is a connected WI-FI network used in daily life. The above-mentioned wireless fidelity network is judged whether to be the secure wireless fidelity network, and whether to be the secure wireless fidelity network is also defined by the user. For example, a WI-FI network at home, a WI-FI network at a company, or a WI-FI network at a friend's home may be defined as a secure WI-FI network. A WI-FI network at a supermarket, at an airport or on a bus may be defined as an unsecure WI-FI network.
According to the embodiment of the invention, the security of the mobile terminal is further enhanced by detecting the WI-FI network connected with the mobile terminal.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the method further includes:
detecting the receiving time of the operation of the user on the appointed key;
judging whether the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold value or not;
if yes, unlocking the mobile terminal;
if not, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
In the embodiment of the present invention, the detecting the receiving time of the operation of the user on the designated key refers to the time when the mobile terminal receives the operation of the user on the designated key. For example: the initial key of the mobile terminal is in double-click operation in 8:45 am, and the receiving time is 8:45 am; the mobile terminal receives a double click at 14:30 pm, and the receiving time is 14:30 pm.
In an embodiment of the present invention, the determining whether the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold value is, for example: the preset threshold value is 2 minutes, the locking time is 8:30 a.m., and the receiving time is 8:31 a.m., the time interval is smaller than the preset threshold value; if the locking time is 8: 50, the receiving time is 8:53 in the morning, and the time interval is not less than the preset threshold value. Wherein the preset threshold may be a threshold set by a user.
According to the embodiment of the invention, the time interval between the receiving operation time and the locking time of the mobile terminal is judged, so that the mobile terminal is unlocked more conveniently and more quickly.
According to the embodiment of the invention, when the mobile terminal is in a screen locking state, the operation of a user on one key is received; judging whether the operation of the user on the specified key is a preset operation or not; and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal. Therefore, the mobile terminal receives the operation of the user on one key, so that the mobile terminal can be unlocked quickly.
Third embodiment
Referring to fig. 3, fig. 3 is a structural diagram of a mobile terminal according to an embodiment of the present invention, as shown in fig. 3, the mobile terminal 300 includes a receiving module 301, a first determining module 302, and a first unlocking module 303, where:
the receiving module 301 is configured to receive an operation of a user on an assigned key when the mobile terminal is in a screen locking state;
a first judging module 302, configured to judge whether an operation of the user on an assigned key is a preset operation;
a first unlocking module 303, configured to unlock the mobile terminal if the operation of the user on the designated key is the preset operation.
Optionally, the receiving module 301 is configured to receive an operation of a key by a user;
or receiving the combined operation of at least two keys by the user.
Optionally, as shown in fig. 4, the mobile terminal 300 further includes:
a display module 304, configured to display an nth page of desktop, where N is an integer greater than 0, and the nth page of desktop is a desktop bound to the preset operation.
Optionally, as shown in fig. 5, the mobile terminal 300 further includes:
the first detecting module 305 is configured to detect a pressure parameter generated by a user operating an assigned key, and determine whether the pressure parameter matches a preset pressure parameter, and if the pressure parameter matches the preset pressure parameter, the first determining module 302 is configured to determine whether the user operating the assigned key is a preset operation if the first detecting module 305 determines that the pressure parameter matches the preset pressure parameter.
Optionally, as shown in fig. 6, the mobile terminal 300 further includes:
a second detecting module 306, configured to detect a location of the mobile terminal;
a second determining module 307, configured to determine whether the position is located in a safe area;
the first determining module 302 is configured to determine whether the operation of the user on the designated key is a preset operation if the second determining module 307 determines that the position is located in a safe area.
Optionally, as shown in fig. 7, the mobile terminal 300 further includes:
a third detecting module 308, configured to detect a wireless fidelity network to which the mobile terminal is connected;
a third determining module 309, configured to determine whether the wireless fidelity network is a secure wireless fidelity network;
the first determining module 302 is configured to determine whether the operation of the user on the designated key is a preset operation if the third determining module 309 determines that the wireless fidelity network is a secure wireless fidelity network.
Optionally, as shown in fig. 8, the mobile terminal 300 further includes:
a fourth detecting module 310, configured to detect a receiving time of the operation of the designated key by the user;
a fourth determining module 311, configured to determine whether an interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold;
a second unlocking module 312, configured to unlock the mobile terminal if the fourth determining module 311 determines that the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold;
the first determining module 302 is configured to determine whether the operation of the user on the designated key is a preset operation if the fourth determining module 311 determines that the interval between the receiving time and the last locking time of the mobile terminal is not less than a preset threshold.
The mobile terminal 300 can implement each process implemented by the mobile terminal in the method embodiments of fig. 1 to fig. 2, and is not described herein again to avoid repetition.
The mobile terminal 300 of the embodiment of the invention receives the operation of the user on the appointed key when the mobile terminal is in the screen locking state; judging whether the operation of the user on the specified key is a preset operation or not; and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal. The embodiment of the invention can enable the mobile terminal to receive the preset operation of the user on the appointed key, and enable the mobile terminal to be unlocked quickly.
Referring to fig. 9, fig. 9 is a block diagram of a mobile terminal provided in the implementation of the present invention, and as shown in fig. 9, the mobile terminal 900 includes: at least one processor 901, memory 902, at least one network interface 904, and a user interface 903. Various components in mobile terminal 900 are coupled together by bus system 905. It is understood that the bus system 905 is used to enable communications among the components. The bus system 905 includes a power bus, a control bus, and a status signal bus, in addition to a data bus. For clarity of illustration, however, the various buses are labeled in fig. 9 as bus system 905.
The user interface 903 may include, among other things, a display, a keyboard, or a pointing device (e.g., a mouse, trackball, touch pad, or touch screen, among others.
It is to be understood that the memory 902 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable Programmable ROM (EPROM), an Electrically Erasable Programmable ROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of example, but not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous D RAM, SDRAM), Double Data rate Synchronous Dynamic random access memory (ddr Data RateSD RAM, ddr SDRAM), Enhanced Synchronous SD RAM (ESDRAM), Synchronous link Dynamic random access memory (Synchlink DR AM, SLDRAM), and Direct memory bus random access memory (DRRAM). The memory 802 of the systems and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 902 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 9021 and application programs 9022.
The operating system 9021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is configured to implement various basic services and process hardware-based tasks. The application 9022 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. A program implementing the method of an embodiment of the present invention may be included in application 9022.
In the embodiment of the present invention, by calling a program or an instruction stored in the memory 902, specifically, a program or an instruction stored in the application 9022, the processor 901 is configured to:
when the mobile terminal is in a screen locking state, receiving the operation of a user on an appointed key;
judging whether the operation of the user on the specified key is a preset operation or not;
and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal.
The method disclosed in the above embodiments of the present invention may be applied to the processor 901, or implemented by the processor 901. The processor 901 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 901. The Processor 901 may be a general-purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable Gate Array (FPGA) or other programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 902, and the processor 901 reads the information in the memory 902, and completes the steps of the above method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the Processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
Optionally, the processor 901 performs the operation of receiving the user's designated key, including:
receiving the operation of a key by a user;
or receiving the combined operation of at least two keys by the user.
Optionally, after the mobile terminal is unlocked, the processor 901 is further configured to:
and displaying the desktop of the Nth page, wherein N is an integer larger than 0, and the desktop of the Nth page is bound with the preset operation.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the processor 901 is further configured to:
detecting a pressure parameter generated by the operation of a user on the appointed key, judging whether the pressure parameter is matched with a preset pressure parameter, and if so, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the processor 901 is further configured to:
detecting the position of the mobile terminal;
judging whether the position is located in a safe area;
and if the position is located in the safe area, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the processor 901 is further configured to:
detecting a wireless fidelity network connected with the mobile terminal;
judging whether the wireless fidelity network is a safe wireless fidelity network or not;
and if the wireless fidelity network is the safe wireless fidelity network, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
Optionally, after receiving the operation of the user on the designated key, before determining whether the operation of the user on the designated key is a preset operation, the processor 901 is further configured to:
detecting the receiving time of the operation of the user on the appointed key;
judging whether the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold value or not;
if yes, unlocking the mobile terminal;
if not, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
The mobile terminal 900 can implement the processes implemented by the mobile terminal in the foregoing embodiments, and in order to avoid repetition, the details are not described here.
The mobile terminal 900 of the embodiment of the present invention receives the operation of the user on the designated key when the mobile terminal is in the screen locking state; judging whether the operation of the user on the specified key is a preset operation or not; and if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal. Therefore, the mobile terminal receives the preset operation of the user on the appointed key, and the mobile terminal can be unlocked quickly.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for unlocking a mobile terminal is characterized by comprising the following steps:
when the mobile terminal is in a screen locking state, receiving the operation of a user on an appointed key; the receiving of the operation of the user on the designated key includes: receiving the operation of a user on an initial key;
judging whether the operation of the user on the specified key is a preset operation or not;
if the operation of the user on the appointed key is the preset operation, unlocking the mobile terminal;
after the mobile terminal is unlocked, the method further comprises:
and displaying the Nth page of desktop, wherein N is an integer larger than 0, the desktop is an interface for storing application program icons, the Nth page of desktop is a desktop bound with the preset operation, the first page of desktop is a desktop displayed by clicking the initial key, the second page of desktop is a desktop displayed by double clicking the initial key, and the third page of desktop is a desktop continuously displayed by pressing the initial key for three times.
2. The method of claim 1, wherein after the receiving of the operation of the designated key by the user and before the determining whether the operation of the designated key by the user is a preset operation, the method further comprises:
detecting a pressure parameter generated by the operation of a user on the appointed key, judging whether the pressure parameter is matched with a preset pressure parameter, and if so, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
3. The method of claim 1, wherein after the receiving of the operation of the designated key by the user and before the determining whether the operation of the designated key by the user is a preset operation, the method further comprises:
detecting the position of the mobile terminal;
judging whether the position is located in a safe area;
and if the position is located in the safe area, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
4. The method of claim 1, wherein after the receiving of the operation of the designated key by the user and before the determining whether the operation of the designated key by the user is a preset operation, the method further comprises:
detecting a wireless fidelity network connected with the mobile terminal;
judging whether the wireless fidelity network is a safe wireless fidelity network or not;
and if the wireless fidelity network is the safe wireless fidelity network, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
5. The method of claim 1, wherein after the receiving of the operation of the designated key by the user and before the determining whether the operation of the designated key by the user is a preset operation, the method further comprises:
detecting the receiving time of the operation of the user on the appointed key;
judging whether the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold value or not;
if yes, unlocking the mobile terminal;
if not, executing the step of judging whether the operation of the user on the appointed key is a preset operation.
6. A mobile terminal, comprising:
the receiving module is used for receiving the operation of a user on the appointed key when the mobile terminal is in a screen locking state; the receiving of the operation of the user on the designated key includes: receiving the operation of a user on an initial key;
the first judgment module is used for judging whether the operation of the user on the specified key is a preset operation;
the first unlocking module is used for unlocking the mobile terminal if the operation of the user on the designated key is the preset operation;
the mobile terminal further includes:
the display module is used for displaying the desktop;
the display module is used for displaying an Nth page of desktop, N is an integer larger than 0, the desktop is an interface for storing application icons, the Nth page of desktop is a desktop bound with the preset operation, the first page of desktop is a desktop displayed by clicking the initial key, the second page of desktop is a desktop displayed by double clicking the initial key, and the third page of desktop is a desktop displayed by continuously pressing the initial key three times.
7. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
the first detection module is used for detecting a pressure parameter generated by the operation of a user on the appointed key and judging whether the pressure parameter is matched with a preset pressure parameter, and if the pressure parameter is matched with the preset pressure parameter, the first judgment module is used for judging whether the operation of the user on the appointed key is the preset operation if the pressure parameter is judged to be matched with the preset pressure parameter by the first detection module.
8. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
the second detection module is used for detecting the position of the mobile terminal;
the second judgment module is used for judging whether the position is located in a safe area;
the first judging module is used for judging whether the operation of the user on the appointed key is a preset operation or not if the second judging module judges that the position is located in a safe area.
9. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
the third detection module is used for detecting the wireless fidelity network connected with the mobile terminal;
the third judgment module is used for judging whether the wireless fidelity network is a safe wireless fidelity network;
the first judging module is used for judging whether the operation of the user on the appointed key is a preset operation or not if the third judging module judges that the wireless fidelity network is a safe wireless fidelity network.
10. The mobile terminal of claim 6, wherein the mobile terminal further comprises:
the fourth detection module is used for detecting the receiving time of the operation of the user on the appointed key;
the fourth judging module is used for judging whether the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold value or not;
the second unlocking module is used for unlocking the mobile terminal if the fourth judging module judges that the interval between the receiving time and the last locking time of the mobile terminal is smaller than a preset threshold value;
the first judging module is used for judging whether the operation of the user on the appointed key is the preset operation or not if the fourth judging module judges that the interval between the receiving time and the last locking time of the mobile terminal is not less than the preset threshold.
CN201610601661.9A 2016-07-27 2016-07-27 Mobile terminal unlocking method and mobile terminal Active CN106095469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610601661.9A CN106095469B (en) 2016-07-27 2016-07-27 Mobile terminal unlocking method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610601661.9A CN106095469B (en) 2016-07-27 2016-07-27 Mobile terminal unlocking method and mobile terminal

Publications (2)

Publication Number Publication Date
CN106095469A CN106095469A (en) 2016-11-09
CN106095469B true CN106095469B (en) 2020-06-16

Family

ID=57449110

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610601661.9A Active CN106095469B (en) 2016-07-27 2016-07-27 Mobile terminal unlocking method and mobile terminal

Country Status (1)

Country Link
CN (1) CN106095469B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090056090A (en) * 2007-11-29 2009-06-03 (주) 엘지텔레콤 Apparatus and method of locking/unlocking cellular phone using wheel-key
CN101819505A (en) * 2010-04-26 2010-09-01 威盛电子股份有限公司 Electronic system with touch control screen and operation method thereof
CN102449916A (en) * 2009-05-26 2012-05-09 三星电子株式会社 Apparatus and method for unlocking a locking mode of portable terminal
CN103294386A (en) * 2012-03-01 2013-09-11 广达电脑股份有限公司 Electronic device and locking/ unlocking method
CN103488936A (en) * 2013-09-03 2014-01-01 福建伊时代信息科技股份有限公司 Mobile terminal and mobile terminal security code validation method and device
CN103513869A (en) * 2013-09-22 2014-01-15 东莞宇龙通信科技有限公司 Method and device for displaying terminal lock screen interface and Widget
CN104052873A (en) * 2014-06-09 2014-09-17 宇龙计算机通信科技(深圳)有限公司 Terminal, multi-screen unlocking device and method and unlocking method for different areas of screens
CN104376239A (en) * 2014-11-26 2015-02-25 小米科技有限责任公司 Terminal unlocking method and device
JP2015114801A (en) * 2013-12-11 2015-06-22 シャープ株式会社 Display device and unlocking method
CN105608363A (en) * 2015-09-23 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Leap unlocking method, leap unlocking device and terminal

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102495768B (en) * 2011-12-14 2014-04-02 华为终端有限公司 Instruction processing method and terminal equipment
JP5762944B2 (en) * 2011-12-28 2015-08-12 京セラ株式会社 Apparatus, method, and program
CN102880414A (en) * 2012-08-28 2013-01-16 华为技术有限公司 Terminal equipment and method for starting program rapidly
CN105426716B (en) * 2015-11-11 2018-03-30 广东欧珀移动通信有限公司 Unlocking method, device and the mobile terminal of mobile terminal

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090056090A (en) * 2007-11-29 2009-06-03 (주) 엘지텔레콤 Apparatus and method of locking/unlocking cellular phone using wheel-key
CN102449916A (en) * 2009-05-26 2012-05-09 三星电子株式会社 Apparatus and method for unlocking a locking mode of portable terminal
CN101819505A (en) * 2010-04-26 2010-09-01 威盛电子股份有限公司 Electronic system with touch control screen and operation method thereof
CN103294386A (en) * 2012-03-01 2013-09-11 广达电脑股份有限公司 Electronic device and locking/ unlocking method
CN103488936A (en) * 2013-09-03 2014-01-01 福建伊时代信息科技股份有限公司 Mobile terminal and mobile terminal security code validation method and device
CN103513869A (en) * 2013-09-22 2014-01-15 东莞宇龙通信科技有限公司 Method and device for displaying terminal lock screen interface and Widget
JP2015114801A (en) * 2013-12-11 2015-06-22 シャープ株式会社 Display device and unlocking method
CN104052873A (en) * 2014-06-09 2014-09-17 宇龙计算机通信科技(深圳)有限公司 Terminal, multi-screen unlocking device and method and unlocking method for different areas of screens
CN104376239A (en) * 2014-11-26 2015-02-25 小米科技有限责任公司 Terminal unlocking method and device
CN105608363A (en) * 2015-09-23 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Leap unlocking method, leap unlocking device and terminal

Also Published As

Publication number Publication date
CN106095469A (en) 2016-11-09

Similar Documents

Publication Publication Date Title
CN106126077B (en) Display control method of application program icons and mobile terminal
US9626815B2 (en) Method for unlocking electronic device, and apparatus therefor
CN106687969B (en) method and terminal equipment for protecting privacy information
CN107944237B (en) Fingerprint unlocking method and related product
CN105825114B (en) Mobile terminal unlocking method and mobile terminal
CN104598783A (en) Unlocking method and device of intelligent terminal
CN104049897B (en) Touch panel device unlock method and device
CN107562345B (en) Information storage method and mobile terminal
CN106951159B (en) Method for unlocking terminal and rapidly entering application program and terminal
JP6793732B2 (en) Information image display method and equipment
CN107229396B (en) Mobile terminal application icon hiding method and mobile terminal
CN107450799B (en) Message display method and mobile terminal
CN105868617B (en) Application program encryption method and mobile terminal
CN104809373B (en) A kind of method of terminal unlocking
CN104951684A (en) Fingerprint encryption and decryption method and terminal
CN106250757B (en) A kind of control method and mobile terminal of application program
CN104318137A (en) Activating or switching method, device and terminal for operating system and/or application program
CN107103224B (en) Unlocking method and mobile terminal
CN105069360B (en) A kind of file encryption, decryption method and terminal
CN107506198B (en) Display method of mobile terminal and mobile terminal
CN107959789B (en) Image processing method and mobile terminal
CN105095735A (en) Pattern unlocking method and terminal
CN106446626B (en) Mobile terminal unlocking method and mobile terminal
CN106095469B (en) Mobile terminal unlocking method and mobile terminal
CN106383626B (en) Graphic coding interface switching method and mobile terminal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant