CN106845206B - Unlocking method and terminal - Google Patents

Unlocking method and terminal Download PDF

Info

Publication number
CN106845206B
CN106845206B CN201710114405.1A CN201710114405A CN106845206B CN 106845206 B CN106845206 B CN 106845206B CN 201710114405 A CN201710114405 A CN 201710114405A CN 106845206 B CN106845206 B CN 106845206B
Authority
CN
China
Prior art keywords
interface
terminal
unlocking
application program
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201710114405.1A
Other languages
Chinese (zh)
Other versions
CN106845206A (en
Inventor
朱珏媚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201710114405.1A priority Critical patent/CN106845206B/en
Publication of CN106845206A publication Critical patent/CN106845206A/en
Application granted granted Critical
Publication of CN106845206B publication Critical patent/CN106845206B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04817Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons

Abstract

The embodiment of the invention discloses an unlocking method and a terminal, wherein the method comprises the following steps: receiving a lighting operation of a user on a terminal to enter a first operation interface; receiving a first operation of a user on a first operation interface to acquire a target application program icon; and unlocking the terminal according to the target application program icon and the mapping relation. The embodiment of the invention provides an unlocking mode based on an operation application program icon, so that the unlocking mode is more novel.

Description

Unlocking method and terminal
Technical Field
The invention relates to the technical field of mobile terminals, in particular to an unlocking method and a terminal.
Background
Along with the popularization of mobile terminals, the mobile terminals are also greatly convenient for people's daily life and become an indispensable important role in people's life. Therefore, data security protection of mobile terminals is also becoming a focus of research. At present, mobile terminals all have corresponding screen locking functions so as to protect the system data security of the mobile terminals and prevent users from mistakenly touching and other operations. However, the existing unlocking mode is not novel enough, and the experience effect of the user on the intelligent mobile terminal is reduced.
Disclosure of Invention
The technical problem to be solved by the embodiments of the present invention is to provide an unlocking method and a terminal thereof, which can provide a novel unlocking manner and increase the experience effect of a user.
The embodiment of the invention provides an unlocking method, which comprises the following steps:
receiving a lighting operation of a terminal by a user to enter a first operation interface, wherein the first operation interface comprises a plurality of application program icons;
receiving a first operation of the user on the first operation interface to acquire a target application program icon, wherein the first operation comprises a clicking operation;
and unlocking the terminal according to the target application program icon and the mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number.
In some possible embodiments, the unlocking the terminal according to the target application icon and the mapping relationship specifically includes:
acquiring a current number according to the target application program icon and the mapping relation;
generating first current unlocking information according to the current number;
and comparing the first current unlocking information with the first initial unlocking information, and unlocking the terminal if the information is consistent.
In some possible embodiments, before receiving the lighting operation of the user to enter the first operation interface, the method further includes:
receiving touch operation of the user on the terminal to generate a bell-shaped lock adding interface;
receiving an adding operation of the user on the adding interface to form the bell-shaped interface;
setting the first initial unlocking information according to the bell-shaped interface
In some possible embodiments, after setting the first initial unlocking information according to the bell-shaped interface, the method further includes:
and setting second initial unlocking information on the bell-shaped interface.
In some possible embodiments, after the unlocking the terminal, the method further includes:
entering a second operation interface of the terminal, wherein the second operation interface comprises a bell-shaped area, and the bell-shaped area comprises a plurality of application icons;
receiving a second operation of the user on the second operation interface to acquire second current unlocking information, wherein the second operation comprises a clicking operation;
and comparing the second current unlocking information with the second initial unlocking information, and if the information is consistent, opening the target application program.
An embodiment of the present invention further provides an unlocking terminal, including:
the terminal comprises a receiving module, a processing module and a display module, wherein the receiving module is used for receiving the lighting operation of a user on the terminal to enter a first operation interface, and the first operation interface comprises a plurality of application program icons;
the receiving module is further used for receiving a first operation of the user on the first operation interface to acquire a target application program icon, wherein the first operation comprises a click operation;
and the unlocking module is used for unlocking the terminal according to the target application program icon and the mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number.
In some possible embodiments, the unlocking module specifically includes:
the acquisition unit is used for acquiring a current number according to the target application program icon and the mapping relation;
the generating unit is used for generating first current unlocking information according to the current number;
and the comparison unit is used for comparing the first current unlocking information with the first initial unlocking information, and unlocking the terminal if the information is consistent.
In some possible embodiments, the receiving module is further configured to:
receiving touch operation of the user on the terminal to generate a bell-shaped lock adding interface;
receiving an adding operation of the user on the adding interface to form the bell-shaped interface;
the terminal further comprises:
and the setting module is used for setting the first initial unlocking information on the bell-shaped interface.
In some possible embodiments, the setting module is further configured to:
and setting second initial unlocking information on the bell-shaped interface.
In some possible embodiments, the terminal further includes:
the access module is used for accessing a second operation interface of the terminal, the second operation interface comprises a bell-shaped area, and the bell-shaped area comprises a plurality of application icons;
the receiving module is further used for receiving the clicking operation of the user on the plurality of application program icons to acquire second current unlocking information;
the comparison unit is further used for comparing the second current unlocking information with the second initial unlocking information, and if the information is consistent, the target application program is opened.
According to the embodiment of the invention, the lighting operation of the user on the terminal is firstly received to enter the first operation interface, then the first operation of the user on the first operation interface is received to obtain the target application program, and finally the terminal is unlocked according to the target application program and the mapping relation. The embodiment of the invention provides an unlocking mode based on an operation application program icon, so that the unlocking mode is more novel.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of an unlocking method according to a first embodiment of the present invention;
fig. 2 is a schematic flowchart of an unlocking method according to a second embodiment of the present invention;
FIG. 3 is a schematic diagram of an add interface;
FIG. 4 is a schematic view of a bell-shaped interface;
FIG. 5 is a schematic view of a first operator interface;
FIG. 6 is a schematic view of a second operator interface;
fig. 7 is a schematic structural diagram of an unlocking terminal according to a first embodiment of the present invention;
fig. 8 is a schematic structural diagram of an unlocking terminal according to a second embodiment of the present invention;
fig. 9 is a schematic structural diagram of a user equipment according to an embodiment of the present invention.
Detailed Description
Referring to fig. 1, fig. 1 is a schematic flowchart illustrating an unlocking method according to a first embodiment of the present invention. The method provided by the embodiment of the invention can be applied to intelligent terminals, and the intelligent terminals include but are not limited to terminals such as smart phones, tablet computers and intelligent wearable devices. Specifically, the method comprises the following steps:
s101, receiving a lighting operation of a terminal by a user to enter a first operation interface. And the first operation interface is an interface to be unlocked.
Specifically, the lighting operation includes, but is not limited to, an operation that a user presses a power key or the like to trigger entry into an interface to be unlocked. The interface to be unlocked includes a plurality of application icons arranged in a bell shape, and the application icons may be set by a user according to a preference of the user, for example, the icons may be WeChat icons or short message icons, which is not limited in this embodiment of the present invention.
S102, receiving a first operation of a user on a first operation interface to acquire a target application program icon.
The first operation may be but is not limited to a click operation, and the number of the target application icons is at least one. Specifically, the user can click on an application icon on the interface to be unlocked, and the clicked icon is the target application icon.
S103, unlocking the terminal according to the target application program icon and a mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number.
For example, the mapping relationship specifically includes: application icon 1 corresponds to the number 1, application icon 2 corresponds to the number 2, and application icon 3 corresponds to the number 3. If the user operates the application icon 1 in step S102, the number 1 is obtained according to the mapping relationship, which is equivalent to the number 1 input on the unlocking interface in the conventional unlocking manner. Similarly, a plurality of numbers can be obtained according to the plurality of target application program icons and the mapping relation, and further arranged according to the operation sequence of the target application program icons, so that a number string consisting of the plurality of numbers can be obtained. And unlocking the terminal according to the digit string and preset initial unlocking information consisting of a plurality of digits.
According to the embodiment of the invention, the lighting operation of the terminal by the user is firstly received to enter the first operation interface, then the first operation of the first operation interface by the user is received to obtain the target application program icon, and finally the terminal is unlocked according to the target application program icon and the mapping relation. The embodiment of the invention provides an unlocking mode based on the operation of the application program icon, so that the unlocking mode is more novel, and the experience effect of a user is improved.
Referring to fig. 2, fig. 2 is a flowchart illustrating an unlocking method according to a second embodiment of the present invention. As shown, the method comprises the following steps:
s201, receiving touch operation of a user on the terminal to generate a bell-shaped lock adding interface.
Specifically, the user performs the following operations on the terminal: entering system setting-safety-screen locking mode-adding a bell-shaped password unlocking function. After this operation is performed, the bell lock add interface as shown in FIG. 3 will be entered. The adding interface comprises nine circles and prompt information, wherein the prompt information comprises: "add shortcut application in setting", "add shortcut application in click circle", "delete setting application in click application", and "add favorite application bar in quick-to-reach circle". The user can add favorite application icons to the nine circles according to the prompt message.
S202, receiving an adding operation of a user to the adding interface to form a bell-shaped interface.
Specifically, the user may click on nine circles in the graph to add application icons, forming a bell-shaped interface. For example, after the user adds application icon 1, application icon 2, application icon 3, application icon 4, application icon 5, application icon 6, application icon 7, application icon 8, and application icon 9 to the nine circles, and clicks the "done" icon in fig. 3 after the addition is completed, a bell-shaped interface as shown in fig. 4 is formed. Note that after application icon 1 is added inside the small circle as shown in fig. 3, the number 1 will appear outside the large circle accordingly. Similarly, the numbers 2-9 will all appear. Thus, the numbers 1 to 9 appear outside the large circle in fig. 4 at positions corresponding to the application icons.
S203, setting one-to-one correspondence between the application program icons and the numbers, namely setting mapping relation.
Specifically, the mapping relationship is set according to a plurality of application icons in the bell-shaped interface. For example, the set mapping relationship is as follows: application icon 1 corresponds to the number 1, application icon 2 corresponds to the number 2, application icon 3 corresponds to the number 3, application icon 4 corresponds to the number 4, application icon 5 corresponds to the number 5, application icon 6 corresponds to the number 6, application icon 7 corresponds to the number 7, application icon 8 corresponds to the number 8, and application icon 9 corresponds to the number 9.
And S204, setting first initial unlocking information and second initial unlocking information on the bell-shaped interface. The first initial unlocking information corresponds to unlocking of the terminal, and the second initial unlocking information corresponds to opening of the application program. .
Specifically, after generating the bell-shaped interface shown in fig. 4, the user may click the phone key of the terminal to return to the desktop. Then, the following operations are carried out on the terminal: enter system set-set password. Clicking on the "set password" option pops up a bell-shaped interface as shown in fig. 4. At this time, the user may click on the application icon in fig. 4 to set the first initial unlock information. Understandably, the user may also click on the numbers in fig. 4 to set the first initial unlock information. It should be noted that, since the one-to-one correspondence relationship between the application icons and the numbers is set, clicking on an application icon in a graph by a user is equivalent to clicking on a number. For example, the user sequentially clicks the application icons 1, 8, 2, and 6 in the figure, which is equivalent to directly clicking the numbers 1, 8, 2, and 6, so that the generated first initial unlocking information 1826 is equivalent to the unlocking password of the terminal.
In order to further enhance the security of the terminal, it is also possible to set unlocking information, i.e., an unlocking password, to each application or to an application that the user likes. Specifically, after the first initial unlocking information setting of the terminal is completed, the user may click the terminal and return to the interface where the "set password" option appears. On the interface, a user clicks a 'set password' option to pop up an interface comprising a plurality of application programs, wherein the program in the interface can be all the application programs installed on the terminal or the application programs selected by the user and preferred by the user. At this time, the user may select an application program that the user wants to set the unlock information, and after clicking, a bell-shaped interface as shown in fig. 4 may pop up. At this time, the user may click on the application icon in fig. 4 to set the second initial unlock information. Understandably, the user may also click on the numbers in fig. 4 to set the second initial unlock information. It should be noted that, since the one-to-one correspondence relationship between the application icons and the numbers is set, clicking on an application icon in a graph by a user is equivalent to clicking on a number. For example, the user wants to set the second initial unlocking information for the application 1, may select the application 1, and then enter the bell-shaped interface shown in fig. 4, and then the user sequentially clicks the application icons 1, 5, 7, and 4 in the figure, which is equivalent to directly clicking the numbers 1, 5, 7, and 4, so that the generated second initial unlocking information is 1574, which is equivalent to the opening password of the application.
Furthermore, after the setting of the first initial unlocking information and the second initial unlocking information is completed, the phone key is clicked to return to the screen interface, and then the power key is pressed to enable the terminal to be in the screen locking state.
S205, receiving the lighting operation of the terminal by the user to enter a first operation interface.
Specifically, the user presses the power key, and the screen is lit to appear the first operation interface shown in fig. 5, i.e., the interface to be unlocked. As shown in fig. 5, the unlocking interface includes a first operation area a and a second operation area B, where the first operation area a is a bell-shaped area, and the bell-shaped area includes application icons 1 to 9. The user can operate the first operation area A or the second operation area B to unlock. The specific unlocking process for operating the first operating area a will be described as follows, and the specific unlocking process for operating the second operating area is as follows: clicking on the second operating field B to present a numeric keypad to operate the numeric keypad to effect numeric input within the second operating field B.
S206, receiving a first operation of the user on the first operation interface to acquire the target application program icon.
The first operation may be a click operation, and the number of the target application icons is at least one. Specifically, the user can click on an application icon on the interface to be unlocked, and the clicked icon is the target application icon. For example, the user sequentially clicks the application icons 1, 8, 2, and 6 in fig. 5, and thus the four application icons are the target application icons.
And S207, unlocking the terminal according to the target application program icon and the mapping relation.
Specifically, a current number is obtained according to the target application program icon and the mapping relation, first current unlocking information is generated according to the current number, and finally the first current unlocking information and the first initial unlocking information are compared, and the terminal is unlocked according to a comparison result.
For example, the user sequentially clicks the application icons 1, 8, 2, and 6, and the current numbers that can be obtained according to the mapping relationship are 1, 8, 2, and 6. Thereafter, a number string 1846 as first current unlock information is available from the current number. Finally, the first current unlocking information 1826 is compared with the first initial unlocking information, and since the first initial unlocking information is also 1826, the successful unlocking of the terminal is realized if the comparison is successful.
And S208, entering a second operation interface of the terminal.
Specifically, after the unlocking is successful, the second operation interface shown in fig. 6 is entered. As shown, the second interface includes a bell-shaped area including the application icons 1 through 9. It should be noted that the first operation interface is an interface shown in fig. 5 before the terminal is unlocked, and the second operation interface is an interface shown in fig. 6 after the terminal is unlocked. In addition, in the first operation interface, only touch operations such as clicking and the like can be performed on the application icons 1 to 9, and the touch operations are only used for unlocking the terminal and cannot open the application; in the second operation interface, the operation of opening the application program can be performed on the application program icons 1 to 9. The specific process of operating the second operation interface to open the application icon will be described in detail in the subsequent steps.
And S209, receiving a second operation of the user on the second operation interface to open the target application program.
Specifically, when a user wants to open an application, the user may sequentially click the multiple application icons in fig. 6, obtain second current unlocking information according to the mapping relationship, and open the corresponding application (i.e., the target application) by comparing the second current unlocking information with the second initial unlocking information. For example, the user uses the application program 1 as a target application program, in the foregoing step, the second initial unlocking information set for the application program 1 is 1574, the user sequentially clicks the application program icons 1, 5, 7, and 4 in fig. 6, and the current numbers that can be obtained according to the foregoing mapping relationship are 1, 5, 7, and 4. Thereafter, a number string 1574 as second current unlock information is obtained from the current number. Finally, the second current unlocking information 1574 is compared with the second initial unlocking information, and since the second initial unlocking information is also 1574, if the comparison is successful, the application program 1 is successfully opened.
According to the embodiment of the invention, before unlocking, the operation of a user is received to complete the setting of the interface to be unlocked, the mapping relation, the terminal unlocking information and the application program unlocking information, when unlocking is carried out, the operation of the user is received firstly to enter the first operation interface (namely the unlocking interface), then the second operation of the user is received to obtain the target application program icon, and finally, the terminal is unlocked according to the target application program icon and the mapping relation. The embodiment of the invention provides an unlocking mode based on the operation of the application program icon, so that the unlocking mode is more novel, and the experience effect of a user is improved. In addition, the bell-shaped area is included in the unlocking interface, so that the unlocking interface is displayed to a user in a novel mode, and the experience effect of the user is improved. Furthermore, in the embodiment of the invention, unlocking information is set for a certain application program, so that the safety of the terminal is improved. And when the application program is opened, the same mode as unlocking the terminal is adopted, so that the opening mode of the application program is more novel, and the experience effect of a user is improved.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an unlocking terminal according to a first embodiment of the present invention. As shown, the terminal may include:
a receiving module 10, configured to receive a lighting operation of a terminal by a user to enter a first operation interface, where the first operation interface includes a plurality of application icons;
the receiving module 10 is further configured to receive a first operation of the first operation interface by the user to acquire a target application icon, where the first operation includes a click operation;
and the unlocking module 11 is used for unlocking the terminal according to the target application program icon and a mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number.
According to the embodiment of the invention, the lighting operation of the user on the terminal is received through the receiving module 10 to enter the first operation interface, then the first operation of the user on the first operation interface is received through the receiving module 10 to obtain the target application program icon, and finally the unlocking module 11 is used for unlocking according to the target application program icon and the mapping relation terminal. The embodiment of the invention provides an unlocking mode based on the operation of the application program icon, so that the unlocking mode is more novel, and the experience effect of a user is improved.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an unlocking terminal according to a second embodiment of the present invention. As shown, the terminal may include:
the receiving module 20 is configured to receive a touch operation of a user on the terminal to generate a bell-shaped lock adding interface, and receive an adding operation of the user on the adding interface to form a bell-shaped interface;
the setting module 22 is used for setting first initial unlocking information on the bell-shaped interface and setting second initial unlocking information on the bell-shaped interface;
the receiving module 20 is configured to receive a lighting operation of a user on the terminal to enter a first operation interface, and receive a first operation of the user on the first operation interface to obtain a target application icon, where the first operation interface includes a plurality of application icons, and the first operation includes a click operation;
and the unlocking module 21 is configured to unlock the terminal according to the target application icon and a mapping relationship, where the mapping relationship is a one-to-one correspondence relationship between the application icon and the number.
And the entering module 23 is configured to enter a second operation interface of the terminal, where the second operation interface includes a bell-shaped area, and the bell-shaped area includes a plurality of the application icons.
The receiving module 20 is further configured to receive a second operation on the second operation interface by the user to obtain second current unlocking information, where the second operation includes a click operation.
Specifically, the unlocking module 21 specifically includes:
an obtaining unit 211, configured to obtain a current number according to the target application icon and the mapping relationship;
a generating unit 212, configured to generate first current unlocking information according to the current number;
the comparing unit 213 is configured to compare the first current unlocking information with the first initial unlocking information, and unlock the terminal if the information is consistent.
Further, the comparing unit 213 is further configured to compare the second current unlocking information with the second initial unlocking information, and if the information is consistent, open the target application.
According to the embodiment of the invention, before unlocking, the operation of a user is received to complete the setting of the interface to be unlocked, the mapping relation, the terminal unlocking information and the application program unlocking information, when unlocking is carried out, the lighting operation of the user is received firstly to enter a first operation interface (namely an unlocking interface), then the first operation of the user is received to obtain the target application program icon, and finally the terminal is unlocked according to the target application program icon and the mapping relation. The embodiment of the invention provides an unlocking mode based on the operation of the application program icon, so that the unlocking mode is more novel, and the experience effect of a user is improved. In addition, the bell-shaped area is included in the unlocking interface, so that the unlocking interface is displayed to a user in a novel mode, and the experience effect of the user is improved. Furthermore, in the embodiment of the invention, unlocking information is set for a certain application program, so that the safety of the terminal is improved. And when the application program is opened, the same mode as unlocking the terminal is adopted, so that the opening mode of the application program is more novel, and the experience effect of a user is improved.
It should be noted that the specific working flows of the terminals shown in fig. 7 and fig. 8 have been described in detail in the foregoing method, and therefore are not described herein again.
Fig. 9 is a schematic structural diagram of a user equipment according to an embodiment of the present invention. Specifically, as shown in fig. 9, the user equipment according to the embodiment of the present invention may include: at least one processor 100, at least one input device 200, at least one output device 300, memory 500, etc. Wherein the components are communicatively coupled via one or more buses 400. It will be understood by those skilled in the art that the configuration of the user equipment shown in fig. 5 is not intended to limit the embodiments of the present invention, and may be a bus configuration, a star configuration, a combination of more or fewer components than those shown, or a different arrangement of components. Wherein:
the processor 100 is a control center of the user equipment, connects various parts of the entire user equipment using various interfaces and lines, and performs various functions of the user equipment and processes data by operating or executing programs and/or modules stored in the memory 500 and calling data stored in the memory 500. The processor 100 may be composed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected with the same or different functions. For example, the processor 100 may include only a Central Processing Unit (CPU), or may be a combination of a CPU, a Digital Signal Processor (DSP), a Graphics Processing Unit (GPU), and various control chips. In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
The input device 200 may include a standard touch screen, keyboard, camera, etc., and may also include a wired interface, wireless interface, etc.
The output device 300 may include a display screen, a speaker, etc., and may also include a wired interface, a wireless interface, etc.
The memory 500 may be used to store software programs and modules, and the processor 100, the input device 200 and the output device 300 execute various functional applications of the user equipment and implement data processing by calling the software programs and modules stored in the memory 500. The memory 500 mainly includes a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the data storage area may store data created according to the use of the user equipment, and the like. In the embodiment of the present invention, the operating system may be an Android system, an iOS system, a Windows operating system, or the like.
Specifically, the processor 100 calls an application program stored in the memory 500 for executing the following steps:
receiving a lighting operation of a terminal by a user to enter a first operation interface, wherein the first operation interface comprises a plurality of application program icons;
receiving a first operation of the user on the first operation interface to acquire a target application program icon, wherein the first operation comprises a clicking operation;
and unlocking the terminal according to the target application program icon and the mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number.
In some possible embodiments, the processor 100 is configured to perform the following steps:
acquiring a current number according to the target application program icon and the mapping relation;
generating first current unlocking information according to the current number;
and comparing the first current unlocking information with the first initial unlocking information, and unlocking the terminal if the first current unlocking information is consistent with the first initial unlocking information.
In some possible embodiments, the processor 100 is configured to perform the following steps:
receiving touch operation of the user on the terminal to generate a bell-shaped lock adding interface;
receiving an adding operation of the user on the adding interface to form the bell-shaped interface;
and setting the first initial unlocking information on the bell-shaped interface.
In some possible embodiments, the processor 100 is configured to perform the following steps:
and setting second initial unlocking information on the bell-shaped interface.
In some possible embodiments, the processor 100 is configured to perform the following steps:
entering a second operation interface of the terminal, wherein the second operation interface comprises a bell-shaped area, and the bell-shaped area comprises a plurality of application icons;
receiving a second operation of the user on the second operation interface to acquire second current unlocking information, wherein the second operation comprises a clicking operation;
and comparing the second current unlocking information with the second initial unlocking information, and if the information is consistent, opening the target application program.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
While the invention has been described with reference to a preferred embodiment, it will be understood by those skilled in the art that various changes in form and detail may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (8)

1. An unlocking method, comprising:
receiving a lighting operation of a terminal by a user to enter a first operation interface, wherein the first operation interface comprises a plurality of application program icons, the application program icons are arranged in a bell shape, and the first operation interface further comprises numbers corresponding to the application program icons;
receiving a first operation of the user on the first operation interface to acquire a target application program icon, wherein the first operation comprises a clicking operation;
unlocking the terminal according to the target application program icon and a mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number;
wherein, still include after carrying out the unblock to the terminal:
entering a second operation interface of the terminal, wherein the second operation interface comprises a bell-shaped area, and the bell-shaped area comprises a plurality of application icons;
receiving a second operation of the user on the second operation interface to acquire second current unlocking information, wherein the second operation comprises a clicking operation;
and comparing the second current unlocking information with the second initial unlocking information, and if the information is consistent, opening the target application program.
2. The method of claim 1, wherein unlocking the terminal according to the target application icon and the mapping relationship specifically comprises:
acquiring a current number according to the target application program icon and the mapping relation;
generating first current unlocking information according to the current number;
and comparing the first current unlocking information with the first initial unlocking information, and unlocking the terminal if the first current unlocking information is consistent with the first initial unlocking information.
3. The method of claim 2, wherein before receiving a lighting operation of the terminal by the user to enter the first operation interface, further comprising:
receiving touch operation of the user on the terminal to generate a bell-shaped lock adding interface;
receiving an adding operation of the user on the adding interface to form a bell-shaped interface;
and setting the first initial unlocking information on the bell-shaped interface.
4. The method of claim 3, wherein setting the first initial unlock message according to the bell-shaped interface further comprises:
and setting second initial unlocking information at the bell-shaped interface.
5. An unlock terminal, comprising:
the terminal comprises a receiving module, a processing module and a display module, wherein the receiving module is used for receiving the lighting operation of a user on the terminal to enter a first operation interface, the first operation interface comprises a plurality of application program icons, the application program icons are arranged in a bell shape, and the first operation interface also comprises numbers corresponding to the application program icons;
the receiving module is further used for receiving a first operation of the user on the first operation interface to acquire a target application program icon, wherein the first operation comprises a click operation;
the unlocking module is used for unlocking the terminal according to the target application program icon and a mapping relation, wherein the mapping relation is a one-to-one correspondence relation between the application program icon and the number;
the access module is used for accessing a second operation interface of the terminal, the second operation interface comprises a bell-shaped area, and the bell-shaped area comprises a plurality of application icons;
the receiving module is further configured to receive a second operation of the user on the second operation interface to obtain second current unlocking information, where the second operation includes a click operation;
the unlocking module comprises a comparison unit, the comparison unit is used for comparing the second current unlocking information with the second initial unlocking information, and if the information is consistent, the target application program is opened.
6. The terminal according to claim 5, wherein the unlocking module specifically comprises:
the acquisition unit is used for acquiring a current number according to the target application program icon and the mapping relation;
the generating unit is used for generating first current unlocking information according to the current number;
and the comparison unit is used for comparing the first current unlocking information with the first initial unlocking information, and unlocking the terminal if the information is consistent.
7. The terminal of claim 6, wherein the receiving module is further configured to:
receiving touch operation of the user on the terminal to generate a bell-shaped lock adding interface;
receiving an adding operation of the user on the adding interface to form a bell-shaped interface;
the terminal further comprises:
and the setting module is used for setting the first initial unlocking information on the bell-shaped interface.
8. The terminal of claim 7, wherein the setting module is further configured to:
and setting second initial unlocking information at the bell-shaped interface.
CN201710114405.1A 2017-02-28 2017-02-28 Unlocking method and terminal Expired - Fee Related CN106845206B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710114405.1A CN106845206B (en) 2017-02-28 2017-02-28 Unlocking method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710114405.1A CN106845206B (en) 2017-02-28 2017-02-28 Unlocking method and terminal

Publications (2)

Publication Number Publication Date
CN106845206A CN106845206A (en) 2017-06-13
CN106845206B true CN106845206B (en) 2020-01-10

Family

ID=59137266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710114405.1A Expired - Fee Related CN106845206B (en) 2017-02-28 2017-02-28 Unlocking method and terminal

Country Status (1)

Country Link
CN (1) CN106845206B (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2824552B1 (en) * 2012-03-08 2020-11-04 ZTE Corporation Mobile terminal application icon management method and mobile terminal
CN102945118A (en) * 2012-10-25 2013-02-27 广东欧珀移动通信有限公司 Touch screen unlocking method and system as well as communication terminal
CN103914235A (en) * 2014-03-12 2014-07-09 深圳市中兴移动通信有限公司 Mobile terminal and unlocking method thereof
CN106295305A (en) * 2016-08-09 2017-01-04 上海斐讯数据通信技术有限公司 A kind of unlocking screen method and device of touch screen terminal
CN106355075A (en) * 2016-09-08 2017-01-25 深圳市金立通信设备有限公司 Unlocking method and terminal
CN106446661A (en) * 2016-09-30 2017-02-22 维沃移动通信有限公司 Mobile terminal application program starting method and mobile terminal

Also Published As

Publication number Publication date
CN106845206A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN101482796B (en) System and method for starting mobile terminal application function through touch screen
CN106062763B (en) Method and device for displaying application and picture and electronic equipment
US10075430B2 (en) Method and system for efficient password input
CN107924288A (en) Electronic equipment and its method for carrying out perform function using speech recognition
CN111866270B (en) Application program control method and device and electronic equipment
CN105447368A (en) User terminal access right control method and user terminal
CN104809174A (en) Opening method of terminal application
TWI705348B (en) Service calling method and device
CN104598783A (en) Unlocking method and device of intelligent terminal
WO2016177000A1 (en) Method for entering operating system desktop and mobile intelligent terminal
CN106815534B (en) Method and device for protecting user privacy and mobile terminal
CN108156594A (en) A kind of method and terminal for realizing virtual card
KR20160012573A (en) Apparatus for Providing Integrated Functions of Dial and Calculator and Method thereof
CN104808899A (en) Terminal
CN105224364A (en) Application program unlocking method and device based on screen locking
CN105100449A (en) Picture sharing method and mobile terminal
CN104809373B (en) A kind of method of terminal unlocking
CN110084009B (en) Digital unlocking method and device, storage medium and mobile terminal
EP3757831B1 (en) Fingerprint event processing method, apparatus, and terminal
KR20180118635A (en) Method and apparatus for processing icons in an application
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN104933340A (en) Message sending method and mobile terminal
CN112181559A (en) Interface display method and device and electronic equipment
CN106845206B (en) Unlocking method and terminal
CN105335169A (en) Method and apparatus for starting up communication in intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200110

CF01 Termination of patent right due to non-payment of annual fee