CN107169326A - A kind of unlocking screen method and mobile terminal - Google Patents

A kind of unlocking screen method and mobile terminal Download PDF

Info

Publication number
CN107169326A
CN107169326A CN201710356083.1A CN201710356083A CN107169326A CN 107169326 A CN107169326 A CN 107169326A CN 201710356083 A CN201710356083 A CN 201710356083A CN 107169326 A CN107169326 A CN 107169326A
Authority
CN
China
Prior art keywords
unlocking
mobile terminal
user
network equipment
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710356083.1A
Other languages
Chinese (zh)
Inventor
银道峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710356083.1A priority Critical patent/CN107169326A/en
Publication of CN107169326A publication Critical patent/CN107169326A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/305Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Abstract

The present invention provides a kind of unlocking screen method and mobile terminal, is related to communication technical field.The unlocking screen method is applied to mobile terminal, including:After the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the secondary unlocking information that the first network equipment is sent is obtained;According to the secondary unlocking information, the second unlocking pin of the user is verified, and after being verified, completes the unblock to screen.The solution of the present invention, which is solved, forgets the problem of brush machine resets caused user data loss after password.

Description

A kind of unlocking screen method and mobile terminal
Technical field
The present invention relates to communication technical field, more particularly to a kind of unlocking screen method and mobile terminal.
Background technology
With developing rapidly for the communication technology, the function of mobile terminal is more and more diversified, and the life given people is brought Great convenience, carries with mobile terminal into one kind custom.
And in order to protect privacy of user, manufacturer's password locking function of screen that has been mobile terminal design, in user's locking Screen or mobile terminal are detected in preset time period without operating after automatic lock-screen, it is necessary to user is unlocked to screen, The dragging, slip, clicking operation of predetermined form are carried out such as on screen, or by button or Macintosh, or pass through input Specific character etc..Wherein, in these unlocking manners, the password of unblock (numeral, pattern, sound or other various make Symbol for password etc.) it is that, by user's sets itself, and can be modified according to demand.But, it often may be useful for family not Carefully the situation of unlocking screen password is forgotten, so as to lead to not enter mobile terminal system.
And for the situation that user forgets Password, existing settling mode need to be reset close by brush machine more new system Code.But, such settling mode, it will the data dump that will be stored before user causes the loss of significant data.
The content of the invention
The embodiment of the present invention provides a kind of unlocking screen method and mobile terminal, and institute is reset to solve to forget brush machine after password The problem of user data loss caused.
First aspect is applied to mobile terminal there is provided a kind of unlocking screen method, methods described, and methods described includes:
After the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out secondary unlocking;
The network connection with first network equipment is set up, the secondary unlocking information that the first network equipment is sent is obtained;
According to the secondary unlocking information, the second unlocking pin of the user is verified, and after being verified, Complete the unblock to screen.
Second aspect there is provided a kind of mobile terminal, including:
Reminding module, for after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, pointing out user Carry out secondary unlocking;
First processing module, for setting up the network connection with first network equipment, obtains the first network equipment hair The secondary unlocking information sent;
Second processing module, for according to the secondary unlocking information, testing the second unlocking pin of the user Card, and after being verified, complete the unblock to screen.
The third aspect there is provided a kind of mobile terminal, including:Memory, processor and it is stored on the memory simultaneously The computer program that can be run on the processor, is realized as described above described in the computing device during computer program The step of unlocking screen method.
The above-mentioned technical proposal of the present invention has the beneficial effect that:
The unlocking screen method of the embodiment of the present invention, mobile terminal first can after to the first unlocking pin authentication failed User is pointed out to carry out secondary unlocking;Then, the network connection with first network equipment is set up, first network equipment transmission is obtained Secondary unlocking information;Afterwards, by the secondary unlocking information, the second unlocking pin of user is verified, and it is logical in checking Later, the unblock to screen is completed.So, the first unlocking pin is being caused to verify due to reasons such as user's forgetting or operational errors After failure, the chance that user is unlocked to screen again can be also provided, based on network connection by two in first network equipment Secondary unlocking information carries out the checking of the second unlocking pin, realizes multiple unblock, it is to avoid the unlocking pin of user first checking is lost After losing will brush machine reset caused by user data loss the problem of, improve Consumer's Experience.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed for description of the embodiment of the present invention The accompanying drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the step flow chart one of the unlocking screen method of the embodiment of the present invention;
Fig. 2 for the embodiment of the present invention unlocking screen method in obtain secondary unlocking information specific steps flow chart;
Fig. 3 is the step flowchart 2 of the unlocking screen method of the embodiment of the present invention;
Fig. 4 is the structural representation one of the mobile terminal of the embodiment of the present invention;
Fig. 5 is the structural representation two of the mobile terminal of the embodiment of the present invention;
Fig. 6 is the structural representation three of the mobile terminal of the embodiment of the present invention;
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention;
Fig. 8 is the structural representation of the mobile terminal of further embodiment of this invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
As shown in figure 1, the unlocking screen method of the embodiment of the present invention, applied to mobile terminal, including:
Step 101, after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out two Secondary unblock.
First unlocking pin is the preferred password of unlocking screen, can be directly complete after the first unlocking pin is proved to be successful The unblock of paired screen, into the user interface of mobile terminal.However, because user forgets the reason such as password or operational error, Easily occur in the situation of the first unlocking pin authentication failed of unlocking screen, this step, after the first unlocking pin authentication failed, User will be pointed out to carry out secondary unlocking, and then provide the user the chance unlocked again.
It is preferred that, in the checking of the first unlocking pin, for the authentication failed for avoiding operational error from occurring, based on this first Unlocking pin, is provided with the verification machine meeting of pre-determined number, such as pre-determined number is 3, in user's first time entr screen unlocking pin After authentication failed, mobile terminal generation prompt message informs that user's checking fails, and need to re-enter password, and is verified when 3 times Failure, just can determine whether the first unlocking pin authentication failed, point out user to carry out secondary unlocking.
Step 102, the network connection with first network equipment is set up, the secondary solution that the first network equipment is sent is obtained Lock information.
In this step, step 101 prompting user carry out secondary unlocking after, mobile terminal can the operation based on user, Start network connecting function under screen lock state, set up the network connection with first network equipment, and set the first network is obtained The secondary unlocking information that preparation is sent, to carry out the checking of second of unblock.Wherein, the first network equipment is to set up network connection During, the network equipment that user independently selects.
Step 103, according to the secondary unlocking information, the second unlocking pin of the user is verified, and is testing After card passes through, the unblock to screen is completed.
In this step, the secondary unlocking information that the first network equipment got according to step 102 is sent, to the of user Two unlocking pins are verified, and after being verified, complete the unblock to screen.Wherein, second unlocking pin is preferably It is stored in the mobile terminal, can be directly verified after secondary unlocking information is got.Certainly, if in the mobile terminal Under screen lock state, mobile terminal is set to start related input function, it is defeated that second unlocking pin may also be the user received Enter.
The unlocking screen method of the embodiment of the present invention, by above-mentioned steps 101- steps 103, mobile terminal is solved to first After lock cipher authentication failed, user can be pointed out to carry out secondary unlocking first;Then, the network set up with first network equipment connects Connect, obtain the secondary unlocking information of first network equipment transmission;Afterwards, by the secondary unlocking information, to the second solution of user Lock cipher is verified, and after being verified, completes the unblock to screen.So, forget or operational error due to user Caused etc. reason after the first unlocking pin authentication failed, the chance that user is unlocked to screen again can be also provided, based on net Network connection is carried out the checking of the second unlocking pin by the secondary unlocking information in first network equipment, is realized multiple unblock, is kept away Exempted from after user's the first unlocking pin authentication failed will brush machine reset caused by user data loss the problem of, improve user Experience.
And if according to the secondary unlocking information, the result verified to the second unlocking pin of user indicates that checking is not led to Cross, then to reacquire secondary unlocking information, be verified again.
Wherein, it is contemplated that operation it is convenient and technical realisation, it is preferred that the network connection be bluetooth connection.
So, in step 102, during setting up the network connection with first network equipment, mobile terminal can also pass through User interface prompt user selects first network equipment using Bluetooth function, completes the bluetooth connection with first network equipment.
Realized in addition, network connection can also be near-field communication NFC connections or focus connection etc..When focus is connected, network It can be the mobile terminal to share end, can also first network equipment, network connection set up after, WLAN WIFI can be passed through Carry out data transmission.
It should be appreciated that in embodiments of the present invention, the secondary unlocking information matched with the second unlocking pin is to deposit Storage is in premise equipment, although, in a step 102, no matter the network connection of which kind of above-mentioned mode, the mobile terminal can all be built The vertical network connection with first network equipment, however, in first network equipment here may and in the absence of close with the second unblock The secondary unlocking information that code is matched, if obtaining secondary unlocking information, carries out subsequent authentication, can postpone releasing process, cause money The waste in source.Therefore, as shown in Fig. 2 step 102 includes:
Step 1021, according to the network connection, the equipment identification information of the first network equipment, the equipment are obtained Identification information is used for first network equipment described in unique mark.
In this step, after the network connection established, it will obtain the equipment mark for the unique mark first network equipment Know information, the comparison for after.
Step 1022, the equipment identification information is entered with characterization device identification information pre-stored in the mobile terminal Row is compared.
In this step, the equipment identification information that step 1021 is obtained is known with the characterization device being pre-stored in the mobile terminal Other information is compared, to judge whether being that the be stored with network side of the secondary unlocking information matched with the second unlocking pin is set It is standby.
Step 1023, after comparison passes through, the secondary unlocking information in the first network equipment is extracted.
In this step, in the comparison through step 1022, and after comparing and passing through, the secondary solution in the first network equipment is extracted Lock information, to carry out the checking with the second unlocking pin.
Characterization device identification information is stored in the mobile terminal, for recording the secondary solution matched with the second unlocking pin The equipment identification information for the network equipment that lock information is stored in.Therefore, according to above-mentioned steps, in secondary unlocking, through the first net The acquisition of the equipment identification information of network equipment, the equipment identification information got is compared with characterization device identification information, After comparison passes through, then extract the secondary unlocking information in the first network equipment.So, unnecessary processing is not only reduced Flow, improves treatment effeciency, and has carried out the checking of identity to the first network equipment for storing secondary unlocking information, enters One step improves the degree of protection to privacy of user.
For example, user is matched the mobile terminal after successful matching with device A by bluetooth connection, the mobile terminal is first Equipment identification information (such as International Mobile Equipment Identity code IMEI or the physical address for the unique mark device A can first be obtained MAC etc.), afterwards, it is compared by the characterization device identification information with being pre-stored in the mobile terminal, to determine whether this Whether device A is the equipment for storing characterization device identification information, after comparison passes through, and completes the authentication to the device A, from And effective secondary unlocking information can be extracted.If the equipment identification information of device A is compared with this feature device identifying information Do not pass through, then no longer receive the secondary unlocking information of device A transmission.
Further, after secondary unlocking information is got, such as step 103, you can according to the secondary unlocking information to Second unlocking pin at family is verified, and after being verified, completes the unblock to screen.Here, it is contemplated that user first The authentication failed of unlocking pin, for ease of the success of unlocking screen next time, as shown in figure 3, completing the unblock to screen After step, in addition to:
Step 104, the first unlocking pin of generation resets dialog box.
In this step, after the success of this unlocking screen, the first unlocking pin replacement dialog box can be generated and entered there is provided user Row chooses whether to carry out the replacement of the first unlocking pin.
Step 105, the first operational order that dialog box is triggered is reset based on first unlocking pin according to user, entered The replacement of the unlocking pin of row first;Or, the second behaviour triggered according to user based on first unlocking pin replacement dialog box Instruct, be directly entered the user interface of the mobile terminal.
Here, the first operational order for being triggered of dialog box is reset based on first unlocking pin according to user, carries out the The replacement of one unlocking pin;Or, referred to according to user based on the second operation that first unlocking pin replacement dialog box is triggered Order, is directly entered the user interface of the mobile terminal, abandons the replacement of the first unlocking pin.So as in this unlocking screen, root Corresponding subsequent treatment is carried out according to the demand of user, Consumer's Experience is lifted.
For example, the second unlocking pin is being verified, after completing to the unblock of screen, mobile terminal generates and ejects first Unlocking pin reset dialog box, first unlocking pin reset dialog box in point out " whether carrying out the replacement of screen password ", with The first operational order is triggered after family selection "Yes", the replacement of the first unlocking pin is carried out, the password newly inputted is regard as the first solution Lock cipher is preserved;And when triggering the second operational order after user's selection "No", it is directly entered user circle of the mobile terminal Face, without the replacement of password.
In the above, it is known that, in order to complete the checking of the first unlocking pin and the second unlocking pin, the movement is whole End should be appreciated that the first unlocking pin and the second unlocking pin, and current password could be verified, therefore, be moved to described Before the step of first unlocking pin of dynamic terminal screen unblock is verified, in addition to:
The 3rd triggered operational order, the password setting that user is currently inputted are set according to user based on unlocking pin For the first unlocking pin of unlocking screen;
The 4th triggered operational order is set according to user based on unlocking pin, starts scanning and network connection, and will Scan obtained secondary unlocking information to be stored in second network equipment being connected with the mobile terminal, wherein the secondary solution Lock information is characterized the characteristic point information of object.
Here, when setting the first unlocking pin, mobile terminal is by detecting that user is set in the unlocking pin of mobile terminal First unlocking pin of middle progress sets operation, triggers the 3rd operational order, is unlocking screen by the password setting currently inputted The first unlocking pin.First unlocking pin can be pattern or numeral etc..
In this embodiment, to avoid the forgetting of password, it is preferred that the second unlocking pin is characterized the characteristic point letter of object Breath.So, when setting the second unlocking pin, mobile terminal is operated by detecting that the second unlocking pin of user's progress is set, Trigger the 4th operational order, start scanning and network connection, the characteristic point information of obtained feature object will be scanned as secondary Unlocking information, is stored in second network equipment that network connection is established with the mobile terminal.Certainly, obtained feature is scanned The characteristic point information of object can be also stored directly in the mobile terminal, with getting from first network equipment so as to after Secondary unlocking information is verified;If not stored in the mobile terminal, need when carrying out secondary unlocking, by user It is scanned using this feature object, its characteristic point information is obtained in real time as the second unlocking pin and from first network equipment The secondary unlocking information got is verified.
Wherein, scanning can realize that AR is scanned by enhancing, to complete the scanning of feature object (such as ring, necklace), obtain To the characteristic point information of feature object.AR scannings are a kind of by integrated new of real world information and virtual world information " seamless " Technology, the mapping relations set up using computer vision methods between real world and screen, make want drafting figure or It is that 3D models can be presented on screen as being attached on real world object.Specifically, algorithm (such as SURF can be passed through (Speeded-Up Robust Features accelerate robust features algorithm), ORB (ORiented Brief algorithms), FERN (ferns Algorithm) etc.) to template Object Extraction characteristic point information, record preserves these characteristic point informations, obtains the characteristic point of feature object Information.
For example, after the 4th operational order of triggering, a characteristic body can be selected by starting AR scannings and bluetooth connection, here, user Body, carries out AR scannings to this feature object by mobile terminal, obtains characteristic point information as secondary unlocking information.Also, pass through Bluetooth sets interface, in the bluetooth equipment searched, selects one or more bluetooth equipments as second network equipment, will sweep The secondary unlocking information retouched is sent to second network equipment.So, during carrying out secondary unlocking after, only get The secondary unlocking information stored in second network equipment, can just make being verified for the second unlocking pin.
Alternatively, for ease of the realization of secondary unlocking, second network equipment is the equipment that often contacts of user, such as family other The mobile terminal of member.
In addition, in order to more effectively get the secondary unlocking information for checking, connecting in above-mentioned startup scanning and network After the step of connecing, in addition to:
Obtain the equipment identification information for second network equipment being connected with the mobile terminal;
The equipment identification information of second network equipment is stored as characterization device identification information.
Here, while secondary unlocking information is stored in second network equipment, it can also obtain second network and set Standby equipment identification information, is stored the equipment identification information of second network equipment as characterization device identification information, such as File A ' info are named as to preserve in the terminal.So, afterwards, you can by file A ' info, characterization device is recognized and believed The equipment identification information ceased with first network equipment is compared, to judge whether the first network equipment is to save secondary solution The security of second network equipment of lock information, further lifting privacy of user.
In summary, the unlocking screen method of the embodiment of the present invention, mobile terminal is to the first unlocking pin authentication failed Afterwards, user can be pointed out to carry out secondary unlocking first;Then, the network connection with first network equipment is set up, first net is obtained The secondary unlocking information that network equipment is sent;Afterwards, by the secondary unlocking information, the second unlocking pin of user is verified, And after being verified, complete the unblock to screen.So, the first solution is being caused due to reasons such as user's forgetting or operational errors After lock cipher authentication failed, the chance that user is unlocked to screen again can be also provided, based on network connection by first network Secondary unlocking information in equipment carries out the checking of the second unlocking pin, realize multiple unblock, it is to avoid user first unlocks Password authentification failure after will brush machine reset caused by user data loss the problem of, improve Consumer's Experience.
Fig. 4 is the block diagram of the mobile terminal of one embodiment of the invention.Mobile terminal 400 shown in Fig. 4 includes prompting mould Block 401, first processing module 402 and Second processing module 403.
Reminding module 401, for after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, pointing out to use Family carries out secondary unlocking;
First processing module 402, for setting up the network connection with first network equipment, obtains the first network equipment The secondary unlocking information of transmission;
Second processing module 403, for according to the secondary unlocking information, being carried out to the second unlocking pin of the user Checking, and after being verified, complete the unblock to screen.
On the basis of Fig. 4, alternatively, as shown in figure 5, the first processing module 402 includes:
First acquisition submodule 4021, for according to the network connection, obtaining the equipment mark of the first network equipment Know information, the equipment identification information is used for first network equipment described in unique mark;
Submodule 4022 is compared, for the characterization device that will be pre-stored in the equipment identification information and the mobile terminal Identification information is compared;
Extracting sub-module 4023, for after comparison passes through, extracting the secondary unlocking information in the first network equipment.
Alternatively, the mobile terminal 400 also includes:
Generation module 404, dialog box is reset for generating the first unlocking pin;
3rd processing module 405, for resetting dialog box is triggered the based on first unlocking pin according to user One operational order, carries out the replacement of the first unlocking pin;
Fourth processing module 406, for resetting dialog box is triggered the based on first unlocking pin according to user Two operational orders, are directly entered the user interface of the mobile terminal.
On the basis of Fig. 4, alternatively, as shown in fig. 6, the mobile terminal 400 also includes:
5th processing module 407, for setting the 3rd triggered operational order based on unlocking pin according to user, will be used The password setting that family is currently inputted is the first unlocking pin of unlocking screen;
6th processing module 408, for being set the 4th triggered operational order based on unlocking pin according to user, is started Scan and network connection, and the secondary unlocking information that scanning is obtained is stored in the second network being connected with the mobile terminal and set In standby, wherein the secondary unlocking information is characterized the characteristic point information of object.
Alternatively, the 6th processing module 408 also includes:
Second acquisition submodule 4081, the device identification for obtaining second network equipment being connected with the mobile terminal Information;
Sub-module stored 4082, believes for the equipment identification information of second network equipment to be recognized as characterization device Breath is stored.
Mobile terminal 400 can realize each process that mobile terminal is realized in Fig. 1 to Fig. 3 embodiment of the method, to keep away Exempt to repeat, repeat no more here.The mobile terminal can point out user to carry out two after to the first unlocking pin authentication failed, first Secondary unblock;Then, the network connection with first network equipment is set up, the secondary unlocking letter of first network equipment transmission is obtained Breath;Afterwards, by the secondary unlocking information, the second unlocking pin of user is verified, and after being verified, completed to screen The unblock of curtain.So, after the first unlocking pin authentication failed is caused due to reasons such as user's forgetting or operational errors, it can also carry The chance being unlocked again to screen for user, is carried out based on network connection by the secondary unlocking information in first network equipment The checking of second unlocking pin, realizes multiple unblock, it is to avoid after user the first unlocking pin authentication failed will brush machine reset The problem of caused user data loss, improve Consumer's Experience.
Another embodiment of the present invention additionally provides a kind of computer-readable recording medium, is stored thereon with computer journey Sequence, the program realizes following steps when being executed by processor:The the first unlocking pin checking unlocked in the mobile terminal screen After failure, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the first network equipment is obtained The secondary unlocking information of transmission;According to the secondary unlocking information, the second unlocking pin of the user is verified, and After being verified, the unblock to screen is completed.
Alternatively, following steps can also be realized when the program is executed by processor:According to the network connection, institute is obtained The equipment identification information of first network equipment is stated, the equipment identification information is used for first network equipment described in unique mark;Will The equipment identification information is compared with the characterization device identification information being pre-stored in the mobile terminal;Pass through in comparison Afterwards, the secondary unlocking information in the first network equipment is extracted.
Alternatively, following steps can also be realized when the program is executed by processor:Generate the replacement pair of the first unlocking pin Talk about frame;The first operational order that dialog box is triggered is reset based on first unlocking pin according to user, first is carried out and unlocks The replacement of password;Or, the second operational order triggered according to user based on first unlocking pin replacement dialog box, directly Into the user interface of the mobile terminal.
Alternatively, following steps can also be realized when the program is executed by processor:Set according to user based on unlocking pin The 3rd triggered operational order is put, the password setting that user is currently inputted is the first unlocking pin of unlocking screen;According to User sets the 4th triggered operational order based on unlocking pin, starts scanning and network connection, and will scan two obtained Secondary unlocking information is stored in second network equipment being connected with the mobile terminal, wherein the secondary unlocking information is characterized The characteristic point information of object.
Alternatively, following steps can also be realized when the program is executed by processor:Acquisition is connected with the mobile terminal Second network equipment equipment identification information;The equipment identification information of second network equipment is recognized as characterization device Information is stored.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Fig. 7 is the block diagram of the mobile terminal of another embodiment of the present invention.The mobile terminal includes:Memory, processor And it is stored in the computer program that can be run on the memory and on the processor, calculating described in the computing device The step of unlocking screen method as described above is realized during machine program.Specific mobile terminal 700 as shown in Figure 7 includes:At least One processor 701, memory 702, at least one network interface 704 and user interface 703.Each in mobile terminal 700 Component is coupled by bus system 705.It is understood that bus system 705 is used to realize that the connection between these components to be led to Letter.Bus system 705 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal bus in addition.But be For the sake of clear explanation, in the figure 7 various buses are all designated as bus system 705.
Wherein, user interface 703 can include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 702 of system and method described herein be intended to including but not limited to these and it is any its It is adapted to the memory of type.
In some embodiments, memory 702 stores following element, can perform module or data structure, or Their subset of person, or their superset:Operating system 7021 and application program 7022.
Wherein, operating system 7021, comprising various system programs, such as ccf layer, core library layer, driving layer, are used for Realize various basic businesses and handle hardware based task.Application program 7022, includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 7022.
In embodiments of the present invention, by calling program or the instruction of the storage of memory 702, specifically, can be application The program stored in program 7022 or instruction, processor 701 are used for:The first unlocking pin unlocked in the mobile terminal screen After authentication failed, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the first network is obtained The secondary unlocking information that equipment is sent;According to the secondary unlocking information, the second unlocking pin of the user is verified, And after being verified, complete the unblock to screen.
The method that the embodiments of the present invention are disclosed can apply in processor 701, or be realized by processor 701. Processor 701 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing Device 701 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor And software module combination performs completion.Software module can be located at random access memory, and flash memory, read-only storage may be programmed read-only In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at Memory 702, processor 701 reads the information in memory 702, the step of completing the above method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
Realize, can be realized by performing the module (such as process, function) of function described herein herein for software Described technology.Software code is storable in memory and by computing device.Memory can within a processor or Realized outside processor.
Alternatively, processor 701 is additionally operable to:According to the network connection, the equipment mark of the first network equipment is obtained Know information, the equipment identification information is used for first network equipment described in unique mark;By the equipment identification information with it is described The characterization device identification information being pre-stored in mobile terminal is compared;After comparison passes through, the first network equipment is extracted In secondary unlocking information.
Alternatively, processor 701 is additionally operable to:Generate the first unlocking pin and reset dialog box;Described the is based on according to user One unlocking pin resets the first operational order that dialog box is triggered, and carries out the replacement of the first unlocking pin;Or, according to user's base The second operational order that dialog box is triggered is reset in first unlocking pin, user circle of the mobile terminal is directly entered Face.
Alternatively, as another embodiment, processor 701 is additionally operable to:Unlocking pin setting is based on according to user to touch 3rd operational order of hair, the password setting that user is currently inputted is the first unlocking pin of unlocking screen;According to user's base The 4th triggered operational order is set in unlocking pin, starts scanning and network connection, and obtained secondary unlocking will be scanned Information is stored in second network equipment being connected with the mobile terminal, wherein the secondary unlocking information is characterized object Characteristic point information.
Alternatively, processor 701 is additionally operable to:Obtain the device identification for second network equipment being connected with the mobile terminal Information;The equipment identification information of second network equipment is stored as characterization device identification information.
Mobile terminal 700 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here Repeat no more.The mobile terminal can point out user to carry out secondary unlocking after to the first unlocking pin authentication failed, first;So Afterwards, the network connection with first network equipment is set up, the secondary unlocking information of first network equipment transmission is obtained;Afterwards, by The secondary unlocking information, is verified to the second unlocking pin of user, and after being verified, completes the unblock to screen. So, after the first unlocking pin authentication failed is caused due to reasons such as user's forgetting or operational errors, user can also be provided again The secondary chance being unlocked to screen, carries out second by the secondary unlocking information in first network equipment based on network connection and unlocks The checking of password, realizes multiple unblock, it is to avoid after user the first unlocking pin authentication failed will brush machine reset caused by The problem of user data loss, improve Consumer's Experience.
Fig. 8 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 8 800 can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 800 in Fig. 8 includes radio frequency (Radio Frequency, RF) circuit 810, memory 820, input Unit 830, display unit 840, processor 860, voicefrequency circuit 870, WiFi (Wireless Fidelity) modules 880 and electricity Source 890.
Wherein, input block 830 can be used for the numeral or character information for receiving user's input, and produce and mobile terminal The signal input that 800 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 830 can With including contact panel 831.Contact panel 831, also referred to as touch-screen, collect touch operation of the user on or near it (such as user uses the operations of any suitable object or annex on contact panel 831 such as finger, stylus), and according to advance The formula of setting drives corresponding attachment means.Optionally, contact panel 831 may include touch detecting apparatus and touch controller Two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, by signal Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, Give the processor 860 again, and the order sent of reception processing device 860 and can be performed.Furthermore, it is possible to using resistance-type, The polytypes such as condenser type, infrared ray and surface acoustic wave realize contact panel 831.Except contact panel 831, input block 830 can also include other input equipments 832, and other input equipments 832 can include but is not limited to physical keyboard, function key One or more in (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 840 can be used for information and the movement for showing the information inputted by user or being supplied to user The various menu interfaces of terminal 800.Display unit 840 may include display panel 841, optionally, can use LCD or organic hairs The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 841.
It should be noted that contact panel 831 can cover display panel 841, touch display screen is formed, when touch display screen inspection Measure after the touch operation on or near it, processor 860 is sent to determine the type of touch event, with preprocessor 860 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area And arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example, Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 860 is the control centre of mobile terminal 800, utilizes various interfaces and connection whole mobile phone Various pieces, software program and/or module in first memory 821 are stored in by operation or execution, and call storage Data in second memory 822, perform the various functions and processing data of mobile terminal 800, so as to mobile terminal 800 Carry out integral monitoring.Optionally, processor 860 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 821 in software program and/or module and/ Or the data in the second memory 822, processor 860 in the first unlocking pin of mobile terminal screen unblock for testing After card failure, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the first network is obtained and sets The secondary unlocking information that preparation is sent;According to the secondary unlocking information, the second unlocking pin of the user is verified, and After being verified, the unblock to screen is completed.
Alternatively, processor 860 is additionally operable to obtain the device identification of the first network equipment according to the network connection Information, the equipment identification information is used for first network equipment described in unique mark;The equipment identification information is moved with described The characterization device identification information being pre-stored in dynamic terminal is compared;After comparison passes through, extract in the first network equipment Secondary unlocking information.
Alternatively, processor 860 is additionally operable to the first unlocking pin of generation and resets dialog box;Described first is based on according to user Unlocking pin resets the first operational order that dialog box is triggered, and carries out the replacement of the first unlocking pin;Or, be based on according to user First unlocking pin resets the second operational order that dialog box is triggered, and is directly entered user circle of the mobile terminal Face.
Alternatively, processor 860 is additionally operable to set the 3rd triggered operational order based on unlocking pin according to user, will The password setting that user currently inputs is the first unlocking pin of unlocking screen;Unlocking pin setting is based on according to user to be triggered The 4th operational order, start scanning and network connection, and be stored in obtained secondary unlocking information is scanned and the movement In second network equipment of terminal connection, wherein the secondary unlocking information is characterized the characteristic point information of object.
Alternatively, processor 860 is additionally operable to obtain the device identification for second network equipment being connected with the mobile terminal Information;The equipment identification information of second network equipment is stored as characterization device identification information.
It can be seen that, the mobile terminal can point out user to carry out secondary unlocking after to the first unlocking pin authentication failed, first; Then, the network connection with first network equipment is set up, the secondary unlocking information of first network equipment transmission is obtained;Afterwards, By the secondary unlocking information, the second unlocking pin of user is verified, and after being verified, completes the solution to screen Lock.So, after the first unlocking pin authentication failed is caused due to reasons such as user's forgetting or operational errors, user can also be provided The chance being unlocked again to screen, carries out second by the secondary unlocking information in first network equipment based on network connection and solves The checking of lock cipher, realizes multiple unblock, it is to avoid will be caused by brush machine resets after user the first unlocking pin authentication failed User data loss the problem of, improve Consumer's Experience.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, others can be passed through Mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, is only A kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual Between coupling or direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some interfaces Connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can be with It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described. And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Explanation is needed further exist for, this mobile terminal described in this description includes but is not limited to smart mobile phone, put down Plate computer etc..
This many functional part described in this description is all referred to as module, specifically to emphasize its realization side The independence of formula.
In the embodiment of the present invention, module can be realized with software, so as to by various types of computing devices.Citing comes Say, the executable code module of a mark can include the one or more physics or logical block of computer instruction, illustrate For, it can be built as object, process or function.Nevertheless, the executable code of institute's mark module is without physically It is located together, but can includes being stored in different instructions in different positions, is combined together when in these command logics When, its regulation purpose for constituting module and realizing the module.
In fact, executable code module can be the either many bar instructions of individual instructions, and it can even be distributed On multiple different code segments, it is distributed among distinct program, and is distributed across multiple memory devices.Similarly, grasp Making data can be identified in module, and can be realized according to any appropriate form and be organized in any appropriate class In the data structure of type.The peration data can be collected as individual data collection, or can be distributed on diverse location (being included in different storage device), and only can be present at least in part as electronic signal in system or network.
When module can be realized using software, it is contemplated that the level of existing hardware technique, it is possible to implemented in software Module, in the case where not considering cost, those skilled in the art can build corresponding hardware circuit realize correspondence Function, the hardware circuit includes conventional ultra-large integrated (VLSI) circuit or gate array and such as logic core The existing semiconductor of piece, transistor etc either other discrete elements.Module can also use programmable hardware device, such as Field programmable gate array, programmable logic array, programmable logic device etc. are realized.
Above-mentioned exemplary embodiment is described with reference to those accompanying drawings, many different forms and embodiment be it is feasible and Without departing from spirit of the invention and teaching, therefore, the present invention should not be construed to turn into proposes the limitation of exemplary embodiment at this. More precisely, these exemplary embodiments are provided so that the present invention can be improved and complete, and can be by the scope of the invention Convey to those those of skill in the art.In those schemas, size of components and relative size are perhaps based on for the sake of clear And be exaggerated.Term used herein is based only on description particular example embodiment purpose, is not intended to turn into limitation use.Such as Use ground at this, unless the interior text clearly refers else, otherwise singulative " one ", " one " and the "the" be intended to by Those multiple forms are also included.Those term "comprising"s and/or " comprising " will become further apparent when being used in this specification, Represent the presence of the feature, integer, step, operation, component and/or component, but be not excluded for one or more further features, it is whole Number, step, operation, component, component and/or the presence of its group or increase.Unless otherwise indicated, narrative tense, a value scope bag Bound containing the scope and any subrange therebetween.
Described above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, on the premise of principle of the present invention is not departed from, some improvements and modifications can also be made, these improvements and modifications It should be regarded as protection scope of the present invention.

Claims (11)

1. a kind of unlocking screen method, applied to mobile terminal, it is characterised in that including:
After the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out secondary unlocking;
The network connection with first network equipment is set up, the secondary unlocking information that the first network equipment is sent is obtained;
According to the secondary unlocking information, the second unlocking pin of the user is verified, and after being verified, completed Unblock to screen.
2. unlocking screen method according to claim 1, it is characterised in that the foundation and the network of first network equipment Connection, the step of obtaining the secondary unlocking information that the first network equipment is sent, including:
According to the network connection, the equipment identification information of the first network equipment is obtained, the equipment identification information is used for First network equipment described in unique mark;
The equipment identification information is compared with characterization device identification information pre-stored in the mobile terminal;
After comparison passes through, the secondary unlocking information in the first network equipment is extracted.
3. unlocking screen method according to claim 1 or 2, it is characterised in that the step of the unblock to screen is completed Afterwards, in addition to:
Generate the first unlocking pin and reset dialog box;
The first operational order that dialog box is triggered is reset based on first unlocking pin according to user, the first unblock is carried out close The replacement of code;Or, the second operational order triggered according to user based on first unlocking pin replacement dialog box, directly enter Enter the user interface of the mobile terminal.
4. unlocking screen method according to claim 1, it is characterised in that in unlocked to the mobile terminal screen Before the step of one unlocking pin is verified, in addition to:
The 3rd triggered operational order is set according to user based on unlocking pin, and the password setting that user is currently inputted is screen First unlocking pin of curtain unblock;
The 4th triggered operational order is set according to user based on unlocking pin, starts scanning and network connection, and will scanning Obtained secondary unlocking information is stored in second network equipment being connected with the mobile terminal, wherein the secondary unlocking is believed Breath is characterized the characteristic point information of object.
5. unlocking screen method according to claim 4, it is characterised in that the step of scanning and network connection is started it Afterwards, in addition to:
Obtain the equipment identification information for second network equipment being connected with the mobile terminal;
The equipment identification information of second network equipment is stored as characterization device identification information.
6. a kind of mobile terminal, it is characterised in that including:
Reminding module, for after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, pointing out user to carry out Secondary unlocking;
First processing module, for setting up the network connection with first network equipment, obtains what the first network equipment was sent Secondary unlocking information;
Second processing module, for according to the secondary unlocking information, being verified to the second unlocking pin of the user, and After being verified, the unblock to screen is completed.
7. mobile terminal according to claim 6, it is characterised in that the first processing module includes:
First acquisition submodule, for according to the network connection, obtaining the equipment identification information of the first network equipment, institute Stating equipment identification information is used for first network equipment described in unique mark;
Submodule is compared, for the characterization device identification information that will be pre-stored in the equipment identification information and the mobile terminal It is compared;
Extracting sub-module, for after comparison passes through, extracting the secondary unlocking information in the first network equipment.
8. the mobile terminal according to claim 6 or 7, it is characterised in that also include:
Generation module, dialog box is reset for generating the first unlocking pin;
3rd processing module, for being referred to according to user based on the first operation that first unlocking pin replacement dialog box is triggered Order, carries out the replacement of the first unlocking pin;
Fourth processing module, for being referred to according to user based on the second operation that first unlocking pin replacement dialog box is triggered Order, is directly entered the user interface of the mobile terminal.
9. mobile terminal according to claim 6, it is characterised in that also include:
5th processing module, it is for setting the 3rd triggered operational order based on unlocking pin according to user, user is current The password setting of input is the first unlocking pin of unlocking screen;
6th processing module, for setting triggered the 4th operational order based on unlocking pin according to user, start scanning and Network connection, and be stored in obtained secondary unlocking information is scanned in second network equipment being connected with the mobile terminal, Wherein described secondary unlocking information is characterized the characteristic point information of object.
10. mobile terminal according to claim 9, it is characterised in that the 6th processing module also includes:
Second acquisition submodule, the equipment identification information for obtaining second network equipment being connected with the mobile terminal;
Sub-module stored, for the equipment identification information of second network equipment to be deposited as characterization device identification information Storage.
11. a kind of mobile terminal, it is characterised in that including:Memory, processor and it is stored on the memory and can be in institute The computer program run on processor is stated, is realized described in the computing device during computer program as in claim 1 to 5 The step of unlocking screen method described in any one.
CN201710356083.1A 2017-05-19 2017-05-19 A kind of unlocking screen method and mobile terminal Pending CN107169326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710356083.1A CN107169326A (en) 2017-05-19 2017-05-19 A kind of unlocking screen method and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710356083.1A CN107169326A (en) 2017-05-19 2017-05-19 A kind of unlocking screen method and mobile terminal

Publications (1)

Publication Number Publication Date
CN107169326A true CN107169326A (en) 2017-09-15

Family

ID=59815716

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710356083.1A Pending CN107169326A (en) 2017-05-19 2017-05-19 A kind of unlocking screen method and mobile terminal

Country Status (1)

Country Link
CN (1) CN107169326A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609387A (en) * 2017-09-30 2018-01-19 广东欧珀移动通信有限公司 The method and apparatus of terminal unlocking, terminal device, computer-readable recording medium
CN108401068A (en) * 2018-02-08 2018-08-14 西安易朴通讯技术有限公司 Data line, data processing method and electronic equipment
CN108540875A (en) * 2018-03-06 2018-09-14 上海康斐信息技术有限公司 A kind of method and system of router control mobile terminal screen
CN112241557A (en) * 2019-07-16 2021-01-19 技嘉科技股份有限公司 Display and automatic locking and unlocking method thereof
CN112422744A (en) * 2020-09-28 2021-02-26 深圳市修远文化创意有限公司 Method for unlocking mobile phone, mobile phone and computer
CN113254901A (en) * 2021-06-11 2021-08-13 长扬科技(北京)有限公司 Data security access method and device
CN113688373A (en) * 2020-05-19 2021-11-23 中移(成都)信息通信科技有限公司 Slide unlocking method, apparatus, device, and medium
CN114244874A (en) * 2020-09-09 2022-03-25 华为技术有限公司 Unlocking control method and system, computer storage medium and electronic equipment
CN115083046A (en) * 2022-06-28 2022-09-20 维沃移动通信有限公司 Decryption method, decryption information creation method, and decryption apparatus

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752359A (en) * 2012-02-17 2012-10-24 浙江吉利汽车研究院有限公司 Long-distance service assisted type method and system for automobile fingerprint identification authentication
CN103077027A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Method and system for assisting unlocking
CN104539806A (en) * 2015-01-12 2015-04-22 深圳市中兴移动通信有限公司 Mobile terminals and emergency unlocking method thereof
CN106610822A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Auxiliary unlocking method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102752359A (en) * 2012-02-17 2012-10-24 浙江吉利汽车研究院有限公司 Long-distance service assisted type method and system for automobile fingerprint identification authentication
CN103077027A (en) * 2012-12-28 2013-05-01 东莞宇龙通信科技有限公司 Method and system for assisting unlocking
CN104539806A (en) * 2015-01-12 2015-04-22 深圳市中兴移动通信有限公司 Mobile terminals and emergency unlocking method thereof
CN106610822A (en) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 Auxiliary unlocking method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107609387A (en) * 2017-09-30 2018-01-19 广东欧珀移动通信有限公司 The method and apparatus of terminal unlocking, terminal device, computer-readable recording medium
CN108401068A (en) * 2018-02-08 2018-08-14 西安易朴通讯技术有限公司 Data line, data processing method and electronic equipment
CN108540875A (en) * 2018-03-06 2018-09-14 上海康斐信息技术有限公司 A kind of method and system of router control mobile terminal screen
CN112241557A (en) * 2019-07-16 2021-01-19 技嘉科技股份有限公司 Display and automatic locking and unlocking method thereof
CN113688373A (en) * 2020-05-19 2021-11-23 中移(成都)信息通信科技有限公司 Slide unlocking method, apparatus, device, and medium
CN114244874A (en) * 2020-09-09 2022-03-25 华为技术有限公司 Unlocking control method and system, computer storage medium and electronic equipment
CN112422744A (en) * 2020-09-28 2021-02-26 深圳市修远文化创意有限公司 Method for unlocking mobile phone, mobile phone and computer
CN113254901A (en) * 2021-06-11 2021-08-13 长扬科技(北京)有限公司 Data security access method and device
CN113254901B (en) * 2021-06-11 2021-10-01 长扬科技(北京)有限公司 Data security access method and device
CN115083046A (en) * 2022-06-28 2022-09-20 维沃移动通信有限公司 Decryption method, decryption information creation method, and decryption apparatus

Similar Documents

Publication Publication Date Title
CN107169326A (en) A kind of unlocking screen method and mobile terminal
CN106778183A (en) A kind of Terminal fingerprints know method for distinguishing and mobile terminal
CN105469508A (en) Storage cabinet, mobile terminal and storage cabinet control method and system
CN102542189B (en) A kind of method of certification, device and electronic equipment
CN106203038B (en) A kind of unlocking method and mobile terminal
CN103049182B (en) The unlocking method and device of screen display interface
CN107678884A (en) A kind of data transmission method, mobile terminal and computer-readable recording medium
CN107194235A (en) A kind of application program launching method and mobile terminal
CN107145291A (en) Information processor and information processing method
CN107679426A (en) A kind of screen content display method thereof and mobile terminal
CN106446661A (en) Mobile terminal application program starting method and mobile terminal
CN107506111A (en) The encryption and decryption method and terminal of a kind of terminal applies
CN106779722B (en) A kind of method of payment and mobile terminal of mobile terminal
CN106778389A (en) The loss detection method and mobile terminal of a kind of mobile terminal
CN109150509A (en) A kind of equipment method for unlocking, device, terminal device and medium
CN106714162A (en) Hotspot sharing method and mobile terminals
CN106991311A (en) A kind of information processing method and mobile terminal
CN106211070B (en) A kind of anti-theft protection method and mobile terminal of mobile terminal
CN103034442B (en) Electronic equipment and the unblock of screen thereof, unlocking information device and method is set
CN107492164A (en) Smart lock control method, apparatus, terminal device and readable storage medium storing program for executing
CN105303096A (en) Symbol selection for swipe based authentication
CN107452102A (en) A kind of intelligent fingerprint door lock and its fingerprint input method
CN106803031A (en) A kind of information protecting method and mobile terminal
CN106407945B (en) A kind of fingerprint identification method and mobile terminal
CN103034441B (en) Unlocking method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170915

RJ01 Rejection of invention patent application after publication