CN107169326A - A kind of unlocking screen method and mobile terminal - Google Patents
A kind of unlocking screen method and mobile terminal Download PDFInfo
- Publication number
- CN107169326A CN107169326A CN201710356083.1A CN201710356083A CN107169326A CN 107169326 A CN107169326 A CN 107169326A CN 201710356083 A CN201710356083 A CN 201710356083A CN 107169326 A CN107169326 A CN 107169326A
- Authority
- CN
- China
- Prior art keywords
- unlocking
- mobile terminal
- user
- network equipment
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/305—Authentication, i.e. establishing the identity or authorisation of security principals by remotely controlling device operation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
Abstract
The present invention provides a kind of unlocking screen method and mobile terminal, is related to communication technical field.The unlocking screen method is applied to mobile terminal, including:After the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the secondary unlocking information that the first network equipment is sent is obtained;According to the secondary unlocking information, the second unlocking pin of the user is verified, and after being verified, completes the unblock to screen.The solution of the present invention, which is solved, forgets the problem of brush machine resets caused user data loss after password.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of unlocking screen method and mobile terminal.
Background technology
With developing rapidly for the communication technology, the function of mobile terminal is more and more diversified, and the life given people is brought
Great convenience, carries with mobile terminal into one kind custom.
And in order to protect privacy of user, manufacturer's password locking function of screen that has been mobile terminal design, in user's locking
Screen or mobile terminal are detected in preset time period without operating after automatic lock-screen, it is necessary to user is unlocked to screen,
The dragging, slip, clicking operation of predetermined form are carried out such as on screen, or by button or Macintosh, or pass through input
Specific character etc..Wherein, in these unlocking manners, the password of unblock (numeral, pattern, sound or other various make
Symbol for password etc.) it is that, by user's sets itself, and can be modified according to demand.But, it often may be useful for family not
Carefully the situation of unlocking screen password is forgotten, so as to lead to not enter mobile terminal system.
And for the situation that user forgets Password, existing settling mode need to be reset close by brush machine more new system
Code.But, such settling mode, it will the data dump that will be stored before user causes the loss of significant data.
The content of the invention
The embodiment of the present invention provides a kind of unlocking screen method and mobile terminal, and institute is reset to solve to forget brush machine after password
The problem of user data loss caused.
First aspect is applied to mobile terminal there is provided a kind of unlocking screen method, methods described, and methods described includes:
After the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out secondary unlocking;
The network connection with first network equipment is set up, the secondary unlocking information that the first network equipment is sent is obtained;
According to the secondary unlocking information, the second unlocking pin of the user is verified, and after being verified,
Complete the unblock to screen.
Second aspect there is provided a kind of mobile terminal, including:
Reminding module, for after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, pointing out user
Carry out secondary unlocking;
First processing module, for setting up the network connection with first network equipment, obtains the first network equipment hair
The secondary unlocking information sent;
Second processing module, for according to the secondary unlocking information, testing the second unlocking pin of the user
Card, and after being verified, complete the unblock to screen.
The third aspect there is provided a kind of mobile terminal, including:Memory, processor and it is stored on the memory simultaneously
The computer program that can be run on the processor, is realized as described above described in the computing device during computer program
The step of unlocking screen method.
The above-mentioned technical proposal of the present invention has the beneficial effect that:
The unlocking screen method of the embodiment of the present invention, mobile terminal first can after to the first unlocking pin authentication failed
User is pointed out to carry out secondary unlocking;Then, the network connection with first network equipment is set up, first network equipment transmission is obtained
Secondary unlocking information;Afterwards, by the secondary unlocking information, the second unlocking pin of user is verified, and it is logical in checking
Later, the unblock to screen is completed.So, the first unlocking pin is being caused to verify due to reasons such as user's forgetting or operational errors
After failure, the chance that user is unlocked to screen again can be also provided, based on network connection by two in first network equipment
Secondary unlocking information carries out the checking of the second unlocking pin, realizes multiple unblock, it is to avoid the unlocking pin of user first checking is lost
After losing will brush machine reset caused by user data loss the problem of, improve Consumer's Experience.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed for description of the embodiment of the present invention
The accompanying drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention,
For those of ordinary skill in the art, without having to pay creative labor, it can also be obtained according to these accompanying drawings
Obtain other accompanying drawings.
Fig. 1 is the step flow chart one of the unlocking screen method of the embodiment of the present invention;
Fig. 2 for the embodiment of the present invention unlocking screen method in obtain secondary unlocking information specific steps flow chart;
Fig. 3 is the step flowchart 2 of the unlocking screen method of the embodiment of the present invention;
Fig. 4 is the structural representation one of the mobile terminal of the embodiment of the present invention;
Fig. 5 is the structural representation two of the mobile terminal of the embodiment of the present invention;
Fig. 6 is the structural representation three of the mobile terminal of the embodiment of the present invention;
Fig. 7 is the structural representation of the mobile terminal of another embodiment of the present invention;
Fig. 8 is the structural representation of the mobile terminal of further embodiment of this invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than whole embodiments.Based on this hair
Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
As shown in figure 1, the unlocking screen method of the embodiment of the present invention, applied to mobile terminal, including:
Step 101, after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out two
Secondary unblock.
First unlocking pin is the preferred password of unlocking screen, can be directly complete after the first unlocking pin is proved to be successful
The unblock of paired screen, into the user interface of mobile terminal.However, because user forgets the reason such as password or operational error,
Easily occur in the situation of the first unlocking pin authentication failed of unlocking screen, this step, after the first unlocking pin authentication failed,
User will be pointed out to carry out secondary unlocking, and then provide the user the chance unlocked again.
It is preferred that, in the checking of the first unlocking pin, for the authentication failed for avoiding operational error from occurring, based on this first
Unlocking pin, is provided with the verification machine meeting of pre-determined number, such as pre-determined number is 3, in user's first time entr screen unlocking pin
After authentication failed, mobile terminal generation prompt message informs that user's checking fails, and need to re-enter password, and is verified when 3 times
Failure, just can determine whether the first unlocking pin authentication failed, point out user to carry out secondary unlocking.
Step 102, the network connection with first network equipment is set up, the secondary solution that the first network equipment is sent is obtained
Lock information.
In this step, step 101 prompting user carry out secondary unlocking after, mobile terminal can the operation based on user,
Start network connecting function under screen lock state, set up the network connection with first network equipment, and set the first network is obtained
The secondary unlocking information that preparation is sent, to carry out the checking of second of unblock.Wherein, the first network equipment is to set up network connection
During, the network equipment that user independently selects.
Step 103, according to the secondary unlocking information, the second unlocking pin of the user is verified, and is testing
After card passes through, the unblock to screen is completed.
In this step, the secondary unlocking information that the first network equipment got according to step 102 is sent, to the of user
Two unlocking pins are verified, and after being verified, complete the unblock to screen.Wherein, second unlocking pin is preferably
It is stored in the mobile terminal, can be directly verified after secondary unlocking information is got.Certainly, if in the mobile terminal
Under screen lock state, mobile terminal is set to start related input function, it is defeated that second unlocking pin may also be the user received
Enter.
The unlocking screen method of the embodiment of the present invention, by above-mentioned steps 101- steps 103, mobile terminal is solved to first
After lock cipher authentication failed, user can be pointed out to carry out secondary unlocking first;Then, the network set up with first network equipment connects
Connect, obtain the secondary unlocking information of first network equipment transmission;Afterwards, by the secondary unlocking information, to the second solution of user
Lock cipher is verified, and after being verified, completes the unblock to screen.So, forget or operational error due to user
Caused etc. reason after the first unlocking pin authentication failed, the chance that user is unlocked to screen again can be also provided, based on net
Network connection is carried out the checking of the second unlocking pin by the secondary unlocking information in first network equipment, is realized multiple unblock, is kept away
Exempted from after user's the first unlocking pin authentication failed will brush machine reset caused by user data loss the problem of, improve user
Experience.
And if according to the secondary unlocking information, the result verified to the second unlocking pin of user indicates that checking is not led to
Cross, then to reacquire secondary unlocking information, be verified again.
Wherein, it is contemplated that operation it is convenient and technical realisation, it is preferred that the network connection be bluetooth connection.
So, in step 102, during setting up the network connection with first network equipment, mobile terminal can also pass through
User interface prompt user selects first network equipment using Bluetooth function, completes the bluetooth connection with first network equipment.
Realized in addition, network connection can also be near-field communication NFC connections or focus connection etc..When focus is connected, network
It can be the mobile terminal to share end, can also first network equipment, network connection set up after, WLAN WIFI can be passed through
Carry out data transmission.
It should be appreciated that in embodiments of the present invention, the secondary unlocking information matched with the second unlocking pin is to deposit
Storage is in premise equipment, although, in a step 102, no matter the network connection of which kind of above-mentioned mode, the mobile terminal can all be built
The vertical network connection with first network equipment, however, in first network equipment here may and in the absence of close with the second unblock
The secondary unlocking information that code is matched, if obtaining secondary unlocking information, carries out subsequent authentication, can postpone releasing process, cause money
The waste in source.Therefore, as shown in Fig. 2 step 102 includes:
Step 1021, according to the network connection, the equipment identification information of the first network equipment, the equipment are obtained
Identification information is used for first network equipment described in unique mark.
In this step, after the network connection established, it will obtain the equipment mark for the unique mark first network equipment
Know information, the comparison for after.
Step 1022, the equipment identification information is entered with characterization device identification information pre-stored in the mobile terminal
Row is compared.
In this step, the equipment identification information that step 1021 is obtained is known with the characterization device being pre-stored in the mobile terminal
Other information is compared, to judge whether being that the be stored with network side of the secondary unlocking information matched with the second unlocking pin is set
It is standby.
Step 1023, after comparison passes through, the secondary unlocking information in the first network equipment is extracted.
In this step, in the comparison through step 1022, and after comparing and passing through, the secondary solution in the first network equipment is extracted
Lock information, to carry out the checking with the second unlocking pin.
Characterization device identification information is stored in the mobile terminal, for recording the secondary solution matched with the second unlocking pin
The equipment identification information for the network equipment that lock information is stored in.Therefore, according to above-mentioned steps, in secondary unlocking, through the first net
The acquisition of the equipment identification information of network equipment, the equipment identification information got is compared with characterization device identification information,
After comparison passes through, then extract the secondary unlocking information in the first network equipment.So, unnecessary processing is not only reduced
Flow, improves treatment effeciency, and has carried out the checking of identity to the first network equipment for storing secondary unlocking information, enters
One step improves the degree of protection to privacy of user.
For example, user is matched the mobile terminal after successful matching with device A by bluetooth connection, the mobile terminal is first
Equipment identification information (such as International Mobile Equipment Identity code IMEI or the physical address for the unique mark device A can first be obtained
MAC etc.), afterwards, it is compared by the characterization device identification information with being pre-stored in the mobile terminal, to determine whether this
Whether device A is the equipment for storing characterization device identification information, after comparison passes through, and completes the authentication to the device A, from
And effective secondary unlocking information can be extracted.If the equipment identification information of device A is compared with this feature device identifying information
Do not pass through, then no longer receive the secondary unlocking information of device A transmission.
Further, after secondary unlocking information is got, such as step 103, you can according to the secondary unlocking information to
Second unlocking pin at family is verified, and after being verified, completes the unblock to screen.Here, it is contemplated that user first
The authentication failed of unlocking pin, for ease of the success of unlocking screen next time, as shown in figure 3, completing the unblock to screen
After step, in addition to:
Step 104, the first unlocking pin of generation resets dialog box.
In this step, after the success of this unlocking screen, the first unlocking pin replacement dialog box can be generated and entered there is provided user
Row chooses whether to carry out the replacement of the first unlocking pin.
Step 105, the first operational order that dialog box is triggered is reset based on first unlocking pin according to user, entered
The replacement of the unlocking pin of row first;Or, the second behaviour triggered according to user based on first unlocking pin replacement dialog box
Instruct, be directly entered the user interface of the mobile terminal.
Here, the first operational order for being triggered of dialog box is reset based on first unlocking pin according to user, carries out the
The replacement of one unlocking pin;Or, referred to according to user based on the second operation that first unlocking pin replacement dialog box is triggered
Order, is directly entered the user interface of the mobile terminal, abandons the replacement of the first unlocking pin.So as in this unlocking screen, root
Corresponding subsequent treatment is carried out according to the demand of user, Consumer's Experience is lifted.
For example, the second unlocking pin is being verified, after completing to the unblock of screen, mobile terminal generates and ejects first
Unlocking pin reset dialog box, first unlocking pin reset dialog box in point out " whether carrying out the replacement of screen password ", with
The first operational order is triggered after family selection "Yes", the replacement of the first unlocking pin is carried out, the password newly inputted is regard as the first solution
Lock cipher is preserved;And when triggering the second operational order after user's selection "No", it is directly entered user circle of the mobile terminal
Face, without the replacement of password.
In the above, it is known that, in order to complete the checking of the first unlocking pin and the second unlocking pin, the movement is whole
End should be appreciated that the first unlocking pin and the second unlocking pin, and current password could be verified, therefore, be moved to described
Before the step of first unlocking pin of dynamic terminal screen unblock is verified, in addition to:
The 3rd triggered operational order, the password setting that user is currently inputted are set according to user based on unlocking pin
For the first unlocking pin of unlocking screen;
The 4th triggered operational order is set according to user based on unlocking pin, starts scanning and network connection, and will
Scan obtained secondary unlocking information to be stored in second network equipment being connected with the mobile terminal, wherein the secondary solution
Lock information is characterized the characteristic point information of object.
Here, when setting the first unlocking pin, mobile terminal is by detecting that user is set in the unlocking pin of mobile terminal
First unlocking pin of middle progress sets operation, triggers the 3rd operational order, is unlocking screen by the password setting currently inputted
The first unlocking pin.First unlocking pin can be pattern or numeral etc..
In this embodiment, to avoid the forgetting of password, it is preferred that the second unlocking pin is characterized the characteristic point letter of object
Breath.So, when setting the second unlocking pin, mobile terminal is operated by detecting that the second unlocking pin of user's progress is set,
Trigger the 4th operational order, start scanning and network connection, the characteristic point information of obtained feature object will be scanned as secondary
Unlocking information, is stored in second network equipment that network connection is established with the mobile terminal.Certainly, obtained feature is scanned
The characteristic point information of object can be also stored directly in the mobile terminal, with getting from first network equipment so as to after
Secondary unlocking information is verified;If not stored in the mobile terminal, need when carrying out secondary unlocking, by user
It is scanned using this feature object, its characteristic point information is obtained in real time as the second unlocking pin and from first network equipment
The secondary unlocking information got is verified.
Wherein, scanning can realize that AR is scanned by enhancing, to complete the scanning of feature object (such as ring, necklace), obtain
To the characteristic point information of feature object.AR scannings are a kind of by integrated new of real world information and virtual world information " seamless "
Technology, the mapping relations set up using computer vision methods between real world and screen, make want drafting figure or
It is that 3D models can be presented on screen as being attached on real world object.Specifically, algorithm (such as SURF can be passed through
(Speeded-Up Robust Features accelerate robust features algorithm), ORB (ORiented Brief algorithms), FERN (ferns
Algorithm) etc.) to template Object Extraction characteristic point information, record preserves these characteristic point informations, obtains the characteristic point of feature object
Information.
For example, after the 4th operational order of triggering, a characteristic body can be selected by starting AR scannings and bluetooth connection, here, user
Body, carries out AR scannings to this feature object by mobile terminal, obtains characteristic point information as secondary unlocking information.Also, pass through
Bluetooth sets interface, in the bluetooth equipment searched, selects one or more bluetooth equipments as second network equipment, will sweep
The secondary unlocking information retouched is sent to second network equipment.So, during carrying out secondary unlocking after, only get
The secondary unlocking information stored in second network equipment, can just make being verified for the second unlocking pin.
Alternatively, for ease of the realization of secondary unlocking, second network equipment is the equipment that often contacts of user, such as family other
The mobile terminal of member.
In addition, in order to more effectively get the secondary unlocking information for checking, connecting in above-mentioned startup scanning and network
After the step of connecing, in addition to:
Obtain the equipment identification information for second network equipment being connected with the mobile terminal;
The equipment identification information of second network equipment is stored as characterization device identification information.
Here, while secondary unlocking information is stored in second network equipment, it can also obtain second network and set
Standby equipment identification information, is stored the equipment identification information of second network equipment as characterization device identification information, such as
File A ' info are named as to preserve in the terminal.So, afterwards, you can by file A ' info, characterization device is recognized and believed
The equipment identification information ceased with first network equipment is compared, to judge whether the first network equipment is to save secondary solution
The security of second network equipment of lock information, further lifting privacy of user.
In summary, the unlocking screen method of the embodiment of the present invention, mobile terminal is to the first unlocking pin authentication failed
Afterwards, user can be pointed out to carry out secondary unlocking first;Then, the network connection with first network equipment is set up, first net is obtained
The secondary unlocking information that network equipment is sent;Afterwards, by the secondary unlocking information, the second unlocking pin of user is verified,
And after being verified, complete the unblock to screen.So, the first solution is being caused due to reasons such as user's forgetting or operational errors
After lock cipher authentication failed, the chance that user is unlocked to screen again can be also provided, based on network connection by first network
Secondary unlocking information in equipment carries out the checking of the second unlocking pin, realize multiple unblock, it is to avoid user first unlocks
Password authentification failure after will brush machine reset caused by user data loss the problem of, improve Consumer's Experience.
Fig. 4 is the block diagram of the mobile terminal of one embodiment of the invention.Mobile terminal 400 shown in Fig. 4 includes prompting mould
Block 401, first processing module 402 and Second processing module 403.
Reminding module 401, for after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, pointing out to use
Family carries out secondary unlocking;
First processing module 402, for setting up the network connection with first network equipment, obtains the first network equipment
The secondary unlocking information of transmission;
Second processing module 403, for according to the secondary unlocking information, being carried out to the second unlocking pin of the user
Checking, and after being verified, complete the unblock to screen.
On the basis of Fig. 4, alternatively, as shown in figure 5, the first processing module 402 includes:
First acquisition submodule 4021, for according to the network connection, obtaining the equipment mark of the first network equipment
Know information, the equipment identification information is used for first network equipment described in unique mark;
Submodule 4022 is compared, for the characterization device that will be pre-stored in the equipment identification information and the mobile terminal
Identification information is compared;
Extracting sub-module 4023, for after comparison passes through, extracting the secondary unlocking information in the first network equipment.
Alternatively, the mobile terminal 400 also includes:
Generation module 404, dialog box is reset for generating the first unlocking pin;
3rd processing module 405, for resetting dialog box is triggered the based on first unlocking pin according to user
One operational order, carries out the replacement of the first unlocking pin;
Fourth processing module 406, for resetting dialog box is triggered the based on first unlocking pin according to user
Two operational orders, are directly entered the user interface of the mobile terminal.
On the basis of Fig. 4, alternatively, as shown in fig. 6, the mobile terminal 400 also includes:
5th processing module 407, for setting the 3rd triggered operational order based on unlocking pin according to user, will be used
The password setting that family is currently inputted is the first unlocking pin of unlocking screen;
6th processing module 408, for being set the 4th triggered operational order based on unlocking pin according to user, is started
Scan and network connection, and the secondary unlocking information that scanning is obtained is stored in the second network being connected with the mobile terminal and set
In standby, wherein the secondary unlocking information is characterized the characteristic point information of object.
Alternatively, the 6th processing module 408 also includes:
Second acquisition submodule 4081, the device identification for obtaining second network equipment being connected with the mobile terminal
Information;
Sub-module stored 4082, believes for the equipment identification information of second network equipment to be recognized as characterization device
Breath is stored.
Mobile terminal 400 can realize each process that mobile terminal is realized in Fig. 1 to Fig. 3 embodiment of the method, to keep away
Exempt to repeat, repeat no more here.The mobile terminal can point out user to carry out two after to the first unlocking pin authentication failed, first
Secondary unblock;Then, the network connection with first network equipment is set up, the secondary unlocking letter of first network equipment transmission is obtained
Breath;Afterwards, by the secondary unlocking information, the second unlocking pin of user is verified, and after being verified, completed to screen
The unblock of curtain.So, after the first unlocking pin authentication failed is caused due to reasons such as user's forgetting or operational errors, it can also carry
The chance being unlocked again to screen for user, is carried out based on network connection by the secondary unlocking information in first network equipment
The checking of second unlocking pin, realizes multiple unblock, it is to avoid after user the first unlocking pin authentication failed will brush machine reset
The problem of caused user data loss, improve Consumer's Experience.
Another embodiment of the present invention additionally provides a kind of computer-readable recording medium, is stored thereon with computer journey
Sequence, the program realizes following steps when being executed by processor:The the first unlocking pin checking unlocked in the mobile terminal screen
After failure, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the first network equipment is obtained
The secondary unlocking information of transmission;According to the secondary unlocking information, the second unlocking pin of the user is verified, and
After being verified, the unblock to screen is completed.
Alternatively, following steps can also be realized when the program is executed by processor:According to the network connection, institute is obtained
The equipment identification information of first network equipment is stated, the equipment identification information is used for first network equipment described in unique mark;Will
The equipment identification information is compared with the characterization device identification information being pre-stored in the mobile terminal;Pass through in comparison
Afterwards, the secondary unlocking information in the first network equipment is extracted.
Alternatively, following steps can also be realized when the program is executed by processor:Generate the replacement pair of the first unlocking pin
Talk about frame;The first operational order that dialog box is triggered is reset based on first unlocking pin according to user, first is carried out and unlocks
The replacement of password;Or, the second operational order triggered according to user based on first unlocking pin replacement dialog box, directly
Into the user interface of the mobile terminal.
Alternatively, following steps can also be realized when the program is executed by processor:Set according to user based on unlocking pin
The 3rd triggered operational order is put, the password setting that user is currently inputted is the first unlocking pin of unlocking screen;According to
User sets the 4th triggered operational order based on unlocking pin, starts scanning and network connection, and will scan two obtained
Secondary unlocking information is stored in second network equipment being connected with the mobile terminal, wherein the secondary unlocking information is characterized
The characteristic point information of object.
Alternatively, following steps can also be realized when the program is executed by processor:Acquisition is connected with the mobile terminal
Second network equipment equipment identification information;The equipment identification information of second network equipment is recognized as characterization device
Information is stored.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus
Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein
Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Fig. 7 is the block diagram of the mobile terminal of another embodiment of the present invention.The mobile terminal includes:Memory, processor
And it is stored in the computer program that can be run on the memory and on the processor, calculating described in the computing device
The step of unlocking screen method as described above is realized during machine program.Specific mobile terminal 700 as shown in Figure 7 includes:At least
One processor 701, memory 702, at least one network interface 704 and user interface 703.Each in mobile terminal 700
Component is coupled by bus system 705.It is understood that bus system 705 is used to realize that the connection between these components to be led to
Letter.Bus system 705 is in addition to including data/address bus, in addition to power bus, controlling bus and status signal bus in addition.But be
For the sake of clear explanation, in the figure 7 various buses are all designated as bus system 705.
Wherein, user interface 703 can include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch-screen etc..
It is appreciated that the memory 702 in the embodiment of the present invention can be volatile memory or nonvolatile memory,
Or may include both volatibility and nonvolatile memory.Wherein, nonvolatile memory can be read-only storage (Read-
Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable
Device (Erasable PROM, EPROM), Electrically Erasable Read Only Memory (Electrically EPROM, EEPROM) or
Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), and it is used as outside high
Speed caching.By exemplary but be not restricted explanation, the RAM of many forms can use, such as static RAM
(Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory
(Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate
SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links
Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct
Rambus RAM, DRRAM).The memory 702 of system and method described herein be intended to including but not limited to these and it is any its
It is adapted to the memory of type.
In some embodiments, memory 702 stores following element, can perform module or data structure, or
Their subset of person, or their superset:Operating system 7021 and application program 7022.
Wherein, operating system 7021, comprising various system programs, such as ccf layer, core library layer, driving layer, are used for
Realize various basic businesses and handle hardware based task.Application program 7022, includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention
The program of method may be embodied in application program 7022.
In embodiments of the present invention, by calling program or the instruction of the storage of memory 702, specifically, can be application
The program stored in program 7022 or instruction, processor 701 are used for:The first unlocking pin unlocked in the mobile terminal screen
After authentication failed, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the first network is obtained
The secondary unlocking information that equipment is sent;According to the secondary unlocking information, the second unlocking pin of the user is verified,
And after being verified, complete the unblock to screen.
The method that the embodiments of the present invention are disclosed can apply in processor 701, or be realized by processor 701.
Processor 701 is probably a kind of IC chip, the disposal ability with signal.In implementation process, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 701 or the instruction of software form.Above-mentioned processing
Device 701 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity
Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field
Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic,
Discrete hardware components.It can realize or perform disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general
Processor can be microprocessor or the processor can also be any conventional processor etc..With reference to institute of the embodiment of the present invention
The step of disclosed method, can be embodied directly in hardware decoding processor and perform completion, or with the hardware in decoding processor
And software module combination performs completion.Software module can be located at random access memory, and flash memory, read-only storage may be programmed read-only
In the ripe storage medium in this area such as memory or electrically erasable programmable memory, register.The storage medium is located at
Memory 702, processor 701 reads the information in memory 702, the step of completing the above method with reference to its hardware.
It is understood that embodiments described herein can with hardware, software, firmware, middleware, microcode or its
Combine to realize.Realized for hardware, processing unit can be realized in one or more application specific integrated circuit (Application
Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing,
DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic
Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor,
In controller, microcontroller, microprocessor, other electronic units for performing herein described function or its combination.
Realize, can be realized by performing the module (such as process, function) of function described herein herein for software
Described technology.Software code is storable in memory and by computing device.Memory can within a processor or
Realized outside processor.
Alternatively, processor 701 is additionally operable to:According to the network connection, the equipment mark of the first network equipment is obtained
Know information, the equipment identification information is used for first network equipment described in unique mark;By the equipment identification information with it is described
The characterization device identification information being pre-stored in mobile terminal is compared;After comparison passes through, the first network equipment is extracted
In secondary unlocking information.
Alternatively, processor 701 is additionally operable to:Generate the first unlocking pin and reset dialog box;Described the is based on according to user
One unlocking pin resets the first operational order that dialog box is triggered, and carries out the replacement of the first unlocking pin;Or, according to user's base
The second operational order that dialog box is triggered is reset in first unlocking pin, user circle of the mobile terminal is directly entered
Face.
Alternatively, as another embodiment, processor 701 is additionally operable to:Unlocking pin setting is based on according to user to touch
3rd operational order of hair, the password setting that user is currently inputted is the first unlocking pin of unlocking screen;According to user's base
The 4th triggered operational order is set in unlocking pin, starts scanning and network connection, and obtained secondary unlocking will be scanned
Information is stored in second network equipment being connected with the mobile terminal, wherein the secondary unlocking information is characterized object
Characteristic point information.
Alternatively, processor 701 is additionally operable to:Obtain the device identification for second network equipment being connected with the mobile terminal
Information;The equipment identification information of second network equipment is stored as characterization device identification information.
Mobile terminal 700 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here
Repeat no more.The mobile terminal can point out user to carry out secondary unlocking after to the first unlocking pin authentication failed, first;So
Afterwards, the network connection with first network equipment is set up, the secondary unlocking information of first network equipment transmission is obtained;Afterwards, by
The secondary unlocking information, is verified to the second unlocking pin of user, and after being verified, completes the unblock to screen.
So, after the first unlocking pin authentication failed is caused due to reasons such as user's forgetting or operational errors, user can also be provided again
The secondary chance being unlocked to screen, carries out second by the secondary unlocking information in first network equipment based on network connection and unlocks
The checking of password, realizes multiple unblock, it is to avoid after user the first unlocking pin authentication failed will brush machine reset caused by
The problem of user data loss, improve Consumer's Experience.
Fig. 8 is the structural representation of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 8
800 can be mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric
Brain etc..
Mobile terminal 800 in Fig. 8 includes radio frequency (Radio Frequency, RF) circuit 810, memory 820, input
Unit 830, display unit 840, processor 860, voicefrequency circuit 870, WiFi (Wireless Fidelity) modules 880 and electricity
Source 890.
Wherein, input block 830 can be used for the numeral or character information for receiving user's input, and produce and mobile terminal
The signal input that 800 user is set and function control is relevant.Specifically, in the embodiment of the present invention, the input block 830 can
With including contact panel 831.Contact panel 831, also referred to as touch-screen, collect touch operation of the user on or near it
(such as user uses the operations of any suitable object or annex on contact panel 831 such as finger, stylus), and according to advance
The formula of setting drives corresponding attachment means.Optionally, contact panel 831 may include touch detecting apparatus and touch controller
Two parts.Wherein, touch detecting apparatus detects the touch orientation of user, and detects the signal that touch operation is brought, by signal
Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate,
Give the processor 860 again, and the order sent of reception processing device 860 and can be performed.Furthermore, it is possible to using resistance-type,
The polytypes such as condenser type, infrared ray and surface acoustic wave realize contact panel 831.Except contact panel 831, input block
830 can also include other input equipments 832, and other input equipments 832 can include but is not limited to physical keyboard, function key
One or more in (such as volume control button, switch key etc.), trace ball, mouse, action bars etc..
Wherein, display unit 840 can be used for information and the movement for showing the information inputted by user or being supplied to user
The various menu interfaces of terminal 800.Display unit 840 may include display panel 841, optionally, can use LCD or organic hairs
The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 841.
It should be noted that contact panel 831 can cover display panel 841, touch display screen is formed, when touch display screen inspection
Measure after the touch operation on or near it, processor 860 is sent to determine the type of touch event, with preprocessor
860 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and conventional control viewing area.The Application Program Interface viewing area
And arrangement mode of the conventional control viewing area is not limited, can be arranged above and below, left-right situs etc. can distinguish two and show
Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with
The interface element such as the icon comprising at least one application program and/or widget desktop controls.The Application Program Interface viewing area
It can also be the empty interface not comprising any content.The conventional control viewing area is used to show the higher control of utilization rate, for example,
Application icons such as settings button, interface numbering, scroll bar, phone directory icon etc..
Wherein processor 860 is the control centre of mobile terminal 800, utilizes various interfaces and connection whole mobile phone
Various pieces, software program and/or module in first memory 821 are stored in by operation or execution, and call storage
Data in second memory 822, perform the various functions and processing data of mobile terminal 800, so as to mobile terminal 800
Carry out integral monitoring.Optionally, processor 860 may include one or more processing units.
In embodiments of the present invention, by call store the first memory 821 in software program and/or module and/
Or the data in the second memory 822, processor 860 in the first unlocking pin of mobile terminal screen unblock for testing
After card failure, user is pointed out to carry out secondary unlocking;The network connection with first network equipment is set up, the first network is obtained and sets
The secondary unlocking information that preparation is sent;According to the secondary unlocking information, the second unlocking pin of the user is verified, and
After being verified, the unblock to screen is completed.
Alternatively, processor 860 is additionally operable to obtain the device identification of the first network equipment according to the network connection
Information, the equipment identification information is used for first network equipment described in unique mark;The equipment identification information is moved with described
The characterization device identification information being pre-stored in dynamic terminal is compared;After comparison passes through, extract in the first network equipment
Secondary unlocking information.
Alternatively, processor 860 is additionally operable to the first unlocking pin of generation and resets dialog box;Described first is based on according to user
Unlocking pin resets the first operational order that dialog box is triggered, and carries out the replacement of the first unlocking pin;Or, be based on according to user
First unlocking pin resets the second operational order that dialog box is triggered, and is directly entered user circle of the mobile terminal
Face.
Alternatively, processor 860 is additionally operable to set the 3rd triggered operational order based on unlocking pin according to user, will
The password setting that user currently inputs is the first unlocking pin of unlocking screen;Unlocking pin setting is based on according to user to be triggered
The 4th operational order, start scanning and network connection, and be stored in obtained secondary unlocking information is scanned and the movement
In second network equipment of terminal connection, wherein the secondary unlocking information is characterized the characteristic point information of object.
Alternatively, processor 860 is additionally operable to obtain the device identification for second network equipment being connected with the mobile terminal
Information;The equipment identification information of second network equipment is stored as characterization device identification information.
It can be seen that, the mobile terminal can point out user to carry out secondary unlocking after to the first unlocking pin authentication failed, first;
Then, the network connection with first network equipment is set up, the secondary unlocking information of first network equipment transmission is obtained;Afterwards,
By the secondary unlocking information, the second unlocking pin of user is verified, and after being verified, completes the solution to screen
Lock.So, after the first unlocking pin authentication failed is caused due to reasons such as user's forgetting or operational errors, user can also be provided
The chance being unlocked again to screen, carries out second by the secondary unlocking information in first network equipment based on network connection and solves
The checking of lock cipher, realizes multiple unblock, it is to avoid will be caused by brush machine resets after user the first unlocking pin authentication failed
User data loss the problem of, improve Consumer's Experience.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel
Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed
The scope of the present invention.
It is apparent to those skilled in the art that, for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In embodiment provided herein, it should be understood that disclosed apparatus and method, others can be passed through
Mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, is only
A kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be the INDIRECT COUPLING or communication link of device or unit by some interfaces
Connect, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.
If the function is realized using in the form of SFU software functional unit and is used as independent production marketing or in use, can be with
It is stored in a computer read/write memory medium.Understood based on such, technical scheme is substantially in other words
The part contributed to prior art or the part of the technical scheme can be embodied in the form of software product, the meter
Calculation machine software product is stored in a storage medium, including some instructions are to cause a computer equipment (can be individual
People's computer, server, or network equipment etc.) perform all or part of step of each of the invention embodiment methods described.
And foregoing storage medium includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be defined by scope of the claims.
Explanation is needed further exist for, this mobile terminal described in this description includes but is not limited to smart mobile phone, put down
Plate computer etc..
This many functional part described in this description is all referred to as module, specifically to emphasize its realization side
The independence of formula.
In the embodiment of the present invention, module can be realized with software, so as to by various types of computing devices.Citing comes
Say, the executable code module of a mark can include the one or more physics or logical block of computer instruction, illustrate
For, it can be built as object, process or function.Nevertheless, the executable code of institute's mark module is without physically
It is located together, but can includes being stored in different instructions in different positions, is combined together when in these command logics
When, its regulation purpose for constituting module and realizing the module.
In fact, executable code module can be the either many bar instructions of individual instructions, and it can even be distributed
On multiple different code segments, it is distributed among distinct program, and is distributed across multiple memory devices.Similarly, grasp
Making data can be identified in module, and can be realized according to any appropriate form and be organized in any appropriate class
In the data structure of type.The peration data can be collected as individual data collection, or can be distributed on diverse location
(being included in different storage device), and only can be present at least in part as electronic signal in system or network.
When module can be realized using software, it is contemplated that the level of existing hardware technique, it is possible to implemented in software
Module, in the case where not considering cost, those skilled in the art can build corresponding hardware circuit realize correspondence
Function, the hardware circuit includes conventional ultra-large integrated (VLSI) circuit or gate array and such as logic core
The existing semiconductor of piece, transistor etc either other discrete elements.Module can also use programmable hardware device, such as
Field programmable gate array, programmable logic array, programmable logic device etc. are realized.
Above-mentioned exemplary embodiment is described with reference to those accompanying drawings, many different forms and embodiment be it is feasible and
Without departing from spirit of the invention and teaching, therefore, the present invention should not be construed to turn into proposes the limitation of exemplary embodiment at this.
More precisely, these exemplary embodiments are provided so that the present invention can be improved and complete, and can be by the scope of the invention
Convey to those those of skill in the art.In those schemas, size of components and relative size are perhaps based on for the sake of clear
And be exaggerated.Term used herein is based only on description particular example embodiment purpose, is not intended to turn into limitation use.Such as
Use ground at this, unless the interior text clearly refers else, otherwise singulative " one ", " one " and the "the" be intended to by
Those multiple forms are also included.Those term "comprising"s and/or " comprising " will become further apparent when being used in this specification,
Represent the presence of the feature, integer, step, operation, component and/or component, but be not excluded for one or more further features, it is whole
Number, step, operation, component, component and/or the presence of its group or increase.Unless otherwise indicated, narrative tense, a value scope bag
Bound containing the scope and any subrange therebetween.
Described above is the preferred embodiment of the present invention, it is noted that for those skilled in the art
For, on the premise of principle of the present invention is not departed from, some improvements and modifications can also be made, these improvements and modifications
It should be regarded as protection scope of the present invention.
Claims (11)
1. a kind of unlocking screen method, applied to mobile terminal, it is characterised in that including:
After the first unlocking pin authentication failed that the mobile terminal screen is unlocked, user is pointed out to carry out secondary unlocking;
The network connection with first network equipment is set up, the secondary unlocking information that the first network equipment is sent is obtained;
According to the secondary unlocking information, the second unlocking pin of the user is verified, and after being verified, completed
Unblock to screen.
2. unlocking screen method according to claim 1, it is characterised in that the foundation and the network of first network equipment
Connection, the step of obtaining the secondary unlocking information that the first network equipment is sent, including:
According to the network connection, the equipment identification information of the first network equipment is obtained, the equipment identification information is used for
First network equipment described in unique mark;
The equipment identification information is compared with characterization device identification information pre-stored in the mobile terminal;
After comparison passes through, the secondary unlocking information in the first network equipment is extracted.
3. unlocking screen method according to claim 1 or 2, it is characterised in that the step of the unblock to screen is completed
Afterwards, in addition to:
Generate the first unlocking pin and reset dialog box;
The first operational order that dialog box is triggered is reset based on first unlocking pin according to user, the first unblock is carried out close
The replacement of code;Or, the second operational order triggered according to user based on first unlocking pin replacement dialog box, directly enter
Enter the user interface of the mobile terminal.
4. unlocking screen method according to claim 1, it is characterised in that in unlocked to the mobile terminal screen
Before the step of one unlocking pin is verified, in addition to:
The 3rd triggered operational order is set according to user based on unlocking pin, and the password setting that user is currently inputted is screen
First unlocking pin of curtain unblock;
The 4th triggered operational order is set according to user based on unlocking pin, starts scanning and network connection, and will scanning
Obtained secondary unlocking information is stored in second network equipment being connected with the mobile terminal, wherein the secondary unlocking is believed
Breath is characterized the characteristic point information of object.
5. unlocking screen method according to claim 4, it is characterised in that the step of scanning and network connection is started it
Afterwards, in addition to:
Obtain the equipment identification information for second network equipment being connected with the mobile terminal;
The equipment identification information of second network equipment is stored as characterization device identification information.
6. a kind of mobile terminal, it is characterised in that including:
Reminding module, for after the first unlocking pin authentication failed that the mobile terminal screen is unlocked, pointing out user to carry out
Secondary unlocking;
First processing module, for setting up the network connection with first network equipment, obtains what the first network equipment was sent
Secondary unlocking information;
Second processing module, for according to the secondary unlocking information, being verified to the second unlocking pin of the user, and
After being verified, the unblock to screen is completed.
7. mobile terminal according to claim 6, it is characterised in that the first processing module includes:
First acquisition submodule, for according to the network connection, obtaining the equipment identification information of the first network equipment, institute
Stating equipment identification information is used for first network equipment described in unique mark;
Submodule is compared, for the characterization device identification information that will be pre-stored in the equipment identification information and the mobile terminal
It is compared;
Extracting sub-module, for after comparison passes through, extracting the secondary unlocking information in the first network equipment.
8. the mobile terminal according to claim 6 or 7, it is characterised in that also include:
Generation module, dialog box is reset for generating the first unlocking pin;
3rd processing module, for being referred to according to user based on the first operation that first unlocking pin replacement dialog box is triggered
Order, carries out the replacement of the first unlocking pin;
Fourth processing module, for being referred to according to user based on the second operation that first unlocking pin replacement dialog box is triggered
Order, is directly entered the user interface of the mobile terminal.
9. mobile terminal according to claim 6, it is characterised in that also include:
5th processing module, it is for setting the 3rd triggered operational order based on unlocking pin according to user, user is current
The password setting of input is the first unlocking pin of unlocking screen;
6th processing module, for setting triggered the 4th operational order based on unlocking pin according to user, start scanning and
Network connection, and be stored in obtained secondary unlocking information is scanned in second network equipment being connected with the mobile terminal,
Wherein described secondary unlocking information is characterized the characteristic point information of object.
10. mobile terminal according to claim 9, it is characterised in that the 6th processing module also includes:
Second acquisition submodule, the equipment identification information for obtaining second network equipment being connected with the mobile terminal;
Sub-module stored, for the equipment identification information of second network equipment to be deposited as characterization device identification information
Storage.
11. a kind of mobile terminal, it is characterised in that including:Memory, processor and it is stored on the memory and can be in institute
The computer program run on processor is stated, is realized described in the computing device during computer program as in claim 1 to 5
The step of unlocking screen method described in any one.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710356083.1A CN107169326A (en) | 2017-05-19 | 2017-05-19 | A kind of unlocking screen method and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710356083.1A CN107169326A (en) | 2017-05-19 | 2017-05-19 | A kind of unlocking screen method and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107169326A true CN107169326A (en) | 2017-09-15 |
Family
ID=59815716
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710356083.1A Pending CN107169326A (en) | 2017-05-19 | 2017-05-19 | A kind of unlocking screen method and mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107169326A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609387A (en) * | 2017-09-30 | 2018-01-19 | 广东欧珀移动通信有限公司 | The method and apparatus of terminal unlocking, terminal device, computer-readable recording medium |
CN108401068A (en) * | 2018-02-08 | 2018-08-14 | 西安易朴通讯技术有限公司 | Data line, data processing method and electronic equipment |
CN108540875A (en) * | 2018-03-06 | 2018-09-14 | 上海康斐信息技术有限公司 | A kind of method and system of router control mobile terminal screen |
CN112241557A (en) * | 2019-07-16 | 2021-01-19 | 技嘉科技股份有限公司 | Display and automatic locking and unlocking method thereof |
CN112422744A (en) * | 2020-09-28 | 2021-02-26 | 深圳市修远文化创意有限公司 | Method for unlocking mobile phone, mobile phone and computer |
CN113254901A (en) * | 2021-06-11 | 2021-08-13 | 长扬科技(北京)有限公司 | Data security access method and device |
CN113688373A (en) * | 2020-05-19 | 2021-11-23 | 中移(成都)信息通信科技有限公司 | Slide unlocking method, apparatus, device, and medium |
CN114244874A (en) * | 2020-09-09 | 2022-03-25 | 华为技术有限公司 | Unlocking control method and system, computer storage medium and electronic equipment |
CN115083046A (en) * | 2022-06-28 | 2022-09-20 | 维沃移动通信有限公司 | Decryption method, decryption information creation method, and decryption apparatus |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752359A (en) * | 2012-02-17 | 2012-10-24 | 浙江吉利汽车研究院有限公司 | Long-distance service assisted type method and system for automobile fingerprint identification authentication |
CN103077027A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Method and system for assisting unlocking |
CN104539806A (en) * | 2015-01-12 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Mobile terminals and emergency unlocking method thereof |
CN106610822A (en) * | 2015-10-21 | 2017-05-03 | 中兴通讯股份有限公司 | Auxiliary unlocking method and device |
-
2017
- 2017-05-19 CN CN201710356083.1A patent/CN107169326A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102752359A (en) * | 2012-02-17 | 2012-10-24 | 浙江吉利汽车研究院有限公司 | Long-distance service assisted type method and system for automobile fingerprint identification authentication |
CN103077027A (en) * | 2012-12-28 | 2013-05-01 | 东莞宇龙通信科技有限公司 | Method and system for assisting unlocking |
CN104539806A (en) * | 2015-01-12 | 2015-04-22 | 深圳市中兴移动通信有限公司 | Mobile terminals and emergency unlocking method thereof |
CN106610822A (en) * | 2015-10-21 | 2017-05-03 | 中兴通讯股份有限公司 | Auxiliary unlocking method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107609387A (en) * | 2017-09-30 | 2018-01-19 | 广东欧珀移动通信有限公司 | The method and apparatus of terminal unlocking, terminal device, computer-readable recording medium |
CN108401068A (en) * | 2018-02-08 | 2018-08-14 | 西安易朴通讯技术有限公司 | Data line, data processing method and electronic equipment |
CN108540875A (en) * | 2018-03-06 | 2018-09-14 | 上海康斐信息技术有限公司 | A kind of method and system of router control mobile terminal screen |
CN112241557A (en) * | 2019-07-16 | 2021-01-19 | 技嘉科技股份有限公司 | Display and automatic locking and unlocking method thereof |
CN113688373A (en) * | 2020-05-19 | 2021-11-23 | 中移(成都)信息通信科技有限公司 | Slide unlocking method, apparatus, device, and medium |
CN114244874A (en) * | 2020-09-09 | 2022-03-25 | 华为技术有限公司 | Unlocking control method and system, computer storage medium and electronic equipment |
CN112422744A (en) * | 2020-09-28 | 2021-02-26 | 深圳市修远文化创意有限公司 | Method for unlocking mobile phone, mobile phone and computer |
CN113254901A (en) * | 2021-06-11 | 2021-08-13 | 长扬科技(北京)有限公司 | Data security access method and device |
CN113254901B (en) * | 2021-06-11 | 2021-10-01 | 长扬科技(北京)有限公司 | Data security access method and device |
CN115083046A (en) * | 2022-06-28 | 2022-09-20 | 维沃移动通信有限公司 | Decryption method, decryption information creation method, and decryption apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107169326A (en) | A kind of unlocking screen method and mobile terminal | |
CN106778183A (en) | A kind of Terminal fingerprints know method for distinguishing and mobile terminal | |
CN105469508A (en) | Storage cabinet, mobile terminal and storage cabinet control method and system | |
CN102542189B (en) | A kind of method of certification, device and electronic equipment | |
CN106203038B (en) | A kind of unlocking method and mobile terminal | |
CN103049182B (en) | The unlocking method and device of screen display interface | |
CN107678884A (en) | A kind of data transmission method, mobile terminal and computer-readable recording medium | |
CN107194235A (en) | A kind of application program launching method and mobile terminal | |
CN107145291A (en) | Information processor and information processing method | |
CN107679426A (en) | A kind of screen content display method thereof and mobile terminal | |
CN106446661A (en) | Mobile terminal application program starting method and mobile terminal | |
CN107506111A (en) | The encryption and decryption method and terminal of a kind of terminal applies | |
CN106779722B (en) | A kind of method of payment and mobile terminal of mobile terminal | |
CN106778389A (en) | The loss detection method and mobile terminal of a kind of mobile terminal | |
CN109150509A (en) | A kind of equipment method for unlocking, device, terminal device and medium | |
CN106714162A (en) | Hotspot sharing method and mobile terminals | |
CN106991311A (en) | A kind of information processing method and mobile terminal | |
CN106211070B (en) | A kind of anti-theft protection method and mobile terminal of mobile terminal | |
CN103034442B (en) | Electronic equipment and the unblock of screen thereof, unlocking information device and method is set | |
CN107492164A (en) | Smart lock control method, apparatus, terminal device and readable storage medium storing program for executing | |
CN105303096A (en) | Symbol selection for swipe based authentication | |
CN107452102A (en) | A kind of intelligent fingerprint door lock and its fingerprint input method | |
CN106803031A (en) | A kind of information protecting method and mobile terminal | |
CN106407945B (en) | A kind of fingerprint identification method and mobile terminal | |
CN103034441B (en) | Unlocking method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170915 |
|
RJ01 | Rejection of invention patent application after publication |