CN107451445A - A kind of method of unlocking screen, terminal and storage medium - Google Patents

A kind of method of unlocking screen, terminal and storage medium Download PDF

Info

Publication number
CN107451445A
CN107451445A CN201710585125.9A CN201710585125A CN107451445A CN 107451445 A CN107451445 A CN 107451445A CN 201710585125 A CN201710585125 A CN 201710585125A CN 107451445 A CN107451445 A CN 107451445A
Authority
CN
China
Prior art keywords
user
terminal
rank
picture
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710585125.9A
Other languages
Chinese (zh)
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710585125.9A priority Critical patent/CN107451445A/en
Publication of CN107451445A publication Critical patent/CN107451445A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

The application is related to field of terminal, discloses a kind of method of unlocking screen, terminal and storage medium.Methods described includes:When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;The rank of the user is determined according to the biological characteristic of acquisition;It is determined that target unlocking manner corresponding with the rank according to the user;Unlock interface corresponding with the target unlocking manner is presented;Receive the checking information that the user inputs in the unlock interface;When the checking information passes through checking, user interface corresponding with the rank of the user is presented;Wherein, the information presented in different user interfaces is different.Pass through above-mentioned technical proposal, when the authentication succeeds, user interface corresponding with the user class is presented eventually, wherein, the information presented in different user interfaces is different, so as to which the information according to the different presentations of user class is also different, and then lifts the security of end message.

Description

A kind of method of unlocking screen, terminal and storage medium
Technical field
The present invention relates to field of terminal, more particularly to a kind of method of unlocking screen, terminal and storage medium.
Background technology
With the development of science and technology and material life it is abundant, mobile terminal becomes more popular.
People such as can be handled official business, be done shopping, being entertained at the activity by mobile terminal, therefore is mounted with mobile terminal a large amount of For above-mentioned movable application program.
It is pointed out that when user is without using terminal, often terminal is carried with;When user needs to use end During end, it is necessary to gone to take out terminal, during further taking out terminal, the unconscious touching terminal of finger, easily to terminal with hand It is unlocked, and carries out maloperation, so as to brings trouble to user.
The content of the invention
, can be according to according to face the embodiment of the invention discloses a kind of method of unlocking screen, terminal and storage medium Identification and fingerprint recognition user is verified, when being verified, terminal removing screen locking, so as to prevent terminal with Lock is misunderstood during carrying.
First aspect of the embodiment of the present invention discloses a kind of method of unlocking screen, and methods described includes:
When the screen for detecting terminal is lit, user is prompted to carry out fingerprint authentication and face verification;
Receive the finger print information of user's typing, and judge the typing finger print information be pre-stored fingerprint information whether Matching;
The picture for including face characteristic is obtained, and face verification is carried out to the face characteristic in the picture;
When the finger print information of the typing leads to the pre-stored fingerprint information matches and the picture comprising face characteristic When crossing face verification, unlocking screen is carried out.
It is described right in the first possible implementation of first aspect present invention with reference to the first aspect of the present invention Face characteristic in the picture, which carries out face verification, to be included:
Determine the face location in the picture;
Line definition identification is entered to the picture of the face location;
When the definition meets preset requirement, by the face location picture and the faceform to prestore progress Match somebody with somebody;
When the match is successful, it is determined that the picture comprising face characteristic passes through face verification.
With reference to the first possible implementation of the first aspect of the present invention, second in first aspect present invention can In the implementation of energy, methods described also includes:
When the definition is unsatisfactory for preset requirement, the user is prompted to carry out photograph taking to obtain again comprising people The picture of face feature;
Face verification is carried out to the picture of shooting;
If authentication failed, prompt that operation can not be unlocked to the terminal in the user preset duration.
With reference to second of possible implementation of first aspect present invention, the third in first aspect present invention may Implementation in, methods described also includes:
The time of this unblock is matched to determine this time unblock with the terminal use habit model of the user Whether the time meets the use habit of the user;
When the time of this unblock is not meet the use habit of the user, this terminal unlocking is recorded as exception Unblock;
Abnormal operation acknowledging time point is determined according to the terminal use habit model of the user;
In the abnormal operation acknowledging time point the abnormal unlocking information is pushed to the user.
With reference to the third possible implementation of first aspect present invention, in the 4th kind of possibility of first aspect present invention Implementation in, methods described also includes:
Obtain the usage record of the terminal in preset time period;
The usage record is learnt according to default machine learning algorithm to obtain the custom model of the user.
Second aspect of the present invention discloses a kind of terminal, and the terminal includes:
Acquiring unit, for when the screen for detecting terminal is lit, obtaining the biology for the user for operating the terminal Feature;
Matching unit, for the biological characteristic of acquisition to be matched to determine the user's with the biological characteristic to prestore Rank;
Determining unit, for determining target unlocking manner corresponding with the rank according to the user;
Display unit, for corresponding with target unlocking manner unlock interface to be presented to cause the user described Validation information in unlock interface;
Receiving unit, the checking information inputted for receiving the user in the unlock interface;
The display unit, for when the checking information passes through checking, presenting corresponding with the rank of the user User interface;Wherein, the information presented in different user interfaces is different.
With reference to the second aspect of the present invention, in the first possible implementation of second aspect of the present invention, the end End also includes photographing unit and memory cell;
The photographing unit, for when the rank of the user is casual user, user described in the terminal-pair to be carried out Take pictures to obtain the picture for including the user's face feature;
Memory cell, for the picture to be stored.
With reference to the first possible implementation of second aspect of the present invention, second in invention second aspect is possible In implementation, the terminal also includes generation unit;
The determining unit, it is additionally operable to, when the rank of the user is casual user, determine the mesh that the user chooses Mark object, and the operation to destination object progress;
The generation unit, casual user is generated for the operation according to the destination object and to the destination object Operation Log;
The memory cell, it is additionally operable to be stored the Operation Log of the casual user.
With reference to second of possible implementation of second aspect of the present invention, the third in second aspect of the present invention may Implementation in, the terminal also includes backup units;
The determining unit, it is additionally operable to when the rank of the user is casual user, determine the text that the user deletes Part;
The backup units, for being backed up and being hidden the file of the deletion.
With reference to the third possible implementation of second aspect of the present invention, in the 4th kind of possibility of second aspect of the present invention Implementation in,
The display unit, for when it is determined that the rank of the user is owner's rank, presenting in preset time period and grasping Made the picture of the casual user of the terminal and the Operation Log of the casual user so that active user checks.
Third aspect present invention discloses a kind of terminal, and the terminal includes reception device, physical characteristics collecting device, shown Display screen and application processor AP;
The physical characteristics collecting device, for when the screen for detecting terminal is lit, obtaining and operating the terminal User biological characteristic;
The application processor, for the biological characteristic of acquisition to be matched with described in determination with the biological characteristic to prestore The rank of user;And determine target unlocking manner corresponding with the rank according to the user;
The display screen, for corresponding with target unlocking manner unlock interface to be presented to cause the user in institute State validation information in unlock interface;
The reception device, the checking information inputted for receiving the user in the unlock interface;
The display screen, for use corresponding with the rank of the user when the checking information passes through checking, to be presented Family operation interface;Wherein, the information presented in different user interfaces is different.
With reference to the third aspect of the present invention, in the first possible implementation of third aspect present invention, the end End also includes camera and memory;
The camera, for when the rank of the user is casual user, user described in the terminal-pair to be clapped According to the picture that the user's face feature is included with acquisition;
The memory, for the picture to be stored.
With reference to third aspect present invention, in the first possible implementation of third aspect present invention,
The AP, it is additionally operable to, when the rank of the user is casual user, determine the destination object that the user chooses, And the operation to destination object progress;And the operation generation according to the destination object and to the destination object is faced When user Operation Log;
The memory, it is additionally operable to be stored the Operation Log of the casual user.
With reference to the first possible implementation of third aspect present invention, second in third aspect present invention may Implementation in,
The AP, it is additionally operable to when the rank of the user is casual user, determine the file that the user deletes;By institute The file for stating deletion is backed up and hidden.
With reference to second of possible implementation of third aspect present invention, the third in the invention third aspect is possible In implementation,
The display screen, for when it is determined that the rank of the user is owner's rank, presenting in preset time period and operating The picture of the casual user of the terminal and the Operation Log of the casual user are crossed so that active user checks.
Fourth aspect present invention discloses a kind of terminal, and the terminal includes:
It is stored with the memory of executable program code;
The processor coupled with the memory;
And display;
The processor calls the executable program code stored in the memory, performs first aspect present invention Any one of method, wherein, in above method implementation procedure, the idsplay order of the display reception processing device is to hold Row display action.
Fifth aspect present invention discloses a kind of computer-readable recording medium, and it is stored based on electronic data interchange Calculation machine program, wherein, the computer program causes terminal to perform the method as described in any one of first aspect present invention.
Compared with prior art, the embodiment of the present invention has the advantages that:
In the embodiment of the present invention, when the screen for detecting terminal is lit, the life for the user for operating the terminal is obtained Thing feature;The biological characteristic of acquisition is matched to determine the rank of the user with the biological characteristic to prestore;It is determined that and root According to target unlocking manner corresponding to the rank of the user;Unlock interface corresponding with the target unlocking manner is presented to cause User validation information in the unlock interface;Receive the checking letter that the user inputs in the unlock interface Breath;When the checking information passes through checking, user interface corresponding with the rank of the user is presented;Wherein, not The information presented in same user interface is different.Pass through above-mentioned technical proposal, can be according to the user of current operation terminal Biological characteristic determine user class, and determine verification mode corresponding with the user class, when the authentication succeeds, present eventually and User interface corresponding to the user class, wherein, the information presented in different user interfaces is different, so as to It is also different according to the information of the different presentations of user class, and then lift the security of end message.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it will use below required in embodiment Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for ability For the those of ordinary skill of domain, on the premise of not paying creative work, it can also be obtained according to these accompanying drawings other attached Figure.
Fig. 1 a are a kind of schematic flow sheets of the method for unlocking screen disclosed in the embodiment of the present invention;
Fig. 1 b are a kind of interface schematic diagrams that unlocking screen is carried out according to user type disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for another unlocking screen disclosed in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the method for another unlocking screen disclosed in the embodiment of the present invention;
Fig. 4 is a kind of structural representation of user terminal disclosed in the embodiment of the present invention;
Fig. 5 is the structural representation of another user terminal disclosed in the embodiment of the present invention;
Fig. 6 is the structural representation of another user terminal disclosed in the embodiment of the present invention;
Fig. 7 is a kind of physical arrangement schematic diagram of user terminal disclosed in the embodiment of the present invention;
Fig. 8 is a kind of physical arrangement schematic diagram of mobile phone disclosed in the embodiment of the present invention;
Fig. 9 is the physical arrangement schematic diagram of another user terminal disclosed in the embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.Based on this Embodiment in invention, the every other reality that those of ordinary skill in the art are obtained under the premise of creative work is not made Example is applied, belongs to the scope of protection of the invention.
, can be according to current operation the embodiment of the invention discloses a kind of method of unlocking screen, terminal and storage medium The biological characteristic of the user of terminal determines user class, and determines verification mode corresponding with the user class, when being proved to be successful When, user interface corresponding with the user class is presented eventually, wherein, the letter presented in different user interfaces Breath is different, so as to which the information according to the different presentations of user class is also different, and then lifts the security of end message.
It is described in detail individually below.
Fig. 1 a are referred to, Fig. 1 a are a kind of schematic flow sheets of the method for unlocking screen disclosed in the embodiment of the present invention.Should The method of interface push may comprise steps of.
S101, when the screen for detecting terminal is lit, obtain the biological characteristic for the user for operating the terminal;
It is pointed out that the executive agent of the present embodiment is terminal.
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
Wherein, optionally, as shown in Figure 1 b, when the screen for detecting terminal is lit, terminal can prompt user to select Select the pattern into terminal.For example can be casual user's pattern or owner's pattern.It is pointed out that different moulds The verification mode of formula can be different.If user selection Dietary behavior for casual user's pattern, then carry out face recognition; If user selects owner's pattern, iris unblock is carried out.
It is understood that regardless of bio-identification, it is required for the biology for obtaining the user for operating the terminal special Sign.Common bio-identification mode includes iris recognition, fingerprint recognition, recognition of face, voice recognition, and hand vein recognition etc.. Wherein it is possible to understand, at least one mode therein can be selected to be identified.
For example prompting user is predeterminable area typing finger print information;For example prompting eyes of user is directed at camera so as to end Hold and the biological information of user is extracted;Biological information according to extracting further obtains biological characteristic.
Illustrated by fingerprint, two pieces of fingerprints often have identical general characteristic, but their minutia, impossible It is identical.Fingerprint lines is not continuous, smooth straight, but interruption, bifurcated or turnover often occurs.These are disconnected Point, bifurcation and turning point are known as " characteristic point ".Characteristic point provides the confirmation of fingerprint uniqueness, wherein most typical It is destination node and bifurcation, other also include ramification point, isolated point, circling point, short grain etc..It is appreciated that when, this feature point is just It is the biological characteristic of the user.
Illustrated by iris, the eye structure of people is made up of the part such as sclera, iris, pupil crystalline lens, retina.Iris is Annular formations between black pupil and white sclera, its include many interlaced spots, filament, it is coronal, The minutia of striped, crypts etc..The minutia is exactly the biological characteristic of the user.In addition, it is necessary to, it is noted that iris exists After prenatal development stage is formed, it will be to maintain in whole life course constant.These features determine iris feature only One property, while also determine the uniqueness of identification.Therefore, can know the iris feature of eyes as everyone identity Other object.
S102, the biological characteristic of acquisition matched to determine the rank of the user with the biological characteristic to prestore;
It may be noted that when, the rank of user can be divided into owner's rank and casual user's rank.Owner's rank can make With any resource in terminal.And casual user's rank can only be in using terminal part resource.For example, the use of owner's rank Resource can be marked for family.When the user of casual user's rank uses the terminal, terminal can be by labeled as important money Source is hidden.Optionally, terminal will can be encrypted labeled as important resource, then be hidden again.
It is appreciated that when, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal.When the biology to prestore When being characterized in the biological characteristic of the owner of the terminal, if the biological characteristic obtained and the biometric matches to prestore, illustrate Active user is host user.
Optionally, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal and the user for using this terminal Feature.
Optionally, the biological characteristic to prestore can be the feature for the user for using this terminal.
Wherein it is determined that the feature of user, it is possible to determine the identity of user.
S103, determine target unlocking manner corresponding with the rank according to the user;
For example the unlocking manner of host user is simpler than the unlocking manner of casual user.Such as the unblock of host user Mode is unlocked by fingerprint, and the unlocking manner unlocked by fingerprint of casual user adds iris to unlock.
S104, unlock interface corresponding with the target unlocking manner is presented to cause the user in the unlock interface Upper input validation;
S105, receive the checking information that the user inputs in the unlock interface;
S106, when the checking information passes through checking, corresponding with the rank of user user interface is presented; Wherein, the information presented in different user interfaces is different.
It is appreciated that when, the rank of host user is higher than the rank of casual user.Therefore casual user can only see Host user set without the resource hidden.The resources such as important photo, contact person's mode, account can be labeled, when interim When user logs in, these resources can be encrypted hide.
In addition, optional, it is described user interface corresponding with the rank of the user is presented after, methods described is also Including:When the rank of the user is casual user, user described in the terminal-pair is taken pictures includes the use to obtain The picture of family facial characteristics, and the picture is stored.
It is appreciated that when, after temporary user logon, terminal can record information and the casual user of the casual user All operations.For example the casual user is taken pictures, preserve the photo of the casual user.Wherein, being included in the photo should The head portrait of casual user.The operation of casual user includes having browsed those files, which webpage having been browsed, and which file is carried out Modification is deleted.
In addition, it is necessary to point out when, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;Operation life according to the destination object and to the destination object Stored into the Operation Log of casual user, and by the Operation Log of the casual user.
It is understood that the Operation Log of casual user can be deposited according to the mark and date of casual user Shelves.For example casual user is A, then establishes a file according to A mark, operation is established according to the operating time each A Document.
In addition, it is necessary to point out when, for the important operation of casual user, must be backed up, such as casual user Delete file, then this document can be deleted, but this document can be backed up and hidden by terminal.It is specifically, described Method also includes:When the rank of the user is casual user, the file that the user deletes is determined;By the text of the deletion Part is backed up and hidden.
In addition, it is optional, after host user logs in, all operations before casual user can be checked, specific institute Stating method also includes:When it is determined that the rank of the user is owner's rank, presents in preset time period and operated the terminal The picture of casual user and the Operation Log of the casual user check for active user.
From the above it can be seen that by implementing technical scheme provided in an embodiment of the present invention, when the screen for detecting terminal is lit When, acquisition operates the biological characteristic of the user of the terminal;The biological characteristic of acquisition is matched with the biological characteristic to prestore To determine the rank of the user;It is determined that target unlocking manner corresponding with the rank according to the user;Present and the mesh Unlock interface corresponding to unlocking manner is marked to cause user validation information in the unlock interface;Receive the use The checking information that family inputs in the unlock interface;When the checking information passes through checking, the level with the user is presented Not corresponding user interface;Wherein, the information presented in different user interfaces is different.Pass through above-mentioned technical side Case, user class can be determined according to the biological characteristic of the user of current operation terminal, and determined corresponding with the user class Verification mode, when the authentication succeeds, user interface corresponding with the user class is presented eventually, wherein, in different use The information presented in the operation interface of family is different, so as to which the information according to the different presentations of user class is also different, and then lifts terminal The security of information.
Referring to Fig. 2, Fig. 2 is a kind of schematic flow sheet of the method for unlocking screen disclosed in the embodiment of the present invention.Such as Fig. 2 Shown, the method for the unlocking screen may comprise steps of.
S201, when the screen for detecting terminal is lit, obtain the biological characteristic for the user for operating the terminal;
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
S202, the biological characteristic of acquisition matched to determine the rank of the user with the biological characteristic to prestore;
S203, determine target unlocking manner corresponding with the rank according to the user;
S204, unlock interface corresponding with the target unlocking manner is presented to cause the user in the unlock interface Upper validation information;
S205, receive the checking information that the user inputs in the unlock interface;
S206, when the checking information passes through checking, corresponding with the rank of user user interface is presented;
Wherein, the information presented in different user interfaces is different.
S207, when the rank of the user is casual user, user described in the terminal-pair taken pictures with obtain bag Picture containing the user's face feature, and the picture is stored;The destination object that the user chooses is determined, and The operation carried out to the destination object;Operation generation casual user according to the destination object and to the destination object Operation Log, and the Operation Log of the casual user is stored;And determine the file that the user deletes;Will The file of the deletion is backed up and hidden.
S208, when it is determined that the rank of the user is owner's rank, present preset time period in operated the terminal The picture of casual user and the Operation Log of the casual user check for active user.
In addition, when owner feels to have a suspect, photo can be further clicked on and see its operation made to terminal.
In the method described by Fig. 2, terminal can record to the operation after temporary user logon, facilitate owner to use Family can check the operation that casual user is carried out to terminal, so as to lift the security of terminal.
Referring to Fig. 3, Fig. 3 is a kind of schematic flow sheet of the method for unlocking screen disclosed in the embodiment of the present invention.Such as Fig. 3 Shown, the method for the unlocking screen may comprise steps of.
S301, terminal notifying user selection pattern into terminal above-mentioned when the screen for detecting terminal is lit;Need It is noted that the executive agent of the present embodiment is terminal.
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
S302, the target pattern for determining above-mentioned user's selection, and login interface corresponding with the target pattern is presented;Its In, it is different without validation difficulty corresponding to pattern;
S303, the biological characteristic for obtaining the user for operating the terminal;
S304, when the biological characteristic passes through checking, corresponding with pattern user interface is presented;Wherein, The information presented in user interface corresponding to different mode is different.
, wherein it is desired to point out when, when the screen for detecting terminal is lit, terminal can prompt user select enter The pattern of terminal.For example can be casual user's pattern or owner's pattern.It is pointed out that different mode is tested Card mode can be different.If user selection Dietary behavior for casual user's pattern, then carry out face recognition;If with When family selects owner's pattern, then iris unblock is carried out.
It is understood that regardless of bio-identification, it is required for the biology for obtaining the user for operating the terminal special Sign.Common bio-identification mode includes iris recognition, fingerprint recognition, recognition of face, voice recognition, and hand vein recognition etc.. Wherein it is possible to understand, at least one mode therein can be selected to be identified.
For example prompting user is predeterminable area typing finger print information;For example prompting eyes of user is directed at camera so as to end Hold and the biological information of user is extracted;Biological information according to extracting further obtains biological characteristic.Illustrated by fingerprint, Two pieces of fingerprints often have identical general characteristic, but their minutia, but can not possibly be identical.Fingerprint lines is simultaneously It is not continuous, smooth straight, but interruption, bifurcated or turnover often occurs.These breakpoints, bifurcation and turning point just claim For " characteristic point ".Characteristic point provides the confirmation of fingerprint uniqueness, wherein most typically destination node and bifurcation, other Also include ramification point, isolated point, circling point, short grain etc..It is appreciated that when, this feature point is exactly the biological characteristic of the user.Take Iris is illustrated, and the eye structure of people is made up of the part such as sclera, iris, pupil crystalline lens, retina.Iris is to be located at black pupil Annular formations between hole and white sclera, it includes many interlaced spots, filament, coronal, striped, crypts etc. Minutia.The minutia is exactly the biological characteristic of the user.In addition, it is necessary to, it is noted that iris is in development of fetus rank After section is formed, it will be to maintain in whole life course constant.These features determine the uniqueness of iris feature, while Determine the uniqueness of identification.Therefore, can be using the iris feature of eyes as everyone identification object.
It may be noted that when, pattern can be divided into owner's pattern and casual user's pattern.Owner's pattern can be with using terminal In any resource.And casual user's pattern can only be in using terminal part resource.For example, the user of owner's rank can be with Resource is marked.When the user of casual user's rank uses the terminal, terminal can be by labeled as important resource progress Hide.Optionally, terminal will can be encrypted labeled as important resource, then be hidden again.
It is appreciated that when, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal.When the biology to prestore When being characterized in the biological characteristic of the owner of the terminal, if the biological characteristic obtained and the biometric matches to prestore, illustrate Active user is host user.Optionally, the biological characteristic to prestore can be the biological characteristic of the owner of the terminal and use The feature of the user of this terminal.Optionally, the biological characteristic to prestore can be the feature for the user for using this terminal.Wherein, The feature of user is determined, it is possible to determine the identity of user.For example the unlocking manner of host user is than the solution of casual user Lock mode is simple.For example the unlocking manner of host user is unlocked by fingerprint, the unlocking manner unlocked by fingerprint of casual user adds iris Unblock.
It is appreciated that when, the rank of host user is higher than the rank of casual user.Therefore casual user can only see Host user set without the resource hidden.The resources such as important photo, contact person's mode, account can be labeled, when interim When user logs in, these resources can be encrypted hide.
In addition, optional, it is described user interface corresponding with the rank of the user is presented after, methods described is also Including:When the rank of the user is casual user, user described in the terminal-pair is taken pictures includes the use to obtain The picture of family facial characteristics, and the picture is stored.
It is appreciated that when, after temporary user logon, terminal can record information and the casual user of the casual user All operations.For example the casual user is taken pictures, preserve the photo of the casual user.Wherein, being included in the photo should The head portrait of casual user.The operation of casual user includes having browsed those files, which webpage having been browsed, and which file is carried out Modification is deleted.
In addition, it is necessary to point out when, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;Operation life according to the destination object and to the destination object Stored into the Operation Log of casual user, and by the Operation Log of the casual user.
It is understood that the Operation Log of casual user can be deposited according to the mark and date of casual user Shelves.For example casual user is A, then establishes a file according to A mark, operation is established according to the operating time each A Document.
In addition, it is necessary to point out when, for the important operation of casual user, must be backed up, such as casual user Delete file, then this document can be deleted, but this document can be backed up and hidden by terminal.It is specifically, described Method also includes:When the rank of the user is casual user, the file that the user deletes is determined;By the text of the deletion Part is backed up and hidden.
In addition, it is optional, after host user logs in, all operations before casual user can be checked, specific institute Stating method also includes:When it is determined that the rank of the user is owner's rank, presents in preset time period and operated the terminal The picture of casual user and the Operation Log of the casual user check for active user.
In the method described by Fig. 3, the checking of different difficulty is carried out to user according to the Dietary behavior that user selects, from And improve the security of terminal.
Referring to Fig. 4, Fig. 4 is a kind of structural representation of terminal disclosed in the embodiment of the present invention.At the end described by Fig. 4 In end, it can include:
Acquiring unit 401, for when the screen for detecting terminal is lit, obtaining the life for the user for operating the terminal Thing feature;
Matching unit 402, for the biological characteristic of acquisition to be matched to determine the use with the biological characteristic to prestore The rank at family;
Determining unit 403, for determining target unlocking manner corresponding with the rank according to the user;
Display unit 404, for corresponding with target unlocking manner unlock interface to be presented to cause the user to exist Validation information in the unlock interface;
Receiving unit 405, the checking information inputted for receiving the user in the unlock interface;
Display unit 404, for use corresponding with the rank of the user when the checking information passes through checking, to be presented Family operation interface;Wherein, the information presented in different user interfaces is different.
It is pointed out that the structure shown in Fig. 4 can be used for performing the method described in S101-S106.
Please refer to fig. 5, Fig. 5 is the structural representation of another terminal disclosed in the embodiment of the present invention.Shown in Fig. 5 Terminal can also include:
Acquiring unit 501, for when the screen for detecting terminal is lit, obtaining the life for the user for operating the terminal Thing feature;
Matching unit 502, for the biological characteristic of acquisition to be matched to determine the use with the biological characteristic to prestore The rank at family;
Determining unit 503, for determining target unlocking manner corresponding with the rank according to the user;
Display unit 504, for corresponding with target unlocking manner unlock interface to be presented to cause the user to exist Validation information in the unlock interface;
Receiving unit 505, the checking information inputted for receiving the user in the unlock interface;
Display unit 504, for use corresponding with the rank of the user when the checking information passes through checking, to be presented Family operation interface;Wherein, the information presented in different user interfaces is different.
Photographing unit 506, for when the rank of the user is casual user, user described in the terminal-pair to be clapped According to the picture that the user's face feature is included with acquisition;
Memory cell 507, for the picture to be stored.
Determining unit 503, it is additionally operable to, when the rank of the user is casual user, determine the target that the user chooses Object, and the operation to destination object progress;
Generation unit 508, casual user is generated for the operation according to the destination object and to the destination object Operation Log;
Memory cell 507, it is additionally operable to be stored the Operation Log of the casual user.
Determining unit 503, it is additionally operable to when the rank of the user is casual user, determine the text that the user deletes Part;
Backup units 509, for being backed up and being hidden the file of the deletion.
Display unit 504, it is additionally operable to when it is determined that the rank of the user is owner's rank, presents in preset time period and grasp Made the picture of the casual user of the terminal and the Operation Log of the casual user so that active user checks.
It is understood that the terminal described in Fig. 5 can be used for performing the method shown in S201-S208.
Also referring to Fig. 6, Fig. 6 is the structural representation of another user terminal disclosed in the embodiment of the present invention.Fig. 6 institutes The terminal shown includes:
Tip element 601, for above-mentioned when the screen for detecting terminal is lit, prompting user's selection enters terminal Pattern;
It is pointed out that the executive agent of the present embodiment is terminal.
In embodiments of the present invention, terminal can include cell phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA), each Terminal Type such as mobile internet device (Mobile Internet Device, MID), The embodiment of the present invention is not construed as limiting.
Determining unit 602, for determining the target pattern of above-mentioned user's selection;
Display unit 603, for login interface corresponding with the target pattern to be presented;Wherein, without corresponding to pattern Validation difficulty is different;
Acquiring unit 604, for obtaining the biological characteristic for the user for operating the terminal;
Display unit 603, it is additionally operable to when the biological characteristic passes through checking, user behaviour corresponding with the pattern is presented Make interface;Wherein, the information presented in user interface corresponding to different mode is different.
It is understood that the terminal described in Fig. 6 is able to carry out the method described in S301-S304.
Referring to Fig. 7, Fig. 7 is the structural representation of another terminal disclosed in the embodiment of the present invention, as shown in fig. 7, should Terminal can include:At least one processor 710, such as CPU, memory 720, at least one communication bus 730, input unit 740, display device 750.Wherein, communication bus 730 is used to realize the communication connection between these components.Memory 720 can be with It is high-speed RAM memory or non-labile memory (non-volatile memory), a for example, at least magnetic Disk storage.Memory 720 optionally can also be at least one storage device for being located remotely from aforementioned processor 710.Wherein, Processor 710 can store batch processing code, and processor 710 with reference to the terminal described by Fig. 4 to Fig. 6 in memory 720 The program code stored in memory 720 is called, for performing following operation:
When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;
The biological characteristic of acquisition is matched to determine the rank of the user with the biological characteristic to prestore;
It is determined that target unlocking manner corresponding with the rank according to the user;
Send and instruct to display device 750, to cause display device 750 that solution corresponding with the target unlocking manner is presented Interface is locked to cause user validation information in the unlock interface;
Receive the checking information that the user inputs in the unlock interface;
When the checking information passes through checking, send and instruct to display device 750, to cause display device 750 to present User interface corresponding with the rank of the user;Wherein, the information presented in different user interfaces is different.
Optionally, after presentation user interface corresponding with the rank of the user, the operation also includes:
When the rank of the user is casual user, the user is taken pictures and includes the user's face to obtain The picture of feature, and the picture is stored.
Optionally, the operation also includes:
When the rank of the user is casual user, the destination object that the user chooses is determined, and to the mesh Mark the operation that object is carried out;
The Operation Log of casual user is generated according to the destination object and the operation to the destination object, and by institute The Operation Log for stating casual user is stored.
Optionally, the operation also includes:
When the rank of the user is casual user, the file that the user deletes is determined;
The file of the deletion is backed up and hidden.
Can be target-seeking, the operation also includes:
When it is determined that the rank of the user is owner's rank, sends and instruct to display device 750, to cause display device Operated in 750 presentation preset time periods the picture of casual user and the Operation Log of the casual user of the terminal with Checked for active user.
When the screen for detecting terminal is lit, the biological characteristic for the user for operating the terminal is obtained;By acquisition Biological characteristic is matched with the biological characteristic to prestore to determine the rank of the user;It is determined that with the rank according to the user Corresponding target unlocking manner;Unlock interface corresponding with the target unlocking manner is presented to cause the user in the solution Lock validation information on interface;Receive the checking information that the user inputs in the unlock interface;When the checking letter When breath passes through checking, user interface corresponding with the rank of the user is presented;Wherein, in different user interfaces The information of middle presentation is different.Pass through above-mentioned technical proposal, it can determine to use according to the biological characteristic of the user of current operation terminal Family rank, and verification mode corresponding with the user class is determined, when the authentication succeeds, present eventually corresponding with the user class User interface, wherein, the information that is presented in different user interfaces is different, so as to different according to user class The information of presentation is also different, and then lifts the security of end message.
Referring to Fig. 8, the frame of the part-structure of the mobile phone for the terminal correlation that Fig. 8, which is one embodiment of the present of invention, to be provided Figure.With reference to figure 8, mobile phone includes:It is radio frequency (Radio Frequency, RF) circuit 810, memory 820, input block 830, aobvious Show unit 840, sensor 850, voicefrequency circuit 860, Wireless Fidelity (Wireless Fidelity, WiFi) module 870, processing The part such as device 880 and power supply 890.It will be understood by those skilled in the art that the handset structure shown in Fig. 8 is not formed pair The restriction of mobile phone, it can include than illustrating more or less parts, either combine some parts or different part cloth Put.
Each component parts of mobile phone is specifically introduced with reference to Fig. 8:
RF circuits 810 can be used for the reception and transmission of information.Generally, RF circuits 810 include but is not limited to antenna, at least one Individual amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuits 810 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code division it is more Location (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memory 820 can be used for storage software program and module, and processor 880 is stored in memory 820 by operation Software program and module, so as to perform the various function application of mobile phone and data processing.Memory 820 can mainly include Storing program area and storage data field, wherein, storing program area can storage program area, the application journey needed at least one function Sequence (such as the function of unlocking screen, the function of biometric authentication, camera function etc.) etc.;Storage data field can be stored according to mobile phone Use created data (such as corresponding relation of the biological characteristic that prestores, user type and biological characteristic validation mode etc.) etc.. In addition, memory 820 can include high-speed random access memory, nonvolatile memory, for example, at least one can also be included Individual disk memory, flush memory device or other volatile solid-state parts.
Input block 830 can be used for the numeral or character information for receiving input, and produce with the user of mobile phone set with And the key signals input that function control is relevant.Specifically, input block 830 may include fingerprint recognition module 831 and other are defeated Enter equipment 832.Fingerprint recognition module 831, user can be gathered in finger print data thereon.Optionally, fingerprint recognition module 831 can Including optical fingerprint module, capacitance type fingerprint module and RF-type fingerprint module.It is condenser type with fingerprint recognition module 831 Exemplified by fingerprint recognition module, specifically include induction electrode (n1 abnormal induction electrodes and n2 normal induction electrode) and with it is described The signal processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.) of induction electrode connection.Except referring to Line identifies module 831, and input block 830 can also include other input equipments 832.Specifically, other input equipments 832 can be with Including but not limited to physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. In one or more.
Display unit 840 can be used for display by user input information or be supplied to user information and mobile phone it is various Menu.Display unit 840 may include display screen 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 841.Although in fig. 8, fingerprint recognition module 831 and display screen 841 are the parts independent as two to realize mobile phone Input and input function, it is but in some embodiments it is possible to fingerprint recognition module 831 and display screen 841 is integrated and real The input of existing mobile phone and output function.
Mobile phone may also include at least one sensor 850, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to ambient light Light and shade adjust the brightness of display screen 841, proximity transducer can when mobile phone is moved in one's ear, close display screen 841 and/or Backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions the big of (generally three axles) acceleration It is small, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (such as horizontal/vertical screen switching, phase Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Voicefrequency circuit 860, loudspeaker 881, microphone 882 can provide the COBBAIF between user and mobile phone.Audio-frequency electric Electric signal after the voice data received conversion can be transferred to loudspeaker 881, sound is converted to by loudspeaker 881 by road 860 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 882, is turned after being received by voicefrequency circuit 860 Voice data is changed to, then after voice data output processor 880 is handled, through RF circuits 810 to be sent to such as another mobile phone, Or voice data is exported to memory 820 further to handle.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronicses postal by WiFi module 870 Part, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 8 is shown WiFi module 870, but it is understood that, it is simultaneously not belonging to must be configured into for mobile phone, can not change as needed completely Become in the essential scope of invention and omit.
Processor 880 is the control centre of mobile phone, using various interfaces and the various pieces of connection whole mobile phone, is led to Cross operation or perform the software program and/or module being stored in memory 820, and call and be stored in memory 820 Data, the various functions and processing data of mobile phone are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor 880 can wrap Include one or more processing units;Preferably, processor 880 can integrate application processor and modem processor, wherein, should Operating system, user interface and application program etc. are mainly handled with processor, modem processor mainly handles radio communication. It is understood that above-mentioned modem processor can not also be integrated into processor 880.
Mobile phone also includes the power supply 890 (such as battery) to all parts power supply, it is preferred that power supply can pass through power supply pipe Reason system and processor 880 are logically contiguous, so as to realize management charging, electric discharge and power managed by power-supply management system Etc. function.
Although being not shown, mobile phone can also include camera, bluetooth module etc., will not be repeated here.
In embodiment shown in earlier figures 1a, Fig. 2, Fig. 3, each step method flow can the structure based on the mobile phone it is real It is existing.
In embodiment shown in earlier figures 4, Fig. 5, Fig. 6, each unit function can based on the mobile phone structure realize.
Referring to Fig. 9, Fig. 9 is the structural representation of another terminal disclosed in the embodiment of the present invention, the terminal includes Reception device 910, physical characteristics collecting device 920, display screen 930 and application processor AP940;
Physical characteristics collecting device 920, for when the screen for detecting terminal is lit, obtaining and operating the terminal The biological characteristic of user;
Wherein it is possible to understand, physical characteristics collecting device 920 can be fingerprint acquisition device, can be adopted with palmmprint Acquisition means, it can also be vocal print harvester, etc..
AP940, for the biological characteristic of acquisition to be matched to determine the level of the user with the biological characteristic to prestore Not;And determine target unlocking manner corresponding with the rank according to the user;
Display screen 930, for corresponding with target unlocking manner unlock interface to be presented to cause the user in institute State validation information in unlock interface;
Reception device 910, the checking information inputted for receiving the user in the unlock interface;
Display screen 930, for when the checking information passes through checking, user corresponding with the rank of the user to be presented Operation interface;Wherein, the information presented in different user interfaces is different.
Optionally, the terminal also includes camera 950 and memory 960;
Camera 950, for when the rank of the user is casual user, user described in the terminal-pair to be taken pictures To obtain the picture for including the user's face feature;
Memory 960, for the picture to be stored.
Optionally, AP940, it is additionally operable to, when the rank of the user is casual user, determine the mesh that the user chooses Mark object, and the operation to destination object progress;And according to the destination object and the behaviour to the destination object Make the Operation Log of generation casual user;
Memory 960, it is additionally operable to be stored the Operation Log of the casual user.
Optionally, AP940, it is additionally operable to when the rank of the user is casual user, determine the text that the user deletes Part;The file of the deletion is backed up and hidden.
Optionally, display screen 930, for when it is determined that the rank of the user is owner's rank, preset time period to be presented The picture of the casual user of the terminal and the Operation Log of the casual user were inside operated so that active user checks.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can To instruct the hardware of correlation to complete by program, the program can be stored in a computer-readable recording medium, storage Medium include read-only storage (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), programmable read only memory (Programmable Read-only Memory, PROM), erasable programmable is read-only deposits Reservoir (Erasable Programmable Read Only Memory, EPROM), disposable programmable read-only storage (One- Time Programmable Read-Only Memory, OTPROM), the electronics formula of erasing can make carbon copies read-only storage (Electrically-Erasable Programmable Read-Only Memory, EEPROM), read-only optical disc (Compact Disc Read-Only Memory, CD-ROM) or other disk storages, magnetic disk storage, magnetic tape storage or can For carrying or any other computer-readable medium of data storage.
A kind of solution screen locking method and user terminal based on image disclosed in the embodiment of the present invention have been carried out in detail above Introduce, specific case used herein is set forth to the principle and embodiment of the present invention, the explanation of above example It is only intended to help the method and its core concept for understanding the present invention;Meanwhile for those of ordinary skill in the art, according to this The thought of invention, there will be changes in specific embodiments and applications, in summary, this specification content should It is interpreted as limitation of the present invention.

Claims (14)

  1. A kind of 1. method of unlocking screen, it is characterised in that methods described includes:
    When the screen for detecting terminal is lit, user is prompted to carry out fingerprint authentication and face verification;
    Receive the finger print information of user's typing, and judge the typing finger print information be pre-stored fingerprint information whether Match somebody with somebody;
    The picture for including face characteristic is obtained, and face verification is carried out to the face characteristic in the picture;
    When the finger print information of the typing passes through people with the pre-stored fingerprint information matches and the picture comprising face characteristic When face is verified, unlocking screen is carried out.
  2. 2. according to the method for claim 1, it is characterised in that the face characteristic in the picture carries out face and tested Card includes:
    Determine the face location in the picture;
    Line definition identification is entered to the picture of the face location;
    When the definition meets preset requirement, the face location picture is matched with the faceform to prestore;
    When the match is successful, it is determined that the picture comprising face characteristic passes through face verification.
  3. 3. according to the method for claim 2, it is characterised in that methods described also includes:
    When the definition is unsatisfactory for preset requirement, the user is prompted to carry out photograph taking special comprising face to obtain again The picture of sign;
    Face verification is carried out to the picture of shooting;
    If authentication failed, prompt that operation can not be unlocked to the terminal in the user preset duration.
  4. 4. according to the method for claim 3, it is characterised in that methods described also includes:
    The time of this unblock is matched to determine the time of this time unblock with the terminal use habit model of the user Whether the use habit of the user is met;
    When the time of this unblock is not meet the use habit of the user, this terminal unlocking is recorded as abnormal solution Lock;
    Abnormal operation acknowledging time point is determined according to the terminal use habit model of the user;
    In the abnormal operation acknowledging time point the abnormal unlocking information is pushed to the user.
  5. 5. according to the method for claim 4, it is characterised in that methods described also includes:
    Obtain the usage record of the terminal in preset time period;
    The usage record is learnt according to default machine learning algorithm to obtain the custom model of the user.
  6. 6. a kind of terminal, it is characterised in that the terminal includes reception device, physical characteristics collecting device, display screen and answered With processor AP;
    The physical characteristics collecting device, for when the screen for detecting terminal is lit, obtaining the use for operating the terminal The biological characteristic at family;
    The application processor, for the biological characteristic of acquisition to be matched to determine the user with the biological characteristic to prestore Rank;And determine target unlocking manner corresponding with the rank according to the user;
    The display screen, for corresponding with target unlocking manner unlock interface to be presented to cause the user in the solution Lock validation information on interface;
    The reception device, the checking information inputted for receiving the user in the unlock interface;
    The display screen, for user behaviour corresponding with the rank of the user when the checking information passes through checking, to be presented Make interface;Wherein, the information presented in different user interfaces is different.
  7. 7. terminal according to claim 6, it is characterised in that the terminal also includes camera and memory;
    The camera, for when the rank of the user is casual user, user described in the terminal-pair taken pictures with Obtain the picture for including the user's face feature;
    The memory, for the picture to be stored.
  8. 8. terminal according to claim 7, it is characterised in that
    The AP, it is additionally operable to, when the rank of the user is casual user, determine the destination object that the user chooses, and The operation carried out to the destination object;And the interim use of operation generation according to the destination object and to the destination object The Operation Log at family;
    The memory, it is additionally operable to be stored the Operation Log of the casual user.
  9. 9. terminal according to claim 8, it is characterised in that
    The AP, it is additionally operable to when the rank of the user is casual user, determine the file that the user deletes;Deleted described The file removed is backed up and hidden.
  10. 10. terminal according to claim 9, it is characterised in that
    The display screen, for when it is determined that the rank of the user is owner's rank, presenting in preset time period and operating institute The picture of the casual user of terminal and the Operation Log of the casual user are stated so that active user checks.
  11. 11. a kind of terminal, it is characterised in that the terminal includes:
    Acquiring unit, for when the screen for detecting terminal is lit, obtaining the biological characteristic for the user for operating the terminal;
    Matching unit, for the biological characteristic of acquisition to be matched to determine the level of the user with the biological characteristic to prestore Not;
    Determining unit, for determining target unlocking manner corresponding with the rank according to the user;
    Display unit, for corresponding with target unlocking manner unlock interface to be presented to cause the user in the unblock Validation information on interface;
    Receiving unit, the checking information inputted for receiving the user in the unlock interface;
    The display unit, for when the checking information passes through checking, user corresponding with the rank of the user to be presented Operation interface;Wherein, the information presented in different user interfaces is different.
  12. A kind of 12. terminal, it is characterised in that including:
    It is stored with the memory of executable program code;
    The processor coupled with the memory;
    The processor calls the executable program code stored in the memory, performs such as claim 1 to right It is required that the method described in 5 any one.
  13. A kind of 13. computer-readable recording medium, it is characterised in that it stores the computer program for electronic data interchange, Wherein, the computer program causes terminal to perform the method as described in claim 1 to any one of claim 5.
  14. A kind of 14. mobile terminal, it is characterised in that including:The terminal includes reception device, physical characteristics collecting device, shown Display screen and application processor AP;And be stored in the program code of the memory, when described program code is run, Above-mentioned all parts cooperation is performed such as the instruction of any one of claim 1-6 method.
CN201710585125.9A 2017-07-17 2017-07-17 A kind of method of unlocking screen, terminal and storage medium Pending CN107451445A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710585125.9A CN107451445A (en) 2017-07-17 2017-07-17 A kind of method of unlocking screen, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710585125.9A CN107451445A (en) 2017-07-17 2017-07-17 A kind of method of unlocking screen, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN107451445A true CN107451445A (en) 2017-12-08

Family

ID=60487774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710585125.9A Pending CN107451445A (en) 2017-07-17 2017-07-17 A kind of method of unlocking screen, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN107451445A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509884A (en) * 2018-03-26 2018-09-07 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN108959888A (en) * 2018-07-09 2018-12-07 北京小米移动软件有限公司 terminal operation control method and device
CN109064217A (en) * 2018-07-16 2018-12-21 阿里巴巴集团控股有限公司 Method, apparatus and electronic equipment are determined based on the core body strategy of user gradation
CN109740331A (en) * 2018-12-26 2019-05-10 努比亚技术有限公司 Terminal protection method, terminal and computer readable storage medium
CN111079114A (en) * 2019-12-13 2020-04-28 Oppo(重庆)智能科技有限公司 Unlocking method, device, terminal and computer readable storage medium
CN115562048A (en) * 2022-08-19 2023-01-03 北京卡特加特智能科技有限公司 Security central control panel for hardware circuit starting system communication and application method

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533546A (en) * 2013-10-29 2014-01-22 无锡赛思汇智科技有限公司 Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN104166844A (en) * 2014-08-13 2014-11-26 惠州Tcl移动通信有限公司 Login method and system through human face identification based on mobile terminal
CN104182500A (en) * 2014-08-15 2014-12-03 深圳市中兴移动通信有限公司 Safety reminding method and device
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal
CN105095717A (en) * 2015-07-23 2015-11-25 小米科技有限责任公司 Processing method and processing device of exception event, and electronic equipment
CN105447368A (en) * 2015-11-13 2016-03-30 广东欧珀移动通信有限公司 User terminal access right control method and user terminal
CN106022071A (en) * 2016-05-31 2016-10-12 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal
US20160315942A1 (en) * 2015-04-21 2016-10-27 Fu Tai Hua Industry (Shenzhen) Co., Ltd. Electronic device with addiction-prevention function and method thereof
CN106570370A (en) * 2016-03-18 2017-04-19 深圳市全智达科技有限公司 User identity identification method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533546A (en) * 2013-10-29 2014-01-22 无锡赛思汇智科技有限公司 Implicit user verification and privacy protection method based on multi-dimensional behavior characteristics
CN103927466A (en) * 2014-04-01 2014-07-16 可牛网络技术(北京)有限公司 Method and device for controlling mobile terminal
CN104166844A (en) * 2014-08-13 2014-11-26 惠州Tcl移动通信有限公司 Login method and system through human face identification based on mobile terminal
CN104182500A (en) * 2014-08-15 2014-12-03 深圳市中兴移动通信有限公司 Safety reminding method and device
CN104268453A (en) * 2014-09-24 2015-01-07 可牛网络技术(北京)有限公司 Method and device for application program safety management for terminal equipment, and terminal
US20160315942A1 (en) * 2015-04-21 2016-10-27 Fu Tai Hua Industry (Shenzhen) Co., Ltd. Electronic device with addiction-prevention function and method thereof
CN105095717A (en) * 2015-07-23 2015-11-25 小米科技有限责任公司 Processing method and processing device of exception event, and electronic equipment
CN105447368A (en) * 2015-11-13 2016-03-30 广东欧珀移动通信有限公司 User terminal access right control method and user terminal
CN106570370A (en) * 2016-03-18 2017-04-19 深圳市全智达科技有限公司 User identity identification method and device
CN106022071A (en) * 2016-05-31 2016-10-12 广东欧珀移动通信有限公司 Fingerprint unlocking method and terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108509884A (en) * 2018-03-26 2018-09-07 维沃移动通信有限公司 A kind of unlocking method and mobile terminal
CN108509884B (en) * 2018-03-26 2020-06-19 维沃移动通信有限公司 Unlocking method and mobile terminal
CN108959888A (en) * 2018-07-09 2018-12-07 北京小米移动软件有限公司 terminal operation control method and device
CN109064217A (en) * 2018-07-16 2018-12-21 阿里巴巴集团控股有限公司 Method, apparatus and electronic equipment are determined based on the core body strategy of user gradation
CN109740331A (en) * 2018-12-26 2019-05-10 努比亚技术有限公司 Terminal protection method, terminal and computer readable storage medium
CN111079114A (en) * 2019-12-13 2020-04-28 Oppo(重庆)智能科技有限公司 Unlocking method, device, terminal and computer readable storage medium
CN115562048A (en) * 2022-08-19 2023-01-03 北京卡特加特智能科技有限公司 Security central control panel for hardware circuit starting system communication and application method

Similar Documents

Publication Publication Date Title
CN107451445A (en) A kind of method of unlocking screen, terminal and storage medium
WO2018032661A1 (en) Information displaying method for terminal device, and terminal device
RU2618932C2 (en) Method, installation and device of unblocking process for terminal
US9940448B2 (en) Unlock processing method and device
CN104966005A (en) Access control method and terminal apparatus
CN106506820B (en) Backup method and device for mobile terminal data
CN107437009A (en) Authority control method and related product
CN106022071B (en) A kind of method and terminal of unlocked by fingerprint
CN107580114A (en) Biometric discrimination method, mobile terminal and computer-readable recording medium
CN107391990A (en) A kind of method, terminal and storage medium for identifying user
CN106534093B (en) A kind of processing method of terminal data, apparatus and system
CN104573437B (en) Information authentication method, device and terminal
CN108781234A (en) Function control method and terminal
CN106231575B (en) Method for processing short messages and device
CN108021470A (en) A kind of data backup method, mobile terminal and computer-readable recording medium
CN108491713B (en) Safety reminding method and electronic equipment
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN108804915A (en) Virus method for cleaning, storage device and electric terminal
CN108459814A (en) Using startup method, mobile terminal and computer readable storage medium
CN115565236A (en) Face recognition attack processing method, device, equipment and storage medium
CN108197448A (en) Document display method, device, readable storage medium storing program for executing and terminal
CN107944242B (en) Biological identification function disabling method and mobile terminal
CN108229117A (en) Flexible screen terminal and its method of controlling security and computer readable storage medium
CN107317908B (en) A kind of user knows method for distinguishing, terminal and storage medium
CN109544168A (en) Method of payment, device, mobile terminal and storage medium based on double-sided screen

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171208

RJ01 Rejection of invention patent application after publication