CN107526955B - Screen-off unlocking method and device - Google Patents

Screen-off unlocking method and device Download PDF

Info

Publication number
CN107526955B
CN107526955B CN201710751185.3A CN201710751185A CN107526955B CN 107526955 B CN107526955 B CN 107526955B CN 201710751185 A CN201710751185 A CN 201710751185A CN 107526955 B CN107526955 B CN 107526955B
Authority
CN
China
Prior art keywords
unlocking
screen
application program
equipment
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710751185.3A
Other languages
Chinese (zh)
Other versions
CN107526955A (en
Inventor
张海平
周意保
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710751185.3A priority Critical patent/CN107526955B/en
Publication of CN107526955A publication Critical patent/CN107526955A/en
Application granted granted Critical
Publication of CN107526955B publication Critical patent/CN107526955B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention discloses a screen-off unlocking method and a screen-off unlocking device, wherein the method comprises the following steps: when a user unlocks a target device in a screen-off state, judging whether any device belonging to the same user in a preset range is successfully unlocked within effective time; and if the successful unlocking operation of any equipment within the effective time is judged and known, the target equipment is automatically unlocked. Therefore, the unlocking operation of a legal user is avoided being carried out for many times, and the unlocking time is reduced on the premise of ensuring the unlocking validity.

Description

Screen-off unlocking method and device
Technical Field
The invention relates to the technical field of information processing, in particular to a screen-off unlocking method and device.
Background
Along with the rise of terminal equipment such as smart phones, the requirement of users on the safety of the terminal equipment is higher and higher, and in order to meet the requirement of the users, the terminal equipment can automatically lock and extinguish a screen after the users do not operate for a certain time, or the users manually trigger corresponding controls to lock and extinguish the screen after using the terminal equipment, so that the safety of user information is ensured. Therefore, when the user uses the terminal device daily, the user needs to perform multiple unlocking operations, even hundreds of unlocking operations can be performed sometimes, and time is wasted, so that a method capable of effectively reducing the unlocking time is urgently needed.
Disclosure of Invention
The invention provides a screen-off unlocking method and device, and aims to solve the technical problem that in the prior art, a large amount of time is occupied by unlocking.
The embodiment of the invention provides a screen-off unlocking method, which comprises the following steps: when a user unlocks a target device in a screen-off state, judging whether any device belonging to the same user in a preset range is successfully unlocked within effective time; and if the successful unlocking operation of any equipment in the effective time is judged and known, the target equipment is automatically unlocked.
Another embodiment of the present invention provides a screen-off unlocking device, including: the judging module is used for judging whether any equipment belonging to the same user in a preset range is successfully unlocked within effective time when a user unlocks the target equipment in the screen-off state; and the processing module is used for automatically unlocking the target equipment when judging and knowing that the any equipment is successfully unlocked within the effective time.
Another embodiment of the present invention provides a terminal device, including a memory and a processor, where the memory stores computer readable instructions, and the instructions, when executed by the processor, cause the processor to execute the screen-off and unlocking method according to the foregoing embodiment of the present invention.
Yet another embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the screen-out and unlocking method as described in the above embodiments.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
according to the screen-off unlocking method provided by the embodiment of the invention, when a user unlocks the target equipment in the screen-off state, whether any equipment belonging to the same user in a preset range is successfully unlocked within the effective time is judged, and if the successful unlocking within the effective time of any equipment is judged, the target equipment is automatically unlocked. Therefore, the unlocking operation of a legal user is avoided being carried out for many times, and the unlocking time is reduced on the premise of ensuring the unlocking validity.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a flow chart of a method of screen-out unlocking according to one embodiment of the present invention;
FIG. 2 is a flow chart of a method of screen-out unlocking according to another embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a screen-out unlocking device according to one embodiment of the invention;
FIG. 4 is a schematic structural diagram of a screen-out unlocking device according to another embodiment of the invention;
FIG. 5 is a schematic structural diagram of a screen-out unlocking device according to yet another embodiment of the invention; and
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are illustrative and intended to be illustrative of the invention and are not to be construed as limiting the invention.
The following describes a screen-off unlocking method and device according to an embodiment of the present invention with reference to the drawings.
Fig. 1 is a flowchart of a method for unlocking a screen, according to an embodiment of the present invention, as shown in fig. 1, the method includes:
step 101, when a user performs an unlocking operation on a target device in a screen-off state, judging whether any device belonging to the same user in a preset range performs an unlocking success operation within a valid time.
The target device is a device to be unlocked, and can be hardware devices with various operating systems, such as a smart phone, a tablet computer, a personal digital assistant and wearable devices, and the wearable devices can be smart bracelets, smart watches, smart glasses and the like.
The preset range may be calibrated according to an experiment, and may include that a linear distance from the target device is less than or equal to a preset threshold, for example, the linear distance may be 1 meter or 2 meters, or the linear distance from the target device is less than or equal to the preset threshold, and the valid time may be calibrated according to an operation habit of the user, where the slower the operation of the user is, the longer the valid time set for the user is, and the valid time is used to ensure that the same user is currently located near the target device.
Specifically, in order to determine whether a user performing an operation is the user of the target device, when the user performs an unlocking operation on the target device in a screen-off state, it is determined whether any device belonging to the same user within a preset range has performed an unlocking success operation within a valid time.
In order to avoid that in some scenarios, the any device is near the target device but may be carried by other users, and therefore, whether the unlocking success operation is performed or not needs to be determined by determining whether the unlocking success operation is performed or not within the valid time to determine the validity of the user.
It should be noted that, according to different application scenarios, different implementation manners may be adopted to determine whether any device belonging to the same user in a preset range performs successful unlocking operation within an effective time, which is described as follows:
as a possible implementation manner, heartbeat connections between the target device and all devices belonging to the same user within a preset range are established, and whether an unlocking success notification message sent by any device is received within the valid time is judged.
In this example, in a passive manner, an unlocking success notification message of any device belonging to the same user is received, and if the unlocking success notification message sent by any device is received within the valid time, it indicates that the same user as the target device is in the vicinity of the target device.
As another possible implementation manner, the unlocking inquiry request within the valid time is sent to all the devices belonging to the same user within the preset range, and whether any one device has successfully unlocked is judged according to the response messages sent by all the devices.
In this example, an active manner is adopted to send an unlocking inquiry request to any device belonging to the same user, and if it is determined that an unlocking success notification message of any device is received within the valid time, it indicates that the same user as the target device is in the vicinity of the target device.
And 102, if the successful unlocking operation of any equipment in the effective time is judged and known, automatically unlocking the target equipment.
It should be emphasized that the automatic unlocking processing in the embodiment of the present invention does not mean automatic unlocking of the bright screen, but eliminates a step of inputting an unlocking operation by a user, thereby avoiding waste of electric quantity caused by bright screen when the user does not use the target terminal device.
Specifically, if it is judged that successful unlocking operation of any device is carried out within the effective time, it is indicated that the user of the target device is currently near the target device, and at this time, unlocking operation for carrying out validity verification on the user is obviously unnecessary, so that automatic unlocking processing is carried out on the user, and the user does not need to input a fingerprint for unlocking, or iris for unlocking, or a password for unlocking, and the like, so that the operation of the user is facilitated, and the operation time of the user is saved.
At this time, it can be understood that, because the user is located near the target device, even if the target terminal device that is automatically unlocked is used by other users, the user can see the target terminal device, so that the safety of the used target device is ensured, and in some application scenarios, convenience is provided for the user to share information for other users, so that the user is prevented from directly sharing information through manual unlocking operation, or the user directly operates the target device to browse the information that the user wants to share.
It should be emphasized that, at this time, the distance from the user to the target device is detected, and once the preset range is exceeded, Bianco exits the security mechanism to ensure the security of the user information.
Certainly, in some application scenarios, the security level of some applications is higher, such as payment-type applications, and in order to ensure the security of user information, in the embodiment of the present invention, after the automatic unlocking is performed on the application of the type, if the payment-type application is currently running in the foreground, the validity of the user still needs to be verified through a related unlocking manner.
Specifically, in an embodiment of the present invention, as shown in fig. 2, before the step 101, the method further includes:
step 201, detecting whether the application program operated in the foreground when the target device is in the screen-off operation is a payment application program.
Specifically, the method may detect an application program that is foreground-run when the target device is turned off in a manner of hook function call, or in a manner of querying a related code in a query system, and detect whether the application program is a payment-type application program by comparing an identifier of the application program with an identifier of the payment-type application program.
The identifier of the application program may be information that can uniquely identify the application program, such as a pattern and a registration code of the application program.
Step 202, if the payment application program is detected, obtaining a password provided by the user according to a preset unlocking mode, and verifying unlocking.
Specifically, if the payment application program is detected, the password provided by the user is still obtained according to a preset unlocking mode because the security level of the payment application program is high, and the unlocking is verified, wherein the preset unlocking mode is different according to different application scenes, for example, the preset unlocking mode may be an unlocking mode such as fingerprint, iris, eye pattern, face and face recognition.
Of course, in an embodiment of the present invention, if the application program that is run in the foreground when the target device is operated in the screen-off state is not an application program with a higher security level, such as a payment-type application program, the target device can enter the application program without unlocking verification again.
In summary, in the screen-off unlocking method according to the embodiment of the present invention, when a user performs an unlocking operation on a target device in a screen-off state, it is determined whether any device belonging to the same user in a preset range has performed an unlocking successful operation within an effective time, and if it is determined that any device has performed an unlocking successful operation within the effective time, the target device is automatically unlocked. Therefore, the unlocking operation of a legal user is avoided being carried out for many times, and the unlocking time is reduced on the premise of ensuring the unlocking validity.
In order to implement the above embodiment, the present invention further provides a screen-extinguishing unlocking device, and fig. 3 is a schematic structural diagram of the screen-extinguishing unlocking device according to an embodiment of the present invention, and as shown in fig. 3, the screen-extinguishing unlocking device includes: a judging module 100 and a processing module 200.
The determining module 100 is configured to determine whether any device belonging to the same user in a preset range has performed successful unlocking operation within a valid time when a user performs unlocking operation on a target device in a screen-off state.
The processing module 200 is configured to automatically unlock the target device when it is determined that the successful unlocking operation is performed on any device within the valid time.
In an embodiment of the present invention, as shown in fig. 4, the determining module 100 includes a establishing unit 110 and a first determining unit 120.
The establishing unit 110 is configured to establish a heartbeat connection between the target device and all devices belonging to the same user within a preset range.
A first judging unit 120, configured to judge whether an unlocking success notification message sent by any device is received within the valid time.
In one embodiment of the present invention, as shown in fig. 5, the determining module 100 includes a transmitting unit 130 and a second determining unit 140.
The sending unit 130 is configured to send an unlocking query request within a valid time to all devices belonging to the same user within a preset range.
The second judging unit 140 is configured to judge whether any device has performed an unlocking success operation according to the response messages sent by all devices.
It should be noted that the foregoing explanation of the screen-off unlocking method is also applicable to the screen-off unlocking device in the embodiment of the present invention, and details not disclosed in the embodiment of the present invention are not repeated herein.
The division of each module in the screen-off unlocking device is only used for illustration, and in other embodiments, the screen-off unlocking device may be divided into different modules as needed to complete all or part of the functions of the screen-off unlocking device.
In summary, in the screen-off unlocking device according to the embodiment of the present invention, when a user performs an unlocking operation on a target device in a screen-off state, it is determined whether any device belonging to the same user in a preset range has performed an unlocking successful operation within an effective time, and if it is determined that any device has performed an unlocking successful operation within the effective time, the target device is automatically unlocked. Therefore, the unlocking operation of a legal user is avoided being carried out for many times, and the unlocking time is reduced on the premise of ensuring the unlocking validity.
In order to implement the foregoing embodiment, the present invention further provides a computer device, and fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
As shown in fig. 6, the terminal device includes:
a memory 61, a processor 62, and computer programs stored on the memory 61 and executable on the processor 62.
The processor 62, when executing the program, implements the screen-off unlocking method provided in the above-described embodiment.
Further, the screen-off unlocking device further comprises:
a communication interface 63 for communication between the memory 61 and the processor 62.
A memory 61 for storing computer programs executable on the processor 62.
The memory 61 may comprise a high-speed RAM memory, and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
And the processor 62 is configured to implement the screen-off and unlocking method according to the foregoing embodiment when executing the program.
If the memory 61, the processor 62 and the communication interface 63 are implemented independently, the communication interface 63, the memory 61 and the processor 62 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 6, but it is not intended that there be only one bus or one type of bus.
Alternatively, in practical implementation, if the memory 61, the processor 62 and the communication interface 63 are integrated on one chip, the memory 61, the processor 62 and the communication interface 63 may complete communication with each other through an internal interface.
The processor 62 may be a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement embodiments of the present invention.
In order to implement the above embodiments, the present invention further provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements the screen-out and unlocking method as described in the above embodiments.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing steps of a custom logic function or process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc. Although embodiments of the present invention have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present invention, and that variations, modifications, substitutions and alterations can be made to the above embodiments by those of ordinary skill in the art within the scope of the present invention.

Claims (6)

1. A screen-off unlocking method is characterized by comprising the following steps:
when a user unlocks a target device in a screen-off state, detecting whether an application program operated in a foreground when the target device is in the screen-off state is a payment application program;
if the application program is not the payment application program, sending an unlocking inquiry request within the valid time to all equipment belonging to the same user within a preset range;
judging whether any equipment is successfully unlocked according to response messages sent by all the equipment;
and if the successful unlocking operation of any equipment in the effective time is judged and known, the target equipment is automatically unlocked.
2. The method of claim 1, wherein the preset range comprises:
the linear distance from the target equipment is less than or equal to a preset threshold value;
or,
and the radius of the circular range is a preset value by taking the position of the target equipment as the center of a circle.
3. The method of claim 1, wherein after the detecting whether the application running in foreground while the target device is in the off-screen operation is a payment-type application, further comprising:
and if the payment application program is detected, acquiring the password provided by the user according to a preset unlocking mode, and verifying unlocking.
4. A screen-extinguishing unlocking device, comprising:
the device comprises a judging module, a display module and a control module, wherein the judging module is used for detecting whether an application program operated by a foreground when the target device is in the screen-off state is a payment application program when the target device is in the screen-off state to unlock, and sending an unlocking inquiry request within effective time to all devices belonging to the same user within a preset range when the application program is not the payment application program, and judging whether any device is successfully unlocked according to response messages sent by all the devices;
and the processing module is used for automatically unlocking the target equipment when judging and knowing that the any equipment is successfully unlocked within the effective time.
5. A terminal device, comprising a memory and a processor, wherein the memory stores computer readable instructions, and the instructions, when executed by the processor, cause the processor to perform the screen-off and unlocking method according to any one of claims 1 to 3.
6. A non-transitory computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the screen-out and unlocking method according to any one of claims 1 to 3.
CN201710751185.3A 2017-08-28 2017-08-28 Screen-off unlocking method and device Active CN107526955B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710751185.3A CN107526955B (en) 2017-08-28 2017-08-28 Screen-off unlocking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710751185.3A CN107526955B (en) 2017-08-28 2017-08-28 Screen-off unlocking method and device

Publications (2)

Publication Number Publication Date
CN107526955A CN107526955A (en) 2017-12-29
CN107526955B true CN107526955B (en) 2020-12-01

Family

ID=60682392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710751185.3A Active CN107526955B (en) 2017-08-28 2017-08-28 Screen-off unlocking method and device

Country Status (1)

Country Link
CN (1) CN107526955B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109033781A (en) * 2018-07-04 2018-12-18 Oppo(重庆)智能科技有限公司 A kind of electronic equipment control method, electronic appliance controlling device and electronic equipment
CN110830424A (en) * 2018-08-13 2020-02-21 成都鼎桥通信技术有限公司 Control method and device for unlocking function
CN110244894A (en) * 2019-06-19 2019-09-17 清华大学 A kind of control method of screen locking, device, handheld terminal and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092817A (en) * 2014-06-24 2014-10-08 惠州Tcl移动通信有限公司 Method and system for automatic short-distance unlocking of mobile terminal
CN105872255A (en) * 2016-05-31 2016-08-17 努比亚技术有限公司 Device and method for achieving rapid unlocking
CN106650347A (en) * 2016-09-28 2017-05-10 努比亚技术有限公司 Synchronous unblocking method, device and terminals

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060224882A1 (en) * 2005-03-31 2006-10-05 Microsoft Corporation Method and system for unlocking a computing device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092817A (en) * 2014-06-24 2014-10-08 惠州Tcl移动通信有限公司 Method and system for automatic short-distance unlocking of mobile terminal
CN105872255A (en) * 2016-05-31 2016-08-17 努比亚技术有限公司 Device and method for achieving rapid unlocking
CN106650347A (en) * 2016-09-28 2017-05-10 努比亚技术有限公司 Synchronous unblocking method, device and terminals

Also Published As

Publication number Publication date
CN107526955A (en) 2017-12-29

Similar Documents

Publication Publication Date Title
US11036840B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
US20150067827A1 (en) Apparatus and method for setting a user-defined pattern for an application
CN107526955B (en) Screen-off unlocking method and device
CN106096539A (en) A kind of method carrying out bio-identification and terminal
US10831881B2 (en) Method and terminal for enhancing information security
CN110875819B (en) Password operation processing method, device and system
CN106412293B (en) Foreign matter detection method and device and terminal equipment
CN112215025B (en) Radio frequency card function calling method and device
CN106708476B (en) Single-machine application instruction processing method and device
CN112996020B (en) Bluetooth-based automatic test method and device and Bluetooth test terminal
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
US20120185932A1 (en) Sensing and Secure Processing
CN106911727B (en) Application program log-in control method, device and intelligent terminal
CN110704198A (en) Data operation method, device, storage medium and processor
CN110505609B (en) Bluetooth interaction method, bluetooth interaction device and terminal equipment
CN110099167B (en) Unlocking method and device, terminal equipment and storage medium
CN113259942A (en) Connection method, connection device, electronic equipment, connection system and computer-readable storage medium
CN108391281B (en) Bridging method of wireless network, terminal equipment and storage medium
CN106102011A (en) Method, device and the terminal that a kind of terminal positioning processes
EP3236377A1 (en) Method, device and system for preventing account from being broken into
CN104618326B (en) A kind of information processing method and electronic equipment
CN113806131A (en) Access control method and device for fault code library, electronic equipment and storage medium
CN107786341B (en) Certificate loading method and mobile terminal and computer readable storage medium
CN104994225A (en) Short message sending control method and short message sending control device
CN113283893B (en) Resource transfer processing method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant