CN107590372A - Touch-screen encrypts unlocking method and device - Google Patents
Touch-screen encrypts unlocking method and device Download PDFInfo
- Publication number
- CN107590372A CN107590372A CN201710797089.2A CN201710797089A CN107590372A CN 107590372 A CN107590372 A CN 107590372A CN 201710797089 A CN201710797089 A CN 201710797089A CN 107590372 A CN107590372 A CN 107590372A
- Authority
- CN
- China
- Prior art keywords
- encryption rule
- operand
- screen
- input
- digital
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Telephone Function (AREA)
Abstract
The invention discloses a kind of touch-screen encryption unlocking method and device, methods described includes lighting request according to screen, shows unlock interface;Numeric keypad is arranged in unlock interface;Receive the digital unlocking information of user's input;Obtain default encryption rule;Judge whether the digital unlocking information meets the encryption rule, if so, then performing unblock operation.The present invention carries out matching judgement by the password for setting encryption rule to be inputted to user, the security of mobile terminal releasing process is improved, so as to prevent unlocking pin from revealing.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of touch-screen encryption unlocking method and device.
Background technology
Existing mobile terminal is typically unlocked by numerical ciphers or pattern password.In numerical ciphers unblock, number
The digit of word password is generally 4 or 6, if user is peeped in input numerical ciphers by other people, other people are easy to write down
The numerical ciphers, cause numerical ciphers to be revealed.In the unblock of pattern password, mobile terminal shows nine grids in unlock interface, makes
User inputs pattern password in nine grids, if user is peeped when inputting pattern password by other people, pattern password also holds very much
Easily leakage.To sum up, the unlocking manner of existing mobile terminal easily causes unlocking pin to be revealed.
The content of the invention
In view of the foregoing, it is necessary to a kind of touch-screen encryption unlocking method and device are provided, existing mobile terminal
The problem of unlocking manner easily causes unlocking pin to be revealed.Technical scheme is as follows:
On the one hand, the invention provides a kind of touch-screen to encrypt unlocking method, comprises the following steps:
Request is lighted according to screen, shows unlock interface;
Numeric keypad is arranged in unlock interface;
Receive the digital unlocking information of user's input;
Obtain default encryption rule;
Judge whether the digital unlocking information meets the encryption rule, if so, then performing unblock operation.
On the other hand, the invention provides a kind of touch-screen to encrypt tripper, including with lower module:
Module is lighted, for lighting request according to screen, shows unlock interface;
Display module is unlocked, for arranging numeric keypad in unlock interface;
Input module, for receiving the digital unlocking information of user's input;
Encrypting module, for obtaining default encryption rule;
Judge module, for judging whether the digital unlocking information meets the encryption rule, if so, then performing unblock
Operation.
The present invention calls default encryption rule, to the solution of input after the digital unlocking information of user's input is received
Lock information, which determines whether to meet, unlocks rule, even if input process is spied on, unlocking pin can not also be cracked.
Brief description of the drawings
Fig. 1 is the flow chart of touch-screen encryption unlocking method provided in an embodiment of the present invention;
Fig. 2 is the module composition schematic diagram of touch-screen encryption tripper provided in an embodiment of the present invention;
Fig. 3 is the hardware block diagram of the mobile phone terminal of touch-screen encryption tripper provided in an embodiment of the present invention.
Embodiment
Technical scheme is further illustrated below in conjunction with Figure of description and specific embodiment.It should be appreciated that this
The specific embodiment of place description is not intended to limit the present invention only to explain the present invention.
Touch-screen of the embodiment of the present invention encrypts unlocking method and device, can apply in the scene that terminal is in screen locking.
In one embodiment of the invention, there is provided a kind of touch-screen encrypts unlocking method, shown in Figure 1, described
Touch-screen encryption unlocking method comprises the following steps:
S1, request is lighted according to screen, show unlock interface.
S2, numeric keypad is arranged in unlock interface.
S3, the digital unlocking information for receiving user's input.
S4, obtain default encryption rule.
S5, judge whether the digital unlocking information meets the encryption rule, if so, unblock operation is then performed, if it is not,
Mistake is then prompted, and returns to the input information that unlock interface receives user again.
In one embodiment of the invention, the default encryption rule includes:
Select cryptographic calculation pattern;
The scope of first operand and the second operand is set;
Generate encryption rule.
Exemplified by inputting six passwords:In the case of selecting addition scheme, the first operand of setting is first password position
With the second password position, it is the 3rd password position and the 4th password position to set the second operand, then the 5th password position and the 6th password
Position is operation result input bit, if operation result is three digits, takes ten and unit numbers result, under this convention, when
It is 131427,020608 or 678956 that user, which inputs digital unlocking information, then is judged to meeting this encryption rule;
In the case of selecting subtraction mode, it be first password position and the second password position to set the first operand, setting the
Two operands are the 3rd password position and the 4th password position, then the 5th password position and the 6th password position are operation result input bit,
If operation result is negative, its absolute value result is taken, if operation result is units, 0 is mended in the 5th password position,
Under this rule, it is 131401 or 679629 when user inputs digital unlocking information, is then judged to meeting this encryption rule;
In the case of selecting multiplication modes, it be first password position and the second password position to set the first operand, setting the
Two operands are the 3rd password position and the 4th password position, then the 5th password position and the 6th password position are operation result input bit,
If operation result is three digits or four figures, the 5th password position is the tens of operation result, and the 6th password position is fortune
The units of result is calculated, if operation result is units, 0 is mended in the 5th password position, under this convention, when user inputs number
Word unlocking information is 131030 or 010808, then is judged to meeting this encryption rule;
In the case of selecting division pattern, it be first password position and the second password position to set the first operand, setting the
Two operands are that the 3rd password position and the 4th password position, then the 5th password position and the 6th password position input for complementation operation result
Position, if the 3rd password position and the 4th password position input 0, is judged to being unsatisfactory for this encryption rule;If complementation result is
Units, then mend 0 in the 5th password position, under this convention, when user input digital unlocking information for 131003,010801 or
840504, then it is judged to meeting this encryption rule.
In another embodiment of the present invention, the default encryption rule includes:
Select password position and random order;
Digital information corresponding to the difference of password position is set;
The random order corresponds to Any Digit.
Exemplified by inputting six passwords:Four password positions and two random orders are selected, ground can be set, password position is arranged to
1, random order is arranged to 0, sets encryption rule as 101101, and sets four effective order numerical ciphers positions 1234, herein
It is 192364,162304 or 112314 when user inputs digital unlocking information under rule, is judged to meeting this encryption rule
Then.
In one embodiment of the invention, it is numeral unblock letter that user, which clicks on numeric keypad and obtains order digital information,
Breath, in another embodiment, corresponding numeric keypad decryption regional location corresponding to is dragged, can first drag ordinal position
Numeric keypad after row, it is preferable that the numeric keypad in unlock interface is random alignment, so can effectively prevent from spying on
Person spies on the digital information of user's input.
Preferably, if the digital unlocking information of continuous five inputs of user mismatches with the encryption rule, by screen
Locking, mobile phone terminal disables 2 minutes, after reaching 2 minutes, just allows user to continue to attempt to touch screen unlocks.
In the present invention is one embodiment, there is provided a kind of touch-screen encrypts tripper, referring to Fig. 2, described device
Including with lower module:
Module is lighted, for lighting request according to screen, shows unlock interface;
Display module is unlocked, for arranging numeric keypad in unlock interface;
Input module, for receiving the digital unlocking information of user's input;
Encrypting module, for obtaining default encryption rule;
Judge module, for judging whether the digital unlocking information meets the encryption rule, if so, then performing unblock
Operation.
In one embodiment of the invention, the encrypting module includes:
Select cryptographic calculation pattern;
The scope of first operand and the second operand is set;
Generate encryption rule.
Exemplified by inputting six passwords:In the case of selecting addition scheme, the first operand of setting is first password position
With the second password position, it is the 3rd password position and the 4th password position to set the second operand, then the 5th password position and the 6th password
Position is operation result input bit, if operation result is three digits, takes ten and unit numbers result, under this convention, when
It is 131427,020608 or 678956 that user, which inputs digital unlocking information, then is judged to meeting this encryption rule;
In the case of selecting subtraction mode, it be first password position and the second password position to set the first operand, setting the
Two operands are the 3rd password position and the 4th password position, then the 5th password position and the 6th password position are operation result input bit,
If operation result is negative, its absolute value result is taken, if operation result is units, 0 is mended in the 5th password position,
Under this rule, it is 131401 or 679629 when user inputs digital unlocking information, is then judged to meeting this encryption rule;
In the case of selecting multiplication modes, it be first password position and the second password position to set the first operand, setting the
Two operands are the 3rd password position and the 4th password position, then the 5th password position and the 6th password position are operation result input bit,
If operation result is three digits or four figures, the 5th password position is the tens of operation result, and the 6th password position is fortune
The units of result is calculated, if operation result is units, 0 is mended in the 5th password position, under this convention, when user inputs number
Word unlocking information is 131030 or 010808, then is judged to meeting this encryption rule;
In the case of selecting division pattern, it be first password position and the second password position to set the first operand, setting the
Two operands are that the 3rd password position and the 4th password position, then the 5th password position and the 6th password position input for complementation operation result
Position, if the 3rd password position and the 4th password position input 0, is judged to being unsatisfactory for this encryption rule;If complementation result is
Units, then mend 0 in the 5th password position, under this convention, when user input digital unlocking information for 131003,010801 or
840504, then it is judged to meeting this encryption rule.
In another embodiment of the present invention, the encrypting module includes:
Select password position and random order;
Digital information corresponding to the difference of password position is set;
The random order corresponds to Any Digit.
Exemplified by inputting six passwords:Four password positions and two random orders are selected, ground can be set, password position is arranged to
1, random order is arranged to 0, sets encryption rule as 101101, and sets four effective order numerical ciphers positions 1234, herein
It is 192364,162304 or 112314 when user inputs digital unlocking information under rule, is judged to meeting this encryption rule
Then.
It should be noted that:The touch-screen that above-described embodiment provides encrypts tripper when carrying out touch screen unlocks, only
With the division progress of above-mentioned each functional module for example, in practical application, can as needed and by above-mentioned function distribution by
Different functional modules is completed, i.e., the internal structure that touch-screen is encrypted to tripper is divided into different functional modules, with complete
Into all or part of function described above.In addition, the present embodiment provide touch-screen encryption tripper embodiment with it is upper
The touch-screen encryption unlocking method for stating embodiment offer belongs to same design, and its specific implementation process refers to embodiment of the method, this
In repeat no more.
The embodiment of the present invention also provides a kind of hardware configuration of touch-screen encryption tripper, in the implementation of the present invention
In example, exemplified by operating on mobile phone terminal, Fig. 3 is the mobile phone terminal of the touch-screen encryption tripper of the embodiment of the present invention
Hardware block diagram.As shown in figure 3, terminal 800 can include RF (Radio Frequency, radio frequency) circuit 110, include
The memory 120 of one or more readable storage medium storing program for executing, input block 130, display unit 140, sensor 150, audio
Circuit 160, WiFi (wireless fidelity, Wireless Fidelity) module 170, include one or more than one process cores
The parts such as the processor 180 and power supply 190 of the heart.It will be understood by those skilled in the art that the terminal structure shown in Fig. 3 is simultaneously
The not restriction of structure paired terminal, it can include than illustrating more or less parts, either combine some parts or different
Part is arranged.Wherein:
RF circuits 110 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information receives, transfer to one or more than one processor 180 is handled;In addition, it is sent to up data are related to
Base station.Generally, RF circuits 110 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuits 110 can also be communicated by radio communication with network and other equipment.The radio communication can make
With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, WCDMA), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short
Messaging Service, Short Message Service) etc..
Memory 120 can be used for storage software program and module, and processor 180 is stored in memory 120 by operation
Software program and module, so as to perform various function application and data processing.Memory 120 can mainly include storage journey
Sequence area and storage data field, wherein, storing program area can storage program area, the application program needed for function (for example broadcast by sound
Playing function, image player function etc.) etc.;Storage data field can store uses created data (such as sound according to terminal 800
Frequency evidence, phone directory etc.) etc..In addition, memory 120 can include high-speed random access memory, can also include non-volatile
Property memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.Correspondingly, deposit
Reservoir 120 can also include Memory Controller, to provide the access of processor 180 and input block 130 to memory 120.
Input block 130 can be used for the numeral or character information for receiving input, and generation is set with user and function
Control relevant keyboard, mouse, action bars, optics or the input of trace ball signal.Specifically, input block 130 may include to touch
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, collect and use
Family on or near it touch operation (such as user using any suitable object or annex such as finger, stylus in touch-sensitive table
Operation on face 131 or near touch sensitive surface 131), and corresponding attachment means are driven according to formula set in advance.It is optional
, touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and the signal that touch operation is brought is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection means, and is converted into contact coordinate, then gives processor 180, and can reception processing device 180
The order sent simultaneously is performed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 131.Except touch sensitive surface 131, input block 130 can also include other input equipments 132.Specifically,
Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One or more in trace ball, mouse, action bars etc..
Display unit 140 can be used for display by the information of user's input or be supplied to the information and terminal 800 of user
Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Display unit 140 may include display panel 141, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detects touching on or near it
After touching operation, processor 180 is sent to determine the type of touch event, is followed by subsequent processing type of the device 180 according to touch event
Corresponding visual output is provided on display panel 141.Although in figure 3, touch sensitive surface 131 and display panel 141 are conducts
Two independent parts come realize input and input function, but in some embodiments it is possible to by touch sensitive surface 131 with display
Panel 141 is integrated and realizes input and output function.
Terminal 800 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 141, and proximity transducer can close display when terminal 800 is moved in one's ear
Panel 141 and/or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axles) acceleration size, size and the direction of gravity are can detect that when static, available for identification terminal posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
The other sensors such as the gyroscope that can also configure in terminal 800, barometer, hygrometer, thermometer, infrared ray sensor, herein
Repeat no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and terminal 800.Audio
Electric signal after the voice data received conversion can be transferred to loudspeaker 161, sound is converted to by loudspeaker 161 by circuit 160
Sound signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160
Voice data is converted to, then after voice data output processor 180 is handled, through RF circuits 110 to be sent to such as another end
End, or voice data is exported to memory 120 further to handle.Voicefrequency circuit 160 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone and terminal 800.
WiFi belongs to short range wireless transmission technology, and terminal 800 can help user's transceiver electronicses by WiFi module 170
Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 3 is shown
WiFi module 170, but it is understood that, it is simultaneously not belonging to must be configured into for terminal 800, can exist as needed completely
Do not change in the essential scope of invention and omit.
Processor 180 is the control centre of terminal 800, utilizes various interfaces and each portion of the whole terminal of connection
Point, by running or performing the software program and/or module that are stored in memory 120, and call and be stored in memory 120
Interior data, the various functions and processing data of terminal 800 are performed, so as to carry out integral monitoring to terminal.Optionally, processor
180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modem processor,
Wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing
Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 800 also includes the power supply 190 (such as battery) to all parts power supply, it is preferred that power supply can pass through electricity
Management system and processor 180 are logically contiguous, so as to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 190 can also include one or more direct current or AC power, recharging system, power supply event
The random component such as barrier detection circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal 800 can also include camera, bluetooth module etc., will not be repeated here.Specifically in this reality
To apply in example, the display unit of terminal is touch-screen display, and terminal also includes memory, and one or more than one
Program, one of them or more than one program storage are configured to by one or more than one processing in memory
Device performs and states one or more than one program, includes the instruction for being operated below:
Request is lighted according to screen, shows unlock interface;
Numeric keypad is arranged in unlock interface;
Receive the digital unlocking information of user's input;
Obtain default encryption rule;
Judge whether the digital unlocking information meets the encryption rule, if so, then performing unblock behaviour.
Specifically, the processor of terminal is additionally operable to perform the instruction operated below:Encryption rule is pre-set, including:Choosing
Select cryptographic calculation pattern;The scope of first operand and the second operand is set;Generate encryption rule.
Specifically, the processor of terminal is additionally operable to perform the instruction operated below:Encryption rule is pre-set, including:Choosing
Select password position and random order;Digital information corresponding to the difference of password position is set;The random order corresponds to Any Digit.
Specifically, the processor of terminal is additionally operable to perform the instruction operated below:Whether judge the digital unlocking information
Meet the encryption rule, if it is not, then prompting mistake, and return to the input information that unlock interface receives user again.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes
It is engaged in device, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are the foregoing is only, not thereby limit its scope of the claims, it is every to utilize the present invention
The equivalent structure or equivalent flow conversion that specification and accompanying drawing content are made, directly or indirectly it is used in other related technology necks
Domain, it is included within the scope of the present invention.
Claims (10)
1. a kind of touch-screen encrypts unlocking method, it is characterised in that comprises the following steps:
Request is lighted according to screen, shows unlock interface;
Numeric keypad is arranged in unlock interface;
Receive the digital unlocking information of user's input;
Obtain default encryption rule;
Judge whether the digital unlocking information meets the encryption rule, if so, then performing unblock operation.
2. according to the method for claim 1, it is characterised in that also include pre-setting encryption rule, including:
Select cryptographic calculation pattern;
The scope of first operand and the second operand is set;
Generate encryption rule.
3. according to the method for claim 1, it is characterised in that also include pre-setting encryption rule, including:
Select password position and random order;
Digital information corresponding to the difference of password position is set;
The random order corresponds to Any Digit.
4. according to the method for claim 2, it is characterised in that the cryptographic calculation pattern includes addition scheme, subtraction mould
Formula, multiplication modes and division pattern;
It is described to set the scope of the first operand and the second operand to include setting number range and the position of operand
Information;
And the display rule of operation result is set, first operand, the second operand and operation result composition encryption
Unlocking pin.
5. according to the method for claim 1, it is characterised in that judge whether the digital unlocking information meets the encryption
Rule, if it is not, then prompting mistake, and return to the input information that unlock interface receives user again.
6. according to the method for claim 5, it is characterised in that if the digital unlocking information of the continuous n times input of user and institute
Encryption rule mismatch is stated, then by screen locking, until showing unlock interface again after reaching the default time.
7. according to the method described in any one in claim 1-6, it is characterised in that the numeral unblock letter of user's input
Breath includes clicking on the order digital information that numeric keypad obtains, or the corresponding numeric keypad of dragging decryption region position corresponding to
Put.
8. a kind of touch-screen encrypts tripper, it is characterised in that including with lower module:
Module is lighted, for lighting request according to screen, shows unlock interface;
Display module is unlocked, for arranging numeric keypad in unlock interface;
Input module, for receiving the digital unlocking information of user's input;
Encrypting module, for obtaining default encryption rule;
Judge module, for judging whether the digital unlocking information meets the encryption rule, if so, then performing unblock behaviour
Make.
9. device according to claim 8, it is characterised in that the encrypting module includes:
Select cryptographic calculation pattern;
The scope of first operand and the second operand is set;
Generate encryption rule.
10. device according to claim 8, it is characterised in that the encrypting module includes:
Select password position and random order;
Digital information corresponding to the difference of password position is set;
The random order corresponds to Any Digit.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710797089.2A CN107590372A (en) | 2017-09-06 | 2017-09-06 | Touch-screen encrypts unlocking method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710797089.2A CN107590372A (en) | 2017-09-06 | 2017-09-06 | Touch-screen encrypts unlocking method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107590372A true CN107590372A (en) | 2018-01-16 |
Family
ID=61051215
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710797089.2A Pending CN107590372A (en) | 2017-09-06 | 2017-09-06 | Touch-screen encrypts unlocking method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107590372A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112733106A (en) * | 2021-01-22 | 2021-04-30 | 珠海格力电器股份有限公司 | Screen unlocking method and device, storage medium and electronic equipment |
CN109165496B (en) * | 2018-09-27 | 2021-10-08 | 京东方科技集团股份有限公司 | Lock state releasing method and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355414A (en) * | 2007-07-25 | 2009-01-28 | 原为民 | Authentication system for formulae cipher |
CN102316120A (en) * | 2011-10-17 | 2012-01-11 | 北京信息科技大学 | Dynamic password lock based on network privacy protection |
CN103079000A (en) * | 2012-12-27 | 2013-05-01 | 深圳市金立通信设备有限公司 | Method and device for terminal unlocking |
CN103957106A (en) * | 2014-03-14 | 2014-07-30 | 韩素平 | User-defined two-way dynamic safety certification system |
US20140282586A1 (en) * | 2013-03-15 | 2014-09-18 | Advanced Elemental Technologies | Purposeful computing |
CN104767863A (en) * | 2014-01-06 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Terminal screen unlocking method and terminal |
CN106951749A (en) * | 2017-03-17 | 2017-07-14 | 上海与德科技有限公司 | A kind of method of unblock, device and terminal |
-
2017
- 2017-09-06 CN CN201710797089.2A patent/CN107590372A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355414A (en) * | 2007-07-25 | 2009-01-28 | 原为民 | Authentication system for formulae cipher |
CN102316120A (en) * | 2011-10-17 | 2012-01-11 | 北京信息科技大学 | Dynamic password lock based on network privacy protection |
CN103079000A (en) * | 2012-12-27 | 2013-05-01 | 深圳市金立通信设备有限公司 | Method and device for terminal unlocking |
US20140282586A1 (en) * | 2013-03-15 | 2014-09-18 | Advanced Elemental Technologies | Purposeful computing |
CN104767863A (en) * | 2014-01-06 | 2015-07-08 | 腾讯科技(深圳)有限公司 | Terminal screen unlocking method and terminal |
CN103957106A (en) * | 2014-03-14 | 2014-07-30 | 韩素平 | User-defined two-way dynamic safety certification system |
CN106951749A (en) * | 2017-03-17 | 2017-07-14 | 上海与德科技有限公司 | A kind of method of unblock, device and terminal |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109165496B (en) * | 2018-09-27 | 2021-10-08 | 京东方科技集团股份有限公司 | Lock state releasing method and device |
CN112733106A (en) * | 2021-01-22 | 2021-04-30 | 珠海格力电器股份有限公司 | Screen unlocking method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104767863B (en) | The unlocking method and terminal of terminal screen | |
CN105515768B (en) | A kind of methods, devices and systems of more new key | |
CN104966005B (en) | A kind of access control method, and terminal device | |
CN103616981B (en) | application processing method, device and mobile terminal | |
CN104836664B (en) | A kind of methods, devices and systems executing business processing | |
CN105491067B (en) | Service security verification method and device based on key | |
CN107219976A (en) | Application display method and related product | |
CN107145795A (en) | Screenshot method, device and computer equipment | |
CN105681032B (en) | Method for storing cipher key, key management method and device | |
CN105912905A (en) | Fingerprint unlocking method and terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN105912919B (en) | A kind of unlocked by fingerprint method and terminal | |
CN104104656B (en) | Give the method and device of account number for change | |
CN108809906A (en) | Data processing method, system and device | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN106533917B (en) | Relation chain processing method, apparatus and system | |
CN105940368B (en) | A kind of unlocking method and terminal of pattern lock | |
CN106980439A (en) | The method and device of hiden application icon | |
CN104753672B (en) | The method, apparatus and terminal of account authorization | |
CN107104930A (en) | It is a kind of that the methods, devices and systems for checking authority are set | |
CN107423598A (en) | One kind solution lock control method and mobile terminal | |
CN107590372A (en) | Touch-screen encrypts unlocking method and device | |
CN104639394B (en) | Statistical method, the device and system of client number of users | |
CN104615954B (en) | Password storage method and apparatus | |
CN107092819A (en) | A kind of fingerprint typing method of inspection and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180116 |