CN109033779A - A kind of unlock authentication method, wearable device and computer readable storage medium - Google Patents
A kind of unlock authentication method, wearable device and computer readable storage medium Download PDFInfo
- Publication number
- CN109033779A CN109033779A CN201810716116.3A CN201810716116A CN109033779A CN 109033779 A CN109033779 A CN 109033779A CN 201810716116 A CN201810716116 A CN 201810716116A CN 109033779 A CN109033779 A CN 109033779A
- Authority
- CN
- China
- Prior art keywords
- certification
- unlock
- wearable device
- information
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Abstract
The present invention provides a kind of unlock authentication method, wearable device and computer readable storage medium, which includes: to be in when unlocking authentication state in wearable device, obtains the usage scenario information that wearable device is presently in;The biological characteristic authentication component of multiple and different types is provided on wearable device;Current certification security level is determined according to usage scenario information;Corresponding unlock certification policy is determined according to certification security level;The correspondence biological characteristic authentication component in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy, and certification is unlocked to user.Certification security level corresponding to the usage scenario information being presently according to wearable device determines unlock certification policy, then the correspondence component in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy to execute certification, to improve the security logic and security protection performance for unlocking certification under different usage scenarios.
Description
Technical field
The present invention relates to intelligent wearable device technical field, more specifically to a kind of unlock authentication method, wearable
Equipment and computer readable storage medium.
Background technique
With the continuous development of terminal technology, wearable device is since it has the function of to be easy to carry about with one, is easy to use and rich
The advantages that rich and quickly budded out into popularity in user group, wearable device be using wearable technology to daily wearing carry out intelligence
Energyization design, the general name for the equipment that can be dressed developed, such as Intelligent bracelet, smartwatch, Intelligent glove, Brilliant Eyes
Mirror, intelligent necklace, intelligent waistband etc., can provide the functions such as step counting, positioning, alarm clock, heart rate detection, sleep detection for user,
Preferably user health can be instructed to live.
And smart terminal product of the wearable device as user's long periods of wear, safety in utilization to user to close weight
It wants, if the wearable device of user can be unlocked easily by other users, a number recorded in wearable device can be made
According to there is stolen risk, leakage of personal information is gently then caused, heavy then cause any property loss, existing wearable device is carrying out
When unlock certification, what is generallyd use is biological characteristic authentication mode, but is in the prior art usually special using single biology
Sign authentication mode authenticates to be unlocked, i.e., after user sets a unlock authentication mode, such as finger print identifying or iris are recognized
Card, then be all made of the unlock authentication mode backward to be authenticated under any usage scenario, the safety of this unlock authentication mode
Logicality is poor, and the risk that biggish biological information is stolen can be faced if under more complicated use environment, peace
Full hidden danger is larger.It can be seen that not being well positioned to meet user in the unlock authenticated connection of wearable device in the prior art
Use demand so that user experience is bad.
Summary of the invention
The technical problem to be solved in the present invention is that wearable device is all made of under all usage scenarios in the prior art
Single biological characteristic authentication mode authenticates to be unlocked, and the security logic of caused unlock certification is poor, and safety is anti-
It is lower to protect performance, for the technical problem, provides a kind of unlock authentication method, wearable device and computer-readable storage medium
Matter.
In order to solve the above technical problems, the present invention provides a kind of unlock authentication method, which includes:
It is in when unlocking authentication state in wearable device, obtains the usage scenario letter that wearable device is presently in
Breath;The biological characteristic authentication component of multiple and different types is provided on wearable device;
Current certification security level is determined according to usage scenario information;
According to certification security level and preset certification security level and the mapping relations between certification policy are unlocked, really
Fixed corresponding unlock certification policy;
The correspondence biological characteristic in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy to recognize
Card component is unlocked certification to user.
Optionally, usage scenario information includes: geographical location information, temporal information, at least one in ambient condition information
Kind.
Optionally, obtaining the usage scenario information that wearable device is presently in includes:
Obtain the usage scenario information being presently in determined by wearable device itself;
Field is used with what the wearable device that sends over of terminal of wearable device binding connection was presently in or, obtaining
Scape information.
Optionally, biological characteristic authentication component includes: fingerprint authentication component, iris authentication component, voiceprint component, the heart
It is multiple in rate certified component.
Optionally, determine that current certification security level includes: according to usage scenario information
According to the mapping relations between usage scenario information and preset usage scenario information and certification security level, really
Corresponding certification security level before settled.
Optionally, according to reflecting between certification security level and preset certification security level and unlock certification policy
Relationship is penetrated, after determining corresponding unlock certification policy, further includes:
Control wearable device prompts unlock certification policy.
Optionally, the corresponding life in a variety of different types of biological characteristic authentication components is being controlled according to unlock certification policy
Object feature verification component is unlocked after certification user, further includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, to wearable device
The terminal of binding connection sends a warning message.
Optionally, when the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, Xiang Yuke
The terminal of wearable device binding connection, which sends a warning message, includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, wearable device is controlled
At least one of ambient image information, location information, the biological information for being certified user are acquired;
Warning information is generated according to the collected information of institute, and sends and alerts to the terminal with wearable device binding connection
Information.
Further, the present invention also provides a kind of wearable device, which includes processor, memory, communicates always
The biological characteristic authentication component of line and multiple and different types;
Communication bus is for realizing the connection communication between processor, memory and biological characteristic authentication component;
Processor is for executing one or more program stored in memory, to realize above-mentioned unlock authentication method
The step of.
Further, the present invention also provides a kind of computer readable storage medium, which is deposited
One or more program is contained, one or more program can be executed by one or more processor, above-mentioned to realize
The step of unlocking authentication method.
Beneficial effect
The present invention provides a kind of unlock authentication method, wearable device and computer readable storage medium, for existing skill
Wearable device is all made of single biological characteristic authentication mode under all usage scenarios to be unlocked certification in art, is led
The security logic of the unlock certification of cause is poor, and the lower defect of security protection performance, the unlock authentication method includes: that can wear
It wears equipment to be in when unlocking authentication state, obtains the usage scenario information that wearable device is presently in;On wearable device
It is provided with the biological characteristic authentication component of multiple and different types;Current certification security level is determined according to usage scenario information;
According to certification security level and preset certification security level and the mapping relations between certification policy are unlocked, are determined corresponding
Unlock certification policy;It is special that the corresponding biology in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy
Sign certified component is unlocked certification to user.According to certification corresponding to the usage scenario information that wearable device is presently in
Security level determines unlock certification policy, then controls a variety of different types of biological characteristic authentications according to unlock certification policy
Correspondence component in component executes certification, to improve the security logic for unlocking certification under different usage scenarios, guarantees
The security protection performance of unlock certification, enhances user experience.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic flow chart for the unlock authentication method that first embodiment of the invention provides;
Fig. 4 is the refined flow chart for the unlock authentication method that second embodiment of the invention provides;
Fig. 5 is the refined flow chart for the unlock authentication method that third embodiment of the invention provides;
Fig. 6 is the structural schematic diagram for the wearable device that fourth embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element
Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move
The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model.
Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc.
It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area
The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function
Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection
Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
Single biological characteristic authentication side is all made of under all usage scenarios to solve wearable device in the prior art
Formula authenticates to be unlocked, and the security logic of caused unlock certification is poor, the lower technical problem of security protection performance,
A kind of unlock authentication method is present embodiments provided, the basic flow of unlock authentication method provided in this embodiment is illustrated in figure 3
Cheng Tu, the unlock authentication method specifically includes the following steps:
S301, it is in when unlocking authentication state in wearable device, what acquisition wearable device was presently in uses field
Scape information;The biological characteristic authentication component of multiple and different types is provided on wearable device.
The method of the present embodiment realizes that wearable device includes that any intelligence that can be dressed is set by wearable device
Standby, including but not limited to Intelligent bracelet, smartwatch, intelligent glasses etc., signified authentication state to be unlocked is in the present embodiment
Refer to that wearable device currently needs to be unlocked user the state of certification, such as when user presses the power key of wearable device
Wake up the state that wearable device is entered.Wearable device in the present embodiment executes the certification of biological information to user
It is unlocked to realize, biological information has uniqueness, so as to the true identity for characterizing user.It should illustrate
It is that there are many biological characteristic authentication component, the corresponding lifes authenticated of different biological characteristic authentication components for setting in the present embodiment
The type of object characteristic information is also corresponding different.
Optionally, biological characteristic authentication component includes: fingerprint authentication component, iris authentication component, voiceprint component, the heart
It is multiple in rate certified component.
Specifically, different biological characteristic authentication components is realized not by different collecting biological feature information mould groups
With the acquisition of type biological information, fingerprint authentication component is by the physical button that is integrated on wearable device or shielding
Fingerprint mould group under curtain acquires the fingerprint image of user, and fingerprint mould group here can be optical fingerprint mould group, condenser type
Fingerprint mould group or RF type fingerprint mould group;And iris authentication component is then the image acquisition units by being arranged on wearable device
The iris image of user is acquired;Voiceprint component be then by the voice-input unit on wearable device come to
Family carries out voice input;Heart rate certified component is then the pulse transducer by being arranged on wearable device come the electrocardio to user
Signal is acquired.It should be understood that in further embodiments can also include face authentication component, palmprint authentication group
The biological characteristic authentications components such as part, fin- ger vein authentication component, do not limit uniquely herein.
Optionally, usage scenario information includes: geographical location information, temporal information, at least one in ambient condition information
Kind.
Specifically, outside of usage scenario information association when user uses wearable device in the present embodiment uses ring
Border, location information here can (Global Positioning System, the whole world be fixed by the GPS of wearable device itself
Position system) it obtains, temporal information can then be obtained by the time system of wearable device itself, or can pass through acquisition
Network time carries out the acquisition of temporal information, and ambient condition information then includes the letter of the people or object in user's local environment
Breath can carry out the acquisition of ambient image by the image acquisition units being arranged on wearable device to realize.In practical application
In, can only using a certain category information above-mentioned as the usage scenario information of required acquisition, can also by aforementioned much information into
Row is comprehensive as required usage scenario information.
Optionally, obtaining the usage scenario information that wearable device is presently in includes: to obtain wearable device itself institute
The determining usage scenario information being presently in;It is worn or, obtaining with what the terminal of wearable device binding connection sended over
Wear the usage scenario information that equipment is presently in.
Specifically, in some embodiments, wearable device can be by the related function module set by itself come straight
Tap into the acquisition of row usage scenario information;In further embodiments, usual user can will be wearable in actual use
The terminal that equipment and user are held carries out binding use, so that user terminal and wearable device are in same usage scenario
Under, usually there is the performance more more powerful than wearable device based on terminal, so usage scenario letter can be carried out by terminal
Then usage scenario information is sent to wearable device and communication connection between the two again by the acquisition of breath.Certainly, exist
Usage scenario information there are many when, a part of in a variety of usage scenario information can be acquired by wearable device itself,
Other parts can be acquired by terminal, i.e., the acquisition of usage scenario information can also be carried out in conjunction with two ways.
S302, current certification security level is determined according to usage scenario information.
In practical applications, the difference of the usage scenario as locating for wearable device is wanted when being then unlocked certification
The safety asked is also different, namely different certification security levels is corresponding under different usage scenarios.Wherein to use
Scene information is for geographical location information, when acquired geographical location information is in family, often user uses at home
The case where wearable device is safer, is leaked or is attacked there is no authentication information, therefore then correspond in this case
In relatively low certification security level;And if acquired geographical location information be company when, although in this case surrounding
People is more, can have a possibility that certain authentication information leakage, but the employee for the company that exists together is usually acquaintance, safety
Hidden danger is substantially relatively small, therefore can then correspond to a medium certification security level in this case;And if current institute
When the geographical location information of acquisition is market, the stranger around user is more in this case, and environment nowadays are more multiple
Miscellaneous, for its authentication information there are biggish a possibility that revealing or being attacked, security risk is larger when being unlocked certification by user,
A higher certification security level should be then corresponded in this case.
Optionally, according to usage scenario information determine current certification security level include: according to usage scenario information with
And the mapping relations between preset usage scenario information and certification security level, determine current corresponding certification safety etc.
Grade.
Specifically, be previously provided with usage scenario information in the present embodiment and authenticate the mapping relations between security level,
The mapping relations can be correspondingly arranged by user according to itself actual demand, i.e., user is according to personal inclination come to difference
Usage scenario information corresponding certification security level is set, can also be configured by system according to default rule, i.e.,
It is automatically each usage scenario information by system to distribute corresponding certification security level, such as the use being related in wearable device
Scene information includes family, the different geolocation scenario of three kinds of company and market, then when will can be unlocked at home certification
Certification security level be set as the first estate, the certification security level in company is set as the second grade, at market
Certification security level be set as the tertiary gradient, from the first estate to the tertiary gradient corresponding to authentication security successively increase.It answers
When explanation, scene information can be set using in advance in further embodiments, in wearable device and certification is pacified
Mapping relations between congruent grade, but when each triggering is unlocked certification, it is in real time corresponding according to preset algorithm
Usage scenario information distribution certification security level.
S303, it is closed according to the mapping between certification security level and preset certification security level and unlock certification policy
System, determines corresponding unlock certification policy.
Specifically, certification security level different in the present embodiment is corresponding with different unlock certification policies, different solutions
Lock certification policy is associated with the certification demand for security of the unlock under different usage scenarios, to realize different unlock certification safety
Property.It should be noted that unlock certification policy here can be according to the role of biological characteristic authentication component and formulate, such as
Unlocked by fingerprint certification policy, vocal print unlock certification policy or heart rate unlock certification policy, in practical applications, the peace of finger print identifying
Full property is lower, and voiceprint safety is medium, and heart rate authentication security highest, then unlocked by fingerprint certification policy and first etc.
Grade is corresponding, and vocal print unlock certification policy is corresponding with the second grade, and it is then opposite with the tertiary gradient that heart rate unlocks certification policy
Answer, from the first estate to the tertiary gradient corresponding to authentication security successively increase.It should be understood that in practical applications also
Unlock certification policy can be formulated in conjunction with both the role of biological characteristic component and quantity, such as in the certification than the tertiary gradient
The higher fourth estate of security requirement, can will unlock certification policy be established as heart rate certification and finger print identifying compound certification
Strategy.
Optionally, according to reflecting between certification security level and preset certification security level and unlock certification policy
Relationship is penetrated, after determining corresponding unlock certification policy, further includes: control wearable device mentions unlock certification policy
Show.
It should be noted that be dynamic change by the unlock certification policy under different usage scenarios in this present embodiment,
Therefore user may have the case where cannot accurately holding to unlock certification policy in actual use, then wearable
The legitimate user of equipment may be unlocked in a wrong manner certification and unlock failure, be based on this, in the present embodiment
Determine that unlock certification policy can also prompt unlock certification policy later, allowing the user to accurately know currently should hold
Capable unlock authentication mode can be with to be operated using correct unlock authentication mode to biological characteristic authentication component
Improve user unlock operating efficiency, prompting mode here can be shown on the screen of wearable device, can also
To be wearable progress voice output, can also be that wearable device carries out light prompt.It should also be noted that recognizing unlock
Card strategy, which carries out prompt, can be and prompted before user's operation biological characteristic authentication component, so that user can be the
One time was unlocked operation correctly to unlock authentication mode, was also possible to recognizing user's operation biological characteristic authentication
Unlock authentication mode when component is just prompted when incorrect, so that user can after the unlock authentication mode using mistake
Continue unlock certification using correct unlock authentication mode subsequent.
S304, according to unlocking, the corresponding biology that certification policy controls in a variety of different types of biological characteristic authentication components is special
Sign certified component is unlocked certification to user.
Specifically, correspondence associated in unlock certification policy is then controlled in the present embodiment after determining unlock certification policy
Biological characteristic authentication component enters state of activation, to allow the authentication information inputted to user to identify and authenticate, here
Unlock certification refers to that wearable device obtains preset biological information come to the biological characteristic authentication group being active
Certification is compared in the biological information that part is identified, default biological information here can be to be stored in advance in wear
Wear the legal biological information in equipment, i.e., the biological characteristic letter that legitimate user reserves when opening unlock authentication function in advance
Breath authenticates sample using the matching as unlock certification, and certainly, in other embodiments, default biological information may be used also
To be stored in the terminal of wearable device binding connection or storage beyond the clouds, in one case, wearable device can be with
When being unlocked certification every time directly to terminal or the legal biological information of cloud request, in another situation
Under, it can be after wearable device is lost the biological information being locally stored, wearable device can be from the end of binding
End or cloud obtain the biological information of backup and are stored in local.It should be appreciated that for the efficiency for guaranteeing unlock certification
And accuracy can be first to biological information after wearable device currently recognizes the biological information of user's input
It being pre-processed, the pretreated purpose of biological information is to improve quality, contrast or the clarity etc. of biological information,
So as to carry out biological information characteristic extraction, by taking finger print information as an example, finger print information pretreatment specifically include that finger
Line segmentation, fingerprint enhancing, binaryzation and micronization processes, by taking voiceprint as an example, voiceprint pretreatment include: noise eliminate,
End-point detection and speech enhan-cement.Here disclosed prior art realization can be used in pretreatment mode, and details are not described herein.
Optionally, the corresponding life in a variety of different types of biological characteristic authentication components is being controlled according to unlock certification policy
Object feature verification component is unlocked after certification user, further includes: in time for being continuously unlocked authentification failure to user
When number reaches preset frequency threshold value, send a warning message to the terminal with wearable device binding connection.
Specifically, in practical applications, for example, legitimate user wearable device stolen by other people after and carry out illegal
When trial, stealer usually requires just to can be carried out use after being unlocked wearable device, then stealer is repeatedly being attempted
Unlock then sends a warning message to terminal bound in legitimate user when not unlocking, so that legitimate user knows current wear
Equipment state is worn to take counter-measure.
Optionally, when the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, Xiang Yuke
It includes: to reach in the number for being continuously unlocked authentification failure to user that the terminal of wearable device binding connection, which sends a warning message,
When preset frequency threshold value, control wearable device is to ambient image information, location information, the biological characteristic letter for being certified user
At least one of breath is acquired;Warning information is generated according to the collected information of institute, and is connected to being bound with wearable device
The terminal connect sends a warning message.
Specifically, in some embodiments, warning information can be only that simple unlock unsuccessfully prompts.And in the present embodiment
In, in order to guarantee the maximum safety protection function of warning information, can then be controlled in the present embodiment in repeatedly unlock authentification failure
Wearable device carries out wearable device current environment image information, location information, the biological information for the person of being certified etc.
Acquisition, to generate warning information based on above- mentioned information, the terminal with wearable device binding is when receiving the warning information
Can then there are more understandings to wearable device present case, can preferably take counter-measure when meeting with pilferage etc..
The present invention provides a kind of unlock authentication method, equal under all usage scenarios for wearable device in the prior art
Certification is unlocked using single biological characteristic authentication mode, the security logic of caused unlock certification is poor, peace
The lower defect of full protection performance, the unlock authentication method include: to be in when unlocking authentication state in wearable device, are obtained
The usage scenario information that wearable device is presently in;The biological characteristic authentication of multiple and different types is provided on wearable device
Component;Current certification security level is determined according to usage scenario information;According to certification security level and preset certification peace
Mapping relations between congruent grade and unlock certification policy, determine corresponding unlock certification policy;According to unlock certification policy control
The correspondence biological characteristic authentication component made in a variety of different types of biological characteristic authentication components is unlocked certification to user.Root
Certification security level corresponding to the usage scenario information being presently according to wearable device determines unlock certification policy, then
The correspondence component in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy to execute certification, thus
The security logic for unlocking certification under different usage scenarios is improved, the security protection performance of unlock certification is ensure that, enhances
User experience.
Second embodiment
In order to better understand the present invention, the present embodiment is illustrated unlock authentication method with a specific example,
Fig. 4 is the refined flow chart for the unlock authentication method that second embodiment of the invention provides, which includes:
S401, wearable device is judged currently whether in authentication state to be unlocked, if so, S402 is executed, if it is not, then
Execute S401.
S402, the usage scenario information being presently in determined by wearable device itself is obtained;It is set on wearable device
It is equipped with the biological characteristic authentication component of multiple and different types.
There are many biological characteristic authentication components, such as fingerprint authentication component, iris authentication component, sound for setting in the present embodiment
Line certified component, heart rate certified component, the type of the corresponding biological information authenticated of different biological characteristic authentication components
Also corresponding different.In addition, external use of the usage scenario information association in the present embodiment when user uses wearable device
One of environment, including geographical location information, temporal information, ambient condition information are a variety of.
S403, it is closed according to the mapping between usage scenario information and preset usage scenario information and certification security level
System determines current corresponding certification security level.
The difference of the usage scenario as locating for wearable device, then also there is required safety when being unlocked certification
Institute is different, namely different certification security levels is corresponding under different usage scenarios.
S404, it is closed according to the mapping between certification security level and preset certification security level and unlock certification policy
System, determines corresponding unlock certification policy.
Different certification security levels is corresponding with different unlock certification policies in the present embodiment, and different unlocks authenticates plan
It is slightly associated with the unlock certification demand for security under different usage scenarios, to realize different unlock authentication securities.It should
Illustrate, unlock certification policy here, which can be according to the role of biological characteristic authentication component, to be formulated, and can also be knot
Both the role of symphysis object features component and quantity formulate.
S405, control wearable device prompt unlock certification policy.
Unlock certification policy can also be prompted, be allowed a user to after determining unlock certification policy in the present embodiment
It is enough accurately to know the unlock authentication mode that currently execute, the unlock operating efficiency of user can be improved.
S406, according to unlocking, the corresponding biology that certification policy controls in a variety of different types of biological characteristic authentication components is special
Sign certified component is unlocked certification to user.
Corresponding unlock certification policy is different under different usage scenarios, specified under difference unlock certification policy
The biological characteristic authentication component used is different, to enhance the security logic for being unlocked certification under different usage scenarios
Property.
The present invention provides a kind of unlock authentication method, is in when unlocking authentication state in wearable device, according to can wear
Certification security level corresponding to the usage scenario information that equipment is presently in is worn to determine unlock certification policy, then according to solution
Lock certification policy controls the correspondence component in a variety of different types of biological characteristic authentication components to execute certification, to improve
The security logic that certification is unlocked under different usage scenarios ensure that the security protection performance of unlock certification, and enhancing user makes
With experience.
3rd embodiment
In order to better understand the present invention, the present embodiment also says unlock authentication method with another specific example
Bright, Fig. 5 is the refined flow chart for the unlock authentication method that third embodiment of the invention provides, which includes:
S501, it is in when unlocking authentication state in wearable device, obtains the terminal with wearable device binding connection
The usage scenario information that the wearable device sended over is presently in;The life of multiple and different types is provided on wearable device
Object feature verification component.
S502, it is closed according to the mapping between usage scenario information and preset usage scenario information and certification security level
System determines current corresponding certification security level.
S503, it is closed according to the mapping between certification security level and preset certification security level and unlock certification policy
System, determines corresponding unlock certification policy.
S504, according to unlocking, the corresponding biology that certification policy controls in a variety of different types of biological characteristic authentication components is special
Sign certified component is unlocked certification to user.
S505, when being unlocked authentification failure to user, control wearable device to unlock certification policy prompt.
Biological characteristic authentication component operated by user and current unlock certification policy not phase are being recognized in the present embodiment
Fu Shi prompts the user with current unlock certification policy, so that user can be rear after the unlock authentication mode using mistake
It is continuous to continue unlock certification using correct unlock authentication mode.
S506, when the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, control can be worn
Equipment is worn to be acquired at least one of ambient image information, location information, the biological information for being certified user.
S507, warning information is generated according to the collected information of institute, and send out to the terminal with wearable device binding connection
Send warning information.
In practical applications, when wearable device continuous several times unlock authentification failure be then likely to by illegal user into
Row unlock is attempted, and is then sent a warning message at this time to the terminal of binding, is allowed a user to when wearable device meets with pilferage etc.
Preferably take counter-measure.
The present invention provides a kind of unlock authentication method, is in when unlocking authentication state in wearable device, according to can wear
Certification security level corresponding to the usage scenario information that equipment is presently in is worn to determine unlock certification policy, then according to solution
Lock certification policy controls the correspondence component in a variety of different types of biological characteristic authentication components to execute certification, to improve
The security logic that certification is unlocked under different usage scenarios ensure that the security protection performance of unlock certification, and enhancing user makes
With experience.
Fourth embodiment
A kind of wearable device is present embodiments provided, it is shown in Figure 6, including processor 601, memory 602, communication
The biological characteristic authentication component 604 of bus 603 and multiple and different types;
Communication bus 603 is for realizing the company between processor 601, memory 602 and biological characteristic authentication component 604
Connect letter;
Memory 602 is for storing one or more programs, and processor 601 is for executing one stored in memory 602
A or multiple programs, the step of to realize unlock authentication method shown in the various embodiments described above, details are not described herein.
5th embodiment
The present invention also provides a kind of computer readable storage medium, one is stored in the computer readable storage medium
Or multiple programs, which can be executed by one or more processor, to realize the various embodiments described above
Shown in unlock authentication method the step of, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of unlock authentication method, which is characterized in that the unlock authentication method includes:
It is in when unlocking authentication state in wearable device, obtains the usage scenario letter that the wearable device is presently in
Breath;The biological characteristic authentication component of multiple and different types is provided on the wearable device;
Current certification security level is determined according to the usage scenario information;
According to the certification security level and preset certification security level and the mapping relations between certification policy are unlocked, really
Fixed corresponding unlock certification policy;
It is special that the corresponding biology in a variety of different types of biological characteristic authentication components is controlled according to the unlock certification policy
Sign certified component is unlocked certification to user.
2. unlock authentication method as described in claim 1, which is characterized in that the usage scenario information includes: geographical location
At least one of information, temporal information, ambient condition information, people information.
3. unlock authentication method as described in claim 1, which is characterized in that the acquisition wearable device is presently in
Usage scenario information include:
Obtain the usage scenario information being presently in determined by the wearable device itself;
Or, obtain that the wearable device that sends over of terminal connected with wearable device binding is presently in makes
Use scene information.
4. unlock authentication method as described in claim 1, which is characterized in that the biological characteristic authentication component includes: fingerprint
It is certified component, iris authentication component, voiceprint component, multiple in heart rate certified component.
5. unlock authentication method as described in claim 1, which is characterized in that described to be worked as according to usage scenario information determination
Preceding certification security level includes:
According to the mapping relations between the usage scenario information and preset usage scenario information and certification security level, really
Corresponding certification security level before settled.
6. the unlock authentication method as described in any one of claims 1 to 5, which is characterized in that according to the certification safety
Mapping relations between grade and preset certification security level and unlock certification policy, determine corresponding unlock certification policy
Later, further includes:
The wearable device is controlled to prompt the unlock certification policy.
7. the unlock authentication method as described in any one of claims 1 to 5, which is characterized in that authenticated according to the unlock
Correspondence biological characteristic authentication component in a variety of different types of biological characteristic authentication components described in policy control carries out user
After unlock certification, further includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, to the wearable device
The terminal of binding connection sends a warning message.
8. unlock authentication method as claimed in claim 7, which is characterized in that described to be continuously unlocked certification mistake to user
When the number lost reaches preset frequency threshold value, send a warning message packet to the terminal with wearable device binding connection
It includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, the wearable device is controlled
At least one of ambient image information, location information, the biological information for being certified user are acquired;
Warning information is generated according to the collected information of institute, and to described in the terminal transmission with wearable device binding connection
Warning information.
9. a kind of wearable device, which is characterized in that the terminal include processor, memory, communication bus and it is multiple not
The biological characteristic authentication component of same type;
The communication bus is for realizing the connection communication between processor, memory and biological characteristic authentication component;
The processor is for executing one or more program stored in memory, to realize as appointed in claim 1 to 8
The step of unlock authentication method described in one.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or
Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1 to 8
Any one of described in unlock authentication method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810716116.3A CN109033779A (en) | 2018-06-29 | 2018-06-29 | A kind of unlock authentication method, wearable device and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810716116.3A CN109033779A (en) | 2018-06-29 | 2018-06-29 | A kind of unlock authentication method, wearable device and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109033779A true CN109033779A (en) | 2018-12-18 |
Family
ID=65522286
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810716116.3A Pending CN109033779A (en) | 2018-06-29 | 2018-06-29 | A kind of unlock authentication method, wearable device and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109033779A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110769415A (en) * | 2019-10-30 | 2020-02-07 | 维沃移动通信有限公司 | Authentication method and electronic equipment |
CN111161319A (en) * | 2019-12-30 | 2020-05-15 | 秒针信息技术有限公司 | Work supervision method and device and storage medium |
CN111951622A (en) * | 2020-07-15 | 2020-11-17 | 中国人民解放军海军工程大学 | Intelligent glasses for teaching and control method thereof |
WO2021227530A1 (en) * | 2020-05-14 | 2021-11-18 | 华为技术有限公司 | Device enabling method and apparatus, and storage medium |
CN114297621A (en) * | 2022-03-08 | 2022-04-08 | 浙江毫微米科技有限公司 | Login method and device based on spatial anchor point and electronic equipment |
CN114626038A (en) * | 2022-01-26 | 2022-06-14 | 安徽点亮网络技术有限公司 | Identity verification method, system and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104199071A (en) * | 2014-09-23 | 2014-12-10 | 广东欧珀移动通信有限公司 | Method and device for acquiring location information of wearable device |
CN105227572A (en) * | 2015-10-19 | 2016-01-06 | 武汉大学 | Based on the access control system of context aware and method on a kind of mobile platform |
US20160189455A1 (en) * | 2014-12-29 | 2016-06-30 | Suprema Inc. | System and method for managing access for restricted area and information used for access to restricted area |
CN107395881A (en) * | 2017-07-13 | 2017-11-24 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
CN107609365A (en) * | 2016-07-11 | 2018-01-19 | 三星电子株式会社 | For the method and apparatus using multiple biometrics validators checking user |
CN107749844A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | Auth method and mobile terminal |
CN107885987A (en) * | 2017-09-25 | 2018-04-06 | 努比亚技术有限公司 | A kind of unlocking method, terminal and computer-readable recording medium |
-
2018
- 2018-06-29 CN CN201810716116.3A patent/CN109033779A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104199071A (en) * | 2014-09-23 | 2014-12-10 | 广东欧珀移动通信有限公司 | Method and device for acquiring location information of wearable device |
US20160189455A1 (en) * | 2014-12-29 | 2016-06-30 | Suprema Inc. | System and method for managing access for restricted area and information used for access to restricted area |
CN105227572A (en) * | 2015-10-19 | 2016-01-06 | 武汉大学 | Based on the access control system of context aware and method on a kind of mobile platform |
CN107609365A (en) * | 2016-07-11 | 2018-01-19 | 三星电子株式会社 | For the method and apparatus using multiple biometrics validators checking user |
CN107395881A (en) * | 2017-07-13 | 2017-11-24 | 广东欧珀移动通信有限公司 | Solve lock control method and Related product |
CN107885987A (en) * | 2017-09-25 | 2018-04-06 | 努比亚技术有限公司 | A kind of unlocking method, terminal and computer-readable recording medium |
CN107749844A (en) * | 2017-10-16 | 2018-03-02 | 维沃移动通信有限公司 | Auth method and mobile terminal |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110769415A (en) * | 2019-10-30 | 2020-02-07 | 维沃移动通信有限公司 | Authentication method and electronic equipment |
CN111161319A (en) * | 2019-12-30 | 2020-05-15 | 秒针信息技术有限公司 | Work supervision method and device and storage medium |
WO2021227530A1 (en) * | 2020-05-14 | 2021-11-18 | 华为技术有限公司 | Device enabling method and apparatus, and storage medium |
CN111951622A (en) * | 2020-07-15 | 2020-11-17 | 中国人民解放军海军工程大学 | Intelligent glasses for teaching and control method thereof |
CN114626038A (en) * | 2022-01-26 | 2022-06-14 | 安徽点亮网络技术有限公司 | Identity verification method, system and device |
CN114297621A (en) * | 2022-03-08 | 2022-04-08 | 浙江毫微米科技有限公司 | Login method and device based on spatial anchor point and electronic equipment |
CN114297621B (en) * | 2022-03-08 | 2022-08-09 | 浙江毫微米科技有限公司 | Login method and device based on spatial anchor point and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109033779A (en) | A kind of unlock authentication method, wearable device and computer readable storage medium | |
CN108289141A (en) | A kind of the screen locking unlocking method and mobile terminal of mobile terminal | |
CN108171037A (en) | Using startup method, terminal and computer storage media | |
CN108830062A (en) | Face identification method, mobile terminal and computer readable storage medium | |
CN107315937A (en) | A kind of method for secret protection, mobile terminal and computer-readable recording medium | |
CN109558718A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN109522695A (en) | Application program login method, computer end, mobile terminal, system and storage medium | |
CN108683996A (en) | A kind of equipment finding method, terminal and computer readable storage medium | |
CN108062489A (en) | A kind of glance prevention method, terminal and computer readable storage medium | |
CN108961489A (en) | A kind of equipment wearing control method, terminal and computer readable storage medium | |
CN109086582A (en) | A kind of fingerprint verification method, terminal and computer readable storage medium | |
CN108206892A (en) | Guard method, device, mobile terminal and the storage medium of contact person's privacy | |
CN107392013A (en) | A kind of terminal safety protection method, terminal and computer-readable recording medium | |
CN109670287A (en) | Intelligent terminal unlocking method, intelligent terminal and computer readable storage medium | |
CN108174012A (en) | A kind of authority control method and mobile terminal | |
CN109358831A (en) | A kind of display control method, mobile terminal and computer readable storage medium | |
CN108985047A (en) | A kind of unlocking method, terminal, wearable device and computer readable storage medium | |
CN108881594A (en) | Safety identification control method, flexible screen terminal and computer readable storage medium | |
CN108989534A (en) | Message prompt method, mobile terminal and computer readable storage medium | |
CN109543474A (en) | A kind of method for controlling mobile terminal and mobile terminal | |
CN108376239A (en) | A kind of face identification method, mobile terminal and storage medium | |
CN108287738A (en) | A kind of application control method and device | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN109462693A (en) | A kind of information processing method, terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181218 |
|
RJ01 | Rejection of invention patent application after publication |