CN109033779A - A kind of unlock authentication method, wearable device and computer readable storage medium - Google Patents

A kind of unlock authentication method, wearable device and computer readable storage medium Download PDF

Info

Publication number
CN109033779A
CN109033779A CN201810716116.3A CN201810716116A CN109033779A CN 109033779 A CN109033779 A CN 109033779A CN 201810716116 A CN201810716116 A CN 201810716116A CN 109033779 A CN109033779 A CN 109033779A
Authority
CN
China
Prior art keywords
certification
unlock
wearable device
information
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810716116.3A
Other languages
Chinese (zh)
Inventor
张小娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201810716116.3A priority Critical patent/CN109033779A/en
Publication of CN109033779A publication Critical patent/CN109033779A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The present invention provides a kind of unlock authentication method, wearable device and computer readable storage medium, which includes: to be in when unlocking authentication state in wearable device, obtains the usage scenario information that wearable device is presently in;The biological characteristic authentication component of multiple and different types is provided on wearable device;Current certification security level is determined according to usage scenario information;Corresponding unlock certification policy is determined according to certification security level;The correspondence biological characteristic authentication component in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy, and certification is unlocked to user.Certification security level corresponding to the usage scenario information being presently according to wearable device determines unlock certification policy, then the correspondence component in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy to execute certification, to improve the security logic and security protection performance for unlocking certification under different usage scenarios.

Description

A kind of unlock authentication method, wearable device and computer readable storage medium
Technical field
The present invention relates to intelligent wearable device technical field, more specifically to a kind of unlock authentication method, wearable Equipment and computer readable storage medium.
Background technique
With the continuous development of terminal technology, wearable device is since it has the function of to be easy to carry about with one, is easy to use and rich The advantages that rich and quickly budded out into popularity in user group, wearable device be using wearable technology to daily wearing carry out intelligence Energyization design, the general name for the equipment that can be dressed developed, such as Intelligent bracelet, smartwatch, Intelligent glove, Brilliant Eyes Mirror, intelligent necklace, intelligent waistband etc., can provide the functions such as step counting, positioning, alarm clock, heart rate detection, sleep detection for user, Preferably user health can be instructed to live.
And smart terminal product of the wearable device as user's long periods of wear, safety in utilization to user to close weight It wants, if the wearable device of user can be unlocked easily by other users, a number recorded in wearable device can be made According to there is stolen risk, leakage of personal information is gently then caused, heavy then cause any property loss, existing wearable device is carrying out When unlock certification, what is generallyd use is biological characteristic authentication mode, but is in the prior art usually special using single biology Sign authentication mode authenticates to be unlocked, i.e., after user sets a unlock authentication mode, such as finger print identifying or iris are recognized Card, then be all made of the unlock authentication mode backward to be authenticated under any usage scenario, the safety of this unlock authentication mode Logicality is poor, and the risk that biggish biological information is stolen can be faced if under more complicated use environment, peace Full hidden danger is larger.It can be seen that not being well positioned to meet user in the unlock authenticated connection of wearable device in the prior art Use demand so that user experience is bad.
Summary of the invention
The technical problem to be solved in the present invention is that wearable device is all made of under all usage scenarios in the prior art Single biological characteristic authentication mode authenticates to be unlocked, and the security logic of caused unlock certification is poor, and safety is anti- It is lower to protect performance, for the technical problem, provides a kind of unlock authentication method, wearable device and computer-readable storage medium Matter.
In order to solve the above technical problems, the present invention provides a kind of unlock authentication method, which includes:
It is in when unlocking authentication state in wearable device, obtains the usage scenario letter that wearable device is presently in Breath;The biological characteristic authentication component of multiple and different types is provided on wearable device;
Current certification security level is determined according to usage scenario information;
According to certification security level and preset certification security level and the mapping relations between certification policy are unlocked, really Fixed corresponding unlock certification policy;
The correspondence biological characteristic in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy to recognize Card component is unlocked certification to user.
Optionally, usage scenario information includes: geographical location information, temporal information, at least one in ambient condition information Kind.
Optionally, obtaining the usage scenario information that wearable device is presently in includes:
Obtain the usage scenario information being presently in determined by wearable device itself;
Field is used with what the wearable device that sends over of terminal of wearable device binding connection was presently in or, obtaining Scape information.
Optionally, biological characteristic authentication component includes: fingerprint authentication component, iris authentication component, voiceprint component, the heart It is multiple in rate certified component.
Optionally, determine that current certification security level includes: according to usage scenario information
According to the mapping relations between usage scenario information and preset usage scenario information and certification security level, really Corresponding certification security level before settled.
Optionally, according to reflecting between certification security level and preset certification security level and unlock certification policy Relationship is penetrated, after determining corresponding unlock certification policy, further includes:
Control wearable device prompts unlock certification policy.
Optionally, the corresponding life in a variety of different types of biological characteristic authentication components is being controlled according to unlock certification policy Object feature verification component is unlocked after certification user, further includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, to wearable device The terminal of binding connection sends a warning message.
Optionally, when the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, Xiang Yuke The terminal of wearable device binding connection, which sends a warning message, includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, wearable device is controlled At least one of ambient image information, location information, the biological information for being certified user are acquired;
Warning information is generated according to the collected information of institute, and sends and alerts to the terminal with wearable device binding connection Information.
Further, the present invention also provides a kind of wearable device, which includes processor, memory, communicates always The biological characteristic authentication component of line and multiple and different types;
Communication bus is for realizing the connection communication between processor, memory and biological characteristic authentication component;
Processor is for executing one or more program stored in memory, to realize above-mentioned unlock authentication method The step of.
Further, the present invention also provides a kind of computer readable storage medium, which is deposited One or more program is contained, one or more program can be executed by one or more processor, above-mentioned to realize The step of unlocking authentication method.
Beneficial effect
The present invention provides a kind of unlock authentication method, wearable device and computer readable storage medium, for existing skill Wearable device is all made of single biological characteristic authentication mode under all usage scenarios to be unlocked certification in art, is led The security logic of the unlock certification of cause is poor, and the lower defect of security protection performance, the unlock authentication method includes: that can wear It wears equipment to be in when unlocking authentication state, obtains the usage scenario information that wearable device is presently in;On wearable device It is provided with the biological characteristic authentication component of multiple and different types;Current certification security level is determined according to usage scenario information; According to certification security level and preset certification security level and the mapping relations between certification policy are unlocked, are determined corresponding Unlock certification policy;It is special that the corresponding biology in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy Sign certified component is unlocked certification to user.According to certification corresponding to the usage scenario information that wearable device is presently in Security level determines unlock certification policy, then controls a variety of different types of biological characteristic authentications according to unlock certification policy Correspondence component in component executes certification, to improve the security logic for unlocking certification under different usage scenarios, guarantees The security protection performance of unlock certification, enhances user experience.
Detailed description of the invention
Present invention will be further explained below with reference to the attached drawings and examples, in attached drawing:
The hardware structural diagram of Fig. 1 each embodiment one optional mobile terminal to realize the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the basic flow chart for the unlock authentication method that first embodiment of the invention provides;
Fig. 4 is the refined flow chart for the unlock authentication method that second embodiment of the invention provides;
Fig. 5 is the refined flow chart for the unlock authentication method that third embodiment of the invention provides;
Fig. 6 is the structural schematic diagram for the wearable device that fourth embodiment of the invention provides.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, it is only using the suffix for indicating such as " module ", " component " or " unit " of element Be conducive to explanation of the invention, itself there is no a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, plate Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer etc. move The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special Except element for moving purpose, the construction of embodiment according to the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware structural diagram of its mobile terminal of each embodiment to realize the present invention, the shifting Dynamic terminal 100 may include: RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1 Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram, Perhaps certain components or different component layouts are combined.
It is specifically introduced below with reference to all parts of the Fig. 1 to mobile terminal:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating Frequency unit 101 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need It to omit within the scope of not changing the essence of the invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is received or The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103 Audio output relevant to the specific function that mobile terminal 100 executes can also be provided (for example, call signal receives sound, disappears Breath receives sound etc.).Audio output unit 103 may include loudspeaker, buzzer etc..
A/V input unit 104 is for receiving audio or video signal.A/V input unit 104 may include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the image data of the static images or video obtained in image capture mode by image capture apparatus (such as camera) carries out Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case where telephone calling model. Microphone 1042 can be implemented various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition) The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general For three axis) size of acceleration, it can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal Family setting and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect the touch operation of user on it or nearby (for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071 Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. It is one or more, specifically herein without limitation.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel 1061 be the function that outputs and inputs of realizing mobile terminal as two independent components, but in certain embodiments, it can The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example, External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can mainly include storing program area The storage data area and, wherein storing program area can (such as the sound of application program needed for storage program area, at least one function Sound playing function, image player function etc.) etc.;Storage data area can store according to mobile phone use created data (such as Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, it can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place Managing device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Embodiment to facilitate the understanding of the present invention, the communications network system that mobile terminal of the invention is based below into Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system architecture diagram provided in an embodiment of the present invention, the communication network system System is the LTE system of universal mobile communications technology, which includes UE (User Equipment, the use of successively communication connection Family equipment) (the land Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers Such as the function of home location register (not shown) etc, and preserves some related service features, data rates etc. and use The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201 Address distribution and other functions, PCRF2036 are strategy and the charging control strategic decision-making of business data flow and IP bearing resource Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art should know the present invention is not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And the following new network system etc., herein without limitation.
Based on above-mentioned mobile terminal hardware configuration and communications network system, each embodiment of the method for the present invention is proposed.
First embodiment
Single biological characteristic authentication side is all made of under all usage scenarios to solve wearable device in the prior art Formula authenticates to be unlocked, and the security logic of caused unlock certification is poor, the lower technical problem of security protection performance, A kind of unlock authentication method is present embodiments provided, the basic flow of unlock authentication method provided in this embodiment is illustrated in figure 3 Cheng Tu, the unlock authentication method specifically includes the following steps:
S301, it is in when unlocking authentication state in wearable device, what acquisition wearable device was presently in uses field Scape information;The biological characteristic authentication component of multiple and different types is provided on wearable device.
The method of the present embodiment realizes that wearable device includes that any intelligence that can be dressed is set by wearable device Standby, including but not limited to Intelligent bracelet, smartwatch, intelligent glasses etc., signified authentication state to be unlocked is in the present embodiment Refer to that wearable device currently needs to be unlocked user the state of certification, such as when user presses the power key of wearable device Wake up the state that wearable device is entered.Wearable device in the present embodiment executes the certification of biological information to user It is unlocked to realize, biological information has uniqueness, so as to the true identity for characterizing user.It should illustrate It is that there are many biological characteristic authentication component, the corresponding lifes authenticated of different biological characteristic authentication components for setting in the present embodiment The type of object characteristic information is also corresponding different.
Optionally, biological characteristic authentication component includes: fingerprint authentication component, iris authentication component, voiceprint component, the heart It is multiple in rate certified component.
Specifically, different biological characteristic authentication components is realized not by different collecting biological feature information mould groups With the acquisition of type biological information, fingerprint authentication component is by the physical button that is integrated on wearable device or shielding Fingerprint mould group under curtain acquires the fingerprint image of user, and fingerprint mould group here can be optical fingerprint mould group, condenser type Fingerprint mould group or RF type fingerprint mould group;And iris authentication component is then the image acquisition units by being arranged on wearable device The iris image of user is acquired;Voiceprint component be then by the voice-input unit on wearable device come to Family carries out voice input;Heart rate certified component is then the pulse transducer by being arranged on wearable device come the electrocardio to user Signal is acquired.It should be understood that in further embodiments can also include face authentication component, palmprint authentication group The biological characteristic authentications components such as part, fin- ger vein authentication component, do not limit uniquely herein.
Optionally, usage scenario information includes: geographical location information, temporal information, at least one in ambient condition information Kind.
Specifically, outside of usage scenario information association when user uses wearable device in the present embodiment uses ring Border, location information here can (Global Positioning System, the whole world be fixed by the GPS of wearable device itself Position system) it obtains, temporal information can then be obtained by the time system of wearable device itself, or can pass through acquisition Network time carries out the acquisition of temporal information, and ambient condition information then includes the letter of the people or object in user's local environment Breath can carry out the acquisition of ambient image by the image acquisition units being arranged on wearable device to realize.In practical application In, can only using a certain category information above-mentioned as the usage scenario information of required acquisition, can also by aforementioned much information into Row is comprehensive as required usage scenario information.
Optionally, obtaining the usage scenario information that wearable device is presently in includes: to obtain wearable device itself institute The determining usage scenario information being presently in;It is worn or, obtaining with what the terminal of wearable device binding connection sended over Wear the usage scenario information that equipment is presently in.
Specifically, in some embodiments, wearable device can be by the related function module set by itself come straight Tap into the acquisition of row usage scenario information;In further embodiments, usual user can will be wearable in actual use The terminal that equipment and user are held carries out binding use, so that user terminal and wearable device are in same usage scenario Under, usually there is the performance more more powerful than wearable device based on terminal, so usage scenario letter can be carried out by terminal Then usage scenario information is sent to wearable device and communication connection between the two again by the acquisition of breath.Certainly, exist Usage scenario information there are many when, a part of in a variety of usage scenario information can be acquired by wearable device itself, Other parts can be acquired by terminal, i.e., the acquisition of usage scenario information can also be carried out in conjunction with two ways.
S302, current certification security level is determined according to usage scenario information.
In practical applications, the difference of the usage scenario as locating for wearable device is wanted when being then unlocked certification The safety asked is also different, namely different certification security levels is corresponding under different usage scenarios.Wherein to use Scene information is for geographical location information, when acquired geographical location information is in family, often user uses at home The case where wearable device is safer, is leaked or is attacked there is no authentication information, therefore then correspond in this case In relatively low certification security level;And if acquired geographical location information be company when, although in this case surrounding People is more, can have a possibility that certain authentication information leakage, but the employee for the company that exists together is usually acquaintance, safety Hidden danger is substantially relatively small, therefore can then correspond to a medium certification security level in this case;And if current institute When the geographical location information of acquisition is market, the stranger around user is more in this case, and environment nowadays are more multiple Miscellaneous, for its authentication information there are biggish a possibility that revealing or being attacked, security risk is larger when being unlocked certification by user, A higher certification security level should be then corresponded in this case.
Optionally, according to usage scenario information determine current certification security level include: according to usage scenario information with And the mapping relations between preset usage scenario information and certification security level, determine current corresponding certification safety etc. Grade.
Specifically, be previously provided with usage scenario information in the present embodiment and authenticate the mapping relations between security level, The mapping relations can be correspondingly arranged by user according to itself actual demand, i.e., user is according to personal inclination come to difference Usage scenario information corresponding certification security level is set, can also be configured by system according to default rule, i.e., It is automatically each usage scenario information by system to distribute corresponding certification security level, such as the use being related in wearable device Scene information includes family, the different geolocation scenario of three kinds of company and market, then when will can be unlocked at home certification Certification security level be set as the first estate, the certification security level in company is set as the second grade, at market Certification security level be set as the tertiary gradient, from the first estate to the tertiary gradient corresponding to authentication security successively increase.It answers When explanation, scene information can be set using in advance in further embodiments, in wearable device and certification is pacified Mapping relations between congruent grade, but when each triggering is unlocked certification, it is in real time corresponding according to preset algorithm Usage scenario information distribution certification security level.
S303, it is closed according to the mapping between certification security level and preset certification security level and unlock certification policy System, determines corresponding unlock certification policy.
Specifically, certification security level different in the present embodiment is corresponding with different unlock certification policies, different solutions Lock certification policy is associated with the certification demand for security of the unlock under different usage scenarios, to realize different unlock certification safety Property.It should be noted that unlock certification policy here can be according to the role of biological characteristic authentication component and formulate, such as Unlocked by fingerprint certification policy, vocal print unlock certification policy or heart rate unlock certification policy, in practical applications, the peace of finger print identifying Full property is lower, and voiceprint safety is medium, and heart rate authentication security highest, then unlocked by fingerprint certification policy and first etc. Grade is corresponding, and vocal print unlock certification policy is corresponding with the second grade, and it is then opposite with the tertiary gradient that heart rate unlocks certification policy Answer, from the first estate to the tertiary gradient corresponding to authentication security successively increase.It should be understood that in practical applications also Unlock certification policy can be formulated in conjunction with both the role of biological characteristic component and quantity, such as in the certification than the tertiary gradient The higher fourth estate of security requirement, can will unlock certification policy be established as heart rate certification and finger print identifying compound certification Strategy.
Optionally, according to reflecting between certification security level and preset certification security level and unlock certification policy Relationship is penetrated, after determining corresponding unlock certification policy, further includes: control wearable device mentions unlock certification policy Show.
It should be noted that be dynamic change by the unlock certification policy under different usage scenarios in this present embodiment, Therefore user may have the case where cannot accurately holding to unlock certification policy in actual use, then wearable The legitimate user of equipment may be unlocked in a wrong manner certification and unlock failure, be based on this, in the present embodiment Determine that unlock certification policy can also prompt unlock certification policy later, allowing the user to accurately know currently should hold Capable unlock authentication mode can be with to be operated using correct unlock authentication mode to biological characteristic authentication component Improve user unlock operating efficiency, prompting mode here can be shown on the screen of wearable device, can also To be wearable progress voice output, can also be that wearable device carries out light prompt.It should also be noted that recognizing unlock Card strategy, which carries out prompt, can be and prompted before user's operation biological characteristic authentication component, so that user can be the One time was unlocked operation correctly to unlock authentication mode, was also possible to recognizing user's operation biological characteristic authentication Unlock authentication mode when component is just prompted when incorrect, so that user can after the unlock authentication mode using mistake Continue unlock certification using correct unlock authentication mode subsequent.
S304, according to unlocking, the corresponding biology that certification policy controls in a variety of different types of biological characteristic authentication components is special Sign certified component is unlocked certification to user.
Specifically, correspondence associated in unlock certification policy is then controlled in the present embodiment after determining unlock certification policy Biological characteristic authentication component enters state of activation, to allow the authentication information inputted to user to identify and authenticate, here Unlock certification refers to that wearable device obtains preset biological information come to the biological characteristic authentication group being active Certification is compared in the biological information that part is identified, default biological information here can be to be stored in advance in wear Wear the legal biological information in equipment, i.e., the biological characteristic letter that legitimate user reserves when opening unlock authentication function in advance Breath authenticates sample using the matching as unlock certification, and certainly, in other embodiments, default biological information may be used also To be stored in the terminal of wearable device binding connection or storage beyond the clouds, in one case, wearable device can be with When being unlocked certification every time directly to terminal or the legal biological information of cloud request, in another situation Under, it can be after wearable device is lost the biological information being locally stored, wearable device can be from the end of binding End or cloud obtain the biological information of backup and are stored in local.It should be appreciated that for the efficiency for guaranteeing unlock certification And accuracy can be first to biological information after wearable device currently recognizes the biological information of user's input It being pre-processed, the pretreated purpose of biological information is to improve quality, contrast or the clarity etc. of biological information, So as to carry out biological information characteristic extraction, by taking finger print information as an example, finger print information pretreatment specifically include that finger Line segmentation, fingerprint enhancing, binaryzation and micronization processes, by taking voiceprint as an example, voiceprint pretreatment include: noise eliminate, End-point detection and speech enhan-cement.Here disclosed prior art realization can be used in pretreatment mode, and details are not described herein.
Optionally, the corresponding life in a variety of different types of biological characteristic authentication components is being controlled according to unlock certification policy Object feature verification component is unlocked after certification user, further includes: in time for being continuously unlocked authentification failure to user When number reaches preset frequency threshold value, send a warning message to the terminal with wearable device binding connection.
Specifically, in practical applications, for example, legitimate user wearable device stolen by other people after and carry out illegal When trial, stealer usually requires just to can be carried out use after being unlocked wearable device, then stealer is repeatedly being attempted Unlock then sends a warning message to terminal bound in legitimate user when not unlocking, so that legitimate user knows current wear Equipment state is worn to take counter-measure.
Optionally, when the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, Xiang Yuke It includes: to reach in the number for being continuously unlocked authentification failure to user that the terminal of wearable device binding connection, which sends a warning message, When preset frequency threshold value, control wearable device is to ambient image information, location information, the biological characteristic letter for being certified user At least one of breath is acquired;Warning information is generated according to the collected information of institute, and is connected to being bound with wearable device The terminal connect sends a warning message.
Specifically, in some embodiments, warning information can be only that simple unlock unsuccessfully prompts.And in the present embodiment In, in order to guarantee the maximum safety protection function of warning information, can then be controlled in the present embodiment in repeatedly unlock authentification failure Wearable device carries out wearable device current environment image information, location information, the biological information for the person of being certified etc. Acquisition, to generate warning information based on above- mentioned information, the terminal with wearable device binding is when receiving the warning information Can then there are more understandings to wearable device present case, can preferably take counter-measure when meeting with pilferage etc..
The present invention provides a kind of unlock authentication method, equal under all usage scenarios for wearable device in the prior art Certification is unlocked using single biological characteristic authentication mode, the security logic of caused unlock certification is poor, peace The lower defect of full protection performance, the unlock authentication method include: to be in when unlocking authentication state in wearable device, are obtained The usage scenario information that wearable device is presently in;The biological characteristic authentication of multiple and different types is provided on wearable device Component;Current certification security level is determined according to usage scenario information;According to certification security level and preset certification peace Mapping relations between congruent grade and unlock certification policy, determine corresponding unlock certification policy;According to unlock certification policy control The correspondence biological characteristic authentication component made in a variety of different types of biological characteristic authentication components is unlocked certification to user.Root Certification security level corresponding to the usage scenario information being presently according to wearable device determines unlock certification policy, then The correspondence component in a variety of different types of biological characteristic authentication components is controlled according to unlock certification policy to execute certification, thus The security logic for unlocking certification under different usage scenarios is improved, the security protection performance of unlock certification is ensure that, enhances User experience.
Second embodiment
In order to better understand the present invention, the present embodiment is illustrated unlock authentication method with a specific example, Fig. 4 is the refined flow chart for the unlock authentication method that second embodiment of the invention provides, which includes:
S401, wearable device is judged currently whether in authentication state to be unlocked, if so, S402 is executed, if it is not, then Execute S401.
S402, the usage scenario information being presently in determined by wearable device itself is obtained;It is set on wearable device It is equipped with the biological characteristic authentication component of multiple and different types.
There are many biological characteristic authentication components, such as fingerprint authentication component, iris authentication component, sound for setting in the present embodiment Line certified component, heart rate certified component, the type of the corresponding biological information authenticated of different biological characteristic authentication components Also corresponding different.In addition, external use of the usage scenario information association in the present embodiment when user uses wearable device One of environment, including geographical location information, temporal information, ambient condition information are a variety of.
S403, it is closed according to the mapping between usage scenario information and preset usage scenario information and certification security level System determines current corresponding certification security level.
The difference of the usage scenario as locating for wearable device, then also there is required safety when being unlocked certification Institute is different, namely different certification security levels is corresponding under different usage scenarios.
S404, it is closed according to the mapping between certification security level and preset certification security level and unlock certification policy System, determines corresponding unlock certification policy.
Different certification security levels is corresponding with different unlock certification policies in the present embodiment, and different unlocks authenticates plan It is slightly associated with the unlock certification demand for security under different usage scenarios, to realize different unlock authentication securities.It should Illustrate, unlock certification policy here, which can be according to the role of biological characteristic authentication component, to be formulated, and can also be knot Both the role of symphysis object features component and quantity formulate.
S405, control wearable device prompt unlock certification policy.
Unlock certification policy can also be prompted, be allowed a user to after determining unlock certification policy in the present embodiment It is enough accurately to know the unlock authentication mode that currently execute, the unlock operating efficiency of user can be improved.
S406, according to unlocking, the corresponding biology that certification policy controls in a variety of different types of biological characteristic authentication components is special Sign certified component is unlocked certification to user.
Corresponding unlock certification policy is different under different usage scenarios, specified under difference unlock certification policy The biological characteristic authentication component used is different, to enhance the security logic for being unlocked certification under different usage scenarios Property.
The present invention provides a kind of unlock authentication method, is in when unlocking authentication state in wearable device, according to can wear Certification security level corresponding to the usage scenario information that equipment is presently in is worn to determine unlock certification policy, then according to solution Lock certification policy controls the correspondence component in a variety of different types of biological characteristic authentication components to execute certification, to improve The security logic that certification is unlocked under different usage scenarios ensure that the security protection performance of unlock certification, and enhancing user makes With experience.
3rd embodiment
In order to better understand the present invention, the present embodiment also says unlock authentication method with another specific example Bright, Fig. 5 is the refined flow chart for the unlock authentication method that third embodiment of the invention provides, which includes:
S501, it is in when unlocking authentication state in wearable device, obtains the terminal with wearable device binding connection The usage scenario information that the wearable device sended over is presently in;The life of multiple and different types is provided on wearable device Object feature verification component.
S502, it is closed according to the mapping between usage scenario information and preset usage scenario information and certification security level System determines current corresponding certification security level.
S503, it is closed according to the mapping between certification security level and preset certification security level and unlock certification policy System, determines corresponding unlock certification policy.
S504, according to unlocking, the corresponding biology that certification policy controls in a variety of different types of biological characteristic authentication components is special Sign certified component is unlocked certification to user.
S505, when being unlocked authentification failure to user, control wearable device to unlock certification policy prompt.
Biological characteristic authentication component operated by user and current unlock certification policy not phase are being recognized in the present embodiment Fu Shi prompts the user with current unlock certification policy, so that user can be rear after the unlock authentication mode using mistake It is continuous to continue unlock certification using correct unlock authentication mode.
S506, when the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, control can be worn Equipment is worn to be acquired at least one of ambient image information, location information, the biological information for being certified user.
S507, warning information is generated according to the collected information of institute, and send out to the terminal with wearable device binding connection Send warning information.
In practical applications, when wearable device continuous several times unlock authentification failure be then likely to by illegal user into Row unlock is attempted, and is then sent a warning message at this time to the terminal of binding, is allowed a user to when wearable device meets with pilferage etc. Preferably take counter-measure.
The present invention provides a kind of unlock authentication method, is in when unlocking authentication state in wearable device, according to can wear Certification security level corresponding to the usage scenario information that equipment is presently in is worn to determine unlock certification policy, then according to solution Lock certification policy controls the correspondence component in a variety of different types of biological characteristic authentication components to execute certification, to improve The security logic that certification is unlocked under different usage scenarios ensure that the security protection performance of unlock certification, and enhancing user makes With experience.
Fourth embodiment
A kind of wearable device is present embodiments provided, it is shown in Figure 6, including processor 601, memory 602, communication The biological characteristic authentication component 604 of bus 603 and multiple and different types;
Communication bus 603 is for realizing the company between processor 601, memory 602 and biological characteristic authentication component 604 Connect letter;
Memory 602 is for storing one or more programs, and processor 601 is for executing one stored in memory 602 A or multiple programs, the step of to realize unlock authentication method shown in the various embodiments described above, details are not described herein.
5th embodiment
The present invention also provides a kind of computer readable storage medium, one is stored in the computer readable storage medium Or multiple programs, which can be executed by one or more processor, to realize the various embodiments described above Shown in unlock authentication method the step of, details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of unlock authentication method, which is characterized in that the unlock authentication method includes:
It is in when unlocking authentication state in wearable device, obtains the usage scenario letter that the wearable device is presently in Breath;The biological characteristic authentication component of multiple and different types is provided on the wearable device;
Current certification security level is determined according to the usage scenario information;
According to the certification security level and preset certification security level and the mapping relations between certification policy are unlocked, really Fixed corresponding unlock certification policy;
It is special that the corresponding biology in a variety of different types of biological characteristic authentication components is controlled according to the unlock certification policy Sign certified component is unlocked certification to user.
2. unlock authentication method as described in claim 1, which is characterized in that the usage scenario information includes: geographical location At least one of information, temporal information, ambient condition information, people information.
3. unlock authentication method as described in claim 1, which is characterized in that the acquisition wearable device is presently in Usage scenario information include:
Obtain the usage scenario information being presently in determined by the wearable device itself;
Or, obtain that the wearable device that sends over of terminal connected with wearable device binding is presently in makes Use scene information.
4. unlock authentication method as described in claim 1, which is characterized in that the biological characteristic authentication component includes: fingerprint It is certified component, iris authentication component, voiceprint component, multiple in heart rate certified component.
5. unlock authentication method as described in claim 1, which is characterized in that described to be worked as according to usage scenario information determination Preceding certification security level includes:
According to the mapping relations between the usage scenario information and preset usage scenario information and certification security level, really Corresponding certification security level before settled.
6. the unlock authentication method as described in any one of claims 1 to 5, which is characterized in that according to the certification safety Mapping relations between grade and preset certification security level and unlock certification policy, determine corresponding unlock certification policy Later, further includes:
The wearable device is controlled to prompt the unlock certification policy.
7. the unlock authentication method as described in any one of claims 1 to 5, which is characterized in that authenticated according to the unlock Correspondence biological characteristic authentication component in a variety of different types of biological characteristic authentication components described in policy control carries out user After unlock certification, further includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, to the wearable device The terminal of binding connection sends a warning message.
8. unlock authentication method as claimed in claim 7, which is characterized in that described to be continuously unlocked certification mistake to user When the number lost reaches preset frequency threshold value, send a warning message packet to the terminal with wearable device binding connection It includes:
When the number for being continuously unlocked authentification failure to user reaches preset frequency threshold value, the wearable device is controlled At least one of ambient image information, location information, the biological information for being certified user are acquired;
Warning information is generated according to the collected information of institute, and to described in the terminal transmission with wearable device binding connection Warning information.
9. a kind of wearable device, which is characterized in that the terminal include processor, memory, communication bus and it is multiple not The biological characteristic authentication component of same type;
The communication bus is for realizing the connection communication between processor, memory and biological characteristic authentication component;
The processor is for executing one or more program stored in memory, to realize as appointed in claim 1 to 8 The step of unlock authentication method described in one.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be executed by one or more processor, to realize such as claim 1 to 8 Any one of described in unlock authentication method the step of.
CN201810716116.3A 2018-06-29 2018-06-29 A kind of unlock authentication method, wearable device and computer readable storage medium Pending CN109033779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810716116.3A CN109033779A (en) 2018-06-29 2018-06-29 A kind of unlock authentication method, wearable device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810716116.3A CN109033779A (en) 2018-06-29 2018-06-29 A kind of unlock authentication method, wearable device and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109033779A true CN109033779A (en) 2018-12-18

Family

ID=65522286

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810716116.3A Pending CN109033779A (en) 2018-06-29 2018-06-29 A kind of unlock authentication method, wearable device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109033779A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769415A (en) * 2019-10-30 2020-02-07 维沃移动通信有限公司 Authentication method and electronic equipment
CN111161319A (en) * 2019-12-30 2020-05-15 秒针信息技术有限公司 Work supervision method and device and storage medium
CN111951622A (en) * 2020-07-15 2020-11-17 中国人民解放军海军工程大学 Intelligent glasses for teaching and control method thereof
WO2021227530A1 (en) * 2020-05-14 2021-11-18 华为技术有限公司 Device enabling method and apparatus, and storage medium
CN114297621A (en) * 2022-03-08 2022-04-08 浙江毫微米科技有限公司 Login method and device based on spatial anchor point and electronic equipment
CN114626038A (en) * 2022-01-26 2022-06-14 安徽点亮网络技术有限公司 Identity verification method, system and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104199071A (en) * 2014-09-23 2014-12-10 广东欧珀移动通信有限公司 Method and device for acquiring location information of wearable device
CN105227572A (en) * 2015-10-19 2016-01-06 武汉大学 Based on the access control system of context aware and method on a kind of mobile platform
US20160189455A1 (en) * 2014-12-29 2016-06-30 Suprema Inc. System and method for managing access for restricted area and information used for access to restricted area
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107609365A (en) * 2016-07-11 2018-01-19 三星电子株式会社 For the method and apparatus using multiple biometrics validators checking user
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal
CN107885987A (en) * 2017-09-25 2018-04-06 努比亚技术有限公司 A kind of unlocking method, terminal and computer-readable recording medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104199071A (en) * 2014-09-23 2014-12-10 广东欧珀移动通信有限公司 Method and device for acquiring location information of wearable device
US20160189455A1 (en) * 2014-12-29 2016-06-30 Suprema Inc. System and method for managing access for restricted area and information used for access to restricted area
CN105227572A (en) * 2015-10-19 2016-01-06 武汉大学 Based on the access control system of context aware and method on a kind of mobile platform
CN107609365A (en) * 2016-07-11 2018-01-19 三星电子株式会社 For the method and apparatus using multiple biometrics validators checking user
CN107395881A (en) * 2017-07-13 2017-11-24 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107885987A (en) * 2017-09-25 2018-04-06 努比亚技术有限公司 A kind of unlocking method, terminal and computer-readable recording medium
CN107749844A (en) * 2017-10-16 2018-03-02 维沃移动通信有限公司 Auth method and mobile terminal

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110769415A (en) * 2019-10-30 2020-02-07 维沃移动通信有限公司 Authentication method and electronic equipment
CN111161319A (en) * 2019-12-30 2020-05-15 秒针信息技术有限公司 Work supervision method and device and storage medium
WO2021227530A1 (en) * 2020-05-14 2021-11-18 华为技术有限公司 Device enabling method and apparatus, and storage medium
CN111951622A (en) * 2020-07-15 2020-11-17 中国人民解放军海军工程大学 Intelligent glasses for teaching and control method thereof
CN114626038A (en) * 2022-01-26 2022-06-14 安徽点亮网络技术有限公司 Identity verification method, system and device
CN114297621A (en) * 2022-03-08 2022-04-08 浙江毫微米科技有限公司 Login method and device based on spatial anchor point and electronic equipment
CN114297621B (en) * 2022-03-08 2022-08-09 浙江毫微米科技有限公司 Login method and device based on spatial anchor point and electronic equipment

Similar Documents

Publication Publication Date Title
CN109033779A (en) A kind of unlock authentication method, wearable device and computer readable storage medium
CN108289141A (en) A kind of the screen locking unlocking method and mobile terminal of mobile terminal
CN108171037A (en) Using startup method, terminal and computer storage media
CN108830062A (en) Face identification method, mobile terminal and computer readable storage medium
CN107315937A (en) A kind of method for secret protection, mobile terminal and computer-readable recording medium
CN109558718A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN109522695A (en) Application program login method, computer end, mobile terminal, system and storage medium
CN108683996A (en) A kind of equipment finding method, terminal and computer readable storage medium
CN108062489A (en) A kind of glance prevention method, terminal and computer readable storage medium
CN108961489A (en) A kind of equipment wearing control method, terminal and computer readable storage medium
CN109086582A (en) A kind of fingerprint verification method, terminal and computer readable storage medium
CN108206892A (en) Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN107392013A (en) A kind of terminal safety protection method, terminal and computer-readable recording medium
CN109670287A (en) Intelligent terminal unlocking method, intelligent terminal and computer readable storage medium
CN108174012A (en) A kind of authority control method and mobile terminal
CN109358831A (en) A kind of display control method, mobile terminal and computer readable storage medium
CN108985047A (en) A kind of unlocking method, terminal, wearable device and computer readable storage medium
CN108881594A (en) Safety identification control method, flexible screen terminal and computer readable storage medium
CN108989534A (en) Message prompt method, mobile terminal and computer readable storage medium
CN109543474A (en) A kind of method for controlling mobile terminal and mobile terminal
CN108376239A (en) A kind of face identification method, mobile terminal and storage medium
CN108287738A (en) A kind of application control method and device
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN109462693A (en) A kind of information processing method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181218

RJ01 Rejection of invention patent application after publication