CN109635527B - Terminal unlocking method, unlocking system and storage medium - Google Patents

Terminal unlocking method, unlocking system and storage medium Download PDF

Info

Publication number
CN109635527B
CN109635527B CN201811238329.6A CN201811238329A CN109635527B CN 109635527 B CN109635527 B CN 109635527B CN 201811238329 A CN201811238329 A CN 201811238329A CN 109635527 B CN109635527 B CN 109635527B
Authority
CN
China
Prior art keywords
level signal
unlocking
terminal
level
keys
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811238329.6A
Other languages
Chinese (zh)
Other versions
CN109635527A (en
Inventor
黄树伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou TCL Mobile Communication Co Ltd
Original Assignee
Huizhou TCL Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou TCL Mobile Communication Co Ltd filed Critical Huizhou TCL Mobile Communication Co Ltd
Priority to CN201811238329.6A priority Critical patent/CN109635527B/en
Publication of CN109635527A publication Critical patent/CN109635527A/en
Application granted granted Critical
Publication of CN109635527B publication Critical patent/CN109635527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a terminal unlocking method, an unlocking system and a storage medium. According to the terminal unlocking method, the auxiliary unlocking key is arranged, the corresponding level signal track is obtained through the level signal calculation of the triggered auxiliary unlocking key, the terminal is unlocked through the level signal track, and then when the terminal is unlocked in a failure mode through terminal unlocking modes such as numbers, biological information and/or touch gestures, the terminal unlocking modes such as numbers, biological information and/or touch gestures of the terminal can be replaced to unlock the terminal, so that a replaceable terminal unlocking mode is provided, the probability of terminal unlocking failure is reduced, and the user experience is improved.

Description

Terminal unlocking method, unlocking system and storage medium
Technical Field
The invention relates to the technical field of terminals, in particular to a terminal unlocking method, an unlocking system and a storage medium.
Background
With the continuous development of terminal technology, the terminal application market is also continuously expanded, various types of terminals become essential articles for daily life and work of people, and the requirements of people on the terminal, in addition to the basic working performance, also have higher and higher requirements on the experience degree.
People usually lock the terminal for reasons of privacy protection or misoperation avoidance and the like in the use process of the terminal, and unlock the terminal when the terminal needs to be used again. However, when the terminal is unlocked, a password may be forgotten or the unlocking may be invalid, and at this time, another unlocking manner is required to assist the user in unlocking the terminal.
Disclosure of Invention
The invention aims to provide a terminal unlocking method, an unlocking system and a storage medium, which can increase terminal unlocking modes.
In order to achieve the above object, the present invention provides a terminal unlocking method, including:
acquiring at least two level signals corresponding to the triggered at least two auxiliary unlocking keys;
calculating level signal tracks corresponding to the at least two auxiliary unlocking keys by using the at least two level signals;
and unlocking the terminal by utilizing the level signal track.
Wherein the step of acquiring at least two level signals corresponding to the at least two triggered auxiliary unlocking keys further comprises:
and acquiring at least two level signals corresponding to the at least two auxiliary unlocking keys according to the triggering sequence of the at least two triggered auxiliary unlocking keys.
Wherein the step of calculating a level signal trajectory corresponding to the at least two auxiliary unlocking keys using the at least two level signals comprises:
comparing the magnitude relation of a first level signal and a second level signal which are adjacent in sequence in the at least two level signals to obtain a comparison result;
respectively calculating level signal sub-tracks between the first level signal and the second level signal which are adjacent in sequence according to the comparison result;
and combining the level signal sub-tracks between the first level signal and the second level signal which are adjacent in sequence to obtain the level signal tracks corresponding to the at least two auxiliary unlocking keys.
Wherein, the step of respectively calculating the level signal sub-tracks between the sequentially adjacent first level signal and second level signal according to the comparison result comprises:
if the comparison result is that the first level signal is greater than the second level signal, calculating according to the first level signal and the second level signal by using a first track equation to obtain a level signal sub-track between the first level signal and the second level signal which are adjacent in sequence;
and if the comparison result is that the first level signal is smaller than the second level signal, calculating according to the first level signal and the second level signal by using a second track method to obtain a level signal sub-track between the sequentially adjacent first level signal and second level signal.
Wherein the level signal is a level amplitude;
the step of acquiring at least two level signals corresponding to the at least two triggered auxiliary unlocking keys comprises:
acquiring at least two level values corresponding to the triggered at least two auxiliary unlocking keys;
calculating corresponding at least two level voltages according to the at least two level values;
converting the at least two level voltages into corresponding at least two level amplitudes.
Wherein the step of unlocking the terminal using the level signal trajectory includes:
and converting the level signal track into a corresponding clock signal, and unlocking the terminal by using the clock signal.
Wherein before the acquiring at least two level signals corresponding to the triggered at least two auxiliary unlocking keys, the method comprises:
and determining that the default unlocking mode of the terminal is invalid, and starting a preset auxiliary unlocking key.
Wherein before the acquiring at least two level signals corresponding to the triggered at least two auxiliary unlocking keys, the method comprises:
and determining that the number of the triggered auxiliary unlocking keys reaches a preset number, or further acquiring an input ending instruction after determining that at least two auxiliary unlocking keys are triggered.
On the other hand, the invention provides a terminal unlocking system, which comprises a processor, a memory and an unlocking circuit which are connected with each other, and at least two auxiliary unlocking keys;
the memory stores instructions for realizing the terminal unlocking method;
the processor executing the instructions in the memory; and the unlocking circuit unlocks the terminal by using the at least two auxiliary unlocking keys according to the execution result of the processor.
In another aspect, the present invention further provides a storage medium storing program data that can be executed to implement the terminal unlocking method.
Has the advantages that: compared with the prior art, the method and the device have the advantages that the auxiliary unlocking key is arranged, the corresponding level signal track is obtained through the level signal calculation of the triggered auxiliary unlocking key, the terminal is unlocked through the level signal track, and further, when the terminal is unlocked in a failure mode through terminal unlocking modes such as numbers, biological information and/or touch gestures, the terminal can be unlocked in the terminal unlocking modes such as numbers, biological information and/or touch gestures, so that a replaceable terminal unlocking mode is provided, the probability of terminal unlocking failure is reduced, and user experience is improved.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of a terminal unlocking method according to the present invention;
FIG. 2 is a schematic flow chart of step S11 shown in FIG. 1;
FIG. 3 is a schematic flow chart diagram illustrating one embodiment of step S12 shown in FIG. 1;
FIG. 4 is a schematic flow chart diagram of another embodiment of step S12 shown in FIG. 1;
FIG. 5 is a schematic flow chart of step S13 shown in FIG. 1;
fig. 6 is a flowchart illustrating a second embodiment of a terminal unlocking method according to the present invention;
fig. 7 is a flowchart illustrating a terminal unlocking method according to a third embodiment of the present invention;
fig. 8 is a flowchart illustrating a fourth embodiment of a terminal unlocking method according to the present invention;
FIG. 9 is a schematic structural diagram of an embodiment of a terminal unlocking system according to the present invention;
FIG. 10 is a schematic structural diagram of another embodiment of a terminal unlocking system according to the present invention;
FIG. 11 is a schematic structural diagram of an embodiment of a storage medium according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without inventive work based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that, if directional indications (such as up, down, left, right, front, and back … …) are involved in the embodiment of the present invention, the directional indications are only used to explain the relative positional relationship between the components, the movement situation, and the like in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indications are changed accordingly.
In addition, if there is a description of "first", "second", etc. in an embodiment of the present invention, the description of "first", "second", etc. is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating a terminal unlocking method according to a first embodiment of the present invention. As shown in fig. 1, the terminal unlocking method of this embodiment may at least include the following steps:
in step S11, the terminal acquires at least two level signals corresponding to the at least two secondary unlocking keys that are triggered.
In this embodiment, a plurality of auxiliary unlocking keys are preset in the terminal, and when a user unlocks the terminal by using the auxiliary unlocking keys, the corresponding auxiliary unlocking keys can be triggered by pressing or touching the auxiliary unlocking keys. In this embodiment, a plurality of preset auxiliary unlocking keys are provided with corresponding level signals, and when the terminal senses which auxiliary unlocking keys are triggered by the user, the terminal can read the corresponding level signals according to the triggered auxiliary unlocking keys. For example, 6 auxiliary unlocking keys a to F are preset, in this embodiment, the 6 auxiliary unlocking keys are respectively provided with corresponding level signals a to F, and when a user uses the auxiliary unlocking keys to unlock, B, C, D of the auxiliary unlocking keys are triggered, so that the corresponding level signals b, c, and d can be obtained according to B, C, D of the triggered auxiliary unlocking keys.
In this embodiment, when the auxiliary unlock key triggered by the user is sensed, the trigger sequence of the triggered auxiliary unlock key may be acquired, so that when the level signal corresponding to the triggered auxiliary unlock key is acquired, the acquisition sequence of the level signal is consistent with the trigger sequence of the auxiliary unlock key, that is, the acquisition sequence of the level signal is acquired according to the trigger sequence of at least two triggered auxiliary unlock keys.
In this embodiment, the multiple auxiliary unlocking keys may be virtual keys or physical keys different from the original virtual keys or physical keys of the terminal, and the auxiliary unlocking keys are not displayed when the terminal normally works, but are displayed again on the touch screen of the terminal when the terminal cannot unlock by using the original virtual keys or physical keys; in addition, the auxiliary unlocking key may also reuse an original virtual key or an original physical key of the terminal, for example, when the terminal cannot unlock the terminal by using the original function of the original virtual key or the original physical key, the function of the virtual key or the original physical key is reset, the virtual key or the original physical key is used as a temporary auxiliary unlocking key, and after the terminal is unlocked, the function of the virtual key or the original physical key is set to the original function. For example, in a normal situation, the terminal is unlocked by using ten numeric keys of 0 to 9, when it is determined that the terminal cannot be unlocked by using the ten numeric keys, a numeric input function originally corresponding to the ten numeric keys is converted into an auxiliary unlocking function, and then the ten numeric keys are used as auxiliary unlocking keys, and at this time, the numeric keys are triggered to not perform numeric input any more, but level signals corresponding to the numeric keys are acquired.
In step S12, level signal traces corresponding to the at least two auxiliary unlocking keys are calculated using the at least two level signals.
By using the level signal acquired in step S11, a level signal trajectory corresponding to the triggered auxiliary unlock key can be obtained from the level signal of each triggered auxiliary unlock key.
In step S13, the terminal is unlocked using the level signal trajectory.
Further, the terminal may unlock using the level signal trace obtained in step S12.
According to the terminal unlocking method provided by the embodiment, the level signal track corresponding to the triggered auxiliary unlocking key is calculated by acquiring the level signal of the triggered auxiliary unlocking key, the terminal is unlocked by using the level signal track, and then when the terminal is unlocked and invalidated through terminal unlocking modes such as numbers, biological information and/or touch gestures, the terminal can be unlocked by replacing the terminal unlocking modes such as the numbers, the biological information and/or the touch gestures of the terminal, so that the probability of terminal unlocking invalidation is reduced, and the user experience is improved.
Further, the level signal in the present embodiment may be a level amplitude. Referring to fig. 2, as shown in fig. 2, the step S11 shown in fig. 1 at least includes the following steps:
in step S111, at least two level values corresponding to the triggered at least two secondary unlocking keys are acquired.
In this embodiment, each auxiliary unlocking key is provided with a corresponding level value, when a user unlocks the terminal by using the auxiliary unlocking key, the corresponding auxiliary unlocking key can be triggered by pressing or touching, and after the terminal senses that the auxiliary unlocking key is triggered by the user, the corresponding level values of the triggered auxiliary unlocking keys can be sequentially acquired according to the triggering sequence of the auxiliary unlocking keys by the user.
In step S112, corresponding at least two level voltages are calculated from the at least two level values.
Further, after the acquired level value corresponding to the triggered auxiliary unlocking key is obtained, the acquired level value is converted into a corresponding level voltage.
In step S113, at least two level voltages are converted into corresponding at least two level amplitudes.
Further, the calculated level voltage is converted into a corresponding level amplitude, and the level voltage is represented by the level amplitude.
Referring to fig. 3, as shown in fig. 3, the step S12 shown in fig. 1 at least includes the following steps:
in step S121, the magnitude relationship between the first level signal and the second level signal that are adjacent to each other in sequence in the at least two level signals is compared to obtain a comparison result.
In this embodiment, the terminal may obtain a plurality of level signals, make the level signal obtained first in every two adjacent level signals be the first level signal, make the level signal obtained later be the second level signal, compare the magnitude relationship of two adjacent level signals, and obtain a corresponding comparison result. It is understood that, in the present embodiment, more than two level signals can be obtained, and a corresponding plurality of comparison results can be obtained by correspondingly comparing two level signals.
For example, a user triggers B, C, D three auxiliary unlocking keys, and then corresponding level signals b, c, and d can be acquired according to B, C, D triggered auxiliary unlocking keys, wherein the level signals b and c are adjacent, when level signal tracks corresponding to the level signals b and c are calculated, the level signal b is a first level signal, the level signal c is a second level signal, and the level signals b and c are compared to obtain a corresponding comparison result; the level signals c and d are adjacent, when level signal tracks corresponding to the level signals c and d are calculated, the level signal c is a first level signal, d is a second level signal, and the level signals c and d are further compared to obtain corresponding comparison results, namely two different comparison results are obtained.
In step S122, level signal sub-trajectories between the first level signal and the second level signal which are sequentially adjacent are calculated, respectively, based on the comparison result.
In this embodiment, the comparison result between two adjacent level signals can be obtained through step S121, and then the level signal sub-trace between the two adjacent level signals can be calculated through the comparison result between the two adjacent level signals. It is understood that the level signal sub-trace between a plurality of adjacent two level signals is obtained in step S121.
For example, step S121 may obtain a comparison result between adjacent level signals b and c in the level signals b, c, d, thereby calculating a level signal sub-trace between adjacent level signals b and c; furthermore, the result of comparison between adjacent level signals c and d can be obtained, and thus the level signal sub-trace between adjacent level signals c and d can be calculated.
In step S123, level signal sub-tracks between the first level signal and the second level signal that are adjacent in sequence are combined to obtain level signal tracks corresponding to at least two auxiliary unlocking keys.
Step S122 obtains a level signal sub-trajectory between each two adjacent level signals, and then the level signal sub-trajectories obtained in step S122 may be combined to obtain a level signal trajectory corresponding to each level signal, that is, to obtain level signal trajectories corresponding to at least two triggered auxiliary unlock keys.
Further, the level signal sub-trajectories between each two adjacent level signals obtained in step S122 are mutually independent line segments, and correspondingly, combining the level signal sub-trajectories between each two adjacent level signals at this time is to connect the level signal sub-trajectories according to the triggering sequence of the corresponding triggered auxiliary unlocking key by the obtained multiple independent line segments.
For example, a level signal sub-trace between adjacent level signals b and c and a level signal sub-trace between adjacent level signals c and d are obtained in step S122; thus, the two obtained level signal sub-traces are combined according to the obtaining order of the level signals b, c, and d, so as to obtain the level signal traces corresponding to the level signals b, c, and d, in other words, the level signal traces corresponding to the triggered auxiliary unlocking key B, C, D.
Further, as shown in fig. 4, according to the difference of the comparison result obtained in step S121, step S122 may include the following steps:
in step S122a, a calculation is performed according to the first level signal and the second level signal by using the first trajectory equation, and a level signal sub-trajectory between the first level signal and the second level signal which are adjacent in sequence is obtained.
In the present embodiment, different methods may be employed to calculate the level signal sub-trajectory according to the comparison result obtained in step S121. When the obtained comparison result is that the first level signal is greater than the second level signal, step S122a is executed, that is, the level signal sub-trajectory is calculated by using the first trajectory equation, further, the level signal difference between the first level signal and the second level signal is calculated, the level signal difference is substituted into the first trajectory equation to obtain a corresponding curve trajectory, and further, the curve trajectory is subjected to differential calculation to obtain a line segment trajectory corresponding to the curve trajectory.
For example, determining that the first level signal is greater than the second level signal according to the comparison result, calculating a level signal difference Δ V1 between the first level signal and the second level signal, where Δ V1 is greater than 0, and where a (-t) is a first trajectory equation (where a is a non-zero natural number, t is an abscissa, and the value of the level signal is an ordinate), substituting the value of Δ V1 into the trajectory equation to obtain a corresponding curve trajectory, performing differential calculation on the curve trajectory to obtain a segment trajectory corresponding to the curve trajectory, where the segment trajectory is a level signal sub-trajectory between the first level signal and the second level signal; the starting point of the level signal sub-track is the level signal difference value Δ V1 as the starting point, and the end point approaches the end point of the level signal difference value Δ V1.
In step S122b, a calculation is performed according to the first level signal and the second level signal by using the second trajectory equation, and a level signal sub-trajectory between the first level signal and the second level signal which are adjacent in sequence is obtained.
When the obtained comparison result is that the first level signal is smaller than the second level signal, step S122b is executed, that is, the level signal sub-trajectory is calculated by using the second trajectory equation, further, the level signal difference between the first level signal and the second level signal is calculated, the level signal difference is substituted into the second trajectory equation to obtain a corresponding curve trajectory, and further, the curve trajectory is subjected to differential calculation to obtain a line segment trajectory corresponding to the curve trajectory.
For example, determining that the first level signal is smaller than the second level signal according to the comparison result, calculating a level signal difference Δ V1 between the first level signal and the second level signal, where Δ V1 is smaller than 0, and a trajectory formula y is a (t) as a second trajectory equation (where a is a non-zero natural number, t is an abscissa, and the value of the level signal is an ordinate), substituting the value of Δ V1 into the trajectory equation to obtain a corresponding curve trajectory, performing differential calculation on the curve trajectory to obtain a segment trajectory corresponding to the curve trajectory, where the segment trajectory is a level signal sub-trajectory between the first level signal and the second level signal; the starting point of the level signal sub-track is the level signal difference value Δ V1 as the starting point, and the end point approaches the end point of the level signal difference value Δ V1.
It is to be understood that the trajectory formula y ═ a (-t) and y ═ a (t) are merely examples of the application of the first trajectory equation and the second trajectory equation, and in other embodiments, the first trajectory equation and the second trajectory equation may adopt other trajectory equations, for example, the trajectory formula y ═ a (t) is the first trajectory equation, and the trajectory formula y ═ a (-t) is the second trajectory equation, which is not limited in particular.
Referring to fig. 5, as shown in fig. 5, the step S13 shown in fig. 1 at least includes the following steps:
in step S131, the level signal trace is converted into a corresponding clock signal.
In step S132, the terminal is unlocked using the clock signal.
In this embodiment, the obtained level signal track is not directly used to unlock the terminal, but the level signal track is sent to the central processing unit, and the central processing unit obtains a corresponding clock signal according to the level signal track, and then unlocks the terminal through the clock signal.
Further, referring to fig. 6, fig. 6 is a flowchart illustrating a terminal unlocking method according to a second embodiment of the present invention. As shown in fig. 6, the terminal unlocking method of this embodiment may at least include the following steps:
in step S21, it is determined that the terminal default unlocking manner is invalid, and a preset auxiliary unlocking key is enabled.
In this embodiment, the auxiliary unlocking key is set to be a key different from an original virtual key or an original physical key of the terminal, and the auxiliary unlocking key is not displayed when the terminal normally works and the terminal can be unlocked by using the original virtual key or the original physical key of the terminal, but is displayed again on the touch screen of the terminal when the terminal cannot be unlocked by using the original virtual key or the original physical key of the terminal. In other embodiments, the auxiliary unlocking key may also reuse an original virtual key or an original physical key of the terminal, for example, when the terminal cannot unlock the terminal by using the original function of the original virtual key or the original physical key, the function of the virtual key or the original physical key is reset, the virtual key or the original physical key is used as a temporary auxiliary unlocking key, and after the terminal is unlocked, the function of the virtual key or the original physical key is set to the original function.
In this embodiment, when the terminal cannot unlock by using the original virtual key or the original physical key, it is determined that the default unlocking mode of the terminal is invalid, and at this time, the auxiliary unlocking key is activated, the auxiliary unlocking key displayed on the touch screen of the terminal, or the virtual key or the physical key is used as a temporary auxiliary unlocking key.
In step S22, the terminal acquires at least two level signals corresponding to the at least two secondary unlocking keys that are triggered.
In step S23, level signal traces corresponding to the at least two auxiliary unlocking keys are calculated using the at least two level signals.
In step S24, the terminal is unlocked using the level signal trajectory.
In this embodiment, the steps S22, S23, and S24 are the same as the steps S11, S12, and S13 shown in fig. 1 to 5, and are not repeated herein.
Further, referring to fig. 7, fig. 7 is a flowchart illustrating a terminal unlocking method according to a third embodiment of the present invention. As shown in fig. 7, the terminal unlocking method of this embodiment may at least include the following steps:
in step S31, it is determined that the number of the triggered auxiliary unlocking keys reaches a preset number.
And when the terminal starts the auxiliary unlocking key, the user can unlock the terminal by using the auxiliary unlocking key. In this embodiment, the user may set the preset number of the auxiliary unlocking keys that need to be triggered during unlocking, and when the number of the auxiliary unlocking keys triggered by the user reaches the preset number, it is determined to end the triggering of the auxiliary unlocking keys. For example, if the number of the auxiliary unlocking keys triggered by the user reaches 5, the user determines to end the triggering of the auxiliary unlocking keys, and at this time, the user triggers other auxiliary unlocking keys in time, and the auxiliary unlocking keys which are continuously triggered are also used as invalid input. The preset number can be set by the user according to the preference and the use habit of the user, and the preset number can be set to be 4, 6 or 9, and the invention is not particularly limited.
In step S32, the terminal acquires at least two level signals corresponding to the at least two secondary unlocking keys that are triggered.
In step S33, level signal traces corresponding to the at least two auxiliary unlocking keys are calculated using the at least two level signals.
In step S34, the terminal is unlocked using the level signal trajectory.
In this embodiment, the steps S32, S33, and S34 are the same as the steps S11, S12, and S13 shown in fig. 1 to 5, and are not repeated herein.
Further, referring to fig. 8, fig. 8 is a schematic flowchart of a terminal unlocking method according to a fourth embodiment of the present invention. As shown in fig. 7, the terminal unlocking method of this embodiment may at least include the following steps:
in step S41, an end input command is further acquired after it is determined that at least two auxiliary unlock keys are triggered.
When the terminal starts the auxiliary unlocking key, the user can unlock the terminal by using the auxiliary unlocking key, at the moment, an input ending key is correspondingly displayed or set, when the user triggers the input ending key, the terminal obtains a corresponding input ending instruction, the user is considered to complete triggering of the auxiliary unlocking key, and subsequent steps are continuously executed.
In step S42, the terminal acquires at least two level signals corresponding to the at least two secondary unlocking keys that are triggered.
In step S43, level signal traces corresponding to the at least two auxiliary unlocking keys are calculated using the at least two level signals.
In step S44, the terminal is unlocked using the level signal trajectory.
In this embodiment, the steps S42, S43, and S44 are the same as the steps S11, S12, and S13 shown in fig. 1 to 5, and are not repeated herein.
Further, in the present embodiment, the second to fourth embodiments of the terminal unlocking method shown in fig. 6 to 8 may be combined with each other to form a new embodiment. For example, the second embodiment of the terminal unlocking method shown in fig. 6 may be combined with the third embodiment of the terminal unlocking method shown in fig. 7, and thus, step S21 may be further performed before step S31 is performed. Accordingly, the second embodiment of the terminal unlocking method shown in fig. 6 may be combined with the fourth embodiment of the terminal unlocking method shown in fig. 8, and thus, step S21 may be further performed before step S41 is performed. Further, the third embodiment of the terminal unlocking method shown in fig. 7 may be combined with the fourth embodiment of the terminal unlocking method shown in fig. 8, and the user may set the preset number of the triggered auxiliary unlocking keys for unlocking to end the triggering of the auxiliary unlocking keys by the user, or may end the triggering of the auxiliary unlocking keys by triggering the end input key.
Further, referring to fig. 9, fig. 9 is a schematic structural diagram of an embodiment of a terminal unlocking system according to the present invention. As shown in fig. 9, the terminal unlocking system 100 of the present embodiment includes a processor 101, a memory 102, an unlocking circuit 103, and at least two auxiliary unlocking keys 104, which are coupled to each other, wherein the processor 101, the memory 102, and the unlocking circuit 103 are all disposed inside the terminal, and are connected to each other through a bus, and may be integrated on the same circuit module in the terminal, or may have their respective circuit modules; the two auxiliary unlocking keys 104 are connected with the processor 101, the memory 102 and the unlocking circuit 103 through a bus, in this embodiment, the auxiliary unlocking keys 104 may be virtual keys or physical keys different from the original virtual keys or physical keys of the terminal, the auxiliary unlocking keys 104 are not displayed when the terminal normally works, and the auxiliary unlocking keys 104 are displayed on the touch screen of the terminal again when the terminal cannot be unlocked by using the original virtual keys or physical keys; in addition, the auxiliary unlocking key 104 may also be a multiplexing of the original virtual key or physical key of the terminal. Wherein, the memory 102 stores instructions for execution by the processor 101 to implement the first to fourth embodiments of the terminal unlocking method shown in fig. 1 to 8. The processor 101 executes the instructions in the memory 102 and sends the corresponding execution result to the unlocking circuit 103; the unlocking circuit 103 unlocks the terminal using at least two auxiliary unlocking keys 104 according to the execution result of the processor 101.
Further, the at least two auxiliary unlocking keys 104 are virtual keys or physical keys different from the original virtual keys or physical keys of the terminal, and the auxiliary unlocking keys 104 are not displayed when the terminal normally works, but are the auxiliary unlocking keys 104 displayed on the touch screen of the terminal again when the terminal cannot be unlocked by using the original virtual keys or physical keys; in addition, the auxiliary unlocking key 104 may also reuse an original virtual key or an original physical key of the terminal, for example, when the terminal cannot unlock the terminal by using the original function of the original virtual key or the original physical key, the function of the virtual key or the original physical key is reset, the virtual key or the original physical key is used as the temporary auxiliary unlocking key 104, and after the terminal is unlocked, the function of the virtual key or the original physical key is set to the original function.
Further, as shown in fig. 10, the processor 101 may include a level sensing circuit 1011, a voltage calculating circuit 1012, a level width converting circuit 1013, a trajectory calculating circuit 1014, and a central processing circuit 1015 connected in this order, and it is understood that the level sensing circuit 1011, the voltage calculating circuit 1012, the level width converting circuit 1013, the trajectory calculating circuit 1014, and the central processing circuit 1015 constituting the processor 101 are also provided inside the terminal. The level sensing circuit 1011 is configured to obtain a corresponding level value according to the auxiliary unlock key 104 triggered by the user, and send the obtained level value to the voltage calculating circuit 1012 according to an obtaining sequence (that is, a triggering sequence of the triggered auxiliary unlock key 104); the voltage calculation circuit 1012 calculates the received level value as a corresponding level voltage, and transmits the calculated level voltage to the level amplitude conversion circuit 1013; the level amplitude conversion circuit 1013 converts the level voltage into a level amplitude, and the level amplitude conversion circuit 1013 further sends the obtained level amplitude to the trajectory calculation circuit 1014, so as to calculate a level signal trajectory corresponding to the triggered auxiliary unlock key 104 by the trajectory calculation circuit 1014; the trajectory calculation circuit 1014 further sends the calculated level signal trajectory to the central processing circuit 1015, the central processing circuit 1015 processes the level signal trajectory to obtain a corresponding clock signal, and sends the clock signal to the unlocking circuit 103; and further the unlocking circuit 103 unlocks the terminal according to the received clock signal.
Referring to fig. 11, fig. 11 is a schematic structural diagram of a storage medium according to an embodiment of the invention. As shown in fig. 9, the storage medium 300 in the present embodiment stores therein program data 301 that can be executed, the program data 301 being executed to implement one or more of the first to fourth embodiments of the terminal unlocking method shown in fig. 1 to 8.
In this embodiment, the storage medium 300 may be a storage medium with a storage function, such as a storage module of an intelligent terminal, a mobile storage device (e.g., a mobile hard disk, a usb disk, etc.), a network cloud disk, an application storage platform, or a server. Further, the storage medium may also be the memory 102 shown in fig. 9 or fig. 10 described above.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes performed by the present specification and drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A terminal unlocking method is characterized by comprising the following steps:
presetting a plurality of auxiliary unlocking keys;
acquiring at least two level signals corresponding to the triggered at least two auxiliary unlocking keys;
comparing the magnitude relation of a first level signal and a second level signal which are adjacent in sequence in the at least two level signals to obtain a comparison result;
respectively calculating level signal sub-tracks between the first level signal and the second level signal which are adjacent in sequence according to the comparison result;
combining level signal sub-tracks between the first level signal and the second level signal which are adjacent in sequence to obtain level signal tracks corresponding to the at least two auxiliary unlocking keys;
converting the level signal trace into a corresponding clock signal;
and unlocking the terminal by utilizing the clock signal track.
2. The terminal unlocking method according to claim 1, wherein the step of acquiring at least two level signals corresponding to the at least two triggered auxiliary unlocking keys further comprises:
and acquiring at least two level signals corresponding to the at least two auxiliary unlocking keys according to the triggering sequence of the at least two triggered auxiliary unlocking keys.
3. The method for unlocking a terminal according to claim 1, wherein the step of calculating level signal sub-trajectories between the sequentially adjacent first level signal and second level signal respectively according to the comparison result comprises:
if the comparison result is that the first level signal is greater than the second level signal, calculating according to the first level signal and the second level signal by using a first track equation to obtain a level signal sub-track between the first level signal and the second level signal which are adjacent in sequence;
and if the comparison result is that the first level signal is smaller than the second level signal, calculating according to the first level signal and the second level signal by using a second track method to obtain a level signal sub-track between the sequentially adjacent first level signal and second level signal.
4. The terminal unlocking method according to claim 1, wherein the level signal is a level amplitude;
the step of acquiring at least two level signals corresponding to the at least two triggered auxiliary unlocking keys comprises:
acquiring at least two level values corresponding to the triggered at least two auxiliary unlocking keys;
calculating corresponding at least two level voltages according to the at least two level values;
converting the at least two level voltages into corresponding at least two level amplitudes.
5. The terminal unlocking method according to claim 1, wherein before the acquiring of the at least two level signals corresponding to the at least two triggered secondary unlocking keys, comprising:
and determining that the default unlocking mode of the terminal is invalid, and starting a preset auxiliary unlocking key.
6. The terminal unlocking method according to claim 1, wherein before the acquiring of the at least two level signals corresponding to the at least two triggered secondary unlocking keys, comprising:
and determining that the number of the triggered auxiliary unlocking keys reaches a preset number, or further acquiring an input ending instruction after determining that at least two auxiliary unlocking keys are triggered.
7. A terminal unlocking system is characterized by comprising a processor, a memory and an unlocking circuit which are connected with each other, and at least two auxiliary unlocking keys;
the memory stores instructions for implementing a terminal unlocking method according to any one of claims 1 to 6;
the processor executing the instructions in the memory; and the unlocking circuit unlocks the terminal by using the at least two auxiliary unlocking keys according to the execution result of the processor.
8. A storage medium characterized by storing program data executable to implement the terminal unlocking method according to any one of claims 1 to 6.
CN201811238329.6A 2018-10-23 2018-10-23 Terminal unlocking method, unlocking system and storage medium Active CN109635527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811238329.6A CN109635527B (en) 2018-10-23 2018-10-23 Terminal unlocking method, unlocking system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811238329.6A CN109635527B (en) 2018-10-23 2018-10-23 Terminal unlocking method, unlocking system and storage medium

Publications (2)

Publication Number Publication Date
CN109635527A CN109635527A (en) 2019-04-16
CN109635527B true CN109635527B (en) 2021-07-09

Family

ID=66066528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811238329.6A Active CN109635527B (en) 2018-10-23 2018-10-23 Terminal unlocking method, unlocking system and storage medium

Country Status (1)

Country Link
CN (1) CN109635527B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201222336A (en) * 2010-11-18 2012-06-01 Fih Hong Kong Ltd Electronic device and waking-up/unlocking method thereof
CN103092503B (en) * 2012-10-11 2016-08-31 百度在线网络技术(北京)有限公司 The unblock of mobile terminal and verification method and unblock and checking device
TWI503697B (en) * 2013-05-07 2015-10-11 Quanta Comp Inc Portable computer and operating method thereof
CN104021325A (en) * 2014-05-30 2014-09-03 江苏兆伏新能源有限公司 Locking and unlocking method for inverter
CN104391648B (en) * 2014-11-28 2017-12-12 惠州Tcl移动通信有限公司 Touch control terminal and its automatic unlocking method
CN107977571A (en) * 2017-11-24 2018-05-01 郑州云海信息技术有限公司 A kind of combination button encryption system and application method
CN108280334A (en) * 2017-12-26 2018-07-13 努比亚技术有限公司 A kind of unlocked by fingerprint method, mobile terminal and computer readable storage medium
CN109033796B (en) * 2018-08-27 2021-09-14 惠州Tcl移动通信有限公司 Unlocking method based on key level amplitude, storage medium and mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
User interface to input in proportion to fingertip pressure;Takako Nonaka et al;《IEEE》;20080709;第1-3页 *
移动终端触摸屏解锁领域技术热点和技术空白点分析;陶爽 等;《中国发明与专利》;20171231;第69-73页 *

Also Published As

Publication number Publication date
CN109635527A (en) 2019-04-16

Similar Documents

Publication Publication Date Title
CN103984495B (en) Operational approach and electronic installation
CN110132458B (en) Dynamic or quasi-dynamic force detection device and method
KR101747403B1 (en) Apparatus and method for statistical user identification using incremental user behavior
US20150109221A1 (en) Method, device, and electronic terminal for unlocking
KR100777107B1 (en) apparatus and method for handwriting recognition using acceleration sensor
US20070132717A1 (en) Input device and method of locking a computer system
CN105303086A (en) Application starting method and terminal
US20140225856A1 (en) Interference detection
EP3432128B1 (en) Button detection method and device
CN104598783A (en) Unlocking method and device of intelligent terminal
CN103339633A (en) Mobile information terminal, grip characteristic learning method, and grip characteristic authentication method
US20140347310A1 (en) Non-linear feedback capacitance sensing
WO2016069217A1 (en) Gesture recognition using gesture elements
CN105144028B (en) Haptic effect signal exchanges unlock
CN105373214A (en) Terminal control method and system
CN105095735A (en) Pattern unlocking method and terminal
CN103118201A (en) System and method for unlocking touch screen
CN104850220A (en) Operation starting method and system based on motion detection
CN109635527B (en) Terminal unlocking method, unlocking system and storage medium
US10088922B2 (en) Smart resonating pen
CN105653164A (en) Method and terminal for voice inputting user event
CN105022484B (en) A kind of terminal operation method and user terminal
TWI684120B (en) Mouse control method and mouse
CN110413189B (en) Virtual keyboard control method and system
JP2010122751A (en) Situation estimation system, situation estimation method, and situation estimation program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant