CN110379051A - Unlocking method, device, terminal and storage medium - Google Patents

Unlocking method, device, terminal and storage medium Download PDF

Info

Publication number
CN110379051A
CN110379051A CN201910588909.6A CN201910588909A CN110379051A CN 110379051 A CN110379051 A CN 110379051A CN 201910588909 A CN201910588909 A CN 201910588909A CN 110379051 A CN110379051 A CN 110379051A
Authority
CN
China
Prior art keywords
numerical ciphers
terminal
unlock
ciphers
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910588909.6A
Other languages
Chinese (zh)
Other versions
CN110379051B (en
Inventor
蒋燚
陈岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910588909.6A priority Critical patent/CN110379051B/en
Publication of CN110379051A publication Critical patent/CN110379051A/en
Application granted granted Critical
Publication of CN110379051B publication Critical patent/CN110379051B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides a kind of unlocking method, device, terminal and storage medium, and wherein the unlocking method includes: the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;Obtain the first input numerical ciphers on terminal touch screen;When detecting that first input numerical ciphers are matched with the first unlock numerical ciphers, the terminal is unlocked.The technical solution of the embodiment of the present application can reduce the first input numerical ciphers and the matching of the first unlock numerical ciphers of other users, and then the safety of end message can be improved by selecting the first unlock numerical ciphers from the multiple numerical ciphers prestored.

Description

Unlocking method, device, terminal and storage medium
Technical field
The application belongs to field of terminal technology, in particular to a kind of unlocking method, device, terminal and storage medium.
Background technique
With the development of science and technology, terminal supports numerical ciphers to unlock mostly.But due to the presence of monitoring device or When terminal is in public occasion, the numerical ciphers gesture of terminal is easy to be got by other users.When user leaves one section of terminal When the time, the numerical ciphers of other users meeting input terminal cause the leakage of end message.Therefore more and more users' favor In the higher terminal of safety.Terminal can increase the complexity of unlock numerical ciphers, to improve the safety of terminal unlocking.
Summary of the invention
The embodiment of the present application provides a kind of unlocking method, device, terminal and storage medium, and the peace of end message can be improved Quan Xing.
In a first aspect, the embodiment of the present application provides a kind of unlocking method, comprising:
The first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Obtain the first input numerical ciphers on terminal touch screen;
Detect first input numerical ciphers with it is described first unlock numerical ciphers match when, to the terminal into Row unlock.
Second aspect, the embodiment of the present application provide a kind of tripper, comprising:
First acquisition unit, for the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Second acquisition unit, for obtaining the first input numerical ciphers on terminal touch screen;
Terminal unlocking unit, for detecting first input numerical ciphers and the first unlock numerical ciphers Timing is unlocked the terminal.
The third aspect, the embodiment of the present application provide a kind of terminal, including memory, processor and are stored in the storage In device and the computer program that can run on the processor, the processor are realized above-mentioned when executing the computer program Described in any item methods.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer program, The program realizes method described in any of the above embodiments when being executed by processor.
5th aspect, the embodiment of the present application provide a kind of computer program product, wherein above-mentioned computer program product packet The non-transient computer readable storage medium of storage computer program is included, above-mentioned computer program is operable to hold computer Row step some or all of as described in the embodiment of the present application first aspect.The computer program product can be soft for one Part installation kit.
The embodiment of the present application provides a kind of unlocking method, device, terminal and storage medium, by from the multiple numbers prestored The first unlock of selection numerical ciphers in password, when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers, Terminal is unlocked.The technical solution of the embodiment of the present application from the multiple numerical ciphers prestored by selecting the first unlock number Word password, can reduce the matching of the first input numerical ciphers of other users with the first unlock numerical ciphers, and then can be with Improve the safety of end message.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 shows the interface schematic diagram of the unlock numerical ciphers of the embodiment of the present application;
Fig. 2 shows the interface schematic diagrams of the terminal of the embodiment of the present application;
Fig. 3 shows the flow diagram of the embodiment of the present application unlocking method;
Fig. 4 shows the interface schematic diagram of the terminal of the embodiment of the present application;
Fig. 5 shows the structural schematic diagram of the unlocking method of another embodiment of the application;
Fig. 6 shows the interface schematic diagram of the terminal of the embodiment of the present application;
Fig. 7 shows the flow diagram of the unlocking method of another embodiment of the application;
Fig. 8 shows the structural schematic diagram of the tripper according to the embodiment of the present application;
Fig. 9 shows a kind of structural schematic diagram of terminal of the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this Apply for a part of embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
For using the terminal of unlock gesture, when the numerical ciphers and preset number that terminal recognition to user inputs When password is consistent, terminal can be unlocked, the terminal interface after display unlock.When the unlock interface of terminal is 9 palace case, The unlock numerical ciphers of user's input can be as shown in Figure 1.When user in the unlock interface of terminal input numerical ciphers and pre- If unlock numerical ciphers it is consistent when, terminal is unlocked, the terminal interface after display unlock, and terminal interface at this time can be as Shown in Fig. 2.
When terminal is in public occasion, the unlock numerical ciphers of user's input can be with monitored device or other users It gets.Therefore when user leaves terminal for a period of time, the unlock number that other users input before can inputting the user is close Code is unlocked terminal, so that the information leakage of terminal, reduces the safety of terminal.Such as party A-subscriber inputs in B terminal When 486291 numerical ciphers, the C user beside party A-subscriber sees the unlock numerical ciphers.When party A-subscriber is due to accidentally by B When lost terminal, C user can input the unlock numerical ciphers, be unlocked to B terminal, get the information of B terminal storage.
In order to improve the safety of end message, terminal can improve the safety of terminal by changing numeric keypad at random Property.But due to the random variation of numeric keypad, user is not easy to remember and operate, therefore the usage experience of user is bad.And There is the public arena of monitoring device, even if the numeric keypad of terminal can change at random, monitoring device still can completely be remembered Employ the numerical ciphers of family input.Therefore, the present inventor proposes a kind of unlocking method, by obtaining the in multiple numerical ciphers One unlock numerical ciphers, can increase the safety of end message.
The embodiment conceived according to present techniques is described below.
Fig. 3 shows the flow diagram of the embodiment of the present application unlocking method.
It should be noted that the unlocking method of the embodiment of the present application can be applied to tripper, which can be matched It is placed in terminal.Wherein the terminal can be the various electronic equipments with touch screen, including but not limited to smart phone, plate Computer etc..
As shown in figure 3, the unlocking method of the embodiment of the present application may comprise steps of:
S101 selects the first unlock numerical ciphers from the multiple numerical ciphers prestored.
According to some embodiments, user, which can be set, multiple and different prestores unlock numerical ciphers.User setting is multiple not With unlock numerical ciphers when, each unlock numerical ciphers can be provided with corresponding title respectively.The title can be use It is named according to the shape of unlock numerical ciphers at family.The shape and numerical ciphers of numerical ciphers correspond to title can be as shown in Figure 4. For example, the unlock numerical ciphers of user setting are "Z"-shaped, then the title of the unlock numerical ciphers can be " Z ".User is to every A unlock numerical ciphers are provided with corresponding name, and the convenience that user uses can be improved.
It can be readily appreciated that the digit of the numerical ciphers can be arranged with the performance of terminal according to the demand of user.Terminal It can support the numerical ciphers of 1 or multidigit.The numerical ciphers of terminal setting for example can be the password of 4 bit digitals.User The numerical ciphers of setting for example can also be the password of 6 bit digitals.When terminal only supports 4 bit digital password, terminal can only be set Set 4 numerical ciphers.
Optionally, terminal selects the first unlock numerical ciphers according to current date from the multiple numerical ciphers prestored.With Corresponding numerical ciphers are arranged to the different dates according to self-demand in family.Terminal can be according to the current date, from preset The first unlock of selection numerical ciphers in multiple numerical ciphers.Such as 10 different numbers can be arranged according to date mantissa in user Password.The corresponding numerical ciphers of each mantissa, the different corresponding numerical ciphers of mantissa are also different.0 in 10 date mantissa, 1, 2,3,4,5,6 corresponding numerical ciphers for example can be respectively " 521485 " numerical ciphers, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers, " 879315 " numerical ciphers and " 484515 " Shape numerical ciphers.When terminal detect current date be 25 days when, terminal selected from preset multiple numerical ciphers first Unlock numerical ciphers are " 454826 " numerical ciphers.
According to some embodiments, terminal randomly chooses the first unlock numerical ciphers from the multiple numerical ciphers prestored.With When family determines the selection mode of the first unlock numerical ciphers to randomly choose, corresponding setting instruction terminal can be sent.Terminal After receiving setting instruction, parses the setting and instruct to obtain command information.Terminal is according to the obtained command information of parsing, by the The selection mode of one unlock numerical ciphers is set as randomly choosing.When terminal selects the first solution from the multiple numerical ciphers prestored Before locking numerical ciphers, multiple numerical ciphers can be ranked up.Terminal can be according to pre-set random algorithm from pre- The first unlock of selection numerical ciphers in the multiple numerical ciphers deposited.Multiple numerical ciphers that terminal prestores for example may include " 521485 " numerical ciphers, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " Numerical ciphers.According to random algorithm, the numerical ciphers that terminal is got for example can be " 454826 " numerical ciphers.According to random Algorithm, the numerical ciphers that terminal is got again for example can also be " 521485 " numerical ciphers.
Optionally, terminal can respond the user's operation setting replacement cycle.User can determine according to self-demand and unlock The replacement cycle of numerical ciphers, and send corresponding operation instruction terminal.After terminal receives the operational order, the setting is parsed Instruction obtains command information.The replacement cycle is arranged in the command information that terminal is obtained according to parsing, response user's operation.Terminal response The replacement cycle of user's operation setting, which can be, replaces that primary, replacement daily is primary, replaces weekly after the success of each terminal unlocking Once, monthly replacement is primary and replaces primary one of which every year.
According to some embodiments, terminal can be selected unlock number close by the replacement cycle from the multiple numerical ciphers prestored Code.It is primary that the replacement cycle of the unlock numerical ciphers of terminal setting for example can be replacement daily.7 differences can be set in terminal Numerical ciphers, so weekly respectively correspond a numerical ciphers daily.7 different digital passwords for example can be " 521485 " numerical ciphers, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " Numerical ciphers, " 879315 " numerical ciphers and " 484515 " shape numerical ciphers.Terminal can choose phase according to calendar information daily The unlock numerical ciphers answered.Such as Monday weekly, the first unlock numerical ciphers of terminal selection can be " 484515 " figurate number Word password.
Optionally, terminal selected from the multiple numerical ciphers prestored according to the replacement cycle first unlock numerical ciphers it Before, multiple numerical ciphers can be ranked up.When terminal selects the first numerical ciphers, the can be selected in sequence One numerical ciphers can also select the first numerical ciphers in the way of backward.The replacement of the unlock numerical ciphers of terminal setting It is primary that period for example can be replacement daily.Terminal for example can be " 521485 " number to the sequence of 7 different digital passwords Password, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers, " 879315 " numerical ciphers and " 484515 " shape numerical ciphers.Terminal can choose corresponding unlock according to calendar information daily Numerical ciphers.Such as Monday weekly, the first unlock numerical ciphers of terminal selection can be " 754824 " numerical ciphers.Such as The first unlock numerical ciphers of Tuesday weekly, terminal selection can be " 521485 " numerical ciphers.
It can be readily appreciated that the numerical ciphers quantity of user setting can be arranged according to the actual demand of user.Such as with 5 numerical ciphers can be set in family, and 5 numerical ciphers can unlock 5 different common terminal applies respectively.5 numbers are close Code for example can be respectively " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers, " 879315 " number Word password and " 484515 " shape numerical ciphers.Wherein " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " number The unlock application corresponding with " 484515 " shape numerical ciphers of password, " 879315 " numerical ciphers can for example answer for music With, application of taking pictures, short message application, chat application and game application.
S102 obtains the first input numerical ciphers on terminal touch screen.
According to some embodiments, when user needs a certain of using terminal in application, needing to be unlocked terminal.Terminal After unlock, the various applications installed on the touch screen meeting display terminal of terminal, user can click required application.Therefore terminal Need to obtain first input numerical ciphers of the user on terminal touch screen.Such as user needs using terminal to browse Domestic News When, terminal supplying power key is clicked, the touch screen of terminal can show unlock interface.User needs to input and default solution in unlock interface Lock matched first input numerical ciphers of numerical ciphers.Terminal needs the first input numerical ciphers inputted according to user to terminal After being unlocked, terminal can just show the Domestic News page that user needs.
It can be readily appreciated that the unlock interface of terminal can be 9 palace cases.The number shown in the 9 palace case can be It is fixed, it is also possible to change at random.When the unlock interface of terminal is shown as 9 fixed palace case, user can be inputted First input numerical ciphers.When terminal detects that the finger of user touches touch screen, the position of the finger is identified, and detect Whether the position is a certain position in 9 palace cases.If terminal detects that the contact position of the finger and touch screen is 9 palace cases First position when, it is determined that the first position be the first input numerical ciphers initial position.Terminal obtains the finger and is touching Touch the number of the touch location on screen.When terminal detects that the finger leaves terminal touch screen from the second position of 9 palace cases, Then terminal determines that the second position is the final position of the first input numerical ciphers.First position is to second position user hand at this time Refer to and the number of terminal touch screen contact position is the first input numerical ciphers that terminal is got.
S103 is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.
According to some embodiments, after terminal gets the first input numerical ciphers and the first unlock numerical ciphers of user, It detects the first input numerical ciphers and whether the first unlock numerical ciphers matches.If terminal detects first input numerical ciphers With the first unlock numerical ciphers matching, then terminal is unlocked.Terminal can detecte the first input numerical ciphers and the first solution Whether completely the same numerical ciphers are locked, if the first input numerical ciphers and the first unlock numerical ciphers are completely the same, to terminal It is unlocked.For example, the first input numerical ciphers that terminal is got are to fix the first L-shaped input number of 9 palace cases Word password.The first unlock numerical ciphers that terminal is got from multiple numerical ciphers are also the number of " 14789 " of 9 palace cases Password.Terminal detects the first input numerical ciphers and the first unlock numerical ciphers matching, then is unlocked to terminal.
It can be readily appreciated that after terminal unlocking, the original interface that the display screen of terminal can be arranged with display terminal system, also It can show the pre-set display interface of user.For example, presetting for user can be user in terminal in unlock circle When face, in the numerical ciphers of the touch screen input " 568596 " of terminal, the A application of terminal can be unlocked.Then when terminal detects It is the numerical ciphers of " 568596 " to the first input numerical ciphers, and first input numerical ciphers unlock numerical ciphers with first When matching, terminal is unlocked.After terminal unlocking, the display screen of terminal is shown as the initial display interface of A application.
According to some embodiments, when terminal detects that the first input numerical ciphers are mismatched with the first unlock numerical ciphers When, terminal is not unlocked.When terminal gets the first input numerical ciphers of user again, terminal is close from multiple numbers The first unlock numerical ciphers are obtained again in code.Terminal detects the first input numerical ciphers and the first unlock numerical ciphers again Matching degree.When terminal detects that first input numerical ciphers are matched with the first unlock numerical ciphers, terminal is unlocked.
It can be readily appreciated that the sequence of step S102 and step S101 are not construed as limiting, i.e. step S102 and step S101's Sequence can be interchanged.Terminal for example can first select the first unlock number according to current date from the multiple numerical ciphers prestored Then password obtains the first input numerical ciphers on terminal touch screen again, in the first input numerical ciphers and the first unlock number When word password match, terminal is unlocked.It is close that terminal for example can also first obtain the first input number on terminal touch screen Then code is selecting the first unlock numerical ciphers according to current date from the multiple numerical ciphers prestored, is inputting number first When word password is matched with the first unlock numerical ciphers, terminal is unlocked.
The embodiment of the present application provides a kind of unlocking method, by selecting the first unlock number from the multiple numerical ciphers prestored Word password is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.The application The technical solution of embodiment can reduce other use by obtaining the first unlock numerical ciphers from the multiple numerical ciphers prestored The matching of first input numerical ciphers at family and the first unlock numerical ciphers, and then the safety of end message can be improved.
Fig. 5 shows the structural schematic diagram of the unlocking method of another embodiment of the application.
As shown in figure 5, the unlocking method may include:
S201 provides the prompt information of the first unlock numerical ciphers.
According to some embodiments, before terminal gets the first input numerical ciphers of user on the touchscreen, Ke Yifa The first input numerical ciphers prompt information out.The prompt information can be text information, voice messaging, image information and video One of which in information.
Optionally, which for example can be text information.The text information for example can be the of user setting The title of one input numerical ciphers.The title for example can be " birthday ", and the interface display of terminal can be as shown in Figure 6 at this time. User can be according to pre-set first input numerical ciphers of the text information input.When the title of the first input numerical ciphers When for " birthday ", there are a variety of numerical ciphers on the touch screen of terminal, user needs the memory according to oneself, inputs oneself and set The numerical ciphers set.
It can be readily appreciated that the prompt information for example can be voice messaging.The voice messaging for example can be user and set The title for the first input numerical ciphers set.Before the first input numerical ciphers that terminal obtains on touch screen, the solution of terminal Lock interface can be shown as 9 palace cases.According to the pre-set numerical ciphers title of user, the microphone of terminal can be broadcast with voice Put the title.When user receives the title, according to first input numerical ciphers of title.Since monitoring device is apart from terminal When position is farther out or monitoring device does not have phonetic function, monitoring device cannot get the speech prompt information, Ke Yiti The safety of high end message.
According to some embodiments, which for example can also be image information.The display mode of the image information can To be complete first input numerical ciphers of display, a part for showing first input numerical ciphers can also be.Such as with Family setting prompt information can be a part for showing first input numerical ciphers.When user gets the first input number When a part of password, user according to a part of first input numerical ciphers remember it is complete first input number it is close Code, then user can directly input complete first input numerical ciphers.
According to some embodiments, which for example can also be video information.The video information for example can be can To be set as showing within 3 seconds complete first input numerical ciphers.When user gets the first input number of display in the 1st second When password, user remembers complete first input numerical ciphers according to the first input numerical ciphers of display in the 1st second, then user Complete first input numerical ciphers can be directly inputted.The prompt information can reduce the disclosure risk of numerical ciphers, can be with Improve the safety of end message.
S202 obtains the first position of the first input numerical ciphers and terminal on terminal touch screen.
It specifically describes as described above, details are not described herein again.
According to some embodiments, when the first position of terminal can be terminal acquisition input unlock numerical ciphers, terminal institute Geographical location.The first position, which can refer to, to be obtained by various positioning methods.Terminal accesses wireless according to terminal The geographical location information of access point, the geographical location information of terminal where obtaining.Terminal can also pass through satellite positioning (GPS, north Bucket etc.), WiFi positioning, bluetooth positioning, ultra-wide band (UWB), ultrasonic wave position the common positioning method such as equipotential to obtain the geography Location information, but it is not limited only to the above method.
S203 obtains the second input numerical ciphers on terminal touch screen and the second position.
It specifically describes as described above, details are not described herein again.
Optionally, terminal obtains the first position of terminal and the second position is two different geographical locations.Such as terminal When the first position of terminal can be the geographical location Y when obtaining the first input unlock gesture, terminal obtains the second input unlock hand The second position of terminal for example can be the geographical location T when gesture.
S204, it is close from the multiple numbers prestored when the distance between the second position and first position are greater than preset threshold The second unlock of selection numerical ciphers in code, the second unlock numerical ciphers are different from the first unlock numerical ciphers.
According to some embodiments, when terminal gets the first position and the second position of terminal, first position and the are detected Whether the distance between two positions are greater than preset threshold.Preset threshold can be user and is arranged according to the habit of itself using terminal 's.Such as user often occurs losing the behavior of thing, and lesser preset threshold can be set.
Optionally, when terminal detects that the distance between first position and the second position are greater than preset threshold, from prestoring Multiple numerical ciphers in selection second unlock numerical ciphers, second unlock numerical ciphers be different from first unlock numerical ciphers. Multiple numerical ciphers for example can be " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers, " 879315 " numerical ciphers and " 484515 " shape numerical ciphers.The first unlock numerical ciphers that terminal is got for example can be " 454856 " numerical ciphers.Terminal can also be according to the second unlock of selection numerical ciphers from the multiple numerical ciphers prestored.Eventually The preset threshold of end setting for example can be 500m.When terminal detects that the distance between first position and the second position are greater than When 500m, the second unlock numerical ciphers that terminal is got for example can be " 879315 " numerical ciphers.
S205 is unlocked terminal when the second input numerical ciphers are matched with the second unlock numerical ciphers.
According to some embodiments, after terminal gets the second input numerical ciphers and the second unlock numerical ciphers of user, It detects the second input numerical ciphers and whether the second unlock numerical ciphers matches.If terminal detects second input numerical ciphers With the second unlock numerical ciphers matching, then terminal is unlocked.Terminal can detecte the second input numerical ciphers and the second solution Whether completely the same numerical ciphers are locked, if the second input numerical ciphers and the second unlock numerical ciphers are completely the same, to terminal It is unlocked.For example, the second input numerical ciphers that terminal is got are 9 the second input numerical ciphers of palace case " 454856 ". The second unlock numerical ciphers that terminal is got from multiple numerical ciphers are also that 9 palace cases " 454856 " second unlock number is close Code.Terminal detects the second input numerical ciphers and the second unlock numerical ciphers matching, then is unlocked to terminal.
The embodiment of the present application provides a kind of unlocking method, etc. terminals detect input unlock numerical ciphers when terminal first When the distance between position and the second position are greater than preset threshold, are obtained from the multiple numerical ciphers prestored and be different from the first solution Lock the second unlock numerical ciphers of numerical ciphers.Terminal detects that the second input numerical ciphers of acquisition and the second unlock number are close When code matching, terminal is unlocked.When the technical solution of the embodiment of the present application is based on terminal the second input numerical ciphers of acquisition The first position and the second position of terminal detect that the distance between first position and the second position are greater than preset threshold, from pre- The second unlock numerical ciphers are obtained in the multiple numerical ciphers deposited, and can reduce the first input numerical ciphers of other users and the The matching of two unlock numerical ciphers, and then the safety of end message can be improved.
Fig. 7 shows the flow diagram of the unlocking method of another embodiment of the application.
As shown in fig. 7, the unlocking method may include:
S301 obtains the first input numerical ciphers on terminal touch screen.
It specifically describes as described above, details are not described herein again.
Whether the WIFI network of S302, detection terminal connection are safe WIFI network.
According to some embodiments, terminal access WIFI network the case where include: terminal open WIFI switch, access WIFI net Network, or other WIFI networks, i.e. WIFI network handoff procedure are switched to from the WIFI network currently accessed, it accesses new WIFI network.When terminal accesses WIFI network, judge whether accessed WIFI network is dangerous WIFI network.
It can be readily appreciated that terminal can detecte connection WIFI network whether be the security protocol authenticated WIFI net Network is when terminal is currently accessed WIFI network, the available WIFI network data being currently accessed of terminal, WIFI network data packet Include authenticated data, WIFI title, connection status, turn-on time, access environment etc..The authenticated data includes whether authenticated Security protocol data, that is, whether the security protocol of the WIFI network accessed by the verifying of terminal, or access Whether WIFI network is already set as secure network, or be provided with secure network mark etc..Terminal, which is got, to be currently accessed WIFI network data after, judge the WIFI network that currently connects whether be the security protocol authenticated WIFI network.
S303, when detecting the WIFI network of terminal connection is secure network, from the of the multiple numerical ciphers prestored The first unlock of selection numerical ciphers in one subset.
According to some embodiments, secure network can be preset safe WIFI network in terminal, the safe WIFI network It can be the WIFI network for the proper password connection that terminal is inputted by user.The safe WIFI network for example can be user certainly Oneself family lan.
Optionally, the numerical ciphers for including in the first subset of the multiple numerical ciphers prestored are that multiple numbers for prestoring are close A part of code.The quantity for the numerical ciphers that first subset includes can be depending on user demand.
It can be readily appreciated that when terminal detects that the WIFI network of connection is secure network, from the multiple numbers prestored The first unlock of selection numerical ciphers in first subset of password.Terminal detects that the WIFI network of connection for example can be to have authenticated Security protocol WIFI network, then the WIFI network of terminal connection is safe WIFI network, and terminal is from the multiple numbers prestored The first unlock of selection numerical ciphers in first subset of password.
S304, when detecting the WIFI network of terminal connection is insecure network, from the multiple numerical ciphers prestored The first unlock of selection numerical ciphers in second subset.
According to some embodiments, insecure network can be the WIFI network not prestored in terminal, this is unsafe WIFI network for example may include that businessman's selection is not provided with password or setting password using WEP certification etc..
Optionally, the numerical ciphers for including in the second subset of the multiple numerical ciphers prestored are that multiple numbers for prestoring are close A part of code.The quantity for the numerical ciphers that the second subset includes can be depending on user demand.What second subset included The numerical ciphers that numerical ciphers and the first subset include do not have intersection.Such as second subset include " 748512 " numerical ciphers when, First subset does not centainly include " 748512 " numerical ciphers.
It can be readily appreciated that when terminal detects that the WIFI network of connection is insecure network, from the multiple numbers prestored The first unlock of selection numerical ciphers in the second subset of word password.Terminal detect the WIFI network of connection for example can for without The WIFI network of security protocol verification is crossed, then the WIFI network of terminal connection is dangerous WIFI network, and terminal is more from what is prestored The first unlock of selection numerical ciphers in the second subset of a numerical ciphers.
S305 is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.
According to some embodiments, after terminal gets the first input numerical ciphers and the first unlock numerical ciphers of user, It detects the first input numerical ciphers and whether the first unlock numerical ciphers matches.If terminal detects first input numerical ciphers With the first unlock numerical ciphers, then terminal is unlocked.Terminal can detecte the first input numerical ciphers and the first unlock number Whether word password is completely the same, if the first input numerical ciphers and the first unlock numerical ciphers are completely the same, carries out to terminal Unlock.For example, the first input numerical ciphers that terminal is got are the second input numerical ciphers of " 748512 " of 9 palace cases. The first unlock numerical ciphers that terminal is got from multiple numerical ciphers are also the numerical ciphers of " 748512 " of 9 palace cases. Terminal detects the first input numerical ciphers and the first unlock numerical ciphers matching, then is unlocked to terminal.
The embodiment of the present application provides a kind of unlocking method, by detecting that the WIFI network of terminal connection is dangerous WIFI When network, the first unlock numerical ciphers are selected from the second subset of the multiple numerical ciphers prestored.Terminal detects When one input numerical ciphers are matched with the first unlock numerical ciphers, terminal is unlocked.The technical solution of the embodiment of the present application When the WIFI network of terminal connection is dangerous WIFI network, terminal is selected from the second subset of the multiple numerical ciphers prestored The first unlock numerical ciphers are selected, the first input numerical ciphers and the first unlock numerical ciphers of other users can be reduced Matching, and then the safety of end message can be improved.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side executive process.It is understood that , in order to realize the above functions, it includes execute the corresponding hardware configuration of each function and/or software mould for terminal and server Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, the application can be realized with the combining form of hardware or hardware and computer software.Some function actually with Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution Part.Professional technician can specifically realize described function to each using distinct methods, but this reality Now it is not considered that exceeding scope of the present application.
The embodiment of the present application can carry out the division of functional unit according to above method example to server, for example, can be with Two or more functions, can also be integrated in a processing unit by corresponding each each functional unit of function division In.Above-mentioned integrated unit both can take the form of hardware realization, can also realize in the form of software functional units.It needs It is noted that be schematical, only a kind of logical function partition to the division of unit in the embodiment of the present application, it is practical real It is current that there may be another division manner.
Fig. 8 shows the structural schematic diagram of the tripper according to the embodiment of the present application.The tripper can by software, Hardware or both be implemented in combination with as terminal all or part of.The device 800 includes first acquisition unit 801, the Two acquiring units 802 and terminal unlocking unit 803.
First acquisition unit 801, for the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Second acquisition unit 802, for obtaining the first input numerical ciphers on terminal touch screen;
Terminal unlocking unit 803, for detect the first input numerical ciphers with first unlock numerical ciphers match when, Terminal is unlocked.
Optionally, first acquisition unit 801 are also used to select from the multiple numerical ciphers prestored according to current date One unlock numerical ciphers.
Optionally, first acquisition unit 801 are also used to randomly choose the first unlock number from the multiple numerical ciphers prestored Word password.
Optionally, first acquisition unit 801 are also used to select first from the multiple numerical ciphers prestored by the replacement cycle Unlock numerical ciphers.
Optionally, first acquisition unit 801 are also used to respond the user's operation setting replacement cycle.
Optionally, first acquisition unit 801 are also used to when detecting the WIFI network of terminal connection is secure network, The first unlock of selection numerical ciphers from the first subset of multiple numerical ciphers;Detecting that the WIFI network of terminal connection is not When secure network, the first unlock numerical ciphers are selected from the second subset of multiple numerical ciphers.
Optionally, first acquisition unit 801 are also used to obtain the first position of terminal;
Obtain the second input numerical ciphers on terminal touch screen and the second position;
When the distance between the second position and first position are greater than preset threshold, selected from the multiple numerical ciphers prestored The second unlock numerical ciphers are selected, the second unlock numerical ciphers are different from the first unlock numerical ciphers;
Terminal unlocking unit 803 is also used to when the second input numerical ciphers are matched with the second unlock numerical ciphers, to end End is unlocked.
Optionally, which further includes information alert unit 804, for providing the prompt of the first unlock numerical ciphers Information.
Optionally, which is the one of which in text information, voice messaging, image information or video information.
The embodiment of the present application provides a kind of tripper, is selected from the multiple numerical ciphers prestored by first acquisition unit Select the first unlock numerical ciphers;Second acquisition unit obtains the first input numerical ciphers on terminal touch screen;Terminal unlocking list Member is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.The application is implemented The tripper of example can reduce other users by obtaining the first unlock numerical ciphers from the multiple numerical ciphers prestored The matching of first input numerical ciphers and the first unlock numerical ciphers, and then the safety of end message can be improved.
Fig. 9 is referred to, is a kind of structural schematic diagram of terminal provided by the embodiments of the present application.As shown in figure 9, the terminal 900 may include: at least one processor 901, at least one network interface 904, user interface 903, memory 905, at least One communication bus 902.
Wherein, communication bus 902 is for realizing the connection communication between these components.
Wherein, user interface 903 may include display screen (Display) and GPS, and optional user interface 903 can also wrap Include standard wireline interface and wireless interface.
Wherein, network interface 904 optionally may include standard wireline interface and wireless interface (such as WI-FI interface).
Wherein, processor 901 may include one or more processing core.Processor 901 utilizes various excuses and line Road connects the various pieces in entire terminal 900, by running or executing the instruction being stored in memory 905, program, code Collection or instruction set, and the data being stored in memory 905 are called, execute the various functions and processing data of terminal 900.It can Choosing, processor 901 can use Digital Signal Processing (Digital Signal Processing, DSP), field-programmable Gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA) at least one of example, in hardware realize.Processor 901 can integrating central processor (Central Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc. One or more of combinations.Wherein, the main processing operation system of CPU, user interface and application program etc.;GPU is for being responsible for The rendering and drafting of content to be shown needed for display screen;Modem is for handling wireless communication.On it is understood that Stating modem can not also be integrated into processor 901, be realized separately through chip piece.
Wherein, memory 905 may include random access memory (Random Access Memory, RAM), also may include Read-only memory (Read-Only Memory).Optionally, which includes non-transient computer-readable medium (non-transitory computer-readable storage medium).Memory 905 can be used for store instruction, journey Sequence, code, code set or instruction set.Memory 905 may include storing program area and storage data area, wherein storing program area Can store the instruction for realizing operating system, the instruction at least one function (such as touch function, sound play function Energy, image player function etc.), for realizing instruction of above-mentioned each embodiment of the method etc.;Storage data area can store each above The data etc. being related in a embodiment of the method.Memory 905 optionally can also be that at least one is located remotely from aforementioned processing The storage device of device 901.As shown in figure 9, as may include operation system in a kind of memory 905 of computer storage medium System, network communication module, Subscriber Interface Module SIM and the application program for unlocking method.
In terminal 900 shown in Fig. 9, user interface 903 is mainly used for providing the interface of input for user, obtains user The data of input;And processor 901 can be used for calling the application program of the unlocking method stored in memory 905, and specific Execute following operation:
The first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Obtain the first input numerical ciphers on terminal touch screen;
When detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers, terminal is unlocked.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored When password, following steps are specifically executed:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored according to current date.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored When password, following steps are specifically executed:
The first unlock of random selection numerical ciphers from the multiple numerical ciphers prestored.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored When password, following steps are specifically executed:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored by the replacement cycle.
In one embodiment, the processor is also used to execute following steps:
It responds user's operation and the replacement cycle is set.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored When password, following steps are specifically executed:
When detecting the WIFI network of terminal connection is secure network, selected from the first subset of multiple numerical ciphers First unlock numerical ciphers;
When detecting the WIFI network of terminal connection is insecure network, selected from the second subset of multiple numerical ciphers Select the first unlock numerical ciphers.
In one embodiment, the processor execute obtain terminal touch screen on the first input numerical ciphers when, It is specific to execute following steps:
Obtain the first position of terminal;
The processor is also used to execute following steps:
Obtain the second input numerical ciphers on terminal touch screen and the second position;
When the distance between the second position and first position are greater than preset threshold, selected from the multiple numerical ciphers prestored The second unlock numerical ciphers are selected, the second unlock numerical ciphers are different from the first unlock numerical ciphers;
When the second input numerical ciphers are matched with the second unlock numerical ciphers, terminal is unlocked.
In one embodiment, the processor execute obtain terminal touch screen on the first input numerical ciphers it Before, specifically execute following steps:
Provide the prompt information of the first unlock numerical ciphers.
In one embodiment, which is its in text information, voice messaging, image information or video information Middle one kind.
The embodiment of the present application provides a kind of terminal, by selecting the first unlock number close from the multiple numerical ciphers prestored Code obtains the first input numerical ciphers on terminal touch screen, is detecting the first input numerical ciphers and the first unlock number When password match, terminal is unlocked.The terminal of the embodiment of the present application from the multiple numerical ciphers prestored by obtaining One unlock numerical ciphers can reduce the first input numerical ciphers and the matching of the first unlock numerical ciphers of other users, And then the safety of end message can be improved.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, and the program is processed The step of above method is realized when device executes.Wherein, computer readable storage medium can include but is not limited to any kind of Disk, including floppy disk, CD, DVD, CD-ROM, mini drive and magneto-optic disk, ROM, RAM, EPROM, EEPROM, DRAM, VRAM, flash memory device, magnetic or optical card, nanosystems (including molecular memory IC), or be suitable for store instruction and/ Or any kind of medium or equipment of data.
The embodiment of the present application also provides a kind of computer program product, which includes storage computer journey The non-transient computer readable storage medium of sequence, the computer program are operable to execute computer such as above method implementation Some or all of any unlocking method recorded in example step.
Those skilled in the art can be understood that the technical solution of the application can be come by software and/or hardware It realizes." unit " and " module " in this specification refers to complete independently or cooperates with other component complete specific function Software and/or hardware, wherein hardware for example can be field programmable gate array (Field-ProgrammaBLE Gate Array, FPGA), integrated circuit (Integrated Circuit, IC) etc..
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some service interfaces, device or unit It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, the technical solution of the application substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the application Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with logical process sequence to instruct relevant hardware, which can store in a computer-readable memory, memory It may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access Memory, RAM), disk or CD etc..
As described above, the only exemplary embodiment of the disclosure cannot limit the scope of the present disclosure with this.I.e. in every case according to The disclosure instruct made by equivalent changes and modifications, all still belong in the range of the disclosure covers.Those skilled in the art are considering Specification and after practicing disclosure herein, will readily occur to other embodiments of the disclosure.This application is intended to cover the disclosure Any variations, uses, or adaptations, the generality that these variations, uses, or adaptations follow the disclosure is former The common knowledge or conventional techniques in the art managed and do not recorded including the disclosure.Description and embodiments only by It is considered as illustratively, the scope of the present disclosure and spirit are defined by the claims.

Claims (12)

1. a kind of unlocking method characterized by comprising
The first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Obtain the first input numerical ciphers on terminal touch screen;
When detecting that first input numerical ciphers are matched with the first unlock numerical ciphers, the terminal is solved Lock.
2. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored Numerical ciphers, comprising:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored according to current date.
3. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored Numerical ciphers, comprising:
The first unlock numerical ciphers are randomly choosed from the multiple numerical ciphers prestored.
4. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored Numerical ciphers, comprising:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored by the replacement cycle.
5. method as claimed in claim 4, which is characterized in that the method also includes:
It responds user's operation and the replacement cycle is set.
6. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored Numerical ciphers, comprising:
When detecting the WIFI network of the terminal connection is secure network, from the first subset of the multiple numerical ciphers Select the first unlock numerical ciphers;
When detecting the WIFI network of the terminal connection is insecure network, from the second subset of the multiple numerical ciphers Middle selection the first unlock numerical ciphers.
7. the method as described in claim 1, which is characterized in that first input numerical ciphers obtained on terminal touch screen Further include:
Obtain the first position of the terminal;
The method also includes:
Obtain the second input numerical ciphers on terminal touch screen and the second position;
When the distance between the second position and the first position are greater than preset threshold, from the multiple numerical ciphers prestored Middle the second unlock of selection numerical ciphers, the second unlock numerical ciphers are different from the first unlock numerical ciphers;
When second input numerical ciphers are matched with the second unlock numerical ciphers, the terminal is unlocked.
8. the method as described in claim 1, which is characterized in that first input numerical ciphers obtained on terminal touch screen Before further include:
Provide the prompt information of the first unlock numerical ciphers.
9. method according to claim 8, which is characterized in that the prompt information is text information, voice messaging, image letter One of which in breath or video information.
10. a kind of tripper characterized by comprising
First acquisition unit, for the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Second acquisition unit, for obtaining the first input numerical ciphers on terminal touch screen;
Terminal unlocking unit, for detect first input numerical ciphers with it is described first unlock numerical ciphers match When, the terminal is unlocked.
11. a kind of terminal, including memory, processor and storage can be run in the memory and on the processor Computer program, which is characterized in that the processor is realized in the claims 1-9 when executing the computer program appoints Method described in one.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Method described in any one of the claims 1-9 is realized when execution.
CN201910588909.6A 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium Active CN110379051B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910588909.6A CN110379051B (en) 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910588909.6A CN110379051B (en) 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110379051A true CN110379051A (en) 2019-10-25
CN110379051B CN110379051B (en) 2022-05-10

Family

ID=68251600

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910588909.6A Active CN110379051B (en) 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110379051B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099719A (en) * 2020-09-11 2020-12-18 邹寿飞 Input method, device and computer storage medium
CN113742712A (en) * 2020-10-26 2021-12-03 北京沃东天骏信息技术有限公司 Method, apparatus, device and computer readable medium for decrypting a device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120081001A (en) * 2011-03-09 2012-07-18 홍문화 Apparatus for input code used in mobile application terminal and method for the same
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN103902862A (en) * 2012-12-30 2014-07-02 联想(北京)有限公司 Mobile device management method and device and mobile device
CN104159194A (en) * 2014-08-05 2014-11-19 小米科技有限责任公司 Terminal password activation method, terminal password activation device and terminal password activation equipment
CN104239816A (en) * 2014-09-28 2014-12-24 联想(北京)有限公司 Electronic equipment capable of switching work status and switching method thereof
CN105468962A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 User interface unlocking method and apparatus
CN105844124A (en) * 2015-06-30 2016-08-10 维沃移动通信有限公司 Processing method and device for password data
CN106780895A (en) * 2016-12-23 2017-05-31 余仁植 Method for unlocking coded lock, locking method, coded lock, systems approach and system
US20190114410A1 (en) * 2017-10-17 2019-04-18 Chiun Mai Communication Systems, Inc. Electronic device with unlocking system and unlocking method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120081001A (en) * 2011-03-09 2012-07-18 홍문화 Apparatus for input code used in mobile application terminal and method for the same
CN103902862A (en) * 2012-12-30 2014-07-02 联想(北京)有限公司 Mobile device management method and device and mobile device
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN104159194A (en) * 2014-08-05 2014-11-19 小米科技有限责任公司 Terminal password activation method, terminal password activation device and terminal password activation equipment
CN105468962A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 User interface unlocking method and apparatus
CN104239816A (en) * 2014-09-28 2014-12-24 联想(北京)有限公司 Electronic equipment capable of switching work status and switching method thereof
CN105844124A (en) * 2015-06-30 2016-08-10 维沃移动通信有限公司 Processing method and device for password data
CN106780895A (en) * 2016-12-23 2017-05-31 余仁植 Method for unlocking coded lock, locking method, coded lock, systems approach and system
US20190114410A1 (en) * 2017-10-17 2019-04-18 Chiun Mai Communication Systems, Inc. Electronic device with unlocking system and unlocking method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112099719A (en) * 2020-09-11 2020-12-18 邹寿飞 Input method, device and computer storage medium
CN113742712A (en) * 2020-10-26 2021-12-03 北京沃东天骏信息技术有限公司 Method, apparatus, device and computer readable medium for decrypting a device

Also Published As

Publication number Publication date
CN110379051B (en) 2022-05-10

Similar Documents

Publication Publication Date Title
US9131377B2 (en) Method and apparatus for unlocking operating system
US9148431B2 (en) Systems and methods for caller identification customization and remote management of communication devices
CN105159531A (en) Application starting method and mobile terminal
WO2012129641A1 (en) Interrogating an authentication device
CN104657031B (en) The method and device of touch control operation
CN103984904A (en) Method and device for preventing screen locking code of mobile terminal from being cracked
US20130283349A1 (en) Authentication method and electronic device
CN101794365A (en) Method for safely inputting information on mobile terminal and mobile terminal
CN106385506A (en) Information notification management method and device
CN107613091A (en) A kind of method and terminal for establishing communication
KR20180118635A (en) Method and apparatus for processing icons in an application
CN101087334A (en) Multi-user management method of mobile phone information
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN110379051A (en) Unlocking method, device, terminal and storage medium
CN107769928A (en) A kind of terminal and computer-readable recording medium
CN107133500A (en) The encryption method and mobile terminal of a kind of application program
CN110417979A (en) Unlocking method, device, terminal and storage medium
CN101854418A (en) Short message content handwriting encryption and decryption realization method based on address list
CN105430601B (en) Bluetooth device list display method and device and mobile terminal
CN102685326A (en) Message encryption method and device and mobile terminal
CN103533520A (en) Method and apparatus conduct remote communication with an electronic device in a communication network environment
US20060104445A1 (en) Systems and methods for hiding a data group
CN103678969A (en) Lock releasing method of electronic device, and apparatus thereof
WO2017000343A1 (en) Fingerprint unlocking method and terminal
CN109284138A (en) A kind of the power supply method for closing and device of intelligent terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant