CN110379051A - Unlocking method, device, terminal and storage medium - Google Patents
Unlocking method, device, terminal and storage medium Download PDFInfo
- Publication number
- CN110379051A CN110379051A CN201910588909.6A CN201910588909A CN110379051A CN 110379051 A CN110379051 A CN 110379051A CN 201910588909 A CN201910588909 A CN 201910588909A CN 110379051 A CN110379051 A CN 110379051A
- Authority
- CN
- China
- Prior art keywords
- numerical ciphers
- terminal
- unlock
- ciphers
- input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Telephone Function (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The application provides a kind of unlocking method, device, terminal and storage medium, and wherein the unlocking method includes: the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;Obtain the first input numerical ciphers on terminal touch screen;When detecting that first input numerical ciphers are matched with the first unlock numerical ciphers, the terminal is unlocked.The technical solution of the embodiment of the present application can reduce the first input numerical ciphers and the matching of the first unlock numerical ciphers of other users, and then the safety of end message can be improved by selecting the first unlock numerical ciphers from the multiple numerical ciphers prestored.
Description
Technical field
The application belongs to field of terminal technology, in particular to a kind of unlocking method, device, terminal and storage medium.
Background technique
With the development of science and technology, terminal supports numerical ciphers to unlock mostly.But due to the presence of monitoring device or
When terminal is in public occasion, the numerical ciphers gesture of terminal is easy to be got by other users.When user leaves one section of terminal
When the time, the numerical ciphers of other users meeting input terminal cause the leakage of end message.Therefore more and more users' favor
In the higher terminal of safety.Terminal can increase the complexity of unlock numerical ciphers, to improve the safety of terminal unlocking.
Summary of the invention
The embodiment of the present application provides a kind of unlocking method, device, terminal and storage medium, and the peace of end message can be improved
Quan Xing.
In a first aspect, the embodiment of the present application provides a kind of unlocking method, comprising:
The first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Obtain the first input numerical ciphers on terminal touch screen;
Detect first input numerical ciphers with it is described first unlock numerical ciphers match when, to the terminal into
Row unlock.
Second aspect, the embodiment of the present application provide a kind of tripper, comprising:
First acquisition unit, for the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Second acquisition unit, for obtaining the first input numerical ciphers on terminal touch screen;
Terminal unlocking unit, for detecting first input numerical ciphers and the first unlock numerical ciphers
Timing is unlocked the terminal.
The third aspect, the embodiment of the present application provide a kind of terminal, including memory, processor and are stored in the storage
In device and the computer program that can run on the processor, the processor are realized above-mentioned when executing the computer program
Described in any item methods.
Fourth aspect, the embodiment of the present application provide a kind of computer readable storage medium, are stored thereon with computer program,
The program realizes method described in any of the above embodiments when being executed by processor.
5th aspect, the embodiment of the present application provide a kind of computer program product, wherein above-mentioned computer program product packet
The non-transient computer readable storage medium of storage computer program is included, above-mentioned computer program is operable to hold computer
Row step some or all of as described in the embodiment of the present application first aspect.The computer program product can be soft for one
Part installation kit.
The embodiment of the present application provides a kind of unlocking method, device, terminal and storage medium, by from the multiple numbers prestored
The first unlock of selection numerical ciphers in password, when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers,
Terminal is unlocked.The technical solution of the embodiment of the present application from the multiple numerical ciphers prestored by selecting the first unlock number
Word password, can reduce the matching of the first input numerical ciphers of other users with the first unlock numerical ciphers, and then can be with
Improve the safety of end message.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 shows the interface schematic diagram of the unlock numerical ciphers of the embodiment of the present application;
Fig. 2 shows the interface schematic diagrams of the terminal of the embodiment of the present application;
Fig. 3 shows the flow diagram of the embodiment of the present application unlocking method;
Fig. 4 shows the interface schematic diagram of the terminal of the embodiment of the present application;
Fig. 5 shows the structural schematic diagram of the unlocking method of another embodiment of the application;
Fig. 6 shows the interface schematic diagram of the terminal of the embodiment of the present application;
Fig. 7 shows the flow diagram of the unlocking method of another embodiment of the application;
Fig. 8 shows the structural schematic diagram of the tripper according to the embodiment of the present application;
Fig. 9 shows a kind of structural schematic diagram of terminal of the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this
Apply for a part of embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without making creative work, shall fall in the protection scope of this application.
For using the terminal of unlock gesture, when the numerical ciphers and preset number that terminal recognition to user inputs
When password is consistent, terminal can be unlocked, the terminal interface after display unlock.When the unlock interface of terminal is 9 palace case,
The unlock numerical ciphers of user's input can be as shown in Figure 1.When user in the unlock interface of terminal input numerical ciphers and pre-
If unlock numerical ciphers it is consistent when, terminal is unlocked, the terminal interface after display unlock, and terminal interface at this time can be as
Shown in Fig. 2.
When terminal is in public occasion, the unlock numerical ciphers of user's input can be with monitored device or other users
It gets.Therefore when user leaves terminal for a period of time, the unlock number that other users input before can inputting the user is close
Code is unlocked terminal, so that the information leakage of terminal, reduces the safety of terminal.Such as party A-subscriber inputs in B terminal
When 486291 numerical ciphers, the C user beside party A-subscriber sees the unlock numerical ciphers.When party A-subscriber is due to accidentally by B
When lost terminal, C user can input the unlock numerical ciphers, be unlocked to B terminal, get the information of B terminal storage.
In order to improve the safety of end message, terminal can improve the safety of terminal by changing numeric keypad at random
Property.But due to the random variation of numeric keypad, user is not easy to remember and operate, therefore the usage experience of user is bad.And
There is the public arena of monitoring device, even if the numeric keypad of terminal can change at random, monitoring device still can completely be remembered
Employ the numerical ciphers of family input.Therefore, the present inventor proposes a kind of unlocking method, by obtaining the in multiple numerical ciphers
One unlock numerical ciphers, can increase the safety of end message.
The embodiment conceived according to present techniques is described below.
Fig. 3 shows the flow diagram of the embodiment of the present application unlocking method.
It should be noted that the unlocking method of the embodiment of the present application can be applied to tripper, which can be matched
It is placed in terminal.Wherein the terminal can be the various electronic equipments with touch screen, including but not limited to smart phone, plate
Computer etc..
As shown in figure 3, the unlocking method of the embodiment of the present application may comprise steps of:
S101 selects the first unlock numerical ciphers from the multiple numerical ciphers prestored.
According to some embodiments, user, which can be set, multiple and different prestores unlock numerical ciphers.User setting is multiple not
With unlock numerical ciphers when, each unlock numerical ciphers can be provided with corresponding title respectively.The title can be use
It is named according to the shape of unlock numerical ciphers at family.The shape and numerical ciphers of numerical ciphers correspond to title can be as shown in Figure 4.
For example, the unlock numerical ciphers of user setting are "Z"-shaped, then the title of the unlock numerical ciphers can be " Z ".User is to every
A unlock numerical ciphers are provided with corresponding name, and the convenience that user uses can be improved.
It can be readily appreciated that the digit of the numerical ciphers can be arranged with the performance of terminal according to the demand of user.Terminal
It can support the numerical ciphers of 1 or multidigit.The numerical ciphers of terminal setting for example can be the password of 4 bit digitals.User
The numerical ciphers of setting for example can also be the password of 6 bit digitals.When terminal only supports 4 bit digital password, terminal can only be set
Set 4 numerical ciphers.
Optionally, terminal selects the first unlock numerical ciphers according to current date from the multiple numerical ciphers prestored.With
Corresponding numerical ciphers are arranged to the different dates according to self-demand in family.Terminal can be according to the current date, from preset
The first unlock of selection numerical ciphers in multiple numerical ciphers.Such as 10 different numbers can be arranged according to date mantissa in user
Password.The corresponding numerical ciphers of each mantissa, the different corresponding numerical ciphers of mantissa are also different.0 in 10 date mantissa, 1,
2,3,4,5,6 corresponding numerical ciphers for example can be respectively " 521485 " numerical ciphers, " 857458 " numerical ciphers,
" 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers, " 879315 " numerical ciphers and " 484515 "
Shape numerical ciphers.When terminal detect current date be 25 days when, terminal selected from preset multiple numerical ciphers first
Unlock numerical ciphers are " 454826 " numerical ciphers.
According to some embodiments, terminal randomly chooses the first unlock numerical ciphers from the multiple numerical ciphers prestored.With
When family determines the selection mode of the first unlock numerical ciphers to randomly choose, corresponding setting instruction terminal can be sent.Terminal
After receiving setting instruction, parses the setting and instruct to obtain command information.Terminal is according to the obtained command information of parsing, by the
The selection mode of one unlock numerical ciphers is set as randomly choosing.When terminal selects the first solution from the multiple numerical ciphers prestored
Before locking numerical ciphers, multiple numerical ciphers can be ranked up.Terminal can be according to pre-set random algorithm from pre-
The first unlock of selection numerical ciphers in the multiple numerical ciphers deposited.Multiple numerical ciphers that terminal prestores for example may include
" 521485 " numerical ciphers, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 "
Numerical ciphers.According to random algorithm, the numerical ciphers that terminal is got for example can be " 454826 " numerical ciphers.According to random
Algorithm, the numerical ciphers that terminal is got again for example can also be " 521485 " numerical ciphers.
Optionally, terminal can respond the user's operation setting replacement cycle.User can determine according to self-demand and unlock
The replacement cycle of numerical ciphers, and send corresponding operation instruction terminal.After terminal receives the operational order, the setting is parsed
Instruction obtains command information.The replacement cycle is arranged in the command information that terminal is obtained according to parsing, response user's operation.Terminal response
The replacement cycle of user's operation setting, which can be, replaces that primary, replacement daily is primary, replaces weekly after the success of each terminal unlocking
Once, monthly replacement is primary and replaces primary one of which every year.
According to some embodiments, terminal can be selected unlock number close by the replacement cycle from the multiple numerical ciphers prestored
Code.It is primary that the replacement cycle of the unlock numerical ciphers of terminal setting for example can be replacement daily.7 differences can be set in terminal
Numerical ciphers, so weekly respectively correspond a numerical ciphers daily.7 different digital passwords for example can be
" 521485 " numerical ciphers, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 "
Numerical ciphers, " 879315 " numerical ciphers and " 484515 " shape numerical ciphers.Terminal can choose phase according to calendar information daily
The unlock numerical ciphers answered.Such as Monday weekly, the first unlock numerical ciphers of terminal selection can be " 484515 " figurate number
Word password.
Optionally, terminal selected from the multiple numerical ciphers prestored according to the replacement cycle first unlock numerical ciphers it
Before, multiple numerical ciphers can be ranked up.When terminal selects the first numerical ciphers, the can be selected in sequence
One numerical ciphers can also select the first numerical ciphers in the way of backward.The replacement of the unlock numerical ciphers of terminal setting
It is primary that period for example can be replacement daily.Terminal for example can be " 521485 " number to the sequence of 7 different digital passwords
Password, " 857458 " numerical ciphers, " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers,
" 879315 " numerical ciphers and " 484515 " shape numerical ciphers.Terminal can choose corresponding unlock according to calendar information daily
Numerical ciphers.Such as Monday weekly, the first unlock numerical ciphers of terminal selection can be " 754824 " numerical ciphers.Such as
The first unlock numerical ciphers of Tuesday weekly, terminal selection can be " 521485 " numerical ciphers.
It can be readily appreciated that the numerical ciphers quantity of user setting can be arranged according to the actual demand of user.Such as with
5 numerical ciphers can be set in family, and 5 numerical ciphers can unlock 5 different common terminal applies respectively.5 numbers are close
Code for example can be respectively " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers, " 879315 " number
Word password and " 484515 " shape numerical ciphers.Wherein " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " number
The unlock application corresponding with " 484515 " shape numerical ciphers of password, " 879315 " numerical ciphers can for example answer for music
With, application of taking pictures, short message application, chat application and game application.
S102 obtains the first input numerical ciphers on terminal touch screen.
According to some embodiments, when user needs a certain of using terminal in application, needing to be unlocked terminal.Terminal
After unlock, the various applications installed on the touch screen meeting display terminal of terminal, user can click required application.Therefore terminal
Need to obtain first input numerical ciphers of the user on terminal touch screen.Such as user needs using terminal to browse Domestic News
When, terminal supplying power key is clicked, the touch screen of terminal can show unlock interface.User needs to input and default solution in unlock interface
Lock matched first input numerical ciphers of numerical ciphers.Terminal needs the first input numerical ciphers inputted according to user to terminal
After being unlocked, terminal can just show the Domestic News page that user needs.
It can be readily appreciated that the unlock interface of terminal can be 9 palace cases.The number shown in the 9 palace case can be
It is fixed, it is also possible to change at random.When the unlock interface of terminal is shown as 9 fixed palace case, user can be inputted
First input numerical ciphers.When terminal detects that the finger of user touches touch screen, the position of the finger is identified, and detect
Whether the position is a certain position in 9 palace cases.If terminal detects that the contact position of the finger and touch screen is 9 palace cases
First position when, it is determined that the first position be the first input numerical ciphers initial position.Terminal obtains the finger and is touching
Touch the number of the touch location on screen.When terminal detects that the finger leaves terminal touch screen from the second position of 9 palace cases,
Then terminal determines that the second position is the final position of the first input numerical ciphers.First position is to second position user hand at this time
Refer to and the number of terminal touch screen contact position is the first input numerical ciphers that terminal is got.
S103 is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.
According to some embodiments, after terminal gets the first input numerical ciphers and the first unlock numerical ciphers of user,
It detects the first input numerical ciphers and whether the first unlock numerical ciphers matches.If terminal detects first input numerical ciphers
With the first unlock numerical ciphers matching, then terminal is unlocked.Terminal can detecte the first input numerical ciphers and the first solution
Whether completely the same numerical ciphers are locked, if the first input numerical ciphers and the first unlock numerical ciphers are completely the same, to terminal
It is unlocked.For example, the first input numerical ciphers that terminal is got are to fix the first L-shaped input number of 9 palace cases
Word password.The first unlock numerical ciphers that terminal is got from multiple numerical ciphers are also the number of " 14789 " of 9 palace cases
Password.Terminal detects the first input numerical ciphers and the first unlock numerical ciphers matching, then is unlocked to terminal.
It can be readily appreciated that after terminal unlocking, the original interface that the display screen of terminal can be arranged with display terminal system, also
It can show the pre-set display interface of user.For example, presetting for user can be user in terminal in unlock circle
When face, in the numerical ciphers of the touch screen input " 568596 " of terminal, the A application of terminal can be unlocked.Then when terminal detects
It is the numerical ciphers of " 568596 " to the first input numerical ciphers, and first input numerical ciphers unlock numerical ciphers with first
When matching, terminal is unlocked.After terminal unlocking, the display screen of terminal is shown as the initial display interface of A application.
According to some embodiments, when terminal detects that the first input numerical ciphers are mismatched with the first unlock numerical ciphers
When, terminal is not unlocked.When terminal gets the first input numerical ciphers of user again, terminal is close from multiple numbers
The first unlock numerical ciphers are obtained again in code.Terminal detects the first input numerical ciphers and the first unlock numerical ciphers again
Matching degree.When terminal detects that first input numerical ciphers are matched with the first unlock numerical ciphers, terminal is unlocked.
It can be readily appreciated that the sequence of step S102 and step S101 are not construed as limiting, i.e. step S102 and step S101's
Sequence can be interchanged.Terminal for example can first select the first unlock number according to current date from the multiple numerical ciphers prestored
Then password obtains the first input numerical ciphers on terminal touch screen again, in the first input numerical ciphers and the first unlock number
When word password match, terminal is unlocked.It is close that terminal for example can also first obtain the first input number on terminal touch screen
Then code is selecting the first unlock numerical ciphers according to current date from the multiple numerical ciphers prestored, is inputting number first
When word password is matched with the first unlock numerical ciphers, terminal is unlocked.
The embodiment of the present application provides a kind of unlocking method, by selecting the first unlock number from the multiple numerical ciphers prestored
Word password is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.The application
The technical solution of embodiment can reduce other use by obtaining the first unlock numerical ciphers from the multiple numerical ciphers prestored
The matching of first input numerical ciphers at family and the first unlock numerical ciphers, and then the safety of end message can be improved.
Fig. 5 shows the structural schematic diagram of the unlocking method of another embodiment of the application.
As shown in figure 5, the unlocking method may include:
S201 provides the prompt information of the first unlock numerical ciphers.
According to some embodiments, before terminal gets the first input numerical ciphers of user on the touchscreen, Ke Yifa
The first input numerical ciphers prompt information out.The prompt information can be text information, voice messaging, image information and video
One of which in information.
Optionally, which for example can be text information.The text information for example can be the of user setting
The title of one input numerical ciphers.The title for example can be " birthday ", and the interface display of terminal can be as shown in Figure 6 at this time.
User can be according to pre-set first input numerical ciphers of the text information input.When the title of the first input numerical ciphers
When for " birthday ", there are a variety of numerical ciphers on the touch screen of terminal, user needs the memory according to oneself, inputs oneself and set
The numerical ciphers set.
It can be readily appreciated that the prompt information for example can be voice messaging.The voice messaging for example can be user and set
The title for the first input numerical ciphers set.Before the first input numerical ciphers that terminal obtains on touch screen, the solution of terminal
Lock interface can be shown as 9 palace cases.According to the pre-set numerical ciphers title of user, the microphone of terminal can be broadcast with voice
Put the title.When user receives the title, according to first input numerical ciphers of title.Since monitoring device is apart from terminal
When position is farther out or monitoring device does not have phonetic function, monitoring device cannot get the speech prompt information, Ke Yiti
The safety of high end message.
According to some embodiments, which for example can also be image information.The display mode of the image information can
To be complete first input numerical ciphers of display, a part for showing first input numerical ciphers can also be.Such as with
Family setting prompt information can be a part for showing first input numerical ciphers.When user gets the first input number
When a part of password, user according to a part of first input numerical ciphers remember it is complete first input number it is close
Code, then user can directly input complete first input numerical ciphers.
According to some embodiments, which for example can also be video information.The video information for example can be can
To be set as showing within 3 seconds complete first input numerical ciphers.When user gets the first input number of display in the 1st second
When password, user remembers complete first input numerical ciphers according to the first input numerical ciphers of display in the 1st second, then user
Complete first input numerical ciphers can be directly inputted.The prompt information can reduce the disclosure risk of numerical ciphers, can be with
Improve the safety of end message.
S202 obtains the first position of the first input numerical ciphers and terminal on terminal touch screen.
It specifically describes as described above, details are not described herein again.
According to some embodiments, when the first position of terminal can be terminal acquisition input unlock numerical ciphers, terminal institute
Geographical location.The first position, which can refer to, to be obtained by various positioning methods.Terminal accesses wireless according to terminal
The geographical location information of access point, the geographical location information of terminal where obtaining.Terminal can also pass through satellite positioning (GPS, north
Bucket etc.), WiFi positioning, bluetooth positioning, ultra-wide band (UWB), ultrasonic wave position the common positioning method such as equipotential to obtain the geography
Location information, but it is not limited only to the above method.
S203 obtains the second input numerical ciphers on terminal touch screen and the second position.
It specifically describes as described above, details are not described herein again.
Optionally, terminal obtains the first position of terminal and the second position is two different geographical locations.Such as terminal
When the first position of terminal can be the geographical location Y when obtaining the first input unlock gesture, terminal obtains the second input unlock hand
The second position of terminal for example can be the geographical location T when gesture.
S204, it is close from the multiple numbers prestored when the distance between the second position and first position are greater than preset threshold
The second unlock of selection numerical ciphers in code, the second unlock numerical ciphers are different from the first unlock numerical ciphers.
According to some embodiments, when terminal gets the first position and the second position of terminal, first position and the are detected
Whether the distance between two positions are greater than preset threshold.Preset threshold can be user and is arranged according to the habit of itself using terminal
's.Such as user often occurs losing the behavior of thing, and lesser preset threshold can be set.
Optionally, when terminal detects that the distance between first position and the second position are greater than preset threshold, from prestoring
Multiple numerical ciphers in selection second unlock numerical ciphers, second unlock numerical ciphers be different from first unlock numerical ciphers.
Multiple numerical ciphers for example can be " 454856 " numerical ciphers, " 754824 " numerical ciphers, " 454826 " numerical ciphers,
" 879315 " numerical ciphers and " 484515 " shape numerical ciphers.The first unlock numerical ciphers that terminal is got for example can be
" 454856 " numerical ciphers.Terminal can also be according to the second unlock of selection numerical ciphers from the multiple numerical ciphers prestored.Eventually
The preset threshold of end setting for example can be 500m.When terminal detects that the distance between first position and the second position are greater than
When 500m, the second unlock numerical ciphers that terminal is got for example can be " 879315 " numerical ciphers.
S205 is unlocked terminal when the second input numerical ciphers are matched with the second unlock numerical ciphers.
According to some embodiments, after terminal gets the second input numerical ciphers and the second unlock numerical ciphers of user,
It detects the second input numerical ciphers and whether the second unlock numerical ciphers matches.If terminal detects second input numerical ciphers
With the second unlock numerical ciphers matching, then terminal is unlocked.Terminal can detecte the second input numerical ciphers and the second solution
Whether completely the same numerical ciphers are locked, if the second input numerical ciphers and the second unlock numerical ciphers are completely the same, to terminal
It is unlocked.For example, the second input numerical ciphers that terminal is got are 9 the second input numerical ciphers of palace case " 454856 ".
The second unlock numerical ciphers that terminal is got from multiple numerical ciphers are also that 9 palace cases " 454856 " second unlock number is close
Code.Terminal detects the second input numerical ciphers and the second unlock numerical ciphers matching, then is unlocked to terminal.
The embodiment of the present application provides a kind of unlocking method, etc. terminals detect input unlock numerical ciphers when terminal first
When the distance between position and the second position are greater than preset threshold, are obtained from the multiple numerical ciphers prestored and be different from the first solution
Lock the second unlock numerical ciphers of numerical ciphers.Terminal detects that the second input numerical ciphers of acquisition and the second unlock number are close
When code matching, terminal is unlocked.When the technical solution of the embodiment of the present application is based on terminal the second input numerical ciphers of acquisition
The first position and the second position of terminal detect that the distance between first position and the second position are greater than preset threshold, from pre-
The second unlock numerical ciphers are obtained in the multiple numerical ciphers deposited, and can reduce the first input numerical ciphers of other users and the
The matching of two unlock numerical ciphers, and then the safety of end message can be improved.
Fig. 7 shows the flow diagram of the unlocking method of another embodiment of the application.
As shown in fig. 7, the unlocking method may include:
S301 obtains the first input numerical ciphers on terminal touch screen.
It specifically describes as described above, details are not described herein again.
Whether the WIFI network of S302, detection terminal connection are safe WIFI network.
According to some embodiments, terminal access WIFI network the case where include: terminal open WIFI switch, access WIFI net
Network, or other WIFI networks, i.e. WIFI network handoff procedure are switched to from the WIFI network currently accessed, it accesses new
WIFI network.When terminal accesses WIFI network, judge whether accessed WIFI network is dangerous WIFI network.
It can be readily appreciated that terminal can detecte connection WIFI network whether be the security protocol authenticated WIFI net
Network is when terminal is currently accessed WIFI network, the available WIFI network data being currently accessed of terminal, WIFI network data packet
Include authenticated data, WIFI title, connection status, turn-on time, access environment etc..The authenticated data includes whether authenticated
Security protocol data, that is, whether the security protocol of the WIFI network accessed by the verifying of terminal, or access
Whether WIFI network is already set as secure network, or be provided with secure network mark etc..Terminal, which is got, to be currently accessed
WIFI network data after, judge the WIFI network that currently connects whether be the security protocol authenticated WIFI network.
S303, when detecting the WIFI network of terminal connection is secure network, from the of the multiple numerical ciphers prestored
The first unlock of selection numerical ciphers in one subset.
According to some embodiments, secure network can be preset safe WIFI network in terminal, the safe WIFI network
It can be the WIFI network for the proper password connection that terminal is inputted by user.The safe WIFI network for example can be user certainly
Oneself family lan.
Optionally, the numerical ciphers for including in the first subset of the multiple numerical ciphers prestored are that multiple numbers for prestoring are close
A part of code.The quantity for the numerical ciphers that first subset includes can be depending on user demand.
It can be readily appreciated that when terminal detects that the WIFI network of connection is secure network, from the multiple numbers prestored
The first unlock of selection numerical ciphers in first subset of password.Terminal detects that the WIFI network of connection for example can be to have authenticated
Security protocol WIFI network, then the WIFI network of terminal connection is safe WIFI network, and terminal is from the multiple numbers prestored
The first unlock of selection numerical ciphers in first subset of password.
S304, when detecting the WIFI network of terminal connection is insecure network, from the multiple numerical ciphers prestored
The first unlock of selection numerical ciphers in second subset.
According to some embodiments, insecure network can be the WIFI network not prestored in terminal, this is unsafe
WIFI network for example may include that businessman's selection is not provided with password or setting password using WEP certification etc..
Optionally, the numerical ciphers for including in the second subset of the multiple numerical ciphers prestored are that multiple numbers for prestoring are close
A part of code.The quantity for the numerical ciphers that the second subset includes can be depending on user demand.What second subset included
The numerical ciphers that numerical ciphers and the first subset include do not have intersection.Such as second subset include " 748512 " numerical ciphers when,
First subset does not centainly include " 748512 " numerical ciphers.
It can be readily appreciated that when terminal detects that the WIFI network of connection is insecure network, from the multiple numbers prestored
The first unlock of selection numerical ciphers in the second subset of word password.Terminal detect the WIFI network of connection for example can for without
The WIFI network of security protocol verification is crossed, then the WIFI network of terminal connection is dangerous WIFI network, and terminal is more from what is prestored
The first unlock of selection numerical ciphers in the second subset of a numerical ciphers.
S305 is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.
According to some embodiments, after terminal gets the first input numerical ciphers and the first unlock numerical ciphers of user,
It detects the first input numerical ciphers and whether the first unlock numerical ciphers matches.If terminal detects first input numerical ciphers
With the first unlock numerical ciphers, then terminal is unlocked.Terminal can detecte the first input numerical ciphers and the first unlock number
Whether word password is completely the same, if the first input numerical ciphers and the first unlock numerical ciphers are completely the same, carries out to terminal
Unlock.For example, the first input numerical ciphers that terminal is got are the second input numerical ciphers of " 748512 " of 9 palace cases.
The first unlock numerical ciphers that terminal is got from multiple numerical ciphers are also the numerical ciphers of " 748512 " of 9 palace cases.
Terminal detects the first input numerical ciphers and the first unlock numerical ciphers matching, then is unlocked to terminal.
The embodiment of the present application provides a kind of unlocking method, by detecting that the WIFI network of terminal connection is dangerous WIFI
When network, the first unlock numerical ciphers are selected from the second subset of the multiple numerical ciphers prestored.Terminal detects
When one input numerical ciphers are matched with the first unlock numerical ciphers, terminal is unlocked.The technical solution of the embodiment of the present application
When the WIFI network of terminal connection is dangerous WIFI network, terminal is selected from the second subset of the multiple numerical ciphers prestored
The first unlock numerical ciphers are selected, the first input numerical ciphers and the first unlock numerical ciphers of other users can be reduced
Matching, and then the safety of end message can be improved.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side executive process.It is understood that
, in order to realize the above functions, it includes execute the corresponding hardware configuration of each function and/or software mould for terminal and server
Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, the application can be realized with the combining form of hardware or hardware and computer software.Some function actually with
Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution
Part.Professional technician can specifically realize described function to each using distinct methods, but this reality
Now it is not considered that exceeding scope of the present application.
The embodiment of the present application can carry out the division of functional unit according to above method example to server, for example, can be with
Two or more functions, can also be integrated in a processing unit by corresponding each each functional unit of function division
In.Above-mentioned integrated unit both can take the form of hardware realization, can also realize in the form of software functional units.It needs
It is noted that be schematical, only a kind of logical function partition to the division of unit in the embodiment of the present application, it is practical real
It is current that there may be another division manner.
Fig. 8 shows the structural schematic diagram of the tripper according to the embodiment of the present application.The tripper can by software,
Hardware or both be implemented in combination with as terminal all or part of.The device 800 includes first acquisition unit 801, the
Two acquiring units 802 and terminal unlocking unit 803.
First acquisition unit 801, for the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Second acquisition unit 802, for obtaining the first input numerical ciphers on terminal touch screen;
Terminal unlocking unit 803, for detect the first input numerical ciphers with first unlock numerical ciphers match when,
Terminal is unlocked.
Optionally, first acquisition unit 801 are also used to select from the multiple numerical ciphers prestored according to current date
One unlock numerical ciphers.
Optionally, first acquisition unit 801 are also used to randomly choose the first unlock number from the multiple numerical ciphers prestored
Word password.
Optionally, first acquisition unit 801 are also used to select first from the multiple numerical ciphers prestored by the replacement cycle
Unlock numerical ciphers.
Optionally, first acquisition unit 801 are also used to respond the user's operation setting replacement cycle.
Optionally, first acquisition unit 801 are also used to when detecting the WIFI network of terminal connection is secure network,
The first unlock of selection numerical ciphers from the first subset of multiple numerical ciphers;Detecting that the WIFI network of terminal connection is not
When secure network, the first unlock numerical ciphers are selected from the second subset of multiple numerical ciphers.
Optionally, first acquisition unit 801 are also used to obtain the first position of terminal;
Obtain the second input numerical ciphers on terminal touch screen and the second position;
When the distance between the second position and first position are greater than preset threshold, selected from the multiple numerical ciphers prestored
The second unlock numerical ciphers are selected, the second unlock numerical ciphers are different from the first unlock numerical ciphers;
Terminal unlocking unit 803 is also used to when the second input numerical ciphers are matched with the second unlock numerical ciphers, to end
End is unlocked.
Optionally, which further includes information alert unit 804, for providing the prompt of the first unlock numerical ciphers
Information.
Optionally, which is the one of which in text information, voice messaging, image information or video information.
The embodiment of the present application provides a kind of tripper, is selected from the multiple numerical ciphers prestored by first acquisition unit
Select the first unlock numerical ciphers;Second acquisition unit obtains the first input numerical ciphers on terminal touch screen;Terminal unlocking list
Member is unlocked terminal when detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers.The application is implemented
The tripper of example can reduce other users by obtaining the first unlock numerical ciphers from the multiple numerical ciphers prestored
The matching of first input numerical ciphers and the first unlock numerical ciphers, and then the safety of end message can be improved.
Fig. 9 is referred to, is a kind of structural schematic diagram of terminal provided by the embodiments of the present application.As shown in figure 9, the terminal
900 may include: at least one processor 901, at least one network interface 904, user interface 903, memory 905, at least
One communication bus 902.
Wherein, communication bus 902 is for realizing the connection communication between these components.
Wherein, user interface 903 may include display screen (Display) and GPS, and optional user interface 903 can also wrap
Include standard wireline interface and wireless interface.
Wherein, network interface 904 optionally may include standard wireline interface and wireless interface (such as WI-FI interface).
Wherein, processor 901 may include one or more processing core.Processor 901 utilizes various excuses and line
Road connects the various pieces in entire terminal 900, by running or executing the instruction being stored in memory 905, program, code
Collection or instruction set, and the data being stored in memory 905 are called, execute the various functions and processing data of terminal 900.It can
Choosing, processor 901 can use Digital Signal Processing (Digital Signal Processing, DSP), field-programmable
Gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic
Array, PLA) at least one of example, in hardware realize.Processor 901 can integrating central processor (Central
Processing Unit, CPU), in image processor (Graphics Processing Unit, GPU) and modem etc.
One or more of combinations.Wherein, the main processing operation system of CPU, user interface and application program etc.;GPU is for being responsible for
The rendering and drafting of content to be shown needed for display screen;Modem is for handling wireless communication.On it is understood that
Stating modem can not also be integrated into processor 901, be realized separately through chip piece.
Wherein, memory 905 may include random access memory (Random Access Memory, RAM), also may include
Read-only memory (Read-Only Memory).Optionally, which includes non-transient computer-readable medium
(non-transitory computer-readable storage medium).Memory 905 can be used for store instruction, journey
Sequence, code, code set or instruction set.Memory 905 may include storing program area and storage data area, wherein storing program area
Can store the instruction for realizing operating system, the instruction at least one function (such as touch function, sound play function
Energy, image player function etc.), for realizing instruction of above-mentioned each embodiment of the method etc.;Storage data area can store each above
The data etc. being related in a embodiment of the method.Memory 905 optionally can also be that at least one is located remotely from aforementioned processing
The storage device of device 901.As shown in figure 9, as may include operation system in a kind of memory 905 of computer storage medium
System, network communication module, Subscriber Interface Module SIM and the application program for unlocking method.
In terminal 900 shown in Fig. 9, user interface 903 is mainly used for providing the interface of input for user, obtains user
The data of input;And processor 901 can be used for calling the application program of the unlocking method stored in memory 905, and specific
Execute following operation:
The first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Obtain the first input numerical ciphers on terminal touch screen;
When detecting that the first input numerical ciphers are matched with the first unlock numerical ciphers, terminal is unlocked.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored
When password, following steps are specifically executed:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored according to current date.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored
When password, following steps are specifically executed:
The first unlock of random selection numerical ciphers from the multiple numerical ciphers prestored.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored
When password, following steps are specifically executed:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored by the replacement cycle.
In one embodiment, the processor is also used to execute following steps:
It responds user's operation and the replacement cycle is set.
In one embodiment, the processor is executing the first unlock of selection number from the multiple numerical ciphers prestored
When password, following steps are specifically executed:
When detecting the WIFI network of terminal connection is secure network, selected from the first subset of multiple numerical ciphers
First unlock numerical ciphers;
When detecting the WIFI network of terminal connection is insecure network, selected from the second subset of multiple numerical ciphers
Select the first unlock numerical ciphers.
In one embodiment, the processor execute obtain terminal touch screen on the first input numerical ciphers when,
It is specific to execute following steps:
Obtain the first position of terminal;
The processor is also used to execute following steps:
Obtain the second input numerical ciphers on terminal touch screen and the second position;
When the distance between the second position and first position are greater than preset threshold, selected from the multiple numerical ciphers prestored
The second unlock numerical ciphers are selected, the second unlock numerical ciphers are different from the first unlock numerical ciphers;
When the second input numerical ciphers are matched with the second unlock numerical ciphers, terminal is unlocked.
In one embodiment, the processor execute obtain terminal touch screen on the first input numerical ciphers it
Before, specifically execute following steps:
Provide the prompt information of the first unlock numerical ciphers.
In one embodiment, which is its in text information, voice messaging, image information or video information
Middle one kind.
The embodiment of the present application provides a kind of terminal, by selecting the first unlock number close from the multiple numerical ciphers prestored
Code obtains the first input numerical ciphers on terminal touch screen, is detecting the first input numerical ciphers and the first unlock number
When password match, terminal is unlocked.The terminal of the embodiment of the present application from the multiple numerical ciphers prestored by obtaining
One unlock numerical ciphers can reduce the first input numerical ciphers and the matching of the first unlock numerical ciphers of other users,
And then the safety of end message can be improved.
The application also provides a kind of computer readable storage medium, is stored thereon with computer program, and the program is processed
The step of above method is realized when device executes.Wherein, computer readable storage medium can include but is not limited to any kind of
Disk, including floppy disk, CD, DVD, CD-ROM, mini drive and magneto-optic disk, ROM, RAM, EPROM, EEPROM, DRAM,
VRAM, flash memory device, magnetic or optical card, nanosystems (including molecular memory IC), or be suitable for store instruction and/
Or any kind of medium or equipment of data.
The embodiment of the present application also provides a kind of computer program product, which includes storage computer journey
The non-transient computer readable storage medium of sequence, the computer program are operable to execute computer such as above method implementation
Some or all of any unlocking method recorded in example step.
Those skilled in the art can be understood that the technical solution of the application can be come by software and/or hardware
It realizes." unit " and " module " in this specification refers to complete independently or cooperates with other component complete specific function
Software and/or hardware, wherein hardware for example can be field programmable gate array (Field-ProgrammaBLE Gate
Array, FPGA), integrated circuit (Integrated Circuit, IC) etc..
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the application is not limited by the described action sequence because
According to the application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, related actions and modules not necessarily the application
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some service interfaces, device or unit
It connects, can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, the technical solution of the application substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the application
Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory
The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with logical process sequence to instruct relevant hardware, which can store in a computer-readable memory, memory
It may include: flash disk, read-only memory (Read-Only Memory, ROM), random access device (Random Access
Memory, RAM), disk or CD etc..
As described above, the only exemplary embodiment of the disclosure cannot limit the scope of the present disclosure with this.I.e. in every case according to
The disclosure instruct made by equivalent changes and modifications, all still belong in the range of the disclosure covers.Those skilled in the art are considering
Specification and after practicing disclosure herein, will readily occur to other embodiments of the disclosure.This application is intended to cover the disclosure
Any variations, uses, or adaptations, the generality that these variations, uses, or adaptations follow the disclosure is former
The common knowledge or conventional techniques in the art managed and do not recorded including the disclosure.Description and embodiments only by
It is considered as illustratively, the scope of the present disclosure and spirit are defined by the claims.
Claims (12)
1. a kind of unlocking method characterized by comprising
The first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Obtain the first input numerical ciphers on terminal touch screen;
When detecting that first input numerical ciphers are matched with the first unlock numerical ciphers, the terminal is solved
Lock.
2. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored
Numerical ciphers, comprising:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored according to current date.
3. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored
Numerical ciphers, comprising:
The first unlock numerical ciphers are randomly choosed from the multiple numerical ciphers prestored.
4. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored
Numerical ciphers, comprising:
The first unlock numerical ciphers are selected from the multiple numerical ciphers prestored by the replacement cycle.
5. method as claimed in claim 4, which is characterized in that the method also includes:
It responds user's operation and the replacement cycle is set.
6. the method as described in claim 1, which is characterized in that first unlock of the selection from the multiple numerical ciphers prestored
Numerical ciphers, comprising:
When detecting the WIFI network of the terminal connection is secure network, from the first subset of the multiple numerical ciphers
Select the first unlock numerical ciphers;
When detecting the WIFI network of the terminal connection is insecure network, from the second subset of the multiple numerical ciphers
Middle selection the first unlock numerical ciphers.
7. the method as described in claim 1, which is characterized in that first input numerical ciphers obtained on terminal touch screen
Further include:
Obtain the first position of the terminal;
The method also includes:
Obtain the second input numerical ciphers on terminal touch screen and the second position;
When the distance between the second position and the first position are greater than preset threshold, from the multiple numerical ciphers prestored
Middle the second unlock of selection numerical ciphers, the second unlock numerical ciphers are different from the first unlock numerical ciphers;
When second input numerical ciphers are matched with the second unlock numerical ciphers, the terminal is unlocked.
8. the method as described in claim 1, which is characterized in that first input numerical ciphers obtained on terminal touch screen
Before further include:
Provide the prompt information of the first unlock numerical ciphers.
9. method according to claim 8, which is characterized in that the prompt information is text information, voice messaging, image letter
One of which in breath or video information.
10. a kind of tripper characterized by comprising
First acquisition unit, for the first unlock of selection numerical ciphers from the multiple numerical ciphers prestored;
Second acquisition unit, for obtaining the first input numerical ciphers on terminal touch screen;
Terminal unlocking unit, for detect first input numerical ciphers with it is described first unlock numerical ciphers match
When, the terminal is unlocked.
11. a kind of terminal, including memory, processor and storage can be run in the memory and on the processor
Computer program, which is characterized in that the processor is realized in the claims 1-9 when executing the computer program appoints
Method described in one.
12. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
Method described in any one of the claims 1-9 is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910588909.6A CN110379051B (en) | 2019-07-02 | 2019-07-02 | Unlocking method, device, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910588909.6A CN110379051B (en) | 2019-07-02 | 2019-07-02 | Unlocking method, device, terminal and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110379051A true CN110379051A (en) | 2019-10-25 |
CN110379051B CN110379051B (en) | 2022-05-10 |
Family
ID=68251600
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910588909.6A Active CN110379051B (en) | 2019-07-02 | 2019-07-02 | Unlocking method, device, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110379051B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112099719A (en) * | 2020-09-11 | 2020-12-18 | 邹寿飞 | Input method, device and computer storage medium |
CN113742712A (en) * | 2020-10-26 | 2021-12-03 | 北京沃东天骏信息技术有限公司 | Method, apparatus, device and computer readable medium for decrypting a device |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20120081001A (en) * | 2011-03-09 | 2012-07-18 | 홍문화 | Apparatus for input code used in mobile application terminal and method for the same |
CN103167169A (en) * | 2013-02-01 | 2013-06-19 | 北京小米科技有限责任公司 | Terminal unlocking method and terminal unlocking device |
CN103902862A (en) * | 2012-12-30 | 2014-07-02 | 联想(北京)有限公司 | Mobile device management method and device and mobile device |
CN104159194A (en) * | 2014-08-05 | 2014-11-19 | 小米科技有限责任公司 | Terminal password activation method, terminal password activation device and terminal password activation equipment |
CN104239816A (en) * | 2014-09-28 | 2014-12-24 | 联想(北京)有限公司 | Electronic equipment capable of switching work status and switching method thereof |
CN105468962A (en) * | 2014-09-03 | 2016-04-06 | 阿里巴巴集团控股有限公司 | User interface unlocking method and apparatus |
CN105844124A (en) * | 2015-06-30 | 2016-08-10 | 维沃移动通信有限公司 | Processing method and device for password data |
CN106780895A (en) * | 2016-12-23 | 2017-05-31 | 余仁植 | Method for unlocking coded lock, locking method, coded lock, systems approach and system |
US20190114410A1 (en) * | 2017-10-17 | 2019-04-18 | Chiun Mai Communication Systems, Inc. | Electronic device with unlocking system and unlocking method |
-
2019
- 2019-07-02 CN CN201910588909.6A patent/CN110379051B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20120081001A (en) * | 2011-03-09 | 2012-07-18 | 홍문화 | Apparatus for input code used in mobile application terminal and method for the same |
CN103902862A (en) * | 2012-12-30 | 2014-07-02 | 联想(北京)有限公司 | Mobile device management method and device and mobile device |
CN103167169A (en) * | 2013-02-01 | 2013-06-19 | 北京小米科技有限责任公司 | Terminal unlocking method and terminal unlocking device |
CN104159194A (en) * | 2014-08-05 | 2014-11-19 | 小米科技有限责任公司 | Terminal password activation method, terminal password activation device and terminal password activation equipment |
CN105468962A (en) * | 2014-09-03 | 2016-04-06 | 阿里巴巴集团控股有限公司 | User interface unlocking method and apparatus |
CN104239816A (en) * | 2014-09-28 | 2014-12-24 | 联想(北京)有限公司 | Electronic equipment capable of switching work status and switching method thereof |
CN105844124A (en) * | 2015-06-30 | 2016-08-10 | 维沃移动通信有限公司 | Processing method and device for password data |
CN106780895A (en) * | 2016-12-23 | 2017-05-31 | 余仁植 | Method for unlocking coded lock, locking method, coded lock, systems approach and system |
US20190114410A1 (en) * | 2017-10-17 | 2019-04-18 | Chiun Mai Communication Systems, Inc. | Electronic device with unlocking system and unlocking method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112099719A (en) * | 2020-09-11 | 2020-12-18 | 邹寿飞 | Input method, device and computer storage medium |
CN113742712A (en) * | 2020-10-26 | 2021-12-03 | 北京沃东天骏信息技术有限公司 | Method, apparatus, device and computer readable medium for decrypting a device |
Also Published As
Publication number | Publication date |
---|---|
CN110379051B (en) | 2022-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9131377B2 (en) | Method and apparatus for unlocking operating system | |
US9148431B2 (en) | Systems and methods for caller identification customization and remote management of communication devices | |
CN105159531A (en) | Application starting method and mobile terminal | |
WO2012129641A1 (en) | Interrogating an authentication device | |
CN104657031B (en) | The method and device of touch control operation | |
CN103984904A (en) | Method and device for preventing screen locking code of mobile terminal from being cracked | |
US20130283349A1 (en) | Authentication method and electronic device | |
CN101794365A (en) | Method for safely inputting information on mobile terminal and mobile terminal | |
CN106385506A (en) | Information notification management method and device | |
CN107613091A (en) | A kind of method and terminal for establishing communication | |
KR20180118635A (en) | Method and apparatus for processing icons in an application | |
CN101087334A (en) | Multi-user management method of mobile phone information | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN110379051A (en) | Unlocking method, device, terminal and storage medium | |
CN107769928A (en) | A kind of terminal and computer-readable recording medium | |
CN107133500A (en) | The encryption method and mobile terminal of a kind of application program | |
CN110417979A (en) | Unlocking method, device, terminal and storage medium | |
CN101854418A (en) | Short message content handwriting encryption and decryption realization method based on address list | |
CN105430601B (en) | Bluetooth device list display method and device and mobile terminal | |
CN102685326A (en) | Message encryption method and device and mobile terminal | |
CN103533520A (en) | Method and apparatus conduct remote communication with an electronic device in a communication network environment | |
US20060104445A1 (en) | Systems and methods for hiding a data group | |
CN103678969A (en) | Lock releasing method of electronic device, and apparatus thereof | |
WO2017000343A1 (en) | Fingerprint unlocking method and terminal | |
CN109284138A (en) | A kind of the power supply method for closing and device of intelligent terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |