CN110417979B - Unlocking method, device, terminal and storage medium - Google Patents

Unlocking method, device, terminal and storage medium Download PDF

Info

Publication number
CN110417979B
CN110417979B CN201910588721.1A CN201910588721A CN110417979B CN 110417979 B CN110417979 B CN 110417979B CN 201910588721 A CN201910588721 A CN 201910588721A CN 110417979 B CN110417979 B CN 110417979B
Authority
CN
China
Prior art keywords
unlocking
gesture
terminal
gesture track
track
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910588721.1A
Other languages
Chinese (zh)
Other versions
CN110417979A (en
Inventor
蒋燚
陈岩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201910588721.1A priority Critical patent/CN110417979B/en
Publication of CN110417979A publication Critical patent/CN110417979A/en
Application granted granted Critical
Publication of CN110417979B publication Critical patent/CN110417979B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Environmental & Geological Engineering (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application provides an unlocking method, an unlocking device, a terminal and a storage medium, wherein the unlocking method comprises the following steps: selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks; acquiring a first input gesture track on a terminal touch screen; and unlocking the terminal when the first input gesture track is matched with the first unlocking gesture track. According to the technical scheme, the first unlocking gesture track is selected from the pre-stored gesture tracks, the matching performance of the first input gesture track and the first unlocking gesture track of other users can be reduced, and the safety of terminal information can be improved.

Description

Unlocking method, device, terminal and storage medium
Technical Field
The application belongs to the technical field of terminals, and particularly relates to an unlocking method, an unlocking device, a terminal and a storage medium.
Background
With the development of science and technology, the terminals mostly support gesture unlocking. However, due to the existence of the monitoring device or when the terminal is in an open situation, the unlocking gesture of the terminal is easily acquired by other users. When a user leaves the terminal for a period of time, other users can input unlocking gestures of the terminal, and terminal information is leaked. More and more users prefer higher security terminals. The terminal can increase the complexity of the unlocking gesture so as to improve the unlocking safety of the terminal.
Disclosure of Invention
The embodiment of the application provides an unlocking method, an unlocking device, a terminal and a storage medium, which can improve the security of terminal information.
In a first aspect, an embodiment of the present application provides an unlocking method, including:
selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks;
acquiring a first input gesture track on a terminal touch screen;
and unlocking the terminal when the first input gesture track is matched with the first unlocking gesture track.
In a second aspect, an embodiment of the present application provides an unlocking device, including:
the first acquisition unit is used for selecting a first unlocking gesture track from a plurality of prestored gesture tracks;
the second acquisition unit is used for acquiring a first input gesture track on the terminal touch screen;
and the terminal unlocking unit is used for unlocking the terminal when the first input gesture track is matched with the first unlocking gesture track.
In a third aspect, an embodiment of the present application provides a terminal, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method described in any one of the above when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and the computer program is used for implementing any one of the methods described above when executed by a processor.
In a fifth aspect, embodiments of the present application provide a computer program product, where the computer program product includes a non-transitory computer-readable storage medium storing a computer program, where the computer program is operable to cause a computer to perform some or all of the steps as described in the first aspect of embodiments of the present application. The computer program product may be a software installation package.
The embodiment of the application provides an unlocking method, an unlocking device, a terminal and a storage medium. According to the technical scheme, the first unlocking gesture track is selected from the pre-stored gesture tracks, the matching performance of the first input gesture track and the first unlocking gesture track of other users can be reduced, and the safety of terminal information can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is an interface diagram illustrating an unlocking gesture trajectory according to an embodiment of the present application;
fig. 2 shows an interface schematic diagram of a terminal according to an embodiment of the present application;
FIG. 3 is a flow chart illustrating an unlocking method according to an embodiment of the present application;
fig. 4 shows an interface diagram of a terminal according to an embodiment of the present application;
fig. 5 is a schematic structural diagram illustrating an unlocking method according to another embodiment of the present application;
FIG. 6 shows an interface diagram of a terminal of an embodiment of the application;
fig. 7 shows a schematic flow chart of an unlocking method according to another embodiment of the present application;
fig. 8 shows a schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 9 shows a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
For a terminal using an unlocking gesture, when the terminal recognizes that a gesture track input by a user is consistent with a preset gesture track, the terminal is unlocked, and an unlocked terminal interface is displayed. When the unlocking interface of the terminal is 9 palace positions, the unlocking gesture track input by the user can be as shown in fig. 1. When the unlocking track input by the user on the unlocking interface of the terminal is consistent with the preset unlocking gesture track, the terminal is unlocked, and the unlocked terminal interface is displayed, wherein the terminal interface at this time can be as shown in fig. 2.
When the terminal is in a public occasion, the unlocking gesture track input by the user can be acquired by the monitoring equipment or other users. Therefore, when the user leaves the terminal for a period of time, other users can input the unlocking gesture track input by the user before to unlock the terminal, so that the information of the terminal is leaked, and the safety of the terminal is reduced. For example, when the user a inputs a zigzag unlocking gesture track on the terminal B, the user C beside the user a sees the unlocking gesture track. When the user A carelessly loses the terminal B, the user C can input the unlocking gesture track to unlock the terminal B and acquire the information stored by the terminal B.
In order to improve the security of the terminal information, a user can design a more complex unlocking gesture track. However, due to the fact that the complexity of the unlocking gesture track is high, the user cannot easily memorize and operate the unlocking gesture track, and the use experience of the user is poor. In addition, in public occasions with monitoring equipment, even if the password set by the user is relatively complex, the monitoring equipment can record the complex password completely. Therefore, the inventor proposes an unlocking method, which can increase the security of the terminal information by obtaining the unlocking gesture trajectory in the plurality of unlocking gesture trajectories.
Embodiments according to the technical concept of the present application are described below.
Fig. 3 shows a flowchart of an unlocking method according to an embodiment of the present application.
It should be noted that the unlocking method according to the embodiment of the present application may be applied to an unlocking device, and the unlocking method may be configured in a terminal. Wherein the terminal may be various electronic devices with touch screens including but not limited to smart phones, tablet computers, and the like.
As shown in fig. 3, an unlocking method according to an embodiment of the present application may include the following steps:
s101, selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks.
According to some embodiments, the user may set a plurality of different pre-stored unlock gesture trajectories. When a user sets a plurality of different unlocking gesture tracks, a corresponding name can be set for each unlocking gesture track. The name may be named by the user according to the shape of the unlock gesture trajectory. The shape of the gesture trajectory and the gesture trajectory corresponding name may be as shown in fig. 4. For example, if the unlocking gesture track set by the user is in a zigzag shape, the name of the unlocking gesture track may be "Z". The user sets corresponding names for each unlocking gesture track, and the convenience of use of the user can be improved.
Optionally, the terminal selects a first unlocking gesture track from a plurality of pre-stored gesture tracks according to the current date. And the user sets corresponding gesture tracks for different dates according to the self requirement. The terminal can select a first unlocking gesture track from a plurality of preset gesture tracks according to the current date. For example, the user may set 10 different gesture trajectories based on the date mantissa. Each mantissa corresponds to a gesture track, and the gesture tracks corresponding to different mantissas are also different. The gesture tracks corresponding to 0, 1, 2, 3, 4, 5, and 6 of the 10 date mantissas may be, for example, "W" -shaped gesture track, "O" -shaped gesture track, "U" -shaped gesture track, "J" -shaped gesture track, "S" -shaped gesture track, "M" -shaped gesture track, and "V" -shaped gesture track, respectively. When the terminal detects that the current date is 25 days, a first unlocking gesture track selected by the terminal from a plurality of preset gesture tracks is an M-shaped gesture track.
According to some embodiments, the terminal randomly selects a first unlocking gesture trajectory from a plurality of pre-stored gesture trajectories. When the user determines that the selection mode of the unlocking gesture track is random selection, the corresponding setting instruction terminal can be sent. And after receiving the setting instruction, the terminal analyzes the setting instruction to obtain instruction information. And the terminal sets the selection mode of the first unlocking gesture track as random selection according to the instruction information obtained by analysis. Before the terminal selects the first unlocking gesture track from the pre-stored gesture tracks, the gesture tracks can be sequenced. The terminal can select a first unlocking gesture track from a plurality of pre-stored gesture tracks according to a preset random algorithm. The gesture tracks prestored by the terminal can comprise a W-shaped gesture track, a J-shaped gesture track, an S-shaped gesture track, an M-shaped gesture track and a V-shaped gesture track. According to a random algorithm, the gesture track acquired by the terminal can be a W-shaped gesture track. According to a random algorithm, the gesture track acquired again by the terminal can also be an "M" shaped gesture track, for example.
Alternatively, the terminal may set the replacement period in response to a user operation. The user can determine the replacement period of the unlocking gesture track according to the requirement of the user, and sends a corresponding operation instruction terminal. And after receiving the operation instruction, the terminal analyzes the setting instruction to obtain instruction information. And the terminal responds to the user operation to set a replacement period according to the instruction information obtained by analysis. The replacement period set by the terminal in response to the user operation may be one of once after each successful terminal unlocking, once per day, once per week, once per month, and once per year.
According to some embodiments, the terminal may select an unlocking gesture trajectory from a plurality of pre-stored gesture trajectories according to a replacement cycle. The replacement period of the unlocking gesture trajectory set by the terminal may be, for example, once a day. The terminal can set 7 different gesture tracks, so that each day of the week corresponds to one gesture track. The 7 different gesture trajectories may be, for example, "W" -shaped gesture trajectory, "O" -shaped gesture trajectory, "U" -shaped gesture trajectory, "J" -shaped gesture trajectory, "S" -shaped gesture trajectory, "M" -shaped gesture trajectory, and "V" -shaped gesture trajectory. The terminal can select a corresponding unlocking gesture track every day according to the calendar information. For example, weekly monday, the terminal-selected unlock gesture trajectory may be a "W" shaped gesture trajectory.
Optionally, before the terminal selects the first unlocking gesture trajectory from the pre-stored gesture trajectories according to the replacement cycle, the gesture trajectories may be sorted. When the terminal selects the first gesture track, the first gesture track can be selected in a sequential mode, and the first gesture track can also be selected in a reverse mode. The replacement period of the unlocking gesture trajectory set by the terminal may be, for example, once a day. The sorting of the terminal over the 7 different gesture trajectories may be, for example, a "W" -shaped gesture trajectory, an "O" -shaped gesture trajectory, a "U" -shaped gesture trajectory, a "J" -shaped gesture trajectory, an "S" -shaped gesture trajectory, an "M" -shaped gesture trajectory and a "V" -shaped gesture trajectory. The terminal can select a corresponding unlocking gesture track every day according to the calendar information. For example, weekly monday, the terminal-selected unlock gesture trajectory may be a "W" shaped gesture trajectory. For example, tuesday, the terminal-selected unlock gesture trajectory may be an "O" shaped gesture trajectory.
It is easy to understand that the number of gesture tracks set by the user can be set according to the actual needs of the user. For example, a user may set 5 gesture tracks, and 5 gesture tracks may respectively unlock 5 different common terminal applications. The 5 gesture tracks may be, for example, "W" -shaped gesture tracks, "J" -shaped gesture tracks, "S" -shaped gesture tracks, "M" -shaped gesture tracks, and "V" -shaped gesture tracks, respectively. The unlocking application corresponding to the "W" -shaped gesture track, the "J" -shaped gesture track, the "S" -shaped gesture track, the "M" -shaped gesture track and the "V" -shaped gesture track respectively can be, for example, a music application, a photographing application, a short message application, a chat application and a game application.
S102, a first input gesture track on a terminal touch screen is obtained.
According to some embodiments, when a user needs to use a certain application of the terminal, the terminal needs to be unlocked. After the terminal is unlocked, the touch screen of the terminal can display various applications installed on the terminal, and a user can click the required applications. Therefore, the terminal needs to acquire a first input gesture track of the user on the terminal touch screen. For example, when a user needs to browse news information by using the terminal, the touch screen of the terminal can display an unlocking interface by pressing a terminal power key. The user needs to input a first input gesture track matched with a preset unlocking gesture track on the unlocking interface. The terminal can display the news information page required by the user only after the terminal needs to be unlocked according to the first input gesture track input by the user.
It is easy to understand that the unlocking interface of the terminal can be 9 palace positions. When the unlocking interface of the terminal is displayed as a 9-grid position, the user can input a first input gesture track. When the terminal detects that the finger of the user contacts the touch screen, the position of the finger is identified, and whether the position is a certain position in 9 grid positions is detected. And if the terminal detects that the contact position of the finger and the touch screen is a first position of 9 grid positions, determining that the first position is the initial position of the first input gesture track. And the terminal acquires the moving track of the finger on the touch screen. When the terminal detects that the finger leaves the terminal touch screen from the second position of the 9-grid position, the terminal determines that the second position is the end position of the first input gesture track. And at the moment, the finger moving track from the first position to the second position is the first input gesture track acquired by the terminal.
Optionally, the terminal is not provided with an unlocking interface of 9 palace lattice positions. When the terminal is in a standby state, the terminal can directly acquire a movement track of a finger of a user on the touch screen, wherein the movement track of the finger is a first input gesture track. The terminal can acquire a first input gesture track of a user on the touch screen by adopting a pressure sensor arranged on the touch screen.
S103, when the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal.
According to some embodiments, after the terminal acquires the first input gesture track and the first unlocking gesture track of the user, whether the first input gesture track and the first unlocking gesture track are matched is detected. And if the terminal detects that the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal. The terminal can detect whether the first input gesture track and the first unlocking gesture track are completely consistent, and if the first input gesture track and the first unlocking gesture track are completely consistent, the terminal is unlocked. For example, the first input gesture trajectory acquired by the terminal is an L-shaped first input gesture trajectory in 9 palace positions. The first unlocking gesture track obtained by the terminal from the plurality of gesture tracks is also an L-shaped gesture track of 9 palace lattice positions. And when the terminal detects that the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal.
Optionally, the terminal may further detect whether the shape similarity of the first input gesture trajectory and the first unlocking gesture trajectory exceeds a preset threshold. And if the terminal detects that the similarity of the first input gesture track and the first unlocking gesture track exceeds a preset threshold value, unlocking the terminal. For example, the user may directly input the first input gesture trajectory while the terminal is in a standby state. When the terminal acquires a first unlocking gesture track from the plurality of gesture tracks and detects that the similarity between the first input gesture track and the first unlocking gesture track exceeds a preset threshold value, unlocking the terminal. For example, the preset threshold value of the similarity of the shapes of the first input gesture track and the first unlocking gesture track set on the terminal by the user is 95%. The shape of the gesture track directly input by the user when the terminal is in the standby state may be, for example, an "S" shape. The shape of the first unlocking gesture track acquired by the terminal from the plurality of gesture tracks may be an "S" shape, for example. And when the terminal detects that the similarity of the S shape of the first input gesture track and the S shape of the first unlocking gesture track exceeds 95%, unlocking the terminal. The shape of the first unlocking gesture track acquired by the terminal from the pair of gesture tracks may also be a "Z" shape, for example. And when the terminal detects that the similarity of the S shape of the first input gesture track and the Z shape of the first unlocking gesture track does not exceed 95%, the terminal is not unlocked.
It is easy to understand that, after the terminal is unlocked, the display screen of the terminal can display the original interface set by the terminal system and can also display the display interface preset by the user. For example, the preset of the user may be that the user can unlock the a application of the terminal when the touch screen of the terminal inputs a gesture track in a shape of "W" while the terminal is in a standby state. And unlocking the terminal when the terminal detects that the first input gesture track is a W-shaped gesture track and the first input gesture track is matched with the first unlocking gesture track. And after the terminal is unlocked, displaying the display screen of the terminal as an initial display interface of the application A.
According to some embodiments, when the terminal detects that the first input gesture trajectory does not match the first unlocking gesture trajectory, the terminal is not unlocked. When the terminal acquires the first input gesture track of the user again, the terminal acquires the first unlocking gesture track from the plurality of gesture tracks again. And the terminal detects the matching degree of the first input gesture track and the first unlocking gesture track again. And when the terminal detects that the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal.
It is easy to understand that the order of step S102 and step S101 is not limited, i.e. the order of step S102 and step S101 may be interchanged. For example, the terminal may select a first unlocking gesture track from a plurality of pre-stored gesture tracks according to the current date, then obtain a first input gesture track on the terminal touch screen, and unlock the terminal when the first input gesture track is matched with the first unlocking gesture track. For example, the terminal may further acquire a first input gesture track on the terminal touch screen, then select a first unlocking gesture track from a plurality of pre-stored gesture tracks according to the current date, and unlock the terminal when the first input gesture track is matched with the first unlocking gesture track.
The embodiment of the application provides an unlocking method, wherein a first unlocking gesture track is selected from a plurality of prestored gesture tracks, and when the first input gesture track is detected to be matched with the first unlocking gesture track, the terminal is unlocked. According to the technical scheme, the first unlocking gesture track is obtained from the pre-stored gesture tracks, the matching performance of the first input gesture track and the first unlocking gesture track of other users can be reduced, and the safety of terminal information can be improved.
Fig. 5 shows a schematic structural diagram of an unlocking method according to another embodiment of the present application.
As shown in fig. 5, the unlocking method may include:
s201, providing prompt information of a first unlocking gesture track.
According to some embodiments, before the terminal acquires the first input gesture track of the user on the touch screen, prompt information of the first input gesture track can be sent out. The prompt message may be one of a text message, a voice message, an image message, and a video message.
Optionally, the prompt message may be a text message, for example. The text information may be, for example, a name of the first input gesture trajectory set by the user. The name may be, for example, "W", and the interface display of the terminal may be as shown in fig. 6. The user can input a preset first input gesture track according to the text information. When the name of the first input gesture track is 'W', a plurality of gesture tracks exist on the touch screen of the terminal, and a user needs to input the gesture track set by the user according to own memory.
It will be readily appreciated that the prompting message may be, for example, a voice message. The voice information may be, for example, a name of the first input gesture trajectory set by the user. Before the terminal acquires the first input gesture track on the touch screen, the unlocking interface of the terminal can be displayed in 9 grid positions. According to the gesture track name preset by the user, the microphone of the terminal can play the name in voice. And when the user receives the name, a first input gesture track is input according to the name. Because the monitoring equipment is far away from the terminal or the monitoring equipment does not have the voice function, the monitoring equipment cannot acquire the voice prompt information, and the safety of the terminal information can be improved.
According to some embodiments, the prompt information may also be image information, for example. The display mode of the image information may be to display a complete first input gesture track, or may be to display a part of the first input gesture track. For example, the user setting the reminder information may be displaying a portion of the first input gesture trajectory. When the user acquires a part of the first input gesture track, the user remembers the complete first input gesture track according to the part of the first input gesture track, and then the user can directly input the complete first input gesture track.
According to some embodiments, the reminder information may also be, for example, video information. The video information may be, for example, that 3 seconds may be set to show a complete first input gesture trajectory. When the user acquires the first input gesture track displayed in the 1 st second, the user recalls the complete first input gesture track according to the first input gesture track displayed in the 1 st second, and then the user can directly input the complete first input gesture track. The prompt information can reduce the leakage risk of the gesture track and improve the safety of the terminal information.
S202, a first input gesture track on the touch screen of the terminal and a first position of the terminal are obtained.
The detailed description is as described above and will not be repeated here.
According to some embodiments, the first position of the terminal may be a geographical position of the terminal when the terminal acquires the input unlocking gesture track. The first position may be obtained by various positioning means. And the terminal acquires the geographical position information of the terminal according to the geographical position information of the wireless access point accessed by the terminal. The terminal can also acquire the geographical location information through common positioning modes such as satellite positioning (GPS, big dipper, etc.), WiFi positioning, bluetooth positioning, Ultra Wideband (UWB), ultrasonic positioning, etc., but not limited to the above method.
S203, acquiring a second input gesture track and a second position on the terminal touch screen.
The detailed description is as described above and will not be repeated here.
Optionally, the first location and the second location of the terminal acquisition terminal are two different geographic locations. For example, when the terminal acquires the first input unlocking gesture, the first position of the terminal may be a Y geographic position, and when the terminal acquires the second input unlocking gesture, the second position of the terminal may be a T geographic position, for example.
S204, when the distance between the second position and the first position is larger than a preset threshold value, selecting a second unlocking gesture track from the plurality of pre-stored gesture tracks, wherein the second unlocking gesture track is different from the first unlocking gesture track.
According to some embodiments, when the terminal acquires the first position and the second position of the terminal, whether the distance between the first position and the second position is greater than a preset threshold value is detected. The preset threshold may be set by the user according to the habit of using the terminal by the user. For example, a user's behavior of frequently losing things, a smaller preset threshold may be set.
Optionally, when the terminal detects that the distance between the first position and the second position is greater than the preset threshold, a second unlocking gesture track is selected from a plurality of pre-stored gesture tracks, where the second unlocking gesture track is different from the first unlocking gesture track. The plurality of gesture trajectories may be, for example, "W" -shaped gesture trajectories, "O" -shaped gesture trajectories, "U" -shaped gesture trajectories, "J" -shaped gesture trajectories, "S" -shaped gesture trajectories, "M" -shaped gesture trajectories, and "V" -shaped gesture trajectories. The first unlocking gesture track acquired by the terminal may be an "S" shaped gesture track, for example. The terminal can also select a second unlocking gesture track from a plurality of pre-stored gesture tracks. The preset threshold set by the terminal may be, for example, 500 m. When the terminal detects that the distance between the first position and the second position is greater than 500m, the second unlocking gesture track acquired by the terminal may be an "O" shaped gesture track, for example.
And S205, unlocking the terminal when the second input gesture track is matched with the second unlocking gesture track.
According to some embodiments, after the terminal acquires the second input gesture track and the second unlocking gesture track of the user, whether the second input gesture track and the second unlocking gesture track are matched is detected. And if the terminal detects that the second input gesture track is matched with the second unlocking gesture track, unlocking the terminal. The terminal can detect whether the second input gesture track and the second unlocking gesture track are completely consistent, and if the second input gesture track and the second unlocking gesture track are completely consistent, the terminal is unlocked. For example, the second input gesture trajectory acquired by the terminal is a 9-grid-position "O" -shaped second input gesture trajectory. And a second unlocking gesture track acquired by the terminal from the plurality of gesture tracks is also an O-shaped gesture track of 9 palace lattice positions. And when the terminal detects that the second input gesture track is matched with the second unlocking gesture track, unlocking the terminal.
The embodiment of the application provides an unlocking method, and when a terminal detects that a distance between a first position and a second position of the terminal is larger than a preset threshold value when an unlocking gesture track is input, a second unlocking gesture track different from the first unlocking gesture track is obtained from a plurality of prestored gesture tracks. And when the terminal detects that the acquired second input gesture track is matched with the second unlocking gesture track, unlocking the terminal. According to the technical scheme, when the second input gesture track is obtained based on the terminal, the first position and the second position of the terminal are detected, the distance between the first position and the second position is larger than the preset threshold value, the second unlocking gesture track is obtained from the pre-stored gesture tracks, the matching performance of the first input gesture track and the second unlocking gesture track of other users can be reduced, and the safety of terminal information can be improved.
Fig. 7 shows a flowchart of an unlocking method according to another embodiment of the present application.
As shown in fig. 7, the unlocking method may include:
s301, a first input gesture track on the terminal touch screen is obtained.
The detailed description is as described above and will not be repeated here.
And S302, detecting whether the WIFI network connected with the terminal is a safe WIFI network.
According to some embodiments, the case that the terminal accesses the WIFI network includes: and the terminal turns on a WIFI switch to access the WIFI network, or switches from the currently accessed WIFI network to other WIFI networks, namely, the WIFI network switching process is carried out, and a new WIFI network is accessed. And when the terminal accesses the WIFI network, judging whether the accessed WIFI network is an unsafe WIFI network.
It is easy to understand that, when a terminal accesses a WIFI network currently, the terminal may acquire currently accessed WIFI network data, where the terminal may detect whether a connected WIFI network is a WIFI network of an authenticated security protocol, and the WIFI network data includes authentication data, a WIFI name, a connection state, access time, an access environment, and the like. The authentication data includes data of whether the security protocol has been authenticated, that is, whether the security protocol of the accessed WIFI network has passed the verification of the terminal, or whether the accessed WIFI network has been set as a secure network, or a secure network identifier, etc. After the terminal acquires the current accessed WIFI network data, whether the current connected WIFI network is the authenticated WIFI network with the security protocol or not is judged.
S302, when the fact that the WIFI network connected with the terminal is a secure network is detected, selecting a first unlocking gesture track from a first subset of a plurality of pre-stored gesture tracks.
According to some embodiments, the secure network may be a secure WIFI network preset in the terminal, and the secure WIFI network may be a WIFI network connected by the terminal through a correct password input by the user. The secure WIFI network may be, for example, the user's own home local area network.
Optionally, the gesture tracks included in the first subset of the pre-stored gesture tracks are part of the pre-stored gesture tracks. The number of gesture trajectories included in the first subset may be dependent on user requirements.
It is easy to understand that, when the terminal detects that the connected WIFI network is a secure network, a first unlocking gesture trajectory is selected from a first subset of pre-stored gesture trajectories. The terminal detects that the connected WIFI network can be, for example, a WIFI network of an authenticated security protocol, the WIFI network connected with the terminal is a secure WIFI network, and the terminal selects a first unlocking gesture track from a first subset of a plurality of pre-stored gesture tracks.
S304, when the WIFI network connected with the terminal is detected to be an unsafe network, selecting a first unlocking gesture track from a second subset of the plurality of pre-stored gesture tracks.
According to some embodiments, the insecure network may be a WIFI network that is not pre-stored in the terminal, and the insecure WIFI network may include, for example, a merchant selecting not to set a password or setting a password to adopt WEP authentication, and the like.
Optionally, the gesture tracks included in the second subset of the pre-stored gesture tracks are part of the pre-stored gesture tracks. The number of gesture trajectories included in the second subset may be dependent on user requirements. The gesture trajectories comprised by the second subset do not intersect the gesture trajectories comprised by the first subset. For example, where the second subset includes "S" shaped gesture trajectories, the first subset must not include "S" shaped gesture trajectories.
It is easy to understand that, when the terminal detects that the connected WIFI network is an unsecured network, the first unlocking gesture trajectory is selected from the second subset of the pre-stored plurality of gesture trajectories. The terminal detects that the connected WIFI network can be a WIFI network which is not authenticated by a security protocol, the WIFI network connected with the terminal is an unsafe WIFI network, and the terminal selects a first unlocking gesture track from a second subset of the pre-stored gesture tracks.
S305, when the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal.
According to some embodiments, after the terminal acquires the first input gesture track and the first unlocking gesture track of the user, whether the first input gesture track and the first unlocking gesture track are matched is detected. And if the terminal detects the first input gesture track and the first unlocking gesture track, unlocking the terminal. The terminal can detect whether the first input gesture track and the first unlocking gesture track are completely consistent, and if the first input gesture track and the first unlocking gesture track are completely consistent, the terminal is unlocked. For example, the first input gesture track acquired by the terminal is a 9-grid-position "L" -shaped second input gesture track. The first unlocking gesture track obtained by the terminal from the plurality of gesture tracks is also an L-shaped gesture track of 9 palace lattice positions. And when the terminal detects that the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal.
The embodiment of the application provides an unlocking method, wherein when a WIFI network connected with a terminal is detected to be an unsafe WIFI network, the first unlocking gesture track is selected from a second subset of a plurality of prestored gesture tracks. And when the terminal detects that the first input gesture track is matched with the first unlocking gesture track, unlocking the terminal. According to the technical scheme, when the WIFI network connected with the terminal is the unsafe WIFI network, the terminal selects the first unlocking gesture track from the second subset of the pre-stored gesture tracks, matching between the first input gesture track of other users and the first unlocking gesture track can be reduced, and then safety of terminal information can be improved.
The above description mainly introduces the scheme of the embodiment of the present application from the perspective of executing processes on the method side. It is understood that the terminal and the server include hardware structures and/or software modules for performing the respective functions in order to implement the above functions. Those of skill in the art would readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the server may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 8 shows a schematic structural diagram of an unlocking device according to an embodiment of the present application. The unlocking means may be implemented in software, hardware or a combination of both as all or part of the terminal. The apparatus 800 includes a first acquisition unit 801, a second acquisition unit 802, and a terminal unlocking unit 803.
A first obtaining unit 801, configured to select a first unlocking gesture trajectory from a plurality of pre-stored gesture trajectories;
a second obtaining unit 802, configured to obtain a first input gesture track on a terminal touch screen;
and the terminal unlocking unit 803 is configured to unlock the terminal when it is detected that the first input gesture trajectory matches the first unlocking gesture trajectory.
Optionally, the first obtaining unit 801 is further configured to select a first unlocking gesture trajectory from a plurality of pre-stored gesture trajectories according to the current date.
Optionally, the first obtaining unit 801 is further configured to randomly select a first unlocking gesture trajectory from a plurality of pre-stored gesture trajectories.
Optionally, the first obtaining unit 801 is further configured to select a first unlocking gesture trajectory from a plurality of pre-stored gesture trajectories according to the replacement cycle.
Optionally, the first obtaining unit 801 is further configured to set a replacement cycle in response to a user operation.
Optionally, the first obtaining unit 801 is further configured to select a first unlocking gesture track from a first subset of the plurality of gesture tracks when it is detected that the WIFI network connected to the terminal is a secure network; and when the WIFI network connected with the terminal is detected to be an unsafe network, selecting a first unlocking gesture track from a second subset of the plurality of gesture tracks.
Optionally, the first obtaining unit 801 is further configured to obtain a first location of the terminal;
acquiring a second input gesture track and a second position on the terminal touch screen;
when the distance between the second position and the first position is larger than a preset threshold value, selecting a second unlocking gesture track from a plurality of prestored gesture tracks, wherein the second unlocking gesture track is different from the first unlocking gesture track;
the terminal unlocking unit 803 is further configured to unlock the terminal when the second input gesture trajectory matches the second unlocking gesture trajectory.
Optionally, the apparatus 800 further includes an information prompt unit 804, configured to give a prompt information of the first unlocking gesture trajectory.
Optionally, the prompt message is one of text message, voice message, image message or video message.
The embodiment of the application provides an unlocking device, wherein a first unlocking gesture track is selected from a plurality of prestored gesture tracks through a first acquisition unit; a second acquisition unit acquires a first input gesture track on a terminal touch screen; and when detecting that the first input gesture track is matched with the first unlocking gesture track, the terminal unlocking unit unlocks the terminal. According to the unlocking device, the first unlocking gesture track is obtained from the pre-stored gesture tracks, the matching performance of the first input gesture track and the first unlocking gesture track of other users can be reduced, and the safety of terminal information can be improved.
Please refer to fig. 9, which is a schematic structural diagram of a terminal according to an embodiment of the present application. As shown in fig. 9, the terminal 900 may include: at least one processor 901, at least one network interface 904, a user interface 903, memory 905, at least one communication bus 902.
Wherein a communication bus 902 is used to enable connective communication between these components.
The user interface 903 may include a Display screen (Display) and a GPS, and the optional user interface 903 may also include a standard wired interface and a wireless interface.
The network interface 904 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Processor 901 may include one or more processing cores, among other things. The processor 901 interfaces with various components throughout the terminal 900 using various interfaces and lines to perform various functions and process data for the terminal 900 by executing or performing instructions, programs, code sets, or instruction sets stored in the memory 905, as well as invoking data stored in the memory 905. Optionally, the processor 901 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 901 may integrate one or a combination of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 901, but may be implemented by a single chip.
The Memory 905 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 905 includes a non-transitory computer-readable medium. The memory 905 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 905 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the above-described method embodiments, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. The memory 905 may optionally be at least one memory device located remotely from the processor 901. As shown in fig. 9, the memory 905, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an application program for the unlocking method.
In the terminal 900 shown in fig. 9, the user interface 903 is mainly used for providing an input interface for a user to obtain data input by the user; the processor 901 may be configured to call an application program of the unlocking method stored in the memory 905, and specifically perform the following operations:
selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks;
acquiring a first input gesture track on a terminal touch screen;
and unlocking the terminal when the first input gesture track is matched with the first unlocking gesture track.
In one embodiment, when the processor selects the first unlocking gesture trajectory from the pre-stored gesture trajectories, the processor specifically performs the following steps:
and selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks according to the current date.
In one embodiment, when the processor selects the first unlocking gesture trajectory from the pre-stored gesture trajectories, the processor specifically performs the following steps:
and randomly selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks.
In one embodiment, when the processor selects the first unlocking gesture trajectory from the pre-stored gesture trajectories, the processor specifically performs the following steps:
and selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks according to the replacement period.
In one embodiment, the processor is further configured to perform the steps of:
the replacement period is set in response to a user operation.
In one embodiment, when the processor selects the first unlocking gesture trajectory from the pre-stored gesture trajectories, the processor specifically performs the following steps:
when the WIFI network connected with the terminal is detected to be a secure network, selecting a first unlocking gesture track from a first subset of the gesture tracks;
and when the WIFI network connected with the terminal is detected to be an unsafe network, selecting a first unlocking gesture track from a second subset of the plurality of gesture tracks.
In one embodiment, when the processor performs acquiring the first input gesture track on the terminal touch screen, the following steps are specifically performed:
acquiring a first position of a terminal;
the processor is further configured to perform the steps of:
acquiring a second input gesture track and a second position on the terminal touch screen;
when the distance between the second position and the first position is larger than a preset threshold value, selecting a second unlocking gesture track from a plurality of prestored gesture tracks, wherein the second unlocking gesture track is different from the first unlocking gesture track;
and unlocking the terminal when the second input gesture track is matched with the second unlocking gesture track.
In one embodiment, before the processor performs acquiring the first input gesture track on the terminal touch screen, the following steps are specifically performed:
and giving prompt information of the first unlocking gesture track.
In one embodiment, the prompt message is one of a text message, a voice message, an image message or a video message.
The embodiment of the application provides a terminal, a first input gesture track on a terminal touch screen is obtained by selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks, and when the first input gesture track is detected to be matched with the first unlocking gesture track, the terminal is unlocked. The terminal of the embodiment of the application can reduce the matching between the first input gesture track of other users and the first unlocking gesture track by acquiring the first unlocking gesture track from the pre-stored gesture tracks, and further can improve the safety of terminal information.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method. The computer-readable storage medium may include, but is not limited to, any type of disk including floppy disks, optical disks, DVD, CD-ROMs, microdrive, and magneto-optical disks, ROMs, RAMs, EPROMs, EEPROMs, DRAMs, VRAMs, flash memory devices, magnetic or optical cards, nanosystems (including molecular memory ICs), or any type of media or device suitable for storing instructions and/or data.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any one of the unlocking methods as recited in the above method embodiments.
It is clear to a person skilled in the art that the solution of the present application can be implemented by means of software and/or hardware. The "unit" and "module" in this specification refer to software and/or hardware that can perform a specific function independently or in cooperation with other components, where the hardware may be, for example, a Field-ProgrammaBLE Gate Array (FPGA), an Integrated Circuit (IC), or the like.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some service interfaces, devices or units, and may be an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by a program, which is stored in a computer-readable memory, and the memory may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above description is only an exemplary embodiment of the present disclosure, and the scope of the present disclosure should not be limited thereby. That is, all equivalent changes and modifications made in accordance with the teachings of the present disclosure are intended to be included within the scope of the present disclosure. Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (10)

1. An unlocking method, comprising:
selecting a first unlocking gesture track from a plurality of pre-stored gesture tracks;
acquiring a first input gesture track on a terminal touch screen;
when the first input gesture track is detected to be matched with the first unlocking gesture track, unlocking the terminal;
the acquiring of the first input gesture track on the terminal touch screen further includes:
acquiring a first position of the terminal;
the method further comprises the following steps:
acquiring a second input gesture track and a second position on the terminal touch screen;
when the distance between the second position and the first position is larger than a preset threshold value, selecting a second unlocking gesture track from a plurality of prestored gesture tracks, wherein the second unlocking gesture track is different from the first unlocking gesture track;
when the second input gesture track is matched with the second unlocking gesture track, unlocking the terminal;
the method for acquiring the first input gesture track on the terminal touch screen comprises the following steps:
and giving prompt information of the first unlocking gesture track.
2. The method of claim 1, wherein selecting a first unlocking gesture trajectory from a pre-stored plurality of gesture trajectories comprises:
and selecting the first unlocking gesture track from a plurality of pre-stored gesture tracks according to the current date.
3. The method of claim 1, wherein selecting a first unlocking gesture trajectory from a pre-stored plurality of gesture trajectories comprises:
randomly selecting the first unlocking gesture track from a plurality of pre-stored gesture tracks.
4. The method of claim 1, wherein selecting a first unlocking gesture trajectory from a pre-stored plurality of gesture trajectories comprises:
and selecting the first unlocking gesture track from a plurality of pre-stored gesture tracks according to the replacement period.
5. The method of claim 4, wherein the method further comprises:
the replacement period is set in response to a user operation.
6. The method of claim 1, wherein selecting a first unlocking gesture trajectory from a pre-stored plurality of gesture trajectories comprises:
when the WIFI network connected with the terminal is detected to be a secure network, selecting the first unlocking gesture track from a first subset of the plurality of gesture tracks;
selecting the first unlocking gesture track from a second subset of the plurality of gesture tracks when it is detected that the WIFI network connected with the terminal is an unsafe network.
7. The method of claim 1, wherein the prompt message is one of a text message, a voice message, an image message, or a video message.
8. An unlocking device, comprising:
the first acquisition unit is used for selecting a first unlocking gesture track from a plurality of prestored gesture tracks;
the second acquisition unit is used for acquiring a first input gesture track on the terminal touch screen;
the terminal unlocking unit is used for unlocking the terminal when the first input gesture track is matched with the first unlocking gesture track;
the first obtaining unit is further configured to obtain a first position of the terminal;
acquiring a second input gesture track and a second position on the terminal touch screen;
when the distance between the second position and the first position is larger than a preset threshold value, selecting a second unlocking gesture track from a plurality of prestored gesture tracks, wherein the second unlocking gesture track is different from the first unlocking gesture track;
the terminal unlocking unit is further used for unlocking the terminal when the second input gesture track is matched with the second unlocking gesture track;
the unlocking device further comprises an information prompt unit, and the information prompt unit is used for the unlocking device before the first input gesture track on the terminal touch screen is acquired:
and giving prompt information of the first unlocking gesture track.
9. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the method of any of the preceding claims 1-7 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of the preceding claims 1 to 7.
CN201910588721.1A 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium Active CN110417979B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910588721.1A CN110417979B (en) 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910588721.1A CN110417979B (en) 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110417979A CN110417979A (en) 2019-11-05
CN110417979B true CN110417979B (en) 2021-10-26

Family

ID=68360079

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910588721.1A Active CN110417979B (en) 2019-07-02 2019-07-02 Unlocking method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110417979B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111831986B (en) * 2020-06-05 2024-05-28 阿波罗智联(北京)科技有限公司 Unlocking method and device based on gesture password
CN112130920A (en) * 2020-09-29 2020-12-25 上海佳勒电子有限公司 Flash lamp starting method, system, device and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN105468962A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 User interface unlocking method and apparatus
CN106304072A (en) * 2016-08-26 2017-01-04 北京小米移动软件有限公司 Safe verification method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103049181A (en) * 2012-12-20 2013-04-17 广东欧珀移动通信有限公司 Method and system for dynamically unlocking mobile terminal
US20150254464A1 (en) * 2014-03-07 2015-09-10 Agreeya Mobility, Inc. Method and system to provide customizable and configurable lock screen in a user device
CN106446624A (en) * 2015-08-06 2017-02-22 中兴通讯股份有限公司 Mobile terminal unlocking method and mobile terminal
CN105721712A (en) * 2016-03-30 2016-06-29 上海斐讯数据通信技术有限公司 Unlocking method and system
CN106096383A (en) * 2016-06-12 2016-11-09 捷开通讯(深圳)有限公司 Automatically mobile terminal and the method thereof of unlocking pin are changed
CN107315946A (en) * 2017-06-27 2017-11-03 深圳传音通讯有限公司 Screen-lock password generation method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103167169A (en) * 2013-02-01 2013-06-19 北京小米科技有限责任公司 Terminal unlocking method and terminal unlocking device
CN105468962A (en) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 User interface unlocking method and apparatus
CN106304072A (en) * 2016-08-26 2017-01-04 北京小米移动软件有限公司 Safe verification method and device

Also Published As

Publication number Publication date
CN110417979A (en) 2019-11-05

Similar Documents

Publication Publication Date Title
CN109075820B (en) Bluetooth pairing method, terminal device and readable storage medium
KR101552587B1 (en) Location-based access control for portable electronic device
CN104951072A (en) Application control method and terminal equipment
CN103838494A (en) Unlocking method of terminal equipment and terminal equipment
CN110765502B (en) Information processing method and related product
CN110417979B (en) Unlocking method, device, terminal and storage medium
CN105812491B (en) Equipment remote binding method and device
CN103150525B (en) Password input method and password input terminal
CN105072242B (en) A kind of method and mobile terminal of voice prompting
CN112307454A (en) Data encryption method and device, storage medium and electronic equipment
CN110290484A (en) Virtual Subscriber Identity Module (SIM) card management method and device and terminal equipment
CN110379051B (en) Unlocking method, device, terminal and storage medium
KR20180118635A (en) Method and apparatus for processing icons in an application
CN105162979A (en) Incoming call mute control method and smartwatch
CN106060050B (en) Auth method and terminal device
CN108769366B (en) Authority management method, device, mobile terminal and storage medium
CN108650645B (en) Method and related device for preventing malicious fee deduction
CN104811304B (en) Identity verification method and device
CN106354509B (en) Screen locking interface setting method and mobile terminal
EP2907330B1 (en) Method and apparatus for disabling algorithms in a device
CN106156646B (en) Information calling method and electronic equipment
CN113139173A (en) Input password acquisition method and device, electronic equipment and storage medium
CN110659082A (en) Application program interface display method and device, terminal and storage medium
CN105978899A (en) SIM card binding method for preventing malicious mobile phone flash
CN106376096B (en) Wireless network connection method and equipment thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant