CN110419042A - A kind of method and terminal of unlocking screen - Google Patents

A kind of method and terminal of unlocking screen Download PDF

Info

Publication number
CN110419042A
CN110419042A CN201780087948.7A CN201780087948A CN110419042A CN 110419042 A CN110419042 A CN 110419042A CN 201780087948 A CN201780087948 A CN 201780087948A CN 110419042 A CN110419042 A CN 110419042A
Authority
CN
China
Prior art keywords
terminal
unlocking
information
user
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780087948.7A
Other languages
Chinese (zh)
Other versions
CN110419042B (en
Inventor
柴良玉
靳杨清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN202111188784.1A priority Critical patent/CN114168916A/en
Publication of CN110419042A publication Critical patent/CN110419042A/en
Application granted granted Critical
Publication of CN110419042B publication Critical patent/CN110419042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/42User authentication using separate channels for security data
    • G06F21/43User authentication using separate channels for security data wireless channels

Abstract

A kind of method and terminal of unlocking screen, the unlocking information that can be sent in the state of the lock screen by second terminal for first terminal release screen lock state.This method comprises: first terminal is in the state of the lock screen, unlocking request (204) are sent to second terminal, the unlocking request includes the unique identifier of the first terminal and the unique identifier of the second terminal, the unique identifier of the first terminal is for first terminal described in unique identification, and the unique identifier of the second terminal is for second terminal described in unique identification;The first terminal receives the unlocking information (205) that the second terminal is sent, and the unlocking information is response of the second terminal to the unlocking request, and the unlocking information includes the unique identifier of the second terminal;The first terminal responds the unlocking information, executes the relevant operation (206) for releasing the screen lock state.

Description

A kind of method and terminal of unlocking screen Technical field
This application involves terminal applies field more particularly to the methods and terminal of a kind of unlocking screen.
Background technique
For the information security for ensureing user, screen locking can be arranged in many terminals.In the state of the lock screen, relevant information in terminal could be consulted by only inputting specific unlocking pin.User forgets unlocking pin sometimes, although big multiple terminals provides the chance of three to five even more input passwords, there is also the multiple input error password of user, final the case where not unlocking.It, generally will perhaps brush machine after sale solves but factory reset or again brush machine can all lead to the user data loss in terminal by restoring factory currently, for unlocking pin problem is forgotten.
Summary of the invention
The embodiment of the present application provides the method and terminal of a kind of unlocking screen, can be unlocked in the state of the lock screen by the unlocking information that second terminal is sent for first terminal.
The first aspect of the embodiment of the present application provides a kind of method of unlocking screen, may include: first terminal in the state of the lock screen, unlocking request is sent to second terminal, the unlocking request includes the unique identifier of the first terminal and the unique identifier of the second terminal, the unique identifier of the first terminal is used for the unique identification first terminal, and the unique identifier of the second terminal is used for the unique identification second terminal;Wherein, the unique identifier of first terminal can be used for second terminal and be verified, and the unique identifier of second terminal is the terminal that unlocking request is sent for finding.The first terminal receives the unlocking information of second terminal transmission, which is response of the second terminal to the unlocking request, which may include the unique identifier of the second terminal;The first terminal responds the unlocking information, executes the relevant operation for releasing the screen lock state.
In the embodiment of the present application, first terminal in the state of the lock screen, responds the operation of user, unlocking request can be sent to second terminal, for requesting the unlocking information of first terminal.After first terminal receives the unlocking information that second terminal is sent, the relevant operation that can execute releasing screen lock state provides a kind of method that can be unlocked without removing terminal data to release the screen lock state of first terminal for user;It can guarantee the safety of unlock by the unique identifier that unlocker device is trusted in verifying.
Optionally, in some embodiments of the present application, which can also include the first unlocking pin of the first terminal;The first terminal responds the unlocking information, executes the relevant operation for releasing the screen lock state, may include: that the first terminal responds first unlocking pin in the unlocking information, releases the screen lock state.It in the embodiment of the present application, include the first unlocking pin of first terminal in the unlocking information that the received second terminal of first terminal is sent, then, first terminal can release screen lock state directly in response to the first unlocking pin.This first unlocking pin can be first terminal and fill automatically, be also possible to be manually entered by user, to release the screen lock state of first terminal.A kind of implementation for releasing screen lock state is provided, the diversity of scheme is increased.
Optionally, in some embodiments of the present application, which responds the unlocking information, executes the relevant operation for releasing the screen lock state, it may include: that the first terminal responds the first unlocking pin that the unlocking information removes the first terminal, so that the first terminal releases the screen lock state;First unlocking pin be release the first terminal screen lock state it is close Code.In the embodiment of the present application, i.e. unlocking information can remove the first unlocking pin of first terminal, then, after first terminal receives the unlocking information that second terminal is sent, the first unlocking pin can be removed directly in response to unlocking information, so that first terminal releases screen lock state.A kind of implementation for releasing screen lock state is provided, the diversity of scheme is increased.
Optionally, in some embodiments of the present application, after which releases the screen lock state, this method can also include: that the first terminal shows and resets unlocking pin interface;The first terminal responds the operation of the setting unlocking pin of user's input, resets the unlocking pin of the first terminal.In the embodiment of the present application, first terminal is after releasing screen lock state according to the first unlocking pin, alternatively, can show after according to the first unlocking pin of unlocking information removing first terminal and reset unlocking pin interface, user can reset the second unlocking pin again.This second unlocking pin can be easier the unlocking pin remembered for user.
Optionally, in some embodiments of the present application, which sends unlocking request in the state of the lock screen, to second terminal, can include but is not limited to following several implementations:
(1) in the state of the lock screen, the unlocking pin of response user's input, if the number of unlock failure is greater than or equal to preset threshold value, which sends unlocking request from the trend second terminal to the first terminal.
(2) in the state of the lock screen, the unlock operation of response user's input sends unlocking request to the first terminal to the first terminal;It is understood that can be user in the case where initial, second terminal is selected to release screen lock state, alternatively, user is inputing password by mistake, but without the upper limit for reaching unlock failure, user can choose second terminal also to release screen lock state.
(3) first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, then the first prompt information is presented in the first terminal, first prompt information is for prompting the user whether to send the unlocking request to the second terminal, the first terminal obtains operation of the user based on first prompt information, i.e. if user selects the mark for sending unlocking request to second terminal, first terminal sends unlocking request to the second terminal;If user does not select the mark for sending unlocking request to second terminal, first terminal does not send unlocking request to second terminal.The controllability of user is realized, user can choose whether the screen lock state that first terminal is released by second terminal according to actual needs.
(4) first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user input matches with preset authentication information, which sends unlocking request to the second terminal;It is understood that this authentication information can be close guarantor's problem of user setting, such as name, favorite film, the most impressive thing, the ID card No. of parent etc..
(5) in the state of the lock screen, the second prompt information is presented in the first terminal, which includes the contact method of at least two contact persons, the contact person which is used to that user to be prompted to select unlocking request to be sent;User can select at least two contact persons, which obtains the selection operation of user's input;If contact person is artificially preset in the connection that the selection operation is directed to, which sends unlocking request to second terminal, which is to preset the corresponding terminal of contact person with this;If the contact person that the selection operation is directed to is not default contact person, which triggers warning note.This warning note may is that " unlock and fail by contact person " or " abnormal to unlock, it is noted that safety " etc..
In the embodiment of the present application, provide the specific implementation that several first terminals send unlocking request to second terminal, first terminal can send unlocking request from trend second terminal, it is also possible to respond the operation of user, unlocking request is sent to second terminal, diversified implementation is provided, the feasibility of scheme is increased.
Optionally, in some embodiments of the present application, before which sends unlocking request to second terminal, the party Method can also include: that the first terminal obtains the unique identifier of the first terminal and the unique identifier of the second terminal;The first terminal sends certification request to the second terminal, which is used for the relevant operation for requesting the second terminal with the screen lock state for meaning the first terminal execution releasing first terminal;The unique identifier of unique identifier and the second terminal in the certification request including the first terminal;The first terminal receives the authentication response of second terminal transmission, which is response of the second terminal to the certification request.It in the embodiment of the present application, is to the explanation that first terminal setting second terminal is trust unlocker device, after only faith mechanism is successfully established, second terminal just has permission the screen lock state that can release first terminal.After first terminal sends certification request to second terminal, if second terminal is to the Information Authentication success in certification request, the response that instruction faith mechanism is successfully established can then be returned, if second terminal is not proved to be successful the information in certification request, then the response that instruction information mechanism establishes failure can be returned.
Optionally, in some embodiments of the present application, which further includes the first unlocking pin of the first terminal.It include except the unique identifier of the first terminal and the unique identifier of the second terminal i.e. in the certification request, it can also include the first unlocking pin of first terminal, after first terminal initiates unlocking request to second terminal, second terminal directly can send the first unlocking pin to first terminal, release the screen lock state of first terminal.
The embodiment of the present application second aspect provides a kind of method of unlocking screen, it may include: that second terminal receives the unlocking request that first terminal is sent, the unlocking request includes the unique identifier of the first terminal, and the unique identifier of the first terminal is used for the unique identification first terminal;The unique identifier of first terminal can be used for second terminal and be verified.If the unique identifier of the first terminal is identical as the unique identifier that the second terminal pre-saves, which sends unlocking information to the first terminal, which is used to execute the relevant operation for the screen lock state for releasing the first terminal.
In the embodiment of the present application, second terminal receives the unlocking request that first terminal is sent, second terminal can unique identifier to the first terminal for including in unlocking request and the unique identifier that pre-saves match, if successful match, second terminal sends unlocking information to first terminal.After first terminal receives the unlocking information that second terminal is sent, the relevant operation that can execute releasing screen lock state provides a kind of method that can be unlocked without removing terminal data to release the screen lock state of first terminal for user;It can guarantee the safety of unlock by verifying unique identifier.
Optionally, in some embodiments of the present application, before second terminal sends unlocking information to first terminal, method can also include: to obtain the authentication information of user's input;Second terminal to first terminal send unlocking information, if may include: user input authentication information match with preset authentication information, second terminal to first terminal transmission unlocking information.It is understood that this authentication information can be close guarantor's problem of user setting, such as name, favorite film, the most impressive thing, the ID card No. of parent etc..
Optionally, in some embodiments of the present application, which further includes the first unlocking pin of the first terminal, which releases the screen lock state for the first terminal;Or, the unlocking information, which is used to indicate the first terminal, removes the first unlocking pin, so that the first terminal releases the screen lock state.It in the embodiment of the present application, include the first unlocking pin of first terminal in the unlocking information that second terminal is sent to first terminal, then, first terminal can release screen lock state directly in response to the first unlocking pin.Or, the unlocking information that second terminal is sent to first terminal can remove the first unlocking pin of first terminal, then, after first terminal receives the unlocking information that second terminal is sent, the first unlocking pin can be removed directly in response to unlocking information, so that first terminal releases screen lock state.A kind of implementation for releasing screen lock state is provided, the diversity of scheme is increased.
Optionally, in some embodiments of the present application, before second terminal sends unlocking information to first terminal, method It can also include: that prompt information is presented in second terminal, prompt information sends unlocking information to first terminal for prompting the user whether;Second terminal sends unlocking information to first terminal, may include: that second terminal obtains operation of the user based on prompt information, sends unlocking information to first terminal.In the embodiment of the present application, can prompt information first be presented according to unlocking request in the unlocking information that second terminal is sent to first terminal, chosen whether to send unlocking information to first terminal from user.If user selects the mark for sending unlocking information to first terminal, second terminal sends unlocking information to first terminal;If user's selection does not send the mark of unlocking information to first terminal, second terminal does not send unlocking information to first terminal.User can be desired to achieve the effect that according to itself actual demand, realizes the controllability of user.
Optionally, in some embodiments of the present application, the second terminal receives before the unlocking request that first terminal is sent, this method can also include: the certification request that the second terminal receives first terminal transmission, which includes the unique identifier of the first terminal and the unique identifier of the second terminal;The second terminal verifies the unique identifier of the second terminal, and saves the unique identifier of the first terminal;If being proved to be successful, which sends authentication response to the first terminal, which is used to indicate the first terminal and the second terminal establishes faith mechanism.In the embodiment of the present application, it is first terminal to be arranged the explanation that second terminal is trust unlocker device, second terminal receives the certification request that first terminal is sent, second terminal carries out Information Authentication, if being proved to be successful, then second terminal can send authentication response to first terminal, and authentication response can indicate that faith mechanism is successfully established.After only faith mechanism is successfully established, second terminal just has permission the screen lock state for releasing first terminal.If second terminal is not proved to be successful the information in certification request, then the response that instruction information mechanism establishes failure can be returned.
Optionally, in some embodiments of the present application, which further includes the first unlocking pin of the first terminal.It include except the unique identifier of the first terminal and the unique identifier of the second terminal i.e. in the certification request, it can also include the first unlocking pin of first terminal, after first terminal initiates unlocking request to second terminal, second terminal directly can send the first unlocking pin to first terminal, release the screen lock state of first terminal.
Optionally, in some embodiments of the present application, after the second terminal sends the unlocking information to the first terminal, this method can also include: the second unlocking pin that the second terminal receives first terminal transmission, which is the unlocking pin after the first terminal is reset.
The embodiment of the present application third aspect provides a kind of method of unlocking screen, may include: first terminal in the state of the lock screen, response user input operation, open barcode scanning application;The first terminal is operated in response to the barcode scanning that the barcode scanning is applied, and releases the screen lock state.First terminal can be operated by the barcode scanning of scanning application in the state of the lock screen, when user forgets unlocking pin, release screen lock state, provide a kind of implementation of unlock.
Optionally, in some embodiments of the present application, the object of barcode scanning operation is scan code;It should be understood that the scan code can be bar code, two dimensional code, three-dimension code or four-dimensional code etc..The first terminal is operated in response to the barcode scanning that the barcode scanning is applied, and releases the screen lock state, be may include: that the first terminal is operated in response to the barcode scanning that the barcode scanning is applied, if the information of scan code carrying matches with preset information, is released the screen lock state;If this method can also include: that the information of scan code carrying and preset information mismatch, the screen lock state can not be released.It specifically can be and be presented to the user a prompt information, which can be scan code mistake or warning note etc..In the embodiment of the present application, screen lock state is released to scanning scan code and has carried out a specific description, in the case where the information of scan code carrying and preset information match, first terminal can release the screen lock state.
Optionally, in some embodiments of the present application, the object of barcode scanning operation is scan code;The letter of scan code carrying Breath includes the unique identifier of the first terminal and the unlocking pin of the first terminal, and the unique identifier of the first terminal is used for the unique identification first terminal;Alternatively, the information of scan code carrying includes the unlocking pin of user identifier He the first terminal, which is used for the user of the unique identification first terminal;Alternatively, the information of scan code carrying includes the unlocking pin of unique knowledge identification code of the first terminal, the user identifier and the first terminal.In the embodiment of the present application, user identifier can be the other identifiers such as ID card No., phone number;The unlocking pin of first terminal can release the screen lock state of first terminal.Here the explanation of a washability has mainly been done to the information that scan code carries.
Optionally, in some embodiments of the present application, before which releases the screen lock state, this method can also include: the authentication information that the first terminal obtains user's input;If the authentication information and preset authentication information of user's input mismatch, which is presented warning note;The first terminal releases the screen lock state, if may include: user input authentication information matched with preset authentication information, which releases the screen lock state.In the embodiment of the present application, before first terminal releases screen lock state, authentication information can be first inputted, this authentication information can be used to ensure the safety of unlock.
Optionally, in some embodiments of the present application, after which releases the screen lock state, this method can also include: that the first terminal shows and resets unlocking pin interface;Password Operations are reseted in first terminal response user's input, and the second unlocking pin is arranged.In the embodiment of the present application, first terminal is after releasing screen lock state according to the first unlocking pin, alternatively, can show after according to the first unlocking pin of unlocking information removing first terminal and reset unlocking pin interface, user can reset the second unlocking pin again.This second unlocking pin can be easier the unlocking pin remembered for user.
Optionally, in some embodiments of the present application, which in the state of the lock screen, opens barcode scanning application, may include:
(1) in the state of the lock screen, the unlocking pin of response user's input, if the number of unlock failure is greater than or equal to preset threshold value, which can automatically open the barcode scanning application to the first terminal.
(2) in the state of the lock screen, the opening operation of response user's input opens the barcode scanning application to the first terminal.It is understood that can be user in the case where initial, barcode scanning application is opened to release screen lock state, alternatively, user is inputing password by mistake, but without the upper limit for reaching unlock failure, user, which also can choose, opens barcode scanning application to release screen lock state.
(3) in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, first terminal presentation user's prompt information, user's prompt information is for prompting the user whether to open the barcode scanning application for the first terminal;The first terminal obtains operation of the user based on user's prompt information, if user selects to open the mark of barcode scanning application, first terminal opens the barcode scanning application.If user does not select to open the mark of barcode scanning application, first terminal does not open barcode scanning application.The controllability of user is realized, user can choose whether the barcode scanning applied by barcode scanning operation according to actual needs to release screen lock state.
(4) first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user input matches with preset authentication information, which opens the barcode scanning application.It is understood that this authentication information can be close guarantor's problem of user setting, such as name, favorite film, the most impressive thing, the ID card No. of parent etc..
In the embodiment of the present application, the specific implementation that several first terminals open barcode scanning application is provided, first terminal can automatically open barcode scanning application, it is also possible to respond the operation of user, barcode scanning application is opened, diversified implementation is provided, increases the feasibility of scheme.
Optionally, in some embodiments of the present application, in the state of the lock screen, before opening barcode scanning application, this method can also include: that the first terminal generates the first scan code to the first terminal;The first terminal sends first scan code to second terminal, such as: the first scan code is sent to second terminal by modes such as short message, wechat message, QQ message.Alternatively, the first terminal sends first scan code to server.Such as: first terminal sends the first scan code to email address, Dropbox address etc..I.e. the first scan code can be stored in another equipment, when first terminal in the state of the lock screen, the first scan code for showing in another equipment can be scanned to release screen lock state.
Optionally, in some embodiments of the present application, if the first unlocking pin that this method can also include: the first terminal changes, which generates the second scan code according to the unique identifier of the first unlocking pin and the first terminal after change;Alternatively, the first terminal regularly updates first scan code, third scan code is generated.In the embodiment of the present application, the explanation that the first scan code mainly generated to first terminal is updated, such as: first terminal can generate the second scan code according to the unique identifier of unlocking pin and first terminal after change;Alternatively, first terminal periodically can generate third scan code according to the unique identifier of current unlocking pin and first terminal.
The embodiment of the present application fourth aspect also provides a kind of method of unlocking screen, may include: first terminal in the state of the lock screen, receive the second terminal transmission unlocking information, the second terminal be with the first terminal established communication connection terminal;The first terminal removes the first unlocking pin of the first terminal according to the unlocking information, alternatively, the first unlocking pin for including according to the unlocking information, releases the screen lock state of the first terminal.In the embodiment of the present application, first terminal in the state of the lock screen, receive second terminal send unlocking information after, the first unlocking pin of the first terminal can be removed according to the unlocking information, alternatively, the first unlocking pin for including according to the unlocking information, releases the screen lock state of the first terminal.A kind of method that can be unlocked without removing terminal data is provided for user.Here foundation communication connection, which can be, established bluetooth connection, was also possible to establish USB connection etc..
Optionally, in some embodiments of the present application, this method can also include: that the first terminal shows and resets unlocking pin interface;The first terminal responds the operation for resetting unlocking pin of user's input, resets the second unlocking pin of the first terminal.In the embodiment of the present application, first terminal is after releasing screen lock state according to the first unlocking pin, alternatively, can show after according to the first unlocking pin of unlocking information removing first terminal and reset unlocking pin interface, user can reset the second unlocking pin again.This second unlocking pin can be easier the unlocking pin remembered for user.
Optionally, in some embodiments of the present application, which in the state of the lock screen, before the unlocking information for receiving second terminal transmission, can include but is not limited to following several implementations:
(1) in the state of the lock screen, the unlocking pin of response user's input, if the number of unlock failure is greater than or equal to the first preset threshold value, which sends unlocking request from the trend second terminal to the first terminal.
(2) in the state of the lock screen, the unlock operation of response user's input sends unlocking request to the first terminal to the first terminal.It is understood that can be user in the case where initial, second terminal is selected to release screen lock state, alternatively, user is inputing password by mistake, but without the upper limit for reaching unlock failure, user can choose second terminal also to release screen lock state.
(3) first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, then the first prompt information is presented in the first terminal, first prompt information is for prompting the user whether to send the unlocking request to the second terminal, the first terminal obtains operation of the user based on first prompt information, i.e. if user selects the mark for sending unlocking request to second terminal, first terminal sends unlocking request to the second terminal;If user does not select to send out to second terminal The mark of unlocking request is sent, then first terminal does not send unlocking request to second terminal.The controllability of user is realized, user can choose whether the screen lock state that first terminal is released by second terminal according to actual needs.
(4) first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user input matches with preset authentication information, which sends unlocking request to the second terminal;It is understood that this authentication information can be close guarantor's problem of user setting, such as name, favorite film, the most impressive thing, the ID card No. of parent etc..
(5) in the state of the lock screen, if detecting the second terminal in presetting range, which sends the unlocking request to the second terminal to the first terminal.
(6) in the state of the lock screen, if detecting in presetting range, the duration of the second terminal is greater than or equal to the second preset threshold value to the first terminal, which sends the unlocking request to the second terminal.
(7) in the state of the lock screen, the second prompt information is presented in the first terminal, which includes the contact method of at least two contact persons, the contact person which is used to that user to be prompted to select unlocking request to be sent;The first terminal obtains the selection operation of user's input;If contact person is artificially preset in the connection that the selection operation is directed to, which sends unlocking request to second terminal, which is to preset the corresponding terminal of contact person with this;If the contact person that the selection operation is directed to is not default contact person, which triggers warning note.This warning note may is that " unlock and fail by contact person " or " abnormal to unlock, it is noted that safety " etc..
In the embodiment of the present application, provide the specific implementation that several first terminals send unlocking request to second terminal, first terminal can send unlocking request from trend second terminal, it is also possible to respond the operation of user, unlocking request is sent to second terminal, diversified implementation is provided, the feasibility of scheme is increased.
The 5th aspect of the embodiment of the present application also provides a kind of method of unlocking screen, it may include: first terminal under black state, receive the unlocking information that second terminal is sent, the unlocking information includes the unique identifier and unlocking pin of the first terminal, which is used to release the screen lock state of the first terminal;In response to receiving the unlocking information of second terminal transmission, which lights screen, into screen lock state, locking screen interface is presented, fills the unlocking pin automatically on the locking screen interface;The first terminal releases the screen lock state.
In the embodiment of the present application, black state is the state that screen is not lit or does not power on.After first terminal receives the unlocking information that second terminal is sent, the unlocking information that first terminal is sent in response to receiving the second terminal lights screen, into screen lock state, locking screen interface is presented, fills the unlocking pin automatically on the locking screen interface, releases the screen lock state.It is also possible to the unlocking information that first terminal is sent in response to receiving the second terminal, lights screen, into screen lock state, locking screen interface is presented, user is manually entered unlocking pin according to the prompt in unlocking information to release the screen lock state of first terminal.
The 6th aspect of the embodiment of the present application also provides a kind of method of unlocking screen, if may include: that the first terminal detects second terminal within the scope of pre-determined distance, the first terminal sends unlocking request to the second terminal, the screen lock state that the unlocking request is used to that the second terminal to be requested to release the first terminal, which includes the unique identifier of the first terminal and the unique identifier of the second terminal;The first terminal receives the unlocking information of second terminal transmission, the unlocking information is response of the second terminal to the unlocking request, the unlocking information includes the unique identifier and unlocking pin of the second terminal, which is used to release the screen lock state of the first terminal;In response to receiving the unlocking information, which is presented locking screen interface, fills the unlocking pin automatically on locking screen interface, releases the screen lock state.
In the embodiment of the present application, if the first terminal detects second terminal within the scope of pre-determined distance, then the first terminal sends unlocking request to the second terminal, receive the unlocking information that second terminal is sent, in response to receiving the unlocking information, locking screen interface is presented in the first terminal, fills the unlocking pin automatically on locking screen interface, releases the screen lock state.It is also possible to the unlocking information that first terminal is sent in response to receiving the second terminal, locking screen interface is presented, user is manually entered unlocking pin according to the prompt in unlocking information to release the screen lock state of first terminal.
Optionally, in some embodiments of the present application, if the first terminal monitors second terminal within the scope of pre-determined distance, the first terminal sends unlocking request from second terminal described in trend, if may include: that the first terminal detects second terminal within the scope of pre-determined distance, and duration of the second terminal within the scope of pre-determined distance be greater than preset time threshold when, the first terminal to the second terminal send unlocking request.I.e. first terminal detects second terminal within the scope of pre-determined distance, and when duration reaches preset time threshold, and Cai Huixiang second terminal sends unlocking request.
The 7th aspect of the embodiment of the present application provides a kind of terminal, has in the state of the lock screen, sends unlocking request to second terminal, and the unlocking information for receiving the transmission of second terminal releases the function of screen lock state.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The embodiment of the present application eighth aspect provides a kind of terminal, has the unlocking request sent according to first terminal, sends unlocking information to first terminal, so that first terminal releases the function of screen lock state using unlocking information.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The 9th aspect of the embodiment of the present application provides a kind of terminal, has in the state of the lock screen, operates in response to the barcode scanning of barcode scanning application, release the function of the screen lock state.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The tenth aspect of the embodiment of the present application provides a kind of terminal, and there is the unlocking information for receiving the transmission of second terminal in the state of the lock screen to release the function of screen lock state.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The tenth one side of the embodiment of the present application provides a kind of terminal, and there is the unlocking information for receiving the transmission of second terminal in the state of the lock screen to release the function of screen lock state.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The 12nd aspect of the embodiment of the present application provides a kind of terminal, has in the state of the lock screen, sends unlocking request to second terminal, and the unlocking information for receiving the transmission of second terminal releases the function of screen lock state.The function can also execute corresponding software realization by hardware realization by hardware.The hardware or software include one or more modules corresponding with above-mentioned function.
The 13rd aspect of the embodiment of the present application provides a kind of computer readable storage medium, instruction is stored in the computer readable storage medium, when run on a computer, so that computer executes method described in above-mentioned various aspects.It should be noted that, substantially all or part of the part that contributes to existing technology or the technical solution can embody the technical solution of the application in the form of software produces mouth in other words, the computer software product is stored in a storage medium, for being stored as computer software instructions used in above equipment, it includes for executing above-mentioned first aspect, second aspect as program designed by back end or management node.
The storage medium includes: USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), the various media that can store program code such as magnetic or disk.
The embodiment of the present application fourteenth aspect provides a kind of computer program product comprising instruction, when run on a computer, so that computer executes such as the application first aspect or any optional implementation of first aspect, or, the application second aspect or any optional implementation of second aspect, such as the application third aspect or any optional implementation of the third aspect, such as the application fourth aspect or any optional implementation of fourth aspect, such as any optional implementation in terms of the application the 5th or in terms of the 5th, as in terms of the application the 6th or method described in any optional implementation in terms of the 6th.
In technical solution provided by the embodiments of the present application, have the advantages that
By providing a kind of method that first terminal can be unlocked in the state of the lock screen by second terminal transmission unlocking information, user does not need brush machine or restores to dispatch from the factory to unlock in the case where forgetting the screen-lock password of terminal.
Detailed description of the invention
Fig. 1 is schematic diagram of a scenario applied by the embodiment of the present application;
Fig. 2 is one embodiment schematic diagram of the method for unlocking screen in the embodiment of the present application;
Fig. 3 A is that the unlocking pin of first terminal setting is the schematic diagram of numerical ciphers;
Fig. 3 B is that the unlocking pin of first terminal setting is the schematic diagram of sliding trace;
Fig. 3 C is that the unlocking pin of first terminal setting is the schematic diagram of fingerprint;
Fig. 3 D is that first terminal setting second terminal is the schematic diagram for trusting unlocker device;
Fig. 3 E is that first terminal setting second terminal is the schematic diagram for trusting unlocker device;
Fig. 3 F is the schematic diagram that second terminal and first terminal establish faith mechanism;
Fig. 3 G is the schematic diagram that second terminal and first terminal establish faith mechanism;
Fig. 3 H is the schematic diagram that second terminal and first terminal establish faith mechanism;
Fig. 3 I is the schematic diagram that second terminal and first terminal establish faith mechanism;
Fig. 4 A is the schematic diagram that first terminal sends unlocking request to second terminal;
Fig. 4 B is the schematic diagram that first terminal sends unlocking request to second terminal;
Fig. 4 C is the schematic diagram that first terminal sends unlocking request to second terminal;
Fig. 4 D is the schematic diagram that second terminal sends unlocking information;
Fig. 4 E is the schematic diagram of first terminal unlock;
Fig. 4 F is the schematic diagram of first terminal unlock;
Fig. 4 G is the schematic diagram of first terminal unlock;
Fig. 4 H is the schematic diagram of first terminal unlock;
Fig. 5 is one embodiment schematic diagram of the method for unlocking screen in the embodiment of the present application;
Fig. 6 A is the schematic diagram that first terminal generates two dimensional code;
Fig. 6 B is the schematic diagram that first terminal sends two dimensional code;
Fig. 6 C is the schematic diagram that first terminal sends two dimensional code;
Fig. 6 D is the schematic diagram that first terminal opens barcode scanning application;
Fig. 6 E is the schematic diagram that first terminal opens barcode scanning application;
Fig. 6 F is the schematic diagram that first terminal opens barcode scanning application;
Fig. 6 G is the schematic diagram that first terminal opens barcode scanning application;
Fig. 6 H is the schematic diagram of second terminal two-dimensional code display;
Fig. 6 I is the schematic diagram that first terminal scans the two-dimensional code;
Fig. 6 J is the schematic diagram that first terminal scans the two-dimensional code unlock;
Fig. 6 K is the schematic diagram that first terminal scans the two-dimensional code unlock;
Fig. 7 is one embodiment schematic diagram of the method for unlocking screen in the embodiment of the present application;
Fig. 8 A is that the smartwatch that mobile phone setting has connected is the schematic diagram for trusting unlocker device;
Fig. 8 B is that the smartwatch that mobile phone setting has connected is the schematic diagram for trusting unlocker device;
Fig. 8 C is the schematic diagram that smartwatch sends unlocking information to mobile phone;
Schematic diagram of Fig. 8 D for the distance of mobile phone and smartwatch within a preset range;
Fig. 8 E is that the schematic diagram whether unlocked by smartwatch is shown on first terminal;
Fig. 9 is one embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 10 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 11 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 12 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 13 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 14 is another embodiment schematic diagram of terminal in the embodiment of the present application;
Figure 15 is another embodiment schematic diagram of terminal in the embodiment of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application is described, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those skilled in the art's every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
Terminal involved in the application can be with are as follows: mobile phone, tablet computer (Tablet Personal Computer), laptop computer (Laptop Computer), digital camera, personal digital assistant (personal digital assistant, abbreviation PDA), navigation device, mobile Internet access device (Mobile Internet Device,) or wearable device (Wearable Device), such as bracelet, wrist-watch MID.
Fig. 1 is schematic diagram of a scenario applied by the embodiment of the present application.As shown in Figure 1, terminal unlocking fails.The application can solve the problem of user can not unlock under the scene for forgetting terminal screen unlocking pin.Concrete implementation may include following methods: first, setting a unlock terminal (also referred to as trust unlocker device), the unlock terminal is for unlocking the terminal, so that the terminal enters operation interface when terminal is arranged or modifies unlocking pin.Second, generating unique scan code, which includes the unlocking pin and unique identifier of the terminal when terminal is arranged or modifies unlocking pin.It should be understood that, unique identifier can be International Mobile Equipment Identity code (the international mobile equipment identity of terminal, IMEI), it is also possible to sequence number (series number, SN), it is also possible to other identification codes uniquely to indicate different terminals.When user forgets the unlocking pin of terminal, clearing password or password is forced to reset using unlock terminal or scan code Operation, or unlocking pin is obtained from unlock terminal to unlock the unlock present terminal such as present terminal or scanning bar code, two dimensional code, three-dimension code, four-dimensional code.Technical scheme will be described further by way of examples as follows.
Fig. 2 is one embodiment schematic diagram of the method for unlocking screen in the embodiment of the present application.This programme is the example that terminal screen unlock is realized by unlock terminal, is specifically included:
201, unlocking pin is arranged in first terminal.
Screen locking refers to that the screen of terminal is in the lock state.In the embodiment of the present application, first terminal supports the lock state for releasing current screen by unlocking pin in the state of the lock screen.Wherein, unlocking pin type applied by first terminal may include the password unlock of the types such as numerical ciphers, sliding trace, fingerprint.First terminal can be set or modify unlocking pin.Fig. 3 A is that the unlocking pin of first terminal setting is the schematic diagram of numerical ciphers.Fig. 3 B is that the unlocking pin of first terminal setting is the schematic diagram of sliding trace.Fig. 3 C is that the unlocking pin of first terminal setting is the schematic diagram of fingerprint.
There are mainly two types of terminal screen lockings: one is to beautify the screen locking for main function;One is with safely for the screen locking of main function, this screen locking needs to input password or the correct nine grids pattern of drafting etc. in unlock.Technical scheme is to either with safely for the screen locking of main function, or to beautify the screen locking for main function, is all suitable for as long as needing to input password or drawing the screen locking of correct nine grids pattern unlock.Screen lock state is the locking state for needing to input password or drawing before the unlocks such as correct nine grids pattern.Screen locking and blank screen, breath screen are relevant, also have any different.Typically, black state is the state that screen is not lit or does not power on.Breath screen state is in screen state of going out, if terminal does not lock (i.e. the screen of terminal does not lock), user can be directly entered desktop by the bright screen of power key;If terminal locks (i.e. the screen locking of terminal), user presses the bright screen of power key, and terminal can show locking screen interface under bright screen state.It does not operate, breath can shield automatically, without lighting operation after the second preset time period (such as 5s) after breath screen, mobile phone is locked by the first preset time period (such as 15s) when mobile phone defaults bright screen;Alternatively, deposit interest screen state of going forward side by side can be locked at once by pressing power key when the bright screen of mobile phone.
202, first terminal setting second terminal is to trust unlocker device, and send authentication information to second terminal.
In the embodiment of the present application, user is that unlocker device is trusted in first terminal setting, can be first terminal while initial setting up unlocking pin, second terminal is arranged as it and trusts unlocker device;It is also possible to after first terminal has been set unlocking pin for some time, user considers actual demand, and second terminal is arranged as it and trusts unlocker device;It is also possible to when user modifies the unlocking pin of first terminal, trusts unlocker device for first terminal setting.User is that first terminal setting trusts the scene of unlocker device without limitation.
Illustratively, it is illustrated so that the unlocking pin of first terminal setting is sliding trace as an example.After unlocking pin is set, when user can click " completion " or operate in next step, a prompting frame can be popped up on first terminal, prompts similar informations such as " whether trust unlocker device are set, to prevent forgetting Password ".If user selects "Yes", first terminal responds the operation of user, can show that a prompt user fills in the interface of authentication information.Authentication information may include, such as: the unique identifier of first terminal and the unique identifier of second terminal;Alternatively, the unique identifier and agreement password of the unique identifier of first terminal, second terminal;Alternatively, the unlocking pin of the unique identifier of the unique identifier of first terminal, second terminal, first terminal;Alternatively, the other informations such as unlocking pin of the unique identifier of the unique identifier of first terminal, second terminal, agreement password, first terminal.The unique identifier of first terminal is used for unique identification first terminal, and the unique identifier of second terminal is used for unique identification second terminal.
Wherein, setting agreement password is a kind of mode for safety verification.When the unlocking pin of first terminal can be used for first terminal unlock failure, second terminal sends unlocking pin to first terminal and first terminal is unlocked.For first terminal Unique identifier, first terminal can be obtained with automatic identification, and the unique identifier of second terminal can be manually entered by user.
It after user fills in authentication information, is operated into next step, selects the mode for sending authentication information to second terminal.For example, it is the schematic diagram for trusting unlocker device that Fig. 3 D, which is first terminal setting second terminal,.In shown in Fig. 3 D, first terminal can send authentication information to second terminal by modes such as hiShare, bluetooth, Wireless Fidelity (Wireless Fidelity, WIFI), the software account (such as WeChat ID, QQ number) of third-party application, short messages.Further, authentication information can be prompted to have sent success on first terminal, can not also prompted, specifically without limitation.It should be noted that the interaction between terminal may include: that one is the modes of short-distance wireless communication to interact, such as direct-connected etc. by bluetooth, WIFI;One is being interacted by third-party server, for example, wechat, QQ, short message these be all that information transfer is carried out by server.
Optionally, in concrete implementation mode, as shown in FIGURE 3 E, the mode that selection sends authentication information can also be before filling in authentication information, and Fig. 3 E is that first terminal setting second terminal is the schematic diagram for trusting unlocker device.
It should be noted that, first terminal sends authentication information to second terminal, can be after user fills in authentication information, executes long press operation, the operation of first terminal response user's long-pressing, it shows " address list, wechat good friend, QQ friends etc. ", user selects again, such as selects address list, then first terminal can show the contact person in address list, selected contact person A can send authentication information to contact person A by way of short message;Wechat good friend is such as selected, then first terminal shows wechat good friend, selectes good friend B, and Xiang Haoyou B sends authentication information.It should be understood that first terminal determines the mode of authentication information, and all it is not specifically limited to the mode that second terminal sends the authentication information.
203, second terminal and first terminal establish faith mechanism.
In the embodiment of the present application, second terminal receives the authentication information that first terminal is sent, and includes the unique identifier of first terminal and the unique identifier of second terminal in authentication information.The unique identifier of the first terminal is used to indicate the trust unlocker device that second terminal is determined as first terminal;The unique identifier of the second terminal with the identification code of second terminal for being matched, if successful match, second terminal can be defaulted as the trust unlocker device of first terminal, establish faith mechanism with first terminal, the unique identifier for saving first terminal, that is, have permission unlock first terminal.Fig. 3 F is the schematic diagram that second terminal and first terminal establish faith mechanism.In shown in Fig. 3 F, after second terminal receives authentication information, if authentication information successful match, second terminal can show the prompt information of a successful match.If matching is failed, faith mechanism establishes failure, and second terminal lack of competence unlocks first terminal.
Selectable, Fig. 3 G is the schematic diagram that second terminal and first terminal establish faith mechanism.In shown in Fig. 3 G, second terminal receive authentication information and by verifying after, user can reaffirm verification information, it can in second terminal prompt " whether with the trust unlocker device for meaning first terminal " etc. prompt informations.If user clicks " agreement ", second terminal responds the operation of user, establishes faith mechanism with first terminal, saves the unique identifier of first terminal, becomes the trust unlocker device of first terminal, can unlock first terminal.If " disagreeing ", second terminal responds the operation of user, establishes and fails with first terminal faith mechanism, and second terminal can not unlock first terminal.
Selectable, Fig. 3 H is the schematic diagram that second terminal and first terminal establish faith mechanism.It further include agreement password in authentication information in shown in Fig. 3 H, agreement password is used to ensure the safety of authentication information.The unique identifier of second terminal is not only matched for so second terminal, it is also necessary to which verifying agreement password, when both indicating successfully, second terminal can be defaulted as the trust unlocker device of first terminal, establish faith mechanism with first terminal.If it fails to match for unique identifier of the second terminal to the authentication failed or second terminal of arranging password, faith mechanism establishes failure.
Fig. 3 I is the schematic diagram that second terminal and first terminal establish faith mechanism.In shown in Fig. 3 I, second terminal will not only match the unique identifier of second terminal, it is also necessary to verifying agreement password.After second terminal has verified agreement password, user can be reaffirmed verification information, and second terminal responds the operation of user, establish faith mechanism with first terminal.
It optionally, can also include the unlocking pin of first terminal in authentication information.When the user of first terminal forgets screen-lock password, after second terminal receives the unlocking request of first terminal, the unlocking pin of first terminal can be sent to first terminal, which is used to unlock for first terminal.
It is selectable, after second terminal is to authentication information successful match, authentication response can also be sent to first terminal, authentication response is response of the second terminal to certification request, informs that first terminal faith mechanism is successfully established.
It should be noted that second terminal can carry out remote authorization operation to first terminal after first terminal and second terminal establish faith mechanism, such as removes password, forces locking, shutdown operation.Wherein, when locking being forced to can be understood as first terminal loss or can not find, worry user information leakage, can be remotely operated by second terminal, by first terminal screen locking.It forces to lock it can be appreciated that first terminal does not set unlocking pin, but first terminal is lost by user, can be that first terminal sets unlocking pin by second terminal, by first terminal screen locking.It is understood that the received authentication information of second terminal can be shown on a display screen, can not also show.
204, the operation of first terminal response user sends unlocking request to second terminal.
In the embodiment of the present application, the operation of first terminal response user sends unlocking request to second terminal, and unlocking request includes the unique identifier of first terminal and the unique identifier of second terminal.The unique identifier of first terminal is acted for executing verifying to second terminal, and the unique identifier of second terminal is the second terminal that unlocking request is sent for finding, that is, sends the object of unlocking request.
First terminal, which sends unlocking request to second terminal, can include but is not limited to following several implementations:
(1) in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, first terminal sends unlocking request to second terminal to first terminal.Fig. 4 A is the schematic diagram that first terminal sends unlocking request to second terminal.It should be understood that unlock number of the first terminal in preset time period is finished in shown in Fig. 4 A, prompt " whether by trusting unlocker device unlock " or the prompt information of " whether passing through trusted devices removing password ".User can select "Yes" or "No" according to demand, if selection "Yes", first terminal respond the operation of user, send unlocking request to second terminal.It is selectable, in specific implementation, if the unlock number in preset time period is finished, unlocking request can be sent to second terminal with automatic trigger first terminal, not need user and go to choose whether the operation by trusting unlocker device unlock.
(2) in the state of the lock screen, if unlock failure, the unlock operation of response user's input, first terminal sends unlocking request to second terminal to first terminal.Fig. 4 B is the schematic diagram that first terminal sends unlocking request to second terminal.It should be understood that the unlocking pin of user's input for the first time unlocks failure in shown in Fig. 4 B, or the unlocking pin of second of input unlocks failure, user, which can choose, trusts unlocker device to unlock, and first terminal responds the operation of user, sends unlocking request to second terminal.Illustratively, if the unlocking pin of user's input unlocks failure, first terminal can be with display reminding information, such as " remaining 2 unlock chances, if continuous mistake 3 times will be 3 hours locked, you can choose trusted devices and unlock ".
(3) in the state of the lock screen, the unlock operation of response user's input sends unlocking request to second terminal to first terminal.Fig. 4 C is the schematic diagram that first terminal sends unlocking request to second terminal.It should be understood that in shown in Fig. 4 C, user can in the state of the lock screen, and also no input unlocking pin directly can choose trusted devices unlock, first terminal responds the operation of user, sends unlocking request to second terminal.
(4) first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, then the first prompt information is presented in first terminal, first prompt information sends unlocking request to second terminal for prompting the user whether, first terminal obtains operation of the user based on the first prompt information, sends unlocking request to second terminal.
(5) first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, first terminal sends unlocking request to second terminal.For example, authentication information can be the name of parent, favorite film, the most impressive thing etc..
(6) in the state of the lock screen, the second prompt information is presented in first terminal, and the second prompt information includes the contact method of at least two contact persons, the contact person that the second prompt information is used to that user to be prompted to select unlocking request to be sent;First terminal obtains the selection operation of user's input;If contact person is artificially preset in the connection that selection operation is directed to, first terminal sends unlocking request to second terminal, and second terminal is terminal corresponding with default contact person;If the contact person that selection operation is directed to is not default contact person, first terminal triggers warning note.
It should be understood that, when first terminal sends unlocking request to second terminal, unlocking request can be sent by modes such as hiShare, bluetooth, Wireless Fidelity, short message, universal serial bus (Universal Serial Bus, USB), be not specifically limited herein.
205, second terminal verifies unlocking request, sends unlocking information to first terminal.
In the embodiment of the present application, after second terminal receives the unlocking request that first terminal is sent, the interface of second terminal is presented can be as shown in Figure 4 D, and Fig. 4 D is the schematic diagram that second terminal sends unlocking information.Wherein, unlocking information is the information for unlocking first terminal.The unlocking request may include the unique identifier of first terminal, and the unique identifier of first terminal is used for unique identification first terminal;If the unique identifier of first terminal is identical as the unique identifier that second terminal pre-saves, second terminal sends unlocking information to first terminal, and unlocking information is used to execute the relevant operation for the screen lock state for releasing first terminal.
Second terminal verifies unlocking request, sends unlocking information to first terminal, may include following several situations:
The unique identifier of unique identifier and second terminal in unlocking request including first terminal.If second terminal determines that the identification code of first terminal is matched with the identification code of first terminal in verification information, then it is proved to be successful, and the unique identifier of second terminal verifying second terminal is matched with the unique identifier of itself, then is proved to be successful, then first terminal sends unlocking information to second terminal.
Alternatively, the unique identifier of unique identifier and second terminal in unlocking request including first terminal, agreement password.Second terminal also needs to verify the agreement password for including in unlocking request, and the even unique identifier of first terminal, the unique identifier of second terminal, agreement password is all proved to be successful, then second terminal sends unlocking information to first terminal.
Or, if the unique identifier of first terminal and the unique identifier of second terminal are proved to be successful, second terminal can show a prompt information, similar to " good friend A request unlock; be determined as the terminal unlocking of good friend A " user can click the other identifiers such as " determination " or "Yes", and second terminal responds the operation of user, send unlocking information to second terminal.
Or, if the unique identifier of first terminal and the unique identifier of second terminal are proved to be successful, agreement password is also proved to be successful, second terminal can show a prompt information, similar to " good friend A request unlock, if be determined as the terminal unlocking of good friend A ", user can click the other identifiers such as " determination " or "Yes", second terminal responds the operation of user, sends unlocking information to second terminal.
Alternatively, obtaining the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, second terminal sends unlocking information to first terminal.
Wherein, unlocking information may include the first unlocking pin of first terminal, and the first unlocking pin is for unlocking first terminal;Alternatively, unlocking information may include the first unlocking pin of first terminal, screen-lock password set interface is shown again after unlocking first terminal, which is used to reset unlocking pin for user;Alternatively, unlocking information is used for the first unlocking pin of Compulsory Removal first terminal, i.e., the unlocking pin of first terminal is disposed, into operation interface;Alternatively, unlocking information, for showing screen-lock password set interface again after the first unlocking pin of Compulsory Removal first terminal, which is used to reset the second unlocking pin for user.
It should be noted that, second terminal can be with to the mode that first terminal sends unlocking information are as follows: for example, the unlocking pin for including in unlocking information is numerical ciphers, and second terminal can send numerical ciphers to first terminal by modes such as short message, notice, wechat message, QQ message.The unlocking pin for including in unlocking information is sliding trace, and second terminal can send the picture instruction of sliding trace to first terminal, and picture instruction can be sent by modes such as short message, notice, wechat message, QQ message to first terminal.User is referred to the sliding trace that picture is shown, sliding unlocking pin unlocks first terminal.The unlocking pin for including in unlocking information is fingerprint, second terminal can by fingerprint in a manner of picture by short message, notice etc. to first terminal transmission, first terminal automatic identification fingerprint unlocks.
It should be understood that can also send unlocking information when second terminal sends unlocking information to first terminal by modes such as hiShare, bluetooth, Wireless Fidelity, short message, USB, be not specifically limited herein.
206, first terminal responds unlocking information, executes the relevant operation for releasing screen lock state.
After first terminal receives the unlocking information that second terminal is sent, unlocked using unlocking information.Specifically may include following situation:
(1) Fig. 4 E is the schematic diagram of first terminal unlock.In shown in Fig. 4 E, unlocking information includes the first unlocking pin of first terminal.If the first unlocking pin is numerical ciphers, second terminal can be sent by modes such as short message, notice, wechat message, QQ message, user can be manually entered the first unlocking pin according to the first unlocking pin for including in short message, notice, wechat message, QQ message being presented on locking screen interface etc. to unlock terminal.Alternatively, being also possible to have in unlocking information including the first unlocking pin, first terminal can automatic identification filling the first unlocking pin unlock.It should be understood that whether first terminal shows the first unlocking pin, can also depend on second terminal would generally be shown to the mode that first terminal sends unlocking information if it is short message, if it is other information, can not also be shown.
If the first unlocking pin is sliding trace, then received unlocking information directly can be shown sliding trace on the clear position that unlock interface removes input unlocking pin interface by first terminal, and user's reference input sliding trace unlocks or automatic identification filling sliding trace unlocks.If the first unlocking pin is fingerprint, first terminal can directly automatic identification fingerprint unlock.
(2) Fig. 4 F is the schematic diagram of first terminal unlock.In shown in Fig. 4 F, after the first terminal is unlocked according to unlocking information, screen-lock password set interface can also be shown, user can reset the second unlocking pin for first terminal.
(3) Fig. 4 G is the schematic diagram of first terminal unlock.In shown in Fig. 4 G, first terminal falls the first unlocking pin Compulsory Removal being arranged before according to the first unlocking pin of unlocking information Compulsory Removal, i.e. first terminal, operation interface can be directly entered, before lower last reset password, not further into screen lock state.
(4) Fig. 4 H is the schematic diagram of first terminal unlock.In shown in Fig. 4 H, after first terminal is according to the first unlocking pin of unlocking information Compulsory Removal, screen-lock password set interface can also be shown, user can reset the second unlocking pin for first terminal.It is selectable, when reseting the second unlocking pin, it can also select and whether retain trust unlocker device, if do not retained, can delete, if retained, second terminal continues as the trust unlocker device of first terminal.Further, first Terminal can also send the second unlocking pin reseted to second terminal;Second terminal can receive the second unlocking pin of first terminal transmission.
It is selectable, first terminal is shown and resets screen-lock password set interface, may include: first terminal detect according to the first unlocking pin unlock after or the first unlocking pin of Compulsory Removal after show screen-lock password set interface.It is understood that above-mentioned illustrates, what unlocking pin was mainly illustrated by taking sliding trace as an example, for other unlocking manners and similar, details are not described herein again.
In the embodiment of the present application, user can trust unlocker device for the terminal device setting of oneself, can be unlocked operation by the trust unlocker device when forgetting unlocking pin.A kind of method that can be unlocked without removing terminal data is provided for user;It can guarantee the safety (such as mobile phone of binding household) of unlock by the unique identifier that unlocker device is trusted in verifying.
Fig. 5 is a method flow schematic diagram of the method for unlocking screen in the embodiment of the present application, as shown in figure 5, method includes:
501, unlocking pin is arranged in first terminal.
In the embodiment of the present application, first terminal supports setting unlocking pin, and the screen lock state of first terminal can be released with the unlocking pin set, and applied unlocking pin type may include the password unlock of the types such as numerical ciphers, sliding trace, fingerprint.It is any shown to specifically refer to Fig. 3 A- Fig. 3 C, details are not described herein again.
502, first terminal generates the first scan code.
In the embodiment of the present application, the first scan code can be generated when being arranged or modifying unlocking pin in first terminal.First scan code is used to carry the relevant information of the unlocking pin of first terminal, so that the relevant operation of unlock can be performed when scanning the first scan code for first terminal.Wherein, the information of the first scan code carrying includes but explanation not limited to the following:
The information of (1) first scan code carrying may include the unique identifier of first terminal and the first unlocking pin of first terminal, and the unique identifier of first terminal is used for unique identification first terminal;First unlocking pin can release the screen lock state of first terminal in the case where first terminal screen locking, and the unique identifier of first terminal is used to determine that first scan code to be the scan code of the releasing screen lock state of first terminal.
The information of (2) first scan codes carrying includes the first unlocking pin of user identifier and first terminal, and user identifier is used for the user of unique identification first terminal.For example, user identifier can be the authentication information (such as identification card number, passport No., social security number) of user.
The information of (3) first scan codes carrying includes the first unlocking pin of unique knowledge identification code of first terminal, user identifier and first terminal.
The information of (4) first scan codes carrying includes removing the first instruction information of the first unlocking pin of first terminal, i.e. after first terminal scans first scan code, the first unlocking pin of first terminal can be removed, so that first terminal releases screen lock state.
The information of (5) first scan codes carrying includes skipping the second indication information of the first unlocking pin of input of first terminal, i.e. after first terminal scans first scan code, the interface that the first unlocking pin of input can be skipped automatically, to release the screen lock state of first terminal.
First scan code can be a bar code, two dimensional code, three-dimension code or four-dimensional code etc..It is illustrated so that the first scan code is two dimensional code as an example, this two dimensional code may include the unlocking pin and unique identifier of first terminal, and the unique identifier of first terminal can be the identification codes such as IMEI, SN.For example, Fig. 6 A is the schematic diagram that first terminal generates two dimensional code.Scheming In shown in 6A, user produces prompt information when unlocking pin is arranged, and determines operation according to what user clicked in prompt information, generates two dimensional code.For example, unlocking pin is 123456, IMEI 866369030001848, the two dimensional code of generation may include the two information.When generating two dimensional code, the unique identifier of first terminal can obtain automatically, and unlocking pin can be manually entered by user, be also possible to the unlocking pin that first terminal obtains user setting or modification automatically.
It should be noted that, the possible more than one of the two dimensional code that first terminal generates, if modifying a unlocking pin, first terminal generates a two dimensional code, the two dimensional code that last time can also be prompted to generate cancels, the information whether deleted etc, it is newest unlock two dimensional code that two codes that second terminal is shown, which are effectively ensured, can unlock first terminal.
503, first terminal sends the first scan code to electronic equipment.
In the embodiment of the present application, after first terminal generates the first scan code, user can also fill in or select to save the account of the first scan code.If the account filled in is email address, Dropbox address etc., first terminal is that first scan code is sent to server, i.e., electronic equipment is server;If the account filled in is phone number, wechat account, QQ account, microblog account etc., first terminal is that first scan code is sent to second terminal, i.e., electronic equipment is second terminal.
It should be understood that the account for saving the first scan code is illustrated by taking email address as an example using the first scan code as two dimensional code.Fig. 6 B is the schematic diagram that first terminal sends two dimensional code.In shown in Fig. 6 B, first terminal can directly be sent two dimensional code in email address " 12345678@qq.com ".
It is selectable, first terminal can the corresponding second terminal of the first phone number in a manner of from short message to cell phone address book send short message, may include two dimensional code in short message;Certainly, corresponding first contact person of the first phone number is usually that user thinks reliable ground household, good friend, classmate etc..
For wechat account, after generating two dimensional code, the first wechat account for saving two dimensional code can be filled in, first terminal sends two dimensional code to the second terminal for logging in the first wechat account.Fig. 6 C is the schematic diagram that first terminal sends two dimensional code.In shown in Fig. 6 C, user can not have to the account for filling in or saving two dimensional code, and after first terminal generates two dimensional code, user can be to two dimensional code progress long press operation.First terminal responds the operation (duration that i.e. user presses two dimensional code is more than preset threshold value) of user's long-pressing two dimensional code, shows the list of transmission, such as information, wechat, QQ, Sina weibo, Alipay.If user clicks wechat, the wechat buddy list of first terminal user can be shown, selected target good friend sends two dimensional code to target good friend.It should be understood that target good friend is also possible to the account of first terminal user oneself, it can the account of first terminal user, Lai Baocun or two-dimensional code display can be logged in second terminal.
It should be noted that step 503 is optional step.Selectable, first terminal can also print the first scan code after generating the first scan code, the safe place of comparison is stored in, for example, safety cabinet etc..After the user of first terminal forgets unlocking pin, first scan code can be scanned with first terminal, releases the screen lock state of first terminal.
504, in the state of the lock screen, barcode scanning application is opened in the operation of response user's input to first terminal.
If user has forgotten unlocking pin, the relevant operation of unlock can be executed according to the first previously saved scan code.In the embodiment of the present application, the mode of the first scan code can be read to obtain the information saved in the first scan code by opening barcode scanning using the viewfinder window of (such as camera, independent barcode scanning application).Illustratively, user can realize this function by following several modes:
(1) Fig. 6 D is the schematic diagram that first terminal opens barcode scanning application.In shown in Fig. 6 D, first terminal receives the unlocking pin of user's input, and the number for unlocking failure reaches the upper limit in preset time period, and user can manually select using two dimensional code unlocking function, and first terminal responds the operation of user's selection, opens barcode scanning application.
(2) Fig. 6 E is the schematic diagram that first terminal opens barcode scanning application.In shown in Fig. 6 E, first terminal receives the unlocking pin of user's input, and the number for unlocking failure reaches the upper limit in preset time period, directly triggers first terminal and automatically opens barcode scanning application.
(3) Fig. 6 F is the schematic diagram that first terminal opens barcode scanning application.In shown in Fig. 6 F, first terminal receives the unlocking pin of user's input, unlock failure, and user can manually select using barcode scanning unlocking function, and first terminal responds the operation of user, opens barcode scanning application.
(4) in the state of the lock screen, the opening operation of response user's input opens barcode scanning application to first terminal.Such as: Fig. 6 G is the schematic diagram that first terminal opens barcode scanning application.In shown in Fig. 6 G, for first terminal when initial, display input password unlock and barcode scanning unlock, when user selects barcode scanning unlock, first terminal responds the operation of user, opens barcode scanning application.
(5) in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, first terminal presentation user's prompt information, user's prompt information opens barcode scanning application for prompting the user whether to first terminal;First terminal obtains operation of the user based on user's prompt information, opens barcode scanning application.
(6) first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, first terminal opens barcode scanning application.For example, authentication information can be close guarantor's problem, such as name, favorite film or the most impressive thing of parent;It is also possible to that user's input biological characteristic is required to verify etc..
It is understood that first terminal is operated in response to the barcode scanning that barcode scanning is applied, screen lock state is released, can specifically be realized by the content in following step 505 and step 506, be also possible to other implementations, be not specifically limited.
505, second terminal shows the first scan code.
First scan code can be stored in second terminal, can also be saved in the server.Such as: two dimensional code be stored in email address, Dropbox address, microblog account, wechat account, in QQ account;It can also be stored in the picture library of second terminal, can also be stored in short message.The short message that second terminal can check that first terminal is sent carrys out two-dimensional code display;It is also possible to second terminal and logs in email address, two-dimensional code display, as shown in figure 6h, Fig. 6 H is the schematic diagram of second terminal two-dimensional code display;It is also possible to second terminal and logs in other accounts such as wechat, QQ, Sina weibo, cloud, checks and show the two dimensional code that first terminal is sent.
It should be understood that the timing of step 504 and step 505 is without limitation, step 505 is optional step.
506, first terminal is operated in response to the barcode scanning that barcode scanning is applied, and releases screen lock state.
In the embodiment of the present application, the object of barcode scanning operation is scan code;First terminal is operated in response to the barcode scanning that the barcode scanning is applied, and releases the screen lock state, be may include: that first terminal is operated in response to the barcode scanning that barcode scanning is applied, if the information of scan code carrying matches with preset information, is released the screen lock state;If the method can also include: that the information of the scan code carrying and preset information mismatch, prompt information is presented in the first terminal.The prompt information can be scan code mistake or warning note.
Illustratively, first terminal releases the screen lock state of first terminal using the first scan code that barcode scanning application scanning second terminal is shown.Fig. 6 I is the schematic diagram that first terminal scans the two-dimensional code.It should be understood that, in shown in Fig. 6 I, it include the unlocking pin and unique identifier of first terminal in two dimensional code, the unique identifier of first terminal can be determined as the unlock two dimensional code of first terminal again, not so there may be the unlocking pin of several terminals setting be it is identical, when only including unlocking pin in two dimensional code When, other terminals scan the two dimensional code and can also unlock, and cannot effectively ensure its safety.The unlocking pin of first terminal can unlock.
Fig. 6 J is the schematic diagram that first terminal scans the two-dimensional code unlock, and as shown in Fig. 6 J, first terminal in the state of the lock screen, opens barcode scanning application.First terminal scans the two-dimensional code carry out information checking, can be with automatic unlocking if verified successfully.Alternatively, Fig. 6 K is the schematic diagram that first terminal scans the two-dimensional code unlock, as shown in fig. 6k, first terminal scans the two-dimensional code carry out information checking, if verified successfully, jumps out password resetting interface automatically, user can reset new unlocking pin.If verification failure, can prompt check information to mismatch, without other operations.
It is selectable, if the information carried in two dimensional code includes skipping the second indication information of the first unlocking pin of input of first terminal, so after first terminal scans first scan code, the interface of the first unlocking pin of input can be skipped automatically, to release the screen lock state of first terminal.
It should be understood that can also scan the two-dimensional code the number not unlocked to first terminal is arranged a threshold value.For example, first terminal has continuously swept 5 two dimensional codes, do not unlock also, then, in next 3 hours, it is forbidden to use the function of scanning the two-dimensional code unlock, prevents criminal's malice from obtaining user information using the function of scanning the two-dimensional code unlock.
In one possible implementation, first terminal is when opening barcode scanning application, two dimensional code request can be sent to second terminal, second terminal can request to send the two dimensional code to first terminal according to two dimensional code, when first terminal receives two-dimension code image, the two dimensional code can be identified with automatically scanning, to unlock.It is possible to prevente effectively from currently there was only first terminal, no second terminal carrys out two-dimensional code display, thus the problem of first terminal can not unlock.
Selectable, if the first unlocking pin of first terminal is updated to the second unlocking pin, first terminal generates the second scan code according to the unique identifier of the second unlocking pin and first terminal;Alternatively, first terminal periodically updates the first scan code according to the unique identifier of current unlocking pin and first terminal, third scan code is generated.The second scan code or third scan code regenerated can be manually selected automatically or by user and be sent to second terminal or server.
It should be noted that in one possible implementation, barcode scanning application can be the other applications such as camera, i.e., camera has the function of to scan bar code, two dimensional code, three codes, four-dimensional code etc..
In the embodiment of the present application, user can generate unique scan code for the terminal of oneself, which can be bar code, two dimensional code, three codes, four-dimensional code etc..It is mainly illustrated by taking two dimensional code as an example in above-described embodiment, other scan codes are also similar.In scan code include the unique identifier and unlocking pin of first terminal, therefore operation can be unlocked by scanning the two dimensional code when user forgets unlocking pin.A kind of mode for forgetting to unlock when unlocking pin without removing terminal data is provided for user;The mode that two dimensional code is generated by using unlocking pin and the unique identifier of terminal, ensure that the uniqueness of the unlock code key, improves the safety of unlock.
Fig. 7 is one embodiment schematic diagram of the method for unlocking screen in the embodiment of the present application, comprising:
701, unlocking pin is arranged in first terminal.
In the embodiment of the present application, first terminal supports setting unlocking pin, and the screen lock state of first terminal can be released with the unlocking pin set, and applied unlocking pin type may include the password unlock of the types such as numerical ciphers, sliding trace, fingerprint.First terminal can be set or modify unlocking pin, specifically refer to above-mentioned Fig. 3 A- Fig. 3 C it is any shown in, details are not described herein again.
702, the second terminal that first terminal setting has connected with first terminal is trust unlocker device.
In the embodiment of the present application, first terminal takes the mobile phone as an example, second terminal is illustrated by taking smartwatch as an example.Fig. 8 A The schematic diagram for centering the smartwatch having connected to trust unlocker device is being set for mobile phone.In shown in Fig. 8 A, mobile phone can first establish bluetooth connection with smartwatch, then set the trust unlocker device for centering smartwatch as mobile phone.Fig. 8 B be mobile phone be arranged in smartwatch application in be arranged the smartwatch having connected be trust unlocker device schematic diagram.In shown in Fig. 8 B, the APP of smartwatch is installed on mobile phone, user can open the application for the smartwatch installed on mobile phone, and setting smartwatch is the trust unlocker device of mobile phone.
Alternatively, the trust unlocker device that the smartwatch having connected with mobile phone is mobile phone can be set in the unlocking pin of initial setting up mobile phone;Alternatively, being also possible to be already provided with unlocking pin in mobile phone, after a period of time, user considers actual demand, can be again introduced into set interface, and the smartwatch that setting and mobile phone have connected is the trust unlocker device of mobile phone.
It should be understood that being had connected with first terminal here, can refer to first terminal connect with second terminal bluetooth or the scenes such as USB is being connected or first terminal and second terminal before bluetooth connection cross or USB such as connected at the scenes before.It is selectable, first terminal sets second terminal to after trusting unlocker device, can send an instruction information to second terminal, which includes the Bluetooth address of first terminal, the unlocker device that the instruction information is used to inform second terminal as first terminal, can unlock first terminal.
It is selectable, when the second terminal that first terminal setting has connected with first terminal is trusts unlocker device, the first unlocking pin of first terminal can also be sent to second terminal.
It should be noted that each equipment bluetooth-capable has a Bluetooth address.When mobile phone and other terminals establish bluetooth connection, mobile phone can save the Bluetooth address of each terminal, if mobile phone is set as one or more terminal that bluetooth connection has been established to trust unlocker device, mobile phone corresponding can save a mark or instruction information.As shown in table 1 below, whether mobile phone preservation and the mobile phone establish the Bluetooth address of the equipment of bluetooth connection and are the example information for trusting unlocker device.
The Bluetooth address of connected device It whether is to trust unlocker device
EB:F3:AC:F6:E9:17 It is
FC:F5:EC:E6:R9:50 It is no
AM:E5:BC:N6:R7:35 It is no
Table 1
It is selectable, it can also be including corresponding device type, such as mobile phone, bracelet, notebook, herein without limitation in table 1.
703, first terminal obtains unlocking information.
In the embodiment of the present application, the unlocking information that first terminal obtains can be the unlocking request sent from first terminal to second terminal, the unlocking information that second terminal is sent according to unlocking request to first terminal, it is also possible to the unlocking information actively sent from second terminal to first terminal, does not need first terminal and send unlocking request.
Wherein, unlocking request is sent to second terminal about first terminal, including but not limited to following several implementations:
(1) first terminal is in the state of the lock screen, respond the unlock operation of user's input, it can be according to above-mentioned table 1, the trust unlocker device for being determined as first terminal is second terminal, unlocking request (can refer to shown in Fig. 4 C) is sent to second terminal, second terminal feedback feeds back unlocking information according to unlocking request.
(2) in the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, first terminal sends unlocking request (can refer to shown in Fig. 4 A) from trend second terminal to first terminal.
(3) in the state of the lock screen, if unlock failure, the unlock operation of response user's input sends unlocking request (can refer to shown in Fig. 4 B) to second terminal to first terminal.
(4) first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, then the first prompt information is presented in first terminal, first prompt information sends unlocking request to second terminal for prompting the user whether, first terminal obtains operation of the user based on the first prompt information, sends unlocking request to second terminal.
(5) in the state of the lock screen, if detecting second terminal in presetting range, first terminal sends unlocking request to second terminal to first terminal.
(6) in the state of the lock screen, if detecting in presetting range, the duration of second terminal is greater than or equal to the second preset threshold value to first terminal, and first terminal sends unlocking request to second terminal.
(7) in the state of the lock screen, the second prompt information is presented in first terminal, and the second prompt information includes the contact method of at least two contact persons, the contact person that the second prompt information is used to that user to be prompted to select unlocking request to be sent;First terminal obtains the selection operation of user's input;If contact person is artificially preset in the connection that selection operation is directed to, first terminal sends unlocking request to second terminal, and second terminal is terminal corresponding with default contact person;If the contact person that selection operation is directed to is not default contact person, first terminal triggers warning note.
It should be understood that, it include the Bluetooth address of first terminal in above-mentioned unlocking request, when second terminal can be authenticated whether establish trust unlocker device with first terminal, the Bluetooth address for including in the instruction information sent to second terminal is identical, if they are the same, then second terminal to first terminal send unlocking information.
Second terminal sends unlocking information to first terminal, can also include:
(1) second terminal receives the unlock operation of user's input, sends unlocking information to first terminal.Such as: Fig. 8 C is the schematic diagram that smartwatch sends unlocking information to mobile phone.It should be understood that unlock mark is the mark that can unlock mobile phone in shown in Fig. 8 C, user clicks unlock mark, and second terminal responds the clicking operation of user, pops up a prompt information, reaffirms whether to mobile phone send unlocking information to user.If user selects "Yes", second terminal sends unlocking information to first terminal;First terminal in the state of the lock screen, receives unlocking information.First terminal receive unlocking information when, can according to above-mentioned table 1 determine second terminal whether be first terminal setting the trust unlocker device having connected, if so, first terminal is unlocked using unlocking information.
(2) if second terminal detects first terminal in presetting range, second terminal sends unlocking information to first terminal.
(3) if second terminal detects that the duration of first terminal is greater than preset threshold value in presetting range, second terminal sends unlocking information to first terminal.
Such as: schematic diagram of Fig. 8 D for the distance of mobile phone and smartwatch within a preset range.In shown in Fig. 8 D, second terminal detects first terminal in pre-determined distance range (L), or detects that the duration of first terminal reaches preset threshold value, sends unlocking information to first terminal, first terminal in the state of the lock screen, receives unlocking information;First terminal receive unlocking information when, can according to above-mentioned table 1 determine second terminal whether be first terminal setting the trust unlocker device having connected, if so, first terminal is unlocked using unlocking information.
Or, first terminal is in the state of the lock screen, second terminal is detected in preset range (L), or detect that the duration of second terminal reaches preset threshold value, it can be according to above-mentioned table 1, the trust unlocker device for being determined as first terminal is second terminal, sends unlocking request to second terminal, second terminal feeds back unlocking information according to unlocking request.
Selectable, unlocking information may include the first unlocking pin of first terminal, and the first unlocking pin is for unlocking first Terminal;Alternatively, unlocking information may include the first unlocking pin of first terminal, screen-lock password set interface is shown again after unlocking first terminal, which is used to reset unlocking pin for user;Alternatively, unlocking information is used for the first unlocking pin of Compulsory Removal first terminal, i.e., the unlocking pin of first terminal is disposed, into operation interface;Alternatively, unlocking information, for showing screen-lock password set interface again after the first unlocking pin of Compulsory Removal first terminal, which is used to reset the second unlocking pin for user.
It should be noted that first terminal sends unlocking request to second terminal, alternatively, first terminal and second terminal are the states connected in bluetooth when second terminal sends unlocking information to first terminal.
704, first terminal responds unlocking information, executes the relevant operation for releasing screen lock state.
In the embodiment of the present application, first terminal responds unlocking information, executes the relevant operation for releasing screen lock state, can include but is not limited to following several implementations:
(1) if unlocking information includes the first unlocking pin of first terminal, the unlock of the first unlocking pin is can be used in first terminal.It specifically refers to shown in above-mentioned Fig. 4 E, details are not described herein again.
(2) if unlocking information includes the first unlocking pin of first terminal and the instruction information for reseting unlocking pin, first terminal can be used after unlocking information unlocks and show screen-lock password set interface, and user can reset the second unlocking pin.It specifically refers to shown in above-mentioned Fig. 4 F, details are not described herein again.
(3) if unlocking information includes the instruction information for removing unlocking pin, first terminal can be used unlocking information and remove the first unlocking pin.It specifically refers to shown in above-mentioned Fig. 4 G, details are not described herein again.
(4) if unlocking information includes the instruction information for removing unlocking pin and the instruction information for reseting unlocking pin, so first terminal can be used unlocking information remove the first unlocking pin after and show screen-lock password set interface, user can reset the second unlocking pin.It specifically refers to shown in above-mentioned Fig. 4 H, details are not described herein again.
It should be noted that whether can be that the equipment for having connected and being set as to trust unlock can just unlock if be proved to be successful with identification intelligent wrist-watch after first terminal receives unlocking information;Or password is reseted after unlock or removes password or resets password after removing password.It can also include the Bluetooth address of second terminal i.e. in unlocking information.
Fig. 8 E is that the schematic diagram whether unlocked by smartwatch is shown on first terminal.It should be understood that, the unlocking information that second terminal is sent to first terminal, it can not be by first terminal activly request, in this case, as illustrated in fig. 8e, when first terminal receives unlocking information, one prompt information of user can be given, such as " whether passing through smartwatch unlock " etc. similar informations prompt, it is ensured that the safety of first terminal user information.
In the embodiment of the present application, user forgets to be unlocked by the trust unlocker device that the terminal had connected when unlocking pin.To forget that unlocking pin provides a kind of feasible scheme, the user data without removing in terminal can remove unlocking pin or reset unlocking pin after removing unlocking pin;Terminal (such as bracelet, smartwatch) unlock that the application is had connected by authorization, can safely and effectively solve the problems, such as that user forgets the unlocking pin of terminal.
In one possible implementation, first terminal is under black state, if receiving the unlocking information that second terminal is sent, unlocking information includes the unique identifier and unlocking pin of first terminal, and unlocking pin is used to release the screen lock state of first terminal;The unlocking information that first terminal can be sent in response to receiving second terminal, first terminal light screen, into screen lock state, locking screen interface are presented, fills unlocking pin automatically on locking screen interface;First terminal releases screen lock state.
In the embodiment of the present application, black state is the state that screen is not lit or does not power on.After first terminal receives the unlocking information that second terminal is sent, the unlocking information that first terminal is sent in response to receiving the second terminal lights screen Curtain is presented locking screen interface, fills the unlocking pin automatically on the locking screen interface, release the screen lock state into screen lock state.It is also possible to the unlocking information that first terminal is sent in response to receiving the second terminal, lights screen, into screen lock state, locking screen interface is presented, user is manually entered unlocking pin according to the prompt in unlocking information to release the screen lock state of first terminal.
In one possible implementation, if first terminal detects second terminal in pre-determined distance range (such as 5cm), first terminal sends unlocking request to second terminal, the screen lock state that unlocking request is used to that second terminal to be requested to release first terminal, the first request include the unique identifier of first terminal and the unique identifier of second terminal;First terminal receives the unlocking information that second terminal is sent, and unlocking information is response of the second terminal to unlocking request, and unlocking information includes the unique identifier and unlocking pin of second terminal, and unlocking pin is used to release the screen lock state of first terminal;In response to receiving unlocking information, locking screen interface is presented in first terminal, fills unlocking pin automatically on locking screen interface, releases screen lock state.
In the embodiment of the present application, if the first terminal detects second terminal within the scope of pre-determined distance, then the first terminal sends unlocking request to the second terminal, receive the unlocking information that second terminal is sent, in response to receiving the unlocking information, locking screen interface is presented in the first terminal, fills the unlocking pin automatically on locking screen interface, releases the screen lock state.It is also possible to the unlocking information that first terminal is sent in response to receiving the second terminal, locking screen interface is presented, user is manually entered unlocking pin according to the prompt in unlocking information to release the screen lock state of first terminal.
It is selectable, if first terminal monitors second terminal within the scope of pre-determined distance, first terminal sends unlocking request from trend second terminal, if may include: that first terminal detects second terminal within the scope of pre-determined distance, and duration of the second terminal within the scope of pre-determined distance be greater than preset time threshold when, first terminal to second terminal send unlocking request.
It is understood that all in this application example and Detailed description of the invention, are intended merely to the technical solution of clearer expression the application, do not constitute the restriction to the application protection scope.
Fig. 9 is one embodiment schematic diagram of terminal in the embodiment of the present application, comprising:
Sending module 901 is used for, first terminal is in the state of the lock screen, unlocking request is sent to second terminal, unlocking request includes the unique identifier of first terminal and the unique identifier of second terminal, the unique identifier of first terminal is used for unique identification first terminal, and the unique identifier of second terminal is used for unique identification second terminal;
Receiving module 902 is used for, and receives the unlocking information that second terminal is sent, and unlocking information is response of the second terminal to unlocking request;
Unlocked state 903 is used for, and responds unlocking information, executes the relevant operation for releasing screen lock state.
Figure 10 is another embodiment schematic diagram of terminal in the embodiment of the present application, comprising:
Receiving module 1001 is used for, and receives the unlocking request that first terminal is sent, and unlocking request includes the unique identifier of first terminal, and the unique identifier of first terminal is used for unique identification first terminal;
Sending module 1002 is used for, if the unique identifier of first terminal is identical as the unique identifier that second terminal pre-saves, sends unlocking information to first terminal, unlocking information is used to execute the relevant operation for the screen lock state for releasing first terminal.
Terminal as shown in Figure 9 and Figure 10 can be used for executing method shown in Fig. 2, and identical or corresponding technical characteristic can be quoted mutually, and this will not be repeated here.
Figure 11 is another embodiment schematic diagram of terminal in the embodiment of the present application, comprising:
It opens module 1101 to be used for, in the state of the lock screen, barcode scanning application is opened in the operation of response user's input;
It releases module 1102 to be used for, is operated in response to the barcode scanning of barcode scanning application, release screen lock state.
Terminal as shown in figure 11 can be used for executing method shown in fig. 5, and identical or corresponding technical characteristic can be quoted mutually, and this will not be repeated here.
Figure 12 is another embodiment schematic diagram of terminal in the embodiment of the present application, comprising:
Receiving module 1201 is used for, and first terminal in the state of the lock screen, receives the unlocking information that second terminal is sent, and second terminal is that the terminal of communication connection was established with first terminal;
Unlocked state 1202 is used for, and the first unlocking pin of first terminal is removed according to unlocking information, alternatively, the first unlocking pin for including according to unlocking information, releases the screen lock state of first terminal.
Terminal as shown in figure 12 can be used for executing method shown in Fig. 7, and identical or corresponding technical characteristic can be quoted mutually, and this will not be repeated here.
Figure 13 is another embodiment schematic diagram of terminal in the embodiment of the present application, comprising:
Receiving module 1301 is used for, and first terminal receives the unlocking information that second terminal is sent under black state, and unlocking information includes the unique identifier and unlocking pin of first terminal, and unlocking pin is used to release the screen lock state of first terminal;
Display module 1302 is used for, and the unlocking information sent in response to receiving second terminal, first terminal lights screen, into screen lock state, locking screen interface is presented, fills unlocking pin automatically on locking screen interface;
Unlocked state 1303 is used for, and releases screen lock state.
Figure 14 is another embodiment schematic diagram of terminal in the embodiment of the present application, comprising:
Sending module 1401 is used for, if first terminal detects second terminal within the scope of pre-determined distance, unlocking request is sent to second terminal, the screen lock state that unlocking request is used to that second terminal to be requested to release first terminal, the first request include the unique identifier of first terminal and the unique identifier of second terminal;
Receiving module 1402 is used for, and receives the unlocking information that second terminal is sent, and unlocking information is response of the second terminal to unlocking request, and unlocking information includes the unique identifier and unlocking pin of second terminal, and unlocking pin is used to release the screen lock state of first terminal;
Display module 1403 is used for, and in response to receiving unlocking information, locking screen interface is presented in first terminal;
Unlocked state 1404 is used for, and fills unlocking pin automatically on locking screen interface, releases screen lock state.
Optionally, in some embodiments of the present application,
Sending module 1401 is specifically used for, if first terminal detect second terminal within the scope of pre-determined distance, and duration of the second terminal within the scope of pre-determined distance be greater than preset time threshold when, to second terminal send unlocking request.
The embodiment of the present application also provides a kind of embodiment schematic diagrams of terminal, as shown in figure 15, for ease of description, illustrate only part relevant to the embodiment of the present application, disclosed by specific technical details, please refer to the embodiment of the present application method part.Specifically can include: terminal as shown in figure 15 can be used for executing Fig. 2, Fig. 5 or method shown in Fig. 7, and identical or corresponding technical characteristic can be quoted mutually, and this will not be repeated here.The terminal may include any terminal devices such as mobile phone, tablet computer, personal digital assistant (personal digital assistant, PDA), point-of-sale terminal (point of sales, POS), vehicle-mounted computer.Taking the terminal as an example:
Figure 15 shows the block diagram of the part-structure of mobile phone relevant to terminal provided by the embodiments of the present application.With reference to Figure 15, mobile phone includes: radio frequency (Radio Frequency, RF) the components such as circuit 1510, memory 1520, input unit 1530, display unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, WiFi) module 1570, processor 1580 and power supply 1590.It will be understood by those skilled in the art that handset structure shown in Figure 15 The restriction to mobile phone is not constituted, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
It is specifically introduced below with reference to each component parts of the Figure 15 to mobile phone:
RF circuit 1510 can be used for receiving and sending messages or communication process in, signal sends and receivees, and particularly, after the downlink information of base station is received, handles to processor 1580;In addition, the data for designing uplink are sent to base station.In general, RF circuit 1510 includes but is not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 1510 can also be communicated with network and other equipment by wireless communication.
Memory 1520 can be used for storing software program and module, and processor 1580 is stored in the software program and module of memory 1520 by operation, thereby executing the various function application and data processing of mobile phone.Memory 1520 can mainly include storing program area and storage data area, wherein storing program area can application program (such as sound-playing function, image player function etc.) needed for storage program area, at least one function etc.;Storage data area, which can be stored, uses created data (such as audio data, phone directory etc.) etc. according to mobile phone.In addition, memory 1520 may include high-speed random access memory, it can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Input unit 1530 can be used for receiving the number or character information of input, and generate key signals input related with the user setting of mobile phone and function control.Specifically, input unit 1530 may include touch panel 1531 and other input equipments 1532.Touch panel 1531, also referred to as touch screen, the touch operation (for example user uses the operations of any suitable object or attachment on touch panel 1531 or near touch panel 1531 such as finger, stylus) of collectable user on it or nearby, and corresponding attachment device is driven according to preset formula.Optionally, touch panel 1531 may include both touch detecting apparatus and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, then gives processor 1580, and can receive order that processor 1580 is sent and be executed.Furthermore, it is possible to realize touch panel 1531 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel 1531, input unit 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include but is not limited to one of physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. or a variety of.
Display unit 1540 can be used for showing information input by user or be supplied to the information of user and the various menus of mobile phone.Display unit 1540 may include display panel 1541, optionally, display panel 1541 can be configured using the forms such as liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED).Further, touch panel 1531 can cover display panel 1541, after touch panel 1531 detects touch operation on it or nearby, processor 1580 is sent to determine the type of touch event, device 1580 is followed by subsequent processing according to the type of touch event and corresponding visual output is provided on display panel 1541.Although in Figure 15, touch panel 1531 and display panel 1541 are the input and input function for realizing mobile phone as two independent components, but it is in some embodiments it is possible to touch panel 1531 and display panel 1541 is integrated and that realizes mobile phone output and input function.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 1541, proximity sensor can close display panel 1541 and/or backlight when mobile phone is moved in one's ear.As a kind of motion sensor, accelerometer sensor can detect the size of (generally three axis) acceleration in all directions, size and the direction that can detect that gravity when static can be used to identify application (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) of mobile phone posture etc.;The other sensors such as the gyroscope, barometer, hygrometer, thermometer, the infrared sensor that can also configure as mobile phone, details are not described herein.
Voicefrequency circuit 1560, loudspeaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Electric signal after the audio data received conversion can be transferred to loudspeaker 1561 by voicefrequency circuit 1560, be converted to voice signal output by loudspeaker 1561;On the other hand, the voice signal of collection is converted to electric signal by microphone 1562, audio data is converted to after being received by voicefrequency circuit 1560, it again will be after the processing of audio data output processor 1580, through RF circuit 1510 to be sent to such as another mobile phone, or audio data exported to memory 1520 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user to send and receive e-mail by WiFi module 1570, browse webpage and access streaming video etc., it provides wireless broadband internet for user and accesses.Although Figure 15 shows WiFi module 1570, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need within the scope of not changing the essence of the invention and omit completely.
Processor 1580 is the control centre of mobile phone, utilize the various pieces of various interfaces and connection whole mobile phone, by running or executing the software program and/or module that are stored in memory 1520, and call the data being stored in memory 1520, the various functions and processing data for executing mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 1580 may include one or more processing units;Preferably, processor 1580 can integrate application processor and modem processor, wherein the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 1580.
Mobile phone further includes the power supply 1590 (such as battery) powered to all parts, preferably, power supply can be logically contiguous by power-supply management system and processor 1580, to realize the functions such as management charging, electric discharge and power managed by power-supply management system.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In above method embodiment the structure of terminal can be based on structure shown in figure 15, terminal structure shown in figure 15 can it is corresponding execute above method embodiment in step, no longer repeat one by one herein.
In the above-described embodiments, it can be realized wholly or partly by software, hardware, firmware or any combination thereof.When implemented in software, it can entirely or partly realize in the form of a computer program product.
The computer program product includes one or more computer instructions.When loading on computers and executing the computer program instructions, entirely or partly generate according to process or function described in the embodiment of the present application.The computer can be general purpose computer, special purpose computer, computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or it is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction can be transmitted from a web-site, computer, server or data center by wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or data center.The computer readable storage medium can be any usable medium that computer can store or include the numbers such as one or more usable mediums integrated server, data center According to storage equipment.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
The description and claims of this application and the (if present)s such as term " first " in above-mentioned attached drawing, " second ", " third ", " the 4th " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that the data used in this way are interchangeable under appropriate circumstances, so that the embodiments described herein can be implemented with the sequence other than the content for illustrating or describing herein.Furthermore, term " includes " and " having " and their any deformation, it is intended to cover and non-exclusive includes, such as, the process, method, system, product or equipment for containing a series of steps or units those of are not necessarily limited to be clearly listed step or unit, but may include other step or units being not clearly listed or intrinsic for these process, methods, product or equipment.

Claims (88)

  1. A kind of method of unlocking screen characterized by comprising
    First terminal is in the state of the lock screen, unlocking request is sent to second terminal, the unlocking request includes the unique identifier of the first terminal and the unique identifier of the second terminal, the unique identifier of the first terminal is for first terminal described in unique identification, and the unique identifier of the second terminal is for second terminal described in unique identification;
    The first terminal receives the unlocking information that the second terminal is sent, and the unlocking information is response of the second terminal to the unlocking request;
    The first terminal responds the unlocking information, executes the relevant operation for releasing the screen lock state.
  2. The method according to claim 1, wherein the unlocking information further includes the first unlocking pin of the first terminal;The first terminal responds the unlocking information, executes the relevant operation for releasing the screen lock state, comprising:
    The first terminal responds first unlocking pin in the unlocking information, releases the screen lock state.
  3. The method according to claim 1, wherein the first terminal responds the unlocking information, the relevant operation for releasing the screen lock state is executed, comprising:
    The first terminal responds the first unlocking pin that the unlocking information removes the first terminal, so that the first terminal releases the screen lock state;First unlocking pin is the password for releasing the screen lock state of the first terminal.
  4. According to the method in claim 2 or 3, which is characterized in that after the first terminal releases the screen lock state, the method also includes:
    The first terminal, which is shown, resets unlocking pin interface;
    The operation of the setting unlocking pin of first terminal response user's input, resets the unlocking pin of the first terminal.
  5. Method according to claim 1 to 4, which is characterized in that the first terminal sends unlocking request in the state of the lock screen, to second terminal, comprising:
    In the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, the first terminal sends unlocking request from second terminal described in trend to the first terminal;Alternatively,
    In the state of the lock screen, the unlock operation of response user's input, Xiang Suoshu first terminal sends unlocking request to the first terminal;Alternatively,
    The first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, then the first prompt information is presented in the first terminal, first prompt information sends the unlocking request to the second terminal for prompting the user whether, the first terminal obtains operation of the user based on first prompt information, and Xiang Suoshu second terminal sends unlocking request;Alternatively,
    The first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, the first terminal sends unlocking request to the second terminal.
  6. Method according to claim 1 to 4, which is characterized in that the first terminal sends unlocking request in the state of the lock screen, to second terminal, comprising:
    In the state of the lock screen, the second prompt information is presented in the first terminal, and second prompt information includes the contact method of at least two contact persons, the contact person that second prompt information is used to that user to be prompted to select unlocking request to be sent;
    The first terminal obtains the selection operation of user's input;
    If contact person is artificially preset in the connection that the selection operation is directed to, the first terminal sends unlocking request to second terminal, and the second terminal is terminal corresponding with the default contact person;
    If the contact person that the selection operation is directed to is not default contact person, the first terminal triggers warning note.
  7. - 6 any method according to claim 1, which is characterized in that before the first terminal sends unlocking request to second terminal, the method also includes:
    The first terminal obtains the unique identifier of the first terminal and the unique identifier of the second terminal;
    The first terminal sends certification request to the second terminal, and the certification request is used for the relevant operation for requesting the second terminal with the screen lock state for meaning the first terminal execution releasing first terminal;It include the unique identifier of the first terminal in the certification request;
    The first terminal receives the authentication response that the second terminal is sent, and the authentication response is response of the second terminal to the certification request.
  8. The method according to the description of claim 7 is characterized in that the certification request further includes the first unlocking pin of the first terminal.
  9. A kind of method of unlocking screen characterized by comprising
    Second terminal receives the unlocking request that first terminal is sent, and the unlocking request includes the unique identifier of the first terminal, and the unique identifier of the first terminal is for first terminal described in unique identification;
    If the unique identifier of the first terminal is identical as the unique identifier that the second terminal pre-saves, then the second terminal sends unlocking information to the first terminal, and the unlocking information is used to execute the relevant operation for the screen lock state for releasing the first terminal.
  10. According to the method described in claim 9, it is characterized in that, the second terminal to the first terminal send unlocking information before, the method also includes:
    Obtain the authentication information of user's input;
    The second terminal sends unlocking information to the first terminal, comprising:
    If the authentication information of user's input matches with preset authentication information, the second terminal sends the unlocking information to the first terminal.
  11. Method according to claim 9 or 10, which is characterized in that the unlocking information further includes the first unlocking pin of the first terminal, and first unlocking pin releases the screen lock state of the first terminal for the first terminal;Or, the unlocking information, which is used to indicate the first terminal, removes the first unlocking pin, so that the first terminal releases the screen lock state.
  12. According to any method of claim 9-11, which is characterized in that before the second terminal sends unlocking information to the first terminal, the method also includes:
    Prompt information is presented in the second terminal, and the prompt information sends unlocking information to the first terminal for prompting the user whether;
    The second terminal sends unlocking information to the first terminal, comprising:
    The second terminal obtains operation of the user based on the prompt information, and Xiang Suoshu first terminal sends the unlocking information.
  13. According to any method of claim 9-12, which is characterized in that after the second terminal sends unlocking information to the first terminal, the method also includes:
    The second terminal receives the second unlocking pin that the first terminal is sent, and second unlocking pin is the unlocking pin after the first terminal is reset.
  14. A kind of method of unlocking screen characterized by comprising
    In the state of the lock screen, barcode scanning application is opened in the operation of response user's input to first terminal;
    The first terminal is operated in response to the barcode scanning that the barcode scanning is applied, and releases the screen lock state.
  15. According to the method for claim 14, which is characterized in that the object of the barcode scanning operation is scan code;The first terminal is operated in response to the barcode scanning that the barcode scanning is applied, and releases the screen lock state, comprising:
    The first terminal is operated in response to the barcode scanning that the barcode scanning is applied, if the information of scan code carrying matches with preset information, releases the screen lock state;
    The method also includes:
    If the information and preset information of the scan code carrying mismatch, prompt information is presented in the first terminal.
  16. Method according to claim 14 or 15, which is characterized in that the object of the barcode scanning operation is scan code;
    The information of the scan code carrying includes the unique identifier of the first terminal and the unlocking pin of the first terminal, and the unique identifier of the first terminal is for first terminal described in unique identification;Alternatively,
    The information of the scan code carrying includes the unlocking pin of user identifier and the first terminal, user of the user identifier for first terminal described in unique identification;Alternatively,
    The information of the scan code carrying includes the unlocking pin of unique knowledge identification code of the first terminal, the user identifier and the first terminal.
  17. Any method of 4-16 according to claim 1, which is characterized in that before the first terminal releases the screen lock state, the method also includes:
    The first terminal obtains the authentication information of user's input;
    If the authentication information and preset authentication information of user's input mismatch, warning note is presented in the first terminal;
    The first terminal releases the screen lock state, comprising:
    If the authentication information of user's input is matched with preset authentication information, the first terminal releases the screen lock state.
  18. Any method of 4-17 according to claim 1, which is characterized in that after the first terminal releases the screen lock state, the method also includes:
    The first terminal, which is shown, resets unlocking pin interface;
    Password Operations are reseted in first terminal response user's input, and the second unlocking pin is arranged.
  19. Any method of 4-18 according to claim 1, which is characterized in that the first terminal in the state of the lock screen, opens barcode scanning application, comprising:
    In the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, the first terminal opens the barcode scanning application to the first terminal;
    Alternatively,
    In the state of the lock screen, the opening operation of response user's input opens the barcode scanning application to the first terminal;
    Alternatively,
    In the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, the first terminal presentation user prompt information, user's prompt information is for prompting the user whether to open the barcode scanning application for the first terminal;The first terminal obtains operation of the user based on user's prompt information, opens the barcode scanning application;
    Alternatively,
    The first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, the first terminal opens the barcode scanning application.
  20. Any method of 4-19 according to claim 1, which is characterized in that the first terminal in the state of the lock screen, before opening barcode scanning application, the method also includes:
    The first terminal generates the first scan code;
    The first terminal sends first scan code to second terminal, alternatively, the first terminal sends first scan code to server.
  21. According to the method for claim 20, which is characterized in that the method also includes:
    If the first unlocking pin of the first terminal changes, the first terminal generates the second scan code according to the unique identifier of the first unlocking pin and the first terminal after change;Alternatively,
    The first terminal regularly updates first scan code, generates third scan code.
  22. A kind of method of unlocking screen characterized by comprising
    First terminal in the state of the lock screen, receives the unlocking information that the second terminal is sent, and the second terminal is that the terminal of communication connection was established with the first terminal;
    The first terminal removes the first unlocking pin of the first terminal according to the unlocking information, alternatively, the first unlocking pin for including according to the unlocking information, releases the screen lock state of the first terminal.
  23. According to the method for claim 22, which is characterized in that the method also includes:
    The first terminal, which is shown, resets unlocking pin interface;
    The operation for resetting unlocking pin of first terminal response user's input, resets the second unlocking pin of the first terminal.
  24. The method according to claim 22 or 23, which is characterized in that the first terminal in the state of the lock screen, before receiving the unlocking information that the second terminal is sent, comprising:
    In the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, the first terminal sends unlocking request from second terminal described in trend to the first terminal;Alternatively,
    In the state of the lock screen, the unlock operation of response user's input, Xiang Suoshu first terminal sends unlocking request to the first terminal;Alternatively,
    The first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, then the first prompt information is presented in the first terminal, first prompt information sends the unlocking request to the second terminal for prompting the user whether, the first terminal obtains operation of the user based on first prompt information, and Xiang Suoshu second terminal sends unlocking request;Alternatively,
    The first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, the first terminal sends unlocking request to the second terminal;Alternatively,
    In the state of the lock screen, if detecting the second terminal in presetting range, the first terminal sends the unlocking request to the second terminal to the first terminal;Alternatively,
    In the state of the lock screen, if detecting in presetting range, the duration of the second terminal is greater than or equal to the second preset threshold value to the first terminal, and the first terminal sends the unlocking request to the second terminal.
  25. The method according to claim 22 or 23, which is characterized in that the first terminal in the state of the lock screen, before receiving the unlocking information that the second terminal is sent, comprising:
    In the state of the lock screen, the second prompt information is presented in the first terminal, and second prompt information includes the contact method of at least two contact persons, the contact person that second prompt information is used to that user to be prompted to select unlocking request to be sent;
    The first terminal obtains the selection operation of user's input;
    If contact person is artificially preset in the connection that the selection operation is directed to, the first terminal sends unlocking request to second terminal, and the second terminal is terminal corresponding with the default contact person;
    If the contact person that the selection operation is directed to is not default contact person, the first terminal triggers warning note.
  26. A kind of method of unlocking screen, which is characterized in that the described method includes:
    First terminal receives the unlocking information that second terminal is sent under black state, and the unlocking information includes the unique identifier and unlocking pin of the first terminal, and the unlocking pin is used to release the screen lock state of the first terminal;
    The unlocking information sent in response to receiving the second terminal, the first terminal light screen, into screen lock state, locking screen interface are presented, fills the unlocking pin automatically on the locking screen interface;
    The first terminal releases the screen lock state.
  27. A kind of method of unlocking screen, which is characterized in that the described method includes:
    If the first terminal detects second terminal within the scope of pre-determined distance, the first terminal sends unlocking request to the second terminal, the screen lock state that the unlocking request is used to that the second terminal to be requested to release the first terminal, first request includes the unique identifier of the first terminal and the unique identifier of the second terminal;
    The first terminal receives the unlocking information that the second terminal is sent, the unlocking information is response of the second terminal to the unlocking request, the unlocking information includes the unique identifier and unlocking pin of the second terminal, and the unlocking pin is used to release the screen lock state of the first terminal;
    In response to receiving the unlocking information, the first terminal is presented locking screen interface, fills the unlocking pin automatically on locking screen interface, release the screen lock state.
  28. According to the method for claim 27, which is characterized in that if the first terminal monitors second terminal within the scope of pre-determined distance, the first terminal sends unlocking request from second terminal described in trend, comprising:
    If the first terminal detect second terminal within the scope of pre-determined distance, and duration of the second terminal within the scope of pre-determined distance be greater than preset time threshold when, the first terminal to the second terminal send unlocking request.
  29. A kind of terminal characterized by comprising
    Transmitter, receiver and processor, the transmitter, the receiver and the processor are connected by bus;
    The transmitter is used for, first terminal is in the state of the lock screen, unlocking request is sent to second terminal, the unlocking request includes the unique identifier of the first terminal and the unique identifier of the second terminal, the unique identifier of the first terminal is for first terminal described in unique identification, and the unique identifier of the second terminal is for second terminal described in unique identification;
    The receiver is used for, and receives the unlocking information that the second terminal is sent, and the unlocking information is the second terminal Response to the unlocking request;
    The processor executes the relevant operation for releasing the screen lock state for responding the unlocking information.
  30. Terminal according to claim 29, which is characterized in that the unlocking information further includes the first unlocking pin of the first terminal;
    The processor is specifically used for, and responds first unlocking pin in the unlocking information, releases the screen lock state.
  31. Terminal according to claim 29, which is characterized in that
    The processor is specifically used for, and responds the first unlocking pin that the unlocking information removes the first terminal, so that the first terminal releases the screen lock state;First unlocking pin is the password for releasing the screen lock state of the first terminal.
  32. The terminal according to claim 30 or 31, which is characterized in that the terminal further includes output equipment and input equipment,
    The output equipment is used for, and unlocking pin interface is reseted in display;
    The input equipment is used for, the operation of the setting unlocking pin of response user's input;
    The processor is also used to, and resets the unlocking pin of the first terminal.
  33. According to any terminal of claim 29-32, which is characterized in that the terminal further includes input equipment and output equipment,
    The transmitter is specifically used for, and the first terminal in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, sends unlocking request from second terminal described in trend;Alternatively,
    The transmitter is specifically used for, and in the state of the lock screen, the unlock operation of response user's input, Xiang Suoshu first terminal sends unlocking request to the first terminal;Alternatively,
    The output equipment is used for, and in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, the first prompt information is presented in the first terminal, and first prompt information sends the unlocking request to the second terminal for prompting the user whether,
    The transmitter is specifically used for, and obtains operation of the user based on first prompt information, and Xiang Suoshu second terminal sends unlocking request;Alternatively,
    The input equipment is used for, and the first terminal in the state of the lock screen, obtains the authentication information of user's input;
    The transmitter is specifically used for, if the authentication information of user input matches with preset authentication information, sends unlocking request to the second terminal.
  34. According to any terminal of claim 29-32, which is characterized in that the terminal further includes input equipment and output equipment,
    The output equipment is used for, and in the state of the lock screen, the second prompt information is presented in the first terminal, and second prompt information includes the contact method of at least two contact persons, the contact person that second prompt information is used to that user to be prompted to select unlocking request to be sent;
    The input equipment is used for, and obtains the selection operation of user's input;
    The transmitter is also used to, if contact person is artificially preset in the connection that is directed to of the selection operation, sends unlocking request to second terminal, and the second terminal is terminal corresponding with the default contact person;
    The output equipment is also used to, if the contact person that the selection operation is directed to is not default contact person, is triggered alarm and is mentioned Show.
  35. According to any terminal of claim 29-34, which is characterized in that
    The processor is also used to, and obtains the unique identifier of the first terminal and the unique identifier of the second terminal;
    The transmitter is also used to, and Xiang Suoshu second terminal sends certification request, and the certification request is used for the relevant operation for requesting the second terminal with the screen lock state for meaning the first terminal execution releasing first terminal;It include the unique identifier of the first terminal in the certification request;
    The receiver is also used to, and receives the authentication response that the second terminal is sent, and the authentication response is response of the second terminal to the certification request.
  36. Terminal according to claim 35, which is characterized in that the certification request further includes the first unlocking pin of the first terminal.
  37. A kind of terminal characterized by comprising
    Processor and receiver, the processor and the receiver are connected by bus;
    The receiver is used for, and receives the unlocking request that first terminal is sent, and the unlocking request includes the unique identifier of the first terminal, and the unique identifier of the first terminal is for first terminal described in unique identification;
    The processor is used for, if the unique identifier of the first terminal is identical as the unique identifier that the second terminal pre-saves, unlocking information then is sent to the first terminal, the unlocking information is used to execute the relevant operation for the screen lock state for releasing the first terminal.
  38. The terminal according to claim 37, which is characterized in that the terminal further includes input module,
    The input module is used for, and obtains the authentication information of user's input;
    The sending module is also used to, if the authentication information of user input matches with preset authentication information, sends the unlocking information to the first terminal.
  39. The terminal according to claim 37 or 38, which is characterized in that the unlocking information further includes the first unlocking pin of the first terminal, and first unlocking pin releases the screen lock state for the first terminal;Or, the unlocking information, which is used to indicate the first terminal, removes the first unlocking pin, so that the first terminal releases the screen lock state.
  40. According to any terminal of claim 37-39, which is characterized in that the terminal further includes output equipment,
    The output equipment is used for, and prompt information is presented, and the prompt information sends unlocking information to the first terminal for prompting the user whether;
    The processor is specifically used for, and obtains operation of the user based on the prompt information, and Xiang Suoshu first terminal sends the unlocking information.
  41. According to any terminal of claim 37-40, which is characterized in that
    The receiver is also used to, and receives the second unlocking pin that the first terminal is sent, and second unlocking pin is the unlocking pin after the first terminal is reset.
  42. A kind of terminal characterized by comprising
    Input equipment and processor, the input equipment and the processor are connected by bus;
    The input equipment is used for, and in the state of the lock screen, barcode scanning application is opened in the operation of response user's input to first terminal;
    The processor is used for, and is operated in response to the barcode scanning of barcode scanning application, is released the screen lock state.
  43. Terminal according to claim 42, which is characterized in that the terminal further includes output equipment, and the object of the barcode scanning operation is scan code;
    The processor is specifically used for, and operates in response to the barcode scanning of barcode scanning application, if the information of scan code carrying matches with preset information, releases the screen lock state;
    The processor is also used to, if the information and preset information of scan code carrying mismatch, prompt information is presented on said output device.
  44. The terminal according to claim 42 or 43, which is characterized in that the object of the barcode scanning operation is scan code;
    The information of the scan code carrying includes the unique identifier of the first terminal and the unlocking pin of the first terminal, and the unique identifier of the first terminal is for first terminal described in unique identification;Alternatively,
    The information of the scan code carrying includes the unlocking pin of user identifier and the first terminal, user of the user identifier for first terminal described in unique identification;Alternatively,
    The information of the scan code carrying includes the unlocking pin of unique knowledge identification code of the first terminal, the user identifier and the first terminal.
  45. According to any terminal of claim 42-44, which is characterized in that the terminal further includes input equipment and output equipment,
    The input equipment is used for, and obtains the authentication information of user's input;
    The processor is also used to, if the authentication information of user's input is matched with preset authentication information, the processor releases the screen lock state;
    The output equipment is used for, if the authentication information and preset authentication information of user's input mismatch, warning note is presented.
  46. According to any terminal of claim 42-45, which is characterized in that the terminal further includes output equipment,
    The output equipment is used for, and unlocking pin interface is reseted in display;
    The processor is also used to, and Password Operations are reseted in response user's input, and the second unlocking pin is arranged.
  47. According to any terminal of claim 42-46, which is characterized in that the terminal further includes output equipment and input equipment,
    The processor is specifically used for, and the first terminal in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, opens the barcode scanning application;
    Alternatively,
    The processor is specifically used for, and in the state of the lock screen, the opening operation of response user's input opens the barcode scanning application to the first terminal;
    Alternatively,
    The output equipment is also used to, and in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, presentation user's prompt information, user's prompt information is for prompting the user whether to open the barcode scanning application for the first terminal;
    The processor is specifically used for, and obtains operation of the user based on user's prompt information, opens the barcode scanning application;
    Alternatively,
    The input equipment is also used to, and the first terminal in the state of the lock screen, obtains the authentication information of user's input;
    The processor is specifically used for, if the authentication information of user input matches with preset authentication information, Open the barcode scanning application.
  48. According to any terminal of claim 42-47, which is characterized in that the terminal further includes transmitter,
    The processor is also used to, and generates the first scan code;
    The transmitter is also used to, and sends first scan code to second terminal, alternatively, sending first scan code to server.
  49. Terminal according to claim 48, which is characterized in that
    The processor is also used to, if the first unlocking pin of the first terminal changes, generates the second scan code according to the unique identifier of the first unlocking pin and the first terminal after change;Alternatively,
    The processor is also used to, and regularly updates first scan code, generates third scan code.
  50. A kind of terminal characterized by comprising
    Processor and receiver, the processor and the receiver are connected by bus;
    The receiver is used for, and first terminal in the state of the lock screen, receives the unlocking information that the second terminal is sent, and the second terminal is that the terminal of communication connection was established with the first terminal;
    The processor is used for, and the first unlocking pin of the first terminal is removed according to the unlocking information, alternatively, the first unlocking pin for including according to the unlocking information, releases the screen lock state of the first terminal.
  51. Terminal according to claim 50, which is characterized in that the terminal further includes display,
    The display is used for, and unlocking pin interface is reseted in display;
    The processor is also used to, and the operation for resetting unlocking pin of response user's input resets the second unlocking pin of the first terminal.
  52. The terminal according to claim 50 or 51, which is characterized in that the terminal further includes input equipment, output equipment and transmitter,
    The transmitter is used for, and the first terminal in the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, sends unlocking request from second terminal described in trend;Alternatively,
    The transmitter is used for, and in the state of the lock screen, the unlock operation of response user's input, Xiang Suoshu first terminal sends unlocking request to the first terminal;Alternatively,
    The output equipment is used for, the first terminal is in the state of the lock screen, if the number of unlock failure is greater than or equal to the first preset threshold value, the first prompt information is presented, first prompt information sends the unlocking request to the second terminal for prompting the user whether;
    The transmitter is used for, and obtains operation of the user based on first prompt information, and Xiang Suoshu second terminal sends unlocking request;Alternatively,
    The input equipment is used for, and the first terminal in the state of the lock screen, obtains the authentication information of user's input;
    The transmitter is used for, if the authentication information of user input matches with preset authentication information, sends unlocking request to the second terminal;Alternatively,
    The transmitter is used for, and the first terminal in the state of the lock screen, if detecting the second terminal in presetting range, sends the unlocking request to the second terminal;Alternatively,
    The transmitter is used for, and in the state of the lock screen, if detecting in presetting range, the duration of the second terminal is greater than or equal to the second preset threshold value to the first terminal, sends the unlocking request to the second terminal.
  53. The terminal according to claim 50 or 51, which is characterized in that the terminal further includes input equipment and output equipment,
    The output equipment is used for, and in the state of the lock screen, the second prompt information is presented in the first terminal, and second prompt information includes the contact method of at least two contact persons, the contact person that second prompt information is used to that user to be prompted to select unlocking request to be sent;
    The input equipment is used for, and obtains the selection operation of user's input;
    The transmitter is used for, if contact person is artificially preset in the connection that is directed to of the selection operation, sends unlocking request to second terminal, and the second terminal is terminal corresponding with the default contact person;
    The output equipment is also used to, if the contact person that the selection operation is directed to is not default contact person, triggers warning note.
  54. A kind of terminal characterized by comprising
    Processor, receiver and output equipment, the receiver, the processor and the output equipment are connected by bus;
    The receiver is used for, and first terminal receives the unlocking information that second terminal is sent under black state, and the unlocking information includes the unique identifier and unlocking pin of the first terminal, and the unlocking pin is used to release the screen lock state of the first terminal;
    The output equipment is used for, and the unlocking information sent in response to receiving the second terminal, the first terminal lights screen, into screen lock state, locking screen interface is presented on the display,
    The processor is used for, and fills the unlocking pin automatically on the locking screen interface;Release the screen lock state.
  55. A kind of terminal characterized by comprising
    Processor, receiver, transmitter and the output equipment, the processor, the receiver, the transmitter and the output equipment are connected by bus;
    The transmitter is used for, if the first terminal detects second terminal within the scope of pre-determined distance, unlocking request is sent to the second terminal, the screen lock state that the unlocking request is used to that the second terminal to be requested to release the first terminal, first request includes the unique identifier of the first terminal and the unique identifier of the second terminal;
    The receiver is used for, receive the unlocking information that the second terminal is sent, the unlocking information is response of the second terminal to the unlocking request, the unlocking information includes the unique identifier and unlocking pin of the second terminal, and the unlocking pin is used to release the screen lock state of the first terminal;
    The output equipment is used for, and in response to receiving the unlocking information, locking screen interface is presented,
    The processor is used for, and fills the unlocking pin automatically on locking screen interface, releases the screen lock state.
  56. Terminal according to claim 55, which is characterized in that
    The transmitter is specifically used for, if the first terminal detect second terminal within the scope of pre-determined distance, and duration of the second terminal within the scope of pre-determined distance be greater than preset time threshold when, then to the second terminal send unlocking request.
  57. A kind of computer readable storage medium, including instruction, when it runs at the terminal, so that terminal executes the method as described in claim 1-8 or 14-28 any one.
  58. A kind of computer readable storage medium, including instruction, when it runs at the terminal, so that terminal executes the method as described in claim 1-8 or 14-28 any one.
  59. A kind of computer readable storage medium, including instruction, when it runs at the terminal, so that terminal executes the method as described in claim 9-13 any one.
  60. A kind of computer readable storage medium, including instruction, when it runs at the terminal, so that terminal executes the method as described in claim 9-13 any one.
  61. A kind of terminal characterized by comprising
    Sending module is used for, first terminal is in the state of the lock screen, unlocking request is sent to second terminal, the unlocking request includes the unique identifier of the first terminal and the unique identifier of the second terminal, the unique identifier of the first terminal is for first terminal described in unique identification, and the unique identifier of the second terminal is for second terminal described in unique identification;
    Receiving module is used for, and receives the unlocking information that the second terminal is sent, and the unlocking information is response of the second terminal to the unlocking request;
    Unlocked state is used for, and responds the unlocking information, executes the relevant operation for releasing the screen lock state.
  62. Terminal according to claim 61, which is characterized in that
    The unlocked state is specifically used for, and responds first unlocking pin in the unlocking information, releases the screen lock state.
  63. Terminal according to claim 61, which is characterized in that
    The unlocked state is specifically used for, and responds the first unlocking pin that the unlocking information removes the first terminal, so that the first terminal releases the screen lock state;First unlocking pin is the password for releasing the screen lock state of the first terminal.
  64. The terminal according to claim 62 or 63, which is characterized in that the terminal further include:
    Display module is used for, and unlocking pin interface is reseted in display;
    Setup module is used for, and the operation of the setting unlocking pin of response user's input resets the unlocking pin of the first terminal.
  65. According to any terminal of claim 61-64, which is characterized in that the terminal further include:
    The sending module is specifically used for, and in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, sends unlocking request from second terminal described in trend;Alternatively,
    The sending module is specifically used for, and in the state of the lock screen, the unlock operation of response user's input, Xiang Suoshu first terminal sends unlocking request to the first terminal;Alternatively,
    Display module is used for, and in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, the first prompt information is presented, first prompt information sends the unlocking request to the second terminal for prompting the user whether in the first terminal;
    The sending module is specifically used for, and obtains operation of the user based on first prompt information, and Xiang Suoshu second terminal sends unlocking request;Alternatively,
    It obtains module to be used for, the first terminal in the state of the lock screen, obtains the authentication information of user's input;
    The sending module is specifically used for, if the authentication information of user input matches with preset authentication information, Xiang Suoshu second terminal sends unlocking request.
  66. According to any terminal of claim 61-64, which is characterized in that the terminal further include:
    Display module is used for, and in the state of the lock screen, the second prompt information, second prompt information is presented in the first terminal Contact method including at least two contact persons, the contact person that second prompt information is used to that user to be prompted to select unlocking request to be sent;
    It obtains module to be used for, obtains the selection operation of user's input;
    The sending module is used for, if contact person is artificially preset in the connection that is directed to of the selection operation, sends unlocking request to second terminal, and the second terminal is terminal corresponding with the default contact person;
    Cue module is used for, if the contact person that the selection operation is directed to is not default contact person, sends out warning note.
  67. According to any terminal of claim 61-66, which is characterized in that the terminal further include:
    The acquisition module is used for, and obtains the unique identifier of the first terminal and the unique identifier of the second terminal;
    The sending module is used for, and Xiang Suoshu second terminal sends certification request, and the certification request is used for the relevant operation for requesting the second terminal with the screen lock state for meaning the first terminal execution releasing first terminal;It include the unique identifier of the first terminal in the certification request;
    The receiving module is used for, and receives the authentication response that the second terminal is sent, and the authentication response is response of the second terminal to the certification request.
  68. Terminal according to claim 67, which is characterized in that the certification request further includes the first unlocking pin of the first terminal.
  69. A kind of terminal characterized by comprising
    Receiving module is used for, and receives the unlocking request that first terminal is sent, and the unlocking request includes the unique identifier of the first terminal, and the unique identifier of the first terminal is for first terminal described in unique identification;
    Sending module is used for, if the unique identifier of the first terminal is identical as the unique identifier that the second terminal pre-saves, unlocking information then is sent to the first terminal, the unlocking information is used to execute the relevant operation for the screen lock state for releasing the first terminal.
  70. Terminal according to claim 69, which is characterized in that the terminal further include:
    It obtains module to be used for, obtains the authentication information of user's input;
    Sending module is used for, if the authentication information of user input matches with preset authentication information, sends the unlocking information to the first terminal.
  71. The terminal according to claim 69 or 70, which is characterized in that the unlocking information further includes the first unlocking pin of the first terminal, and first unlocking pin releases the screen lock state of the first terminal for the first terminal;Or, the unlocking information, which is used to indicate the first terminal, removes the first unlocking pin, so that the first terminal releases the screen lock state.
  72. According to any terminal of claim 69-71, which is characterized in that the terminal further include:
    Display module is used for, and prompt information is presented, and the prompt information sends unlocking information to the first terminal for prompting the user whether;
    It obtains module to be used for, obtains operation of the user based on the prompt information, Xiang Suoshu first terminal sends the unlocking information.
  73. According to any terminal of claim 69-72, which is characterized in that
    The receiving module is used for, and receives the second unlocking pin that the first terminal is sent, and second unlocking pin is the unlocking pin after the first terminal is reset.
  74. A kind of terminal characterized by comprising
    It opens module to be used for, in the state of the lock screen, barcode scanning application is opened in the operation of response user's input;
    It releases module to be used for, is operated in response to the barcode scanning of barcode scanning application, release the screen lock state.
  75. Terminal according to claim 74, which is characterized in that the terminal further include:
    It releases module to be also used to, be operated in response to the barcode scanning of barcode scanning application, if the information of scan code carrying matches with preset information, release the screen lock state;
    Display module is used for, if the information and preset information of scan code carrying mismatch, prompt information is presented.
  76. The terminal according to claim 74 or 75, which is characterized in that the object of the barcode scanning operation is scan code;
    The information of the scan code carrying includes the unique identifier of the first terminal and the unlocking pin of the first terminal, and the unique identifier of the first terminal is for first terminal described in unique identification;Alternatively,
    The information of the scan code carrying includes the unlocking pin of user identifier and the first terminal, user of the user identifier for first terminal described in unique identification;Alternatively,
    The information of the scan code carrying includes the unlocking pin of unique knowledge identification code of the first terminal, the user identifier and the first terminal.
  77. According to any terminal of claim 74-76, which is characterized in that the terminal further include:
    It obtains module to be used for, obtains the authentication information of user's input;
    Display module is used for, if the authentication information and preset authentication information of user's input mismatch, warning note is presented;
    The releasing module is specifically used for, if the authentication information of user's input is matched with preset authentication information, releases the screen lock state.
  78. According to any terminal of claim 74-77, which is characterized in that the terminal further include:
    Display module is used for, and unlocking pin interface is reseted in display;
    Setup module is used for, and Password Operations are reseted in response user's input, and the second unlocking pin is arranged.
  79. According to any terminal of claim 74-78, which is characterized in that the terminal further include:
    The opening module is specifically used for, and the first terminal in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, opens the barcode scanning application;Alternatively,
    The opening module is specifically used for, and in the state of the lock screen, the opening operation of response user's input opens the barcode scanning application to the first terminal;Alternatively,
    Display module is used for, and in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, presentation user's prompt information, user's prompt information is for prompting the user whether to open the barcode scanning application for the first terminal;
    The opening module is specifically used for, and obtains operation of the user based on user's prompt information, opens the barcode scanning application;Alternatively,
    The opening module is specifically used for, and the first terminal in the state of the lock screen, obtains the authentication information of user's input;If the authentication information of user's input matches with preset authentication information, the first terminal opens the barcode scanning application.
  80. According to any terminal of claim 74-79, which is characterized in that the terminal further include:
    The generation module is used for, and generates the first scan code;
    Sending module is used for, and sends first scan code to second terminal, alternatively, sending first scan code to server.
  81. The terminal according to claim 80, which is characterized in that the terminal further include:
    The generation module is used for, if the first unlocking pin of the first terminal changes, generates the second scan code according to the unique identifier of the first unlocking pin and the first terminal after change;Alternatively, regularly updating first scan code, third scan code is generated.
  82. A kind of terminal characterized by comprising
    Receiving module is used for, and first terminal in the state of the lock screen, receives the unlocking information that the second terminal is sent, and the second terminal is that the terminal of communication connection was established with the first terminal;
    Unlocked state is used for, and the first unlocking pin of the first terminal is removed according to the unlocking information, alternatively, the first unlocking pin for including according to the unlocking information, releases the screen lock state of the first terminal.
  83. The terminal according to claim 82, which is characterized in that the terminal further include:
    Display module is used for, and unlocking pin interface is reseted in display;
    Setup module is used for, and the operation for resetting unlocking pin of response user's input resets the second unlocking pin of the first terminal.
  84. The terminal according to claim 82 or 83, which is characterized in that the terminal further include:
    Sending module is used for, and the first terminal in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, sends unlocking request from second terminal described in trend;Alternatively,
    Sending module is used for, and in the state of the lock screen, the unlock operation of response user's input, Xiang Suoshu first terminal sends unlocking request to the first terminal;Alternatively,
    Display module is used for, and in the state of the lock screen, if the number of unlock failure is greater than or equal to preset threshold value, the first prompt information is presented, first prompt information sends the unlocking request to the second terminal for prompting the user whether in the first terminal;
    Sending module is used for, and obtains operation of the user based on first prompt information, and Xiang Suoshu second terminal sends unlocking request;Alternatively,
    It obtains module to be used for, the first terminal in the state of the lock screen, obtains the authentication information of user's input;
    Sending module is used for, if the authentication information of user input matches with preset authentication information, Xiang Suoshu second terminal sends unlocking request.
  85. The terminal according to claim 82 or 83, which is characterized in that the terminal further include:
    The display module is used for, and in the state of the lock screen, the second prompt information is presented in the first terminal, and second prompt information includes the contact method of at least two contact persons, the contact person that second prompt information is used to that user to be prompted to select unlocking request to be sent;
    The acquisition module is used for, and obtains the selection operation of user's input;
    The sending module is used for, if contact person is artificially preset in the connection that is directed to of the selection operation, sends unlocking request to second terminal, and the second terminal is terminal corresponding with the default contact person;
    Cue module is used for, if the contact person that the selection operation is directed to is not default contact person, triggers warning note.
  86. A kind of terminal characterized by comprising
    Receiving module is used for, and first terminal receives the unlocking information that second terminal is sent under black state, and the unlocking information includes the unique identifier and unlocking pin of the first terminal, and the unlocking pin is used to release the screen lock state of the first terminal;
    Display module is used for, and the unlocking information sent in response to receiving the second terminal lights screen, into screen lock state, locking screen interface is presented, fills the unlocking pin automatically on the locking screen interface;
    Unlocked state is used for, and releases the screen lock state.
  87. A kind of terminal characterized by comprising
    Sending module is used for, if the first terminal detects second terminal within the scope of pre-determined distance, unlocking request is sent to the second terminal, the screen lock state that the unlocking request is used to that the second terminal to be requested to release the first terminal, first request includes the unique identifier of the first terminal and the unique identifier of the second terminal;
    Receiving module is used for, receive the unlocking information that the second terminal is sent, the unlocking information is response of the second terminal to the unlocking request, the unlocking information includes the unique identifier and unlocking pin of the second terminal, and the unlocking pin is used to release the screen lock state of the first terminal;
    Display module is used for, and in response to receiving the unlocking information, locking screen interface is presented in the first terminal;
    Unlocked state is used for, and fills the unlocking pin automatically on locking screen interface, releases the screen lock state.
  88. The terminal according to claim 87, which is characterized in that
    The sending module is specifically used for, if the first terminal detect second terminal within the scope of pre-determined distance, and duration of the second terminal within the scope of pre-determined distance be greater than preset time threshold when, Xiang Suoshu second terminal send unlocking request.
CN201780087948.7A 2017-09-29 2017-09-29 Screen unlocking method and terminal Active CN110419042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111188784.1A CN114168916A (en) 2017-09-29 2017-09-29 Screen unlocking method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/104197 WO2019061219A1 (en) 2017-09-29 2017-09-29 Screen unlocking method and terminal

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202111188784.1A Division CN114168916A (en) 2017-09-29 2017-09-29 Screen unlocking method and terminal

Publications (2)

Publication Number Publication Date
CN110419042A true CN110419042A (en) 2019-11-05
CN110419042B CN110419042B (en) 2021-10-15

Family

ID=65902665

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201780087948.7A Active CN110419042B (en) 2017-09-29 2017-09-29 Screen unlocking method and terminal
CN202111188784.1A Pending CN114168916A (en) 2017-09-29 2017-09-29 Screen unlocking method and terminal

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202111188784.1A Pending CN114168916A (en) 2017-09-29 2017-09-29 Screen unlocking method and terminal

Country Status (2)

Country Link
CN (2) CN110419042B (en)
WO (1) WO2019061219A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400694A (en) * 2020-04-01 2020-07-10 Oppo广东移动通信有限公司 Unlocking method, first terminal, second terminal and storage medium
CN113253907A (en) * 2021-06-16 2021-08-13 北京交通大学 Intelligent equipment implicit identity recognition method based on environmental sensor
WO2022143136A1 (en) * 2020-12-31 2022-07-07 华为技术有限公司 Password reset method and apparatus, and electronic device
WO2023142749A1 (en) * 2022-01-26 2023-08-03 Oppo广东移动通信有限公司 Device unlocking method and apparatus, electronic device and computer-readable storage medium

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110620847B (en) * 2019-10-21 2022-08-30 深圳传音控股股份有限公司 Anti-theft method of intelligent terminal and intelligent terminal
CN110753118A (en) * 2019-10-24 2020-02-04 东北大学秦皇岛分校 Remote computer starting unlocking and file transmission system and method based on network
CN111581630B (en) * 2020-05-12 2023-12-15 上海闻泰信息技术有限公司 Computer unlocking method, device, equipment and medium
CN114244874A (en) * 2020-09-09 2022-03-25 华为技术有限公司 Unlocking control method and system, computer storage medium and electronic equipment
CN115705419A (en) * 2021-08-13 2023-02-17 华为技术有限公司 Remote identity authentication method and related equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101990196A (en) * 2010-11-12 2011-03-23 中兴通讯股份有限公司 Method, device and system for unlocking mobile terminal by network operator
WO2012122782A1 (en) * 2011-03-15 2012-09-20 中兴通讯股份有限公司 Method for obtaining unlock code, and mobile terminal
CN102882679A (en) * 2012-07-24 2013-01-16 中兴通讯股份有限公司 Unlocking method and unlocking device for electronic equipment
CN104052873A (en) * 2014-06-09 2014-09-17 宇龙计算机通信科技(深圳)有限公司 Terminal, multi-screen unlocking device and method and unlocking method for different areas of screens
CN104156648A (en) * 2014-08-25 2014-11-19 北京网秦天下科技有限公司 Screen unlocking method and device
CN104424409A (en) * 2013-08-30 2015-03-18 中兴通讯股份有限公司 Application unlocking method and device
CN105049562A (en) * 2015-07-14 2015-11-11 广东欧珀移动通信有限公司 Unlocking method of subscriber identity module card and communication terminal
CN105160222A (en) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Unlocking method and mobile terminal
CN106778113A (en) * 2015-11-20 2017-05-31 北京奇虎科技有限公司 The method and apparatus that mobile terminal and application are unlocked by Intelligent worn device
CN106897591A (en) * 2015-12-18 2017-06-27 小米科技有限责任公司 unlocking method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101990196A (en) * 2010-11-12 2011-03-23 中兴通讯股份有限公司 Method, device and system for unlocking mobile terminal by network operator
WO2012122782A1 (en) * 2011-03-15 2012-09-20 中兴通讯股份有限公司 Method for obtaining unlock code, and mobile terminal
CN102882679A (en) * 2012-07-24 2013-01-16 中兴通讯股份有限公司 Unlocking method and unlocking device for electronic equipment
CN104424409A (en) * 2013-08-30 2015-03-18 中兴通讯股份有限公司 Application unlocking method and device
CN104052873A (en) * 2014-06-09 2014-09-17 宇龙计算机通信科技(深圳)有限公司 Terminal, multi-screen unlocking device and method and unlocking method for different areas of screens
CN104156648A (en) * 2014-08-25 2014-11-19 北京网秦天下科技有限公司 Screen unlocking method and device
CN105049562A (en) * 2015-07-14 2015-11-11 广东欧珀移动通信有限公司 Unlocking method of subscriber identity module card and communication terminal
CN105160222A (en) * 2015-09-30 2015-12-16 宇龙计算机通信科技(深圳)有限公司 Unlocking method and mobile terminal
CN106778113A (en) * 2015-11-20 2017-05-31 北京奇虎科技有限公司 The method and apparatus that mobile terminal and application are unlocked by Intelligent worn device
CN106897591A (en) * 2015-12-18 2017-06-27 小米科技有限责任公司 unlocking method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400694A (en) * 2020-04-01 2020-07-10 Oppo广东移动通信有限公司 Unlocking method, first terminal, second terminal and storage medium
WO2022143136A1 (en) * 2020-12-31 2022-07-07 华为技术有限公司 Password reset method and apparatus, and electronic device
CN113253907A (en) * 2021-06-16 2021-08-13 北京交通大学 Intelligent equipment implicit identity recognition method based on environmental sensor
WO2023142749A1 (en) * 2022-01-26 2023-08-03 Oppo广东移动通信有限公司 Device unlocking method and apparatus, electronic device and computer-readable storage medium

Also Published As

Publication number Publication date
CN110419042B (en) 2021-10-15
WO2019061219A1 (en) 2019-04-04
CN114168916A (en) 2022-03-11

Similar Documents

Publication Publication Date Title
CN110419042A (en) A kind of method and terminal of unlocking screen
EP3373657B1 (en) Wireless router, internet of things device and system for supporting connection to wireless router of internet of things device
US10547609B2 (en) Method, apparatus, and system for controlling intelligent device, and storage medium
US9641596B2 (en) Home appliance information management apparatus, home appliance information sharing method, and home appliance information sharing system
EP2761429B1 (en) Policy compliance-based secure data access
US11537408B2 (en) Method for managing application program use time offline, and terminal device
WO2018072215A1 (en) Security verification method and apparatus
AU2017276840A1 (en) Padlock device, systems including a padlock device, and methods of operating therefor
CN106778175B (en) Interface locking method and device and terminal equipment
CN104966005A (en) Access control method and terminal apparatus
CN104901805B (en) A kind of identification authentication methods, devices and systems
EP3131267B1 (en) Electronic device and method for commonly using the same
CN104158790A (en) User login method, device and equipment
CN108475304A (en) A kind of method, apparatus and mobile terminal of affiliate application and biological characteristic
CN106650490A (en) Cloud account number login method and device
CN106096367A (en) A kind of mobile terminal wakes up processing method, device and equipment up
US10873849B1 (en) System and method for universal mobile device lock using blockchain
JP2021512404A (en) Authentication window display method and device
CN104573437A (en) Information authentication method, device and terminal
US20170295174A1 (en) Electronic device, server, and method for authenticating biometric information
CN105530222A (en) Method for establishing connection among terminals, and device and system
CN111782722B (en) Data management method and device, electronic equipment and storage medium
US10437981B2 (en) Electronic system and device unlock method of the same
CN108880787A (en) A kind of processing method and relevant device of information key
CN106411864A (en) Information synchronization method, and terminals

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant