CN111079114B - Unlocking method, unlocking device, terminal and computer readable storage medium - Google Patents

Unlocking method, unlocking device, terminal and computer readable storage medium Download PDF

Info

Publication number
CN111079114B
CN111079114B CN201911290640.XA CN201911290640A CN111079114B CN 111079114 B CN111079114 B CN 111079114B CN 201911290640 A CN201911290640 A CN 201911290640A CN 111079114 B CN111079114 B CN 111079114B
Authority
CN
China
Prior art keywords
unlocking
unlocked
application
instruction
screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911290640.XA
Other languages
Chinese (zh)
Other versions
CN111079114A (en
Inventor
许明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Oppo Chongqing Intelligent Technology Co Ltd
Original Assignee
Oppo Chongqing Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Oppo Chongqing Intelligent Technology Co Ltd filed Critical Oppo Chongqing Intelligent Technology Co Ltd
Priority to CN201911290640.XA priority Critical patent/CN111079114B/en
Publication of CN111079114A publication Critical patent/CN111079114A/en
Application granted granted Critical
Publication of CN111079114B publication Critical patent/CN111079114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application belongs to the technical field of unlocking, and particularly relates to an unlocking method, an unlocking device, a terminal and a computer readable storage medium, wherein the unlocking method comprises the following steps: receiving an unlocking instruction for unlocking an object to be unlocked; executing a first operation and a second operation in parallel according to the unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; monitoring a biological recognition result of the biological recognition application; if the biological identification result is successful, the unlocking operation for unlocking the object to be unlocked is executed by utilizing the locking application; the unlocking method solves the technical problem that the unlocking speed is low in the current unlocking method for unlocking by means of biological identification.

Description

Unlocking method, unlocking device, terminal and computer readable storage medium
Technical Field
The application belongs to the technical field of unlocking, and particularly relates to an unlocking method, an unlocking device, a terminal and a computer readable storage medium.
Background
Biological identification refers to identification of inherent physiological characteristics (such as fingerprints, faces, irises and the like) and behavioral characteristics (such as handwriting, voiceprint, gait and the like) of a human body, so that personal identification is realized. Since the biometric identification has uniqueness and convenience, the terminal is often unlocked by way of the biometric identification.
However, the unlocking method for unlocking by means of biological recognition at present has the problem of low unlocking speed.
Disclosure of Invention
The embodiment of the application provides an unlocking method, an unlocking device, a terminal and a computer readable storage medium, which can solve the technical problem that the unlocking speed of the unlocking method for unlocking in a biological identification mode is low at present.
An embodiment of the present application provides an unlocking method, including:
receiving an unlocking instruction for unlocking an object to be unlocked;
executing a first operation and a second operation in parallel according to the unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; the locking application is an application for locking and unlocking the object to be unlocked;
monitoring a biological recognition result of the biological recognition application;
and if the biological identification result is successful, executing unlocking operation for unlocking the object to be unlocked by using the locking application.
A second aspect of the embodiments of the present application provides an unlocking device, including:
the receiving unit is used for receiving an unlocking instruction for unlocking the object to be unlocked;
the identification unit is used for executing the first operation and the second operation in parallel according to the unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; the locking application is an application for locking and unlocking the object to be unlocked;
the monitoring unit is used for monitoring the biological recognition result of the biological recognition application;
and the unlocking unit is used for executing unlocking operation for unlocking the object to be unlocked by utilizing the locking application if the biological identification result is successful.
A third aspect of the embodiments of the present application provides a terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium storing a computer program, which when executed by a processor, implements the steps of the above method.
According to the method, a first operation of waking up an object to be unlocked and calling a locking application is executed in parallel according to a received unlocking instruction for unlocking the object to be unlocked, and a second operation of triggering the biological recognition application to carry out biological recognition is included, so that a biological recognition process of the biological recognition application, the waking process of the object to be unlocked and the calling process of the locking application are executed in parallel, the time spent by the biological recognition application for carrying out biological recognition is longer than the time spent by the biological recognition application for waking up the object to be unlocked and calling the locking application, when the biological recognition result of the biological recognition application monitored by the locking application is successful in biological recognition, the steps of waking up the object to be unlocked and calling the locking application are executed, and at the moment, the unlocking operation of unlocking the object to be unlocked can be completed by directly executing the unlocking operation of the object to be unlocked by the locking application. For example, the unlocking view of the locking application can be removed by using the locking application to complete unlocking operation for unlocking the object to be unlocked, compared with the traditional method that after the biological identification of the biological identification application is successful, the object to be unlocked is awakened and the locking application is called to perform unlocking operation, the time spent by the terminal for awakening the object to be unlocked and calling the locking application is saved, and the unlocking speed is accelerated.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered limiting the scope, and that other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an unlocking method for unlocking by iris recognition at present;
fig. 2 is a schematic flowchart of a first implementation of an unlocking method according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a second implementation of an unlocking method according to an embodiment of the present application;
FIG. 4 is a schematic flowchart of a specific implementation of blocking display screen lighting provided in an embodiment of the present application;
fig. 5 is a schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal provided in an embodiment of the present application;
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
It should be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
Biological identification refers to identification of inherent physiological characteristics (such as fingerprints, faces, irises and the like) and behavioral characteristics (such as handwriting, voiceprint, gait and the like) of a human body, so that personal identification is realized. Since the biometric identification has uniqueness and convenience, the terminal is often unlocked by way of the biometric identification.
Taking iris recognition as an example, fig. 1 shows a schematic flow chart of an unlocking method for unlocking by iris recognition at present, the unlocking method for unlocking by iris recognition at present usually performs unlocking operations such as waking up an object to be unlocked, calling a locking application, removing an unlocking interface of the locking application and the like after the iris recognition is successful, and the unlocking operations need more time to be completed, so that the unlocking method for unlocking by a biological recognition mode at present has the problem of low unlocking speed.
Based on this, the embodiment of the application provides an unlocking method, an unlocking device, a terminal and a computer readable storage medium, which can solve the problem that the unlocking speed of the unlocking method for unlocking by a biological identification mode is low at present.
In order to illustrate the technical solution of the present application, the following description is made by specific examples.
Fig. 2 shows a schematic implementation flow chart of an unlocking method provided in an embodiment of the present application, where the method is applied to a terminal, and may be executed by an unlocking device configured on the terminal, and is suitable for a situation where an unlocking speed needs to be increased. The terminal can be an intelligent terminal such as a mobile phone, a computer, a wearable device and the like. The unlocking method may include steps 201 to 204.
Step 201, receiving an unlocking instruction for unlocking an object to be unlocked.
The received unlocking instruction for unlocking the object to be unlocked may include an unlocking instruction for unlocking a screen, an unlocking instruction for unlocking a payment application or a game application, an unlocking instruction for unlocking a file, and an unlocking instruction for unlocking a different unlocking object. That is, the object to be unlocked may be a system screen to be unlocked, an application to be unlocked, a file to be unlocked, or another object to be unlocked.
Specifically, the receiving the unlocking instruction for unlocking the object to be unlocked may include receiving an unlocking instruction for unlocking the object to be unlocked triggered by different triggering modes, for example, receiving an unlocking instruction for unlocking the object to be unlocked triggered by pressing a power key, receiving an unlocking instruction for unlocking the object to be unlocked triggered by clicking a display screen, receiving an unlocking instruction for unlocking the object to be unlocked triggered by plugging and unplugging a USB interface, receiving an unlocking instruction for unlocking the object to be unlocked triggered by voice, receiving an unlocking instruction for unlocking the object to be unlocked triggered by a detected preset touch gesture, receiving an unlocking instruction for unlocking the object to be unlocked triggered by a detected preset motion information, and the like.
It should be noted that, receiving the unlocking instruction may include receiving an unlocking instruction triggered by one triggering manner, or receiving an unlocking instruction triggered by a combination of multiple triggering manners, for example, receiving an unlocking instruction for unlocking an object to be unlocked triggered by pressing a power key while detecting the preset motion information.
After receiving the unlocking instruction for unlocking the object to be unlocked, the terminal can unlock the object to be unlocked corresponding to the unlocking instruction.
Step 202, executing a first operation and a second operation in parallel according to an unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biometric application to perform biometric identification.
Specifically, the locking application is an application for locking and unlocking the object to be unlocked. In the embodiment of the application, the terminal locks the unlocked object by calling the locking application.
The calling the locking application to lock the unlocked object specifically may include: when the terminal receives an instruction for closing the unlocked object, does not detect the operation on the unlocked object in a preset time period or receives a locking instruction on the unlocked object, the terminal calls a locking application to lock the unlocked object, and the triggering mode of calling the locking application to lock the unlocked object is not limited.
Before the terminal receives the unlocking instruction, the object to be unlocked is in a sleep state or a closed state; after the terminal receives an unlocking instruction for unlocking the object to be unlocked, the terminal can wake up the object to be unlocked according to the unlocking instruction, call a locking application and trigger a biological recognition application to carry out biological recognition.
It should be noted that, the unlocking method for unlocking by the way of biological recognition at present is to wake up the object to be unlocked and call the locking application to unlock after the biological recognition of the biological recognition application is successful; in the embodiment of the application, the biometric identification performed by the biometric identification application is parallel to the waking up of the object to be unlocked and the invoking of the locking application, so that the speed of unlocking the object to be unlocked can be increased.
In some embodiments of the present application, the triggering the biometric application to perform the biometric may include: triggering a biological recognition application to perform iris recognition; and/or triggering the biometric application to perform fingerprint recognition; and/or triggering the biometric application to perform face recognition.
That is, triggering the biometric application to perform the biometric may include triggering the biometric application to perform one or more types of biometric, e.g., triggering the biometric application to perform iris recognition and fingerprint recognition simultaneously.
Further, when the biometric application is triggered to perform multiple kinds of biometric identification, the multiple kinds of biometric identification can be performed simultaneously, thereby improving the speed of the biometric application to perform multiple kinds of biometric identification.
It should be noted that the foregoing description is illustrative of the types of biometrics, and is not meant to limit the scope of the application, and in other embodiments of the application, more or fewer types of biometrics may be included. For example, in other embodiments of the present application, biometric types such as handwriting recognition, voiceprint recognition, gait recognition, and palmar vein recognition may also be included.
And 203, monitoring a biological recognition result of the biological recognition application.
In this embodiment of the present invention, since the process of performing the biometric identification by the biometric identification application is executed in parallel with the process of waking up the object to be unlocked and invoking the locking application, and the time taken for the biometric identification application to perform the biometric identification is longer than the time taken for waking up the object to be unlocked and invoking the locking application, when the biometric identification is completed, the process of waking up the object to be unlocked and invoking the locking application is completed, and at this time, the locking application may monitor the biometric identification result of the biometric identification application, so as to directly execute the unlocking operation for unlocking the object to be unlocked when the success of the biometric identification is monitored.
Specifically, if the biometric identification is iris identification, the terminal may acquire a face image through the camera, identify the face image to obtain iris features, and then compare the iris features with pre-stored sample iris features, so as to confirm the identity of the user.
The pre-stored sample iris features can comprise sample iris features of a user to which the terminal belongs and sample iris features of a user authorized by the user to which the terminal belongs; when the number of the prestored sample iris features is multiple, if the similarity between the iris features acquired by the terminal and any one of the sample iris features is greater than a similarity threshold, or the similarity between the iris features acquired by the terminal and the prestored sample iris features is greater than the similarity threshold, the biological recognition is successful; otherwise, if the similarity between the iris features acquired by the terminal and all the sample iris features is smaller than or equal to the similarity threshold, the biological recognition is failed.
The similarity between the iris feature acquired by the terminal and the sample iris feature may be calculated by a structural similarity measure (SSIM), cosine similarity, histogram comparison, or other methods that may obtain the similarity between the iris feature acquired by the terminal and the sample iris feature, which is not limited in this application.
In some embodiments of the present application, when the biometric application is triggered to perform multiple biometrics, the locking application may perform an unlocking operation for unlocking the object to be unlocked when a result that multiple biometrics are successful is monitored, or when a result that any one of the biometrics is successful is monitored.
And 204, if the biological identification result is successful, executing unlocking operation for unlocking the object to be unlocked by using the locking application.
Specifically, the performing the unlocking operation for unlocking the object to be unlocked by using the locking application may include: and removing the unlocking view of the locking application to finish the unlocking operation of the object to be unlocked.
In some embodiments of the present application, after triggering the biometric application to perform the biometric, if the biometric is successful, since the object to be unlocked is already awakened, the locking application may directly complete the unlocking operation of the object to be unlocked by removing the unlocking view; if the biological identification fails, the unlocking failure of the object to be unlocked is indicated, and at the moment, the object to be unlocked enters a sleep state or a closing state.
It should be noted that, the unlocking view of the locking application refers to a process that needs to be loaded when the locking application locks an unlocked object, and the unlocking view may be used to render an unlocking interface on the terminal, where the unlocking interface is an interface that may be seen by a user. In addition, after the unlocking view is removed, the unlocking operation of the object to be unlocked is completed on behalf of the locking application, and meanwhile, the rendered unlocking interface also disappears.
According to the method, a first operation of waking up an object to be unlocked and calling a locking application is executed in parallel according to a received unlocking instruction for unlocking the object to be unlocked, and a second operation of triggering the biological recognition application to carry out biological recognition is included, so that a biological recognition process of the biological recognition application, the waking process of the object to be unlocked and the calling process of the locking application are executed in parallel, the time spent by the biological recognition application for carrying out biological recognition is longer than the time spent by the biological recognition application for waking up the object to be unlocked and calling the locking application, when the biological recognition result of the biological recognition application monitored by the locking application is successful in biological recognition, the steps of waking up the object to be unlocked and calling the locking application are executed, and at the moment, the unlocking operation of unlocking the object to be unlocked can be completed by directly executing the unlocking operation of the object to be unlocked by the locking application. For example, the unlocking view of the locking application can be removed by using the locking application to complete the unlocking operation of unlocking the object to be unlocked, compared with the traditional method that the object to be unlocked is only awakened and the locking application is called to perform the unlocking operation after the biological identification of the biological identification application is successful, the time spent by the terminal for awakening the object to be unlocked and calling the locking application is saved, and the unlocking speed is accelerated
In order to ensure the use safety of the terminal and protect the privacy of the user, the terminal often locks the system screen through a screen locking application, and in some embodiments of the present application, when the object to be unlocked is the system screen, as shown in fig. 3, the unlocking method may include: steps 301 to 304.
Step 301, receiving an unlocking instruction for unlocking a screen.
Step 302, executing a first operation including waking up the system and calling the locking application and a second operation including triggering the biometric application to perform biometric identification in parallel according to an unlocking instruction for unlocking the screen.
The locking application may be a screen locking application for locking and unlocking a system screen.
Specifically, before the terminal receives an unlocking instruction for unlocking the screen, the system of the terminal is generally in a sleep state; therefore, after the terminal receives the unlocking instruction for unlocking the screen, the terminal can wake up the system according to the unlocking instruction for unlocking the screen, so that the system can pre-load the process for displaying the desktop, and the desktop can be directly displayed when the locking application monitors that the biological recognition result is successful.
And step 303, monitoring a biological recognition result of the biological recognition application.
Specifically, the specific implementation steps of the above-mentioned biometric monitoring method for the biometric application may refer to the description of step 203, and will not be repeated here.
And 304, if the biological identification result is successful, performing unlocking operation for unlocking the screen by using the locking application.
For example, the unlocking operation of unlocking the screen may be completed by removing the unlocking view of the screen locking application by using the screen locking application.
In some embodiments of the present application, after the biometric identification application performs the biometric identification, if the biometric identification is successful, since the system has been awakened, the screen locking application may directly complete the unlocking operation of unlocking the screen by removing the unlocking view of the screen locking application; if the biometric identification fails, indicating that the screen unlocking fails, at this time, the system will enter a sleep state again.
According to the embodiment of the application, a first operation comprising waking up a system and calling a locking application and a second operation comprising triggering a biological recognition application to carry out biological recognition are executed in parallel according to a received unlocking instruction for unlocking a screen; the process of the biological recognition application for biological recognition is executed in parallel with the wake-up process of the system and the invoking process of the locking application, the time spent by the biological recognition application for biological recognition is longer than the time spent by the wake-up system and invoking the locking application, and when the biological recognition result of the biological recognition application monitored by the locking application is successful in biological recognition, the wake-up system and invoking the locking application are already executed, and at the moment, the unlocking operation for unlocking the screen can be completed by directly executing the unlocking operation for unlocking the screen by utilizing the screen locking application. For example, the unlocking view of the screen locking application can be removed by using the screen locking application to complete unlocking operation for unlocking the screen, compared with the traditional method that after the biological identification of the biological identification application is successful, the process of loading the display desktop by the system is awakened and the screen locking application is called, the time spent by the terminal for awakening the process of loading the display desktop by the system and calling the screen locking application is saved, and the unlocking speed is increased.
In some embodiments of the present application, the first operation may further include: and blocking the display screen to be lightened according to an unlocking instruction for unlocking the screen.
The blocking display screen lighting can be performed by a Power management service (Power ManagerService, PMS), and the display screen can be lighted when the biological recognition result is monitored to be successful, so that the display screen of the terminal is always in a screen-off state in the whole biological recognition process, and the use Power consumption of the terminal is reduced.
However, in practical applications, since the terminal display needs to be turned on when the unlocking instruction for unlocking the screen is triggered by some triggering manner, for example, the unlocking instruction triggered by pressing the power key generally needs to be turned on, that is, at this time, the display is not required to be blocked from being turned on, so as to avoid the user from producing a bad experience, in some embodiments of the present application, as shown in fig. 4, before the step of blocking the display from being turned on according to the unlocking instruction for unlocking the screen, the method may further include: steps 401 to 402.
Step 401, identifying a triggering mode corresponding to an unlocking instruction for unlocking a screen.
Step 402, if the triggering mode corresponding to the unlocking instruction for unlocking the screen is a triggering mode capable of blocking the display screen from being lightened, blocking the display screen from being lightened according to the unlocking instruction for unlocking the screen.
In addition, in some embodiments of the present application, the first operation may further include: the unlocking interface loaded by the locking application is set to be in a transparent state, so that in the whole unlocking process, a user cannot see the process that the terminal display screen jumps from the screen locking interface to the display interface corresponding to the object to be unlocked, the user is given to visually feel the acceleration of the unlocking speed, and the user experience is improved.
For example, when the object to be unlocked is a system screen, the screen locking application which can be called by the terminal sets the unlocking interface loaded by the screen locking application to be in a transparent state, so that the terminal cannot see the unlocking interface loaded by the screen locking application when the terminal lights the display screen, and the unlocking interface is directly a display interface (system desktop) of the screen.
In some embodiments of the present application, the setting of the unlock interface loaded by the locking application to the transparent state may be performed simultaneously with or after the blocking display is turned on, so that when the terminal monitors that the biometric identification result of the biometric identification application is successful and the display is turned on, the unlock interface of the locking application is set to the transparent state, so that the user cannot see multiple jumps of the terminal display from the screen off to the screen on and then from the screen on to the system desktop, but see jumps of the terminal display from the screen off to the system desktop directly, thereby enabling the user to visually feel acceleration of the unlocking speed and improving the user experience.
In some embodiments of the present application, if the biometric result of the biometric application monitored by the screen locking application invoked by the terminal fails in biometric, the unlock interface may be restored; that is, the unlocking interface loaded by the locking application is set to be in a non-transparent state, so that the user can unlock in other non-biological identification manners. For example, unlocking by entering a character passcode or gesture passcode, and so forth.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present invention is not limited by the order of acts described, as some steps may occur in other orders in accordance with the invention.
Fig. 5 shows a schematic structural diagram of an unlocking device 500 according to an embodiment of the present application, which includes a receiving unit 501, an identifying unit 502, a monitoring unit 503, and an unlocking unit 504.
A receiving unit 501, configured to receive an unlocking instruction for unlocking an object to be unlocked;
an identifying unit 502, configured to execute a first operation and a second operation in parallel according to an unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; the locking application is an application for locking and unlocking the object to be unlocked;
a monitoring unit 503, configured to monitor a biometric result of the biometric application;
and the unlocking unit 504 is configured to execute an unlocking operation for unlocking the object to be unlocked by using the locking application if the biological recognition result is successful.
In some embodiments of the present application, the receiving unit 501 is further configured to receive an unlocking instruction for unlocking the screen.
In some embodiments of the present application, the first operation may further include: and blocking the display screen to be lightened according to the unlocking instruction for unlocking the screen.
In some embodiments of the present application, the identifying unit 502 is further configured to identify a triggering mode corresponding to the unlocking instruction for unlocking the screen; and if the triggering mode corresponding to the unlocking instruction for unlocking the screen is a triggering mode capable of blocking the display screen to be lightened, blocking the display screen to be lightened according to the screen unlocking instruction for unlocking the screen.
In some embodiments of the present application, the first operation may further include: and setting the unlocking interface loaded by the locking application to be in a transparent state.
In some embodiments of the present application, the second operation may further specifically include:
triggering a biological recognition application to perform iris recognition; and/or the number of the groups of groups,
triggering a biological identification application to carry out fingerprint identification; and/or the number of the groups of groups,
triggering the biological recognition application to perform face recognition.
In some embodiments of the present application, the receiving unit 501 may specifically further include:
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered by pressing a power key; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered by clicking a display screen; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered by plugging and unplugging the USB interface; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, wherein the unlocking instruction is triggered by voice; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered according to the detected preset touch gesture; and/or the number of the groups of groups,
and receiving an unlocking instruction for unlocking the object to be unlocked, which is triggered according to the detected preset motion information.
It should be noted that, for convenience and brevity of description, the specific working process of the unlocking device 500 described above may refer to the corresponding process of the method described in fig. 2 to 4, and will not be described herein again.
As shown in fig. 6, the present application provides a terminal for implementing the above unlocking method, where the terminal may include: a processor 61, a memory 62, one or more input devices 63 (only one shown in fig. 6) and one or more output devices 64 (only one shown in fig. 6). The processor 61, the memory 62, the input device 63 and the output device 64 are connected by a bus 65.
It should be appreciated that in the present embodiment, the processor 61 may be a central processing unit (Central Processing Unit, CPU), which may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input device 63 may include a virtual keyboard, a touch pad, a fingerprint sensor (for collecting fingerprint information of a user and direction information of a fingerprint), a microphone, etc., and the output device 64 may include a display, a speaker, etc.
The memory 62 stores a computer program that is executable on the processor 61, for example, a program of an unlocking method. The steps of the unlocking method embodiment, such as steps 201 to 204 shown in fig. 2, are implemented when the processor 61 executes the computer program. Alternatively, the processor 61 may implement the functions of the units in the above-described apparatus embodiments when executing the above-described computer program, for example, the functions of the units 501 to 504 as shown in fig. 5.
The computer program may be divided into one or more modules/units, which are stored in the memory 62 and executed by the processor 61 to complete the present application. The one or more modules/units may be a series of instruction segments of a computer program capable of performing a specific function, the instruction segments describing the execution of the computer program in the first terminal for unlocking. For example, the above computer program may be divided into a receiving unit, an identifying unit, a listening unit and an unlocking unit, each unit having the following specific functions:
the receiving unit is used for receiving an unlocking instruction for unlocking the object to be unlocked;
the identification unit is used for executing the first operation and the second operation in parallel according to the unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; the locking application is an application for locking and unlocking the object to be unlocked;
the monitoring unit is used for monitoring the biological recognition result of the biological recognition application;
and the unlocking unit is used for executing unlocking operation for unlocking the object to be unlocked by utilizing the locking application if the biological identification result is successful.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
The embodiments of the present application provide a computer program product, which when run on a terminal device, causes the terminal device to execute the steps of the unlocking method in the above embodiments.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus/terminal and method may be implemented in other manners. For example, the apparatus/terminal embodiments described above are merely illustrative, e.g., the division of the modules or units described above is merely a logical functional division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection via interfaces, devices or units, which may be in electrical, mechanical or other forms.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units described above, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the above computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each method embodiment described above. The computer program comprises computer program code, and the computer program code can be in a source code form, an object code form, an executable file or some intermediate form and the like. The computer readable medium may include: any entity or device capable of carrying the computer program code described above, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), an electrical carrier wave signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the content of the computer readable medium described above can be appropriately increased or decreased according to the requirements of the jurisdiction's legislation and the patent practice, for example, in some jurisdictions, the computer readable medium does not include electrical carrier signals and telecommunication signals according to the legislation and the patent practice.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (8)

1. An unlocking method, comprising:
receiving an unlocking instruction for unlocking an object to be unlocked;
executing a first operation and a second operation in parallel according to the unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; the locking application is an application for locking and unlocking the object to be unlocked; wherein the time taken to perform the first operation is less than the time taken to perform the second operation;
monitoring a biological recognition result of the biological recognition application;
if the biological identification result is successful, the unlocking operation for unlocking the object to be unlocked is directly executed by utilizing the locking application;
the waking up the object to be unlocked includes: the system is awakened, so that the system pre-loads a process for displaying the desktop, and the desktop is directly displayed when the locking application monitors that the biological recognition result is successful;
the receiving an unlocking instruction for unlocking the object to be unlocked comprises the following steps: receiving an unlocking instruction for unlocking a screen;
the first operation further includes: and blocking the display screen to be lightened according to the unlocking instruction for unlocking the screen.
2. The unlocking method according to claim 1, characterized by comprising, before the blocking display screen is turned on according to the unlocking instruction for unlocking the screen:
identifying a triggering mode corresponding to the unlocking instruction for unlocking the screen;
the blocking display screen is lightened according to the unlocking instruction for unlocking the screen, and the method comprises the following steps:
and if the triggering mode corresponding to the unlocking instruction for unlocking the screen is a triggering mode capable of blocking the display screen to be lightened, blocking the display screen to be lightened according to the screen unlocking instruction for unlocking the screen.
3. The unlocking method of any one of claims 1-2, wherein the first operation instruction further comprises:
and setting the unlocking interface loaded by the locking application to be in a transparent state.
4. The unlocking method according to any one of claims 1-2, wherein triggering the biometric application for biometric identification comprises:
triggering a biological recognition application to perform iris recognition; and/or the number of the groups of groups,
triggering a biological identification application to carry out fingerprint identification; and/or the number of the groups of groups,
triggering the biological recognition application to perform face recognition.
5. The unlocking method according to any one of claims 1-2, wherein the receiving an unlocking instruction for unlocking an object to be unlocked includes:
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered by pressing a power key; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered by clicking a display screen; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered by plugging and unplugging the USB interface; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, wherein the unlocking instruction is triggered by voice; and/or the number of the groups of groups,
receiving an unlocking instruction for unlocking an object to be unlocked, which is triggered according to the detected preset touch gesture; and/or the number of the groups of groups,
and receiving an unlocking instruction for unlocking the object to be unlocked, which is triggered according to the detected preset motion information.
6. An unlocking device, comprising:
the receiving unit is used for receiving an unlocking instruction for unlocking the object to be unlocked;
the identification unit is used for executing the first operation and the second operation in parallel according to the unlocking instruction; the first operation comprises waking up an object to be unlocked and calling a locking application, and the second operation comprises triggering a biological recognition application to carry out biological recognition; the locking application is an application for locking and unlocking the object to be unlocked; wherein the time taken to perform the first operation is less than the time taken to perform the second operation;
the monitoring unit is used for monitoring the biological recognition result of the biological recognition application;
the unlocking unit is used for directly executing unlocking operation for unlocking the object to be unlocked by utilizing the locking application if the biological identification result is successful;
the waking up the object to be unlocked includes: the system is awakened, so that the system pre-loads a process for displaying the desktop, and the desktop is directly displayed when the locking application monitors that the biological recognition result is successful;
the receiving an unlocking instruction for unlocking the object to be unlocked comprises the following steps: receiving an unlocking instruction for unlocking a screen;
the first operation further includes: and blocking the display screen to be lightened according to the unlocking instruction for unlocking the screen.
7. A terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any one of claims 1 to 5 when the computer program is executed.
8. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 5.
CN201911290640.XA 2019-12-13 2019-12-13 Unlocking method, unlocking device, terminal and computer readable storage medium Active CN111079114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911290640.XA CN111079114B (en) 2019-12-13 2019-12-13 Unlocking method, unlocking device, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911290640.XA CN111079114B (en) 2019-12-13 2019-12-13 Unlocking method, unlocking device, terminal and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111079114A CN111079114A (en) 2020-04-28
CN111079114B true CN111079114B (en) 2023-07-28

Family

ID=70314633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911290640.XA Active CN111079114B (en) 2019-12-13 2019-12-13 Unlocking method, unlocking device, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111079114B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618435A (en) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 Method for achieving remote desktops and remote desktop management system
CN107622191A (en) * 2017-09-08 2018-01-23 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108647058A (en) * 2018-05-15 2018-10-12 维沃移动通信有限公司 A kind of application program launching method and mobile terminal

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105809001B (en) * 2016-03-08 2019-07-16 Oppo广东移动通信有限公司 A kind of unlocking method of screen, device and mobile terminal
CN105740689B (en) * 2016-03-14 2017-11-07 广东欧珀移动通信有限公司 One kind solution lock control method and terminal device
CN106933576B (en) * 2017-02-28 2021-01-08 Oppo广东移动通信有限公司 Terminal unlocking method and device and computer equipment
CN107463819B (en) * 2017-07-14 2020-03-03 Oppo广东移动通信有限公司 Unlocking processing method and related product
CN107451445A (en) * 2017-07-17 2017-12-08 广东欧珀移动通信有限公司 A kind of method of unlocking screen, terminal and storage medium
CN107566650B (en) * 2017-09-12 2020-01-31 Oppo广东移动通信有限公司 Unlocking control method and related product
CN110059464A (en) * 2019-04-16 2019-07-26 努比亚技术有限公司 Terminal puts out screen unlocks method, apparatus, mobile terminal and readable storage medium storing program for executing

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618435A (en) * 2014-12-29 2015-05-13 北京奇虎科技有限公司 Method for achieving remote desktops and remote desktop management system
CN107622191A (en) * 2017-09-08 2018-01-23 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108647058A (en) * 2018-05-15 2018-10-12 维沃移动通信有限公司 A kind of application program launching method and mobile terminal

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Liveness detection for biometric authentication in mobile applications;Z. Akhtar, C. Michelon and G. L. Foresti;2014 International Carnahan Conference on Security Technology (ICCST);1-6 *
基于Android手机的指纹识别技术研究;邱士星;信息科技;20-40 *

Also Published As

Publication number Publication date
CN111079114A (en) 2020-04-28

Similar Documents

Publication Publication Date Title
US11914693B2 (en) Fingerprint recognition method and apparatus, and touchscreen terminal
CN108804006B (en) Unlocking method, device, equipment and storage medium for wearable equipment
CN106355141B (en) Portable electronic device and operation method thereof
CN105654024B (en) Terminal device, fingerprint identification method and fingerprint identification device
JPWO2007119818A1 (en) Function unlocking system, function unlocking method, and function unlocking program
CN105447368A (en) User terminal access right control method and user terminal
US20190130411A1 (en) Method and system for data processing
US20180046848A1 (en) Method of recognizing fingerprints, apparatus and terminal devices
CN107015745B (en) Screen operation method and device, terminal equipment and computer readable storage medium
WO2018213946A1 (en) Image recognition method, image recognition device, electronic device, and computer storage medium
CN109164972B (en) Control method, control device and mobile terminal
CN105138881A (en) Screen locking method and device
CN111489290A (en) Face image super-resolution reconstruction method and device and terminal equipment
CN107368255B (en) Unlocking method, mobile terminal and computer readable storage medium
CN107194232A (en) Solve lock control method, device, computer installation and computer-readable recording medium
CN112989888A (en) Fingerprint anti-counterfeiting method and electronic equipment
CN111079114B (en) Unlocking method, unlocking device, terminal and computer readable storage medium
CN110287861B (en) Fingerprint identification method and device, storage medium and electronic equipment
CN106845197A (en) A kind of fingerprint identification method and device
CN111641751B (en) Screen unlocking method and device of terminal equipment, terminal equipment and storage medium
CN112417429A (en) Security verification method and device, electronic equipment and storage medium
CN105740692B (en) A kind of unlocking method and terminal
CN106529263A (en) Terminal unlocking method and terminal
CN110704819B (en) Unlocking method and device of intelligent terminal, storage medium and electronic device
CN109426712A (en) Unlocked by fingerprint method, apparatus and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant