CN111814125A - Terminal unlocking method, processing terminal and storage device - Google Patents

Terminal unlocking method, processing terminal and storage device Download PDF

Info

Publication number
CN111814125A
CN111814125A CN201910296050.1A CN201910296050A CN111814125A CN 111814125 A CN111814125 A CN 111814125A CN 201910296050 A CN201910296050 A CN 201910296050A CN 111814125 A CN111814125 A CN 111814125A
Authority
CN
China
Prior art keywords
terminal
face information
unlocked
unlocking
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910296050.1A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qiku Internet Technology Shenzhen Co Ltd filed Critical Qiku Internet Technology Shenzhen Co Ltd
Priority to CN201910296050.1A priority Critical patent/CN111814125A/en
Publication of CN111814125A publication Critical patent/CN111814125A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The application discloses a terminal unlocking method, a processing terminal and a storage device. The method comprises the following steps: the terminal to be unlocked sends an unlocking request to the remote terminal; receiving face information to be verified sent by the remote terminal in response to the unlocking request; matching the face information to be verified with preset face information; and if the matching is successful, unlocking the terminal to be unlocked. According to the scheme, the face information is obtained through the remote terminal, and the terminal to be unlocked is unlocked according to the face information.

Description

Terminal unlocking method, processing terminal and storage device
Technical Field
The present application relates to the field of terminal unlocking, and in particular, to a method for unlocking a terminal, a processing terminal, and a storage device.
Background
With the rapid development of the artificial intelligence technology, in order to improve the rapidness and the safety of terminal unlocking, unlocking methods such as face recognition are generally adopted to unlock the terminal.
In the prior art, when a terminal needs to be unlocked, but a terminal owner is not beside the terminal, if other people need to use the terminal, the terminal cannot be unlocked because the terminal cannot acquire face information of the terminal owner, and the terminal cannot be unlocked even if other people obtain the owner's consent.
Disclosure of Invention
The application aims to provide a terminal unlocking method, a terminal and a storage device, wherein the method can acquire face information through a remote terminal to unlock a terminal to be unlocked remotely, so that the aim of unlocking the face when a person is not beside the terminal to be unlocked can be fulfilled.
To achieve the above object, an aspect of the present application provides a method for unlocking a terminal, including:
the terminal to be unlocked sends an unlocking request to the remote terminal;
receiving face information to be verified sent by the remote terminal in response to the unlocking request;
matching the face information to be verified with preset face information;
and if the matching is successful, unlocking the terminal to be unlocked.
To achieve the above object, an aspect of the present application provides a method for unlocking a terminal, including:
the remote terminal receives an unlocking request sent by a terminal to be unlocked;
acquiring face information to be verified;
and sending the face information to be verified to the unlocking terminal so that the unlocking terminal unlocks when judging that the face information to be verified is successfully matched with the first preset face information.
To achieve the above object, an aspect of the present application provides a processing terminal, including: a processor and a memory coupled to each other;
the memory is used for storing computer instructions executed by the processor;
the processor is used for executing the computer instructions to realize the method.
To achieve the above object, one aspect of the present application provides a storage device storing computer instructions executable to implement the above method.
Has the advantages that: different from the situation of the prior art, the terminal to be unlocked sends an unlocking request to the remote terminal; receiving face information to be verified sent by the remote terminal in response to the unlocking request; matching the face information to be verified with preset face information; and if the matching is successful, unlocking the terminal to be unlocked. According to the method and the device, the face information can be acquired from the remote terminal, the terminal to be unlocked is unlocked remotely according to the face information, the purpose that people can unlock the face without the terminal to be unlocked is achieved, and therefore the safety and the use flexibility of the terminal are improved.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of a terminal unlocking method according to the present application;
fig. 2 is a schematic flowchart of a second embodiment of a terminal unlocking method according to the present application;
fig. 3 is a flowchart illustrating a terminal unlocking method according to a third embodiment of the present application;
fig. 4 is a schematic flowchart of a fourth embodiment of a terminal unlocking method according to the present application;
FIG. 5 is a schematic structural diagram of an embodiment of a processing terminal according to the present application;
FIG. 6 is a schematic structural diagram of an embodiment of a memory device according to the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, interfaces, techniques, etc. in order to provide a thorough understanding of the present application.
The terms "system" and "network" are often used interchangeably herein. The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the terms "first," "second," and the like, herein are used to distinguish similar or identical items of association. Further, the term "plurality" herein means two or more than two.
Embodiments of a method for unlocking a terminal and a related device thereof according to the present application are described in detail below.
Referring to fig. 1, fig. 1 is a flowchart illustrating a terminal to be unlocked as an execution main body according to a first embodiment of the terminal unlocking method, where the terminal to be unlocked may be a mobile terminal such as a laptop, a palm computer, a personal digital assistant, a portable media player, a navigation device, a wearable device, a pedometer, or a fixed terminal such as a digital television, a desktop computer, or the like. The method may comprise the steps of:
step S111: and the terminal to be unlocked sends an unlocking request to the remote terminal.
And when the terminal to be unlocked monitors the unlocking operation, generating an unlocking request according to the unlocking operation, and sending the unlocking request to the remote terminal. The unlocking request can only comprise an unlocking request instruction, or comprise the unlocking request instruction and the face information acquired by the terminal to be unlocked. The remote terminal may be a wearable device, such as a smart watch or a smart bracelet, etc.
Step S112: and receiving the face information to be verified sent by the remote terminal in response to the unlocking request.
The face information at least comprises a face image and the like.
The remote terminal responds to an unlocking request sent by the terminal to be unlocked, generates face information to be verified and sends the face information to be verified to the terminal to be unlocked.
Specifically, in an embodiment, the face information to be verified is obtained by shooting the user by the remote terminal, that is, the remote terminal takes the instant face information of the user as the face information to be verified and sends the face information to the terminal to be unlocked, so that the terminal to be unlocked verifies the face information. For example, the remote terminal device includes an image sensor such as a camera, and the remote terminal acquires face information of the user through the camera and sends the face information to the terminal to be unlocked.
In one embodiment, the remote terminal takes the face information stored in advance as the face information to be verified, and sends the face information to the terminal to be unlocked. For example, the remote terminal acquires face information through a camera or from other terminal equipment, stores the face information, and sends the pre-stored face information to the terminal to be unlocked when the remote terminal receives an unlocking request of the terminal to be unlocked.
In one embodiment, the face information to be verified is sent to the terminal to be unlocked when the remote terminal determines that the remote terminal user has the unlocking right based on the first face information of the remote terminal user. For example, after the remote terminal acquires the first face information of the user through a camera or from a pre-stored image, matching the face information with preset face information to determine whether the user has an unlocking right; if the remote terminal equipment judges that the user has the unlocking authority, the first face information is used as the face information to be verified and sent to the terminal to be unlocked so as to unlock the terminal to be unlocked; and if the remote terminal equipment judges that the user has no unlocking authority, the first face information is not sent to the terminal to be unlocked so as to forbid unlocking of the unlocking terminal.
In one embodiment, the face information to be verified is sent to the terminal to be unlocked when the remote terminal determines that the terminal user to be unlocked has the unlocking right based on the second face information of the terminal user to be unlocked. For example, when the remote terminal receives an unlocking request of the terminal to be unlocked, a control instruction is generated according to the unlocking request and is sent to the terminal to be unlocked, the terminal to be unlocked obtains second face information of the terminal user to be unlocked according to the control instruction, the terminal to be unlocked sends the second face information to the remote terminal, and the remote terminal can determine whether the terminal user to be unlocked has unlocking permission according to the method; if the remote terminal equipment judges that the terminal user to be unlocked has the unlocking authority, acquiring the face information to be verified, and sending the face information to be verified to the terminal to be unlocked to unlock the terminal to be unlocked, wherein the manner of acquiring the face information to be verified can be shooting through a camera or acquiring from a pre-stored image; and if the remote terminal equipment judges that the terminal user to be unlocked has no unlocking authority, the face information to be verified is not sent to the terminal to be unlocked so as to forbid unlocking the terminal.
Step S113: and matching the face information to be verified with the preset face information.
Optionally, the terminal to be unlocked may refine the face information to be verified through a built-in automatic amplification function to obtain the face contour information to be verified, and compare the face contour information to be verified with the pre-stored face contour information to determine whether the face contour information to be verified matches with the pre-stored face contour information, if so, the face information to be verified is considered to match with the pre-stored face information; if not, the face information to be verified is continuously compared with the contour information of the next pre-stored face in the mode until the contour information of the last pre-stored face is obtained, and matching is finished.
Step S114: and if the matching is successful, unlocking the terminal to be unlocked.
And if the face information to be verified is successfully matched with the preset face information, unlocking the terminal to be unlocked. And if the matching of the face information to be verified and the preset face information fails, forbidding unlocking the terminal to be unlocked.
Different from the prior art, the embodiment discloses a method for unlocking a remote terminal by taking a terminal to be unlocked as an execution main body, and specifically, the terminal to be unlocked sends an unlocking request to the remote terminal, receives face information to be verified sent by the remote terminal in response to the unlocking request, matches the face information to be verified with preset face information, and unlocks the terminal to be unlocked if matching is successful. According to the scheme of the embodiment, the terminal to be unlocked can be unlocked through the remote terminal, the purpose that people can unlock the human face without the terminal to be unlocked is achieved, and therefore the safety and the use flexibility of the terminal can be improved.
On the other hand, referring to fig. 2, fig. 2 is a flowchart illustrating a second embodiment of the terminal unlocking method according to the present application. This embodiment uses remote terminal as the execution subject, and remote terminal can be wearable equipment such as intelligent wrist-watch or intelligent bracelet. The method may comprise the steps of:
step S121: the remote terminal receives an unlocking request sent by the terminal to be unlocked.
When the terminal to be unlocked monitors the unlocking operation, an unlocking request is generated according to the unlocking operation, the unlocking request is sent to the remote terminal, and the remote terminal receives the unlocking request sent by the terminal to be unlocked. The unlocking request can only comprise an unlocking request instruction, or comprise the unlocking request instruction and the face information acquired by the terminal to be unlocked.
Step S122: and acquiring the face information to be verified.
The remote terminal responds to an unlocking request sent by the terminal to be unlocked and generates face information to be verified.
Specifically, in an embodiment, the remote terminal may use first face information obtained by currently shooting a remote terminal user as the face information to be verified. For a specific method, reference may be made to the above embodiments, which are not described herein again.
In an embodiment, the remote terminal may further obtain second preset face information of the remote terminal, so as to serve as the face information to be verified. For a specific method, reference may be made to the above embodiments, which are not described herein again.
Step S123: and sending the face information to be verified to the unlocking terminal so that the unlocking terminal can unlock when the face information to be verified is successfully matched with the first preset face information.
The remote terminal sends the face information to be verified to the unlocking terminal, so that the unlocking terminal is unlocked when the face information to be verified is successfully matched with the first preset face information.
The method for matching the face information of the terminal to be unlocked can refer to the above embodiments, which are not described herein.
When the terminal to be unlocked judges that the face information to be verified is successfully matched with the preset face information, an unlocking instruction is generated, and unlocking is carried out according to the unlocking instruction; and when the terminal to be unlocked judges that the matching of the face information to be verified and the preset face information fails, no unlocking instruction is generated to forbid unlocking.
Different from the prior art, the embodiment discloses a method for unlocking a remote terminal by taking the remote terminal as an execution main body, and specifically, the remote terminal receives an unlocking request sent by a terminal to be unlocked, acquires face information to be verified, and sends the face information to be verified to the unlocking terminal, so that the terminal to be unlocked performs unlocking when the face information to be verified is successfully matched with first preset face information. According to the scheme of the embodiment, the terminal to be unlocked can be unlocked through the remote terminal, the purpose that people can unlock the human face without the terminal to be unlocked is achieved, and therefore the safety and the use flexibility of the terminal can be improved.
The present application further proposes a terminal unlocking method of a third embodiment, as shown in fig. 3, the method of the present embodiment includes the following steps:
step S131: the remote terminal receives an unlocking request sent by the terminal to be unlocked.
Step S131 is similar to step S121 and is not described in detail here.
Step S132: shooting a current remote terminal user to obtain first face information.
The remote terminal equipment is provided with an image sensor such as a camera, and the remote terminal acquires face information of a user through the camera, or acquires the face information through a pre-stored face image in the photo album or from other terminal equipment.
Step S133: and judging whether the remote terminal user has the authority or not based on the first face information. If yes, go to step S134; if not, the face information to be verified is not sent, and the subsequent steps are not executed, and the process is finished directly.
Whether the remote terminal user has the authority is judged through the first face information obtained in the step S132, specifically, the remote terminal determines whether the remote terminal user has the authority to use the unlocking terminal according to the first face information, and if the user has the authority, the face information to be verified is obtained. The remote terminal compares the first face information of the user with the face information of the pre-stored user with authority with the face information of the remote terminal user, and if the first face information of the user is the same as the face information of the pre-stored user with authority or the similarity is greater than the preset similarity, the remote terminal judges that the user has the authority; further, the remote terminal can also identify physiological information of the remote terminal user from the first face information, and acquire a health state of the terminal user according to the physiological characteristics, for example, if the physiological information of the user meets preset physiological information, it is determined that the remote terminal user has the authority, and if the physiological information of the user does not meet the preset physiological information, it is determined that the remote terminal user does not have the authority.
Step S134: and acquiring the face information to be verified.
Step S134 is similar to step S122 and is not described in detail here.
Step S135: and sending the face information to be verified to the unlocking terminal so that the unlocking terminal can unlock when the face information to be verified is successfully matched with the first preset face information.
Step S135 is similar to step S123 and is not described here.
Different from the prior art, in this embodiment, after the step of receiving, by the remote terminal, the unlocking request sent by the terminal to be unlocked and before the step of obtaining the face information to be verified, it is further determined, based on the first face information, whether the remote terminal user has the right, so as to determine whether to send the verified face information to the terminal to be unlocked. According to the method and the device, whether the remote terminal user has the authority or not is judged, the unlocking authority is further limited and screened, and therefore the safety and the use flexibility of the terminal can be further improved.
The present application further proposes a terminal unlocking method of a fourth embodiment, as shown in fig. 4, the method of the present embodiment includes the following steps:
step S141: the remote terminal receives an unlocking request sent by the terminal to be unlocked.
Step S141 is similar to step S121 and is not described in detail here.
Step S142: and acquiring second face information of the terminal user to be unlocked.
And analyzing the unlocking request to obtain second face information. The remote terminal sends a shooting instruction to the terminal to be unlocked, the unlocking terminal acquires second face information under the control of the shooting instruction, and the remote terminal acquires the second face information from the unlocking terminal, namely the second face information is obtained by shooting the terminal to be unlocked by a user of the terminal to be unlocked in response to the shooting instruction.
Step S143: and judging whether the terminal user to be unlocked has the authority or not based on the second face information. If yes, go to step S144. If not, the face information to be verified is not sent, and the subsequent steps are not executed, and the process is finished directly.
And judging whether the terminal user to be unlocked has the authority or not through the second face information acquired in the step S142. The authentication method for the terminal user to be unlocked is similar to the authentication method for the remote user in step S133, and is not described herein again.
Step S144: and acquiring the face information to be verified.
Step S144 is similar to step S122 and is not described in detail here.
Step S145: and sending the face information to be verified to the unlocking terminal so that the unlocking terminal can unlock when the face information to be verified is successfully matched with the first preset face information.
Step S145 is similar to step S123 and is not described herein.
Further, the present application further includes the following fifth, sixth, and seventh embodiments:
in a fifth embodiment of the present application, the terminal unlocking method includes the steps of: the unlocking terminal sends an unlocking request to the remote terminal; the remote terminal receives the unlocking request and acquires the face information of the user A through the remote terminal; the remote terminal sends the face information of the user A as the face information to be verified to the unlocking terminal; the unlocking terminal matches the face information of the user A with preset face information; and if the matching is successful, unlocking the unlocking terminal. The mode of the remote terminal for acquiring the face information of the user A can be that the camera is started to directly acquire the face information of the user A or the prestored face information is called from the memory.
In a sixth embodiment of the present application, the terminal unlocking method may include the steps of: the unlocking terminal sends an unlocking request to the remote terminal, the remote terminal receives the unlocking request and sends a control instruction to the unlocking terminal, the unlocking terminal starts the image sensor according to the control instruction, the unlocking terminal acquires face information of a user B through the image sensor and sends the face information to the remote terminal, the remote terminal determines whether the user B has the authority to use the unlocking terminal according to the face information, if the user B has the authority, the remote terminal sends the face information of the user C to the unlocking terminal as the face information to be verified, the unlocking terminal matches the face information with the preset face information, and if the matching is successful, the unlocking terminal is unlocked. The method for judging the authority of the user B can be that the face information of the user B is compared with the face information of a pre-stored user with authority, if the comparison is successful, certain physiological information of the face of the user B, such as age information and eyesight information of the user B, is further identified, and then whether the user B has the authority is judged according to preset physiological information of a remote terminal, such as binocular vision of more than 5.0, age of more than 15 years and the like. The preset physiological information can be set by the user. If the comparison is successful and the preset physiological information is met, the user B is determined to have the authority, otherwise, the user B is determined to have no authority.
Further, in the present embodiment, the face information of the users B and C can be obtained by directly shooting with a camera of the remote terminal or obtaining from a face image pre-stored in the remote terminal, as in the fifth embodiment.
Further, the step of sending an unlocking request to the remote terminal by the unlocking terminal, receiving the unlocking request by the remote terminal, sending a control instruction to start the image sensor of the unlocking terminal, acquiring the face information of the user B by the unlocking terminal, and sending the face information to the remote terminal can be replaced by the step of directly adding the face information to be sent by the unlocking terminal to the unlocking request by the unlocking terminal for packaging and sending, so that the interactive steps can be effectively reduced, and the unlocking efficiency is improved.
In a seventh embodiment of the present application, the terminal unlocking method may further include: the unlocking terminal sends an unlocking request to the remote terminal, the remote terminal receives the unlocking request and obtains face information of the user D through the remote terminal, the remote terminal judges whether the user D has authority according to the face information, if the user D has the authority, the face information to be verified is sent to the unlocking terminal, and the face information to be verified can be a face image of the user D obtained by directly calling a camera to shoot or other pre-stored face image information. And the unlocking terminal matches the face information with preset face information, and if the matching is successful, the unlocking terminal is unlocked. The authentication method for the user D is the same as that for the user B in the sixth embodiment, and details are not repeated here.
Further, please refer to fig. 5, fig. 5 is a schematic structural diagram of an embodiment of the processing terminal according to the present application. As shown in fig. 5, the processing terminal 20 of the present embodiment includes a memory 201 and a processor 202.
Wherein, the memory 201 stores therein computer instructions executable to implement the above-mentioned terminal unlocking method. The processor 202 is configured to execute computer instructions stored by the memory 201 to implement the above-described methods.
Further, the processing terminal 20 is a wearable device.
Further, please refer to fig. 6, fig. 6 is a schematic structural diagram of an embodiment of a memory device according to the present application. As shown in fig. 6, the storage device 30 of the present embodiment stores executable computer instructions 301, and the computer instructions 301 are executed by the processor 202 to execute the computer instructions stored in the memory 201 to implement the method.
The storage device 30 may be a medium that can store program instructions, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, or may be a server that stores the computer instructions, and the server may send the stored computer instructions to other devices for operation, or may self-operate the stored computer instructions. The storage device 30 may be the memory 201 shown in fig. 5.
Different from the situation of the prior art, the terminal to be unlocked sends an unlocking request to the remote terminal; receiving face information to be verified sent by a remote terminal in response to an unlocking request; matching the face information to be verified with preset face information; and if the matching is successful, unlocking the terminal to be unlocked. According to the method and the device, the face information can be acquired from the remote terminal, the terminal to be unlocked is unlocked remotely according to the face information, the purpose that people can unlock the face without the terminal to be unlocked is achieved, and therefore the safety and the use flexibility of the terminal are improved.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a module or a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.
In addition, functional units in various embodiments of the present application may be integrated into one processing unit, or various units may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are merely examples and are not intended to limit the scope of the present disclosure, and all modifications, equivalents, and flow charts using the contents of the specification and drawings of the present disclosure or those directly or indirectly applied to other related technical fields are intended to be included in the scope of the present disclosure.

Claims (10)

1. A terminal unlocking method is characterized by comprising the following steps:
the terminal to be unlocked sends an unlocking request to the remote terminal;
receiving face information to be verified sent by the remote terminal in response to the unlocking request;
matching the face information to be verified with preset face information;
and if the matching is successful, unlocking the terminal to be unlocked.
2. The method according to claim 1, wherein the face information to be verified is obtained by shooting a user of the remote terminal by the remote terminal or is preset by the remote terminal; and/or
The face information to be verified is sent to the terminal to be unlocked when the remote terminal determines that the remote terminal user has unlocking right based on the first face information of the remote terminal user; or the face information to be verified is sent to the terminal to be unlocked when the remote terminal determines that the terminal user to be unlocked has the unlocking right based on the second face information of the terminal user to be unlocked.
3. A terminal unlocking method is characterized by comprising the following steps:
the remote terminal receives an unlocking request sent by a terminal to be unlocked;
acquiring face information to be verified;
and sending the face information to be verified to the unlocking terminal so that the unlocking terminal unlocks when judging that the face information to be verified is successfully matched with the first preset face information.
4. The method according to claim 3, wherein the step of obtaining the face information to be verified comprises:
taking the first face information obtained by shooting the remote terminal user at present as the face information to be verified; or
And acquiring second preset face information of the remote terminal to serve as the face information to be verified.
5. The method according to claim 3, wherein before the step of obtaining the face information to be verified, the method further comprises:
shooting a current remote terminal user to obtain first face information;
judging whether the remote terminal user has the authority or not based on the first face information;
and if so, executing the acquisition of the face information to be verified.
6. The method according to claim 3, wherein before the step of obtaining the face information to be verified, the method further comprises:
acquiring second face information of a terminal user to be unlocked;
judging whether the terminal user to be unlocked has the authority or not based on the second face information;
and if so, executing the acquisition of the face information to be verified.
7. The method of claim 6, wherein the obtaining second face information of the end user to be unlocked comprises:
analyzing the unlocking request to obtain second face information, wherein the second face information is obtained by shooting the terminal to be unlocked by a terminal user to be unlocked; or
And sending a shooting instruction to the terminal to be unlocked, and receiving second face information, wherein the second face information is obtained by shooting the terminal to be unlocked by a terminal user to be unlocked in response to the shooting instruction.
8. A processing terminal, comprising: a processor and a memory coupled to each other;
the memory is used for storing computer instructions executed by the processor;
the processor is configured to execute the computer instructions to implement the method of any one of claims 1 to 2 or to implement the method of any one of claims 3 to 7.
9. The processing terminal of claim 8, comprising: the processing terminal is a wearable device.
10. A memory device, comprising:
the storage device stores computer instructions;
the computer instructions are executable to implement the method of any one of claims 1 to 2 or to implement the method of any one of claims 3 to 7.
CN201910296050.1A 2019-04-12 2019-04-12 Terminal unlocking method, processing terminal and storage device Pending CN111814125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910296050.1A CN111814125A (en) 2019-04-12 2019-04-12 Terminal unlocking method, processing terminal and storage device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910296050.1A CN111814125A (en) 2019-04-12 2019-04-12 Terminal unlocking method, processing terminal and storage device

Publications (1)

Publication Number Publication Date
CN111814125A true CN111814125A (en) 2020-10-23

Family

ID=72844550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910296050.1A Pending CN111814125A (en) 2019-04-12 2019-04-12 Terminal unlocking method, processing terminal and storage device

Country Status (1)

Country Link
CN (1) CN111814125A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023142748A1 (en) * 2022-01-26 2023-08-03 Oppo广东移动通信有限公司 Device unlocking method and apparatus, electronic device and computer-readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN103646451A (en) * 2013-12-05 2014-03-19 南京理工大学连云港研究院 Smart phone electronic door lock system and method for realizing smart phone electronic door lock
CN105100094A (en) * 2015-07-15 2015-11-25 广东欧珀移动通信有限公司 Unlocking control methods, terminal and server
CN105357382A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Remote unlocking method and device
CN105471890A (en) * 2015-12-24 2016-04-06 小米科技有限责任公司 Unlocking method based on wearable device, apparatus and system
CN105847589A (en) * 2016-05-19 2016-08-10 北京百度网讯科技有限公司 Unlocking control method, device and system
CN105915336A (en) * 2016-05-24 2016-08-31 珠海市魅族科技有限公司 Object cooperative decryption method and device thereof
CN106790972A (en) * 2016-11-17 2017-05-31 深圳市金立通信设备有限公司 A kind of unlocking method and terminal
CN107318055A (en) * 2017-08-16 2017-11-03 广东小天才科技有限公司 A kind of unlocking screen method and device of mobile terminal
CN107426393A (en) * 2017-07-13 2017-12-01 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN108985047A (en) * 2018-06-28 2018-12-11 努比亚技术有限公司 A kind of unlocking method, terminal, wearable device and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102930188A (en) * 2012-10-12 2013-02-13 中兴通讯股份有限公司南京分公司 Screen unlocking method and device as well as terminal
CN103646451A (en) * 2013-12-05 2014-03-19 南京理工大学连云港研究院 Smart phone electronic door lock system and method for realizing smart phone electronic door lock
CN105100094A (en) * 2015-07-15 2015-11-25 广东欧珀移动通信有限公司 Unlocking control methods, terminal and server
CN105357382A (en) * 2015-10-28 2016-02-24 广东欧珀移动通信有限公司 Remote unlocking method and device
CN105471890A (en) * 2015-12-24 2016-04-06 小米科技有限责任公司 Unlocking method based on wearable device, apparatus and system
CN105847589A (en) * 2016-05-19 2016-08-10 北京百度网讯科技有限公司 Unlocking control method, device and system
CN105915336A (en) * 2016-05-24 2016-08-31 珠海市魅族科技有限公司 Object cooperative decryption method and device thereof
CN106790972A (en) * 2016-11-17 2017-05-31 深圳市金立通信设备有限公司 A kind of unlocking method and terminal
CN107426393A (en) * 2017-07-13 2017-12-01 广东欧珀移动通信有限公司 Solve lock control method and Related product
CN107318055A (en) * 2017-08-16 2017-11-03 广东小天才科技有限公司 A kind of unlocking screen method and device of mobile terminal
CN108985047A (en) * 2018-06-28 2018-12-11 努比亚技术有限公司 A kind of unlocking method, terminal, wearable device and computer readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023142748A1 (en) * 2022-01-26 2023-08-03 Oppo广东移动通信有限公司 Device unlocking method and apparatus, electronic device and computer-readable storage medium

Similar Documents

Publication Publication Date Title
US10205883B2 (en) Display control method, terminal device, and storage medium
US20210286870A1 (en) Step-Up Authentication
CN105468950B (en) Identity authentication method and device, terminal and server
KR101773233B1 (en) Managing method for repeating fail of biometric recognition
CN108986245A (en) Work attendance method and terminal based on recognition of face
US11676118B2 (en) Methods and systems for conducting multi-user interactions on a device using biometric authentication
KR102401194B1 (en) Method and apparatus for authenticating a user using an electrocardiogram signal
CN107145772B (en) Terminal equipment security control method and device and terminal equipment
WO2021000922A1 (en) Personal identification method and device
CN109819114B (en) Screen locking processing method and device, electronic equipment and storage medium
US11682235B2 (en) Iris authentication device, iris authentication method and recording medium
CN105184133B (en) A kind of method for authenticating, device and corresponding mobile terminal
JP6267025B2 (en) Communication terminal and communication terminal authentication method
KR20190070179A (en) Device and method to register user
CN108875549B (en) Image recognition method, device, system and computer storage medium
CN110826410B (en) Face recognition method and device
CN107437016B (en) Application control method and related product
CN109816543B (en) Image searching method and device
CN111814125A (en) Terminal unlocking method, processing terminal and storage device
WO2016062200A1 (en) Fingerprint authentication method and apparatus, and server
CN107786349B (en) Security management method and device for user account
US10956604B2 (en) Electronic device and operation method thereof
US20180019996A1 (en) Authentication device, authentication system, authentication method, and storage medium
CN106470106B (en) Terminal information display method and device
JP2004126698A (en) Individual authentication system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination