CN116193020B - Mobile phone screen unlocking method and system - Google Patents

Mobile phone screen unlocking method and system Download PDF

Info

Publication number
CN116193020B
CN116193020B CN202310469803.0A CN202310469803A CN116193020B CN 116193020 B CN116193020 B CN 116193020B CN 202310469803 A CN202310469803 A CN 202310469803A CN 116193020 B CN116193020 B CN 116193020B
Authority
CN
China
Prior art keywords
unlocking
mobile phone
instruction
information
unlocking instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310469803.0A
Other languages
Chinese (zh)
Other versions
CN116193020A (en
Inventor
徐生奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Zhihui Space Technology Co ltd
Original Assignee
Hefei Zhihui Space Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Zhihui Space Technology Co ltd filed Critical Hefei Zhihui Space Technology Co ltd
Priority to CN202310469803.0A priority Critical patent/CN116193020B/en
Publication of CN116193020A publication Critical patent/CN116193020A/en
Application granted granted Critical
Publication of CN116193020B publication Critical patent/CN116193020B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72463User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
    • H04M1/724631User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72454User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application is applicable to the technical field of mobile phone unlocking, and provides a mobile phone screen unlocking method and a mobile phone screen unlocking system, wherein the method comprises the following steps: receiving juvenile unlocking setting information, wherein the juvenile unlocking setting information comprises juvenile unlocking verification information and open software information; receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors; and receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.

Description

Mobile phone screen unlocking method and system
Technical Field
The application relates to the technical field of mobile phone unlocking, in particular to a mobile phone screen unlocking method and system.
Background
Mobile terminals such as smart phones and the like have higher popularity, so that not only adults, but also more and more minors cannot leave the mobile phones in daily life, and many minors can use the mobile phones of parents for entertainment, even if the parents are not aware of the mobile phones, the parents use the mobile phones for a long time, and are enthusiastically in mobile phone games, so that physical and mental health is not facilitated; in addition, in order to be convenient for use, a plurality of parents can set some mobile phone software to be free from paying, and when minors use the mobile phone software, abnormal consumption can be caused, so that the loss is brought to the parents. Therefore, there is a need to provide a method and a system for unlocking a mobile phone screen, which aim to solve the above problems.
Disclosure of Invention
Aiming at the defects existing in the prior art, the application aims to provide a mobile phone screen unlocking method and system so as to solve the problems existing in the background art.
The application is realized in such a way that a mobile phone screen unlocking method comprises the following steps:
receiving juvenile unlocking setting information, wherein the juvenile unlocking setting information comprises juvenile unlocking verification information and open software information;
receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
and receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used.
As a further scheme of the application: the step of receiving the second unlocking instruction and verifying the second unlocking instruction specifically comprises the following steps:
receiving a second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than a set time difference value, and executing the next step when the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference value;
and verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, passing the verification, wherein the unlocking information of the mobile phone owner is stored in the mobile phone.
As a further scheme of the application: the method further comprises the steps of:
receiving a global opening instruction and generating unlocking verification information of a mobile phone owner;
receiving a mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used;
and receiving a non-global opening instruction, wherein only software in the opening software information can be normally used.
As a further scheme of the application: the method further comprises the steps of:
when the second unlocking instruction passes verification, timing is carried out, and the minors unlocking setting information further comprises a using time threshold;
when the timing time reaches a use time threshold, generating a mobile phone owner unlocking popup window, wherein the display time of the mobile phone owner unlocking popup window is N seconds, and N is a fixed value;
when the unlocking instruction of the mobile phone owner is received within N seconds, the software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
As a further scheme of the application: the unlocking verification information of the minors comprises face information or fingerprint information of one or more minors, and the open software information comprises one or more software names.
Another object of the present application is to provide a mobile phone screen unlocking system, which includes:
the minous unlocking setting module is used for receiving minous unlocking setting information, wherein the minous unlocking setting information comprises minous unlocking verification information and open software information;
the first unlocking instruction module is used for receiving the first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of the mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
and the second unlocking instruction module is used for receiving the second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein only the software in the open software information can be normally used.
As a further scheme of the application: the second unlocking instruction module comprises:
an unlocking time difference judging unit for receiving the second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference, and executing the step in the second unlocking instruction verifying unit when the time difference is smaller than the set time difference;
and the second unlocking instruction verification unit is used for verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, verifying and passing, wherein the mobile phone is stored with the unlocking information of the mobile phone owner.
As a further scheme of the application: the system also comprises a mobile phone global opening module, and the mobile phone global opening module specifically comprises:
the mobile phone host unlocking verification system comprises a global opening instruction receiving unit, a global opening instruction processing unit and a global opening instruction processing unit, wherein the global opening instruction receiving unit is used for receiving a global opening instruction and generating mobile phone host unlocking verification information;
the mobile phone unlocking instruction receiving unit is used for receiving the mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used;
and the non-global open instruction receiving unit is used for receiving the non-global open instruction, and only software in the open software information can be normally used.
As a further scheme of the application: the system also comprises a minor use timing module, wherein the minor use timing module specifically comprises:
the minors use the timing unit, when the second unlocking instruction is verified, timing is carried out, and the minors unlocking setting information also comprises a use time threshold;
the mobile phone unlocking popup generating unit is used for generating a mobile phone owner unlocking popup when the timing time reaches a use time threshold, wherein the display time of the mobile phone owner unlocking popup is N seconds, and N is a fixed value;
the mobile phone continues to use the judging unit, and when an unlocking instruction of the mobile phone owner is received within N seconds, the mobile phone is used for opening the software in the software information and can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
Compared with the prior art, the application has the beneficial effects that:
according to the application, through the unlocking setting of the minors, the first unlocking instruction input by the child is received, the first unlocking instruction is judged, and when the first unlocking instruction belongs to the unlocking verification information of the minors, the secondary unlocking verification information of the mobile phone owner is generated; and then receiving a second unlocking instruction input by the parents, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
Drawings
FIG. 1 is a flow chart of a method for unlocking a mobile phone screen;
FIG. 2 is a flowchart for verifying a second unlocking instruction in a mobile phone screen unlocking method;
FIG. 3 is a flowchart of a method for unlocking a mobile phone screen to receive a global open command;
FIG. 4 is a flowchart of generating a mobile phone owner unlocking popup window when the counted time reaches the use time threshold in a mobile phone screen unlocking method;
fig. 5 is a schematic structural diagram of a mobile phone screen unlocking system;
fig. 6 is a schematic structural diagram of a second unlocking instruction module in the mobile phone screen unlocking system;
fig. 7 is a schematic structural diagram of a global mobile phone opening module in a mobile phone screen unlocking system;
fig. 8 is a schematic structural diagram of a minor use timing module in a mobile phone screen unlocking system.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clear, the present application will be described in further detail with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Specific implementations of the application are described in detail below in connection with specific embodiments.
As shown in fig. 1, an embodiment of the present application provides a method for unlocking a mobile phone screen, including the following steps:
s100, receiving unlocking setting information of minors, wherein the unlocking setting information of the minors comprises unlocking verification information of the minors and open software information;
s200, receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
and S300, receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used.
It should be noted that mobile terminals such as smart phones have higher popularity, so that not only adults, but also more and more minors cannot leave the mobile phones in daily life, and many minors can use the mobile phones of parents for entertainment, even if the parents are unaware, the mobile phones are used for a long time and are addicted to mobile phone games, and physical and mental health is not facilitated; in addition, in order to facilitate the use, a lot of parents can set some mobile phone software to be free of secret payment, and when minors use the mobile phone software, abnormal consumption can be caused, so that the parents are lost.
In the embodiment of the application, a parent is required to open a mobile phone to perform related setting of unlocking the mobile phone by the minors, specifically, minors unlocking setting information is required to be input, the minors unlocking setting information comprises minors unlocking verification information and open software information, the minors unlocking verification information comprises face information or fingerprint information of one or more minors, preferably, the face information or the fingerprint information of a child of the child, the mobile phone stores the face information and the fingerprint information, the open software information comprises one or more software names, preferably, the open software information does not comprise payment software and game software unsuitable for the child. When children need to use parents' mobile phones to entertain, fingerprint identification or face recognition is carried out, the mobile phones will receive first unlocking instructions, the first unlocking instructions can be automatically judged, when the first unlocking instructions belong to unlocking verification information of minors, secondary unlocking verification information of the mobile phone owners is generated, parents are required to verify and unlock, the parents need to input the second unlocking instructions to verify the second unlocking instructions, after verification is passed, the mobile phones are successfully unlocked, but only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
As shown in fig. 2, as a preferred embodiment of the present application, the step of receiving the second unlock instruction and verifying the second unlock instruction specifically includes:
s301, receiving a second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than a set time difference value, and executing the next step when the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference value;
s302, verifying the second unlocking instruction, judging whether the second unlocking instruction is the mobile phone owner unlocking information, and if so, verifying the second unlocking instruction, wherein the mobile phone owner unlocking information is stored in the mobile phone.
In the embodiment of the application, when the mobile phone receives the second unlocking instruction, whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference or not is also required, for example, the set time difference is 5 minutes, and when the time difference between the second unlocking instruction and the first unlocking instruction is 8 minutes, the instruction indicates that the parents do not agree with the child to play the mobile phone and do not perform secondary unlocking verification, and the subsequent second unlocking instruction indicates that the parents need to use the mobile phone and unlock the mobile phone normally. For another example, when the time difference between the second unlocking instruction and the first unlocking instruction is 3 minutes, the instruction indicates that the parents agree with the child to play the mobile phone, the second unlocking instruction is verified, whether the second unlocking instruction is the mobile phone owner unlocking information is judged, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, namely fingerprint information or face information of the parents or unlocking password information, is stored in the mobile phone, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, the verification is passed.
As shown in fig. 3, as a preferred embodiment of the present application, the method further includes:
s401, receiving a global opening instruction and generating unlocking verification information of a mobile phone owner;
s402, receiving a mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used;
s403, receiving a non-global opening instruction, wherein only software in the opening software information can be normally used.
In the embodiment of the application, when a child uses a mobile phone, a parent may also need to use the mobile phone and use mobile phone software except open software information, at the moment, the parent needs to input a global open instruction, then the mobile phone owner unlocking verification information is automatically generated, the parent also needs to input a mobile phone owner unlocking instruction, namely, face unlocking, fingerprint unlocking or password unlocking is performed, the mobile phone owner unlocking instruction is verified, after verification is passed, the mobile phone unlocking is successful, all functions in the mobile phone are all open, and all software in the mobile phone can be normally used; when the parents temporarily finish the use, the parents want to enable the children to continue playing a mobile phone, and the parents also need to input a non-global opening instruction, so that only software in the opening software information can be normally used.
As shown in fig. 4, as a preferred embodiment of the present application, the method further includes:
s501, timing is performed after the second unlocking instruction passes verification, wherein the minors unlocking setting information further comprises a using time threshold;
s502, when the timing time reaches a use time threshold, generating a mobile phone owner unlocking popup window, wherein the display time of the mobile phone owner unlocking popup window is N seconds, and N is a fixed value;
s503, when an unlocking instruction of the mobile phone owner is received within N seconds, software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
In the embodiment of the application, in order to avoid long-time playing of the mobile phone by the child, the juvenile unlocking setting information further comprises a use time threshold, for example, the time threshold is 1 hour, when the second unlocking instruction passes verification, the timing is automatically performed, when the timing time reaches the use time threshold, namely, 1 hour, the mobile phone owner unlocking popup window is automatically generated, and the display time of the mobile phone owner unlocking popup window is N seconds, for example, N is 120; when the unlocking instruction of the mobile phone owner is received within 120 seconds, the software in the open software information can be used normally, and timing is repeated; when the unlocking instruction of the mobile phone owner is not received within 120 seconds, the mobile phone is automatically closed, and the child cannot continue to use the mobile phone.
As shown in fig. 5, the embodiment of the present application further provides a mobile phone screen unlocking system, where the system includes:
a minor unlocking setting module 100 for receiving minor unlocking setting information including unlocking verification information of a minor and open software information;
the first unlocking instruction module 200 is configured to receive a first unlocking instruction, determine the first unlocking instruction, and generate secondary unlocking verification information of the mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
the second unlocking instruction module 300 is configured to receive the second unlocking instruction, verify the second unlocking instruction, and after the verification is passed, unlock the mobile phone successfully, and only the software in the open software information can be normally used.
In the embodiment of the application, a parent is required to open a mobile phone to perform related setting of unlocking the mobile phone by the minors, specifically, minors unlocking setting information is required to be input, the minors unlocking setting information comprises minors unlocking verification information and open software information, the minors unlocking verification information comprises face information or fingerprint information of one or more minors, preferably, the face information or the fingerprint information of a child of the child, the mobile phone stores the face information and the fingerprint information, the open software information comprises one or more software names, preferably, the open software information does not comprise payment software and game software unsuitable for the child. When children need to use parents' mobile phones to entertain, fingerprint identification or face recognition is carried out, the mobile phones will receive first unlocking instructions, the first unlocking instructions can be automatically judged, when the first unlocking instructions belong to unlocking verification information of minors, secondary unlocking verification information of the mobile phone owners is generated, parents are required to verify and unlock, the parents need to input the second unlocking instructions to verify the second unlocking instructions, after verification is passed, the mobile phones are successfully unlocked, but only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
As shown in fig. 6, as a preferred embodiment of the present application, the second unlock instruction module 300 includes:
an unlock time difference determining unit 301, configured to receive a second unlock instruction, determine whether a time difference between the second unlock instruction and the first unlock instruction is smaller than a set time difference, and execute the step in the second unlock instruction verifying unit 302 when the time difference is smaller than the set time difference;
and the second unlocking instruction verification unit 302 is configured to verify the second unlocking instruction, determine whether the second unlocking instruction is the mobile phone owner unlocking information, and if yes, verify that the second unlocking instruction passes, where the mobile phone owner unlocking information is stored in the mobile phone.
In the embodiment of the application, when the mobile phone receives the second unlocking instruction, whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference or not is also required, for example, the set time difference is 5 minutes, and when the time difference between the second unlocking instruction and the first unlocking instruction is 8 minutes, the instruction indicates that the parents do not agree with the child to play the mobile phone and do not perform secondary unlocking verification, and the subsequent second unlocking instruction indicates that the parents need to use the mobile phone and unlock the mobile phone normally. For another example, when the time difference between the second unlocking instruction and the first unlocking instruction is 3 minutes, the instruction indicates that the parents agree with the child to play the mobile phone, the second unlocking instruction is verified, whether the second unlocking instruction is the mobile phone owner unlocking information is judged, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, namely fingerprint information or face information of the parents or unlocking password information, is stored in the mobile phone, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, the verification is passed.
As shown in fig. 7, as a preferred embodiment of the present application, the system further includes a global mobile phone opening module 400, where the global mobile phone opening module 400 specifically includes:
the global opening instruction receiving unit 401 is configured to receive a global opening instruction and generate mobile phone owner unlocking verification information;
the host unlocking instruction receiving unit 402 is configured to receive a mobile phone host unlocking instruction, verify the mobile phone host unlocking instruction, and after the verification is passed, unlock the mobile phone successfully, wherein all functions in the mobile phone are fully opened, and all software in the mobile phone can be normally used;
the non-global open instruction receiving unit 403 is configured to receive a non-global open instruction, and only software in the open software information can be normally used.
In the embodiment of the application, when a child uses a mobile phone, a parent may also need to use the mobile phone and use mobile phone software except open software information, at the moment, the parent needs to input a global open instruction, then the mobile phone owner unlocking verification information is automatically generated, the parent also needs to input a mobile phone owner unlocking instruction, namely, face unlocking, fingerprint unlocking or password unlocking is performed, the mobile phone owner unlocking instruction is verified, after verification is passed, the mobile phone unlocking is successful, all functions in the mobile phone are all open, and all software in the mobile phone can be normally used; when the parents temporarily finish the use, the parents want to enable the children to continue playing a mobile phone, and the parents also need to input a non-global opening instruction, so that only software in the opening software information can be normally used.
As shown in fig. 8, as a preferred embodiment of the present application, the system further includes a minor usage timing module 500, and the minor usage timing module 500 specifically includes:
a minor use timing unit 501, configured to perform timing after the second unlocking instruction is verified, where the minor unlocking setting information further includes a use time threshold;
the master unlocking popup generating unit 502 is configured to generate a mobile phone master unlocking popup when the timing time reaches a use time threshold, where the display time of the mobile phone master unlocking popup is N seconds, and N is a fixed value;
the mobile phone continues to use the judging unit 503, when the unlocking instruction of the mobile phone owner is received within N seconds, the software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
In the embodiment of the application, in order to avoid long-time playing of the mobile phone by the child, the juvenile unlocking setting information further comprises a use time threshold, for example, the time threshold is 1 hour, when the second unlocking instruction passes verification, the timing is automatically performed, when the timing time reaches the use time threshold, namely, 1 hour, the mobile phone owner unlocking popup window is automatically generated, and the display time of the mobile phone owner unlocking popup window is N seconds, for example, N is 120; when the unlocking instruction of the mobile phone owner is received within 120 seconds, the software in the open software information can be used normally, and timing is repeated; when the unlocking instruction of the mobile phone owner is not received within 120 seconds, the mobile phone is automatically closed, and the child cannot continue to use the mobile phone.
The foregoing description of the preferred embodiments of the present application should not be taken as limiting the application, but rather should be understood to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.
It should be understood that, although the steps in the flowcharts of the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

Claims (7)

1. The mobile phone screen unlocking method is characterized by comprising the following steps of:
receiving juvenile unlocking setting information, wherein the juvenile unlocking setting information comprises juvenile unlocking verification information and open software information;
receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used;
the method further comprises the steps of: receiving a global opening instruction and generating unlocking verification information of a mobile phone owner; receiving a mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used; and receiving a non-global opening instruction, wherein only software in the opening software information can be normally used.
2. The method for unlocking a mobile phone screen according to claim 1, wherein the step of receiving the second unlocking instruction and verifying the second unlocking instruction specifically comprises:
receiving a second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than a set time difference value, and executing the next step when the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference value;
and verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, passing the verification, wherein the unlocking information of the mobile phone owner is stored in the mobile phone.
3. The method for unlocking a mobile phone screen according to claim 1, further comprising:
when the second unlocking instruction passes verification, timing is carried out, and the minors unlocking setting information further comprises a using time threshold;
when the timing time reaches a use time threshold, generating a mobile phone owner unlocking popup window, wherein the display time of the mobile phone owner unlocking popup window is N seconds, and N is a fixed value;
when the unlocking instruction of the mobile phone owner is received within N seconds, the software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
4. The method for unlocking a mobile phone screen according to claim 1, wherein the unlocking verification information of the minors includes face information or fingerprint information of one or more minors, and the open software information includes one or more software names.
5. A mobile phone screen unlocking system, the system comprising:
the minous unlocking setting module is used for receiving minous unlocking setting information, wherein the minous unlocking setting information comprises minous unlocking verification information and open software information;
the first unlocking instruction module is used for receiving the first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of the mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
the second unlocking instruction module is used for receiving the second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein only software in the open software information can be normally used;
the system also comprises a mobile phone global opening module, and the mobile phone global opening module specifically comprises: the mobile phone host unlocking verification system comprises a global opening instruction receiving unit, a global opening instruction processing unit and a global opening instruction processing unit, wherein the global opening instruction receiving unit is used for receiving a global opening instruction and generating mobile phone host unlocking verification information; the mobile phone unlocking instruction receiving unit is used for receiving the mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used; and the non-global open instruction receiving unit is used for receiving the non-global open instruction, and only software in the open software information can be normally used.
6. The mobile phone screen unlocking system according to claim 5, wherein the second unlocking instruction module comprises:
an unlocking time difference judging unit for receiving the second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference, and executing the step in the second unlocking instruction verifying unit when the time difference is smaller than the set time difference;
and the second unlocking instruction verification unit is used for verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, verifying and passing, wherein the mobile phone is stored with the unlocking information of the mobile phone owner.
7. The mobile phone screen unlocking system according to claim 5, further comprising a minor use timing module, wherein the minor use timing module specifically comprises:
the minors use the timing unit, when the second unlocking instruction is verified, timing is carried out, and the minors unlocking setting information also comprises a use time threshold;
the mobile phone unlocking popup generating unit is used for generating a mobile phone owner unlocking popup when the timing time reaches a use time threshold, wherein the display time of the mobile phone owner unlocking popup is N seconds, and N is a fixed value;
the mobile phone continues to use the judging unit, and when an unlocking instruction of the mobile phone owner is received within N seconds, the mobile phone is used for opening the software in the software information and can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
CN202310469803.0A 2023-04-27 2023-04-27 Mobile phone screen unlocking method and system Active CN116193020B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310469803.0A CN116193020B (en) 2023-04-27 2023-04-27 Mobile phone screen unlocking method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310469803.0A CN116193020B (en) 2023-04-27 2023-04-27 Mobile phone screen unlocking method and system

Publications (2)

Publication Number Publication Date
CN116193020A CN116193020A (en) 2023-05-30
CN116193020B true CN116193020B (en) 2023-08-11

Family

ID=86440671

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310469803.0A Active CN116193020B (en) 2023-04-27 2023-04-27 Mobile phone screen unlocking method and system

Country Status (1)

Country Link
CN (1) CN116193020B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533179A (en) * 2013-10-29 2014-01-22 广东欧珀移动通信有限公司 Method and system for remotely controlling application programs of mobile phone
CN103728894A (en) * 2014-01-22 2014-04-16 广东欧珀移动通信有限公司 Remote control method and system of terminal device
WO2014082406A1 (en) * 2012-11-29 2014-06-05 华为技术有限公司 Screen unlocking method, apparatus, and device
CN107145771A (en) * 2017-04-11 2017-09-08 北京小米移动软件有限公司 application program unlocking method, device and terminal
CN107147799A (en) * 2017-05-31 2017-09-08 东莞市联臣电子科技股份有限公司 A kind of electronic equipment, eyes protecting system and eye care method
CN107180173A (en) * 2017-04-27 2017-09-19 上海与德科技有限公司 unlocking method and device
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 A kind of theft preventing method, mobile terminal and computer-readable recording medium
CN108206892A (en) * 2017-12-29 2018-06-26 努比亚技术有限公司 Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN113296864A (en) * 2021-05-26 2021-08-24 上海松鼠课堂人工智能科技有限公司 Multi-role interface switching method for intelligent terminal
CN113797555A (en) * 2021-09-17 2021-12-17 蔡一凡 Method and system for solving problem of playing mobile game by juveniles

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8116726B2 (en) * 2007-08-30 2012-02-14 Motorola Mobility, Inc. Parent and child mobile communication devices with feature control and call-back
CN105809003B (en) * 2016-03-10 2018-03-27 广东欧珀移动通信有限公司 The terminal screen unlocking method and terminal of a kind of fingerprint recognition
CN109032675B (en) * 2018-06-25 2024-06-28 北京集创北方科技股份有限公司 Screen unlocking method and device of terminal equipment and terminal equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014082406A1 (en) * 2012-11-29 2014-06-05 华为技术有限公司 Screen unlocking method, apparatus, and device
CN103533179A (en) * 2013-10-29 2014-01-22 广东欧珀移动通信有限公司 Method and system for remotely controlling application programs of mobile phone
CN103728894A (en) * 2014-01-22 2014-04-16 广东欧珀移动通信有限公司 Remote control method and system of terminal device
CN107145771A (en) * 2017-04-11 2017-09-08 北京小米移动软件有限公司 application program unlocking method, device and terminal
CN107180173A (en) * 2017-04-27 2017-09-19 上海与德科技有限公司 unlocking method and device
CN107147799A (en) * 2017-05-31 2017-09-08 东莞市联臣电子科技股份有限公司 A kind of electronic equipment, eyes protecting system and eye care method
CN107635071A (en) * 2017-09-27 2018-01-26 维沃移动通信有限公司 A kind of theft preventing method, mobile terminal and computer-readable recording medium
CN108206892A (en) * 2017-12-29 2018-06-26 努比亚技术有限公司 Guard method, device, mobile terminal and the storage medium of contact person's privacy
CN113296864A (en) * 2021-05-26 2021-08-24 上海松鼠课堂人工智能科技有限公司 Multi-role interface switching method for intelligent terminal
CN113797555A (en) * 2021-09-17 2021-12-17 蔡一凡 Method and system for solving problem of playing mobile game by juveniles

Also Published As

Publication number Publication date
CN116193020A (en) 2023-05-30

Similar Documents

Publication Publication Date Title
CN109472675A (en) Processing method, device, system and the equipment of charter business
US20090064316A1 (en) Method and Apparatus for Enhancing Information Security in a Computer System
JPH04213184A (en) Method and apparatus for controlling transac- tion using microcircuit card
EP3707660A1 (en) Robust and adaptive artificial intelligence modeling
JPS59218688A (en) Monolithic integratable circuit device
US10607195B2 (en) Facilitating selling and validating digital resources
CN113299016B (en) Service timing method and system of self-service terminal, self-service equipment and storage medium
CN116193020B (en) Mobile phone screen unlocking method and system
CN107688756B (en) Hard disk control method, equipment and readable storage medium storing program for executing
CN111383371B (en) Unlocking method, door lock, server, system, storage medium and electronic device
JPH04264688A (en) Method for approving password code of memory card
US20200134164A1 (en) Method for authenticating a program and corresponding integrated circuit
JP5076820B2 (en) Application processing apparatus, application processing method, program thereof, and embedded device
US20110264900A1 (en) Method and arrangement for configuring electronic devices
US10853476B2 (en) Method for the security of an electronic operation
CN105551093B (en) Vehicle confirms device and method with card image
CN107978034B (en) Access control method and system, controller and terminal
CN109493081A (en) A kind of SD card authentication method, system and storage medium for financial transaction
US20210200843A1 (en) Voice modulation based voice authentication
US11669610B2 (en) Authentication device, method and system
EP1369828A2 (en) Personalised digital data processing system
CN114005435A (en) Method, device, equipment, medium and program product for responding voice information
JP3057326B2 (en) IC card
JPH11328326A (en) Ic card
CN111310229A (en) Fingerprint input method, device and medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant