CN116193020B - Mobile phone screen unlocking method and system - Google Patents
Mobile phone screen unlocking method and system Download PDFInfo
- Publication number
- CN116193020B CN116193020B CN202310469803.0A CN202310469803A CN116193020B CN 116193020 B CN116193020 B CN 116193020B CN 202310469803 A CN202310469803 A CN 202310469803A CN 116193020 B CN116193020 B CN 116193020B
- Authority
- CN
- China
- Prior art keywords
- unlocking
- mobile phone
- instruction
- information
- unlocking instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72463—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device
- H04M1/724631—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions to restrict the functionality of the device by limiting the access to the user interface, e.g. locking a touch-screen or a keypad
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/66—Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
- H04M1/667—Preventing unauthorised calls from a telephone set
- H04M1/67—Preventing unauthorised calls from a telephone set by electronic means
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72448—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
- H04M1/72454—User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to context-related or environment-related conditions
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Environmental & Geological Engineering (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application is applicable to the technical field of mobile phone unlocking, and provides a mobile phone screen unlocking method and a mobile phone screen unlocking system, wherein the method comprises the following steps: receiving juvenile unlocking setting information, wherein the juvenile unlocking setting information comprises juvenile unlocking verification information and open software information; receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors; and receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
Description
Technical Field
The application relates to the technical field of mobile phone unlocking, in particular to a mobile phone screen unlocking method and system.
Background
Mobile terminals such as smart phones and the like have higher popularity, so that not only adults, but also more and more minors cannot leave the mobile phones in daily life, and many minors can use the mobile phones of parents for entertainment, even if the parents are not aware of the mobile phones, the parents use the mobile phones for a long time, and are enthusiastically in mobile phone games, so that physical and mental health is not facilitated; in addition, in order to be convenient for use, a plurality of parents can set some mobile phone software to be free from paying, and when minors use the mobile phone software, abnormal consumption can be caused, so that the loss is brought to the parents. Therefore, there is a need to provide a method and a system for unlocking a mobile phone screen, which aim to solve the above problems.
Disclosure of Invention
Aiming at the defects existing in the prior art, the application aims to provide a mobile phone screen unlocking method and system so as to solve the problems existing in the background art.
The application is realized in such a way that a mobile phone screen unlocking method comprises the following steps:
receiving juvenile unlocking setting information, wherein the juvenile unlocking setting information comprises juvenile unlocking verification information and open software information;
receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
and receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used.
As a further scheme of the application: the step of receiving the second unlocking instruction and verifying the second unlocking instruction specifically comprises the following steps:
receiving a second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than a set time difference value, and executing the next step when the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference value;
and verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, passing the verification, wherein the unlocking information of the mobile phone owner is stored in the mobile phone.
As a further scheme of the application: the method further comprises the steps of:
receiving a global opening instruction and generating unlocking verification information of a mobile phone owner;
receiving a mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used;
and receiving a non-global opening instruction, wherein only software in the opening software information can be normally used.
As a further scheme of the application: the method further comprises the steps of:
when the second unlocking instruction passes verification, timing is carried out, and the minors unlocking setting information further comprises a using time threshold;
when the timing time reaches a use time threshold, generating a mobile phone owner unlocking popup window, wherein the display time of the mobile phone owner unlocking popup window is N seconds, and N is a fixed value;
when the unlocking instruction of the mobile phone owner is received within N seconds, the software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
As a further scheme of the application: the unlocking verification information of the minors comprises face information or fingerprint information of one or more minors, and the open software information comprises one or more software names.
Another object of the present application is to provide a mobile phone screen unlocking system, which includes:
the minous unlocking setting module is used for receiving minous unlocking setting information, wherein the minous unlocking setting information comprises minous unlocking verification information and open software information;
the first unlocking instruction module is used for receiving the first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of the mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
and the second unlocking instruction module is used for receiving the second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein only the software in the open software information can be normally used.
As a further scheme of the application: the second unlocking instruction module comprises:
an unlocking time difference judging unit for receiving the second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference, and executing the step in the second unlocking instruction verifying unit when the time difference is smaller than the set time difference;
and the second unlocking instruction verification unit is used for verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, verifying and passing, wherein the mobile phone is stored with the unlocking information of the mobile phone owner.
As a further scheme of the application: the system also comprises a mobile phone global opening module, and the mobile phone global opening module specifically comprises:
the mobile phone host unlocking verification system comprises a global opening instruction receiving unit, a global opening instruction processing unit and a global opening instruction processing unit, wherein the global opening instruction receiving unit is used for receiving a global opening instruction and generating mobile phone host unlocking verification information;
the mobile phone unlocking instruction receiving unit is used for receiving the mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used;
and the non-global open instruction receiving unit is used for receiving the non-global open instruction, and only software in the open software information can be normally used.
As a further scheme of the application: the system also comprises a minor use timing module, wherein the minor use timing module specifically comprises:
the minors use the timing unit, when the second unlocking instruction is verified, timing is carried out, and the minors unlocking setting information also comprises a use time threshold;
the mobile phone unlocking popup generating unit is used for generating a mobile phone owner unlocking popup when the timing time reaches a use time threshold, wherein the display time of the mobile phone owner unlocking popup is N seconds, and N is a fixed value;
the mobile phone continues to use the judging unit, and when an unlocking instruction of the mobile phone owner is received within N seconds, the mobile phone is used for opening the software in the software information and can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
Compared with the prior art, the application has the beneficial effects that:
according to the application, through the unlocking setting of the minors, the first unlocking instruction input by the child is received, the first unlocking instruction is judged, and when the first unlocking instruction belongs to the unlocking verification information of the minors, the secondary unlocking verification information of the mobile phone owner is generated; and then receiving a second unlocking instruction input by the parents, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
Drawings
FIG. 1 is a flow chart of a method for unlocking a mobile phone screen;
FIG. 2 is a flowchart for verifying a second unlocking instruction in a mobile phone screen unlocking method;
FIG. 3 is a flowchart of a method for unlocking a mobile phone screen to receive a global open command;
FIG. 4 is a flowchart of generating a mobile phone owner unlocking popup window when the counted time reaches the use time threshold in a mobile phone screen unlocking method;
fig. 5 is a schematic structural diagram of a mobile phone screen unlocking system;
fig. 6 is a schematic structural diagram of a second unlocking instruction module in the mobile phone screen unlocking system;
fig. 7 is a schematic structural diagram of a global mobile phone opening module in a mobile phone screen unlocking system;
fig. 8 is a schematic structural diagram of a minor use timing module in a mobile phone screen unlocking system.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more clear, the present application will be described in further detail with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
Specific implementations of the application are described in detail below in connection with specific embodiments.
As shown in fig. 1, an embodiment of the present application provides a method for unlocking a mobile phone screen, including the following steps:
s100, receiving unlocking setting information of minors, wherein the unlocking setting information of the minors comprises unlocking verification information of the minors and open software information;
s200, receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
and S300, receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used.
It should be noted that mobile terminals such as smart phones have higher popularity, so that not only adults, but also more and more minors cannot leave the mobile phones in daily life, and many minors can use the mobile phones of parents for entertainment, even if the parents are unaware, the mobile phones are used for a long time and are addicted to mobile phone games, and physical and mental health is not facilitated; in addition, in order to facilitate the use, a lot of parents can set some mobile phone software to be free of secret payment, and when minors use the mobile phone software, abnormal consumption can be caused, so that the parents are lost.
In the embodiment of the application, a parent is required to open a mobile phone to perform related setting of unlocking the mobile phone by the minors, specifically, minors unlocking setting information is required to be input, the minors unlocking setting information comprises minors unlocking verification information and open software information, the minors unlocking verification information comprises face information or fingerprint information of one or more minors, preferably, the face information or the fingerprint information of a child of the child, the mobile phone stores the face information and the fingerprint information, the open software information comprises one or more software names, preferably, the open software information does not comprise payment software and game software unsuitable for the child. When children need to use parents' mobile phones to entertain, fingerprint identification or face recognition is carried out, the mobile phones will receive first unlocking instructions, the first unlocking instructions can be automatically judged, when the first unlocking instructions belong to unlocking verification information of minors, secondary unlocking verification information of the mobile phone owners is generated, parents are required to verify and unlock, the parents need to input the second unlocking instructions to verify the second unlocking instructions, after verification is passed, the mobile phones are successfully unlocked, but only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
As shown in fig. 2, as a preferred embodiment of the present application, the step of receiving the second unlock instruction and verifying the second unlock instruction specifically includes:
s301, receiving a second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than a set time difference value, and executing the next step when the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference value;
s302, verifying the second unlocking instruction, judging whether the second unlocking instruction is the mobile phone owner unlocking information, and if so, verifying the second unlocking instruction, wherein the mobile phone owner unlocking information is stored in the mobile phone.
In the embodiment of the application, when the mobile phone receives the second unlocking instruction, whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference or not is also required, for example, the set time difference is 5 minutes, and when the time difference between the second unlocking instruction and the first unlocking instruction is 8 minutes, the instruction indicates that the parents do not agree with the child to play the mobile phone and do not perform secondary unlocking verification, and the subsequent second unlocking instruction indicates that the parents need to use the mobile phone and unlock the mobile phone normally. For another example, when the time difference between the second unlocking instruction and the first unlocking instruction is 3 minutes, the instruction indicates that the parents agree with the child to play the mobile phone, the second unlocking instruction is verified, whether the second unlocking instruction is the mobile phone owner unlocking information is judged, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, namely fingerprint information or face information of the parents or unlocking password information, is stored in the mobile phone, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, the verification is passed.
As shown in fig. 3, as a preferred embodiment of the present application, the method further includes:
s401, receiving a global opening instruction and generating unlocking verification information of a mobile phone owner;
s402, receiving a mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used;
s403, receiving a non-global opening instruction, wherein only software in the opening software information can be normally used.
In the embodiment of the application, when a child uses a mobile phone, a parent may also need to use the mobile phone and use mobile phone software except open software information, at the moment, the parent needs to input a global open instruction, then the mobile phone owner unlocking verification information is automatically generated, the parent also needs to input a mobile phone owner unlocking instruction, namely, face unlocking, fingerprint unlocking or password unlocking is performed, the mobile phone owner unlocking instruction is verified, after verification is passed, the mobile phone unlocking is successful, all functions in the mobile phone are all open, and all software in the mobile phone can be normally used; when the parents temporarily finish the use, the parents want to enable the children to continue playing a mobile phone, and the parents also need to input a non-global opening instruction, so that only software in the opening software information can be normally used.
As shown in fig. 4, as a preferred embodiment of the present application, the method further includes:
s501, timing is performed after the second unlocking instruction passes verification, wherein the minors unlocking setting information further comprises a using time threshold;
s502, when the timing time reaches a use time threshold, generating a mobile phone owner unlocking popup window, wherein the display time of the mobile phone owner unlocking popup window is N seconds, and N is a fixed value;
s503, when an unlocking instruction of the mobile phone owner is received within N seconds, software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
In the embodiment of the application, in order to avoid long-time playing of the mobile phone by the child, the juvenile unlocking setting information further comprises a use time threshold, for example, the time threshold is 1 hour, when the second unlocking instruction passes verification, the timing is automatically performed, when the timing time reaches the use time threshold, namely, 1 hour, the mobile phone owner unlocking popup window is automatically generated, and the display time of the mobile phone owner unlocking popup window is N seconds, for example, N is 120; when the unlocking instruction of the mobile phone owner is received within 120 seconds, the software in the open software information can be used normally, and timing is repeated; when the unlocking instruction of the mobile phone owner is not received within 120 seconds, the mobile phone is automatically closed, and the child cannot continue to use the mobile phone.
As shown in fig. 5, the embodiment of the present application further provides a mobile phone screen unlocking system, where the system includes:
a minor unlocking setting module 100 for receiving minor unlocking setting information including unlocking verification information of a minor and open software information;
the first unlocking instruction module 200 is configured to receive a first unlocking instruction, determine the first unlocking instruction, and generate secondary unlocking verification information of the mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
the second unlocking instruction module 300 is configured to receive the second unlocking instruction, verify the second unlocking instruction, and after the verification is passed, unlock the mobile phone successfully, and only the software in the open software information can be normally used.
In the embodiment of the application, a parent is required to open a mobile phone to perform related setting of unlocking the mobile phone by the minors, specifically, minors unlocking setting information is required to be input, the minors unlocking setting information comprises minors unlocking verification information and open software information, the minors unlocking verification information comprises face information or fingerprint information of one or more minors, preferably, the face information or the fingerprint information of a child of the child, the mobile phone stores the face information and the fingerprint information, the open software information comprises one or more software names, preferably, the open software information does not comprise payment software and game software unsuitable for the child. When children need to use parents' mobile phones to entertain, fingerprint identification or face recognition is carried out, the mobile phones will receive first unlocking instructions, the first unlocking instructions can be automatically judged, when the first unlocking instructions belong to unlocking verification information of minors, secondary unlocking verification information of the mobile phone owners is generated, parents are required to verify and unlock, the parents need to input the second unlocking instructions to verify the second unlocking instructions, after verification is passed, the mobile phones are successfully unlocked, but only software in the open software information can be normally used. Therefore, the mobile phone is prevented from being used by children under the condition that parents are not aware of the mobile phone, improper consumption of the children is prevented, and the children can only use mobile phone software appointed by the parents and can be protected.
As shown in fig. 6, as a preferred embodiment of the present application, the second unlock instruction module 300 includes:
an unlock time difference determining unit 301, configured to receive a second unlock instruction, determine whether a time difference between the second unlock instruction and the first unlock instruction is smaller than a set time difference, and execute the step in the second unlock instruction verifying unit 302 when the time difference is smaller than the set time difference;
and the second unlocking instruction verification unit 302 is configured to verify the second unlocking instruction, determine whether the second unlocking instruction is the mobile phone owner unlocking information, and if yes, verify that the second unlocking instruction passes, where the mobile phone owner unlocking information is stored in the mobile phone.
In the embodiment of the application, when the mobile phone receives the second unlocking instruction, whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference or not is also required, for example, the set time difference is 5 minutes, and when the time difference between the second unlocking instruction and the first unlocking instruction is 8 minutes, the instruction indicates that the parents do not agree with the child to play the mobile phone and do not perform secondary unlocking verification, and the subsequent second unlocking instruction indicates that the parents need to use the mobile phone and unlock the mobile phone normally. For another example, when the time difference between the second unlocking instruction and the first unlocking instruction is 3 minutes, the instruction indicates that the parents agree with the child to play the mobile phone, the second unlocking instruction is verified, whether the second unlocking instruction is the mobile phone owner unlocking information is judged, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, namely fingerprint information or face information of the parents or unlocking password information, is stored in the mobile phone, and when the second unlocking instruction is judged to be the mobile phone owner unlocking information, the verification is passed.
As shown in fig. 7, as a preferred embodiment of the present application, the system further includes a global mobile phone opening module 400, where the global mobile phone opening module 400 specifically includes:
the global opening instruction receiving unit 401 is configured to receive a global opening instruction and generate mobile phone owner unlocking verification information;
the host unlocking instruction receiving unit 402 is configured to receive a mobile phone host unlocking instruction, verify the mobile phone host unlocking instruction, and after the verification is passed, unlock the mobile phone successfully, wherein all functions in the mobile phone are fully opened, and all software in the mobile phone can be normally used;
the non-global open instruction receiving unit 403 is configured to receive a non-global open instruction, and only software in the open software information can be normally used.
In the embodiment of the application, when a child uses a mobile phone, a parent may also need to use the mobile phone and use mobile phone software except open software information, at the moment, the parent needs to input a global open instruction, then the mobile phone owner unlocking verification information is automatically generated, the parent also needs to input a mobile phone owner unlocking instruction, namely, face unlocking, fingerprint unlocking or password unlocking is performed, the mobile phone owner unlocking instruction is verified, after verification is passed, the mobile phone unlocking is successful, all functions in the mobile phone are all open, and all software in the mobile phone can be normally used; when the parents temporarily finish the use, the parents want to enable the children to continue playing a mobile phone, and the parents also need to input a non-global opening instruction, so that only software in the opening software information can be normally used.
As shown in fig. 8, as a preferred embodiment of the present application, the system further includes a minor usage timing module 500, and the minor usage timing module 500 specifically includes:
a minor use timing unit 501, configured to perform timing after the second unlocking instruction is verified, where the minor unlocking setting information further includes a use time threshold;
the master unlocking popup generating unit 502 is configured to generate a mobile phone master unlocking popup when the timing time reaches a use time threshold, where the display time of the mobile phone master unlocking popup is N seconds, and N is a fixed value;
the mobile phone continues to use the judging unit 503, when the unlocking instruction of the mobile phone owner is received within N seconds, the software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
In the embodiment of the application, in order to avoid long-time playing of the mobile phone by the child, the juvenile unlocking setting information further comprises a use time threshold, for example, the time threshold is 1 hour, when the second unlocking instruction passes verification, the timing is automatically performed, when the timing time reaches the use time threshold, namely, 1 hour, the mobile phone owner unlocking popup window is automatically generated, and the display time of the mobile phone owner unlocking popup window is N seconds, for example, N is 120; when the unlocking instruction of the mobile phone owner is received within 120 seconds, the software in the open software information can be used normally, and timing is repeated; when the unlocking instruction of the mobile phone owner is not received within 120 seconds, the mobile phone is automatically closed, and the child cannot continue to use the mobile phone.
The foregoing description of the preferred embodiments of the present application should not be taken as limiting the application, but rather should be understood to cover all modifications, equivalents, and alternatives falling within the spirit and principles of the application.
It should be understood that, although the steps in the flowcharts of the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in various embodiments may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
Those skilled in the art will appreciate that all or part of the processes in the methods of the above embodiments may be implemented by a computer program for instructing relevant hardware, where the program may be stored in a non-volatile computer readable storage medium, and where the program, when executed, may include processes in the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
Other embodiments of the present disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
Claims (7)
1. The mobile phone screen unlocking method is characterized by comprising the following steps of:
receiving juvenile unlocking setting information, wherein the juvenile unlocking setting information comprises juvenile unlocking verification information and open software information;
receiving a first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of a mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
receiving a second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, successfully unlocking the mobile phone, wherein only software in the open software information can be normally used;
the method further comprises the steps of: receiving a global opening instruction and generating unlocking verification information of a mobile phone owner; receiving a mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used; and receiving a non-global opening instruction, wherein only software in the opening software information can be normally used.
2. The method for unlocking a mobile phone screen according to claim 1, wherein the step of receiving the second unlocking instruction and verifying the second unlocking instruction specifically comprises:
receiving a second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than a set time difference value, and executing the next step when the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference value;
and verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, passing the verification, wherein the unlocking information of the mobile phone owner is stored in the mobile phone.
3. The method for unlocking a mobile phone screen according to claim 1, further comprising:
when the second unlocking instruction passes verification, timing is carried out, and the minors unlocking setting information further comprises a using time threshold;
when the timing time reaches a use time threshold, generating a mobile phone owner unlocking popup window, wherein the display time of the mobile phone owner unlocking popup window is N seconds, and N is a fixed value;
when the unlocking instruction of the mobile phone owner is received within N seconds, the software in the open software information can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
4. The method for unlocking a mobile phone screen according to claim 1, wherein the unlocking verification information of the minors includes face information or fingerprint information of one or more minors, and the open software information includes one or more software names.
5. A mobile phone screen unlocking system, the system comprising:
the minous unlocking setting module is used for receiving minous unlocking setting information, wherein the minous unlocking setting information comprises minous unlocking verification information and open software information;
the first unlocking instruction module is used for receiving the first unlocking instruction, judging the first unlocking instruction, and generating secondary unlocking verification information of the mobile phone owner when the first unlocking instruction belongs to the unlocking verification information of the minors;
the second unlocking instruction module is used for receiving the second unlocking instruction, verifying the second unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein only software in the open software information can be normally used;
the system also comprises a mobile phone global opening module, and the mobile phone global opening module specifically comprises: the mobile phone host unlocking verification system comprises a global opening instruction receiving unit, a global opening instruction processing unit and a global opening instruction processing unit, wherein the global opening instruction receiving unit is used for receiving a global opening instruction and generating mobile phone host unlocking verification information; the mobile phone unlocking instruction receiving unit is used for receiving the mobile phone owner unlocking instruction, verifying the mobile phone owner unlocking instruction, and after verification is passed, unlocking the mobile phone successfully, wherein all functions in the mobile phone are completely opened, and all software in the mobile phone can be normally used; and the non-global open instruction receiving unit is used for receiving the non-global open instruction, and only software in the open software information can be normally used.
6. The mobile phone screen unlocking system according to claim 5, wherein the second unlocking instruction module comprises:
an unlocking time difference judging unit for receiving the second unlocking instruction, judging whether the time difference between the second unlocking instruction and the first unlocking instruction is smaller than the set time difference, and executing the step in the second unlocking instruction verifying unit when the time difference is smaller than the set time difference;
and the second unlocking instruction verification unit is used for verifying the second unlocking instruction, judging whether the second unlocking instruction is the unlocking information of the mobile phone owner, and if so, verifying and passing, wherein the mobile phone is stored with the unlocking information of the mobile phone owner.
7. The mobile phone screen unlocking system according to claim 5, further comprising a minor use timing module, wherein the minor use timing module specifically comprises:
the minors use the timing unit, when the second unlocking instruction is verified, timing is carried out, and the minors unlocking setting information also comprises a use time threshold;
the mobile phone unlocking popup generating unit is used for generating a mobile phone owner unlocking popup when the timing time reaches a use time threshold, wherein the display time of the mobile phone owner unlocking popup is N seconds, and N is a fixed value;
the mobile phone continues to use the judging unit, and when an unlocking instruction of the mobile phone owner is received within N seconds, the mobile phone is used for opening the software in the software information and can be normally used, and timing is repeated; otherwise, the mobile phone is automatically turned off.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310469803.0A CN116193020B (en) | 2023-04-27 | 2023-04-27 | Mobile phone screen unlocking method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310469803.0A CN116193020B (en) | 2023-04-27 | 2023-04-27 | Mobile phone screen unlocking method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116193020A CN116193020A (en) | 2023-05-30 |
CN116193020B true CN116193020B (en) | 2023-08-11 |
Family
ID=86440671
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310469803.0A Active CN116193020B (en) | 2023-04-27 | 2023-04-27 | Mobile phone screen unlocking method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116193020B (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103533179A (en) * | 2013-10-29 | 2014-01-22 | 广东欧珀移动通信有限公司 | Method and system for remotely controlling application programs of mobile phone |
CN103728894A (en) * | 2014-01-22 | 2014-04-16 | 广东欧珀移动通信有限公司 | Remote control method and system of terminal device |
WO2014082406A1 (en) * | 2012-11-29 | 2014-06-05 | 华为技术有限公司 | Screen unlocking method, apparatus, and device |
CN107145771A (en) * | 2017-04-11 | 2017-09-08 | 北京小米移动软件有限公司 | application program unlocking method, device and terminal |
CN107147799A (en) * | 2017-05-31 | 2017-09-08 | 东莞市联臣电子科技股份有限公司 | A kind of electronic equipment, eyes protecting system and eye care method |
CN107180173A (en) * | 2017-04-27 | 2017-09-19 | 上海与德科技有限公司 | unlocking method and device |
CN107635071A (en) * | 2017-09-27 | 2018-01-26 | 维沃移动通信有限公司 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
CN108206892A (en) * | 2017-12-29 | 2018-06-26 | 努比亚技术有限公司 | Guard method, device, mobile terminal and the storage medium of contact person's privacy |
CN113296864A (en) * | 2021-05-26 | 2021-08-24 | 上海松鼠课堂人工智能科技有限公司 | Multi-role interface switching method for intelligent terminal |
CN113797555A (en) * | 2021-09-17 | 2021-12-17 | 蔡一凡 | Method and system for solving problem of playing mobile game by juveniles |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8116726B2 (en) * | 2007-08-30 | 2012-02-14 | Motorola Mobility, Inc. | Parent and child mobile communication devices with feature control and call-back |
CN105809003B (en) * | 2016-03-10 | 2018-03-27 | 广东欧珀移动通信有限公司 | The terminal screen unlocking method and terminal of a kind of fingerprint recognition |
CN109032675B (en) * | 2018-06-25 | 2024-06-28 | 北京集创北方科技股份有限公司 | Screen unlocking method and device of terminal equipment and terminal equipment |
-
2023
- 2023-04-27 CN CN202310469803.0A patent/CN116193020B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014082406A1 (en) * | 2012-11-29 | 2014-06-05 | 华为技术有限公司 | Screen unlocking method, apparatus, and device |
CN103533179A (en) * | 2013-10-29 | 2014-01-22 | 广东欧珀移动通信有限公司 | Method and system for remotely controlling application programs of mobile phone |
CN103728894A (en) * | 2014-01-22 | 2014-04-16 | 广东欧珀移动通信有限公司 | Remote control method and system of terminal device |
CN107145771A (en) * | 2017-04-11 | 2017-09-08 | 北京小米移动软件有限公司 | application program unlocking method, device and terminal |
CN107180173A (en) * | 2017-04-27 | 2017-09-19 | 上海与德科技有限公司 | unlocking method and device |
CN107147799A (en) * | 2017-05-31 | 2017-09-08 | 东莞市联臣电子科技股份有限公司 | A kind of electronic equipment, eyes protecting system and eye care method |
CN107635071A (en) * | 2017-09-27 | 2018-01-26 | 维沃移动通信有限公司 | A kind of theft preventing method, mobile terminal and computer-readable recording medium |
CN108206892A (en) * | 2017-12-29 | 2018-06-26 | 努比亚技术有限公司 | Guard method, device, mobile terminal and the storage medium of contact person's privacy |
CN113296864A (en) * | 2021-05-26 | 2021-08-24 | 上海松鼠课堂人工智能科技有限公司 | Multi-role interface switching method for intelligent terminal |
CN113797555A (en) * | 2021-09-17 | 2021-12-17 | 蔡一凡 | Method and system for solving problem of playing mobile game by juveniles |
Also Published As
Publication number | Publication date |
---|---|
CN116193020A (en) | 2023-05-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109472675A (en) | Processing method, device, system and the equipment of charter business | |
US20090064316A1 (en) | Method and Apparatus for Enhancing Information Security in a Computer System | |
JPH04213184A (en) | Method and apparatus for controlling transac- tion using microcircuit card | |
EP3707660A1 (en) | Robust and adaptive artificial intelligence modeling | |
JPS59218688A (en) | Monolithic integratable circuit device | |
US10607195B2 (en) | Facilitating selling and validating digital resources | |
CN113299016B (en) | Service timing method and system of self-service terminal, self-service equipment and storage medium | |
CN116193020B (en) | Mobile phone screen unlocking method and system | |
CN107688756B (en) | Hard disk control method, equipment and readable storage medium storing program for executing | |
CN111383371B (en) | Unlocking method, door lock, server, system, storage medium and electronic device | |
JPH04264688A (en) | Method for approving password code of memory card | |
US20200134164A1 (en) | Method for authenticating a program and corresponding integrated circuit | |
JP5076820B2 (en) | Application processing apparatus, application processing method, program thereof, and embedded device | |
US20110264900A1 (en) | Method and arrangement for configuring electronic devices | |
US10853476B2 (en) | Method for the security of an electronic operation | |
CN105551093B (en) | Vehicle confirms device and method with card image | |
CN107978034B (en) | Access control method and system, controller and terminal | |
CN109493081A (en) | A kind of SD card authentication method, system and storage medium for financial transaction | |
US20210200843A1 (en) | Voice modulation based voice authentication | |
US11669610B2 (en) | Authentication device, method and system | |
EP1369828A2 (en) | Personalised digital data processing system | |
CN114005435A (en) | Method, device, equipment, medium and program product for responding voice information | |
JP3057326B2 (en) | IC card | |
JPH11328326A (en) | Ic card | |
CN111310229A (en) | Fingerprint input method, device and medium based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |