CN117668795A - Terminal unlocking method, equipment and storage medium - Google Patents

Terminal unlocking method, equipment and storage medium Download PDF

Info

Publication number
CN117668795A
CN117668795A CN202311665152.9A CN202311665152A CN117668795A CN 117668795 A CN117668795 A CN 117668795A CN 202311665152 A CN202311665152 A CN 202311665152A CN 117668795 A CN117668795 A CN 117668795A
Authority
CN
China
Prior art keywords
application
attribute
unlocking
terminal
preset target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311665152.9A
Other languages
Chinese (zh)
Inventor
安昌华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202311665152.9A priority Critical patent/CN117668795A/en
Publication of CN117668795A publication Critical patent/CN117668795A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application belongs to the technical field of equipment control, and discloses a terminal unlocking method, equipment and a storage medium. According to the method, a terminal screen is lightened by receiving a screen lightening instruction, and a plurality of application identifiers are displayed on the terminal screen; receiving a first selection operation instruction, selecting a target application identifier from a plurality of application identifiers, and displaying the attribute of the target application; receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application; and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed. Because the application identifier of the application used by the user is used as the preset target application, and the attribute in the preset target application is used as the preset target attribute, the user can directly select according to the image when unlocking, so that quick unlocking is realized without memorizing a specific password, and because the identifiers and the attributes of other applications are set for misleading, other personnel are difficult to unlock.

Description

Terminal unlocking method, equipment and storage medium
Technical Field
The present disclosure relates to the field of device control technologies, and in particular, to a method, a device, and a storage medium for unlocking a terminal.
Background
Today, the mainstream unlocking schemes of terminals (such as smart terminals of smart phones, tablet computers and the like) mainly include: the method comprises three main categories of unlocking after lighting, password unlocking and face recognition unlocking; the lighting, namely unlocking, has no safety, has a large number of misoperation, has poor actual use effect, and is less in number of people; the password unlocking needs to keep a preset password in mind and needs to be updated at fixed time to ensure the safety, and once the password is forgotten, the terminal cannot be unlocked, the overall safety is good, however, the risk of incapability of unlocking exists, and the operation required by inputting the password is complex; the face recognition unlocking efficiency is high, but misoperation (such as that a user only holds a mobile phone and does not light the mobile phone carefully, and the face can be automatically unlocked when the user recognizes the face), and if the terminal needs to be temporarily provided for other users, the unlocking is difficult to be performed in the mode.
Therefore, the conventional terminal unlocking scheme has certain defects, and how to avoid false unlocking and ensure that a user can unlock the terminal conveniently, safely and quickly is a problem to be solved at present.
Disclosure of Invention
The main purpose of the application is to provide a terminal unlocking method, equipment and storage medium, which aim at solving the technical problems that the terminal unlocking has defects at present, and the user can conveniently, safely and quickly unlock the terminal while avoiding false unlocking.
In order to achieve the above object, an embodiment of the present application provides a method for unlocking a terminal, where the method includes:
receiving a screen lighting instruction to light a terminal screen, wherein a plurality of application identifiers are displayed on the terminal screen;
receiving a first selection operation instruction, selecting a target application identifier from the application identifiers, and displaying the attribute of the target application;
receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application;
and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed.
In addition, to achieve the above objective, an embodiment of the present application further provides a terminal unlocking device, where the terminal unlocking device includes:
the instruction receiving module is used for receiving a screen lighting instruction to light a terminal screen, and a plurality of application identifiers are displayed on the terminal screen;
the first selection module is used for receiving a first selection operation instruction, selecting a target application identifier from the application identifiers and displaying the attribute of the target application;
the second selection module is used for receiving a second selection operation instruction and selecting a target attribute from the attributes of the target application;
And the terminal control module is used for executing terminal unlocking if the target application is a preset target application and the target attribute is a preset target attribute.
In addition, to achieve the above objective, an embodiment of the present application further provides a terminal unlocking device, where the terminal unlocking device includes: the terminal unlocking device comprises a processor, a memory and a terminal unlocking program which is stored in the memory and can run on the processor, wherein the terminal unlocking program realizes the steps of the terminal unlocking method when being executed by the processor.
In addition, to achieve the above object, the embodiments of the present application further provide a computer readable storage medium, where a terminal unlocking program is stored, and the steps of the terminal unlocking method described above are implemented when the terminal unlocking program is executed.
One of the above technical solutions in the embodiment of the present application has the following advantages or beneficial effects: a terminal screen is lightened by receiving a screen lightening instruction, and a plurality of application identifiers are displayed on the terminal screen; receiving a first selection operation instruction, selecting a target application identifier from a plurality of application identifiers, and displaying the attribute of the target application; receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application; and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed. Because the application identifier of the application used by the user is used as the preset target application, and the attribute in the preset target application is used as the preset target attribute, the user can directly select according to the image when unlocking, so that quick unlocking is realized without memorizing a specific password, and because the identifiers and the attributes of other applications are set for misleading, other personnel are difficult to unlock.
Drawings
FIG. 1 is a schematic diagram of an electronic device of a hardware operating environment according to an embodiment of the present application;
fig. 2 is a schematic flow chart of a first embodiment of a terminal unlocking method of the present application;
FIG. 3 is a schematic diagram showing properties according to an embodiment of the present application;
fig. 4 is a schematic diagram of unlocking a terminal according to an embodiment of the present application;
fig. 5 is a schematic flow chart of a second embodiment of a terminal unlocking method of the present application;
fig. 6 is a schematic flow chart of a third embodiment of a terminal unlocking method of the present application;
fig. 7 is a block diagram of a first embodiment of a terminal unlocking device of the present application.
The realization, functional characteristics and advantages of the present application will be further described with reference to the embodiments, referring to the attached drawings.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
Referring to fig. 1, fig. 1 is a schematic diagram of a terminal unlocking device of a hardware running environment according to an embodiment of the present application.
As shown in fig. 1, the electronic device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (WI-FI) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the structure shown in fig. 1 is not limiting of the electronic device and may include more or fewer components than shown, or may combine certain components, or may be arranged in different components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a terminal unlocking program may be included in the memory 1005 as one type of storage medium.
In the electronic device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the electronic device may be provided in a terminal unlocking device, where the electronic device invokes a terminal unlocking program stored in the memory 1005 through the processor 1001, and executes the terminal unlocking method provided in the embodiment of the present application.
An embodiment of the present application provides a terminal unlocking method, and referring to fig. 2, fig. 2 is a schematic flow chart of a first embodiment of the terminal unlocking method.
In this embodiment, the terminal unlocking method includes the following steps:
step S10: and receiving a screen lightening instruction to lighten a terminal screen, wherein a plurality of application identifiers are displayed on the terminal screen.
It should be noted that, the execution body of the embodiment may be a terminal unlocking device, where the terminal unlocking device may be an intelligent terminal, such as a smart phone, a tablet pc, or the like, or may be a controller, such as a CPU, or other devices capable of implementing the same or similar functions, and the embodiment is not limited to this, and in the embodiment and the following embodiments, the terminal unlocking method is described by taking the intelligent terminal as an example.
It should be noted that, the screen lighting instruction may be an instruction sent to the terminal unlocking device after the user operates the intelligent terminal when the user needs to light the intelligent terminal. The plurality of application identifications may include a preset target application and an application identification of at least one application for misguidance (other application than the preset target application). The preset target application may be an application designated for screen unlocking, and the application identifier may be identification information, such as an application name, or similar identification information, which can intuitively determine why the application is.
In practical use, the number of application identifiers displayed may be preset by a user or a manager, for example: if the user or the manager presets and displays 9 application identifiers, a screen of the intelligent terminal is lightened at the moment, and 1 preset target application and 8 application identifiers for misleading applications are displayed.
Step S20: and receiving a first selected operation instruction, selecting a target application identifier from the application identifiers, and displaying the attribute of the target application.
It should be noted that after the screen of the intelligent terminal is lightened and a plurality of application identifiers are displayed in the screen of the intelligent terminal, the user can operate the intelligent terminal, one of the plurality of application identifiers displayed by the intelligent terminal is selected, at this time, the intelligent terminal generates a first selected operation instruction according to the operation of the user, and selects a target application identifier from the plurality of displayed application identifiers according to the instruction parameters in the first selected operation instruction, namely, the application identifier selected by the user is used as the target application identifier, and because the user is likely to be selected due to false touch, in order to avoid false unlocking of the terminal, at this time, the target application corresponding to the target application identifier can be obtained, and the attribute of the target application is displayed, so that the user can further select.
In order to avoid that the user who operates the intelligent terminal may not be the owner of the intelligent terminal but other users are operating the intelligent terminal, which application identifier is the identifier of the preset target application may be determined through multiple attempts, and after the target application identifier is determined, whether the target application corresponding to the target application identifier is the preset target application or not may display the attribute of the target application.
In actual use, the displayed attribute of the target application at least comprises a misleading attribute, and if the target application is a preset target attribute, the displayed attribute of the target application also comprises the preset target attribute. The preset target attribute is an attribute designated as an attribute for unlocking the intelligent terminal in the attributes of the preset target application, and the misleading attribute is an attribute for generating misleading so as to avoid other users from operating the unlocking terminal.
The number of the attributes displayed can be preset by a user or a manager.
For example: assuming that the user or manager sets the displayed attributes as 6, the displayed application identifiers are application identifiers of all 6 applications of A1-A6, wherein A1 is a preset target application, and if the target application identifier selected by the user is any one of A2-A6, 6 misleading attributes are displayed at the moment; if the target application identifier selected by the user is A1, the displayed attribute is 1 preset target attribute and 5 misleading attributes.
Step S30: and receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application.
After the attribute of the target application is displayed, the user can operate the intelligent terminal, one of the attributes displayed by the intelligent terminal is selected, at this time, the intelligent terminal generates a second selected operation instruction according to the operation of the user, and one of the displayed attributes of the target application is selected as the target attribute according to the instruction parameter of the second selected operation instruction, namely, the attribute selected by the user is used as the target attribute.
Step S40: and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed.
It can be understood that if the target application is a preset target application and the target attribute is a preset target attribute, it indicates that the owner of the intelligent terminal is operating at this time, or the owner of the intelligent terminal authorizes other users to operate, and at this time, the intelligent terminal can execute terminal unlocking.
For ease of understanding, the description will now be given with reference to fig. 3 and 4, but the present solution is not limited thereto. Fig. 3 is a schematic diagram showing the attribute of the present embodiment, and fig. 4 is a schematic diagram showing unlocking of the terminal of the present embodiment.
As shown in fig. 3a, when the terminal screen is turned on, a plurality of application identifiers (names such as setting, sports health, weather, browser, video, music, mall, reading, etc., and icons of each application) are displayed in the screen, wherein reading is a preset target application, and other applications are misleading other applications, and when a user clicks to read, the target application is reading, and at this time, the attribute of the reading is displayed (as shown in fig. 3b, the attributes include A, B, C and D).
If the user clicks D (as shown in fig. 4 a), the intelligent terminal detects that the target attribute is D, and the intelligent terminal detects that the target application is a preset target application, and if the target attribute is the preset target attribute, the terminal is unlocked, and a system desktop of the terminal is displayed (as shown in fig. 4 b).
In the embodiment, a terminal screen is lightened by receiving a screen lightening instruction, and a plurality of application identifiers are displayed on the terminal screen; receiving a first selection operation instruction, selecting a target application identifier from a plurality of application identifiers, and displaying the attribute of the target application; receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application; and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed. Because the application identifier of the application used by the user is used as the preset target application, and the attribute in the preset target application is used as the preset target attribute, the user can directly select according to the image when unlocking, so that quick unlocking is realized without memorizing a specific password, and because the identifiers and the attributes of other applications are set for misleading, other personnel are difficult to unlock.
Referring to fig. 5, fig. 5 is a flowchart of a second embodiment of a terminal unlocking method in the present application.
Based on the above first embodiment, the method for unlocking a terminal in this embodiment further includes, before the step S10:
step S01: and determining the current preset target application of the terminal.
It should be noted that, the preset target application may be specified by the user operating the intelligent terminal, and at this time, it is determined that the current preset target application of the terminal may be the acquisition of the unlock application setting record, and the current preset target application of the terminal is extracted from the unlock application record. The unlocking application setting record may be a record generated by operating the intelligent terminal when the user designates the preset target application, and may store application information of the preset target application, such as an application name, an application number, an application version number, and the like.
Of course, the application that is used recently by the intelligent terminal and the application that is used most often in the intelligent terminal may be used as the current preset target application of the terminal, which is not limited in this embodiment.
In a specific implementation, in order to reduce that the preset target application is known by other users besides the owner, the preset target application may be determined according to the record of the owner using the intelligent terminal, and at this time, step S01 in this embodiment may include:
acquiring an unlocking application pool and a recent operation record of a terminal;
determining a recently used application set according to the recently operated record;
acquiring an intersection of the recently used application set and the unlocking application pool, and determining an application to be selected;
and determining the current preset target application of the terminal according to the application to be selected.
It should be noted that, application information of an application that can be a preset target application specified by the owner may be stored in the unlocking application pool. The recent operation record may be a record of the user's recent use of the smart terminal, for example: the record of the user using the intelligent terminal in approximately 2 hours is taken as the recent operation record.
In actual use, determining the set of recently used applications from the recent operation records may be to analyze the recent operation records, determine all applications that have been recently operated by the user, aggregate application information of such applications, and serve as the set of recently used applications.
It can be appreciated that after determining the recently used application set, it can also be detected which part of the recently used application set can be used as the preset target application, so that the intersection of the recently used application set and the unlocked application pool can be obtained to determine the candidate application.
In actual use, the determining of the current preset target application of the terminal according to the to-be-selected application may be randomly selecting one of the to-be-selected applications as the current preset target application of the terminal.
In a specific implementation, since one is randomly selected as the current preset target application of the terminal, the effect of actual selection is poor, that is, an application which may be used by a user for a short period of time only may be selected as the preset target application, and at this time, the image of the user is shallow, which is unfavorable for actually unlocking, so that in order to avoid such a phenomenon, the step of determining the current preset target application of the terminal according to the application to be selected in this embodiment may include:
obtaining a use ranking score, a duration ranking score and a time limit representation score corresponding to each application to be selected;
determining an application selection total score corresponding to each application to be selected according to the use ranking score, the duration ranking score and the time limit representation score;
And selecting the application to be selected with the largest total score from the corresponding application as the current preset target application of the terminal.
It should be noted that, the usage ranking score may be a quantized score for representing a difference between a last usage time of each application to be selected and a current time, and the higher the corresponding usage ranking score is, the smaller the difference between the last usage time of the application to be selected and the current time is; the duration ranking score is a quantized score used for representing the duration of each candidate application used in the near term, and the higher the corresponding duration ranking score is, the longer the duration of the candidate application used in the near term is; the time limit characterization score may be a quantized score that characterizes whether the selected application is currently recommended for use;
for example: assuming that n applications to be selected are arranged, an application to be selected is arranged in an m (from near to far) mode in the plurality of applications to be selected from the current moment at the latest moment of use, and the ranking score is 5 (n-m)/n; the service time is the same, and the service time rank can be set according to each application to be selected; and according to whether the time limit is recommended, the time limit is calculated independently, the recommended use is recommended, the time limit representation score is 2, and if not, the time limit representation score is 1.
In actual use, determining the application selection total score corresponding to the application to be selected according to the usage ranking score, the duration ranking score and the time limit representation score may be adding the usage ranking score, the duration ranking score and the time limit representation score corresponding to the application to be selected, and taking the obtained sum value as the application selection total score corresponding to the application to be selected.
And when the application is actually applied, the larger the total score of the application selection corresponding to the application to be selected is, the more suitable the application to be selected is as the current preset target application of the intelligent terminal.
For ease of understanding, the present solution is now illustrated, but not specifically limited:
the unlocking application pool is assumed to comprise application information of four applications A1-A4, namely, applications A1-A4 and the like defined by a user can be used as preset target applications; if the recently used application set contains 10 applications, if only one of the applications is set to be a preset target application, namely only one of the applications can be used as an unlocking application, the application can be used as the current preset target application of the intelligent terminal;
if a plurality of applications which can be set as preset target applications are in the recently used application set, the plurality of applications which can be set as preset target applications can be used as candidate applications at this time, and the scores of the candidate applications can be calculated.
If the latest usage coefficient is set to be 5, the usage time length coefficient is 3, and the time limit coefficient is 2, wherein A1 and A4 are 9 on weekdays as video type application non-recommended times: 00 to 11:00 and 13:00 to 17:00, then A2 and A3 do not set the non-recommended time. The applications used recently (from near to far) before the user locks the screen are respectively B1, A1, B2, A3, A2 and the like, and the cumulative use time length of the last 2 hours is respectively 1 minute, 20 minutes, 5 minutes and 30 minutes and 10 minutes;
If the current time is 10 days of working, determining the application A1, A2 and A3 to be selected, wherein the corresponding use ranking scores are 5,5 x 2/3= 3.3,5/3=1.7 respectively; the corresponding duration ranking scores are 3*2/3=2, 3/3=1, respectively; and the corresponding time limit representation scores are respectively 2 x 0.5=1, 2 and 2, and finally, the total scores of the application selection corresponding to the three applications to be selected are respectively 8,8.3,4.7, so that the A2 is selected as the unlocking application.
It can be understood that the current preset target application of the intelligent terminal is selected by the method, multiple factors such as the latest use, the use duration, whether the use is recommended or not and the like are comprehensively considered, the user can be ensured to be deep about the application finally selected as the preset target application, and accordingly the unlocking effect is ensured to be relatively good.
Step S02: and searching corresponding similar applications in an application information base according to the application types of the preset target applications.
Step S03: and acquiring application identifiers of the preset target application and the similar applications.
The application information base may be a database for storing application information of each terminal application.
In practical use, the intelligent terminal may periodically read application information of applications of different application types from an application market (or similar data sources that can acquire application information), and store the application information in an application information base.
It should be noted that, the similar application may be other applications with the same application type as the preset target application, for example: an application named "XX video" is designated as a preset target application, and the application is a video play class application, and one or more other applications that are also video play class applications can be used as similar applications at this time.
In practical application, in order to avoid that other users can perceive which terminal application is set as a preset target application by a machine owner of the intelligent terminal, during display, the difference between the application for misguidance and the preset target application needs to be reduced as much as possible, and other applications with the same application type as the preset target application can be selected for misguidance, so that corresponding similar applications can be searched in an application information base according to the application type of the preset target application.
It can be appreciated that after the preset target application and the similar applications are determined, application identifiers of the preset target application and the similar applications can be obtained, so that when the screen is lightened, the screen can be displayed quickly.
If necessary, the preset target application and the similar applications may be determined during the process of screen lighting, that is, steps S01-S03 in this embodiment may also be performed during the process of screen lighting, which is not limited in this embodiment.
The embodiment determines the current preset target application of the terminal; searching corresponding similar applications in an application information base according to the application types of the preset target applications; and acquiring application identifiers of the preset target application and the similar applications. Other applications with the same application type as the preset target application are searched and used as the same type of application, and application identifiers of the same type of application and the preset target application are displayed in the lighted terminal screen, so that other users who are not the owner are difficult to distinguish, and the situation that the other users can unlock the intelligent terminal is avoided.
Referring to fig. 6, fig. 6 is a flowchart of a third embodiment of a terminal unlocking method in the present application.
Based on the above first embodiment, the step S20 of the terminal unlocking method of the present embodiment includes:
step S201: and receiving a first selection operation instruction, and selecting a target application identifier from the application identifiers.
Step S202: and searching the basic attribute and the misleading attribute corresponding to the target application in an application attribute library.
Step S203: and displaying the basic attribute and the misleading attribute.
It should be noted that, at this time, the user operating the intelligent terminal may not be the owner of the intelligent terminal, but other users are operating the intelligent terminal, so as to avoid that the user may determine which application identifier is the identifier of the preset target application through multiple attempts, after determining the target application identifier, whether the target application corresponding to the target application identifier is the preset target application or not, the attribute of the target application may be displayed, and therefore, after determining the target application identifier, the basic attribute and the misleading attribute corresponding to the target application may be searched in the application database.
The application attribute library may store attribute information of each application, where the attribute information may include basic attribute and misleading information.
In actual use, the basic attribute of each application in the unlocking application pool may be specified by the user, or may be determined according to the usage record of the user on the preset target application (for example, the trade name recently browsed by the user or the video name recently watched by the user is used as the basic attribute), if an application in the unlocking application pool is specified as the preset target application, the basic attribute of the application is the preset target attribute. Each application in the unlocking application pool can correspond to a basic attribute. The basic attribute of the similar application can be the information of the file name, the file diversity, the contact person stored in the application and the like of the multimedia file which can be played in the application. The misleading attributes may be generated in a particular manner based on the underlying attributes.
It can be appreciated that after the basic attribute and the misleading attribute are obtained, they can be displayed so as to facilitate the user to select accordingly.
In a specific implementation, in order to avoid that other users learn what the preset target attribute set by the owner of the intelligent terminal is, before step S202 in this embodiment, the method may further include:
When the information updating condition is detected to be met, acquiring application types of all applications in the unlocking application pool;
obtaining similar applications and corresponding basic attributes of the similar applications according to the application types;
constructing misleading attributes corresponding to the similar applications according to the basic attributes;
and updating an application information base according to the similar application, and updating an application attribute base according to the basic attribute and the misleading attribute.
It should be noted that, if the information update condition is satisfied, it indicates that the application attribute library needs to be updated at this time, so as to ensure the similarity between each misleading attribute generated in the application attribute library and the basic attribute of the application, improve the misleading effect of the misleading attribute, and ensure that when the information is displayed later, it is difficult for other users other than the owner to know what the preset target attribute is.
In practical use, the similar applications are obtained according to the application types, and the basic attributes corresponding to the similar applications can be that the applications consistent with the application types are obtained in the application market or other similar data sources according to the application types, and used as the similar applications, and the corresponding basic attributes are set for the similar applications, for example: attribute information (e.g., trade name, video name) of the application of the same class in the application market, which is most frequently used (or most highly discussed, etc.), is taken as a basic attribute. The unlocking application pool may have multiple applications of different application types at the same time, and the steps may be executed once for each application type.
In practical application, the misleading attribute corresponding to each similar application is constructed according to the basic attribute, and the attribute which is similar to the basic attribute is generated based on the basic attribute and used as the misleading attribute.
For example: if the similar application is a video application, the basic attribute of the similar application is the name of the video playing before, then other videos similar to the video can be searched at the moment, and the names of the other videos are used as misleading attributes; if the similar application is a chat application, and the basic attribute is a nickname of the chat object before, searching a plurality of (e.g. 30) other friend names in the chat application, and randomly collocating nicknames, head portraits and the like, thereby generating misleading attributes; if the same type of application is a shopping type application, the basic attribute is the type of product that was previously browsed (e.g., men's pants), and words of the same or similar type may be generated as misleading attributes (e.g., men's coat, etc.).
It can be understood that after the misleading attribute and the basic attribute corresponding to each application of the same kind are obtained, the application information base can be updated according to the application of the same kind (if the application of the same kind with the same application identifier exists, the application can be covered, and if the application of the same kind with the same application identifier does not exist, the application information base can be updated by adopting the basic attribute and the misleading attribute, and the application information base can be also updated (or can be covered or added according to the judgment of the application identifier).
In a specific implementation, in order to ensure that updating can be reasonably performed, before acquiring the application type of each application in the unlocking application pool when the information updating condition is detected to be satisfied, the method further includes:
when the system time is detected to reach the information updating time, judging that the information updating condition is met;
or alternatively, the first and second heat exchangers may be,
when detecting that an application is newly added or deleted in the unlocking application pool, judging that the information updating condition is satisfied;
or alternatively, the first and second heat exchangers may be,
and when detecting that the basic attribute corresponding to the application in the unlocking application pool changes, judging that the information updating condition is satisfied.
It will be appreciated that if the system time is detected to reach the information update time, this indicates that the information update time has been set in advance, and the application information base and the application attribute base may not have been updated for a long time, so it may be determined that the information update condition is satisfied. The information update time may be preset by a user or a manager, or may be automatically generated according to an update trigger condition preset by the user or the manager, for example: assuming that the update trigger condition is updated every one hour, the system time is determined to reach the information update time every time of the whole point.
In an actual scene, if an application is newly added or deleted in the application pool, the application information base and the application attribute base need to be synchronously updated at the moment, so that the similar applications and the misleading attributes can be provided for the newly added applications in the follow-up process, and the similar applications and the misleading attributes which are not needed any more can be deleted.
If the basic attribute corresponding to the application in the unlocking application pool is detected to change, the misleading attribute set for the application with the changed basic attribute is probably not applicable any more, and the updating needs to be tried, so that it can be determined that the information updating condition is met.
In a specific implementation, in order to ensure that updating can be reasonably performed, the step of determining that the information updating condition is satisfied when detecting that the basic attribute corresponding to the application in the unlocking application pool changes in this embodiment may include:
if any application in the unlocking application pool is detected to be started, the started application is used as the application to be updated;
extracting a basic attribute corresponding to the application to be updated from an application attribute library to serve as a historical basic attribute;
determining the current basic attribute of the application to be updated according to the use record of the application to be updated;
If the historical basic attribute and the current basic attribute are different, constructing a misleading attribute corresponding to the application to be updated according to the current basic attribute;
and updating the application attribute library according to the current basic attribute and the misleading attribute, and judging that the information updating condition is satisfied.
It should be noted that, the basic attribute of each application in the unlocking application pool may be dynamically determined according to the operation of the user, so if the application in the unlocking application pool is started, the basic attribute may be changed correspondingly, and at this time, the started application may be used as the application to be updated.
It can be understood that if the current basic attribute and the historical basic attribute are different, it means that the basic attribute of the application to be updated changes with the use of the user, then a corresponding misleading attribute is generated according to the current basic attribute, then the information corresponding to the application to be updated in the application attribute library is updated according to the current basic attribute and the misleading attribute, and it is determined that the information update condition is satisfied.
In a specific implementation, in order to ensure that the constructed misleading attribute is similar to the current basic attribute and ensure the misleading effect, in this embodiment, if the historical basic attribute and the current basic attribute have a difference, the step of constructing the misleading attribute corresponding to the application to be updated according to the current basic attribute may include:
If the historical basic attribute and the current basic attribute are different, acquiring the application type of the application to be updated;
determining an associated attribute according to the application type and the current basic attribute;
and constructing misleading attributes corresponding to the application to be updated according to the association attributes.
It should be noted that, determining the association attribute according to the application type and the current basic attribute, and constructing the misleading attribute corresponding to the application to be updated according to the association attribute may be determining the association attribute with higher similarity to the current basic attribute according to the application type, and then processing (such as disorder or combination) based on the association attribute to generate a plurality of misleading attributes with higher similarity to the current basic attribute.
For example: if the application type is a video application, the current basic attribute is the name of the video playing before (if the video is a series, the name plus the album number can be adopted as the current basic attribute), then other videos similar to the video can be searched at the moment, the names of the other videos are used as the associated attributes, and then the associated attributes are subjected to character splitting and random scrambling combination, so that misleading attributes are generated; if the application type is chat type application, at the moment, the current basic attribute and nicknames of the previous chat objects can be searched for a plurality of (e.g. 30) other friends in the chat type application as associated attributes, and nicknames, head images and the like corresponding to the friends are randomly collocated, so that misleading attributes are generated; if the application type is shopping application, the basic attribute is the type of the browsing commodity before the application type (such as men trousers), the type is split into keywords, the near meaning words are searched for as the associated attribute according to the keywords, and the approximate words can be generated as the misleading attribute according to the associated words (such as men's coat, men's coat and the like).
The embodiment selects a target application identifier from the application identifiers by receiving a first selected operation instruction; searching a basic attribute and a misleading attribute corresponding to the target application in an application attribute library; and displaying the basic attribute and the misleading attribute. Because the basic attribute corresponding to the target application is searched in the application attribute library and the misleading attribute generated based on the basic attribute is displayed, other users who are not the owner can hardly determine the specific preset target attribute even if the preset target application is selected, and therefore the situation that the other users can unlock the intelligent terminal is avoided.
In addition, the embodiment of the application further provides a storage medium, wherein a terminal unlocking program is stored on the storage medium, and the terminal unlocking program realizes the steps of the terminal unlocking method when being executed by a processor.
Referring to fig. 7, fig. 7 is a block diagram illustrating a first embodiment of a terminal unlocking device according to the present application.
As shown in fig. 7, the terminal unlocking device provided in the embodiment of the present application includes:
the instruction receiving module 10 is used for receiving a screen lighting instruction to light a terminal screen, and a plurality of application identifiers are displayed on the terminal screen;
The first selection module 20 is configured to receive a first selection operation instruction, select a target application identifier from the plurality of application identifiers, and display an attribute of the target application;
a second selection module 30, configured to receive a second selection operation instruction, and select a target attribute from the attributes of the target application;
and the terminal control module 40 is configured to execute terminal unlocking if the target application is a preset target application and the target attribute is a preset target attribute.
In the embodiment, a terminal screen is lightened by receiving a screen lightening instruction, and a plurality of application identifiers are displayed on the terminal screen; receiving a first selection operation instruction, selecting a target application identifier from a plurality of application identifiers, and displaying the attribute of the target application; receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application; and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed. Because the application identifier of the application used by the user is used as the preset target application, and the attribute in the preset target application is used as the preset target attribute, the user can directly select according to the image when unlocking, so that quick unlocking is realized without memorizing a specific password, and because the identifiers and the attributes of other applications are set for misleading, other personnel are difficult to unlock.
In one possible implementation manner of the present application, the plurality of application identifiers includes: presetting an application identifier of a target application and an application identifier of a similar application;
the instruction receiving module 10 is further configured to determine a current preset target application of the terminal; searching corresponding similar applications in an application information base according to the application types of the preset target applications; and acquiring application identifiers of the preset target application and the similar applications.
In one possible implementation manner of the present application, the instruction receiving module 10 is further configured to obtain an unlock application pool and a recent operation record of the terminal; determining a recently used application set according to the recently operated record; acquiring an intersection of the recently used application set and the unlocking application pool, and determining an application to be selected; and determining the current preset target application of the terminal according to the application to be selected.
In one possible implementation manner of the present application, the instruction receiving module 10 is further configured to obtain a usage ranking score, a duration ranking score, and a time limit representation score corresponding to each application to be selected; determining an application selection total score corresponding to each application to be selected according to the use ranking score, the duration ranking score and the time limit representation score; and selecting the application to be selected with the largest total score from the corresponding application as the current preset target application of the terminal.
In one possible implementation manner of the present application, the first selection module 20 is further configured to search an application attribute library for a basic attribute and a misleading attribute corresponding to the target application; and displaying the basic attribute and the misleading attribute.
In one possible implementation manner of the present application, the first selecting module 20 is further configured to obtain an application type of each application in the unlock application pool when it is detected that the information update condition is satisfied; obtaining similar applications and corresponding basic attributes of the similar applications according to the application types; constructing misleading attributes corresponding to the similar applications according to the basic attributes; and updating an application information base according to the similar application, and updating an application attribute base according to the basic attribute and the misleading attribute.
In one possible implementation manner of the present application, the first selecting module 20 is further configured to determine that the information update condition is satisfied when it is detected that the system time reaches the information update time; or when detecting that an application is newly added or deleted in the unlocking application pool, judging that the information updating condition is met; or when detecting that the basic attribute corresponding to the application in the unlocking application pool changes, judging that the information updating condition is met.
In one possible implementation manner of the present application, the first selecting module 20 is further configured to, if it is detected that any application in the unlock application pool is started, use the started application as the application to be updated; extracting a basic attribute corresponding to the application to be updated from an application attribute library to serve as a historical basic attribute; determining the current basic attribute of the application to be updated according to the use record of the application to be updated; if the historical basic attribute and the current basic attribute are different, constructing a misleading attribute corresponding to the application to be updated according to the current basic attribute; and updating the application attribute library according to the current basic attribute and the misleading attribute, and judging that the information updating condition is satisfied.
In one possible implementation manner of the present application, the first selecting module 20 is further configured to obtain an application type of the application to be updated if the historical base attribute is different from the current base attribute; determining an associated attribute according to the application type and the current basic attribute; and constructing misleading attributes corresponding to the application to be updated according to the association attributes.
It should be understood that the foregoing is merely illustrative, and the technical solutions of the present application are not limited in any way, and those skilled in the art may set the technical solutions according to the needs in the specific application, and the present application is not limited thereto.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of protection of the present application, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details that are not described in detail in this embodiment may refer to a terminal unlocking method provided in any embodiment of the present application, which is not described herein again.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory (ROM)/RAM, magnetic disk, optical disk) and including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (11)

1. The terminal unlocking method is characterized by comprising the following steps of:
Receiving a screen lighting instruction to light a terminal screen, wherein a plurality of application identifiers are displayed on the terminal screen;
receiving a first selection operation instruction, selecting a target application identifier from the application identifiers, and displaying the attribute of the target application;
receiving a second selection operation instruction, and selecting a target attribute from the attributes of the target application;
and if the target application is a preset target application, the target attribute is a preset target attribute, and unlocking the terminal is executed.
2. The terminal unlocking method of claim 1, wherein the plurality of application identifications comprises: presetting an application identifier of a target application and an application identifier of a similar application;
before a screen lightening instruction is received to lighten a terminal screen, determining the current preset target application of the terminal;
searching corresponding similar applications in an application information base according to the application types of the preset target applications;
and acquiring application identifiers of the preset target application and the similar applications.
3. The method for unlocking a terminal according to claim 2, wherein the determining the current preset target application of the terminal comprises:
acquiring an unlocking application pool and a recent operation record of a terminal;
determining a recently used application set according to the recently operated record;
Acquiring an intersection of the recently used application set and the unlocking application pool, and determining an application to be selected;
and determining the current preset target application of the terminal according to the application to be selected.
4. The method for unlocking a terminal according to claim 3, wherein the determining the current preset target application of the terminal according to the candidate application comprises:
obtaining a use ranking score, a duration ranking score and a time limit representation score corresponding to each application to be selected;
determining an application selection total score corresponding to each application to be selected according to the use ranking score, the duration ranking score and the time limit representation score;
and selecting the application to be selected with the largest total score from the corresponding application as the current preset target application of the terminal.
5. The method for unlocking a terminal according to any one of claims 1 to 4, wherein displaying the attribute of the target application includes:
searching a basic attribute and a misleading attribute corresponding to the target application in an application attribute library;
and displaying the basic attribute and the misleading attribute.
6. The method for unlocking a terminal according to claim 5, wherein before searching the basic attribute and the misleading attribute corresponding to the target application in the application attribute library, the method further comprises:
When the information updating condition is detected to be met, acquiring application types of all applications in the unlocking application pool;
obtaining similar applications and corresponding basic attributes of the similar applications according to the application types;
constructing misleading attributes corresponding to the similar applications according to the basic attributes;
and updating an application information base according to the similar application, and updating an application attribute base according to the basic attribute and the misleading attribute.
7. The method for unlocking a terminal according to claim 6, wherein before acquiring the application type of each application in the unlocking application pool when the information updating condition is detected to be satisfied, further comprising:
when the system time is detected to reach the information updating time, judging that the information updating condition is met;
or alternatively, the first and second heat exchangers may be,
when detecting that an application is newly added or deleted in the unlocking application pool, judging that the information updating condition is satisfied;
or alternatively, the first and second heat exchangers may be,
and when detecting that the basic attribute corresponding to the application in the unlocking application pool changes, judging that the information updating condition is satisfied.
8. The method for unlocking a terminal according to claim 7, wherein determining that the information update condition is satisfied when detecting that the basic attribute corresponding to the application in the unlock application pool is changed, comprises:
If any application in the unlocking application pool is detected to be started, the started application is used as the application to be updated;
extracting a basic attribute corresponding to the application to be updated from an application attribute library to serve as a historical basic attribute;
determining the current basic attribute of the application to be updated according to the use record of the application to be updated;
if the historical basic attribute and the current basic attribute are different, constructing a misleading attribute corresponding to the application to be updated according to the current basic attribute;
and updating the application attribute library according to the current basic attribute and the misleading attribute, and judging that the information updating condition is satisfied.
9. The method for unlocking a terminal according to claim 8, wherein if there is a difference between the history base attribute and the current base attribute, constructing a misleading attribute corresponding to the application to be updated according to the current base attribute includes:
if the historical basic attribute and the current basic attribute are different, acquiring the application type of the application to be updated;
determining an associated attribute according to the application type and the current basic attribute;
and constructing misleading attributes corresponding to the application to be updated according to the association attributes.
10. A terminal unlocking device, characterized in that the terminal unlocking device comprises: processor, memory and a terminal unlocking program stored on the memory and executable on the processor, which when executed by the processor, implements the steps of the terminal unlocking method according to any one of claims 1-9.
11. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a terminal unlocking program, which when executed implements the steps of the terminal unlocking method according to any of claims 1-9.
CN202311665152.9A 2023-12-04 2023-12-04 Terminal unlocking method, equipment and storage medium Pending CN117668795A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311665152.9A CN117668795A (en) 2023-12-04 2023-12-04 Terminal unlocking method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311665152.9A CN117668795A (en) 2023-12-04 2023-12-04 Terminal unlocking method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117668795A true CN117668795A (en) 2024-03-08

Family

ID=90084148

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311665152.9A Pending CN117668795A (en) 2023-12-04 2023-12-04 Terminal unlocking method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117668795A (en)

Similar Documents

Publication Publication Date Title
US8320707B2 (en) System and method for use of images with recognition analysis
US20150016691A1 (en) Image Tagging User Interface
US20130195375A1 (en) Tagging images with labels
CN102609434A (en) Face recognition using social data
CN110135951B (en) Game commodity recommendation method and device and readable storage medium
US11055759B1 (en) Color selection for image matching visual search
CN109168047B (en) Video recommendation method and device, server and storage medium
US20160179813A1 (en) Method and system for theme management
CN110688009B (en) Application program access method and device for folding screen terminal
CN111054060B (en) Game control method, device, computer equipment and storage medium
CN111209490A (en) Friend-making recommendation method based on user information, electronic device and storage medium
CN113190695B (en) Multimedia data searching method and device, computer equipment and medium
CN112433650B (en) Project management method, device, equipment and storage medium
CN112615958A (en) Contact person display method and device and electronic equipment
JP2009223656A (en) Device, system and method for providing virtual space, and computer program
JP2020119585A (en) Information processing system, information processor, control method, and program
CN105718147A (en) Input method panel enabling method and device and input method and input method system
CN113037925B (en) Information processing method, information processing apparatus, electronic device, and readable storage medium
CN112639759A (en) Context digital media processing system and method
US9141818B2 (en) Information providing apparatus and non-transitory computer readable medium having stored information for each marker image identification information
CN117668795A (en) Terminal unlocking method, equipment and storage medium
JP2020154784A (en) Item presentation method, item presentation program, and item presentation apparatus
CN116304335A (en) Object recommendation method, user preference identification method and device
CN114528478A (en) User query recommendation method and device, electronic equipment and storage medium
CN112084151A (en) File processing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination