WO2014082573A1 - 一种终端设备的解锁方法及终端设备 - Google Patents

一种终端设备的解锁方法及终端设备 Download PDF

Info

Publication number
WO2014082573A1
WO2014082573A1 PCT/CN2013/087905 CN2013087905W WO2014082573A1 WO 2014082573 A1 WO2014082573 A1 WO 2014082573A1 CN 2013087905 W CN2013087905 W CN 2013087905W WO 2014082573 A1 WO2014082573 A1 WO 2014082573A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
password
terminal device
information
interface
Prior art date
Application number
PCT/CN2013/087905
Other languages
English (en)
French (fr)
Inventor
赵君杰
吴黄伟
朱萸
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to EP13857892.7A priority Critical patent/EP2857947B1/en
Publication of WO2014082573A1 publication Critical patent/WO2014082573A1/zh
Priority to US14/586,196 priority patent/US20150128257A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/66Substation equipment, e.g. for use by subscribers with means for preventing unauthorised or fraudulent calling
    • H04M1/667Preventing unauthorised calls from a telephone set
    • H04M1/67Preventing unauthorised calls from a telephone set by electronic means
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2250/00Details of telephonic subscriber devices
    • H04M2250/22Details of telephonic subscriber devices including a touch pad, a touch sensor or a touch detector

Definitions

  • the present invention relates to the field of communications, and in particular, to a method for unlocking a terminal device and a terminal device.
  • terminal devices have become an indispensable part of people's daily lives.
  • most terminal devices are currently provided with a password protection function.
  • the terminal device When the terminal device is in the locked state, the user can only unlock the terminal device and enter the interface of the terminal device by inputting the correct password. To operate the terminal equipment.
  • the robustness of password protection depends on the complexity of the password (for example: the number of digits of the password or the complexity of the graphical password).
  • the higher the complexity of the password the better the robustness of the password, and it is not easy to crack.
  • the lower the complexity of the password the worse the robustness of the password, and it is relatively easy to crack.
  • the more complicated the password is the harder it is for the user to enter the password, and the error is easy, and the user experience is poor.
  • the embodiments of the present invention provide a method for unlocking a terminal device and a terminal device, so as to improve user experience when ensuring robustness of password protection.
  • a first aspect of the present invention provides a method for unlocking a terminal device, where the terminal device is configured with a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface, and the method Includes:
  • the second unlocking interface is displayed;
  • the preset condition includes: the number of times the second unlock password has been used is less than a preset threshold, and/or the time when the display unlocking interface is triggered. The preset time after the terminal device.
  • the method further includes:
  • the step of receiving the information input by the user on the second unlocking interface is performed.
  • the method further includes:
  • the determination result is no, it is determined whether the information matches the first unlock password, and if the determination result is yes, the terminal device is unlocked.
  • the method further includes:
  • the step of receiving the information input by the user on the second unlocking interface is performed.
  • the method further includes:
  • the terminal device is unlocked.
  • the preset threshold includes:
  • a preset threshold that is automatically set according to the complexity of the second unlock password is automatically set according to the complexity of the second unlock password.
  • a second aspect of the present invention provides a terminal device, where the terminal device is configured with a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface, where the terminal device includes: an acquiring unit and a first display unit a first receiving unit, a first determining unit, and an unlocking unit, wherein:
  • the obtaining unit is configured to obtain information that triggers the display unlocking interface
  • a first display unit configured to: when the acquiring unit acquires the information, if the state of the terminal device meets a preset condition, displaying a second unlocking interface;
  • a first receiving unit configured to receive information input by the user on the second unlocking interface, where the first determining unit is configured to determine whether the information received by the first receiving unit matches the second unlocking password;
  • An unlocking unit configured to: when the first determining unit determines that the result is yes, unlock the terminal device;
  • the preset threshold includes: a preset threshold preset by a user;
  • a preset threshold that is automatically set according to the complexity of the second unlock password is automatically set according to the complexity of the second unlock password.
  • the terminal device further includes: a first accumulating unit and a second judging unit, where: the first accumulating unit is configured to: when the first judging unit determines that the result is no, determine that the password input fails, and the accumulated password Enter the number of failures;
  • a second determining unit configured to determine whether the number of times the password input failure accumulated by the first accumulating unit is less than a preset threshold
  • the first receiving unit is further configured to: when the second determining unit determines that the result is yes, receive information input by the user on the second unlocking interface.
  • the terminal device further includes:
  • a third determining unit configured to determine, when the first determining unit determines that the result is negative, whether the information received by the first receiving unit matches the first unlocking password
  • the unlocking unit is further configured to: when the third determining unit determines that the result is yes, unlock the terminal device.
  • the terminal device further includes: a second accumulating unit and a fourth determining unit, where:
  • a second accumulating unit configured to: when it is determined that the information does not match the first unlocking password and the second unlocking password, determine that the password input fails, and the cumulative password input fails; the fourth determining unit is configured to: Determining whether the number of times the password input failure accumulated by the second accumulation unit is less than a preset threshold;
  • the first receiving unit is further configured to: when the fourth determining unit determines that the result is yes, receive information input by the user on the second unlocking interface.
  • the terminal device further includes: a second display unit, a second receiving unit, and a fifth determining unit, where:
  • a second display unit configured to display the first unlocking interface when the second determining unit determines that the result is negative
  • a second receiving unit configured to receive information input by the user on the first unlocking interface, and a fifth determining unit, configured to determine whether information received by the second receiving unit matches the first unlocking password;
  • the unlocking unit is further configured to: when the fifth determining unit determines that the result is yes, unlock the terminal device.
  • the information that triggers the display of the unlocking interface is obtained.
  • the second unlocking interface is displayed; and the receiving user is on the second unlocking interface. Entering the information; determining whether the input information matches the second unlock password, and if the determination result is yes, unlocking; wherein the complexity of the second unlock password is lower than the complexity of the first unlock password degree.
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, and only when the information is obtained, if the state of the terminal device meets the preset condition, the second unlocking interface is displayed and the second unlocking is used.
  • the password which enhances the user experience while maintaining the robustness of password protection.
  • FIG. 1 is a schematic flowchart of a method for unlocking a terminal device according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of another method for unlocking a terminal device according to an embodiment of the present invention
  • FIG. 4 is a schematic diagram of an optional unlocking interface provided by an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of another optional unlocking interface provided by an embodiment of the present invention.
  • FIG. 6 is a schematic flowchart of another method for unlocking a terminal device according to an embodiment of the present invention
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • FIG. 8 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 9 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 11 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure
  • FIG. 12 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure
  • FIG. 13 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 14 is a schematic structural diagram of another terminal device according to an embodiment of the present disclosure.
  • FIG. 15 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
  • FIG. 1 is a schematic flowchart of a method for unlocking a terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface, as shown in FIG.
  • the method includes:
  • step 104 determining whether the input information is matched with the second unlock password, if the determination result is yes, proceed to step 105;
  • the complexity of the second unlock password is lower than the complexity of the first unlock password.
  • the information that triggers the display of the unlocking interface is obtained.
  • the second unlocking interface is displayed; and the receiving user inputs the second unlocking interface. Determining whether the input information is matched with the second unlocking password, and if the determination result is yes, unlocking the terminal device; wherein the complexity of the second unlocking password is lower than the first unlocking The complexity of the password.
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, and only when the information is obtained, if the state of the terminal device meets the preset condition, the second unlocking interface is displayed and the second unlocking is used. password, This improves the user experience while ensuring the robustness of password protection.
  • 2 is a schematic flowchart of another method for unlocking a terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlock password, a second unlock password, a first unlock interface, and a second unlock interface, as shown in FIG. 2 .
  • the method includes:
  • the step of acquiring the information for triggering the display of the unlocking interface may include: receiving an indication that the user inputs an information that triggers the display of the unlocking interface; for example: the user presses a power button or an unlock button;
  • Receiving information triggered by the network side to display the unlock interface (for example, a short message);
  • Obtaining information about triggering the display unlocking interface generated internally by the terminal device for example, a warning message such as an alarm clock.
  • the information for acquiring the trigger display unlock interface includes, but is not limited to, the implementations listed above.
  • the foregoing preset conditions may specifically include:
  • the number of times the second unlock password has been used is less than a preset threshold
  • step 202 may specifically include:
  • the second unlock interface is displayed.
  • the preset threshold is 3, and when the information is acquired, the state of the terminal device that meets the second unlock password has been used is less than a preset threshold, that is, when the information is acquired, The second unlock password has been used less than 3 times.
  • the user may further reset the second unlock password.
  • the foregoing preset conditions may specifically include: The time when the display of the unlocking interface is triggered is preset within a preset time after the user ends the operation of the terminal device;
  • step 202 may specifically include:
  • the second unlocking interface is displayed within a preset time after the user ends the operation of the terminal device.
  • the time when the information is obtained may be understood as the time when the display unlocking interface is triggered.
  • the time for triggering the display of the unlocking interface may be slightly earlier than the time when the information is acquired, and there may be a certain time difference between the two, but based on the The time difference is small and can be ignored.
  • the time to trigger the display of the unlock interface can be understood as the time when the information is obtained.
  • the time when the state of the terminal device meets the triggering of the display of the unlocking interface is the preset time after the user ends the operation of the terminal device, and may specifically mean that the time when the information is acquired is The preset time after the user ends the operation of the terminal device.
  • the preset time is 30 minutes
  • the second unlocking interface is displayed when the time at which the information is acquired is within 30 minutes after the user finishes operating the terminal device. For example, if the time for the user to end the operation of the terminal device is 8 o'clock, the second unlocking interface is displayed if the information for triggering the display of the unlocking interface is obtained between 8:00 and 8:30.
  • the foregoing preset conditions may specifically include:
  • the preset number of times that the second unlocking password has been used is less than a preset threshold, and the time when the unlocking interface is triggered is set to be a preset time after the user ends the operation of the terminal device;
  • the number of times the second unlock password has been used is less than the preset threshold and the time when the display of the unlock interface is triggered is within a preset time after the user finishes operating the terminal device.
  • step 202 may specifically include:
  • the number of times the second unlock password has been used is less than a preset threshold, and the time when the user displays the unlocking interface is satisfied. In the set time, the second unlocking interface is displayed.
  • This embodiment is a combination of the above two embodiments, that is, the second unlocking interface is displayed as long as the above two conditions are satisfied. If the preset threshold is 3, and the preset time is 30 minutes, when the information for triggering the display of the unlock interface is obtained, if the second unlock password has been The number of times used is less than 3 times, and the time at which the information for triggering the display of the unlocking interface is acquired is displayed within 30 minutes after the user finishes operating the terminal device, and the second unlocking interface is displayed.
  • the input information may be graphic or text or digital information.
  • the input information can be understood as an input password, and the password can be in the form of graphics or text or numbers.
  • step 205 determining whether the input information is matched with the second unlock password, if the determination result is yes, executing step 205;
  • the complexity of the second unlock password is lower than the complexity of the first unlock password.
  • the step 205 unlocks the terminal device, where the terminal device displays the main interface or the user ends the operation of the terminal last time. Interface when the device is used.
  • the method may further perform step 206;
  • step 207 Determine whether the number of times the password input fails is less than a preset threshold. If the determination result is yes, return to step 203.
  • step 208 is performed;
  • step 207 determines whether the preset threshold is 3 or the determination result in step 207 is YES, that is, when the number of failures of the second unlock password input is less than 3, step 203 is performed. If the result of the determination in step 207 is no, it means that the number of failures of the second unlocking password input is not less than 3 (equal to or greater than 3), and step 208 can be performed.
  • step 207 when the result of the determination in step 207 is no, that is, the number of times the second unlock password input fails is not less than the preset threshold, it indicates that the user fails to input the second unlock password multiple times, and step 208 is performed to prompt the user to input.
  • the first unlocking password ensures the security of the setting of the terminal device. 208. Display a first unlocking interface.
  • step 210 Determine whether the input information matches the first unlock password. If the determination result is yes, perform step 205.
  • step 210 when the result of the determination in step 210 is no, or further, the number of times the user fails to input the first unlocking password reaches a preset threshold, the process ends.
  • the first unlocking password is an unlocking password used when displaying the first unlocking interface, and when the first unlocking interface is displayed, the unlocking information such as a graphic or a text or a number input by the user needs to be the first Unlock password matching to unlock.
  • the condition that the terminal device displays the first unlocking interface may be that the state of the terminal device does not meet the foregoing preset condition.
  • the first unlocking interface is displayed when the number of times the second unlocking password of the terminal device has been used is greater than or equal to the preset threshold.
  • the time at which the information for triggering the display of the unlocking interface is acquired is outside the preset time after the user finishes operating the terminal device, the first unlocking interface is displayed.
  • the number of times that the second unlocking password of the terminal device has been used is less than the preset threshold, but the time when the information for triggering the display of the unlocking interface is acquired is after the user ends the operation of the terminal device.
  • the first unlock interface is displayed when the preset time is outside. Or if the time when the information for triggering the display of the unlocking interface is acquired is within a preset time after the user ends the operation of the terminal device, but when the information for triggering the display of the unlocking interface is acquired, the second unlocking password of the terminal device is used.
  • the first unlocking interface is displayed when the number of times is greater than or equal to the preset threshold.
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, which may specifically refer to the number of characters or the complexity of the graphic, if the first unlocking password is as shown in FIG.
  • the figure shown in a the second unlocking password can be as shown in Figure 3-b.
  • the second unlocking password may be part of the first unlocking password, the first unlocking password as shown in FIG. 3-a, and the second unlocking password as shown in FIG. 3-b.
  • the second unlock password may be specifically set by a user.
  • the second unlocking password and the first unlocking password may be two independent passwords, for example, the first unlocking password is 7945123, the second unlocking password may be 789, or the first unlocking
  • the password is a numeric password
  • the second unlock password is a graphical password, and the like. Specifically, it can be preset by the user.
  • first unlocking interface and the second unlocking interface may be two independent interfaces, and the first unlocking interface is not shown in FIG. 4-a, and the second The unlock interface can be as shown in Figure 4-b.
  • first unlocking interface and the second unlocking interface may also be the same interface.
  • the first unlocking password and the second unlocking password may be two unlocking passwords with different attributes, such as the first unlocking password being a digital password, and the second unlocking password being a graphic password.
  • the first unlocking interface can be as shown in FIG. 5-a, and the second unlocking interface can be as shown in FIG. 5-b. This makes the user more intuitive when entering the password.
  • the foregoing preset threshold may specifically include:
  • a preset threshold automatically set according to the complexity of the second unlock password.
  • the preset threshold may be set by the user, such as set to 3. It may be automatically set according to the complexity of the second unlocking password. For example, if the number of the second unlocking password is 2, the preset threshold may be automatically set to 1; or, if When the number of the second unlocking password is 3, 3 may be automatically set to the preset threshold.
  • the terminal device includes: a terminal device with an unlocking function, such as a mobile phone or a tablet computer.
  • FIG. 6 is a schematic flowchart of another method for unlocking a terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlock password, a second unlock password, a first unlock interface, and a second unlock interface, as shown in FIG. 6 .
  • the method includes:
  • step 304 determining whether the input information is matched with the second unlock password, if the determination result is yes, step 305 is performed; if the determination result is no, step 306 is performed;
  • step 306 determining whether the information matches the first unlock password, if the determination result is yes, step 305 is performed; if the determination result is no, step 307 is performed;
  • the terminal device when the second unlocking interface is displayed, when the information input by the user matches the first unlocking password, the terminal device can also be unlocked.
  • step 309 is performed;
  • step 311. Determine whether the input information matches the first unlock password. If the determination result is yes, perform step 305.
  • FIG. 7 is a schematic structural diagram of a terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlock password, a second unlock password, a first unlock interface, and a second unlock interface, as shown in FIG. 7 .
  • the terminal device includes: an obtaining unit 41, a first display unit 42, a first receiving unit 43, a first determining unit 44, and an unlocking unit 45, wherein:
  • the obtaining unit 41 is configured to obtain information that triggers the display unlocking interface
  • the first display unit 42 is configured to: when the acquiring unit 41 obtains the information, if the state of the terminal device meets a preset condition, displaying a second unlocking interface;
  • the first receiving unit 43 is configured to receive information input by the user on the second unlocking interface, and the first determining unit 44 is configured to determine whether the information received by the first receiving unit 43 matches the second unlocking password;
  • the unlocking unit 45 is configured to: when the first determining unit 44 determines that the result is yes, unlock the terminal device;
  • the information that triggers the display of the unlocking interface is obtained.
  • the second unlocking interface is displayed; and the receiving user inputs the second unlocking interface. Determining whether the input information is matched with the second unlocking password, and if the determination result is yes, unlocking the terminal device; wherein the complexity of the second unlocking password is lower than the first unlocking The complexity of the password.
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, and only when the information is obtained, if the state of the terminal device meets the preset condition, the second unlocking interface is displayed and the second unlocking is used.
  • FIG. 8 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface, as shown in FIG.
  • the method includes: an obtaining unit 51, a first display unit 52, a first receiving unit 53, a first determining unit 54, and an unlocking unit 55, wherein:
  • the obtaining unit 51 is configured to acquire information that triggers the display of the unlocking interface.
  • the obtaining unit 51 may be further configured to receive, by the user, an instruction to trigger the display of the unlocking interface; for example, the user presses a power button or an unlock button;
  • the obtaining unit 51 may be further configured to receive information about a trigger display unlocking interface sent by the network side (for example, a short message;
  • the information of the lock interface (for example: a warning message such as an alarm clock).
  • the information for acquiring the trigger display unlock interface includes, but is not limited to, the implementations listed above.
  • the first display unit 52 is configured to display the second unlocking interface when the state of the terminal device meets the preset condition when the acquiring unit 51 acquires the information.
  • the foregoing preset conditions may specifically include:
  • the number of times the second unlock password has been used is less than a preset threshold
  • the first display 52 is specifically configured to display the second unlocking interface when the acquiring unit 51 obtains the information, if the state of the terminal device satisfies that the second unlocking password has been used less than a preset threshold.
  • the preset threshold is 3, and when the information is acquired, the state of the terminal device that meets the second unlock password has been used is less than a preset threshold, that is, when the information is acquired, The second unlock password has been used less than 3 times.
  • the user may further reset the second unlock password.
  • the foregoing preset conditions may specifically include:
  • the time when the display of the unlocking interface is triggered is within a preset time after the user ends the operation of the terminal device;
  • the first display 52 is specifically configured to be used when the acquiring unit 51 obtains the information, if the state of the terminal device meets the time when the display of the unlocking interface is triggered, after the user ends the operation of the terminal device. In the set time, the second unlocking interface is displayed.
  • the time when the information is obtained can be understood as the time when the display of the unlock interface is triggered.
  • the time for triggering the display of the unlocking interface may be slightly earlier than the time when the information is obtained. There may be a certain time difference between the two, but the time difference is small and can be ignored. In this paper, the time to trigger the display of the unlocking interface can be understood.
  • the time when the state of the terminal device meets the triggering of the display of the unlocking interface is the preset time after the user ends the operation of the terminal device, and may specifically mean that the time when the information is acquired is The preset time after the user ends the operation of the terminal device.
  • the preset time is 30 minutes
  • the second unlocking interface is displayed when the time for acquiring the information is within 30 minutes after the user finishes operating the terminal device. For example, if the time for the user to end the operation of the terminal device is 8 o'clock, the second unlock interface is displayed if the information for triggering the display unlocking interface is acquired between 8 o'clock and 8:30.
  • the foregoing preset conditions may specifically include:
  • the preset number of times that the second unlocking password has been used is less than a preset threshold, and the time when the unlocking interface is triggered is set to be a preset time after the user ends the operation of the terminal device;
  • the number of times the second unlock password has been used is less than the preset threshold and the time when the display of the unlock interface is triggered is within a preset time after the user finishes operating the terminal device.
  • the first display 52 is specifically configured to be used when the acquiring unit 51 obtains the information, if the state of the terminal device meets the second unlocking password has been used less than a preset threshold, and meets the trigger display unlocking interface.
  • the second unlocking interface is displayed within a preset time after the user finishes operating the terminal device.
  • This embodiment is a combination of the above two embodiments, that is, the second unlocking interface is displayed as long as the above two conditions are satisfied. If the preset threshold is 3, and the preset time is 30 minutes, when the information for triggering the display unlocking interface is obtained, if the second unlocking password has been used less than 3 times, the information for triggering the display unlocking interface is obtained. The second unlocking interface is displayed only when the user finishes operating the terminal device within 30 minutes.
  • the first receiving unit 53 is configured to receive information input by the user on the second unlocking interface.
  • the input information may be graphic or text or digital information.
  • the input information can be understood as an input password, and the password can be in the form of graphics or text or numbers.
  • the first determining unit 54 is configured to determine whether the information received by the first receiving unit 53 matches the second unlocking password.
  • the unlocking unit 55 is configured to unlock the terminal device when the first determining unit 54 determines that the result is YES.
  • the terminal device may further include:
  • the first accumulating unit 56 is configured to determine, when the first judging unit 54 determines that the result is negative, the number of times the password input fails and the accumulated password input fails.
  • the second determining unit 57 is configured to determine whether the number of times the password input failure accumulated by the first accumulating unit 56 is less than a preset threshold.
  • the first receiving unit 53 is further configured to receive information input by the user on the second unlocking interface when the second determining unit 57 determines that the result is YES.
  • the terminal device may further include: a second display unit 58 configured to display the first unlocking interface when the second determining unit 57 determines that the result is negative. ;
  • the second receiving unit 59 is configured to receive information input by the user on the first unlocking interface, and the fifth determining unit 60 is configured to determine whether the information received by the second receiving unit 59 matches the first unlocking password;
  • the unlocking unit 55 can also be used to unlock the terminal device when the fifth determining unit 60 determines that the result is YES.
  • the first unlocking password is an unlocking password used when displaying the first unlocking interface, and when the first unlocking interface is displayed, the unlocking information such as a graphic or a text or a number input by the user needs to be the first Unlock password matching to unlock.
  • the condition that the terminal device displays the first unlocking interface may be that the state of the terminal device does not meet the foregoing preset condition.
  • the first unlocking interface is displayed when the number of times the second unlocking password of the terminal device has been used is greater than or equal to the preset threshold.
  • the time to trigger the display of the unlock interface is obtained.
  • the preset after the user ends the operation of the terminal device When the time is outside, the first unlock interface is displayed.
  • the number of times that the second unlocking password of the terminal device has been used is less than the preset threshold, but the time when the information for triggering the display of the unlocking interface is acquired is after the user ends the operation of the terminal device.
  • the first unlock interface is displayed when the preset time is outside. Or if the time when the information for triggering the display of the unlocking interface is acquired is within a preset time after the user ends the operation of the terminal device, but when the information for triggering the display of the unlocking interface is acquired, the second unlocking password of the terminal device is used.
  • the first unlocking interface is displayed when the number of times is greater than or equal to the preset threshold.
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, which may specifically refer to the number of characters or the complexity of the graphic, if the first unlocking password is as shown in FIG.
  • the figure shown in a the second unlocking password can be as shown in Figure 3-b.
  • the second unlocking password may be part of the first unlocking password, the first unlocking password as shown in FIG. 3-a, and the second unlocking password as shown in FIG. 3-b.
  • the second unlock password may be specifically set by a user.
  • the second unlocking password and the first unlocking password may be two independent passwords, for example, the first unlocking password is 7945123, the second unlocking password may be 789, or the first unlocking
  • the password is a numeric password, the second unlock password is a graphical password, and the like. The specifics can be preset by the user.
  • first unlocking interface and the second unlocking interface may be two independent interfaces, and the first unlocking interface is not shown in FIG. 4-a, and the second The unlock interface can be as shown in Figure 4-b.
  • first unlocking interface and the second unlocking interface may also be the same interface.
  • the first unlocking password and the second unlocking password may be two unlocking passwords with different attributes, such as the first unlocking password being a digital password, and the second unlocking password being a graphic password.
  • the first unlocking interface can be as shown in FIG. 5-a, and the second unlocking interface can be as shown in FIG. 5-b. This makes the user more intuitive when entering the password.
  • the foregoing preset threshold may specifically include:
  • the preset threshold may be set by the user, such as set to 3. It may be automatically set according to the complexity of the second unlocking password. For example, if the number of the second unlocking password is 2, the preset threshold may be automatically set to 1; or, if When the number of the second unlocking password is 3, 3 may be automatically set to the preset threshold.
  • the terminal device includes: a terminal device with an unlocking function, such as a mobile phone or a tablet computer.
  • FIG. 10 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface, as shown in FIG.
  • the method includes: an obtaining unit 61, a first display unit 62, a first receiving unit 63, a first determining unit 64, an unlocking unit 65, and a third determining unit 66, wherein:
  • the obtaining unit 61 is configured to obtain information that triggers the display of the unlocking interface.
  • the first display unit 62 displays a second unlocking interface when the state of the terminal device meets the preset condition when the acquiring unit 61 acquires the information.
  • the first receiving unit 63 is configured to receive information input by the user on the second unlocking interface.
  • the first determining unit 64 is configured to determine whether the information received by the first receiving unit 63 matches the second unlocking password.
  • the unlocking unit 65 is configured to unlock the terminal device when the first determining unit 64 determines that the result is yes.
  • the third determining unit 66 is configured to: when the first determining unit 64 determines that the result is no, determine whether the information received by the first receiving unit matches the first unlocking password;
  • the unlocking unit 65 is further configured to unlock the terminal device when the third determining unit 66 determines that the result is YES.
  • the terminal device when the second unlocking interface is displayed, when the information input by the user matches the first unlocking password, the terminal device can also be unlocked.
  • the terminal may further include: a second accumulating unit 67, configured to: when the first judging unit 64 determines the result and the third judging unit 66 determines that the result is no If the password input fails, the password input fails. In this case, if the password input fails, the user input information does not match the first and second unlock passwords, and the password input fails.
  • a second accumulating unit 67 configured to: when the first judging unit 64 determines the result and the third judging unit 66 determines that the result is no If the password input fails, the password input fails. In this case, if the password input fails, the user input information does not match the first and second unlock passwords, and the password input fails.
  • the fourth determining unit 68 is configured to determine whether the number of times the password input failure accumulated by the second accumulating unit 67 is less than a preset threshold
  • the first receiving unit 63 is further configured to receive information input by the user on the second unlocking interface when the fourth determining unit 68 determines that the result is YES.
  • the terminal device may further include: a third display unit 69, configured to display the first unlocking interface when the fourth determining unit 68 determines that the result is negative. ;
  • the third receiving unit 70 is configured to receive information input by the user on the first unlocking interface, and the fifth determining unit 71 is configured to determine whether the information received by the third receiving unit 70 matches the first unlocking password;
  • the unlocking unit 65 can also be used to unlock the terminal device when the fifth determining unit 71 determines that the result is YES.
  • FIG. 13 is a schematic structural diagram of another terminal device according to an embodiment of the present invention, where the terminal device is configured with a first unlock password, a second unlock password, a first unlock interface, and a second unlock interface.
  • the method includes: a processor 71, wherein:
  • the processor 71 is configured to perform the following steps:
  • the second unlocking interface is displayed;
  • the complexity of the second unlock password is lower than the complexity of the first unlock password.
  • the information that triggers the display of the unlocking interface is obtained.
  • the second unlocking interface is displayed; and the receiving user inputs the second unlocking interface. Determining whether the input information matches the second unlock password, and if the result of the determination is yes, unlocking; wherein the complexity of the second unlock password is lower than the complexity of the first unlock password .
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, and only when the information is obtained, if the state of the terminal device meets the preset condition, the second unlocking interface is displayed and the second unlocking is used.
  • FIG. 14 is a schematic structural diagram of another terminal device according to an embodiment of the present invention.
  • the terminal device is configured with a first unlock password, a second unlock password, a first unlock interface, and a second unlock interface, as shown in FIG. 14 .
  • processor 81 including: processor 81, where:
  • the processor 81 is configured to perform the following steps:
  • the second unlocking interface is displayed;
  • the step of acquiring, by the processor 81, the information that triggers the display of the unlocking interface may specifically include:
  • Receiving an indication of user input triggers display of information of the unlock interface; for example: the user presses a power button or an unlock button;
  • Obtaining information about triggering the display unlocking interface generated internally by the terminal device for example, a warning message such as an alarm clock.
  • the information for acquiring the trigger display unlock interface includes, but is not limited to, the implementations listed above.
  • the foregoing preset conditions may specifically include:
  • the number of times the second unlock password has been used is less than a preset threshold
  • the step of displaying the second unlocking interface may include: if the state of the terminal device meets the preset condition, when the information is obtained by the processor 81, the step of displaying the second unlocking interface may include:
  • the second unlock interface is displayed.
  • the preset threshold is 3, and when the information is acquired, the state of the terminal device that meets the second unlock password has been used is less than a preset threshold, that is, when the information is acquired, The second unlock password has been used less than 3 times.
  • the user may further reset the second unlock password.
  • the foregoing preset conditions may specifically include:
  • the time when the display of the unlocking interface is triggered is within a preset time after the user ends the operation of the terminal device;
  • the step of displaying the second unlocking interface may include: if the state of the terminal device meets the preset condition, when the information is obtained by the processor 81, the step of displaying the second unlocking interface may include:
  • the second unlocking is displayed after the user finishes operating the terminal device for a preset time. Interface.
  • the time for displaying the unlocking interface is triggered.
  • the time for triggering the display of the unlocking interface may be slightly earlier than the time for obtaining the information, and there may be a certain time difference between the two, but based on The time difference is small and can be ignored.
  • the time when the display unlocking interface is triggered can be understood as the time when the information is obtained.
  • the time when the state of the terminal device meets the triggering of the display of the unlocking interface is the preset time after the user ends the operation of the terminal device, and may specifically mean that the time when the information is acquired is The preset time after the user ends the operation of the terminal device.
  • the preset time is 30 minutes
  • the second unlocking interface is displayed when the time at which the information is acquired is within 30 minutes after the user finishes operating the terminal device. For example, if the time for the user to end the operation of the terminal device is 8 o'clock, the second unlock interface is displayed if the information for triggering the display of the unlock interface is obtained between 8:00 and 8:30.
  • the foregoing preset conditions may specifically include:
  • the preset number of times that the second unlocking password has been used is less than a preset threshold, and the time when the unlocking interface is triggered is set to be a preset time after the user ends the operation of the terminal device;
  • the number of times the second unlock password has been used is less than the preset threshold and the time when the display of the unlock interface is triggered is within a preset time after the user finishes operating the terminal device.
  • the step of displaying the second unlocking interface may include: if the state of the terminal device meets the preset condition, when the information is obtained by the processor 81, the step of displaying the second unlocking interface may include:
  • the number of times the second unlock password has been used is less than a preset threshold, and the time when the user displays the unlocking interface is satisfied. In the set time, the second unlocking interface is displayed.
  • This embodiment is a combination of the above two embodiments, that is, the second unlocking interface is displayed as long as the above two conditions are satisfied. If the preset threshold is 3, and the preset time is 30 minutes, when the information for triggering the display unlocking interface is obtained, if the second unlocking password has been used less than 3 times, the information for triggering the display unlocking interface is obtained. The second unlocking interface is displayed only when the user finishes operating the terminal device within 30 minutes.
  • the input information may be graphic or text or digital information.
  • the input information can be understood as an input password, and the password can be in the form of a graphic or a text or a number.
  • the terminal device is unlocked, the terminal device displays the main interface, or the user ends the operation of the terminal device last time. When the interface is equal.
  • the processor 81 may be further configured to perform the following steps:
  • the processor 81 when the processor 81 performs a determination to determine whether the number of times the password input fails is less than a preset threshold, the processor 81 may be further configured to perform the following steps:
  • the first unlocking password is an unlocking password used when displaying the first unlocking interface, and when the first unlocking interface is displayed, the unlocking information such as a graphic or a text or a number input by the user needs to be the first Unlock password matching to unlock.
  • the condition that the terminal device displays the first unlocking interface may be that the state of the terminal device does not meet the foregoing preset condition.
  • the first unlocking interface is displayed when the number of times the second unlocking password of the terminal device has been used is greater than or equal to the preset threshold.
  • the time to trigger the display of the unlock interface is obtained.
  • the first unlocking interface is displayed, for example, when the time at which the information for triggering the display of the unlocking interface is acquired is outside the preset time after the user finishes operating the terminal device.
  • the number of times that the second unlocking password of the terminal device has been used is less than the preset threshold, but the time when the information for triggering the display of the unlocking interface is acquired is after the user ends the operation of the terminal device.
  • the preset time is outside, the first unlock interface is displayed.
  • the time when the information for triggering the display of the unlocking interface is acquired is within a preset time after the user ends the operation of the terminal device, but when the information for triggering the display of the unlocking interface is acquired, the second unlocking password of the terminal device is used.
  • the first unlocking interface is displayed when the number of times is greater than or equal to the preset threshold.
  • the complexity of the second unlocking password is lower than the complexity of the first unlocking password, which may specifically refer to the number of characters or the complexity of the graphic, if the first unlocking password is as shown in FIG.
  • the figure shown in a the second unlocking password can be as shown in Figure 3-b.
  • the second unlocking password may be part of the first unlocking password, the first unlocking password as shown in FIG. 3-a, and the second unlocking password as shown in FIG. 3-b.
  • the second unlock password may be specifically set by a user.
  • the second unlocking password and the first unlocking password may be two independent passwords, for example, the first unlocking password is 7945123, the second unlocking password may be 789, or the first unlocking
  • the password is a numeric password, the second unlock password is a graphical password, and the like. The specifics can be preset by the user.
  • first unlocking interface and the second unlocking interface may be two independent interfaces, and the first unlocking interface is not shown in FIG. 4-a, and the second The unlock interface can be as shown in Figure 4-b.
  • first unlocking interface and the second unlocking interface may also be the same interface.
  • the first unlocking password and the second unlocking password may be two unlocking passwords with different attributes, such as the first unlocking password being a digital password, and the second unlocking password being a graphic password.
  • the first unlocking interface can be as shown in FIG. 5-a, and the second unlocking interface can be as shown in FIG. 5-b. This makes the user more intuitive when entering the password.
  • the foregoing preset threshold may specifically include:
  • a preset threshold automatically set according to the complexity of the second unlock password.
  • the preset threshold may be set by a user operation, such as set to 3. It may also be automatically set according to the complexity of the second unlock password, for example, if the number of the second unlock password is When the number of words is 2, 1 may be automatically set to the preset threshold; or, if the number of the second unlocking password is 3, 3 may be automatically set as the preset threshold.
  • the terminal device may further include:
  • the memory 82 is used to store programs executed by the processor.
  • the terminal device may further include:
  • the display 83 is for displaying the first unlocking interface or the second unlocking interface described above.
  • Display 83 can be a touch screen display such that display 83 can also be used to receive user input information and to communicate information input by the user to processor 81 for processing.
  • the terminal device includes: a terminal device with an unlocking function, such as a mobile phone or a tablet computer.
  • the terminal device is configured with a first unlocking password, a second unlocking password, a first unlocking interface, and a second unlocking interface, as shown in FIG. , including: a processor 91, wherein:
  • the processor 91 is configured to perform the following steps:
  • the second unlocking interface is displayed.
  • the terminal device is unlocked; if the determination result is no, it is determined that the password input fails, and the number of times the password input fails is accumulated; at this time, the password input fails, referring to the user If the entered information does not match the first and second unlock passwords, it is determined that the password input has failed.
  • the complexity of the second unlock password is lower than the complexity of the first unlock password. In this way, when the second unlocking interface is displayed, when the information input by the user matches the first unlocking password, the terminal device can also be unlocked.
  • the processor 91 may be further configured to perform the following steps:
  • the terminal device may further include:
  • Memory 92 is used to store programs executed by the processor.
  • the terminal device may further include:
  • the display 93 is for displaying the first unlocking interface or the second unlocking interface described above.
  • Display 83 can be a touch screen display such that display 93 can also be used to receive user input information and to communicate information input by the user to processor 91 for processing.
  • the terminal device includes: a terminal device with an unlocking function, such as a mobile phone or a tablet computer.
  • ROM Read-Only Memory
  • RAM Random Access Memory

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

本发明实施例公开了一种终端设备的解锁方法,所述终端设备设置有第一解锁密码、第二解锁密码、第一解锁界面和第二解锁界面,所述方法包括:获取触发显示解锁界面的信息;当获取到所述信息时,若所述终端设备的状态满足预设条件,则显示第二解锁界面;接收用户在所述第二解锁界面上输入的信息;判断所述输入的信息是否与所述第二解锁密码匹配,若判断结果为是,则解锁所述终端设备;其中,所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。相应的本发明实施例还公开了一种终端设备。本发明可以在保证密码保护的健壮性时,提升了用户体验。

Description

一种终端设备的解锁方法及终端设备
本申请要求于 2012年 11月 27日提交中国专利局、 申请号为 201210490647.8中国专利申请的优先权,其全部内容通过引用结合在本申请 中。
技术领域 本发明涉及通信领域, 尤其涉及一种终端设备的解锁方法及终端设备。
背景技术 随着信息技术的发展与普及, 终端设备成为人们日常生活中必不可少 的一部分。 为了保护用户在终端设备中存储的隐私信息, 目前大部分终端 设备都提供有密码保护功能, 当终端设备处于锁定状态时, 用户只有输入 正确的密码才可以解锁终端设备, 进入终端设备的界面, 以操作终端设备。
密码保护的健壮性依赖于密码的复杂度(例如: 数字密码的位数或图 形密码的复杂度), 根据密码学理论可知, 密码复杂度越高, 密码的健壮性 就越好, 不容易破解; 密码复杂度越低, 密码的健壮性越差, 相对容易破 解。 但从用户体验的角度来说, 密码越复杂, 用户输入密码时越难, 且容 易出错, 用户体验差; 密码越筒单, 用户输入密码时越容易, 且不容易出 错, 用户体验好。
综上所述, 在现有技术中密码保护的健壮性越好, 那么用户输入密码 时的用户体验越差, 反之, 密码保护的健壮性越差, 用户输入密码时的用 户体验越好。 这样在现有技术中无法实现在保证密码保护的健壮性时, 提 升用户体验。 发明内容 本发明实施例提供了一种终端设备的解锁方法及终端设备, 以在保证 密码保护的健壮性时, 提升用户体验。
本发明第一方面提供一种终端设备的解锁方法, 所述终端设备设置有 第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 所述方法 包括:
获取触发显示解锁界面的信息;
当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则显示 第二解锁界面;
接收用户在所述第二解锁界面上输入的信息;
判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果为是, 则解锁所述终端设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 结合第一方面, 在第一种可能的实现方式中, 所述预设条件包括: 所述第二解锁密码已使用的次数小于预设阈值和 /或触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内。
结合第一方面或第一方面的第一种可能的实现方式, 在第二种可能的 实现方式中, 所述方法还包括:
当所述判断结果为否时, 则确定密码输入失败, 并累计密码输入失败 的次数;
判断所述密码输入失败的次数是否小于预设门限;
若判断结果为是时, 则执行所述接收用户在所述第二解锁界面上输入 的信息的步骤。
结合第一方面或第一方面的第一种可能的实现方式, 在第三种可能的 实现方式中, 所述方法还包括:
当所述判断结果为否时, 判断所述信息是否与所述第一解锁密码匹配, 若判断结果为是, 则解锁所述终端设备。
结合第一方面的第三种可能的实现方式, 在第四种可能的实现方式中, 所述方法还包括:
当判断所述信息与所述第一解锁密码、 所述第二解锁密码均不匹配时, 则确定密码输入失败, 并累计密码输入失败的次数;
判断所述密码输入失败的次数是否小于预设门限;
若判断结果为小于所述预设门限时, 则执行所述接收用户在所述第二 解锁界面上输入的信息的步骤。 结合第一方面的第二种可能的实现方式, 在第五种可能的实现方式中, 所述方法还包括:
当判断结果为不小于所述预设门限时, 显示第一解锁界面;
接收用户在所述第一解锁界面上输入的信息;
判断所述输入的信息是否与所述第一解锁密码匹配;
若判断结果为与所述第一解锁密码匹配, 则解锁所述终端设备。
结合第一方面的第二种可能的实现方式, 在第六种可能的实现方式中, 所述预设门限包括:
用户预先设定的预设门限;
或,
根据所述第二解锁密码的复杂度而自动设置的预设门限。
本发明第二方面提供一种终端设备, 所述终端设备设置有第一解锁密 码、 第二解锁密码、 第一解锁界面和第二解锁界面, 所述终端设备包括: 获取单元、 第一显示单元、 第一接收单元、 第一判断单元和解锁单元, 其 中:
获取单元, 用于获取触发显示解锁界面的信息;
第一显示单元, 用于当所述获取单元获取到所述信息时, 若所述终端 设备的状态满足预设条件, 显示第二解锁界面;
第一接收单元, 用于接收用户在所述第二解锁界面上输入的信息; 第一判断单元, 用于判断所述第一接收单元接收的信息是否与所述第 二解锁密码匹配;
解锁单元, 用于当所述第一判断单元判断结果为是时, 解锁所述终端 设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 结合第二方面, 在第一种可能的实现方式中, 所述预设门限包括: 用户预先设定的预设门限;
或,
根据所述第二解锁密码的复杂度而自动设置的预设门限。
结合第二方面或第二方面的第一种可能的实现方式, 在第二种可能的 实现方式中, 所述终端设备还包括: 第一累计单元和第二判断单元, 其中: 第一累计单元, 用于当所述第一判断单元判断结果为否时, 确定密码 输入失败, 累计密码输入失败的次数;
第二判断单元, 用于判断所述第一累计单元累计的密码输入失败的次 数是否小于预设门限;
所述第一接收单元还用于在所述第二判断单元判断结果为是时, 接收 用户在所述第二解锁界面上输入的信息。
结合第二方面或第二方面的第一种可能的实现方式, 在第三种可能的 实现方式中, 所述终端设备还包括:
第三判断单元, 用于当所述第一判断单元判断结果为否时, 判断所述 第一接收单元接收的信息是否与所述第一解锁密码匹配;
所述解锁单元还用于当所述第三判断单元判断结果为是时, 解锁所述 终端设备。
结合第二方面的第三种可能的实现方式, 在第四种可能的实现方式中, 所述终端设备还包括: 第二累计单元和第四判断单元, 其中:
第二累计单元, 用于当判断所述信息与所述第一解锁密码、 所述第二 解锁密码均不匹配时, 确定密码输入失败, 累计密码输入失败的次数; 第四判断单元, 用于判断所述第二累计单元累计的密码输入失败的次 数是否小于预设门限;
所述第一接收单元还用于在所述第四判断单元判断结果为是时, 接收 用户在所述第二解锁界面上输入的信息。
结合第二方面的第一种可能的实现方式, 在第五种可能的实现方式中, 所述终端设备还包括: 第二显示单元、 第二接收单元和第五判断单元, 其 中:
第二显示单元, 用于当所述第二判断单元判断结果为否时, 显示所述 第一解锁界面;
第二接收单元, 用于接收用户在所述第一解锁界面输入的信息; 第五判断单元, 用于判断所述第二接收单元接收的信息是否与所述第 一解锁密码匹配; 所述解锁单元还用于当所述第五判断单元判断结果为是时, 解锁所述 终端设备。
上述技术方案中, 获取触发显示解锁界面的信息; 当获取到所述信息 时, 若所述终端设备的状态满足预设条件, 则显示第二解锁界面; 接收用 户在所述第二解锁界面上输入的信息; 判断所述输入的信息是否与所述第 二解锁密码匹配, 若判断结果为是, 则解锁; 其中, 所述第二解锁密码的 复杂度低于所述第一解锁密码的复杂度。 由于第二解锁密码的复杂度低于 第一解锁密码的复杂度, 且只有在获取所述信息时, 若所述终端设备的状 态满足预设条件, 才显示第二解锁界面并使用第二解锁密码, 这样在保证 密码保护的健壮性时, 提升了用户体验。
附图说明 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将对 实施例或现有技术描述中所需要使用的附图作筒单地介绍, 显而易见地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域普通技术人员 来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附 图。
图 1是本发明实施例提供的一种终端设备的解锁方法的流程示意图; 图 2是本发明实施例提供的另一种终端设备的解锁方法的流程示意图; 图 3是本发明实施例提供的一种可选的解锁密码示意图;
图 4是本发明实施例提供的一种可选的解锁界面示意图;
图 5是本发明实施例提供的另一种可选的解锁界面示意图;
图 6是本发明实施例提供的另一种终端设备的解锁方法的流程示意图; 图 7是本发明实施例提供的一种终端设备的结构示意图;
图 8是本发明实施例提供的另一种终端设备的结构示意图;
图 9是本发明实施例提供的另一种终端设备的结构示意图;
图 10是本发明实施例提供的另一种终端设备的结构示意图;
图 11是本发明实施例提供的另一种终端设备的结构示意图; 图 12是本发明实施例提供的另一种终端设备的结构示意图;
图 13是本发明实施例提供的另一种终端设备的结构示意图;
图 14是本发明实施例提供的另一种终端设备的结构示意图;
图 15是本发明实施例提供的另一种终端设备的结构示意图。
具体实 式 下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进 行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没 有作出创造性劳动前提下所获得的所有其他实施例, 都属于本发明保护的 范围。
图 1 是本发明实施例提供的一种终端设备的解锁方法的流程示意图, 所述终端设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二 解锁界面, 如图 1所示, 所述方法包括:
101、 获取触发显示解锁界面的信息;
102、 当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则 显示第二解锁界面;
103、 接收用户在所述第二解锁界面上输入的信息;
104、 判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果 为是, 则执行步骤 105;
105、 解锁所述终端设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 上述技术方案中, 获取触发显示解锁界面的信息; 当获取到所述信息 时, 若所述终端设备的状态满足预设条件, 显示第二解锁界面; 接收用户 在所述第二解锁界面上输入的信息; 判断所述输入的信息是否与所述第二 解锁密码匹配, 若判断结果为是, 则解锁所述终端设备; 其中, 所述第二 解锁密码的复杂度低于所述第一解锁密码的复杂度。 由于第二解锁密码的 复杂度低于第一解锁密码的复杂度, 且只有在获取所述信息时, 若所述终 端设备的状态满足预设条件, 才显示第二解锁界面并使用第二解锁密码, 这样在保证密码保护的健壮性时, 提升了用户体验。 图 2是本发明实施例提供的另一种终端设备的解锁方法的流程示意图, 所述终端设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二 解锁界面, 如图 2所示, 所述方法包括:
201、 获取触发显示解锁界面的信息。
可选的, 上述获取触发显示解锁界面的信息的步骤具体可以包括: 接收用户输入的指示触发显示解锁界面的信息; 例如: 用户按下电源 键或解锁键;
或者,
接收网络侧发送的触发显示解锁界面的信息 (例如: 短信);
或者,
获取所述终端设备内部生成的触发显示解锁界面的信息 (例如: 闹钟 等提示消息)。
当然, 在本发明中, 获取触发显示解锁界面的信息包括但不限于上述 列出的实现方式。
202、 当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则 显示第二解锁界面。
作为一种可选的实施方式, 上述预设条件具体可以包括:
所述第二解锁密码已使用的次数小于预设阈值;
该实施方式中, 步骤 202具体可以包括:
当获取到所述信息时, 若所述终端设备的状态满足所述第二解锁密码 已使用的次数小于预设阈值, 则显示第二解锁界面。
例如,预设阈值为 3 , 上述当获取所述信息时所述终端设备的状态满足 所述第二解锁密码已使用的次数小于预设阈值, 也就是说, 当获取所述信 息时所述第二解锁密码已使用的次数小于 3次。
可选的, 当第二解锁密码已使用的次数达到预设阈值时, 用户还可以 重新设置第二解锁密码。
作为一种可选的实施方式, 上述预设条件具体可以包括: 触发显示解锁界面的时间在用户结束操作所述终端设备之后的预设时 间内;
该实施方式中, 步骤 202具体可以包括:
当获取到所述信息时, 若所述终端设备的状态满足触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内, 则显示第二解锁 界面。
获取到所述信息的时间, 可以理解为, 触发显示解锁界面的时间, 当 然, 触发显示解锁界面的时间可以稍微早于获取到所述信息的时间, 两者 可能存在一定的时间差, 但基于该时间差较小, 可以忽略不计, 本文中可 以将触发显示解锁界面的时间理解为获取到所述信息的时间。 上述当获取 到所述信息时所述终端设备的状态满足触发显示解锁界面的时间在用户结 束操作所述终端设备之后的预设时间内, 具体可以是指, 当获取到所述信 息的时间在用户结束操作所述终端设备之后的预设时间内。 例如, 预设时 间为 30分钟, 那么当获取到所述信息的时间在用户结束操作所述终端设备 之后的 30分钟内时, 显示第二解锁界面。 如, 用户结束操作所述终端设备 的时间为 8点整, 那么只要在 8点到 8点半之间, 若获取到触发显示解锁 界面的信息, 则显示第二解锁界面。
作为一种可选的实施方式, 上述预设条件具体可以包括:
所述第二解锁密码已使用的次数小于预设阈值, 且触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内; 即, 所述预设条 件具体可以包括, 所述第二解锁密码已使用的次数小于预设阈值和触发显 示解锁界面的时间在用户结束操作所述终端设备之后的预设时间内。
该实施方式中, 步骤 202具体可以包括:
当获取所述到信息时, 若所述终端设备的状态满足所述第二解锁密码 已使用的次数小于预设阈值, 且满足触发显示解锁界面的时间在用户结束 操作所述终端设备之后的预设时间内, 则显示第二解锁界面。
该实施方式是上面两种实施方式的结合, 也就是说, 只要满足上述两 个条件时, 才显示第二解锁界面。 如上述预设阈值为 3 , 上述预设时间为 30分钟, 那么当获取到触发显示解锁界面的信息时, 若第二解锁密码已使 用的次数小于 3 次, 且获取到触发显示解锁界面的信息的时间在用户结束 操作所述终端设备之后的 30分钟内时, 才显示第二解锁界面。
203、 接收用户在所述第二解锁界面上输入的信息;
可选的, 输入的信息具体可以为图形或文字或数字等信息。 所述输入 的信息可以理解为输入的密码, 密码的形式可以为图形或文字或数字等。
204、 判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果 为是, 则执行步骤 205;
205、 解锁所述终端设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 可选的, 当步骤 204判断的结果为是, 则表示用户输入的密码与第二 解锁密码匹配, 步骤 205解锁所述终端设备, 所述终端设备显示主界面或 用户上一次结束操作所述终端设备时的界面等。
作为一种可选的实施方式, 当步骤 204 的判断结果为否时, 所述方法 还可以执行步骤 206;
206、 则确定密码输入失败, 并累计密码输入失败的次数;
207、 判断所述密码输入失败的次数是否小于预设门限, 若判断结果为 是时, 则返回步骤 203。
这样可以实现当密码输入失败的次数小于预设门限时, 可以再次判断 用户输入的信息是否与第二解锁密码匹配。 也就是说, 用户输入第二解锁 密码失败后, 可以再次输入第二解锁密码。
作为一种可选的实施方式, 当步骤 207 的判断结果为否时, 则执行步 骤 208;
可选的, 假设, 上述预设门限为 3 , 步骤 207判断结果为是, 就是指第 二解锁密码输入失败的次数小于 3时, 就执行步骤 203。 步骤 207判断结果 为否, 就是指第二解锁密码输入失败的次数不小于 3 (等于或大于 3 ) 时, 就可以执行步骤 208。
可选的, 当步骤 207判断结果为否时, 即第二解锁密码输入失败的次 数不小于预设门限时, 这时就表示用户多次输入第二解锁密码失败, 就执 行步骤 208提示用户输入第一解锁密码, 保证所述终端设备设置的安全性。 208、 显示第一解锁界面;
209、 接收用户在所述第一解锁界面上输入的信息;
210、 判断所述输入的信息是否与所述第一解锁密码匹配; 若判断结果 为是, 则执行步骤 205。
可选的, 当步骤 210判断的结果为否时, 或进一步地, 用户输入第一 解锁密码失败的次数达到预设阈值, 则结束流程。
可选的, 所述第一解锁密码为显示第一解锁界面时所使用的解锁密码 是指, 当显示第一解锁界面时, 用户输入的图形或文字或数字等解锁信息 需与所述第一解锁密码匹配才可以解锁。
可选的, 终端设备显示第一解锁界面的条件具体可以是, 终端设备的 状态不满足上述预设条件。 如当获取到触发显示解锁界面的信息时, 终端 设备的第二解锁密码已使用的次数大于或等于上述预设阈值, 就显示第一 解锁界面。 或者如当获取到触发显示解锁界面的信息的时间在用户结束操 作所述终端设备之后的预设时间之外时, 就显示第一解锁界面。 或者如当 获取到触发显示解锁界面的信息时, 终端设备的第二解锁密码已使用的次 数小于上述预设阈值, 但获取到触发显示解锁界面的信息的时间在用户结 束操作所述终端设备之后的预设时间之外时, 就显示第一解锁界面。 或者 如当获取到触发显示解锁界面的信息的时间在用户结束操作所述终端设备 之后的预设时间之内, 但当获取到触发显示解锁界面的信息时, 终端设备 的第二解锁密码已使用的次数大于或等于上述预设阈值, 就显示第一解锁 界面。
作为一种可选的实施方式, 上述第二解锁密码的复杂度低于第一解锁 密码的复杂度具体可以是指文字的个数或图形的复杂度, 假如第一解锁密 码为如图 3-a所示的图形, 第二解锁密码可以为如图 3-b , 这样当获取到触 发显示解锁界面的信息时, 若终端设备的状态满足上述预设条件, 用户就 可以通过输入图 3-b所述的第二解锁密码就可以解锁所述终端设备。
可选的, 所述第二解锁密码可以是所述第一解锁密码的一部分, 如图 3-a所述第一解锁密码, 如图 3-b所示的所述第二解锁密码。 其中, 所述第 二解锁密码具体可以是用户设置的。 可选的, 所述第二解锁密码和所述第一解锁密码具体可以是两个独立 的密码, 如所述第一解锁密码为 7945123 , 第二解锁密码可以是 789; 或所 述第一解锁密码为数字密码, 所述第二解锁密码为图形密码, 等等。 具体 可以由用户预先设置。
作为一种可选的实施方式, 所述第一解锁界面和所述第二解锁界面可 以是两个独立的界面, H没所述第一解锁界面如图 4-a所示, 所述第二解锁 界面可以如图 4-b所示。当然第一解锁界面和第二解锁界面也可以是同一界 面。
可选的, 所述第一解锁密码和所述第二解锁密码还可以是两个属性不 同的解锁密码, 如所述第一解锁密码为数字密码, 所述第二解锁密码为图 形密码, 所述第一解锁界面就可以如图 5-a所示, 所述第二解锁界面就可以 如图 5-b所示。 这样用户输入密码的时候更加直观。
作为一种可选的实施方式, 上述预设门限具体可以包括:
用户预先设定的预设门限;
或, 根据所述第二解锁密码的复杂度而自动设置的预设门限。
如所述预设门限可以是用户设置的, 如设置为 3。还可以是根据所述第 二解锁密码的复杂度而自动设置的, 例如, 若所述第二解锁密码的数字的 个数为 2时, 可以自动设置 1为所述预设门限; 或者, 若所述第二解锁密 码的数字的个数为 3时, 可以自动设置 3为所述预设门限。
作为一种可选的实施方式, 所述终端设备包括: 手机、 平板电脑等带 有解锁功能的终端设备。
上述技术方案中, 在上面实施例的基础上增加了, 当用户输入的密码 与第二解锁密码不匹配时, 判断所述密码输入失败的次数是否小于预设门 限; 若判断结果为小于所述预设门限时, 则重新执行判断用户输入的信息 是否与第二解锁密码匹配。 若判断结果为不小于所述预设门限时, 则显示 第一解锁界面, 判断用户输入的信息是否与所述第一解锁密码匹配; 若判 断结果为是, 则解锁。 这样可以实现当用户输入的信息与第二解锁密码不 匹配时, 则用户可以输入第一解锁密码解锁终端。 图 6是本发明实施例提供的另一种终端设备的解锁方法的流程示意图, 所述终端设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二 解锁界面, 如图 6所示, 所述方法包括:
301、 获取触发显示解锁界面的信息。
302、 当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则 显示第二解锁界面。
303、 接收用户在所述第二解锁界面上输入的信息;
304、 判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果 为是, 则执行步骤 305; 若判断结果为否, 则执行步骤 306;
305、 解锁所述终端设备;
306、 判断所述信息是否与所述第一解锁密码匹配, 若判断结果为是, 则执行步骤 305; 若判断结果为否, 则执行步骤 307;
这样可以实现当显示第二解锁界面时, 用户输入的信息与第一解锁密 码匹配时, 同样可以解锁所述终端设备。
307、 则确定密码输入失败, 并累计密码输入失败的次数; 此时, 所述 密码输入失败的情况, 指的是用户输入的信息与第一、 第二解锁密码均不 匹配, 则确定密码输入失败。
308、 判断所述密码输入失败的次数是否小于预设门限; 若判断结果为 是时, 则执行步骤 303 ;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 作为一种可选的实施方式, 当步骤 308 的判断结果为否时, 则执行步 骤 309;
309、 显示第一解锁界面;
310、 接收用户在所述第一解锁界面上输入的信息;
311、 判断所述输入的信息是否与所述第一解锁密码匹配; 若判断结果 为是, 则执行步骤 305。
上述技术方案中, 在上面实施例的基础上, 增加当用户输入的信息与 第二解锁密码不匹配时, 判断用户输入的信息是否与第一解锁密码匹配, 若是, 则解锁。 这样可以实现显示第二解锁界面时, 用户输入的信息与第 一解锁密码匹配时, 也可以解锁所述终端设备。 同时, 还在保证密码保护 的健壮性时, 提升了用户体验。 图 7是本发明实施例提供的一种终端设备的结构示意图, 所述终端设 备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 如图 7所示, 所述终端设备包括: 获取单元 41、 第一显示单元 42、 第一接 收单元 43、 第一判断单元 44和解锁单元 45 , 其中:
获取单元 41 , 用于获取触发显示解锁界面的信息;
第一显示单元 42 , 用于当获取单元 41获取到所述信息时, 若所述终端 设备的状态满足预设条件, 显示第二解锁界面;
第一接收单元 43 , 用于接收用户在所述第二解锁界面上输入的信息; 第一判断单元 44 ,用于判断第一接收单元 43接收的信息是否与所述第 二解锁密码匹配;
解锁单元 45 , 用于当第一判断单元 44判断结果为是时, 解锁所述终端 设备;
上述技术方案中, 获取触发显示解锁界面的信息; 当获取到所述信息 时, 若所述终端设备的状态满足预设条件, 显示第二解锁界面; 接收用户 在所述第二解锁界面上输入的信息; 判断所述输入的信息是否与所述第二 解锁密码匹配, 若判断结果为是, 则解锁所述终端设备; 其中, 所述第二 解锁密码的复杂度低于所述第一解锁密码的复杂度。 由于第二解锁密码的 复杂度低于第一解锁密码的复杂度, 且只有在获取所述信息时, 若所述终 端设备的状态满足预设条件, 才显示第二解锁界面并使用第二解锁密码, 这样就可以在保证密码保护的健壮性时, 提升用户体验。 图 8是本发明实施例提供的另一种终端设备的结构示意图, 所述终端 设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 如图 8所示, 包括: 获取单元 51、 第一显示单元 52、 第一接收单元 53、 第 一判断单元 54和解锁单元 55 , 其中:
获取单元 51 , 用于获取触发显示解锁界面的信息。 作为一种可选的实施方式, 获取单元 51具体还可以用于接收用户输入 的指示触发显示解锁界面的信息; 例如: 用户按下电源键或解锁键;
或者,
获取单元 51具体还可以用于接收网络侧发送的触发显示解锁界面的信 息 (例如: 短信;
或者, 锁界面的信息 (例如: 闹钟等提示消息)。
当然, 在本发明中, 获取触发显示解锁界面的信息包括但不限于上述 列出的实现方式。
第一显示单元 52 , 用于当获取单元 51获取到所述信息时, 若所述终端 设备的状态满足预设条件, 显示第二解锁界面。
作为一种可选的实施方式, 上述预设条件具体可以包括:
所述第二解锁密码已使用的次数小于预设阈值;
第一显示 52具体还可以用于当获取单元 51获取到所述信息时, 若所 述终端设备的状态满足所述第二解锁密码已使用的次数小于预设阈值, 显 示第二解锁界面。
例如,预设阈值为 3 , 上述当获取所述信息时所述终端设备的状态满足 所述第二解锁密码已使用的次数小于预设阈值, 也就是说, 当获取所述信 息时所述第二解锁密码已使用的次数小于 3次。
可选的, 当第二解锁密码已使用的次数达到预设阈值时, 用户还可以 重新设置第二解锁密码。
作为一种可选的实施方式, 上述预设条件具体可以包括:
触发显示解锁界面的时间在用户结束操作所述终端设备之后的预设时 间内;
该实施方式中, 第一显示 52具体还可以用于当获取单元 51获取到所 述信息时, 若所述终端设备的状态满足触发显示解锁界面的时间在用户结 束操作所述终端设备之后的预设时间内, 显示第二解锁界面。
获取到所述信息的时间, 可以理解为, 触发显示解锁界面的时间, 当 然, 触发显示解锁界面的时间可以稍微早于获取到所述信息的时间, 两者 可能存在一定的时间差, 但基于该时间差较小, 可以忽略不计, 本文中可 以将触发显示解锁界面的时间理解为获取到所述信息的时间。 上述当获取 到所述信息时所述终端设备的状态满足触发显示解锁界面的时间在用户结 束操作所述终端设备之后的预设时间内, 具体可以是指, 当获取到所述信 息的时间在用户结束操作所述终端设备之后的预设时间内。 例如, 预设时 间为 30分钟, 那么当获取所述信息的时间在用户结束操作所述终端设备之 后的 30分钟内时, 显示第二解锁界面。 如, 用户结束操作所述终端设备的 时间为 8点整, 那么只要在 8点到 8点半之间, 若获取到触发显示解锁界 面的信息, 则显示第二解锁界面。
作为一种可选的实施方式, 上述预设条件具体可以包括:
所述第二解锁密码已使用的次数小于预设阈值, 且触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内; 即, 所述预设条 件具体可以包括, 所述第二解锁密码已使用的次数小于预设阈值和触发显 示解锁界面的时间在用户结束操作所述终端设备之后的预设时间内。
第一显示 52具体还可以用于当获取单元 51获取到所述信息时, 若所 述终端设备的状态满足所述第二解锁密码已使用的次数小于预设阈值, 且 满足触发显示解锁界面的时间在用户结束操作所述终端设备之后的预设时 间内, 显示第二解锁界面。
该实施方式是上面两种实施方式的结合, 也就是说, 只要满足上述两 个条件时, 才显示第二解锁界面。 如上述预设阈值为 3 , 上述预设时间为 30分钟, 那么当获取到触发显示解锁界面的信息时, 若第二解锁密码已使 用的次数小于 3 次, 且获取到触发显示解锁界面的信息的时间在用户结束 操作所述终端设备之后的 30分钟内时, 才显示第二解锁界面。
第一接收单元 53 , 用于接收用户在所述第二解锁界面上输入的信息。 可选的, 输入的信息具体可以为图形或文字或数字等信息。 所述输入 的信息可以理解为输入的密码, 密码的形式可以为图形或文字或数字等。
第一判断单元 54 ,用于判断第一接收单元 53接收的信息是否与所述第 二解锁密码匹配。 解锁单元 55 , 用于当第一判断单元 54判断结果为是时, 解锁所述终端 设备。
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 作为一种可选的实施方式, 所述终端设备还可以包括:
第一累计单元 56, 用于当第一判断单元 54判断结果为否时, 确定密码 输入失败, 累计密码输入失败的次数。
第二判断单元 57 ,用于判断第一累计单元 56累计的密码输入失败的次 数是否小于预设门限。
第一接收单元 53还用于在第二判断单元 57判断结果为是时, 接收用 户在所述第二解锁界面上输入的信息。
这样可以实现当密码输入失败的次数小于预设门限时, 可以再次判断 用户输入的信息是否与第二解锁密码匹配。 也就是说, 用户输入第二解锁 密码失败后, 可以再次输入第二解锁密码。
作为一种可选的实施方式, 如图 9所示, 所述终端设备还可以包括: 第二显示单元 58 , 用于当第二判断单元 57判断结果为否时, 显示所述 第一解锁界面;
第二接收单元 59 , 用于接收用户在所述第一解锁界面输入的信息; 第五判断单元 60 ,用于判断第二接收单元 59接收的信息是否与所述第 一解锁密码匹配;
解锁单元 55还可以用于当第五判断单元 60判断结果为是时, 解锁所 述终端设备。
可选的, 所述第一解锁密码为显示第一解锁界面时所使用的解锁密码 是指, 当显示第一解锁界面时, 用户输入的图形或文字或数字等解锁信息 需与所述第一解锁密码匹配才可以解锁。
可选的, 终端设备显示第一解锁界面的条件具体可以是, 终端设备的 状态不满足上述预设条件。 如当获取到触发显示解锁界面的信息时, 终端 设备的第二解锁密码已使用的次数大于或等于上述预设阈值, 就显示第一 解锁界面。 或者如当获取到触发显示解锁界面的信息的时间。 如当获取到 触发显示解锁界面的信息的时间在用户结束操作所述终端设备之后的预设 时间之外时, 就显示第一解锁界面。 或者如当获取到触发显示解锁界面的 信息时, 终端设备的第二解锁密码已使用的次数小于上述预设阈值, 但获 取到触发显示解锁界面的信息的时间在用户结束操作所述终端设备之后的 预设时间之外时, 就显示第一解锁界面。 或者如当获取到触发显示解锁界 面的信息的时间在用户结束操作所述终端设备之后的预设时间之内, 但当 获取到触发显示解锁界面的信息时, 终端设备的第二解锁密码已使用的次 数大于或等于上述预设阈值, 就显示第一解锁界面。
作为一种可选的实施方式, 上述第二解锁密码的复杂度低于第一解锁 密码的复杂度具体可以是指文字的个数或图形的复杂度, 假如第一解锁密 码为如图 3-a所示的图形, 第二解锁密码可以为如图 3-b, 这样当获取到触 发显示解锁界面的信息时, 若终端设备的状态满足上述预设条件, 用户就 可以通过输入图 3-b所述的第二解锁密码就可以解锁所述终端设备。
可选的, 所述第二解锁密码可以是所述第一解锁密码的一部分, 如图 3-a所述第一解锁密码, 如图 3-b所示的所述第二解锁密码。 其中, 所述第 二解锁密码具体可以是用户设置的。
可选的, 所述第二解锁密码和所述第一解锁密码具体可以是两个独立 的密码, 如所述第一解锁密码为 7945123 , 第二解锁密码可以是 789; 或所 述第一解锁密码为数字密码, 所述第二解锁密码为图形密码, 等等。 具体 可以由用户操预先设置。
作为一种可选的实施方式, 所述第一解锁界面和所述第二解锁界面可 以是两个独立的界面, H没所述第一解锁界面如图 4-a所示, 所述第二解锁 界面可以如图 4-b所示。当然第一解锁界面和第二解锁界面也可以是同一界 面。
可选的, 所述第一解锁密码和所述第二解锁密码还可以是两个属性不 同的解锁密码, 如所述第一解锁密码为数字密码, 所述第二解锁密码为图 形密码, 所述第一解锁界面就可以如图 5-a所示, 所述第二解锁界面就可以 如图 5-b所示。 这样用户输入密码的时候更加直观。
作为一种可选的实施方式, 上述预设门限具体可以包括:
用户预先设定的预设门限; 或, 根据所述第二解锁密码的复杂度而自动设置的预设门限。
如所述预设门限可以是用户操设置的, 如设置为 3。还可以是根据所述 第二解锁密码的复杂度而自动设置的, 例如, 若所述第二解锁密码的数字 的个数为 2时, 可以自动设置 1为所述预设门限; 或者, 若所述第二解锁 密码的数字的个数为 3时, 可以自动设置 3为所述预设门限。
作为一种可选的实施方式, 所述终端设备包括: 手机、 平板电脑等带 有解锁功能的终端设备。
上述技术方案中, 在上面实施例的基础上增加了, 当用户输入的密码 与第二解锁密码不匹配时, 判断所述密码输入失败的次数是否小于预设门 限; 若判断结果为小于所述预设门限时, 则重新执行判断用户输入的信息 是否与第二解锁密码匹配。 若判断结果为不小于所述预设门限时, 则显示 第一解锁界面, 判断用户输入的信息是否与所述第一解锁密码匹配; 若判 断结果为是, 则解锁。 这样可以实现当用户输入的信息与第二解锁密码不 匹配时, 则用户可以输入第一解锁密码解锁终端。 图 10是本发明实施例提供的另一种终端设备的结构示意图, 所述终端 设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 如图 10所示, 包括: 获取单元 61、 第一显示单元 62、 第一接收单元 63、 第一判断单元 64、 解锁单元 65和第三判断单元 66, 其中:
获取单元 61 , 用于获取触发显示解锁界面的信息。
第一显示单元 62, 当获取单元 61获取到所述信息时, 若所述终端设备 的状态满足预设条件, 显示第二解锁界面。
第一接收单元 63 , 用于接收用户在所述第二解锁界面上输入的信息; 第一判断单元 64,用于判断第一接收单元 63接收的信息是否与所述第 二解锁密码匹配;
解锁单元 65 , 用于当第一判断单元 64判断结果为是时, 解锁所述终端 设备。
第三判断单元 66, 用于当第一判断单元 64判断结果为否时, 判断所述 第一接收单元接收的信息是否与所述第一解锁密码匹配; 解锁单元 65还用于当第三判断单元 66判断结果为是时, 解锁所述终 端设备。
这样可以实现当显示第二解锁界面时, 用户输入的信息与第一解锁密 码匹配时, 同样可以解锁所述终端设备。
作为一种可选的实施方式, 如图 11所示, 所述终端还可以包括: 第二累计单元 67 , 用于当第一判断单元 64判断结果和第三判断单元 66判断结果均为否时, 确定密码输入失败, 累计密码输入失败的次数; 此 时, 所述密码输入失败的情况, 指的是用户输入的信息与第一、 第二解锁 密码均不匹配, 则确定密码输入失败。
第四判断单元 68 ,用于判断第二累计单元 67累计的密码输入失败的次 数是否小于预设门限;
第一接收单元 63还用于在第四判断单元 68判断结果为是时, 接收用 户在所述第二解锁界面上输入的信息。
作为一种可选的实施方式, 如图 12所示, 所述终端设备还可以包括: 第三显示单元 69, 用于当第四判断单元 68判断结果为否时, 显示所述 第一解锁界面;
第三接收单元 70, 用于接收用户在所述第一解锁界面输入的信息; 第五判断单元 71 ,用于判断第三接收单元 70接收的信息是否与所述第 一解锁密码匹配;
解锁单元 65还可以用于当第五判断单元 71判断结果为是时, 解锁所 述终端设备。
上述技术方案中, 在上面实施例的基础上, 增加当用户输入的信息与 第二解锁密码不匹配时, 判断用户输入的信息是否与第一解锁密码匹配, 若是, 则解锁。 这样可以实现显示第二解锁界面时, 用户输入的信息与第 一解锁密码匹配时, 也可以解锁所述终端设备。 同时, 还可在保证密码保 护的健壮性时, 提升了用户体验。 图 13是本发明实施例提供的另一种终端设备的结构示意图, 所述终端 设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 如图 13 , 所示, 包括: 处理器 71 , 其中:
处理器 71用于执行如下步骤:
获取触发显示解锁界面的信息;
当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则显示 第二解锁界面;
接收用户在所述第二解锁界面上输入的信息;
判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果为是, 则解锁;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 上述技术方案中, 获取触发显示解锁界面的信息; 当获取到所述信息 时, 若所述终端设备的状态满足预设条件, 显示第二解锁界面; 接收用户 在所述第二解锁界面上输入的信息; 判断所述输入的信息是否与所述第二 解锁密码匹配, 若判断结果为是, 则解锁; 其中, 所述第二解锁密码的复 杂度低于所述第一解锁密码的复杂度。 由于第二解锁密码的复杂度低于第 一解锁密码的复杂度, 且只有在获取所述信息时, 若所述终端设备的状态 满足预设条件, 才显示第二解锁界面并使用第二解锁密码, 这样在保证密 码保护的健壮性时, 提升了用户体验。 图 14是本发明实施例提供的另一种终端设备的结构示意图, 所述终端 设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 如图 14, 所示, 包括: 处理器 81 , 其中:
处理器 81用于执行如下步骤:
获取触发显示解锁界面的信息;
当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则显示 第二解锁界面;
接收用户在所述第二解锁界面上输入的信息;
判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果为是, 则解锁所述终端设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 可选的, 处理器 81执行的获取触发显示解锁界面的信息的步骤具体可 以包括:
接收用户输入的指示触发显示解锁界面的信息; 例如: 用户按下电源 键或解锁键;
或者,
接收网络侧发送的触发显示解锁界面的信息 (例如: 短信); 或者,
获取所述终端设备内部生成的触发显示解锁界面的信息 (例如: 闹钟 等提示消息)。
当然, 在本发明中, 获取触发显示解锁界面的信息包括但不限于上述 列出的实现方式。
作为一种可选的实施方式, 上述预设条件具体可以包括:
所述第二解锁密码已使用的次数小于预设阈值;
该实施方式中, 处理器 81执行的当获取到所述信息时, 若所述终端设 备的状态满足预设条件, 则显示第二解锁界面的步骤具体可以包括:
当获取到所述信息时, 若所述终端设备的状态满足所述第二解锁密码 已使用的次数小于预设阈值, 则显示第二解锁界面。
例如,预设阈值为 3 , 上述当获取所述信息时所述终端设备的状态满足 所述第二解锁密码已使用的次数小于预设阈值, 也就是说, 当获取所述信 息时所述第二解锁密码已使用的次数小于 3次。
可选的, 当第二解锁密码已使用的次数达到预设阈值时, 用户还可以 重新设置第二解锁密码。
作为一种可选的实施方式, 上述预设条件具体可以包括:
触发显示解锁界面的时间在用户结束操作所述终端设备之后的预设时 间内;
该实施方式中, 处理器 81执行的当获取到所述信息时, 若所述终端设 备的状态满足预设条件, 则显示第二解锁界面的步骤具体可以包括:
当获取到所述信息时, 若所述终端设备的状态满足触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内, 则显示第二解锁 界面。
当获取到所述信息的时间, 可以理解为, 触发显示解锁界面的时间, 当然, 触发显示解锁界面的时间可以稍微早于获取到所述信息的时间, 两 者可能存在一定的时间差, 但基于该时间差较小, 可以忽略不计, 本文中 可以将触发显示解锁界面的时间理解为获取到所述信息的时间。 上述当获 取到所述信息时所述终端设备的状态满足触发显示解锁界面的时间在用户 结束操作所述终端设备之后的预设时间内, 具体可以是指, 当获取到所述 信息的时间在用户结束操作所述终端设备之后的预设时间内。 例如, 预设 时间为 30分钟, 那么当获取到所述信息的时间在用户结束操作所述终端设 备之后的 30分钟内时, 显示第二解锁界面。 如, 用户结束操作所述终端设 备的时间为 8点整, 那么只要在 8点到 8点半之间, 若获取到触发显示解 锁界面的信息, 则显示第二解锁界面。
作为一种可选的实施方式, 上述预设条件具体可以包括:
所述第二解锁密码已使用的次数小于预设阈值, 且触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内; 即, 所述预设条 件具体可以包括, 所述第二解锁密码已使用的次数小于预设阈值和触发显 示解锁界面的时间在用户结束操作所述终端设备之后的预设时间内。
该实施方式中, 处理器 81执行的当获取到所述信息时, 若所述终端设 备的状态满足预设条件, 则显示第二解锁界面的步骤具体可以包括:
当获取所述到信息时, 若所述终端设备的状态满足所述第二解锁密码 已使用的次数小于预设阈值, 且满足触发显示解锁界面的时间在用户结束 操作所述终端设备之后的预设时间内, 则显示第二解锁界面。
该实施方式是上面两种实施方式的结合, 也就是说, 只要满足上述两 个条件时, 才显示第二解锁界面。 如上述预设阈值为 3 , 上述预设时间为 30分钟, 那么当获取到触发显示解锁界面的信息时, 若第二解锁密码已使 用的次数小于 3 次, 且获取到触发显示解锁界面的信息的时间在用户结束 操作所述终端设备之后的 30分钟内时, 才显示第二解锁界面。
可选的, 输入的信息具体可以为图形或文字或数字等信息。 所述输入 的信息可以理解为输入的密码, 密码的形式可以为图形或文字或数字等。 可选的, 当处理器 81判断的结果为是, 则表示用户输入的密码与第二 解锁密码匹配, 解锁所述终端设备, 所述终端设备显示主界面或用户上一 次结束操作所述终端设备时的界面等。
作为一种可选的实施方式, 当上述判断的判断结果为否时, 处理器 81 还可以用于执行如下步骤:
确定密码输入失败, 并累计密码输入失败的次数;
判断所述密码输入失败的次数是否小于预设门限, 若判断结果为是时, 则返回接收用户在所述第二解锁界面上输入的信息的步骤。
这样可以实现当密码输入失败的次数小于预设门限时, 可以再次判断 用户输入的信息是否与第二解锁密码匹配。 也就是说, 用户输入第二解锁 密码失败后, 可以再次输入第二解锁密码。
作为一种可选的实施方式, 当处理器 81执行判断所述密码输入失败的 次数是否小于预设门限的步骤的判断结果为否时, 处理器 81还可以用于执 行如下步骤:
显示第一解锁界面;
接收用户在所述第一解锁界面上输入的信息;
判断所述输入的信息是否与所述第一解锁密码匹配; 若判断结果为是, 则执解锁所述终端设备。
可选的, 所述第一解锁密码为显示第一解锁界面时所使用的解锁密码 是指, 当显示第一解锁界面时, 用户输入的图形或文字或数字等解锁信息 需与所述第一解锁密码匹配才可以解锁。
可选的, 终端设备显示第一解锁界面的条件具体可以是, 终端设备的 状态不满足上述预设条件。 如当获取到触发显示解锁界面的信息时, 终端 设备的第二解锁密码已使用的次数大于或等于上述预设阈值, 就显示第一 解锁界面。 或者如当获取到触发显示解锁界面的信息的时间。 如当获取到 触发显示解锁界面的信息的时间在用户结束操作所述终端设备之后的预设 时间之外时, 就显示第一解锁界面。 或者如当获取到触发显示解锁界面的 信息时, 终端设备的第二解锁密码已使用的次数小于上述预设阈值, 但获 取到触发显示解锁界面的信息的时间在用户结束操作所述终端设备之后的 预设时间之外时, 就显示第一解锁界面。 或者如当获取到触发显示解锁界 面的信息的时间在用户结束操作所述终端设备之后的预设时间之内, 但当 获取到触发显示解锁界面的信息时, 终端设备的第二解锁密码已使用的次 数大于或等于上述预设阈值, 就显示第一解锁界面。
作为一种可选的实施方式, 上述第二解锁密码的复杂度低于第一解锁 密码的复杂度具体可以是指文字的个数或图形的复杂度, 假如第一解锁密 码为如图 3-a所示的图形, 第二解锁密码可以为如图 3-b, 这样当获取到触 发显示解锁界面的信息时, 若终端设备的状态满足上述预设条件, 用户就 可以通过输入图 3-b所述的第二解锁密码就可以解锁所述终端设备。
可选的, 所述第二解锁密码可以是所述第一解锁密码的一部分, 如图 3-a所述第一解锁密码, 如图 3-b所示的所述第二解锁密码。 其中, 所述第 二解锁密码具体可以是用户设置的。
可选的, 所述第二解锁密码和所述第一解锁密码具体可以是两个独立 的密码, 如所述第一解锁密码为 7945123 , 第二解锁密码可以是 789; 或所 述第一解锁密码为数字密码, 所述第二解锁密码为图形密码, 等等。 具体 可以由用户预先设置。
作为一种可选的实施方式, 所述第一解锁界面和所述第二解锁界面可 以是两个独立的界面, H没所述第一解锁界面如图 4-a所示, 所述第二解锁 界面可以如图 4-b所示。当然第一解锁界面和第二解锁界面也可以是同一界 面。
可选的, 所述第一解锁密码和所述第二解锁密码还可以是两个属性不 同的解锁密码, 如所述第一解锁密码为数字密码, 所述第二解锁密码为图 形密码, 所述第一解锁界面就可以如图 5-a所示, 所述第二解锁界面就可以 如图 5-b所示。 这样用户输入密码的时候更加直观。
作为一种可选的实施方式, 上述预设门限具体可以包括:
用户预先设定的预设门限;
或, 根据所述第二解锁密码的复杂度而自动设置的预设门限。
如所述预设门限可以是用户操作设置的, 如设置为 3。还可以是根据所 述第二解锁密码的复杂度而自动设置的, 例如, 若所述第二解锁密码的数 字的个数为 2时, 可以自动设置 1为所述预设门限; 或者, 若所述第二解 锁密码的数字的个数为 3时, 可以自动设置 3为所述预设门限。
作为一种可选的实施方式, 所述终端设备还可以包括:
存储器 82用于存储处理器所执行的程序。
作为一种可选的实施方式, 所述终端设备还可以包括:
显示器 83用于显示上述第一解锁界面或第二解锁界面。 显示器 83可 以为触摸屏显示器, 这样显示器 83还可以用于接收用户输入的信息, 并将 用户输入的信息传输至处理器 81处理。
作为一种可选的实施方式, 所述终端设备包括: 手机、 平板电脑等带 有解锁功能的终端设备。
上述技术方案中, 在上面实施例的基础上增加了, 当用户输入的密码 与第二解锁密码不匹配时, 判断所述密码输入失败的次数是否小于预设门 限; 若判断结果为小于所述预设门限时, 则重新执行判断用户输入的信息 是否与第二解锁密码匹配。 若判断结果为不小于所述预设门限时, 则显示 第一解锁界面, 判断用户输入的信息是否与所述第一解锁密码匹配; 若判 断结果为是, 则解锁。 这样可以实现当用户输入的信息与第二解锁密码不 匹配时, 则用户可以输入第一解锁密码解锁终端。 图 15是本发明实施例提供的另一种终端设备的结构示意图, 所述终端 设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 如图 15 , 所示, 包括: 处理器 91 , 其中:
处理器 91用于执行如下步骤:
获取触发显示解锁界面的信息。
当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则显示 第二解锁界面。
接收用户在所述第二解锁界面上输入的信息;
判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果为是, 则解锁;
若上述判断结果为否, 则判断所述信息是否与所述第一解锁密码匹配, 若该判断结果为是, 则解锁所述终端设备; 若该判断结果为否, 则确定密 码输入失败, 并累计密码输入失败的次数; 此时, 所述密码输入失败的情 况, 指的是用户输入的信息与第一、 第二解锁密码均不匹配, 则确定密码 输入失败。
判断所述密码输入失败的次数是否小于预设门限; 若该判断结果为是 时, 则返回接收用户在所述第二解锁界面上输入的信息的步骤;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。 这样可以实现当显示第二解锁界面时, 用户输入的信息与第一解锁密 码匹配时, 同样可以解锁所述终端设备。
作为一种可选的实施方式, 当处理器 91执行的判断所述密码输入失败 的次数是否小于预设门限的步骤的判断结果为否时, 处理器 91还可以用于 执行如下步骤:
显示第一解锁界面;
接收用户在所述第一解锁界面上输入的信息;
判断所述输入的信息是否与所述第一解锁密码匹配; 若该判断结果为 是, 则解锁。
作为一种可选的实施方式, 所述终端设备还可以包括:
存储器 92用于存储处理器所执行的程序。
作为一种可选的实施方式, 所述终端设备还可以包括:
显示器 93用于显示上述第一解锁界面或第二解锁界面。 显示器 83可 以为触摸屏显示器, 这样显示器 93还可以用于接收用户输入的信息, 并将 用户输入的信息传输至处理器 91处理。
作为一种可选的实施方式, 所述终端设备包括: 手机、 平板电脑等带 有解锁功能的终端设备。
上述技术方案中, 在上面实施例的基础上, 增加当用户输入的信息与 第二解锁密码不匹配时, 判断用户输入的信息是否与第一解锁密码匹配, 若是, 则解锁。 这样可以实现显示第二解锁界面时, 用户输入的信息也第 一解锁密码匹配时, 则解锁所述终端设备。 同时, 在保证密码保护的健壮 性时, 提升了用户体验。 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流 程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储 于一计算机可读取存储介质中, 该程序在执行时, 可包括如上述各方法的 实施例的流程。 其中, 所述的存储介质可为磁碟、 光盘、 只读存储记忆体
( Read-Only Memory, ROM )或随机存取存储器 ( Random Access Memory, 筒称 RAM )等。
以上所揭露的仅为本发明较佳实施例而已, 当然不能以此来限定本发 明之权利范围, 因此依本发明权利要求所作的等同变化, 仍属本发明所涵 盖的范围。

Claims

权利要求
1、 一种终端设备的解锁方法, 其特征在于, 所述终端设备设置有第一 解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 所述方法包括: 获取触发显示解锁界面的信息;
当获取到所述信息时, 若所述终端设备的状态满足预设条件, 则显示 第二解锁界面;
接收用户在所述第二解锁界面上输入的信息;
判断所述输入的信息是否与所述第二解锁密码匹配, 若判断结果为是, 则解锁所述终端设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。
2、 如权利要求 1所述的方法, 其特征在于, 所述预设条件包括: 所述第二解锁密码已使用的次数小于预设阈值和 /或触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内。
3、 如权利要求 1或 2所述的方法, 其特征在于, 所述方法还包括: 当所述判断结果为否时, 则确定密码输入失败, 并累计密码输入失败 的次数;
判断所述密码输入失败的次数是否小于预设门限;
若判断结果为是时, 则执行所述接收用户在所述第二解锁界面上输入 的信息的步骤。
4、 如权利要求 1或 2所述的方法, 其特征在于, 所述方法还包括: 当所述判断结果为否时, 判断所述信息是否与所述第一解锁密码匹配, 若判断结果为是, 则解锁所述终端设备。
5、 如权利要求 4所述的方法, 其特征在于, 所述方法还包括: 当判断所述信息与所述第一解锁密码、 所述第二解锁密码均不匹配时, 则确定密码输入失败, 并累计密码输入失败的次数; 判断所述密码输入失败的次数是否小于预设门限;
若判断结果为小于所述预设门限时, 则执行所述接收用户在所述第二 解锁界面上输入的信息的步骤。
6、 如权利要求 3所述的方法, 其特征在于, 所述方法还包括: 当判断结果为不小于所述预设门限时, 显示第一解锁界面;
接收用户在所述第一解锁界面上输入的信息;
判断所述输入的信息是否与所述第一解锁密码匹配;
若判断结果为与所述第一解锁密码匹配, 则解锁所述终端设备。
7、 如权利要求 3所述的方法, 其特征在于, 所述预设门限包括: 用户预先设定的预设门限;
或,
根据所述第二解锁密码的复杂度而自动设置的预设门限。
8、 一种终端设备, 其特征在于, 所述终端设备设置有第一解锁密码、 第二解锁密码、 第一解锁界面和第二解锁界面, 所述终端设备包括: 获取 单元、 第一显示单元、 第一接收单元、 第一判断单元和解锁单元, 其中: 获取单元, 用于获取触发显示解锁界面的信息;
第一显示单元, 用于当所述获取单元获取到所述信息时, 若所述终端 设备的状态满足预设条件, 显示第二解锁界面;
第一接收单元, 用于接收用户在所述第二解锁界面上输入的信息; 第一判断单元, 用于判断所述第一接收单元接收的信息是否与所述第 二解锁密码匹配;
解锁单元, 用于当所述第一判断单元判断结果为是时, 解锁所述终端 设备;
其中, 所述第二解锁密码的复杂度低于所述第一解锁密码的复杂度。
9、 如权利要求 8所述的终端设备, 其特征在于, 所述预设条件包括: 所述第二解锁密码已使用的次数小于预设阈值和 /或触发显示解锁界面 的时间在用户结束操作所述终端设备之后的预设时间内。
10、 如权利要求 8或 9所述的终端设备, 其特征在于, 所述终端设备 还包括: 第一累计单元和第二判断单元, 其中:
第一累计单元, 用于当所述第一判断单元判断结果为否时, 确定密码 输入失败, 累计密码输入失败的次数;
第二判断单元, 用于判断所述第一累计单元累计的密码输入失败的次 数是否小于预设门限;
所述第一接收单元还用于在所述第二判断单元判断结果为是时, 接收 用户在所述第二解锁界面上输入的信息。
11、 如权利要求 8或 9所述的终端设备, 其特征在于, 所述终端设备 还包括:
第三判断单元, 用于当所述第一判断单元判断结果为否时, 判断所述 第一接收单元接收的信息是否与所述第一解锁密码匹配;
所述解锁单元还用于当所述第三判断单元判断结果为是时, 解锁所述 终端设备。
12、 如权利要求 11所述的终端设备, 其特征在于, 所述终端设备还包 括: 第二累计单元和第四判断单元, 其中:
第二累计单元, 用于当判断所述信息与所述第一解锁密码、 所述第二 解锁密码均不匹配时, 确定密码输入失败, 累计密码输入失败的次数; 第四判断单元, 用于判断所述第二累计单元累计的密码输入失败的次 数是否小于预设门限;
所述第一接收单元还用于在所述第四判断单元判断结果为是时, 接收 用户在所述第二解锁界面上输入的信息。
13、 如权利要求 10所述的终端设备, 其特征在于, 所述终端设备还包 括: 第二显示单元、 第二接收单元和第五判断单元, 其中:
第二显示单元, 用于当所述第二判断单元判断结果为否时, 显示所述 第一解锁界面;
第二接收单元, 用于接收用户在所述第一解锁界面输入的信息; 第五判断单元, 用于判断所述第二接收单元接收的信息是否与所述第 一解锁密码匹配;
所述解锁单元还用于当所述第五判断单元判断结果为是时, 解锁所述 终端设备。
PCT/CN2013/087905 2012-11-27 2013-11-27 一种终端设备的解锁方法及终端设备 WO2014082573A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP13857892.7A EP2857947B1 (en) 2012-11-27 2013-11-27 Terminal device and unlocking method thereof
US14/586,196 US20150128257A1 (en) 2012-11-27 2014-12-30 Method for unlocking terminal device and terminal device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210490647.8 2012-11-27
CN201210490647.8A CN103838494A (zh) 2012-11-27 2012-11-27 一种终端设备的解锁方法及终端设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/586,196 Continuation US20150128257A1 (en) 2012-11-27 2014-12-30 Method for unlocking terminal device and terminal device

Publications (1)

Publication Number Publication Date
WO2014082573A1 true WO2014082573A1 (zh) 2014-06-05

Family

ID=50802057

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/087905 WO2014082573A1 (zh) 2012-11-27 2013-11-27 一种终端设备的解锁方法及终端设备

Country Status (4)

Country Link
US (1) US20150128257A1 (zh)
EP (1) EP2857947B1 (zh)
CN (1) CN103838494A (zh)
WO (1) WO2014082573A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569221A (zh) * 2021-04-02 2021-10-29 袁麓 一种解锁方法、系统及终端

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101416540B1 (ko) * 2012-07-12 2014-07-09 주식회사 로웸 패스워드의 연속 인증을 이용하는 패스워드 인증 시스템 및 패스워드 인증 방법
CN105373711A (zh) * 2014-08-15 2016-03-02 中兴通讯股份有限公司 一种移动终端屏幕解锁方法及装置
CN105468962A (zh) * 2014-09-03 2016-04-06 阿里巴巴集团控股有限公司 用户界面解锁的方法及装置
CN104200144A (zh) * 2014-09-05 2014-12-10 可牛网络技术(北京)有限公司 提高移动终端安全性的方法及系统
CN105653913B (zh) * 2014-12-02 2018-12-21 阿里巴巴集团控股有限公司 用户界面解锁的方法及装置
CN104571869A (zh) * 2015-01-16 2015-04-29 深圳市中兴移动通信有限公司 移动终端的解锁方法及装置
CN106295304A (zh) * 2015-05-20 2017-01-04 中兴通讯股份有限公司 一种解锁的方法及终端
CN106293308B (zh) * 2015-05-21 2020-06-02 腾讯科技(深圳)有限公司 一种屏幕解锁方法及装置
CN104898945B (zh) * 2015-05-22 2018-05-01 广东欧珀移动通信有限公司 一种屏幕解锁方法及终端
CN104834846B (zh) * 2015-05-22 2018-01-16 广东欧珀移动通信有限公司 一种设备解锁方法和装置
CN104915112A (zh) * 2015-05-27 2015-09-16 深圳市金立通信设备有限公司 一种终端解锁方法及终端
CN106610822A (zh) * 2015-10-21 2017-05-03 中兴通讯股份有限公司 一种辅助解锁方法和装置
CN114675771A (zh) * 2015-10-29 2022-06-28 创新先进技术有限公司 一种服务调用方法及装置
JP2017142555A (ja) * 2016-02-08 2017-08-17 株式会社リコー 情報処理装置、プログラム、認証方法および情報処理システム
CN106650415A (zh) * 2016-09-14 2017-05-10 上海斐讯数据通信技术有限公司 一种密码更新方法和系统
CN106778134A (zh) * 2016-12-09 2017-05-31 北京小米移动软件有限公司 终端控制方法和装置
CN108182354A (zh) * 2018-01-31 2018-06-19 平安科技(深圳)有限公司 终端解锁方法、装置、设备及可读存储介质
KR102520199B1 (ko) 2018-07-23 2023-04-11 삼성전자주식회사 전자 장치 및 그 제어 방법.
CN109063455B (zh) * 2018-07-24 2020-04-24 珠海格力电器股份有限公司 一种解锁方法、解锁装置及电子设备
CN111222112A (zh) * 2018-11-26 2020-06-02 珠海格力电器股份有限公司 一种智能终端锁机方法、系统及智能终端
CN111273849A (zh) * 2020-01-19 2020-06-12 青岛海信移动通信技术股份有限公司 通信终端以及屏幕解锁方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101825986A (zh) * 2009-03-06 2010-09-08 Lg电子株式会社 移动终端与控制移动终端的方法
CN102096546A (zh) * 2010-12-29 2011-06-15 华为终端有限公司 一种操作系统的解锁方法及装置
CN102880384A (zh) * 2012-08-24 2013-01-16 百度在线网络技术(北京)有限公司 用于解锁移动终端屏幕的方法、装置和包括其的移动终端

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5699514A (en) * 1995-12-26 1997-12-16 Lucent Technologies Inc. Access control system with lockout
US6766456B1 (en) * 2000-02-23 2004-07-20 Micron Technology, Inc. Method and system for authenticating a user of a computer system
JP2006189999A (ja) * 2005-01-04 2006-07-20 Fujitsu Ltd セキュリティ管理方法、プログラム及び情報機器
KR100756336B1 (ko) * 2006-09-21 2007-09-06 삼성전자주식회사 이동 통신 단말기의 비밀 번호 알림 방법 및 장치
US9134897B2 (en) * 2010-04-26 2015-09-15 Via Technologies, Inc. Electronic system and method for operating touch screen thereof
US8590017B2 (en) * 2011-02-28 2013-11-19 International Business Machines Corporation Partial authentication for access to incremental data
TW201224849A (en) * 2011-03-09 2012-06-16 Acer Inc Mobile devices and methods for controlling mobile devices
US9514297B2 (en) * 2011-03-28 2016-12-06 Htc Corporation Systems and methods for gesture lock obfuscation
US9122862B2 (en) * 2011-04-13 2015-09-01 Lenovo (Singapore) Pte. Ltd. Password input method using visual object
WO2012143065A1 (en) * 2011-04-19 2012-10-26 Sony Ericsson Mobile Communications Ab Location and time based unlocked action
US9030293B1 (en) * 2012-05-04 2015-05-12 Google Inc. Secure passcode entry

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101825986A (zh) * 2009-03-06 2010-09-08 Lg电子株式会社 移动终端与控制移动终端的方法
CN102096546A (zh) * 2010-12-29 2011-06-15 华为终端有限公司 一种操作系统的解锁方法及装置
CN102880384A (zh) * 2012-08-24 2013-01-16 百度在线网络技术(北京)有限公司 用于解锁移动终端屏幕的方法、装置和包括其的移动终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113569221A (zh) * 2021-04-02 2021-10-29 袁麓 一种解锁方法、系统及终端
CN113569221B (zh) * 2021-04-02 2023-10-24 袁麓 一种解锁方法、系统及终端

Also Published As

Publication number Publication date
US20150128257A1 (en) 2015-05-07
EP2857947A1 (en) 2015-04-08
CN103838494A (zh) 2014-06-04
EP2857947B1 (en) 2019-10-16
EP2857947A4 (en) 2015-07-22

Similar Documents

Publication Publication Date Title
WO2014082573A1 (zh) 一种终端设备的解锁方法及终端设备
US10515203B2 (en) Method and system for improving security of a mobile terminal
WO2013166844A1 (zh) 移动终端的解锁方法、系统及装置
TWI598804B (zh) 電子設備及其螢幕解鎖方法
WO2012088974A1 (zh) 一种操作系统的解锁方法及装置
BR112014017739B1 (pt) Método, aparelho e dispositivo de processo de destravamento para um terminal
WO2014121612A1 (zh) 解锁屏幕的方法、装置及终端
WO2012155428A1 (zh) 一种解除终端屏幕锁的方法及便携式终端设备
CN107862194B (zh) 一种安全验证的方法、装置及移动终端
CN103019599B (zh) 电子设备及其屏幕解锁方法
CN103076959A (zh) 电子设备及其屏幕解锁方法
CN103034414A (zh) 电子设备及其屏幕解锁方法
WO2014040452A1 (zh) 一种移动终端屏幕解锁方法及装置
WO2013143281A1 (zh) 一种动态令牌的工作方法
WO2015180030A1 (zh) 识别用户身份的方法及电子设备
TW201800653A (zh) 具緊急狀況通報功能之藍芽門鎖系統及其操作方法
CN110383869A (zh) 用于安全配置用户设备以执行安全操作的快速响应(qr)码
TWI545495B (zh) 觸摸屏操作系統及方法
CN103049195B (zh) 一种移动终端解锁方法及装置
WO2017028694A1 (zh) 一种用于解锁的方法和设备
WO2014183500A1 (zh) 一种动态令牌的工作方法
WO2016116017A1 (zh) 一种触摸屏解锁、触摸屏锁屏界面更新的方法和装置
WO2017113719A1 (zh) 一种移动终端远程锁定方法及系统
CN103593106A (zh) 手持装置及其解除锁定的方法
CN106203016B (zh) 一种终端处理方法及设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13857892

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 2013857892

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: DE